Skip to content

Instantly share code, notes, and snippets.

View untrusted-lvl11-solution.js
/*
* robot.js
*
* You'll need three keys in order to unlock the
* Algorithm: the red key, the green key, and the
* blue key. Unfortunately, all three of them are
* behind human-proof barriers.
*
* The plan is simple: reprogram the maintenance
* robots to grab the key and bring it through
View gist:7fb6dfdf87650303978dd2331b7dc075
(defun avvivare-irc ()
(interactive)
(erc-tls
:server "otcirc.jf.intel.com"
:port 6697
:nick "hnanni"
:full-name "Humberto Nanni"
)
(setq erc-autojoin-channels-alist '(("otcirc.jf.intel.com" "#clearlinux")))
)
View minimal_example.py
from ophyd import PVPositionerPC, EpicsSignal, EpicsSignalRO, PseudoPositioner, PseudoSingle
from ophyd import Component as Cpt
class QuadEMDwellTime(PVPositionerPC):
setpoint = Cpt(EpicsSignal, 'AveragingTime')
readback = Cpt(EpicsSignalRO, 'AveragingTime_RBV')
class StruckDwellTime(PVPositionerPC):
@choco-bot
choco-bot / Install.txt
Created Nov 20, 2019
Vivaldi v2.9.1732.13-snapshot - Failed - Package Tests Results
View Install.txt
2019-11-20 16:43:25,360 408 [DEBUG] - XmlConfiguration is now operational
2019-11-20 16:43:25,564 408 [INFO ] - ============================================================
2019-11-20 16:43:26,360 408 [INFO ] - Chocolatey v0.10.15
2019-11-20 16:43:26,407 408 [DEBUG] - Chocolatey is running on Windows v 6.3.9600.0
2019-11-20 16:43:26,424 408 [DEBUG] - Attempting to delete file "C:/ProgramData/chocolatey/choco.exe.old".
2019-11-20 16:43:26,424 408 [DEBUG] - Attempting to delete file "C:\ProgramData\chocolatey\choco.exe.old".
2019-11-20 16:43:26,454 408 [DEBUG] - Command line: "C:\ProgramData\chocolatey\choco.exe" install Vivaldi --version 2.9.1732.13-snapshot -fdvy --execution-timeout=2700 --allow-downgrade
2019-11-20 16:43:26,454 408 [DEBUG] - Received arguments: install Vivaldi --version 2.9.1732.13-snapshot -fdvy --execution-timeout=2700 --allow-downgrade
2019-11-20 16:43:26,626 408 [DEBUG] - RemovePendingPackagesTask is now ready and waiting for PreRunMessage.
2019-11-20 16:43:26,642 408 [DEBUG] - Sending m
View test
var mqtt = require('mqtt');
//var client  = mqtt.connect('http://localhost:1883', {clientId: '5d344196b9801e6d0b110486/1234/android'});
var client  = mqtt.connect(‘localhost:1883/', {clientId: '5d344196b9801e6d0b110486/1234/android'});
client.on('connect', function () {
    client.subscribe('chat:5d344196b9801e6d0b110486');
    //client.subscribe('msgReadStatus:57964c1a2014c4544afb8efe/5c718e3d6fd9fae6afe2f83b');
    /*const msgReadStatusPayload = {
        tenantId: "57964c1a2014c4544afb8efe",
        sendereRTCUserId: "5c718e3d6fd9fae6afe2f83b",
        msgUniqueId: "5c9e76ee0d802dfa8ef81b7f",
@nazarlitvin
nazarlitvin / reverse-scroll-direction.md
Created Nov 20, 2019
Reverls scroll direction on Windows 10
View reverse-scroll-direction.md

Use PowerShell (run as Admin)

Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Enum\HID\*\*\Device` Parameters FlipFlopWheel -EA 0 | ForEach-Object { Set-ItemProperty $_.PSPath FlipFlopWheel 1 }

Reboot after.

@mupcakes
mupcakes / baseURL.groovy
Last active Nov 20, 2019 — forked from fishi0x01/baseURL.groovy
This is a collection of groovy scripts I gathered and use for bootstrapping Jenkins. Most of this can also be achieved with the CasC Plugin https://github.com/jenkinsci/configuration-as-code-plugin
View baseURL.groovy
#!groovy
/*
* This script configures the Jenkins base URL.
*/
import jenkins.model.JenkinsLocationConfiguration
JenkinsLocationConfiguration location = Jenkins.instance.getExtensionList('jenkins.model.JenkinsLocationConfiguration')[0]
location.url = 'https://jenkins-as-code-poc.devtail.io/'
@nazarlitvin
nazarlitvin / reverse-scroll-direction.md
Created Nov 20, 2019
Reverls scroll direction on Windows 10
View reverse-scroll-direction.md

Use PowerShell (run as Admin)

Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Enum\HID\*\*\Device` Parameters FlipFlopWheel -EA 0 | ForEach-Object { Set-ItemProperty $_.PSPath FlipFlopWheel 1 }

Reboot after.

View keybase.md

jens_erik

Keybase proof

I hereby claim:

  • I am nordgaard on github.
  • I am jens_erik (https://keybase.io/jens_erik) on keybase.
  • I have a public key ASC2ik91JCAvPnSsaMHB6s62ziUHiJ0iJkx_tpHfc5qy5go

To claim this, I am signing this object:

View parse_extra_col.py
#!/usr/bin/python_
import sys,os
def main():
basedir = "/cluster/work/grlab/projects/projects2018-germlinesqtl/PM_transQTL_analysis/ensembl-vep"
filename = "mergedQTL_v3_VEP_output.vep.txt"
fullpath = os.path.join(basedir, filename)
You can’t perform that action at this time.