I hereby claim:
- I am mpdavis on github.
- I am mpdavis (https://keybase.io/mpdavis) on keybase.
- I have a public key whose fingerprint is 2638 7A41 742B D59F ADB4 7735 C6BA 9460 D5EE 553B
To claim this, I am signing this object:
package cs417; | |
import static org.junit.Assert.*; | |
import java.util.ArrayList; | |
import java.util.Arrays; | |
import cs417.BuggleSort; | |
import org.junit.Before; |
package cs417; | |
import static org.junit.Assert.*; | |
import java.util.ArrayList; | |
import java.util.Arrays; | |
import cs417.BuggleSort; | |
import org.junit.Before; |
package cs417; | |
import static org.junit.Assert.*; | |
import java.util.ArrayList; | |
import java.util.Arrays; | |
import cs417.BuggleSort; | |
import org.junit.Before; |
#define _XOPEN_SOURCE 600 | |
#include <ucontext.h> | |
#include <stdlib.h> | |
/*** Globals ***/ | |
#define THREAD_ARRAY_SIZE 100 | |
static int max_klt; | |
static int current_klt; |
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis ([email protected]) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
import select |
#!/usr/bin/env python | |
import os | |
import os.path | |
import shutil | |
import sys | |
def main(): | |
GOOGLE_DRIVE_DIR = "/Users/michael/Google Drive/Altitude Iowa Vids/" |
from django.conf.urls import patterns, url, include | |
from rest_framework.routers import DefaultRouter | |
from api_1 import views as api_1_views | |
router = DefaultRouter() |
I hereby claim:
To claim this, I am signing this object: