JSConf.eu opening song - JavaScript Will Listen - Bella Morningstar
- Plask - Dean McNamee
- Plask
#!/usr/bin/env ruby | |
require 'ftools' | |
require 'fileutils' | |
require 'rubygems' | |
require 'RMagick' | |
include Magick | |
require 'open3' | |
def merge( files = [] ) |
This is a follow-up to this discussion: Can NAT traversal be Tor's killer feature?
If torrents are P2P's killer application, and NAT traversal/"static IP" are Tor's (via hidden services), putting them together could prove to be the best incentivization scheme for growing the Tor network other than cold crypto cash.
Everybody knows you're not supposed to use torrents with tor, right?
// UPDATE: For latest code, see https://github.com/cstrahan/Showdown.as | |
// | |
// Showdown.as -- An ActionScript port of showdown.js | |
// | |
// Copyright (c) 2010 Charles Strahan. | |
// | |
// Original Showdown Copyright (c) 2007 John Fraser. | |
// <http://attacklab.net/showdown/> | |
// | |
// Original Markdown Copyright (c) 2004-2005 John Gruber |
<?php | |
$errorLevel = error_reporting(); | |
print "Current error_reporting level: $errorLevel <br>\n"; | |
print "E_ALL value: " . E_ALL . " <br>\n"; | |
for ($i = 0; $i < 15; $i++) { | |
$errVal = $errLevel & pow(2, $i); | |
print FriendlyErrorType($errVal) . " ($errVal) <br>\n"; | |
} |
import haxe.macro.Context; | |
import haxe.macro.Expr; | |
using haxe.macro.ExprTools; | |
class Main | |
{ | |
inline static var QUOTED_FIELD_PREFIX = "@$__hx__"; | |
static function main() |
.shape{ | |
height: 100%; | |
width: 100%; | |
} | |
.circle { | |
border-radius: 50%/50%; | |
-moz-border-radius: 50%/50%; | |
-webkit-border-radius: 50%/50%; | |
} | |
.hide { |
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1/jquery.min.js"></script> | |
<script type="text/javascript" charset="utf-8"> | |
$(window).load(function(){ | |
$().hatchShow(); | |
}); | |
jQuery.fn.hatchShow = function(){ | |
$('.hsjs').css('display','inner-block').css('white-space','pre').each(function(){ | |
var t = $(this); | |
t.wrap("<span class='hatchshow_temp' style='display:block'>"); | |
var pw = t.parent().width(); |
// based on http://msdn.microsoft.com/en-us/magazine/hh335067.aspx | |
// usage example at bottom | |
function pso (number_of_dimensions, function_to_optimize, number_of_particles, number_of_iterations, fitness_threshold, inertia_weight, cognitive_weight, social_weight) { | |
var particles = []; | |
var swarm_best_position = []; | |
var swarm_best_fitness = null; | |
for (var p = 0; p < number_of_particles; p++) { | |
particles.push({ | |
particle_position: [], |
<?php | |
// Licence: WTFPL ! http://www.wtfpl.net/about/ | |
$fbAuth = array("facebook_id" => "123456789", "facebook_token" => "<Use charles proxy to do man-in-middle SSL sniffing and extract fb token>"); | |
// Do the magic. | |
$tinderToken = tinderCall("auth", "token", $fbAuth); // Authenticate | |
$authToken = "X-Auth-Token: $tinderToken\r\nAuthorization: Token token=\"$tinderToken\"\r\n"; |