This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
Include this after bootstrap.css. Add class of | |
vert-offset-top-value or vert-offset-bottom-value | |
to your Bootstrap 3 default rows to prevent row content | |
from touching the row content above or below. | |
*/ | |
/* Vertical Offset Bottom */ | |
.vert-offset-top-12{ | |
margin-top: 12em; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Slide : https://docs.google.com/presentation/d/1jLUDucNtvGotHw0LOvDonMYwCkXYcb-cnsOWLNt-Ag0 | |
import sys | |
import pefile | |
from capstone import * | |
from capstone.x86 import * | |
from keystone import * | |
from datetime import datetime | |
MAX_DISASM_COUNT = 1000 * 1000 | |
FILE_NAME = r"dump-g4pic.dll" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resolver 8.8.8.8; | |
location /video/ { | |
if ($request_uri ~ "^/video/(.+?)/.+") { | |
set $upstream_host $1.googlevideo.com; | |
add_header Content-Disposition "attachment; filename=video.mp4;"; | |
} | |
rewrite /video/.+?/(.+)$ /$1 break; | |
proxy_buffering off; | |
proxy_pass https://$upstream_host; | |
proxy_set_header Host $upstream_host; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.udemy.com/static/upgrade-your-browser/ | |
https://www.udemy.com/the-complete-aliexpress-dropshipping-course/?awc=6554_1486679118_7a7a46be4e9a5b123dfafe81b6774cc7&utm_source=Growth-Affiliate&utm_medium=Affiliate-Window&utm_campaign=Campaign-Name&utm_term=211845&utm_content=Placement | |
https://www.udemy.com/introduction-to-computer-hardware-components/?awc=6554_1486679118_c9d708b3766666269774b8b534f35aad&utm_source=Growth-Affiliate&utm_medium=Affiliate-Window&utm_campaign=Campaign-Name&utm_term=211845&utm_content=Placement | |
https://www.udemy.com/the-immortal-classical-chinese-poetry-season-1/learn/v4/?utm_content=Placement&utm_term=211845&utm_source=Growth-Affiliate&couponCode=UDEMYSTUDIOREVIEW&utm_campaign=Campaign-Name&awc=6554_1486679119_370a36caaea0214094c25353a6563355&utm_medium=Affiliate-Window | |
https://www.udemy.com/chess-strategy-to-win-pawn-endgames/learn/v4/?utm_content=Placement&couponCode=BBH1000&utm_source=Growth-Affiliate&utm_term=211845&utm_campaign=Campaign-Name&utm_medium=Affiliate-Window& |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package com.example.sellectorsample; | |
import android.app.Activity; | |
import android.os.Bundle; | |
import android.view.View; | |
import android.view.View.OnClickListener; | |
import android.widget.Button; | |
import android.widget.TextView; | |
public class MainActivity extends Activity implements OnClickListener { |
- Virus Name: WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, WCRY
- Vector: All Windows versions before Windows 10 are vulnerable if not patched for MS-17-010. It uses EternalBlue MS17-010 to propagate.
- Ransom: between $300 to $600. There is code to 'rm' (delete) files in the virus. Seems to reset if the virus crashes.
- Backdooring: The worm loops through every RDP session on a system to run the ransomware as that user. It also installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (source: malwarebytes)
- Kill switch: If the website
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).
SECURITY BULLETIN AND UPDATES HERE: h
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<? | |
/** | |
* Repeatable Custom Fields in a Metabox | |
* Author: Helen Hou-Sandi | |
* | |
* From a bespoke system, so currently not modular - will fix soon | |
* Note that this particular metadata is saved as one multidimensional array (serialized) | |
*/ | |
function hhs_get_sample_options() { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#Please note - This script tested on Centos-6,7/Redhat-6,7. | |
#Check Internet Connection | |
IS=`/bin/ping -c 5 4.2.2.2 | grep -c "64 bytes"` | |
if (test "$IS" -gt "2") then | |
internet_conn="1" | |
#Check Gdrive Software Install Or Not | |
file="/usr/bin/gdrive" | |
if [ -f "$file" ] | |
then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FILE SPACING: | |
# double space a file | |
sed G | |
# double space a file which already has blank lines in it. Output file | |
# should contain no more than one blank line between lines of text. | |
sed '/^$/d;G' |
OlderNewer