http://www.meetup.com/SFRails/events/226877233/ hosted by fastly.com
Sherif Abushadi http://bit.ly/sf-ror-20160119
Feature: Evaluate responses to various HTTP methods. | |
Background: | |
Given "curl" is installed | |
And the following profile: | |
| name | value | | |
| hostname | google.com | | |
Scenario Outline: Verify server responds correctly to various HTTP methods | |
When I launch a "curl" attack with: |
Feature: Evaluate responses to various HTTP methods. | |
Background: | |
Given "curl" is installed | |
And the following profile: | |
| name | value | | |
<% payload.each do |key, value| %> | |
<%= "| hostname | #{value} |" %> | |
<% end %> |
require_relative 'bundle/bundler/setup' | |
require 'json' | |
require 'iron_worker' | |
require 'erb' | |
# Load data | |
attack_file = File.new('./verbs.erb', 'r').read | |
payload = IronWorker.payload | |
# Build the .attack file using payload data |
package main | |
import "fmt" | |
func zeroval(ival int) { | |
ival = 0 | |
fmt.Println("ival:", ival) | |
} | |
func zeroptr(iptr *int) { |
package main | |
import ( | |
"fmt" | |
"math" | |
) | |
func main() { | |
for n := 1; n <= 10; n++ { | |
leibnizNum := math.Pow(-1, float64(n)) / float64(2 * n + 1) |
#!/usr/bin/env node | |
var validate = require('data-validate'); | |
var valid = validate.len(8) | |
.isEmail() | |
.notContains('+') | |
('pam@example.com') | |
var invalid = validate.len(8) | |
.isEmail() | |
.notContains('+') |
http://www.meetup.com/SFRails/events/226877233/ hosted by fastly.com
Sherif Abushadi http://bit.ly/sf-ror-20160119
##Headlines ###Parse 2.0 Parse:
2.0:
Parse 1.3
would not work. Not enough oomf to the change.package main | |
import ( | |
"fmt" | |
"math" | |
"math/big" | |
//"github.com/iron-io/iron_go/worker" | |
) |
package main | |
import ( | |
"fmt" | |
"math" | |
"math/big" | |
"github.com/iron-io/iron_go/worker" | |
) | |
func CalcNumerator(num int) int64 { |