View reassemble_arguments.sh
#!/bin/sh
## Reassemble arguments (support-most-cases implementation)
## Author: Przemyslaw Pawelczyk
ARGC=$#
argcon=
argkey=
argval=
while [ $ARGC -gt 0 ]; do
View keybase.md

Keybase proof

I hereby claim:

  • I am przemoc on github.
  • I am przemoc (https://keybase.io/przemoc) on keybase.
  • I have a public key ASAqkyJiZIDm1BPnP-S3TSYm4W206lESRnwkf1Yp1B8jwwo

To claim this, I am signing this object:

View pigz.c-msys2-mingw-w64.patch
Make pigz.c (2.3.3) compilable on MSYS2+MinGW-w64.
Based on AiZ's reverse patch posted on:
http://encode.ru/threads/1689-Google-Compress-Data-More-Densely-with-Zopfli?p=32684#post32684
--- pigz.c.bak 2016-02-03 23:33:58.896985400 +0100
+++ pigz.c 2016-02-04 00:21:44.597383100 +0100
@@ -331,6 +331,7 @@
#include <sys/stat.h> /* chmod(), stat(), fstat(), lstat(), struct stat, */
/* S_IFDIR, S_IFLNK, S_IFMT, S_IFREG */
View preferences
Package: *
Pin: release n=jessie-backports
Pin-Priority: 800
Package: *
Pin: release n=jessie-updates
Pin-Priority: 700
Package: *
Pin: release n=jessie
View 10-trackpoint.rules
### default values: sensitivity=128, speed=97
ACTION=="add", SUBSYSTEM=="input", ATTR{name}=="TPPS/2 IBM TrackPoint", ATTR{device/sensitivity}="196", ATTR{device/speed}="255"
View APK_Downgrade.md
View gist:a6a2bf05e112910be944
# [Arch] List provisions with packages providing them
# pacman-based solution
pacman -Si \
| awk '/^$/{n=""}/^Name/{n=$3}/^Provides/{if($3!="None"){for(i=3;i<=NF;i++){if(t[$i]=="")t[$i]="";t[$i]=t[$i]" "n}}}END{for(p in t)printf("%44-s :%s\n",p,t[p])}' \
| sort | less
# expac-based solution (better)
expac -S "%n %P" \
| awk 'NF>1{for(i=2;i<=NF;i++){if(t[$i]=="")t[$i]="";t[$i]=t[$i]" "$1}}END{for(p in t)printf("%44-s :%s\n",p,t[p])}' \
View download_PAssist_Std.exe.sh
#!/bin/sh
# Simple script for downloading program stored on CNET:
# - AOMEI Partition Assistant Standard
# Tested on 2013-11-17.
set -e
get_page() { curl -LsS "$1"; }
get_href() { sed '/'"$1"'/!d;s,.*<a href=",,;s,".*,,;q'; }
View calcswsa.sh
#!/bin/sh
_calcswsa()
{
echo -n "$1"'258EAFA5-E914-47DA-95CA-C5AB0DC85B11' | sha1sum | awk '{print$1}' | xxd -r -p | base64
}
if [ -t 0 -a -z "$1" ]; then
echo "usage: $0 [-] [SEC_WEBSOCKET_KEY]..."
echo
View 0001-BadRAM-for-v2.6.32.x.patch
From 5d920ec604a896cfd8419f9360f3a81adedd19eb Mon Sep 17 00:00:00 2001
From: Przemyslaw Pawelczyk <przemoc@gmail.com>
Date: Sat, 30 Jan 2010 20:57:06 +0100
Subject: [PATCH] BadRAM for v2.6.32.x
Attempt to adapt BadRAM patches to recent kernel versions. Includes
improvements and fixes(?). Were previous versions working on x86_64?
I am kernel newbie so all my below thoughts might be severly wrong.
I am not sure about correctness of x86_32 path involving highmem. It is