This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// This is a dummy extension that prevents elision of "http" / "file" / subdomains | |
// from the omnibox by impersonating the "Suspicious Site Reporter" extension. | |
// Do not use this if you use the "Suspicious Site Reporter" extension. | |
// | |
// Usage: | |
// 1. Create a directory, e.g. "prevent-elision-in-locationbar" | |
// 2. Put the content of this file as "manifest.json" in that directory. | |
// 3. Visit chrome://extensions, choose the "Load Unpacked" button and select the directory. | |
// (OR use the --load-extension=path/to/prevent-elision-in-locationbar flag to load the extension) | |
// Result: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Interactive PoPToP install script on a OpenVZ VPS | |
# Tested on Debian 5, 6, and Ubuntu 11.04 | |
# 2011 v1.1 | |
# Author: Commander Waffles | |
# http://www.putdispenserhere.com/pptp-debian-ubuntu-openvz-setup-script/ | |
echo "######################################################" | |
echo "Interactive PoPToP Install Script for OpenVZ VPS" | |
echo "by Commander Waffles http://www.putdispenserhere.com" |