I hereby claim:
- I am rfk on github.
- I am rfkelly (https://keybase.io/rfkelly) on keybase.
- I have a public key whose fingerprint is E071 C568 AFF3 039C 47A1 EDC7 21CC 6BCE C81C 03C9
To claim this, I am signing this object:
# | |
# This is a little script to populate Firefox Sync with | |
# fake password records. Use it like so: | |
# | |
# $> pip install PyFxA syncclient cryptography | |
# $> python ./upload_fake_passwords.py 20 | |
# | |
# It will prompt for your Firefox Account email address and | |
# password, generate and upload 20 fake password records, then | |
# sync down and print all password records stored in sync. |
MariaDB [weave0]> EXPLAIN SELECT * FROM bso0 WHERE ttl < (UNIX_TIMESTAMP() - 1000) ORDER BY ttl LIMIT 10000; | |
+------+-------------+-------+-------+---------------+-------------+---------+------+------+-------------+ | |
| id | select_type | table | type | possible_keys | key | key_len | ref | rows | Extra | | |
+------+-------------+-------+-------+---------------+-------------+---------+------+------+-------------+ | |
| 1 | SIMPLE | bso0 | range | bso_ttl_idx | bso_ttl_idx | 4 | NULL | 5 | Using where | | |
+------+-------------+-------+-------+---------------+-------------+---------+------+------+-------------+ | |
1 row in set (0.00 sec) | |
MariaDB [weave0]> | |
MariaDB [weave0]> EXPLAIN SELECT * FROM batch_upload_items0 WHERE batch < (UNIX_TIMESTAMP() - 1000) * 1000 ORDER BY batch LIMIT 100000; |
I hereby claim:
To claim this, I am signing this object:
import sys | |
import base64 | |
import getpass | |
import hashlib | |
import urllib2 | |
import optparse | |
import requests | |
import sys | |
import base64 | |
import getpass | |
import hashlib | |
import urllib2 | |
import optparse | |
import requests |
/* | |
* A silly little test program involving switches, loops, and gotos. | |
* It's designed to emulate the kind of spaghetti-goto code produced by | |
* PyPy for its bytecode interpretation loop. | |
* | |
* This program takes a string as command-line argument, counts the number | |
* of zeros in the string, checks for the presence of the digits 1 through 4, | |
* and prints its findings to stdout. Example: | |
* | |
* $> js test_degenerate_switch.js 00203 |
/* | |
* A silly little test program involving switches, loops, and gotos. | |
* It's designed to emulate the kind of spaghetti-goto code produced by | |
* PyPy for its bytecode interpretation loop. | |
* | |
* This program takes a string as command-line argument, counts the number | |
* of zeros in the string, checks for the presence of the digits 1 through 4, | |
* and prints its findings to stdout. Example: | |
* | |
* $> js test_degenerate_switch.js 00203 |
# Each application has some credentials identifing it | |
# as an authorized application. They are the same for | |
# all requests. | |
store = Sauropod("https://sauropod.mozilla.com", | |
"MY APPLICATION ID", | |
"MY APPLICATION PRIVATE KEY") | |
# You always interact with the store as a particular user. | |
# Provide credentials to start a session. | |
# They might be a BrowserID, a "super-credential", whatever. |
import time | |
import os | |
import cPickle as pickle | |
import cjson | |
import ujson | |
import tnetstring | |
cjson.dumps = cjson.encode | |
cjson.loads = cjson.decode |