Skip to content

Instantly share code, notes, and snippets.

View zhovner's full-sized avatar
🐋

Pavel Zhovner zhovner

🐋
View GitHub Profile
@jdkanani
jdkanani / notepad.html
Last active April 6, 2024 17:09 — forked from jakeonrails/Ruby Notepad Bookmarklet
This bookmarklet gives you a code editor in your browser with a single click.
data:text/html, <style type="text/css">.e{position:absolute;top:0;right:0;bottom:0;left:0;}</style><div class="e" id="editor"></div><script src="http://d1n0x3qji82z53.cloudfront.net/src-min-noconflict/ace.js" type="text/javascript" charset="utf-8"></script><script>var e=ace.edit("editor");e.setTheme("ace/theme/monokai");e.getSession().setMode("ace/mode/ruby");</script>
<!--
For other language: Instead of `ace/mode/ruby`, Use
Markdown -> `ace/mode/markdown`
Python -> `ace/mode/python`
C/C++ -> `ace/mode/c_cpp`
Javscript -> `ace/mode/javascript`
Java -> `ace/mode/java`
Scala- -> `ace/mode/scala`
@Thermionix
Thermionix / gist:7421858
Created November 11, 2013 22:42
BTSync as windows service
using http://nssm.cc/usage
Install BTSync
Configure your shared folders
Make sure you uncheck the "Start btsync when windows starts" option in the preferences.
Download nssm, as an admin run "nssm install BTSync"
Put in the path to the BTSync.exe
Open windows service manager and tell it to run BTSync as the user you just used to install.
Make sure BTSync isn't already running, then start the service.
@scy
scy / README.md
Last active July 7, 2023 09:27
My OSX PF config for #30C3.

My OS X “VPN only” Setup For #30C3

You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.

Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.

If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.

Target audience

@artkirienko
artkirienko / Анализ приложения «Бургер Кинг»
Created November 2, 2014 22:28
Анализ приложения «Бургер Кинг»
ПРОТОКОЛ
АНАЛИЗА ПРИЛОЖЕНИЯ "BURGER KING" ОТ РАЗРАБОТЧИКА "LOYALTY PLANT" ("ФАБРИКА ЛОЯЛЬНОСТИ")
ОСНОВНЫЕ ПОЛОЖЕНИЯ:
========================================================================================================
1. Приложение разработано для мобильных платформ: Android, Windows Phone, iOS
2. Приложение разработано на основе фреймворка Xamarin, который реализует поддержку .NET-приложений в мобильной среде
3. Приложение, кроме того, состоит в целом из двух важных частей:
* .NET-ассембли, написаный, скорее всего, на C#. (Весь код, включая структуру классов, а так же декомпилированные листинги методов, можно получить с использованием .NET Reflector)
* Ассембли содержит основной функционал программы, логику работы с аппаратным обеспечением, логику для генерирования уникального идентфикатора устройства