Skip to content

Instantly share code, notes, and snippets.

Simon R Jones simonrjones

Block or report user

Report or block simonrjones

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
simonrjones / .gitignore
Last active Jul 9, 2019
Global gitignore settings.
View .gitignore
# Standard ignore rules
# OS generated files
View WordPress block ideas for complex components
<h1 data-wp-block="h1">My title</h1>
<p data-wp-block="p">Some text</p>
<div data-wp-block="custom-collapsable" class="faqs-component">
<ul class="accordion">
<li data-wp-block-item="1" class="accordion-navigation active">
<a data-wp-block-field="title" aria-expanded="true" href="#panel691">My FAQ question title here</a>
<div data-wp-block-field="contents" id="panel691" class="content active">
View rename_db
# Copyright 2013 Percona LLC and/or its affiliates
# @see
set -e
if [ -z "$3" ]; then
echo "rename_db <server> <database> <new_database>"
exit 1
db_exists=`mysql -h $1 -e "show databases like '$3'" -sss`
if [ -n "$db_exists" ]; then
simonrjones / rename_db
Last active May 11, 2018
Shell script to rename a database, based on - Please note you need to ensure you have access to MySQL via your ~/.my.cnf file
View rename_db
# Copyright 2013 Percona LLC and/or its affiliates
# @see
set -e
if [ -z "$3" ]; then
echo "rename_db <server> <database> <new_database>"
exit 1
db_exists=`mysql -h $1 -e "show databases like '$3'" -sss`
if [ -n "$db_exists" ]; then
simonrjones / security-scanning
Last active Oct 17, 2016
Series of shell commands to help detect a PHP security exploit
View security-scanning
# Find all Apache-owned PHP files
find /var/www -user apache -type f -name '*.php' > suspicious_files.txt
# Find all non-binary files owned by Apache that are not named .php but contain PHP parser tags
find /var/www -user apache -type f -not -name '*.php' | xargs egrep -ilI "(<\?php|<\?=|<\? *(?!(xml)))" > suspicious_files2.txt
# Find all files containing PHP parser tags in global tmp folder
egrep -ilIr "(<\?php|<\?=|<\? *(?!(xml)))" /tmp > suspicious_files3.txt
# You can inspect all the PHP files for certain strings to find potentially dodgy code. Yes, they often contain the word hack!
simonrjones / delete-php-sessions.php
Last active Aug 29, 2015
Delete PHP sessions from the tmp folder when you have 10,000s of them which cannot be removed with a simple rm -f /tmp/sess_* command
View delete-php-sessions.php
// Clean PHP session files when you have 10,000s of them!
// Set this to the folder that contains your session files with trailing slash
// @see
$sessionTmpFolder = '/path/to/tmp/';
foreach (range(0,9) as $number) {
foreach (range('a','z') as $letter) {
simonrjones / back-page-link.js
Created Dec 4, 2014
JavaScript back to last page link
View back-page-link.js
simonrjones / parseCsv.php
Last active Aug 29, 2015
Parse CSV file snippet
View parseCsv.php
// Read CSV file
// PHP5.4+
ini_set('auto_detect_line_endings', true);
$file = new SplFileObject("path/to/file.csv");
$line = 0;
$headers = [];
foreach ($file as $row) {
View gist:8783515
* Studio 24 Application
* @category Studio 24
* @package S24_Application
* @copyright Copyright (c) 2009-2010 Studio 24 Ltd (
* @license New BSD License
* @author Simon R Jones <>
* @version 1.1
View finding-apache-user
// Error reporting
ini_set('display_errors', true);
// Return the Apache user
$tmpFilename = tempnam('/tmp', 'TEST');
$handle = fopen($tmpFilename, 'w');
fwrite($handle, 'testdata');
You can’t perform that action at this time.