Skip to content

Instantly share code, notes, and snippets.

# mount.cifs
mount.cifs //hayley-pc/hayley /mnt/hayley -o credentials=/root/.cifscreds,uid=$(id -u hayley),gid=$(id -g hayley)
# /etc/fstab
echo //hayley-pc/hayley /mnt/hayley cifs credentials=/root/.cifscreds,uid=$(id -u hayley),gid=$(id -g hayley) 0 0
hayley@debian:~$ cat /etc/systemd/system/mnt-hayley.mount
[Unit]
Description=cifs mount script
Requires=network-online.target
After=network-online.service
const fs = require('fs');
const xmlstr = fs.readFileSync('BingConfiguration\\BingConfiguration_common.xml').toString();
const m = xmlstr.match(/[a-z\.]+\.com/ig);
const hosts = [ ];
for (let index = 0; index < m.length; index++) {
const element = m[index];
console.clear();
DOC_COMMENT = '\n/// ';
arr = [ ]
document.body.querySelectorAll('tbody tr').forEach((tr, index, list) => {
const td0 = tr.children[0];
const td1 = tr.children[1];
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Directory]
@="File Folder"
"AlwaysShowExt"=""
"EditFlags"=hex:d2,01,00,00
"FriendlyTypeName"=hex(2):40,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,\
00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,\
32,00,5c,00,77,00,69,00,6e,00,64,00,6f,00,77,00,73,00,2e,00,73,00,74,00,6f,\
00,72,00,61,00,67,00,65,00,2e,00,64,00,6c,00,6c,00,2c,00,2d,00,31,00,30,00,\
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Run as SYSTEM]
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Run as SYSTEM\Command]
@="C:\\Users\\hayley\\Pogram\\advancedrun-x64\\AdvancedRun.exe /EXEFilename \"%1\" /RunAs 4 /Run"
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Directory\Background\shell\VSCode]
"Icon"="\"C:\\Users\\hayley\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\""
@="VS Code"
[HKEY_CLASSES_ROOT\Directory\Background\shell\VSCode\command]
@="\"C:\\Users\\hayley\\AppData\\Local\\Programs\\Microsoft VS Code\\Code.exe\" \"%V\""
Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\Directory\Background]
[HKEY_CLASSES_ROOT\Directory\Background\shell]
[HKEY_CLASSES_ROOT\Directory\Background\shell\cmd]
@="@shell32.dll,-8506"
"NoWorkingDirectory"=""
"Icon"="\"C:\\WINDOWS\\system32\\cmd.exe\""
getTitles = () => {
return $$('.info [itemprop="name"]').map((el) => el.title);
};
season = document.querySelector('#bySeason').selectedOptions[0].textContent.trim();
obj = {};
if (localStorage.getItem('aci')) {
obj = JSON.parse(localStorage.getItem('aci'));
{"1":["Racing the Storm","Unlocking Disaster","Flying Blind","Flying on Empty","Cutting Corners","Fire on Board"],"2":["Blow Out","A Wounded Bird","The Killing Machine","Deadly Crossroads","Lost","Missing Over New York"],"3":["Crash of the Century","Hanging by a Thread","Attack Over Baghdad","Out of Control","Fight for Your Life","Bomb on Board","Mistaken Identity","Helicopter Down","Death and Denial","Kid in the Cockpit","Collision Course","Ocean Landing","Head on Collision","Runaway Train"],"4":["Miracle Escape","Falling from the Sky","Fire Fight","Missed Approach","Hidden Danger","Panic Over the Pacific","Out of Sight","Fog of War","Vertigo","Ghost Plane"],"5":["Invisible Killer","Behind Closed Doors","Gimli Glider","Dead Weight","Fanning the Flames","Southern Storm","Explosive Evidence","Mixed Signals","Fatal Distraction","Phantom Strike"],"6":["Ripped Apart","Fatal Flaw","Who's Flying the Plane?"],"7":["Scratching the Surface","Lockerbie Disaster","Blown Apart","Sight Unseen","Operation Babylift","Fallin
@hayleyxyz
hayleyxyz / dumb lowercase alphanumeric random string generator.js
Created January 28, 2022 16:54
dumb lowercase alphanumeric random string generator.js
const rnd = (len) => {
let ret = '';
while(ret.length < len) {
ret += Math.floor(Math.random() * Math.pow(36, Math.min(len, 32))).toString(36);
}
return ret.substring(0, len);
};