LocalBitcoins (for small amounts, cash)
| #!/usr/bin/env bash | |
| # | |
| # This is sp, the command-line Spotify controller. It talks to a running | |
| # instance of the Spotify Linux client over dbus, providing an interface not | |
| # unlike mpc. | |
| # | |
| # Put differently, it allows you to control Spotify without leaving the comfort | |
| # of your command line, and without a custom client or Premium subscription. | |
| # |
| // Returns a function, that, as long as it continues to be invoked, will not | |
| // be triggered. The function will be called after it stops being called for | |
| // N milliseconds. If `immediate` is passed, trigger the function on the | |
| // leading edge, instead of the trailing. | |
| angular.module('ngDebounce', []).factory('$debounce', function($timeout, $q) { | |
| return function(func, wait, immediate) { | |
| var timeout; | |
| var deferred = $q.defer(); | |
| return function() { | |
| var context = this, args = arguments; |
| #!/bin/bash | |
| # Created by Håvard Fossli <hfossli@gmail.com> in 2013 | |
| # This is free and unencumbered software released into the public domain. | |
| # For more information, please refer to <http://unlicense.org/> | |
| # | |
| # Description | |
| # A bash script for fetching all branches and tags of a git project as snapshots into separate folders | |
| # | |
| # Keywords |
You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.
Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.
If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.
THIS GIST WAS MOVED TO TERMSTANDARD/COLORS REPOSITORY.
PLEASE ASK YOUR QUESTIONS OR ADD ANY SUGGESTIONS AS A REPOSITORY ISSUES OR PULL REQUESTS INSTEAD!
Written as both a refresher course on the mechanics of cognition in human psychology, and as the beginning of a working theory, wherein one might make some deductions from human psychology to broadly advance/improve the design of server software and data models for the industry en masse.
c. Mike McNeil, 2013-2014 All Rights Reserved.
What's the point of this? I think psychology will inevetiably instruct the future of software design, in the same way neurobiology is beginning to impact the hardware engineering industry. >
This configuration is no longer updated
| # Install ARCH Linux with encrypted file-system and UEFI | |
| # The official installation guide (https://wiki.archlinux.org/index.php/Installation_Guide) contains a more verbose description. | |
| # Download the archiso image from https://www.archlinux.org/ | |
| # Copy to a usb-drive | |
| dd if=archlinux.img of=/dev/sdX bs=16M && sync # on linux | |
| # Boot from the usb. If the usb fails to boot, make sure that secure boot is disabled in the BIOS configuration. | |
| # Set swedish keymap |
| check host localhost with address 127.0.0.1 | |
| start "/sbin/start myapp" | |
| stop "/sbin/stop myapp" | |
| if failed port 3000 protocol HTTP | |
| request / | |
| with timeout 5 seconds | |
| then restart |