更新: | 2017-05-09 |
---|---|
作者: | @voluntas |
バージョン: | 3.14 |
URL: | http://voluntas.github.io/ |
MQTT をググって調べた人向け
[Script Info] | |
Title: How AI Could Empower Any Business | Andrew Ng | TED | |
ScriptType: v4.00+ | |
WrapStyle: 0 | |
Collisions: Reverse | |
PlayResX: 384 | |
PlayResY: 288 | |
Timer: 100.0000 | |
ScaledBorderAndShadow: no |
package main | |
import ( | |
"bytes" | |
"fmt" | |
"net" | |
"runtime" | |
"sync" | |
"sync/atomic" | |
"time" |
# Go parameters | |
GOCMD=go | |
GOBUILD=$(GOCMD) build | |
GOCLEAN=$(GOCMD) clean | |
GOTEST=$(GOCMD) test | |
GOGET=$(GOCMD) get | |
BINARY_NAME=mybinary | |
BINARY_UNIX=$(BINARY_NAME)_unix |
#!/bin/bash | |
# Check if command was ran as root. | |
if [[ $(id -u) -eq 0 ]]; then | |
echo "The command \"sphp\" should not be executed as root or via sudo directly." | |
echo "When a service requires root access, you will be prompted for a password as needed." | |
exit 1 | |
fi | |
# Usage |
require = function a(b, c, d) { | |
function e(g, h) { | |
if (!c[g]) { | |
if (!b[g]) { | |
var i = "function" == typeof require && require; | |
if (!h && i) return i(g, !0); | |
if (f) return f(g, !0); | |
var j = new Error("Cannot find module '" + g + "'"); | |
throw j.code = "MODULE_NOT_FOUND", j | |
} |
go get -u golang.org/x/mobile/cmd/... | |
go get -u github.com/nobonobo/gomobileapp | |
gomobileapp init | |
go get -d github.com/nobonobo/nobopiano | |
# for iOS | |
gomobileapp build -target ios github.com/nobonobo/nobopiano | |
# 実機にnobopiano.appをインストール | |
# for Android |
更新: | 2017-05-09 |
---|---|
作者: | @voluntas |
バージョン: | 3.14 |
URL: | http://voluntas.github.io/ |
MQTT をググって調べた人向け
1Password 5.3 for OSX, 5.2 for iOS, and 4.1.0.538 for Windows support OTP. I've been using Authy for a while now, but the fact is, I haven't really been using 2FA for some time. As mentioned by 1Password in a recent blog post, having the OTP generator and password on the same device is very much not 2FA. It's just an expiring OTP, which can help, but let's not kid ourselves too much.
With that out of the way. One of the things that was interesting to me was moving my OTP out of Authy and into 1Password. I like the control I get with 1Password, but I didn't want to have to reset all my OTP right away, that would suck. So, I got to dissecting the Authy Chrome App to see what I could do.
Run the Authy Chrome app and make sure it's unlocked.
Now, enable Developer mode in Chrome. We'll need this to inspect the background application that stores al
# Key considerations for algorithm "RSA" ≥ 2048-bit
openssl genrsa -out server.key 2048
# Key considerations for algorithm "ECDSA" ≥ secp384r1
# List ECDSA the supported curves (openssl ecparam -list_curves)