I hereby claim:
- I am pajp on github.
- I am pajp (https://keybase.io/pajp) on keybase.
- I have a public key whose fingerprint is DA73 AA92 1D95 1CBE CFC2 8B1E 9F2D 4844 DCA5 ACB4
To claim this, I am signing this object:
| #!/bin/bash | |
| # Script to migrate a Mastodon-exported following list to micro.blog | |
| # Generate an API key here: https://micro.blog/account/apps | |
| mbapikey=D43950049A7ECDED91E8 | |
| # Then go to your Mastodon instances data export, e.g. https://mastodon.social/settings/export | |
| # where you can download your following list in CSV format | |
| # Or use Fedifinder to generate a CSV of people you follow on Twitter with Mastodon/ActivityPub accounts: | |
| # https://fedifinder.glitch.me/ |
| ### Keybase proof | |
| I hereby claim: | |
| * I am pajp on github. | |
| * I am pajp (https://keybase.io/pajp) on keybase. | |
| * I have a public key whose fingerprint is 06BE 9349 9DBA FE81 D8DF E6BD 3659 18D4 04C2 87D3 | |
| To claim this, I am signing this object: |
| cp_dmg() { | |
| dmg="$1" | |
| file="$2" | |
| destination="$3" | |
| mountpoint=$(hdiutil attach "$dmg" -nobrowse -plist|xpath '//key[.="mount-point"]/following-sibling::*[1]' 2> /dev/null|sed -e 's/<\/*string>//g') | |
| cp "${mountpoint}/$file" "$destination" | |
| hdiutil detach -quiet "$mountpoint" | |
| } |
| ~/opensc-0.14.0$ MacOSX/build | |
| + test -x ./configure | |
| + ./configure | |
| checking for a BSD-compatible install... /usr/bin/install -c | |
| checking whether build environment is sane... yes | |
| checking for a thread-safe mkdir -p... ./install-sh -c -d | |
| checking for gawk... no | |
| checking for mawk... no | |
| checking for nawk... no | |
| checking for awk... awk |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| var lifx = require('./lifx'); | |
| var util = require('util'); | |
| var lx = lifx.init(); | |
| var expectedbulbs = 2; | |
| var target; | |
| var bulbsAtTarget = []; | |
| var startTime = new Date().getTime(); | |
| function processBulbState(address, powerstate) { | |
| var atTarget = target ? powerstate > 0 : powerstate == 0; | |
| if (atTarget) regBulbAtTarget(address); |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>InitGroups</key> | |
| <false/> | |
| <key>GroupName</key> | |
| <string>daemon</string> | |
| <key>Label</key> | |
| <string>com.f-secure.orspclient</string> |
| #!/bin/sh | |
| reportfile=/vpn-reports/`date +%Y-%m-%d`.txt | |
| echo "**** VPN report generated @ `date` ****" > $reportfile | |
| syslog -k Sender pppd \ | |
| -k Message "L2TP connection established." \ | |
| -o -k Message "L2TP disconnected" \ | |
| -o -k Sender location-awareness \ | |
| -k Time ge -7d \ |
| #!/bin/bash | |
| if [ -z "$1" ] ; then | |
| echo "Supply a URL to watch." | |
| exit 1 | |
| fi | |
| tempfile1=`mktemp -t urlwatch` | |
| tempfile2=`mktemp -t urlwatch` |