Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
<?php | |
/*############################# | |
* Developer: Mohammad Sharaf Ali | |
* Designation: Web Developer | |
* Version: 1.0 | |
*/############################# | |
const RATES_API_URL = 'http://goldprice.org/NewCharts/gold/images/goldsilverpricesforcalculators.txt'; |
#-*- coding: utf-8 -*- | |
from BaseHTTPServer import BaseHTTPRequestHandler | |
import urlparse | |
import ephem, datetime | |
import json | |
# Phases of the Moon, using the datetime.now() at UTC | |
# http://127.0.0.1:8899/ | |
# Phases of the Moon, using the datetime.datetime(int(year), int(month), int(day))) at UTC |
#-*- coding: utf-8 -*- | |
from BaseHTTPServer import BaseHTTPRequestHandler | |
import urlparse | |
import ephem, datetime | |
import json | |
# Phases of the Moon, using the datetime.now() at UTC | |
# http://127.0.0.1:8899/ | |
# Phases of the Moon, using the datetime.datetime(int(year), int(month), int(day))) at UTC |
https://code.google.com/p/android/issues/detail?id=32696#c5 | |
If you have a certificate that is not | |
trusted by Android, when you add it, it goes in the personal cert store. | |
When you add a cert in this personal cert store, the system requires a | |
higher security level to unlock the device. But if you manage to add your | |
cert to the system store then you don't have this requirement. Obviously, | |
root is required to add a certificate to the system store, but it is quiet | |
easy. |
function onOpen() { | |
var ui = SpreadsheetApp.getUi(); | |
ui.createMenu('Custom functions') | |
.addItem('Look up fragrance notes', 'getFragranceNotes') | |
.addToUi(); | |
} | |
function getFragranceNotes() { | |
var ss = SpreadsheetApp.getActiveSpreadsheet(); | |
var allSheets = ss.getSheets(); |
Save for a few legacy projects that still use Fusion Tables I don't actively use this script anymore. This update hopefully solves the OAuth issue that cropped up once Google depcricated the Client Login method used by the prior version.
As always, your mileage may vary, and I welcome someone -- Google or otherwise -- to offer a long-term maintained solution.
The following is largely cribbed from a Google example here. I try to explain some of the API settings that must be enabled in the Developer's Console and elsewhere
#!/usr/bin/env python | |
# -*- coding: UTF-8 -*- | |
# | |
# source: https://www.4armed.com/blog/forging-wifi-beacon-frames-using-scapy/ | |
# | |
# requires: | |
# radiotap supported wifi nic/driver (frame injection) (works fine with Ralink RT2571W) | |
# iwconfig $iface mode monitor | |
# iw dev $iface set channel $channel | |
# or |
#include <WiFi.h> | |
#include "wifi_headers.h" | |
#include <esp_wifi.h> | |
//#include <esp_wifi_internal.h> | |
#include <lwip/err.h> | |
typedef union { | |
uint8_t fix_rate; | |
uint8_t b5; | |
uint8_t b4; |
// Espressif ESP32 promiscuous mode and packet injection experiments | |
// by brainstorm at nopcode org | |
#include "freertos/FreeRTOS.h" | |
#include "esp_wifi.h" | |
#include "esp_wifi_internal.h" | |
#include "lwip/err.h" | |
#include "esp_system.h" | |
#include "esp_event.h" | |
#include "esp_event_loop.h" |