Skip to content

Instantly share code, notes, and snippets.

Charlie McConnell AvianFlu

  • Blue Apron
  • New York, NY
Block or report user

Report or block AvianFlu

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:8892782
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAvqFAbVDF/1nOEXAit/eWmCsdtf79sQgyvfCA4d6JC0KZu5653K+R+da9GvYIRvWeuuBJA1u3cq7OHX0fm+J8tqp9Ffe9ZVKsj5ixpspbvSvwuaP8neJIS+hYzzGzqIdk+cqB+JSY71YF/yH/NMADX3loWtq7R3Xndc2k0CjnJHJmId8PSOTg7CMRS70GEVWq7Dc6E61M1ilCvBTaTv7f5KWkgZsOp4IIN4dui22t1aVLU87zFAw4Kqo7Y4cVMdfCEWYcIPgLVSqAsCOozeCObT1nyITN2Dm6dt06LlY8o2OpSa4cS/CoD57HMMB1xfMTaGAEW2Nv80wqf3TeYu/DoQ== rsa-key-20140208
@stympy
stympy / error.json
Created Oct 3, 2012
Sample Honeybadger error payload
View error.json
{
"notifier":{
"name":"Honeybadger Notifier",
"url":"https://github.com/honeybadger-io/honeybadger-ruby",
"version":"1.3.0"
},
"error":{
"class":"RuntimeError",
"message":"RuntimeError: This is a runtime error, generated by the crywolf app at 2012-09-26 17:25:24 -0700",
"backtrace":[
View stream_or_die_songs.markdown


    ____
   / /\ \
  | |
   \_\_   tt   rr rr  eee   aaaa   mmmmm
     \ \ ttttt rrrr  ee ee aa aa   mm m m
   __/ /  tt   rr    eee   a   a   mm m m
  |___/    tt  rr     eeee  aaaaa  mm m m
View stdio.js
/*
# Use cases:
1. Efficiently ignore all data coming from a stdio stream (ie, >/dev/null)
2. Interact with stdio data in a JS Stream object
3. Inherit stdio streams from the parent process
4. Connect arbitrary handle to a stdio stream
5. Connect an arbitrary handle to a child stdio stream other than 0,1,2
@the42
the42 / gist:1956518
Created Mar 2, 2012
GZip encoding for GO V1 using custom responsewriter
View gist:1956518
package main
import (
"compress/gzip"
"io"
"net/http"
"strings"
)
type gzipResponseWriter struct {
@felixge
felixge / command.sh
Created Oct 29, 2011
Bash stuff for fighting a weak DOS attack
View command.sh
# Here a few bash one-liners that helped me analyze / fight a weak DOS attack against debuggable.com. Mostly for future reference.
# The attacker was opening lots of tcp connections without sending data, I believe it's called a SYN flood, see: http://tools.ietf.org/html/rfc4987#section-3.2
# Step 0: Check what is going on at port 80
$ netstat -tan | grep ':80 ' | awk '{print $6}' | sort | uniq -c
# Step 1: Increase the number of available fds
$ ulimit -n 32000
# Step 2: Restart your webserver, for me:
@Marak
Marak / gist:1128904
Created Aug 6, 2011
Rules of the Obsessive-Compulsive Sociopath
View gist:1128904
Rules of the Obsessive-Compulsive Sociopath
If anything can go wrong, FIX IT!
When given a choice, take both!
Multiple projects lead to multiple successes.
Start at the top and work your way up.
Do it by the Book — but be the author!
When forced to compromise, ask for more.
If you can’t beat them, join them, then beat them.
If it’s worth doing, it’s got to be done RIGHT NOW.
You can’t perform that action at this time.