I hereby claim:
- I am wildone on github.
- I am maxbarrass (https://keybase.io/maxbarrass) on keybase.
- I have a public key ASAxoYdiRTDAhfH75sFZNU80hJLVWrMrDkqzCcXGxIhImQo
To claim this, I am signing this object:
#!/usr/bin/env bash | |
ENV_PATH="$(dirname "$(dirname "$(which pip)")")" | |
SYSTEM_VIRTUALENV="$(which -a virtualenv|tail -1)" | |
echo "Ensure the root of current virtualenv:" | |
echo " $ENV_PATH" | |
read -p "‼️ Say no if you are not sure (y/N) " -n 1 -r | |
echo | |
PYEXC_DEF="$(sed -n '1s/^#!//p' $SYSTEM_VIRTUALENV)" | |
read -p "🐍 Choose which python to use? [$PYEXC_DEF] " PYEXC |
input { | |
file { | |
path => "/Users/sebastienmuller/comperio/projects/sintef/tmp/logs/indexing_logs_2/solr.log.3" | |
start_position => "beginning" | |
sincedb_path => "/dev/null" | |
} | |
} | |
filter { | |
# Extract event severity and timestamp |
I hereby claim:
To claim this, I am signing this object:
https://gist.githubusercontent.com/anudeepND/adac7982307fec6ee23605e281a57f1a/raw/5b8582b906a9497624c3f3187a49ebc23a9cf2fb/Test.txt | |
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts | |
https://mirror1.malwaredomains.com/files/justdomains | |
http://sysctl.org/cameleon/hosts | |
https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist | |
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt | |
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt | |
https://hosts-file.net/ad_servers.txt | |
https://raw.githubusercontent.com/hectorm/hmirror/master/data/adaway.org/list.txt | |
https://raw.githubusercontent.com/hectorm/hmirror/master/data/adblock-nocoin-list/list.txt |
"If you are looking to fix strings that look like urls in text and convert them to ulrs like this https://www.example.ru http://www.example.com www.example.com.au example.co.jp http://blog.example.app http://www.example.com/product http://www.example.com/products?id=1&page=2 http://www.example.com#up http://255.255.255.255 255.255.255.255 http:// www.site.com:8008 you can use Regex in javascript to replace strings with a format of you liking even if a url is at the end of your string like google.com".replace(/((\w+:\/\/\S+)|(\w+[\.:]\w+\S+))[^\s,\.]/mg,'<a href="$&" target="_blank">$&</a>') |
docker run -v ${pwd}:/data pandoc/core -o test2.md --extract-media=./test2/ test2.docx |
# Description: | |
# Basic SQUID proxy config for running Squid in Docker with Local and Docker LAN allowed | |
# | |
# Uage: | |
# docker run --name squid -d --restart=always --publish 3128:3128 --volume ${pwd}\squid.conf:/etc/squid/squid.conf sameersbn/squid | |
# | |
# TAG: acl | |
# Defining an Access List | |
acl SSL_ports port 443 |
Some of these instructions were not working in source so here are the updates:
function WaitForUrlContent { | |
[CmdletBinding()] | |
Param ( | |
[Parameter(Mandatory=$true)] | |
[string]$ResponseContentNoPresent, | |
[Parameter(Mandatory=$false)] | |
[string]$Url="http://localhost:4502", |
# Download and extract Filevault from https://github.com/aem-design/jackrabbit-filevault/releases run this in the extracted folder. | |
#equivalent of using localhost in docker container | |
Set-Variable -name SOURCE_HOST -value "localhost" | |
# TCP port SOURCE_CQ listens on | |
Set-Variable -name SOURCE_PORT -value "4502" | |
# AEM Admin user for SOURCE_HOST | |
Set-Variable -name SOURCE_AEM_USER -value "admin" | |
# AEM Admin password for SOURCE_HOST | |
Set-Variable -name SOURCE_AEM_PASSWORD -value "admin" |