This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nobody should start to undertake a large project. You start with a small trivial project, and you should never expect it to get large. If you do, you’ll just overdesign and generally think it is more important than it likely is at that stage. Or worse, you might be scared away by the sheer size of the work you envision. So start small, and think about the details. Don’t think about some big picture and fancy design. If it doesn’t solve some fairly immediate need, it’s almost certainly over-designed. And don’t expect people to jump in and help you. That’s not how these things work. You need to get something half-way useful first, and then others will say “hey, that almost works for me”, and they’ll get involved in the project. | |
— Linus Torvalds | |
====================================================== | |
Code never lies, comments sometimes do. | |
— Ron Jeffries |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
What should I do to be a Data Scientist? | |
Written By Armen K. | |
Borrowed from: http://www.datasciencebowl.com/lp/national-data-science-bowl/blog | |
I’m often asked “what are good things to do to get involved with data science?” In this post I’ll share with you some key activities you can get started with today. | |
Whether it is photos on phones, links in a social network, or information around health, our society has an increased appreciation and enthusiasm about data. It’s an exciting time as open data initiatives are met with open software tools that enable large-scale analysis. To actually get insight from data requires intellectual curiosity and a mix of skills and knowledge. | |
Learn more math: | |
Being able to formalize different relationships in data enables you to identify potentially useful features. Statistics plays an important role for testing whether candidate relationships are salient or spurious. Datasets are often high-dimensional and are increasingly large. The ability to think of subspaces and projecti |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Borrowed from: http://www.unix-ninja.com/p/A_cheat-sheet_for_password_crackers | |
In this article I am going to share some bash scripting commands and regular expressions which I find useful in password cracking. Most of the time, we find hashes to crack via shared pastes websites (the most popular of them being Pastebin.) Isolating the hashes by hand can be a time consuming process; for that reason we are going to use regular expressions to make our life easier! | |
Extract md5 hashes | |
# egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{32}(1|$)' *.txt | egrep -o '[a-fA-F0-9]{32}' > md5-hashes.txt | |
An alternative could be with sed | |
# sed -rn 's/.*[^a-fA-F0-9]([a-fA-F0-9]{32})[^a-fA-F0-9].*/1/p' *.txt > md5-hashes |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Top 15 Security Tools and Utilities | |
1. Nmap | |
Nmap is a free open source utility for security auditing and network exploration. Nmap("Network Mapper") was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services(application name and version) those hosts are offering, what operating systems(and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap is a very versatile tool, once you fully understand the results. Nmap runs on most types of computers and both console and graphical version are available. Nmap is free and open source | |
Nmap can be used by beginners(-sT) or by pros alike(-packet_trace). | |
Nmap available for download here: http://www.insecure.org/nmap/download.html |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://www.datatau.com/ - hacker news clone centered around big data, data science and data analysis | |
https://www.udacity.com/course/st095 - Statistics: The Science Of Decisions | |
https://www.udacity.com/course/progress#!/c-cs101 - Intro To Computer Science | |
https://www.udacity.com/wiki/ud032 - Data Wrangling With MongoDB | |
https://www.edx.org/course/introduction-computer-science-harvardx-cs50x (currently taking) | |
Data Science Learning Links: | |
http://nborwankar.github.io/LearnDataScience/ | |
https://www.kaggle.com/wiki/Tutorials |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~% FILE="example.tar.gz" | |
~% echo "${FILE%%.*}" | |
example | |
~% echo "${FILE%.*}" | |
example.tar | |
~% echo "${FILE#*.}" | |
tar.gz | |
~% echo "${FILE##*.}" | |
gz |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
effective. Power لُلُصّبُلُلصّبُررً ॣ ॣh ॣ ॣ 冗 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
NAME=Phil Tysoe | |
EMAIL=philtysoe@example.com | |
SUBLIME_TEXT_2_DOWNLOAD_URL=http://c758482.r82.cf2.rackcdn.com/Sublime%20Text%202.0.1%20x64.tar.bz2 | |
ECLIPSE_DOWNLOAD_URL=http://www.mirrorservice.org/sites/download.eclipse.org/eclipseMirror/eclipse/downloads/drops4/R-4.2.2-201302041200/eclipse-SDK-4.2.2-linux-gtk-x86_64.tar.gz | |
# setup ssh key | |
ssh-keygen -t rsa -C "${EMAIL}" | |
cat ~/.ssh/id_rsa.pub |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#simple class | |
class Person | |
end | |
#inheritance | |
class Sarah < Person | |
end | |
#class with constructor arguments | |
class Jet |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#color and git branch | |
parse_git_branch() {·· | |
git branch 2> /dev/null | sed -e '/^[^*]/d' -e 's/* \(.*\)/(\1)/' | |
} | |
export CLICOLOR=1 | |
export GREP_OPTIONS="--color" | |
export LSCOLORS=gxfxcxdxbxegedabagacad | |
PS1='\n\[\e[1;36m\]\w \[\e[m\]\[\e[1;33m\]$(parse_git_branch)\[\e[m\] \n> ' |
OlderNewer