html {
font-family: "-apple-system", "Hiragino Sans GB", "Microsoft YaHei", "WenQuanYi Micro Hei", sans-serif
}
- 桌面端
- OSX 10.11+
San Francisco
百姓一道题,粗糙的路由轮子
index.js 中测试代码:
router.add('/a/:id', fn1);
router.add('/a/b', fn2);
生成的路由结构为:
'use strict'; | |
angular.module('Utils', []) | |
/** | |
* Transform a date to 'xxx days ago' | |
*/ | |
.filter('ago', function () { | |
return function (input) { |
Gmail-Air-Skin's rebirth.
Install it from http://userstyles.org/styles/99260/
/***** Fork me on Github *****/ | |
#fork-me-on-github { | |
opacity : 0.8; | |
background-color : #A00; | |
color : #FFF; | |
display : block; | |
position : fixed; | |
z-index : 10; | |
right : -6em; |
In today's cruel networked world, we're too often hampered behind (evil) company proxies that restricts how we can use the internet while at work, at a customers' place or even in some cases while at home or at friends'.
Not only do proxies restrict what you can do, what protocols that are accepted, what sites you can visit and what TCP ports that are let through, it also allows your company or friend to log and supervise you.
Note that even when you use HTTPS through the proxy, the server name is exposed so a logging proxy will see what HTTPS servers you connect to.
I'll show you some easy steps that help you circumvent the boundaries of most proxy setups, and that also will bring you more freedom and prevent peeking eyes to investigate your browsing habits!