#Resources to their folders RewriteCond %{REQUEST_URI} \.(pdf|doc|xml|pem|crx|apk|svg)$ RewriteCond %{DOCUMENT_ROOT}/%{HTTP_HOST}%{REQUEST_URI} -f #RewriteCond %{DOCUMENT_ROOT}/%{HTTP_HOST}%{REQUEST_URI} !-d RewriteRule ^(.+)$ %{HTTP_HOST}%{REQUEST_URI}But it does not do what it should obviously do (due to whatever small detail, mistake, or misunderstanding from my side), so I found myself in need to filter the files through PHP code (yes, I know, let the web server deliver the static file contents). But until this will happen, I had to urgently improvise the code below.
.htaccess
-routing all the txt|png|jpeg|...
to .mimeDelivery.php
code (mentioned below).
htaccess
ed mime types (as saved by cPanel
in Perl store (serialized form). Perl deserialization algorithm is mentioned below. scaledDensity
to convert from DPI to PPI.
float x=outMetrics.widthPixels/outMetrics.xdpi; float y=outMetrics.heightPixels/outMetrics.ydpi; double diag=Math.hypot(x, y); double physicalDiagonal=diag/outMetrics.scaledDensity; s+="Diag. logică: "+diag+";\n"; s+="Diag. fizică: "+diag/physicalDiagonal+"\"";
function filterNodes(jQuerySet,value){ value=(""+value).toUpperCase(); var values=value.split(" "); var signs=[]; for(var i=0;i<values.length;i++){ if(values[i].charAt(0)=='!'){ signs[i]=1; values[i]=values[i].substr(1); } values[i]=unescape(values[i]); } var nodes=jQuerySet; for(var i=0;i<nodes.length;i++){ var nodeValue=nodes[i].innerHTML.toUpperCase(); try{ nodeValue=nodeValue.replace(/<[^>]+>/g, ''); }catch(e){} $temporaryValue=1; if(value!='') for(var j=0;j<values.length;j++) if(values[j]) if(signs[j]^(nodeValue.indexOf(values[j])<0)){ $temporaryValue=false; break; } if($temporaryValue) $(nodes[i]).show(); else $(nodes[i]).hide(); } }
curl
libraries used by bots;nonce
will be stored only on the server side, so the only way to know it is to open the email - which means that the user has access to the given mail;#browser ie #on step.before step_before.js #timeout 20 #include login.dms #include client_sim_add-remove.dms #include client_people.dms
window.location="http://betalogin.mdmconsole.com"; UNTIL => (''+window.location).match('^http://hidden-url.com/') ##Login > input email, password $('input#email') <= 'secret@example.com' $('input#password') <= 'secret-password' ##Login > click Login $CLICK => $('button:contains(\"Login\")') ##Console > Wait for "Logout" button to appear UNTIL => $('button:contains(\"Logout\")').length==1 ##Console > Log in as $CLICK => $('button:contains("Log in as")') ##Console > Log in as > roles := client; userId:=SecretUser* $CLICK => $('input#roles').siblings("img") $CLICK => $('.x-combo-list-item:contains("Client")') $CLICK => $('input[name="userID"]').siblings('input[value^="Akela"]') ##Console > Click "Log in" $CLICK => $('#btnLogin button:contains("Log in")')
##People $CLICK => $('#nav-Endusers button:contains("People")') ##People > Add $CLICK => $('table:contains("Export to CSV") button:contains("Add")') ##People > Add > first_name, last_name, email, owner language, pass1, pass2, Active:=true, Save $(':contains("Person details") input[name="first_name"]') <= d2a('%EXECUTION_ID%FirstName') $(':contains("Person details") input[name="last_name"]') <= d2a('%EXECUTION_ID%LastName') $(':contains("Person details") input[name="email"]') <= d2a('e%EXECUTION_ID%@example.com') $('#EditPersonWindow input#ownerLanguage') <= 'English' $('#EditPersonWindow input#pass1') <= d2a('%EXECUTION_ID%') $('#EditPersonWindow input#pass2') <= d2a('%EXECUTION_ID%') $('#EditPersonWindow label:contains("Active:")').siblings().find("input") <= true $CLICK => $('#EditPersonWindow button:contains("Save")') UNTIL => $('#EditPersonWindow').length==0
using Emgu.CV; using System.Collections; using Emgu.CV.CvEnum; using Emgu.CV.Util; using Emgu.CV.Structure; using Emgu.CV.Features2D; using System; using System.Drawing.Imaging; using System.IO; using System.Threading; namespace ConsoleApplication2 { class Program { static void Main(string[] args) { if (args.Length!=0){ if (args[0] == "start") CaptureStart(); if (args[0] == "stop") CaptureStop(); } Console.WriteLine("Capture start | stop"); } public static void CaptureStart() { var signature = "" + new Random().Next(); Config.set("capture-session", signature); Capture c = new Capture(); c.SetCaptureProperty(CAP_PROP.CV_CAP_PROP_FRAME_WIDTH, 1024); c.SetCaptureProperty(CAP_PROP.CV_CAP_PROP_FRAME_HEIGHT, 768); for (;;) { if (Config.get("capture-session") != signature) return; try { Thread.Sleep(3000); var thumbnail = c.QueryGrayFrame(); Storage.Save(c.QueryFrame()); } catch (Exception e) { Console.WriteLine(e.StackTrace); } } } public static void CaptureStop() { Config.set("capture-session", ""); } } }
(for /f "tokens=2,3,4 delims=/ " %i in ('date /t') do set _YMDHM=%k-%j-%i) (for /f "eol=P tokens=1,2 delims=: " %i in ('time /t') do set _YMDHM=%_YMDHM%-%i-%j)The final result should be similar to:
Microsoft Windows [Version 6.1.7601] Copyright (c) 2009 Microsoft Corporation. All rights reserved. C:\Users\dsorescu>clear C:\Users\dsorescu>(for /f "tokens=2,3,4 delims=/ " %i in ('date /t') do set _YMD HM=%k-%j-%i) C:\Users\dsorescu>set _YMDHM=2013-15-03 C:\Users\dsorescu>(for /f "eol=P tokens=1,2 delims=: " %i in ('time /t') do set _YMDHM=%_YMDHM%-%i-%j) C:\Users\dsorescu>set _YMDHM=2013-15-03-04-10 C:\Users\dsorescu>
SSLCertificateFile /home/dsorescu/private/html/ssl/sorescu.eu.crt SSLCertificateChainFile /home/dsorescu/private/html/ssl/sorescu.eu.pem #the CA file SSLCertificateKeyFile /home/dsorescu/private/html/ssl/sorescu.eu.keyMost of people will also be tempted to enable the SSL comprssion as following:
SSLCompression onUsing compressed SSL poses a security leak very easy to understand and to exploit; the explaination is as following (all entities mentioned below are fictional and meant to ease the understanding of the method):