- You own a Git repository server and the developers do not have access to it
(i.e. they can only read & write to the repo, but not
gc
it). - You had a developer that wrote a project for you.
- He got angry for whatever reason and deleted all branches from the remote repo.
He also
push -f
ed themaster
branch leaving only one silly commit there. - He escaped from the country leaving you without any code at all (at least this is what he believe in).
- You have never cloned the repo to other machine. There were only two copies of it: the developer's one and the server's one.
#!/bin/bash | |
# ---------------------------------------------------------- | |
# Define common colors and styles | |
# | |
readonly RED='\033[0;31m' | |
readonly GREEN='\033[0;32m' | |
readonly ORANGE='\033[0;33m' | |
readonly BLUE='\033[0;34m' | |
readonly PURPLE='\033[0;35m' |
// ==UserScript== | |
// @name UTM param stripper | |
// @author Paul Irish, Sam Hasler, Lomanic | |
// @namespace http://github.com/paulirish | |
// @version 1.3 | |
// @description Drop the UTM params from a URL when the page loads. | |
// @extra Cuz you know they're all ugly n shit. | |
// @include /^http.*\?.*[?&]utm_.*$/ | |
// @run-at document-start | |
// @updateURL https://gist.github.com/Lomanic/cf1158a9bfb90d8b5dbbb4d05483e857/raw/utmstrip.user.js |
#!/usr/bin/env bash | |
mac_address=$1 | |
# Strip colons from the MAC address | |
mac_address=$(echo $mac_address | sed 's/://g') | |
broadcast=$2 | |
port=4343 | |
# Magic packets consist of 12*`f` followed by 16 repetitions of the MAC address |
#define RELAY_PIN 12 | |
#define LED_PIN 13 | |
void setup() { | |
Serial.begin(115200); | |
Serial.println("START"); | |
pinMode(LED_PIN, OUTPUT); |
// 0x80 beginning | |
//___________________ | |
// 0x81 - 112 bytes / no refresh / C+3E | |
// 0x82 - refresh | |
// 0x83 - 28 bytes of data / refresh / 2C | |
// 0x84 - 28 bytes of data / no refresh / 2C | |
// 0x85 - 56 bytes of data / refresh / C+E | |
// 0x86 - 56 bytes of data / no refresh / C+E | |
// --------------------------------------- | |
// address or 0xFF for all |
require 'base64' | |
require 'date' | |
require 'open-uri' | |
# https://github.com/pil0u/sutom-tob/commit/263e26ec15019f1f41582dc3480b54c2d23266af | |
def uri_mot_sutom(jour) | |
origine = Date.new(2022, 1, 7) | |
aujourdhui = origine + jour | |
s = "34ccc522-c264-4e51-b293-fd5bd60ef7aa-#{aujourdhui}" |
This is as simple as curl -X POST https://wifi.sncf/router/api/connection/activate/auto
.
No need to give your ticket number.
Not using a Unix-like OS (say, on mobile)? Just head over to the "chatbot" at https://wifi.sncf/fr/internet/bot and accept the EULA (French: CGU) and tell the bot that you have a foreign ticket.
Hola is a free browser extension and a Windows program that has 10 million users. It was created in 2012 and I did a review of it (that post has been taken down after I learned the dark truth). Initially I liked it, because I could watch Hulu and CBS online for free and legally (well, mostly legally anyways).
However, quickly the extension became bad. It started injecting ads into pages and that was when I disabled it. I was considering starting a similar paid service, a "startup" as some would call it, and was very curious about how it worked.
I reverse engineered their code and have gotten a list of proxies and the username and password that I have published HERE for all the people to see, use and abuse.
Now the dirty secret: Hola Networks Limited, that created Hola.org, runs a company called Luminati, that charges $20/GB for their premium VPN service. Okay, that’s not that bad, a little bit greedy but nothing sinister, you’re thinking? Well, it gets w