M5PaperS3で、TOTPによる2段階認証コードを生成できるアプリケーションです!
一応Google Authenticator等の代わりに使えますが、実用を想定していません🙏
MITライセンスに従い、自己責任でお願いいたします。
Googleアカウント、GitHub、X、Slack、AWSなどがTOTPによる2段階認証に対応しています。
Webpack 4 automatically polyfilled many Node APIs in the browser. This was not a great system, because it could lead to surprisingly giant libraries getting pulled into your app by accident, and it gave you no control over the exact versions of the polyfills you were using.
So Webpack 5 removed this functionality. That means you need to make changes if you were relying on those polyfills. This is a quick reference for how to replace the most common patterns.
For each automatically-polyfilled node package name on the left, this shows the name of the NPM package that was used to polyfill it on the right. Under webpack 5 you can manually install these packages and use them via resolve.fallback
.
""" | |
Minimal character-level Vanilla RNN model. Written by Andrej Karpathy (@karpathy) | |
BSD License | |
""" | |
import numpy as np | |
# data I/O | |
data = open('input.txt', 'r').read() # should be simple plain text file | |
chars = list(set(data)) | |
data_size, vocab_size = len(data), len(chars) |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
int addi(int a, int b) { | |
return a + b; | |
} | |
char *adds(char *a, char *b) { | |
char *res = malloc(strlen(a) + strlen(b) + 1); |
#!/usr/bin/env python | |
try: | |
import gdb | |
inside_gdb = True | |
except ImportError: | |
inside_gdb = False | |
if inside_gdb: |
The MIT License (MIT) | |
Copyright (c) 2014 Tomas Kafka | |
Permission is hereby granted, free of charge, to any person obtaining a copy | |
of this software and associated documentation files (the "Software"), to deal | |
in the Software without restriction, including without limitation the rights | |
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
copies of the Software, and to permit persons to whom the Software is | |
furnished to do so, subject to the following conditions: |
$ProcessesById = @{} | |
foreach ($Process in (Get-WMIObject -Class Win32_Process)) { | |
$ProcessesById[$Process.ProcessId] = $Process | |
} | |
$ProcessesWithoutParents = @() | |
$ProcessesByParent = @{} | |
foreach ($Pair in $ProcessesById.GetEnumerator()) { | |
$Process = $Pair.Value |
#!/bin/sh | |
### functions | |
f() { echo "Failed."; exit; } | |
setup_net() | |
{ | |
echo "Configuring network" | |
while :; do |
#!/bin/sh | |
PRIVATE_TOKEN="YOU_SECRET_TOKEN" | |
GITLAB_URL="http://gitlab.example.com/" | |
URL=`git config --get remote.origin.url` | |
PROJECT=`basename ${URL} .git | cut -d':' -f2` | |
COMMIT_MSG="git log -1 HEAD" | |
COMMIT_HASH_MSG=`git log -1 HEAD | head -1` |
#!/usr/bin/env ruby | |
# | |
# Proof-of-Concept exploit for Rails Remote Code Execution (CVE-2013-0156) | |
# | |
# ## Advisory | |
# | |
# https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion | |
# | |
# ## Caveats | |
# |