WIP Oct. 24, 2017
- Sign up for AWS Free Tier account
- Build secure IAM settings
- Set up roles, groups
- Basic permissions
- Build S3 bucket
- Set permissions to IAM group/user
- AWS SDK for API
Def "Nest": a group of snakes, vipers, or in this case, pythons.
A place for all pythonists to sssssssspeak with each other.
You will need the sys standard library.
-
Functions
def
- Why we use functions
- return statements
- global vs. local variables
- arguments pass by reference
- tuple arguments ???
- keyword and default arguments
-
Create a python script
This exercise can be performed in Bash, CMD, or Powershell
Build a bash-exercise.sh
file in your HOME directory.
Do your work in the scripts.sh
file. Make sure your bash-exercise.sh
is executable. You may comment out lines respective to each task to avoid overwriting/errors.
- Build a
folders
directory and inside, build 10 new directories with the incremented name ofdir
. We should get something like./folders/dir1
,./folders/dir2
and so forth. - Create a
projects
directory in./folders/dir1
and build aREADME.md
file in the projects dir.
I hereby claim:
- I am nakaz on github.
- I am nakaz (https://keybase.io/nakaz) on keybase.
- I have a public key ASCG0jS5-JK0kVfSUpr5tPgbblasfmnz7oEyvWOh1XV9Pwo
To claim this, I am signing this object:
Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt. Use bcrypt.
These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for storing passwords.
How? Basically, it’s slow as hell. It uses a variant of the Blowfish encryption algorithm’s keying schedule, and introduces a work factor, which allows you to determine how expensive the hash function will be.