Look at LSB init scripts for more information.
Copy to /etc/init.d
:
# replace "$YOUR_SERVICE_NAME" with your service's name (whenever it's not enough obvious)
from __future__ import division | |
from numpy.fft import rfft | |
from numpy import argmax, mean, diff, log, nonzero | |
from scipy.signal import blackmanharris, correlate | |
from time import time | |
import sys | |
try: | |
import soundfile as sf | |
except ImportError: | |
from scikits.audiolab import flacread |
Look at LSB init scripts for more information.
Copy to /etc/init.d
:
# replace "$YOUR_SERVICE_NAME" with your service's name (whenever it's not enough obvious)
this worked very nice for a single page site | |
``` | |
wget \ | |
--recursive \ | |
--page-requisites \ | |
--convert-links \ | |
[website] | |
``` | |
wget options |
REM ***** BASIC ***** | |
Function CELL_NOTE(vSheet,lRowIndex&,iColIndex%) | |
Dim v | |
v = getSheetCell(vSheet,lRowIndex&,iColIndex%) | |
if vartype(v) = 9 then | |
CELL_NOTE = v.Annotation.getText.getString | |
else | |
CELL_NOTE = v | |
endif | |
End Function |
#include "Poco/Exception.h" | |
#include "Poco/StreamCopier.h" | |
#include "Poco/URI.h" | |
#include "Poco/URIStreamOpener.h" | |
#include "Poco/Net/HTTPStreamFactory.h" | |
#include "Poco/Net/HTTPSStreamFactory.h" | |
#include "Poco/Net/AcceptCertificateHandler.h" | |
#include "Poco/Net/InvalidCertificateHandler.h" |
0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/ | |
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/ | |
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/ | |
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d | |
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/ | |
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html | |
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html | |
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site. http://packetstormse |
""" | |
A bare bones examples of optimizing a black-box function (f) using | |
Natural Evolution Strategies (NES), where the parameter distribution is a | |
gaussian of fixed standard deviation. | |
""" | |
import numpy as np | |
np.random.seed(0) | |
# the function we want to optimize |
from keras.layers import Recurrent | |
import keras.backend as K | |
from keras import activations | |
from keras import initializers | |
from keras import regularizers | |
from keras import constraints | |
from keras.engine import Layer | |
from keras.engine import InputSpec |
#Evolution Strategies with Keras | |
#Based off of: https://blog.openai.com/evolution-strategies/ | |
#Implementation by: Nicholas Samoray | |
#README | |
#Meant to be run on a single machine | |
#APPLY_BIAS is currently not working, keep to False | |
#Solves Cartpole as-is in about 50 episodes | |
#Solves BipedalWalker-v2 in about 1000 |