Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
#------------ Add path to system variable ------------------------------------- | |
$path2add = ';C:\path;' | |
$systemPath = [Environment]::GetEnvironmentVariable('Path', 'machine'); | |
If (!$systemPath.contains($path2add)) { | |
$systemPath += $path2add | |
$systemPath = $systemPath -join ';' | |
[Environment]::SetEnvironmentVariable('Path', $systemPath, 'Machine'); | |
write-host "Added to path!" |
Well, there are some vendor locked dongles out there (I'm looking at you Panasonic!) that use regular off-the-shelf chips but cost a lot of money and not $5 that they're really worth. E.g. there's the AJ-WM50E dual band AC dongle (sold for 160 USD) that you should use with AG-UX180 camera to get wifi CCU running.
I happen to have one such dongle, couple of summer holiday nights and family far, far away. Why not do some hacking then?
The camera is - as far as I can tell - running Linux or a similar system. If so, it has a limited set of tools to get to know what's getting connected to it.
Make the not-so-Panasonic dongle resemble the Panasonic one as much as possible, so that the camera just enables it thinking it's legit.