嵇爾的吐槽

#没事画轮子的嵇尔不定期的(W)碎(E)碎(B)念(B)和(L)吐(O)槽(G)

置顶 To do list 2015-01-30 11:17:00
相册 2018-05-03 17:54:16

相册功能其实在我大大皮的时候已经搞定了,但是一直觉得UI有点不妥的地方。

今天放上来只是想秀一下打毛线的照片:sheep::sheep::sheep:

翻天覆地的世界 2018-04-20 17:41:16

感觉整整消失了半年多,回来世界都变了不少

很多没有填的坑变得更大了,而且又生成了很多新的坑

数胎动小工具 2017-10-08 20:11:16

随手写的,感觉手残了不少

画钩针图解的工具 2017-09-22 01:39:00

最近在研究棒针和钩针,还是挺有意思的(呸,明显是因为禁止或者暂停做很多事时间太多了:sob:

然后就在考虑,那种书上的图解都是怎么做的。

棒针还好,Excel还能凑合

钩针这种360°各种旋转扭曲的就……

然后搜了下github,搜出很多好玩的东西,除了画图解的,还有根据钩针针数生成3D形状的(我用不太遛,针法缩写背不出)

Crochet Charts

钩针画图解的最顺眼的是这个东西,它自己网址在这里。

Github repo 发现了2个,一个人弄的+hash都一样但是居然没看到Fork痕迹:

https://github.com/iPenguin/CrochetCharts

https://github.com/StitchworksSoftware/CrochetCharts

我最开心的是:支!持!linux!安!装!(虽然还没试)

虽然相比较我们家CDD来说,用起来不是很舒服,但是我很满意了!!!

关于某些的小工具(扩展) 2017-08-10 20:11:16

上回小工具的扩展

关于某些的小工具 2017-08-02 17:33:00

最近因为某些那啥的事儿,好多事情都给搁置了,包括学锯子之类的各种事情

今天想动动爪子,不想给某些网站添加流量了

Problem 59 XOR decryption 2017-04-20 09:32:00

Each character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.

A modern encryption method is to take a text file, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.

For unbreakable encryption, the key is the same length as the plain text message, and the key is made up of random bytes. The user would keep the encrypted message and the encryption key in different locations, and without both “halves”, it is impossible to decrypt the message.

Unfortunately, this method is impractical for most users, so the modified method is to use a password as a key. If the password is shorter than the message, which is likely, the key is repeated cyclically throughout the message. The balance for this method is using a sufficiently long password key for security, but short enough to be memorable.

Your task has been made easy, as the encryption key consists of three lower case characters. Using cipher.txt (right click and ‘Save Link/Target As…’), a file containing the encrypted ASCII codes, and the knowledge that the plain text must contain common English words, decrypt the message and find the sum of the ASCII values in the original text.