Tested in Mac OS X: super == command
Open/Goto
- super+t: go to file
- super+ctrl+p: go to project
- super+r: go to methods
| 'use strict'; | |
| module.exports = function(grunt) { | |
| // Project configuration. | |
| grunt.initConfig({ | |
| pkg: '<json:awesome.jquery.json>', | |
| banner: '/*! <%= pkg.title || pkg.name %> - v<%= pkg.version %> - ' + | |
| '<%= grunt.template.today("yyyy-mm-dd") %>\n' + | |
| '<%= pkg.homepage ? "* " + pkg.homepage + "\\n" : "" %>' + |
| # | |
| # blob : Object from MongoDB | |
| # | |
| # blob.body: Buffer | |
| # blob.size: length of buffer, substitute for blob.body.length | |
| # blob.type: MIME (Eg. audio/x-wav) | |
| # | |
| # req : Object from http | |
| # res : Object from http | |
| # _ : Object from underscore |
| <?php | |
| /* Plugin Name: Damn Vulnerable WordPress Plugin | |
| * Description: Intentionally vulnerable plugin for plugin author education | |
| * Version: 0.1 | |
| * Plugin URI: http://make.wordpress.org/plugins/2013/04/09/intentionally-vulnerable-plugin/ | |
| * Author: Jon Cave | |
| * Author URI: http://joncave.co.uk | |
| * License: GPLv2+ | |
| * | |
| * DO NOT RUN THIS PLUGIN ON AN INTERNET ACCESSIBLE SITE |
| # Assuming an Ubuntu Docker image | |
| $ docker run -it <image> /bin/bash |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
| function tableToJson(table) { | |
| var data = []; | |
| // first row needs to be headers | |
| var headers = []; | |
| for (var i=0; i<table.rows[0].cells.length; i++) { | |
| headers[i] = table.rows[0].cells[i].innerHTML.toLowerCase().replace(/ /gi,''); | |
| } | |
| // go through cells |
| #!/usr/bin/env python3 | |
| # pylint: disable=invalid-name | |
| """mbox-extract-attachments3 - Extract attachments from mbox files. | |
| Good companion for Google Takeout https://takeout.google.com/settings/takeout | |
| Modified by http://github.com/kellerza from | |
| https://github.com/PabloCastellano/pablog-scripts/ | |
| - Python3 & linter errors | |
| - New Filenames |
| require('crypto').randomBytes(48, function(err, buffer) { var token = buffer.toString('hex'); console.log(token); }); |