Skip to content

Instantly share code, notes, and snippets.

View defect's full-sized avatar

Felix Aronsson defect

View GitHub Profile
#!/usr/bin/env ruby
require 'net/http'
require 'uri'
require 'json'
uri = URI.parse('http://alpari.com/en/investor/pamm/rating.json')
response = Net::HTTP.get_response uri
json = JSON.parse(response.body)
json['elements'].each {|item|
import com.twitter.scalding._
class TagCountJob(args : Args) extends Job(args) {
val input = TextLine(args("input"))
val output = Tsv(args("output"), writeHeader = true)
// Parse input file and extract artist name, tag name and tag count
val pairs = input.read.mapTo(('offset, 'line) -> ('artist, 'tag, 'tag_count)) {
line : (Int, String) =>
val fields = line._2.split("<sep>")
OpenSSL Security Advisory [19 Mar 2015]
=======================================
OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)
=====================================================
Severity: High
If a client connects to an OpenSSL 1.0.2 server and renegotiates with an
invalid signature algorithms extension a NULL pointer dereference will occur.

Keybase proof

I hereby claim:

  • I am defect on github.
  • I am defect (https://keybase.io/defect) on keybase.
  • I have a public key whose fingerprint is CF12 F788 9E57 FE79 D718 7EA8 8199 EFA5 C6A3 26FF

To claim this, I am signing this object: