Getting started:
Related tutorials:
- MySQL-CLI: https://www.youtube.com/playlist?list=PLfdtiltiRHWEw4-kRrh1ZZy_3OcQxTn7P
- Analyzing Business Metrics: https://www.codecademy.com/learn/sql-analyzing-business-metrics
var page = require('webpage').create(); | |
page.settings.loadImages = false; | |
page.onConsoleMessage = function(msg) { console.log(msg); }; | |
page.onLoadFinished = function() { | |
page.evaluate(function() { | |
var getFrames = function(doc) { | |
var frames = doc.querySelectorAll('iframe'); | |
for (var i = frames.length - 1; i >= 0; i--) { | |
var fdoc = frames[i].contentWindow.document; |
# Epitome | |
I want to have os image that can login with password. | |
download UEC image. | |
for example, this precise. | |
http://cloud-images.ubuntu.com/precise/current/precise-server-cloudimg-amd64-disk1.img | |
this image was forbidden to password login feature in terminal console. | |
it's reasonable for use of cloud image. |
Getting started:
Related tutorials:
This is an example of using Linux Kernel's
Transparent Proxy
to route all TCP traffic to docker containers without having to resort to
PROXY protocol
which is not supported by some applications
(e.g. sshd
). To get the demo to work you only need vagrant installed:
git clone [this-gist] tproxy-demo
cd tproxy-demo
vagrant up
Example code for exporting data in a table to a csv file. |
# Elasticsearch Cheatsheet - an overview of commonly used Elasticsearch API commands | |
# Bulk actions: | |
# Delete all indexes via pattern | |
for index in $(curl -XGET esmaster:9200/_cat/indices | awk ‘/pattern/ {print $3}’); do curl -XDELETE esmaster:9200/$index?master_timeout=120s; done | |
# cat paths | |
/_cat/allocation |
KEYBINDINGS | |
byobu keybindings can be user defined in /usr/share/byobu/keybindings/ (or within .screenrc if byobu-export was used). The common key bindings | |
are: | |
F2 - Create a new window | |
F3 - Move to previous window | |
F4 - Move to next window |
##TCP FLAGS## | |
Unskilled Attackers Pester Real Security Folks | |
============================================== | |
TCPDUMP FLAGS | |
Unskilled = URG = (Not Displayed in Flag Field, Displayed elsewhere) | |
Attackers = ACK = (Not Displayed in Flag Field, Displayed elsewhere) | |
Pester = PSH = [P] (Push Data) | |
Real = RST = [R] (Reset Connection) | |
Security = SYN = [S] (Start Connection) |
8.2.3. HTTP log format | |
---------------------- | |
The HTTP format is the most complete and the best suited for HTTP proxies. It | |
is enabled by when "option httplog" is specified in the frontend. It provides | |
the same level of information as the TCP format with additional features which | |
are specific to the HTTP protocol. Just like the TCP format, the log is usually | |
emitted at the end of the session, unless "option logasap" is specified, which | |
generally only makes sense for download sites. A session which matches the | |
"monitor" rules will never logged. It is also possible not to log sessions for |
8.2.2. TCP log format | |
--------------------- | |
The TCP format is used when "option tcplog" is specified in the frontend, and | |
is the recommended format for pure TCP proxies. It provides a lot of precious | |
information for troubleshooting. Since this format includes timers and byte | |
counts, the log is normally emitted at the end of the session. It can be | |
emitted earlier if "option logasap" is specified, which makes sense in most | |
environments with long sessions such as remote terminals. Sessions which match | |
the "monitor" rules are never logged. It is also possible not to emit logs for |