- Kate
- Tom
- Selasi
- Candace
- Benjamina
| #! /bin/env python3 | |
| import subprocess | |
| import csv | |
| from datetime import datetime | |
| import time | |
| import re | |
| INTERVAL = 10 |
| <html> | |
| <head> | |
| <title>Hello World</title> | |
| <style> | |
| body { | |
| margin: 0; | |
| padding: 0; | |
| width: 100%; | |
| height: 100%; | |
| background-color: #C6B69B; |
| <!DOCTYPE html> | |
| <html> | |
| <head><meta charset="utf-8" /> | |
| <title>The Longest Ride</title> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/require.js/2.1.10/require.min.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/2.0.3/jquery.min.js"></script> | |
| <style type="text/css"> | |
| /*! |
# First let's grab all the station data
import csv
stations = {}
with open('data/Divvy_Stations_2015.csv') as csvfile:This is a test to see how uWSGI handles a slowloris attack. To run it:
In one terminal window, run the uWSGI server (you'll need a fairly recent version of uWSGI)
> uwsgi --http=127.0.0.1:8080 --master --module=testapp:application
In another window, run the attack:
> python loris.py
| import requests | |
| from requests_oauthlib import OAuth1 | |
| import time | |
| APP_API_KEY = "CONSUMER_KEY" | |
| APP_API_SECRET = "CONSUMER_SECRET" | |
| USER_ACCESS_TOKEN = "USER_ACCESS_TOKEN" | |
| USER_ACCESS_TOKEN_SECRET = "USER_ACCESS_TOKEN_SECRET" |
Questions:
pre-wrap?