- By Edmond Lau
- Highly Recommended 👍
- http://www.theeffectiveengineer.com/
- They are the people who get things done. Effective Engineers produce results.
# This will only work on Artist/Album Directory Structure and flac files with embeded covert art. | |
# eg. AC-DC/Powrup | |
# Install imagemagick and ffmpeg first. | |
# Tested only on Linux System. | |
function Coverartify() { | |
for udir in */; do # ACDC Directory from eg. | |
for dir in "$udir"*/; do # Powrup Directory from eg. | |
pather="$(pwd)/$dir" | |
echo $pather |
The following is an extremely simplified view of how SSL is implemented and what part the certificate plays in the entire process.
Normal web traffic is sent unencrypted over the Internet. That is, anyone with access to the right tools can snoop all of that traffic. Obviously, this can lead to problems, especially where security and privacy is necessary, such as in credit card data and bank transactions. The Secure Socket Layer is used to encrypt the data stream between the web server and the web client (the browser).
SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server's private key, it can be decrypted only using its corresponding public key, ensuring
{"Default":{"name":"Default","sets":{"469eb8921edf75ed3360d5838f9585c0d7a82109":{"name":"Outline","string":"| ~ | (vFl)\n| ~ | (hFl)","id":"469eb8921edf75ed3360d5838f9585c0d7a82109"},"84676cd434499994ef5176c93d970e83079cbc6c":{"name":"Two column grid","string":"| ~ | ~ | (vFl)","id":"84676cd434499994ef5176c93d970e83079cbc6c"},"d521212626e4f9f144821a52dcdaf3e1f6c8cffd":{"name":"Three column grid","string":"| ~ | ~ | ~ | (vFl)","id":"d521212626e4f9f144821a52dcdaf3e1f6c8cffd"},"836d2a54511793c6f2ecdd3447f1c727e3c83925":{"name":"1170px Grid | 1570","string":"$v = | 65px | 15px | 15px |\n$vC = | 65px |\n200px | 15px | 15px | $v*11 | $vC | 15px | 15px | 200px ( vlp, | ~ )","id":"836d2a54511793c6f2ecdd3447f1c727e3c83925"},"8d6acf586750142b4cb4bb4b6f33244211159eb9":{"name":"970px Grids | 1370","string":"$v = | 48px | 15px | 15px |\n$vC = | 48px |\n200px | 17px | 15px | $v*11 | $vC | 15px | 17px | 200px ( vlp, | ~ )","id":"8d6acf586750142b4cb4bb4b6f33244211159eb9"},"544118008c2af25e65d782c499fbe42480cf8915":{"name":"7 |
package io.github.devinceble.ordertaker; | |
import android.app.ActionBar; | |
import android.content.Intent; | |
import android.net.Uri; | |
import android.support.v7.app.AppCompatActivity; | |
import android.os.Bundle; | |
import android.view.View; | |
import android.widget.Button; | |
import android.widget.CheckBox; |
// insert user and retrieve the id | |
id = Accounts.createUser({ | |
email: user.email, | |
password: "apple1", | |
profile: { name: user.name } | |
}); | |
// now we can verify that the user was inserted and add permissions | |
if (user.roles.length > 0) { | |
Roles.addUsersToRoles(id, user.roles); |
University Comet is an Application to Manage Course Activity for faculty and students.
##Features UNIVERSITY COMET: Manage All Users Manage Application Backup and Security Auto Generate and Calculate Table of Specification Auto Generate and Calculate Grades. Near Realtime Communication between all Platforms and Server.
https://github.com/meteor/meteor/blob/devel/packages/spacebars/README.md | |
git clone https://github.com/devinceble/chatApp3.0.git | |
cd chatApp3.0/ | |
git checkout -b activity01 | |
git branch | |
git push -u origin activity01 |
wait4eth1() { | |
CNT=0 | |
until ip a show eth1 | grep -q UP | |
do | |
[ $((CNT++)) -gt 60 ] && break || sleep 1 | |
done | |
sleep 1 | |
} | |
wait4eth1 |
netsh interface tcp set global autotuning=disabled |