I hereby claim:
- I am elementalvoid on github.
- I am elementalvoid (https://keybase.io/elementalvoid) on keybase.
- I have a public key ASAC5MizJD7H1vf37_WZkXoe2wiloQqQvqy_0flxnGjmdwo To claim this, I am signing this object:
{
"body": {
"key": {
import docker | |
client = docker.Client(base_url='unix://var/run/docker.sock', version='1.11', timeout=10) | |
client.pull('busybox', tag='latest') | |
container = client.create_container('busybox:latest', volumes=['/var/run/docker.sock']) | |
# This fails. It's based on https://github.com/dotcloud/docker-py#using-volumes | |
client.start(container, binds={'/var/run/docker.sock': {'bind': '/var/run/docker.sock', 'ro': False}}) |
LoadPlugin postgresql | |
<Plugin postgresql> | |
<Query bgwriter> | |
Statement "SELECT checkpoints_timed, checkpoints_req, \ | |
buffers_checkpoint, buffers_clean, maxwritten_clean, \ | |
buffers_backend, buffers_alloc \ | |
FROM pg_stat_bgwriter" | |
<Result> |
1 11 11 111 | |
00000000100001 100000 1000001 0001 0 | |
1 0011 00 11101 0011100 0011100 11 0 0 | |
0 10 01 0 101 0 101 101 0 | |
01 00 101 01 101 01 101 01 0 | |
01 00 101 01 101 01 101 101 10 | |
01 00 101 01 101 01 10 101 00 | |
101 00 101 01 101 01 101 101 100 | |
01 00 101 01 101 01 101 101 1101 | |
101 00 101 01 101 01 10 1011001 01 |
import javax.net.ssl.SSLSocket; | |
import javax.net.ssl.SSLSocketFactory; | |
import java.io.*; | |
/** Establish a SSL connection to a host and port, writes a byte and | |
* prints the response. See | |
* http://confluence.atlassian.com/display/JIRA/Connecting+to+SSL+services | |
*/ | |
public class SSLPoke { | |
public static void main(String[] args) { |
#!/bin/bash | |
if [[ $# -lt 1 ]]; then | |
echo "usage: $(basename ${0}) <gateway>" | |
exit 1 | |
fi | |
gateway=${1} | |
shift |
#!/usr/bin/env python | |
import sys | |
import time | |
import signal | |
from optparse import OptionParser | |
from multiprocessing import Pool | |
from subprocess import Popen, PIPE | |
class TimeoutException(Exception): | |
pass |
#!/bin/bash | |
if (( $# != 3 )); then | |
echo "Usage: $(basename $0) <username> <db-host> <db-name>" | |
exit 1 | |
fi | |
PSQL_USER=${1} | |
PSQL_HOST=${2} | |
PSQL_DB=${3} |
I hereby claim:
{
"body": {
"key": {
# Uses the range check to avoid sending your actual password and then checks the returned list locally. | |
p0wned () { | |
read -s 'pass?Enter password: ' | |
echo | |
sum=$(echo -n "$pass" | sha1sum | cut -c1-40) | |
short=$(echo -n $sum | cut -c1-5) | |
remain=$(echo -n $sum | cut -c6-40) | |
curl -s https://api.pwnedpasswords.com/range/${short} | grep -i ${remain} | |
} |
#!/bin/bash | |
wget -O assistme.dat http://control.d-imaging.sony.co.jp/GPS/assistme.dat | |
wget -O assistme.md5 http://control.d-imaging.sony.co.jp/GPS/assistme.md5 | |
checksum=$(md5sum assistme.dat | awk '{print $1}') | |
sony_checksum=$(cat assistme.md5 | awk '{print $1}') | |
if [[ ${checksum} == ${sony_checksum} ]]; then | |
echo "Okay: Checksums match." | |
echo "Place files in: <sdcard>/PRIVATE/SONY/GPS/ | |
else | |
echo "Warning: Checksums do not match!" |