Mozilla Operations Security (OpSec) team:
- Cipher suite: Modern compatibility
- General server config: Nginx
Mozilla Operations Security (OpSec) team:
Host foo | |
User blah | |
HostName foo.bar.baz | |
Port 42 |
import fabric.api | |
from contextlib import contextmanager | |
@contextmanager | |
def shell(new_shell): | |
old_shell, env.shell = env.shell, new_shell | |
yield | |
env.shell = old_shell |
good discussion at | |
http://www.last.fm/group/Steampunk/forum/42787/_/376230 | |
some interesting first starts | |
http://sites.google.com/site/chinasteamengine/ | |
http://www.lifesdecay.com/Home/Home.html | |
your life will get very strange for a little while after clicking this link | |
http://www.youtube.com/watch?v=cycXIYdFGsQ |
#!/bin/bash | |
# This hook is run after every virtualenv is activated. | |
script="$VIRTUALENVWRAPPER_HOOK_DIR/postactivate-"$(basename $VIRTUAL_ENV) | |
if [ -r $script ]; then | |
source $script | |
fi |
# create a temporary directory | |
mkdir tmp_python; cd tmp_python | |
# symlink "python" to the interpreter you want | |
ln -s `which python2.6` python | |
# have mkvirtualenv use the python symlink | |
PATH="$PWD:$PATH" mkvirtualenv py26party | |
# clean up | |
cd ..; rm -rf tmp_python |
x='http://letsrevolutionizetesting.com/challenge'; while :; do r=`curl -s -H "Accept: application/json" $x`; x=`echo $r | grep -E -o 'http[^"]+'`; if ! echo "$x" | grep -q http; then echo $r; break; fi; echo $x; done |
# encoding: utf-8 | |
import sys | |
import monocle | |
monocle.init("twisted") | |
from monocle import _o | |
from monocle.stack import eventloop | |
import txredis.client | |
from twisted.internet import reactor, protocol |
{ | |
"color_scheme": "Packages/User/Text Ex Machina bsik.tmTheme", | |
"translate_tabs_to_spaces": true, | |
"auto_complete_triggers": [{"selector": "source.python - string - comment - constant.numeric", "characters": "."}], | |
"complete_parameters": true, | |
"pep8_ignore": ["E501"] | |
} |
import logging; logging.basicConfig(level=logging.DEBUG) |