I hereby claim:
- I am mkaminsky11 on github.
- I am mkaminsky11 (https://keybase.io/mkaminsky11) on keybase.
- I have a public key whose fingerprint is 20A2 301D FA26 B5B7 AE4D A988 40C9 5C6A BCA8 4724
To claim this, I am signing this object:
| [global_config] | |
| title_transmit_bg_color = "#0076c9" | |
| [keybindings] | |
| [layouts] | |
| [[default]] | |
| [[[child1]]] | |
| parent = window0 | |
| type = Terminal | |
| [[[window0]]] | |
| parent = "" |
| #!/bin/sh | |
| # so, by default, monitoring and injection cannot be used with Broadcom wl wifi drivers (such as those for Macs) | |
| # this makes it impossible to do stuff like crack wifi passwords with aircrack-ng | |
| # fortunately, there is a solution burried in https://www.broadcom.com/docs/linux_sta/README.txt | |
| echo 1 > /proc/brcm_monitor0 #enables monitor mode. That's it! | |
| # prism0 is now like "mon0" (monitor mode) |
I hereby claim:
To claim this, I am signing this object:
| $(window).bind('contextmenu', function(e) { | |
| // do stuff here instead of normal context menu | |
| if(!yes_context){ | |
| return false; | |
| } | |
| }); | |
| function getHint(){ | |
| editor.execCommand("startAutocomplete"); | |
| yes_context = false; //this temporarily disables the context menu | |
| } |
| /* | |
| Download a file | |
| */ | |
| function downloadFile(fileId) { | |
| var request = gapi.client.drive.files.get({ | |
| 'fileId': fileId | |
| }); | |
| request.execute(function(resp) { | |
| window.location.assign(resp.webContentLink); | |
| }); |