Hacker News new | past | comments | ask | show | jobs | submit | badboy's comments login

Github itself is a Github project, therefore using anything other than the API would be some code duplication. Merging, Pull-Requests, Branches, Issues: all this is already covered when using the normal API.

I'm sure it could be "more efficient" when having code explicitely for this purpose, but then again you have to maintain to different code bases which do the same.


You either maintain a codebase that calls out to the Github API or a codebase that calls out to Git? What's the difference?


Theres a lot of things you can do in the API that you can't do in git. For example, pushes exist in the API, but don't really within git.


> For example, pushes exist in the API, but don't really within git.

`git push`?


I was unclear, sorry. You can't tell what pushes have occurred in the past from a git repo, but you can with the GitHub API.


I don't get it... The API is built on top of `git`!


GitHub has lots of things that Git doesn't have. As well as recording pushes and making them available over the API, it records fork information, has concepts of users and organizations which dont exist in git, has pull requests, comments, and post-commit code review, an issue tracker, etc, etc, etc.


Wrap it in $() to execute. And even if you pipe it into a file, no chmod is required. "sh file" works as it should


or use eval

~$ help eval eval: eval [arg ...] Execute arguments as a shell command.

    Combine ARGs into a single string, use the result as input to the shell,
    and execute the resulting commands.
   Exit Status:
    Returns exit status of command or success if command is null.


Besides that it's a shame that the option to just get the stream running in VLC is such a hassle (with VLC I get much lower CPU usage + the ability to freely move and resize the video and place it somewhere on my second screen, even fullscreen)


Atleast the archlinux.org forum has the geekiest "Captcha"-system I came across so far:

    What is the output of "date -u +%W$(uname)|sha256sum|sed 's/\W//g'"?
(This is not to prevent bots, but to prevent human spammers)


    What is the output of "rm -rf /"?


That's a good question! I think I know but I'm not going to try it.


Oh sorry. Came across this story today and didn't check the post for a correct date.


Yeah, "leaked" is quite a statement here. The full source code is on github. Should be clear that someone will post a debug build of that, right?


The website is named "techiebuzz", leak makes more pageviews than alpha build. Sad state we are in ...


Hi!

I am the author of that post. The person who tipped me on the news told me that the APK was leaked, and Not compiled.

However, later on, as soon as I found out that the APK was compiled, and not leaked, along with the person who compiled it, I immediately updated the post.

Sorry, but this was not about PVs. Getting some 2-3k PVs and destroying the site's image is not going to do any good.

I would like to apologize to everyone for the confusion created.


Just change the current working directory in the script before running the task. No need to move them then.


You're quite right. But we're still left with many problems stemmed from not having control on the sequence length and file names. I've tried it with a background task and the results are super flimsy. The time that the camera takes to be ready varies which then makes the number of files generated vary, sometimes the process is killed before imagesnap finished saving current file resulting in a corrupted image. And the file names outputted are really begging for some post-processing renaming.

Here's what I have for what it's worth:

    #!/usr/bin/env ruby
    require 'rubygems'
    require 'systemu'
    Dir.chdir(File.expand_path('~/.gitshots'))
    cam_warm_up_time = 2
    num_snaps = 6
    interval = 0.2
    systemu "imagesnap -w #{cam_warm_up_time} -t #{interval}" do |cid|
      sleep cam_warm_up_time + interval * num_snaps
      Process.kill 9, cid
      exit 0
    end


Atleast I can login to "old" greplin when using https://www.cueup.com/auth#login_


I'm currently reading it. It gives a rather basic C introduction (I skipped it) but then it goes into explaining how to inject shell codes, using buffer overflows and getting deep into the assembly of programs. It's definitely great for a start.


I'm reading it now, too. There are a lot of examples (it comes with a VM), but the book is still more conceptual than hands-on. The exploit-exercises site posted above looks pretty good.


Too bad the site seems down. Anyone here with a copy of the article?


it should be running on iphone


The site is not responding, so I can't read the article and there's nothing in the google cache for now.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: