This gist was moved to its own repository: https://github.com/aguslr/multibootusb
import requests | |
class HoverException(Exception): | |
pass | |
class HoverAPI(object): | |
def __init__(self, username, password): | |
params = {"username": username, "password": password} | |
r = requests.post("https://www.hover.com/api/login", params=params) |
// Just before switching jobs: | |
// Add one of these. | |
// Preferably into the same commit where you do a large merge. | |
// | |
// This started as a tweet with a joke of "C++ pro-tip: #define private public", | |
// and then it quickly escalated into more and more evil suggestions. | |
// I've tried to capture interesting suggestions here. | |
// | |
// Contributors: @r2d2rigo, @joeldevahl, @msinilo, @_Humus_, | |
// @YuriyODonnell, @rygorous, @cmuratori, @mike_acton, @grumpygiant, |
To install tcptraceroute on Debian/Ubuntu:
$ sudo apt-get install tcptraceroute
To install tcptraceroute on CentOS/REHL, first set up RepoForge on your system, and then:
$ sudo yum install tcptraceroute
This is a supplement to the official Phabricator Installation Guide, because their guide will leave you with all kinds of permission and config errors and ~15,000 setup issues on startup.
# apt-get install mercurial subversion python-pygments sendmail imagemagick
This is a comment by Shane Wilton in this post from HH Information Security.
Start with MicroCorruption to familiarize yourself with reverse engineering and exploit development. It's ~18 challenges, entirely on the website, that task you with reverse engineering MSP-430 programs, and developing exploits against them.
From there, Pwnable.kr has another few dozen exploitation challenges. These are more real-world, but ramp up in difficulty quickly. The first block should be doable by anyone with Linux experience though.
If you're starting from the very beginning, keep Hacking: The Art of Exploitation nearby. It's a very good primer for all of this stuff. Once you work your way through that, [TAOCP](http://www.amazon.com/T
<config> | |
<!-- See sample config: /usr/share/doc/fahclient/sample-config.xml --> | |
<!-- Client Control | |
Don't fold anonymously, provide user info. --> | |
<fold-anon v='false'/> | |
<!-- Folding Slot Configuration --> | |
<gpu v='true'/> <!-- If true, attempt to autoconfigure GPUs --> |
# Original : http://en.community.dell.com/support-forums/servers/f/956/t/18394689 | |
# Archive : http://archive.is/8LkJs | |
I was also facing this issue, but had to jump some more hurdles: | |
- In the Java Control Panel, add https://<server IP/hostname> to the exception site list. (not related to this issue, but needs to be done though) | |
- In the Advanced tab (this is on windows) enable the console, so I could check what java version was being used. (I have 5 versions installed) | |
- Edit the mentioned java.security for the correct version, but, I had to make an additional change. I also had to alter the "jdk.certpath.disabledAlgorithms" parameter, and remove MD5 there. Hence, enable MD5 support. |