start new:
tmux
start new with session name:
tmux new -s myname
import requests | |
from bs4 import BeautifulSoup | |
import re | |
import json | |
with requests.session() as s: | |
login_payload = { | |
"email": "xxx", | |
"password": "yyy" | |
} |
[{ | |
"name": "Data Science Intern (Summer 2020)", | |
"companyName": "Reddit", | |
"link": "https://boards.greenhouse.io/reddit/jobs/1896478", | |
"process": ["Applied", "Interviewing", "Offer"], | |
"cid": 30, | |
"industry": "Social", | |
"iid": 187, | |
"location": "San Francisco" | |
}, { |
#include "EEPROM.h" | |
int addr = 0; | |
#define EEPROM_SIZE 64 | |
// the sample text which we are storing in EEPROM | |
char ssid[64] = "CARNIVAL OF RUST"; | |
void setup() { | |
Serial.begin(115200); |
import java.util | |
import org.apache.kafka.clients.consumer.KafkaConsumer | |
import scala.collection.JavaConverters._ | |
object ConsumerExample extends App { | |
import java.util.Properties |
Kafka acts as a kind of write-ahead log (WAL) that records messages to a persistent store (disk) and allows subscribers to read and apply these changes to their own stores in a system appropriate time-frame.
Terminology:
#!/bin/bash | |
# | |
# Sample for getting temp session token from AWS STS | |
# | |
# aws --profile youriamuser sts get-session-token --duration 3600 \ | |
# --serial-number arn:aws:iam::012345678901:mfa/user --token-code 012345 | |
# | |
# Based on : https://github.com/EvidentSecurity/MFAonCLI/blob/master/aws-temp-token.sh | |
# |
#!/usr/bin/env python3 | |
# Copyright 2015 David Francoeur <[email protected]> | |
# Copyright 2017 Nathan Sommer <[email protected]> | |
# Modified 2020 Rounak Datta <[email protected]> | |
# | |
# This file is licensed under the GPLv2+. Please see COPYING for more | |
# information. | |
# | |
# Chrome allows export passwords to CSV. The CSV contains the following |
There is no transfer method more secure than using a physical USB storage to move the private key. However, often connecting physical devices is a barrier and at other times is an opposite wind. So, we'll create a simple HTTP server over a private (home) network and use that for the transfer.
Let us first export the GPG private and public keys:
gpg --output private.key --armor --export-secret-keys [email protected]
gpg --output public.key --armor --export [email protected]