View laravel laracollective & validation
Laravel Collective (Forms & HTML pakage)
https://laravelcollective.com/docs/5.4/html
*. CMD :
composer require "laravelcollective/html":"^5.4.0"
View Useful Links
View API.js
// Source: WFC v5.0 Developer's Toolkit Programmer's Guide
// Chapter 3: Advanced Programming Topics
// Implementing a Timesheet Editor in JavaScript
// https://forge.cornell.edu/sf/docman/do/downloadDocument/projects.cit_is_customer_apps/docman.root.design_docs/doc5084;jsessionid=rwf6KAPllbRnKbr+f9jwgUjw.tf#65
/*
Copyright:Kronos, Inc. 2001
Description:
This file provides the basic methods and objects needed to login, logout, and send xml requests to WFC v4.0 xml api gateway.
View capybara cheat sheet
=Navigating=
visit('/projects')
visit(post_comments_path(post))
=Clicking links and buttons=
click_link('id-of-link')
click_link('Link Text')
click_button('Save')
click('Link Text') # Click either a link or a button
click('Button Value')
View ngrok.service
[Unit]
Description=Share local port(s) with ngrok
After=syslog.target network.target
[Service]
PrivateTmp=true
Type=simple
Restart=always
RestartSec=1min
StandardOutput=null
View redux-async-helpers.js
/**
* Redux async helpers.
*/
// Constants
const REQUEST = 'request';
const SUCCESS = 'succces';
const FAILURE = 'failure';
/** Request status can only be one of these: */
View abuse_ch_ransomware.rules
This file has been truncated, but you can view the full file.
################################################################################
# Domain Blacklist Rules: https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
################################################################################
alert udp $HOME_NET any -> any 53 (msg:"Ransomware Tracker: Ransomware DNS lookup: 25z5g623wpqpdwis.onion.to";content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2; content:"|10|25z5g623wpqpdwis|05|onion|02|to|00|";fast_pattern; nocase; threshold: type limit, track by_src, seconds 60, count 1;classtype:trojan-activity; sid:626313601; rev:6608;)
alert udp $HOME_NET any -> any 53 (msg:"Ransomware Tracker: Ransomware DNS lookup: 27c73bq66y4xqoh7.dorfact.at";content:"|01 00 00 01 00 00 00 00 00 00|"; depth:10; offset:2; content:"|10|27c73bq66y4xqoh7|07|dorfact|02|at|00|";fast_pattern; nocase; threshold: type limit, track by_src, seconds 60, count 1;classtype:trojan-activity; sid:626313602; rev:6608;)
View tdiisimcode.txt
// Import ITIM Packages
//importPackage(com.ibm.itim.apps);
//importPackage(java.util);
function getContext()
{
system.setJavaProperty("java.security.auth.login.config", "C:/ibm/jaas_login_was.conf");
system.setJavaProperty("com.ibm.CORBA.ConfigURL", "file:C:/IBM/sas.client.props");
//system.setJavaProperty("com.ibm.CORBA.securityServerHost", "10.18.3.126");