I hereby claim:
- I am mkaminsky11 on github.
- I am mkaminsky11 (https://keybase.io/mkaminsky11) on keybase.
- I have a public key whose fingerprint is 20A2 301D FA26 B5B7 AE4D A988 40C9 5C6A BCA8 4724
To claim this, I am signing this object:
[global_config] | |
title_transmit_bg_color = "#0076c9" | |
[keybindings] | |
[layouts] | |
[[default]] | |
[[[child1]]] | |
parent = window0 | |
type = Terminal | |
[[[window0]]] | |
parent = "" |
#!/bin/sh | |
# so, by default, monitoring and injection cannot be used with Broadcom wl wifi drivers (such as those for Macs) | |
# this makes it impossible to do stuff like crack wifi passwords with aircrack-ng | |
# fortunately, there is a solution burried in https://www.broadcom.com/docs/linux_sta/README.txt | |
echo 1 > /proc/brcm_monitor0 #enables monitor mode. That's it! | |
# prism0 is now like "mon0" (monitor mode) |
I hereby claim:
To claim this, I am signing this object:
$(window).bind('contextmenu', function(e) { | |
// do stuff here instead of normal context menu | |
if(!yes_context){ | |
return false; | |
} | |
}); | |
function getHint(){ | |
editor.execCommand("startAutocomplete"); | |
yes_context = false; //this temporarily disables the context menu | |
} |
/* | |
Download a file | |
*/ | |
function downloadFile(fileId) { | |
var request = gapi.client.drive.files.get({ | |
'fileId': fileId | |
}); | |
request.execute(function(resp) { | |
window.location.assign(resp.webContentLink); | |
}); |