-i
- ignore errors
-c
- continue
-t
- use video title as file name
--extract-audio
- extract audio track
*.c diff=cpp | |
*.h diff=cpp | |
*.c++ diff=cpp | |
*.h++ diff=cpp | |
*.cpp diff=cpp | |
*.hpp diff=cpp | |
*.cc diff=cpp | |
*.hh diff=cpp | |
*.cs diff=csharp | |
*.css diff=css |
def extract_values(obj, key): | |
"""Recursively pull values of specified key from nested JSON.""" | |
arr = [] | |
def extract(obj, arr, key): | |
"""Return all matching values in an object.""" | |
if isinstance(obj, dict): | |
for k, v in obj.items(): | |
if isinstance(v, (dict, list)): | |
extract(v, arr, key) |
My typical setup for a development box in VirtualBox uses two NICs. The first uses NAT to allow the box to communicate with the outside world through my host computer’s network connection. (NAT is the default, so shouldn't require any setup.) The second is a "host-only" connection that allows my host and guest to interact.
To create a host-only connection in VirtualBox, start by opening the preferences in VirtualBox. Go to the "Network" tab, and addd a Host-only Network. Modify the host-only network, and disable DHCP. Make a note of the IP address. (Feel free to set the IP address as well, if you like.)
Next, assign this host-only adapter to the virtual machine. Select the VM and press "Settings". Go to the "Network" tab, and select "Adpater 2". Enable the adapter, set it to a "Host-only Adapter", and select the adpater you created above.
From: http://www.unofficialgoogledatascience.com/2016/10/practical-advice-for-analysis-of-large.html | |
Practical advice for analysis of large, complex data sets | |
By Amir Najmi - October 31, 2016 | |
By PATRICK RILEY | |
For a number of years, I led the data science team for Google Search logs. We were often asked to make sense of confusing results, measure new phenomena from logged behavior, validate analyses done by others, and interpret metrics of user behavior. Some people seemed to be naturally good at doing this kind of high quality data analysis. These engineers and analysts were often described as “careful” and “methodical”. But what do those adjectives actually mean? What actions earn you these labels? | |
To answer those questions, I put together a document shared Google-wide which I optimistically and simply titled “Good Data Analysis.” To my surprise, this document has been read more than anything else I’ve done at Google over the last eleven years. Even four years after the last major update, I find that |
What is OSI model? | |
The OSI model (Open System Interconnection) model defines a computer networking framework to implement protocols in seven layers. A protocol in the networking terms is a kind of negotiation and rule in between two networking entities. | |
Layers of OSI model: | |
Physical layer | |
The Physical layer is also called as the Layer 1. Here are the basic functionalities of the Physical layer: | |
Responsible for electrical signals, light signal, radio signals etc. | |
Hardware layer of the OSI layer |
# Caesar cipher encoding | |
echo "THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG" | tr '[A-Z]' '[X-ZA-W]' | |
# output: QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD | |
# Caesar cipher decoding | |
echo "QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD" | tr '[X-ZA-W]' '[A-Z]' | |
# output: THE QUICK BROWN FOX JUMPS OVER THE LAZY DOG | |
# Can also be adjusted to ROT13 instead |
Taken from: http://www.cyberciti.biz/faq/create-ssh-config-file-on-linux-unix/ | |
System-wide SSH client configuration files | |
/etc/ssh/ssh_config : This files set the default configuration for all users of OpenSSH clients on that desktop/laptop and it must be readable by all users on the system. | |
User-specific SSH client configuration files | |
~/.ssh/config or $HOME/.ssh/config : This is user’s own configuration file which, overrides the settings in the global client configuration file, /etc/ssh/ssh_config. | |
~/.ssh/config file rules |
Borrowed from: http://docs.python-guide.org/en/latest/dev/virtualenvs/ | |
------------------------------------ | |
Virtual Environments | |
A Virtual Environment is a tool to keep the dependencies required by different projects in separate places, by creating virtual Python environments for them. It solves the “Project X depends on version 1.x but, Project Y needs 4.x” dilemma, and keeps your global site-packages directory clean and manageable. | |
For example, you can work on a project which requires Django 1.3 while also maintaining a project which requires Django 1.0. | |
virtualenv | |
virtualenv is a tool to create isolated Python environments. virtualenv creates a folder which contains all the necessary executables to use the packages that a Python project would need. |
Top 10 vulnerability scanners for hackers to find flaws, holes and bugs | |
Hacking is an art of finding bugs and flaws in a perfect software which will allow cyber criminals to exploit it for their own malicious gains. Hackers are mostly able to spot the flaws and bugs on their own but sometimes it is worthwhile to use a automated software to find these bugs and holes. A vulnerability scanner is such a automated software which has specifically been written to find such flaw. | |
Vulnerability Scanner is a specialised software build with a sole purpose of helping security researchers, hackers, system admins and developers to find faults in a particular software, computer system, network and servers. A hacker or security researcher is complemented in his manual testing of software or computer by using such vulnerability scanner making the hackers assessment efficient. | |
This article brings out such top 10 vulnerability scanner tools available to help hackers and security researchers in their security testing mission. |