I hereby claim:
- I am elidickinson on github.
- I am esd (https://keybase.io/esd) on keybase.
- I have a public key whose fingerprint is 6884 A79C 69EC C924 961C 95B9 2CEB 89F6 30BC 7837
To claim this, I am signing this object:
# What 8 letter word can have a letter taken away, and each time still make another word, until only one letter (and one word) are left? | |
words_by_length = [set(), set(), set(), set(), set(), set(), set(), set(), set()] | |
with open('scrabble2019.txt') as f: | |
for w in f: | |
word = w.strip() | |
word_len = len(word) | |
if word_len <= 8: | |
words_by_length[word_len].add(word) | |
answers = set() |
var x = $(".gb-domain-name").each(function(i,x) { console.log($(x,"span").text())}); window.scrollBy(0,600) |
I hereby claim:
To claim this, I am signing this object:
import dns.resolver | |
import csv | |
import re | |
import sys | |
domain_cache = {} | |
def test_email_domain(domain): | |
if domain is None: | |
return False |
To check if the system is vulnerable: | |
env x='() { :;}; echo vulnerable' bash -c /bin/bash | |
returns 'vulnerable' |
{ | |
"cmd": ["sass", "--update", "$file:${file_path}/${file_base_name}.css", "--no-cache", "--style", "compact"], | |
"selector": "source.sass, source.scss", | |
"file_regex": "error (/.*.scss) .Line ([0-9]+):", | |
"osx": { | |
"path": "/usr/local/var/rbenv/shims/:/usr/local/bin:$PATH" | |
}, | |
"windows": { | |
"shell": "true" | |
} |
--- MySQL-python-1.2.3/setup_posix.py 2010-06-17 09:21:56.000000000 +0200 | |
+++ MySQL-python-1.2.3-patched/setup_posix.py 2013-11-12 13:05:44.028407794 +0100 | |
@@ -85,6 +85,7 @@ | |
] | |
create_release_file(metadata) | |
del metadata['version_info'] | |
+ libraries.append('stdc++') | |
ext_options = dict( | |
name = "_mysql", | |
library_dirs = library_dirs, |
// utmstrip.js strips utm_* strings from the URL bar of your site, but afer Google Analytics | |
// has had a chance to grab them. Based on Paul Irish's utm-stripping user script. | |
// | |
// Source: https://gist.github.com/elidickinson/9128677 | |
// | |
// Install Notes: | |
// - This script should run *after* you have added all your "_trackPageview" or "_trackEvent" | |
// calls to the _gaq variable. | |
// - It doesn't matter of Google Analtyics has actually finished loading yet, but if you | |
// you tell it to strip the utm_* strings before _trackPageview sees them, it won't know |
// ==UserScript== | |
// @name UTM param stripper | |
// @author Paul Irish | |
// @namespace http://github.com/paulirish | |
// @version 1.1 | |
// @description Drop the UTM params from a URL when the page loads. | |
// @extra Cuz you know they're all ugly n shit. | |
// @include http://* | |
// ==/UserScript== |