a NON linear C by C.
typically I export all required variables. will list all vars and set tool resource list in near future.
Thank you,
#!/bin/bash | |
# free time plus a need to build a screensaver in bash, enjoy the cascade. | |
# ps. the key to this is the "eval" function. | |
# - gary | |
# clear the screen and hide the cursor | |
echo -e "\033[2J\033[?25l" | |
# get the number of lines and columns of the terminal | |
R=$(tput lines) |
#!/bin/bash | |
#################################gary23w-loves-you########################################## | |
# This is a bash script that uploads files and directories from a specified directory # | |
# path to a cloud storage service called pCloud. The script uses OAuth2 authorization # | |
# to obtain an access token, and then uses the pCloud API to upload files and create # | |
# directories. The variables username and password are not used in this script, # | |
# but may have been used for a previous version. The variables client_id and client_secret # | |
# are used for authentication with the pCloud API. The variables # | |
# main_folder_id, depth, and max_depth are used to define the root folder in pCloud, the # | |
# current directory depth, and the maximum directory depth, respectively. The functions # |
def hilbert_sort(data): | |
""" | |
Sorts an input array using Hilbert curve mapping. | |
Parameters: | |
data (list): The input array to be sorted. | |
Returns: | |
sorted_data (list): The sorted input array. | |
""" |
## an attempt to listen to keypresses and monitor window focus | |
import time | |
import random | |
import re | |
import sys | |
import enum | |
import six | |
from six.moves import queue |
Security + | |
Spam filter | |
- Spam defined. | |
- in most cases, spam is defined as unsolicited bulk email(ube), or junk email. The spammer is hoping that the recipient will buy a product or service. | |
- Filters for spam |
Security and Risk Management | |
The CIA Triad: | |
- Confidentialility | |
- no unauthorized person can access (password protect) | |
- Integrity | |
- encryption of data | |
- cryptography | |
- Availability |