Below is the starting tweet for each thread of #CipherMysteries. 32 total ciphers will be discussed. When all 32 are tweeted, a post at my blog (https://pthree.org) will be written discussing each of the 32 at length.
### Keybase proof | |
I hereby claim: | |
* I am atoponce on github. | |
* I am atoponce (https://keybase.io/atoponce) on keybase. | |
* I have a public key whose fingerprint is E041 3539 273A 6534 A3E1 9259 22EE E048 8086 060F | |
To claim this, I am signing this object: |
#!/bin/bash | |
HOME=/var/services/homes/backupchef | |
SNAPSHOT_DIR=$HOME/backups/myserver | |
LOG_DIR=$HOME/backups | |
KEY_ID=$HOME/.ssh/id_rsa | |
RM=/bin/rm; | |
MV=/bin/mv; | |
CP=/bin/cp; | |
$RM -rf $SNAPSHOT_DIR/daily.6; |
#!/bin/bash | |
HOME=/var/services/homes/backupchef | |
SNAPSHOT_DIR=$HOME/backups/myserver | |
LOG_DIR=$HOME/backups | |
KEY_ID=$HOME/.ssh/id_rsa | |
RM=/bin/rm; | |
MV=/bin/mv; | |
CP=/bin/cp; | |
$RM -rf $SNAPSHOT_DIR/daily.6; |
#!/bin/bash | |
HOME=/var/services/homes/backupchef | |
SNAPSHOT_DIR=$HOME/backups/myserver | |
LOG_DIR=$HOME/backups | |
KEY_ID=$HOME/.ssh/id_rsa | |
RM=/bin/rm; | |
MV=/bin/mv; | |
CP=/bin/cp; | |
$RM -rf $SNAPSHOT_DIR/daily.6; |
Uptime percentage: 99.91271 | |
Account created 2015-12-12 12:00: http://ae7.st/s/w4tc6 | |
- 104,940 minutes from 2015-12-12 12:00 to 2016-02-23 09:00 | |
Outages: | |
240m: 2015-12-31 05:00 - 2015-12-31 09:00 (http://ae7.st/s/licq-) | |
600m: 2015-12-31 23:00 - 2016-01-01 09:00 (http://ae7.st/s/ic9lh) | |
600m: 2016-02-18 11:30 - 2016-02-18 21:30 (http://ae7.st/s/85hko) | |
7720m: 2016-02-18 00:20 - 2016-02-23 09:00 (http://ae7.st/s/ifgl4) |
shuff() { | |
if [ $(command -v shuf) ]; then | |
shuf -n "$1" | |
elif [ $(command -v shuffle) ]; then | |
shuffle -f /dev/stdin -p "$1" | |
else | |
awk 'BEGIN{ | |
"od -tu4 -N4 -A n /dev/urandom" | getline | |
srand(0+$0) | |
} |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA512 | |
# This word list has included material from the JMdict (EDICT, etc.) | |
# dictionary files in accordance with the licence provisions of the | |
# Electronic Dictionaries Research Group, and is covered under their | |
# Creative Commons Attribution-ShareAlike Licence. | |
# | |
# http://www.edrdg.org/edrdg/licence.html | |
# |
This allows you to use Vim as a secure password manager. It was inspired and mostly lifted from http://pig-monkey.com/2013/04/password-management-vim-gnupg/. It differs in that a specification is now defined, and a syntax highlighting file is provided to highlight keywords and hide passwords. Additionally, this Gist uses *.pw
file extensions to trigger the syntax highlighting, in addition to some custom GPG config.
Save in ~/.vim/plugin/gnupg.vim
. Grab from https://github.com/jamessan/vim-gnupg.
Save in ~/.vimrc
:
if has("autocmd")
This table shows passwords generated from a number of different generetors of different strengths,and their results using different strength testing checkers.
See the public Gist of atoponce/password_strength.md about a description of each generator and the strength tester.
| Password | Source | Pwqcheck | Cracklib-check | Pwscore | Zxcvbn |