Skip to content

Instantly share code, notes, and snippets.

View magicgoose's full-sized avatar

magicgoose magicgoose

View GitHub Profile
@mihawk90
mihawk90 / breeze_dark.reg
Created June 20, 2018 00:37
Breeze Dark theme for Wine
[Control Panel\\Colors] 1491939580
#time=1d2b2fb5c69191c
"ActiveBorder"="49 54 58"
"ActiveTitle"="49 54 58"
"AppWorkSpace"="60 64 72"
"Background"="49 54 58"
"ButtonAlternativeFace"="200 0 0"
"ButtonDkShadow"="154 154 154"
"ButtonFace"="49 54 58"
"ButtonHilight"="119 126 140"
@haasn
haasn / image.lua
Last active March 11, 2024 06:57
mvi - set of configuration for turning mpv into an image viewer
-- Allow changing a property with by zoom-adjusted amount
function zoom_invariant_add(prop, amt)
amt = amt / 2 ^ mp.get_property_number("video-zoom")
mp.set_property_number(prop, mp.get_property_number(prop) + amt)
end
-- Resets the pan if the entire image would be visible
function zoom_check_center()
local zoom = mp.get_property_number("video-zoom")
local rot = mp.get_property_number("video-rotate") * math.pi / 180

##by CptEric

ingredients :

saffron, sweet pepper powder, sweet peppers ( to cut, slice and fry ) , 1 to 2 garlic heads, if you want to ( not forcibly required ) white onions to fry, 4 to 6 tomatoes ( to fry as sauce ), sugar ( to avoid the fried tomatoes to become acid), salt, if you want to ( not forcibly required ) garlic and parsley, and , i don't use it ( saffron does it anyway ) but looks prettier, yellow food coloring (else it will look orange instead of yellow, not a big deal).

rice type:

@sonicdoe
sonicdoe / README.md
Last active April 21, 2020 15:25 — forked from scy/README.md

My OS X “VPN only” Setup For #30C3

You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.

Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.

If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.

Target audience