If you plan to use iconv()
to transliterate string in you PHP project, please, take this:
FROM alpine:3.4
RUN apk add --update php5-cli wget build-base php5-dev autoconf re2c libtool \
DELIMITER ;; | |
DROP PROCEDURE IF EXISTS `normalize_foreign_key_name`;; | |
CREATE PROCEDURE `normalize_foreign_key_name`(IN `param_database_name` varchar(100) CHARACTER SET 'ascii', IN `param_table_name` varchar(100) CHARACTER SET 'ascii', IN `param_column_name` varchar(100) CHARACTER SET 'ascii') | |
BEGIN | |
DECLARE var_constraint_name_current VARCHAR(100); | |
DECLARE var_constraint_name_new VARCHAR(100); | |
DECLARE var_constraint_target_table VARCHAR(100); |
import java.util.Arrays | |
// BurstSort | |
// Cache-Conscious Sorting of Large Sets of Strings with Dynamic Tries | |
// http://goanna.cs.rmit.edu.au/~jz/fulltext/alenex03.pdf | |
class BurstLeaf(initSize: Int) { | |
var size: Int = 0 |
<?php | |
$runCount = 1000; | |
$dataSets = [ | |
'setA' => [$runCount, 123], | |
]; | |
$tests = [ | |
'testA' => function ($count, $n) { |
#!/usr/bin/env bash | |
set -o errexit -o pipefail -o nounset | |
IFS=$'\n\t' | |
ROOT="$(dirname $0)/root" | |
if [[ -f $ROOT.key || -f $ROOT.crt ]]; then | |
echo "Root certificate already exist" | |
exit 1 | |
fi |
localhost:80, localhost:443 { | |
root C:\Projects | |
log C:\Web\Soft\Caddy\access.log | |
errors C:\Web\Soft\Caddy\errors.log | |
tls { | |
# see https://gist.github.com/JanTvrdik/d22f53604f3bfd78df3863cf1ad87b8a | |
load C:\Web\Soft\Caddy\certificates | |
} |
// Trie.js - super simple JS implementation | |
// https://en.wikipedia.org/wiki/Trie | |
// ----------------------------------------- | |
// we start with the TrieNode | |
function TrieNode(key) { | |
// the "key" value will be the character in sequence | |
this.key = key; | |
This is a guide for Scala and Java development on Windows, using Windows Subsystem for Linux, although a bunch of it is applicable to a VirtualBox / Vagrant / Docker subsystem environment. This is not complete, but is intended to be as step by step as possible.
Read the entire Decent Security guide, and follow the instructions, especially:
Paul Buonopane [email protected] at NamePros
PGP: https://keybase.io/zenexer
I'm working on cleaning up this advisory so that it's more informative at a glance. Suggestions are welcome.
This advisory addresses the underlying PHP vulnerabilities behind Dawid Golunski's [CVE-2016-10033][CVE-2016-10033], [CVE-2016-10045][CVE-2016-10045], and [CVE-2016-10074][CVE-2016-10074]. It assumes prior understanding of these vulnerabilities.
This advisory does not yet have associated CVE identifiers.
<?php declare(strict_types=1); | |
require_once "✨.🐘"; | |
✨($_)->strlen("foo")->var_dump($_); |