| Filter | Description | Example |
|---|---|---|
| allintext | Searches for occurrences of all the keywords given. | allintext:"keyword" |
| intext | Searches for the occurrences of keywords all at once or one at a time. | intext:"keyword" |
| inurl | Searches for a URL matching one of the keywords. | inurl:"keyword" |
| allinurl | Searches for a URL matching all the keywords in the query. | allinurl:"keyword" |
| intitle | Searches for occurrences of keywords in title all or one. | intitle:"keyword" |
Discover gists
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| CREATE DATABASE IF NOT EXISTS iris_db; | |
| USE iris_db; | |
| CREATE TABLE IF NOT EXISTS iris ( | |
| vector VECTOR(4), | |
| species VARCHAR(20) | |
| ); | |
| INSERT INTO iris VALUES |
| Filter | Description | Example |
|---|---|---|
| allintext | Searches for occurrences of all the keywords given. | allintext:"keyword" |
| intext | Searches for the occurrences of keywords all at once or one at a time. | intext:"keyword" |
| inurl | Searches for a URL matching one of the keywords. | inurl:"keyword" |
| allinurl | Searches for a URL matching all the keywords in the query. | allinurl:"keyword" |
| intitle | Searches for occurrences of keywords in title all or one. | intitle:"keyword" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 1. Designing Data-Intensive Applications, Martin Kleppmann (4.70) | |
| 2. Kubernetes in Action, Marko Luksa (4.59) | |
| 3. Unit Testing: Principles, Practices, and Patterns, Vladimir Khorikov (4.57) | |
| 4. Effective Java, Joshua Bloch (4.51) | |
| 5. Systems Performance: Enterprise and the Cloud, Brendan Gregg (4.48) | |
| 6. Structure and Interpretation of Computer Programs, Harold Abelson (4.47) | |
| 7. The C Programming Language, Brian W. Kernighan (4.44) | |
| 8. System Design Interview – An Insider's Guide: Volume 2, Alex Xu (4.44) | |
| 9. Learning Domain-Driven Design: Aligning Software Architecture and Business Strategy, Vladik Khononov (4.43) | |
| 10. Grokking Algorithms An Illustrated Guide For Programmers and Other Curious People, Aditya Y. Bhargava (4.41) |
| Security Measure | Description | |
|---|---|---|
| ☐ | Use HTTPS everywhere | Prevents basic eavesdropping and man-in-the-middle attacks |
| ☐ | Input validation and sanitization | Prevents XSS attacks by validating all user inputs |
| ☐ | Don't store sensitive data in the browser | No secrets in localStorage or client-side code |
| ☐ | CSRF protection | Implement anti-CSRF tokens for forms and state-changing requests |
| ☐ | Never expose API keys in frontend | API credentials should always remain server-side |
Note
This does not works in browser for quests which require you to play a game! Use the desktop app to complete those.
How to use this script:
- Accept a quest under the Quests tab
- Press Ctrl+Shift+I to open DevTools
- Go to the
Consoletab - Paste the following code and hit enter:
NewerOlder