This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# sshsock - Quick 'n dirty VPN for macOS | |
# | |
# Usage example: | |
# Let Apple Mail, Safari and Firefox route all traffic via your ssh server at | |
# foo.example.com by using a system-wide local SOCKS proxy: | |
# | |
# $ sshsock foo.example.com | |
# Password: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
;; This are setting for nice tabbar items | |
;; to have an idea of what it looks like http://imgur.com/b0SNN | |
;; inspired by Amit Patel screenshot http://www.emacswiki.org/pics/static/NyanModeWithCustomBackground.png | |
;; Tabbar | |
(require 'tabbar) | |
;; Tabbar settings | |
(set-face-attribute | |
'tabbar-default nil | |
:background "gray20" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// | |
// Regular Expression for URL validation | |
// | |
// Author: Diego Perini | |
// Created: 2010/12/05 | |
// Updated: 2018/09/12 | |
// License: MIT | |
// | |
// Copyright (c) 2010-2018 Diego Perini (http://www.iport.it) | |
// |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// This block of code injects our source in the content scope and then calls the | |
// passed callback there. The whole script runs in both GM and page content, but | |
// since we have no other code that does anything, the Greasemonkey sandbox does | |
// nothing at all when it has spawned the page script, which gets to use jQuery. | |
// (jQuery unfortunately degrades much when run in Mozilla's javascript sandbox) | |
(function(run_me_in_page_scope) { | |
if ('undefined' == typeof __RUNS_IN_PAGE_SCOPE__) { // unsandbox, please! | |
var src = arguments.callee.caller.toString(), | |
script = document.createElement('script'); | |
script.setAttribute("type", "application/javascript"); |
NewerOlder