#include<stdio.h> | |
#include<stdlib.h> | |
#include<string.h> | |
/* | |
* uwufiew, weceives inpuwut fwom standawt inpuwut ow fiwes and concatenates a | |
* uwufiewd vewsion to the standawt ouwutpuwut. | |
* | |
* fwee softwawe, wincesed uwundew the MIT wicense, youwu shouwuwd have | |
* weceived a copy of the wicense awong with the pwogwam. |
module github.com/brandur/prequire | |
go 1.19 | |
require github.com/stretchr/testify v1.8.1 | |
require ( | |
github.com/davecgh/go-spew v1.1.1 // indirect | |
github.com/pmezard/go-difflib v1.0.0 // indirect | |
gopkg.in/yaml.v3 v3.0.1 // indirect |
(EDIT: Besides Reddit, I've also put this up on Github Gist)
So while looking for information on security keys before getting one myself, I got very confused reading about all the different modes and advertised features of Yubikeys and other similar dongles. The official documentation tends to be surprisingly convoluted at times, weirdly organized and oddly shy about a few of the limitations of these keys (which I'm making a point of putting front and center). Now that I have one, I decided to write down everything I figured out in order to help myself (and hopefully some other people reading this) make sense of all this.
Since I'm partly writing these notes for myself, there might be some back and forth between "exp
[buildPlans.kg] # <kg> is your plan name | |
family = "Iosevka KG Terminal" # Font menu family name | |
design = [ | |
"cv08", "cv11", "cv19", "cv43", "cv49", "cv55", "cv62", "cv92", | |
# `g`, `l`, `y`, `G`, `Q`, `*`, `$` and `%` | |
"no-ligation" | |
] # Customize styles | |
hintParams = ["-a", "sss"] # Optional custom parameters for ttfautohint | |
################################################################################## | |
# ELIMINATE SPOTIFY ADS (VERSION 1.2 - 8.5) - ABANDONED FOR NOW # | |
################################################################################## | |
# | |
# NOTE: SOMETIMES ONLY ANNOUNCEMENT OF AN AD WHILE USING APP VERSION 7.5-7.9?-8.x. | |
# USING AN OFFICIAL OLDER VERSION SOLVES THIS. TEST IT (APKMIRROR). THIS WILL NOT | |
# OCCUR USING CHROMECAST / GOOGLE HOME. | |
# | |
# COULD NOT SOLVE THE AUDIO AD INRO/OUTRO IN THE APP. | |
# SUGGESTIONS? WRITE A COMMENT BELOW. |
The following are examples of the four types rate limiters discussed in the accompanying blog post. In the examples below I've used pseudocode-like Ruby, so if you're unfamiliar with Ruby you should be able to easily translate this approach to other languages. Complete examples in Ruby are also provided later in this gist.
In most cases you'll want all these examples to be classes, but I've used simple functions here to keep the code samples brief.
This uses a basic token bucket algorithm and relies on the fact that Redis scripts execute atomically. No other operations can run between fetching the count and writing the new count.
- How to Build a Successful Information Security Career (Daniel Miessler)
- The First Steps to a Career in Information Security (Errata Security - Marisa Fagan)
- Hiring your first Security Professional (Peerlyst - Dawid Balut)
- How to Start a Career in Cyber security
- How to Get Into Information Security (ISC^2)
- https://www.isc2.org/how-to-get-into-information-security.aspx