I hereby claim:
- I am mveytsman on github.
- I am mveytsman (https://keybase.io/mveytsman) on keybase.
- I have a public key whose fingerprint is 9C97 0545 A994 453D 4044 75C4 D773 5456 46C9 1E49
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/bin/bash | |
### Setup a wifi Access Point on Ubuntu 12.04 (or its derivatives). | |
### make sure that this script is executed from root | |
if [ $(whoami) != 'root' ] | |
then | |
echo " | |
This script should be executed as root or with sudo: | |
sudo $0 | |
" |
#!/usr/bin/env ruby | |
require 'thor' | |
class PhoneBookCLI < Thor | |
no_commands do | |
def wrap_errors(&block) | |
begin | |
instance_eval &block | |
rescue Exception => e | |
say "#{e.message}", :red | |
exit |
(defn sierpinsky [n] | |
(if (= 0 n) | |
["*"] | |
(let [down (sierpinsky (- n 1)) | |
space (apply str (repeat (Math/pow 2 (- n 1)) " "))] | |
(concat (map #(apply str space % space) down) | |
(map #(clojure.string/join " " (repeat 2 %)) down))))) | |
(map println (sierpinsky 4)) |
@corbanbrook can you give an example of this for twitter? I.e. here's a sample json blob i got with http://localhost:5331/twitter/search?q=soundcloud
{
"hash_id":"d518910ce01b105fb4007b1dfb254b61",
"short_url":"",
"legacy":{
"asset_type":"",
## Usage: forge_cert.rb CA.pem CA.key target.pem | |
## | |
## Generate an SSL certificate signed by a custom CA with the same | |
## subject (common name, organization name, etc..) as the target cert. | |
## This is useful when you need to man-in-the-middle an ssl connection | |
## and want to use custom certificates with an existing tool or roll | |
## your own. | |
## | |
## Certificate is written to standard out in PEM format. |
## Usage: generate_ca.rb NAME | |
## | |
## This script generates an SSL CA certificate that can be used to sign | |
## other certificates. The certificate is saved to NAME.pem, and the | |
## key is saved to NAME.key | |
require 'openssl' | |
if ARGV.length != 1 | |
puts "Usage: generate_ca.rb NAME" |
(ns expression-problem) | |
;; Shapes have area | |
(defprotocol Areable | |
(area [this])) | |
;; We have circles | |
(defrecord Circle [radius]) | |
;; Circles have area |
#!/bin/sh | |
# This is a script that checks to see if the open ports on a host are what you expect them to be. | |
# If your firewall isn't doing what it's supposed to, it will post a message to Slack to alert you. | |
# Intended to be run as a cron job. | |
# | |
# Requires nmap to be installed | |
# | |
# Invoke as | |
# ./portscanyourself example.com 80 443 | |
# To alert you if any ports other than 80 and 443 are listening on a host |
# An implementation of Pedersen Commitments. | |
# This is like tweeting out a hash of a statement you want to make but better. | |
# Why is it better? | |
# 1) If the universe of things you want to commit to is small, an attacker can just hash them to see which one you committed to. | |
# 2) I'm sure there are other nice security properties but I don't know them yet. | |
# Learning purposes only, DON'T USE THIS, I have no idea what I'm doing, etc etc |