I hereby claim:
- I am zellyn on github.
- I am zellyn (https://keybase.io/zellyn) on keybase.
- I have a public key whose fingerprint is ED49 AABD 0E8C CCC1 18C1 CBBA B33D 7892 02A6 7C01
To claim this, I am signing this object:
Level: Jakarta | |
username: 20202e2c2d7e3a3b3d3d2b2b2a2a23234040ffffffffffffffffffffffffffff | |
password: ffffffffc2240f9312300b4f8e104d4e0eed8d110c430f43073c1bb302240c5e0f6d0b110e5e0d6d0b93f72330413fe31f533ee31e53e93f0643074308430e480f48b0120824054f0e470f48b0120824084f0858085a0e470f47b0120824074f0f553f900f04062c07850759165336901016e52b30413a401bffb1400a1d062032402580b0121028394035feb0123a245646f23f8146063832403d80b012104139500a453990bc4bf1233a5015543a902201e323324059ffb012105d32d0f0ff2e435d4e64247d93d627ce4364240e4df83fffffffffffffffffffffffffffff | |
See http://bit.ly/1lYboGC |
I hereby claim:
To claim this, I am signing this object:
[ Launch: tinkerbell ] e881ac86e0b636984bdf by zellyn
MODES | |
Modes may be absolute or symbolic. An absolute mode is an octal number constructed from the sum of one | |
or more of the following values: | |
4000 (the set-user-ID-on-execution bit) Executable files with this bit set will run with | |
effective uid set to the uid of the file owner. Directories with the set-user-id bit set | |
will force all files and sub-directories created in them to be owned by the directory | |
owner and not by the uid of the creating process, if the underlying file system supports | |
this feature: see chmod(2) and the suiddir option to mount(8). | |
2000 (the set-group-ID-on-execution bit) Executable files with this bit set will run with |
The next three fields are three characters each: owner permissions, group permissions, and other per- | |
missions. Each field has three character positions: | |
1. If r, the file is readable; if -, it is not readable. | |
2. If w, the file is writable; if -, it is not writable. | |
3. The first of the following that applies: | |
S If in the owner permissions, the file is not executable and set-user-ID mode is |
bash-3.2$ django-admin.py validate --settings=settings.com.ajc.projects.local | |
Traceback (most recent call last): | |
File "/Users/zhunter/Code/inpath/base/django/bin/django-admin.py", line 5, in ? | |
management.execute_from_command_line() | |
File "/Users/zhunter/Code/inpath/base/django/core/management/__init__.py", line 331, in execute_from_command_line | |
utility.execute() | |
File "/Users/zhunter/Code/inpath/base/django/core/management/__init__.py", line 295, in execute | |
self.fetch_command(subcommand).run_from_argv(self.argv) | |
File "/Users/zhunter/Code/inpath/base/django/core/management/__init__.py", line 244, in fetch_command | |
app_name = get_commands()[subcommand] |
Hi Zellyn, | |
I hope you're well. I'm sitting here with Laura Williams and we're trying | |
to finalize the Peachtree t-shirt voting and contest process. If we built a | |
story level page with the t-shirts/photo polls, can we block/stop folks | |
from e-mailing it or voting without first going through the registration | |
process? In other words, can we place the voting within one of the | |
registration/UR environment? If you can, please call us, we're sitting here | |
at my desk at 404-526-7614. |
(setenv "DJANGO_SETTINGS_MODULE" "settings.com.ajc.projects.local") | |
(setenv "PATH" (shell-command-to-string "source .profile ; echo -n $PATH")) | |
(setenv "PYTHONPATH" (shell-command-to-string "source .profile ; echo -n $PYTHONPATH")) |
./releases | |
./releases/dev | |
./releases/dev/apps | |
./releases/dev/apps/adminlog | |
./releases/dev/apps/adminlog/__init__.py | |
./releases/dev/apps/adminlog/models.py | |
./releases/dev/apps/adminlog/templates | |
./releases/dev/apps/adminlog/templates/adminlog | |
./releases/dev/apps/adminlog/templates/adminlog/logentry_list.html | |
./releases/dev/apps/adminlog/urls.py |
curl http://peer1-python1.ajc.com/servstats| grep nowrap | sed -e 's|.*<td nowrap>\(.*\)</td>.*|\1|' | sed -e 's/&/\&/g' | sort | uniq -c | sort -rn | head -15 |