Discover Gists

View trianglify_background.js
1
gsettings set org.gnome.desktop.background picture-uri file:///home/visgean/.trianglify_background.svg
View addClasstoRows
1 2 3 4 5 6 7 8 9 10
$('#report_dept10 .uReportStandard tBody tr:not(:first)').each(
function(){
$(this).addClass( "emp ui-widget-content" );
var idVal = $(this).find('td[headers="EMPNO"]').html();
$(this).first('td').attr("id",idVal);
}
)
$('#report_dept20 .uReportStandard tBody tr:not(:first)').each(
function(){
$(this).addClass( "emp ui-widget-content" );
View 0_reuse_code.js
1 2
// Use Gists to store code you would like to remember later on
console.log(window); // log the "window" object to the console
View bs: tab layout
1 2 3 4 5 6 7 8 9 10
<div class="container">
<div class="row clearfix">
<div class="col-md-12 column">
<div class="tabbable" id="tabs-347287">
<ul class="nav nav-tabs">
<li class="active">
<a href="#panel-947812" data-toggle="tab">Section 1</a>
</li>
<li>
<a href="#panel-240432" data-toggle="tab">Section 2</a>
View hb-test.py
1 2 3 4 5 6 7 8 9 10
#!/usr/bin/env python2
"""
Author: takeshix <takeshix@adversec.com>
PoC code for CVE-2014-0160. Original PoC by Jared Stafford (jspenguin@jspenguin.org).
 
Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP.
"""
 
import sys,struct,socket
from argparse import ArgumentParser
View search_read_parse.cpp
1 2 3 4 5 6 7 8
#include <iostream>
#include <fstream>
#include <algorithm>
#include <string>
#include <set>
#include <regex>
#include <boost\filesystem.hpp>
#include "pystring.h"
View timing.php
1 2 3 4 5 6 7 8 9
<?php
 
// http://stackoverflow.com/questions/17035859/how-to-find-php-execution-time
 
sleep(1);
$time = microtime(true) - $_SERVER["REQUEST_TIME_FLOAT"];
echo "Process Time: {$time}";
 
// Process Time: 1.0061590671539
View gist:10847077

Wow. I've now read the whole book and much of the supporting code. I'm not a fan, and recommend against relying on it. Here's a laundry list of concerns:

  • The teaching method the book uses is badly flawed. The book's strategy is to start simple and build to complexity, which makes sense if you're teaching algebra but not if you're teaching heart surgery. The result is that each chapter culminates with the implementation of a system that is grievously insecure. Little warning is given of this, apart from allusions to future chapters improving the system. For instance, Chapter 2 closes with a chat system that uses AES-CBC without an authenticator.

  • The book is full of idiosyncratic recommendations. For instance, AES-CBC requires a padding scheme. There is a standard padding scheme. The book purports to present it, but instead of PKCS7, it presents 80h+00h..00h.

  • At one point about 1/3rd of the way through the book, it suggests using a SHA256 hash of the plaintext as an authenticator for a message. Thi

View keybase.md

Keybase proof

I hereby claim:

  • I am tazjin on github.
  • I am tazjin (https://keybase.io/tazjin) on keybase.
  • I have a public key whose fingerprint is DCF3 4CFA C1AC 44B8 7E26 3331 36EE 3481 4F6D 294A To claim this, I am signing this object:
{
    "body": {
        "key": {
View dropbox-setup-client.sh
1 2 3 4 5 6 7 8 9 10
#!/bin/bash
client=${1:-Untitled Client}
 
mkdir -v "$client"
 
mkdir -v "$client/Assets"
mkdir -v "$client/Assets/Fonts"
mkdir -v "$client/Assets/Logos"
mkdir -v "$client/Assets/Photos"
mkdir -v "$client/Assets/Videos"
Something went wrong with that request. Please try again.