most of these require logout/restart to take effect
# Enable character repeat on keydown
defaults write -g ApplePressAndHoldEnabled -bool false
# Set a shorter Delay until key repeat
ReflectionClass — The ReflectionClass class | |
ReflectionClass::__clone — Clones object | |
ReflectionClass::__construct — Constructs a ReflectionClass | |
ReflectionClass::export — Exports a class | |
ReflectionClass::getConstant — Gets defined constants | |
ReflectionClass::getConstants — Gets constants | |
ReflectionClass::getConstructor — Gets constructor | |
ReflectionClass::getDefaultProperties — Gets default properties | |
ReflectionClass::getDocComment — Gets doc comments | |
ReflectionClass::getEndLine — Gets end line |
ssh-keygen -y -f private_key1.pem > public_key1.pub |
create different ssh key according the article Mac Set-Up Git
$ ssh-keygen -t rsa -C "[email protected]"
function functionReplacer(key, value) { | |
if (typeof(value) === 'function') { | |
return value.toString(); | |
} | |
return value; | |
} | |
function functionReviver(key, value) { | |
if (key === "") return value; | |
# | |
# Sample nginx.conf optimized for EC2 c1.medium to xlarge instances. | |
# Also look at the haproxy.conf file for how the backend is balanced. | |
# | |
user "nginx" "nginx"; | |
worker_processes 10; | |
error_log /var/log/nginx_error.log info; |
You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.
Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.
If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.
// this is the background code... | |
// listen for our browerAction to be clicked | |
chrome.browserAction.onClicked.addListener(function (tab) { | |
// for the current tab, inject the "inject.js" file & execute it | |
chrome.tabs.executeScript(tab.ib, { | |
file: 'inject.js' | |
}); | |
}); |
# --------------------------------------------------------------------------- | |
# | |
# Description: This file holds all my BASH configurations and aliases | |
# | |
# Sections: | |
# 1. Environment Configuration | |
# 2. Make Terminal Better (remapping defaults and adding functionality) | |
# 3. File and Folder Management | |
# 4. Searching | |
# 5. Process Management |