Keybase proof
I hereby claim:
- I am FiloSottile on github.
- I am filippo (https://keybase.io/filippo) on keybase.
- I have a public key whose fingerprint is 8CE7 D013 6ABE 132F EC03 D1C9 B8CC 58C5 1CAE A963
To claim this, I am signing this object:
--- a/globals.h 2009-08-25 21:08:52.000000000 +0200 | |
+++ b/globals.h 2010-12-11 13:34:36.934682237 +0100 | |
@@ -227,6 +227,9 @@ | |
WHERE char *PgpSignAs; | |
WHERE short PgpTimeout; | |
WHERE char *PgpEntryFormat; | |
+/* custom patch */ | |
+WHERE char *PgpMimeSignatureFilename; | |
+WHERE char *PgpMimeSignatureDescription; | |
WHERE char *PgpClearSignCommand; |
I hereby claim:
To claim this, I am signing this object:
rrSets := map[uint16][]dns.RR{} | |
for _, rr := range r.Response.Answer { | |
rrtype := rr.Header().Rrtype | |
set, ok := rrSets[rrtype] | |
if !ok { | |
set = []dns.RR{} | |
} | |
rrSets[rrtype] = append(set, rr) |
diff --git a/HPN-README b/HPN-README | |
new file mode 100644 | |
index 0000000..7cb3b97 | |
--- /dev/null | |
+++ b/HPN-README | |
@@ -0,0 +1,129 @@ | |
+Notes: | |
+ | |
+MULTI-THREADED CIPHER: | |
+The AES cipher in CTR mode has been multithreaded (MTR-AES-CTR). This will allow ssh installations |
#! /bin/bash | |
# http://redsymbol.net/articles/unofficial-bash-strict-mode/ | |
set -euo pipefail | |
IFS=$'\n\t' | |
readonly PASSWORD_STORE=~/.password-store | |
relpath() { | |
python -c "import os.path; print os.path.relpath('$1','${2:-$PWD}')" |
import shutil | |
import os | |
import sys | |
import subprocess | |
import re | |
# Settings | |
root_folder = 'C:/Users/Robert/Videos/YouTube/Playlists/' | |
destination_regex = re.compile(r'^\[download\] Destination: (.*)$', re.M) |
# The youtube-dl YouTube URL regex
^
(
(?:https?://)? # http(s):// (optional)
(?:youtu\.be/|(?:\w+\.)?youtube(?:-nocookie)?\.com/|tube\.majestyc\.net/) # the various hostnames, with wildcard subdomains
(?!view_play_list|my_playlists|artist|playlist) # ignore playlist URLs
(?: # the various things that can precede the ID:
(?:(?:v|embed|e)/) # v/ or embed/ or e/
*** locale.getpreferredencoding() : UTF-8 | |
u'\xe8' è | |
repr(sys.argv[1]) u'\xe8' | |
repr(raw_input()) u'\xe8' | |
*** sys.stdout.encoding : UTF-8 | |
u'\xe8' è | |
repr(sys.argv[1]) u'\xe8' | |
repr(raw_input()) u'\xe8' |
page.clipRect = page.evaluate(function() { | |
return document.getElementById(ELEMENT_ID).getBoundingClientRect(); | |
}); |
RTMPDump v2.5 GIT-2012-03-31 (Handshake 10 support by Xeebo) | |
(c) 2010 Andrej Stepanchuk, Howard Chu, The Flvstreamer Team; license: GPL | |
Connecting ... | |
WARNING: HandShake: Type mismatch: client sent 6, server answered 10 | |
INFO: Connected... | |
ERROR: HandleCtrl: SWFVerification Type 2 request not supported, attempting to use SWFVerification Type 1! Patches welcome... | |
ERROR: RTMP_ReadPacket, failed to read RTMP packet header |