module Entry::TrackerBlocking | |
extend ActiveSupport::Concern | |
included do | |
has_many :blocked_trackers | |
end | |
email_service_blockers = { | |
"ActiveCampaign" => /lt\.php(.*)?l\=open/, | |
"AWeber" => "openrate.aweber.com", |
This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.
Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.
You will find most of this information pulled from the Arch Wiki and other resources linked thereof.
Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX
with /dev/sdX
or your device as needed.
<?php | |
/* | |
I wrote this function to progressively obfuscate text in MAKEbook.io. When it KINDA worked, I just used it. | |
It can take a lot of improvement. I kinda just tweaked the values until it was good enough. It's not SO progressive though. | |
It takes all the output of your PHP scripts via ob_start(), reroutes that to the obfuscation function. | |
You should check if user paid for book or not, then either run ob_start or not! | |
A list of useful commands for the FFmpeg command line tool.
Download FFmpeg: https://www.ffmpeg.org/download.html
Full documentation: https://www.ffmpeg.org/ffmpeg.html
I was talking to a coworker recently about general techniques that almost always form the core of any effort to write very fast, down-to-the-metal hot path code on the JVM, and they pointed out that there really isn't a particularly good place to go for this information. It occurred to me that, really, I had more or less picked up all of it by word of mouth and experience, and there just aren't any good reference sources on the topic. So… here's my word of mouth.
This is by no means a comprehensive gist. It's also important to understand that the techniques that I outline in here are not 100% absolute either. Performance on the JVM is an incredibly complicated subject, and while there are rules that almost always hold true, the "almost" remains very salient. Also, for many or even most applications, there will be other techniques that I'm not mentioning which will have a greater impact. JMH, Java Flight Recorder, and a good profiler are your very best friend! Mea
/** | |
* Created by mturner on 3/18/16. | |
*/ | |
package com.cyber2.tc.api.v2.service; | |
import org.codehaus.jackson.annotate.JsonAutoDetect; | |
import org.codehaus.jackson.annotate.JsonMethod; | |
import org.codehaus.jackson.map.ObjectMapper; | |
import org.jboss.resteasy.core.Dispatcher; | |
import org.jboss.resteasy.core.ResourceInvoker; | |
import org.jboss.resteasy.core.ResourceMethod; |
#!/bin/sh | |
brightness=$(cat /sys/class/backlight/gmux_backlight/brightness) | |
if [ $1 = '-inc' ] ; then | |
newbrightness=$(expr $brightness + $2 \* 3) | |
elif [ $1 = '-dec' ] ; then | |
newbrightness=$(expr $brightness - $2 \* 3) | |
fi | |
if [ $newbrightness -lt 0 ] ; then |
Twelve Go Best Practices
Francesc Campoy Flores Gopher at Google @francesc http://campoy.cat/+
- Best practices
i386 : iPhone Simulator | |
x86_64 : iPhone Simulator | |
arm64 : iPhone Simulator | |
iPhone1,1 : iPhone | |
iPhone1,2 : iPhone 3G | |
iPhone2,1 : iPhone 3GS | |
iPhone3,1 : iPhone 4 | |
iPhone3,2 : iPhone 4 GSM Rev A | |
iPhone3,3 : iPhone 4 CDMA | |
iPhone4,1 : iPhone 4S |