http://www.xminder.com/number.check.php?number=5551234567
http://www.xminder.com/number.check.php?number=<10digitnumber>
'nuff said
Also, npm module for node.js:
#!/bin/sh | |
# Based on instructions found here: http://wiki.razuna.com/display/ecp/FFMpeg+Installation+on+CentOS+and+RedHat#FFMpegInstallationonCentOSandRedHat-InstallX264 | |
if [ "`/usr/bin/whoami`" != "root" ]; then | |
echo "You need to execute this script as root." | |
exit 1 | |
fi | |
cat > /etc/yum.repos.d/centos.repo<<EOF |
# Install linux update, followed by GCC and Make | |
sudo yum -y update | |
sudo yum install -y gcc make | |
# Install Nginx and PHP-FPM | |
sudo yum install -y nginx php-fpm | |
# Install PHP extensions | |
sudo yum install -y php-devel php-mysql php-pdo \ | |
php-pear php-mbstring php-cli php-odbc \ |
<?php | |
// Edited boucher/gist:1750375 to work with stripe-php v2 | |
require 'stripe-php/init.php'; | |
if ($_POST) { | |
\Stripe\Stripe::setApiKey("YOUR-API-KEY"); | |
$error = ''; | |
$success = ''; | |
try { | |
if (!isset($_POST['stripeToken'])) | |
throw new Exception("The Stripe Token was not generated correctly"); |
<div id="map_wrapper"> | |
<iframe id="map_canvas"></iframe> | |
</div> |
# Nginx - logrotate & upload to S3 | |
0 0 * * * /usr/sbin/logrotate /etc/logrotate.d/nginx | |
15 0 * * * s3cmd put /var/log/nginx/access.log-`date +"\%Y\%m\%d"`.gz s3://$LOGS_BUCKET_NAME/nginx-access/`date +"dt=\%Y\%m\%d"`/`hostname -s`.access.log-`date +"\%Y\%m\%d"`.gz |
http://www.xminder.com/number.check.php?number=5551234567
http://www.xminder.com/number.check.php?number=<10digitnumber>
'nuff said
Also, npm module for node.js:
<?php | |
// Load the XML source | |
$xml = new DOMDocument; | |
$xml->load('XML_SOURCE_LINK_HERE'); | |
// Load XSLT stylesheet | |
$xsl = new DOMDocument; | |
$xsl->load('XSL_STYLESHEET_PAGE_LINK_HERE'); |
This gist assumes:
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
<?php | |
if (php_sapi_name() === 'cli') $lb = "\n"; | |
else $lb = "<br />"; | |
for ($i = 1; $i <= 100; $i++) | |
{ | |
if ($i % 15 === 0) { | |
echo "FizzBuzz $lb"; | |
} |