# Check a single password interactively. | |
# Usage: ruby pwned-interactive.rb | |
require 'io/console' | |
require 'open-uri' | |
require 'digest' | |
puts "The 5-character prefix of the password's SHA-1 hash will be sent." | |
puts "For details, see https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/" | |
print 'Password (hidden): ' |
Source: https://gist.github.com/findepi/04c96f0f60dcc95329f569bb0c44a0cd .
./mvnw -T2C clean install -nsu -DskipTests -Dmaven.javadoc.skip=true -Dmaven.source.skip=true -Dair.check.skip-all=true -pl '!:trino-docs,!:trino-proxy,!:trino-verifier,!:trino-benchto-benchmarks'
docker rm -f trino; docker run --rm -it --name trino -p 8080:8080 trinodb/trino:438
We played generals.io over the weekend. It gives some solid adrenaline rushes but we are prob going to take a break from it due to that and other priorities.
Quick tips:
- Use click + WASD to queue up traversals quickly (on your own squares you can chain it multiple times)
- Cities repopulate if not fully captured, be sure to have +2 to city count (1 for wipe out, 1 for move in)
Here is what we learned as some strategies:
- In 1v1, maps are set up with generals at 2 sides (e.g. North/South, East/West, Northwest/Southeast)
You do not need a separate /boot
partition unless you have an LVM setup (used in dm-crypt setups).
Run ubiquity -b
to open the installer with the option of skipping grub installation (since we're using systemd-boot
).
When you get to the screen "Ubuntu has finished installation" choose Continue testing.
Open a Terminal.
Chroot into the new system.
namespace Analogy | |
{ | |
/// <summary> | |
/// This example shows that a library that needs access to target .NET Standard 1.3 | |
/// can only access APIs available in that .NET Standard. Even though similar the APIs exist on .NET | |
/// Framework 4.5, it implements a version of .NET Standard that isn't compatible with the library. | |
/// </summary>INetCoreApp10 | |
class Example1 | |
{ | |
public void Net45Application(INetFramework45 platform) |
{ | |
"sort": ["_doc"], | |
"size": 100, | |
"query": { | |
"bool": { | |
"must": { | |
"match_all": {} | |
}, | |
"filter": { | |
... |
Hacker News "hidden" URLs
Many of HN URLs are not easily discoverable as there are no links to them in a prominent part on the page, or sometimes even nowhere. The following is a list of links to standard and "special" HN pages. The ones is bold are the less discoverable ones.
See also: https://github.com/minimaxir/hacker-news-undocumented
#!/bin/bash | |
# i3 thread: https://faq.i3wm.org/question/150/how-to-launch-a-terminal-from-here/?answer=152#post-id-152 | |
# Inspired by https://gist.github.com/viking/5851049 but with support for tmux | |
CWD='' | |
# Get window ID | |
ID=$(xdpyinfo | grep focus | cut -f4 -d " ") | |
# Get PID of process whose window this is |
#!/bin/sh | |
# | |
# example usage: | |
# xautolock -locker /full/path/to/screenlock.sh -corners 00-+ -detectsleep | |
# | |
# depends on xssstate which is part of suckless-tools: | |
# http://tools.suckless.org/ or | |
# apt-get suckless-tools on debian | |
# |