I hereby claim:
- I am tsoporan on github.
- I am tsoporan (https://keybase.io/tsoporan) on keybase.
- I have a public key whose fingerprint is 2E39 C429 B8F1 D981 580D 6F93 FD72 DF01 B567 0D34
To claim this, I am signing this object:
import urllib2,re | |
def url_title(url,**kwargs): | |
request = urllib2.Request(url) | |
try: | |
data = urllib2.urlopen(request) | |
except urllib2.HTTPError: | |
data = None | |
except urllib2.URLError: | |
data = None |
from tasks import task1 | |
def get_results(queries): | |
query_procs = task1.delay(queries).get() | |
tasks = [] | |
for query_proc in query_procs: | |
tasks.extend(query_proc.subtasks) | |
while tasks: | |
current_task = tasks.pop(0) |
from nltk.probability import DictionaryProbDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', | |
'I win at everything and I want to love people' : 'pos', |
from nltk.probability import DictionaryProbDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', | |
'I win at everything and I want to love people' : 'pos', |
from nltk.probability import DictionaryProbDist, ELEProbDist, FreqDist | |
from nltk import NaiveBayesClassifier | |
from nltk import FreqDist, ConditionalFreqDist | |
from nltk import BigramAssocMeasures | |
from collections import defaultdict | |
train_samples = { | |
'I hate you and you are a bad person': 'neg', | |
'I love you and you are a good person': 'pos', | |
'I fail at everything and I want to kill people' : 'neg', |
from flask import Flask, request, redirect, url_for | |
from rauth.service import OAuth1Service | |
twitter = OAuth1Service( | |
name='twitter', | |
consumer_key='TWITTER KEY', | |
consumer_secret='TWITTER SECRET', | |
request_token_url = 'https://api.twitter.com/oauth/request_token', | |
access_token_url = 'https://api.twitter.com/oauth/access_token', | |
authorize_url = 'https://api.twitter.com/oauth/authorize', |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.
Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.
You will find most of this information pulled from the Arch Wiki and other resources linked thereof.
Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX
with /dev/sdX
or your device as needed.