Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Updated: Just use qutebrowser (and disable javascript). The web is done for.
eventsource | |
go-eventsource | |
client/client |
Upon completion you will have a sane, productive Haskell environment adhering to best practices.
sudo apt-get install libtinfo-dev libghc-zlib-dev libghc-zlib-bindings-dev
localhost:~$ ssh example.com | |
ubuntu@example.com:~$ | |
... ooh, I could really do with a port forwarding to something on here ... | |
Type ENTER TILDE CAPITAL-C | |
ssh> | |
Secret SSH shell! | |
ssh> -L8080:localhost:8080 |
These notes are specific to me, I have cherry picked the points that I find most important. Thus, it is an incomplete summary of Deep work. It is however, thorough enough for me. I would suggest reading the book and making your own notes before going through mine.
Deep Work: Professional activities performed in a state of distraction-free concentration that push your cognitive capabilities to their limit. These efforts create new value, improve your skill, and are hard to replicate.
from subprocess import Popen, PIPE | |
import pty | |
import os | |
from select import select | |
import sys | |
import tty | |
master, slave = pty.openpty() | |
p = Popen(['python'], stdin=slave, stdout=PIPE, stderr=PIPE) | |
pin = os.fdopen(master, 'w') |
Here is a script to take the hosts from From http://pgl.yoyo.org/adservers/ and convert them to rules for Little Snitch.
It has options to grab the entire list or grab new entries past a certain date.
Just grab the output and copy/paste into Little Snitch.
The script is written to block access to any process, any port. You can also delete those lines and it will only block Mail. Or use the options to enter any process, port or protocol you want to block.
package httptimeout | |
import ( | |
"net/http" | |
"time" | |
"fmt" | |
) | |
type TimeoutTransport struct { | |
http.Transport |