- http://stackoverflow.com/questions/804115 (
rebasevsmerge). - https://www.atlassian.com/git/tutorials/merging-vs-rebasing (
rebasevsmerge) - https://www.atlassian.com/git/tutorials/undoing-changes/ (
resetvscheckoutvsrevert) - http://stackoverflow.com/questions/2221658 (HEAD^ vs HEAD~) (See
git rev-parse) - http://stackoverflow.com/questions/292357 (
pullvsfetch) - http://stackoverflow.com/questions/39651 (
stashvsbranch) - http://stackoverflow.com/questions/8358035 (
resetvscheckoutvsrevert)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #! /bin/bash | |
| # ECHO COMMAND | |
| # echo Hello World! | |
| # VARIABLES | |
| # Uppercase by convention | |
| # Letters, numbers, underscores | |
| NAME="Bob" | |
| # echo "My name is $NAME" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| body { | |
| font-family: tahoma; | |
| color:#282828; | |
| margin: 0px; | |
| } | |
| .nav-bar { | |
| background: linear-gradient(-90deg, #84CF6A, #16C0B0); | |
| height: 60px; | |
| margin-bottom: 15px; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // ==UserScript== | |
| // @name AlliedModders Night Theme | |
| // @namespace github.com/rsKliPPy/ | |
| // @match https://forums.alliedmods.net/* | |
| // @version 1.3.0 | |
| // @downloadURL https://gist.githubusercontent.com/rsKliPPy/4d4281e6ac447b601958d2e6c4971c30/raw | |
| // @homepageURL https://github.com/rsKliPPy | |
| // @grant none | |
| // @run-at document-start | |
| // ==/UserScript== |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| @echo off | |
| :: This is not my code, the BadRabbit Ransomeware was posted on a following video: | |
| :: https://www.youtube.com/watch?v=Y6WOpE92vKc | |
| :: Idea for Petya Ransomeware was given on: | |
| :: https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/ | |
| :: I just made this to make it available easily. | |
| :: For BadRabbit | |
| type NUL > %windir%\cscc.dat |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import subprocess | |
| a = subprocess.check_output(['netsh', 'wlan', 'show', 'profiles']).decode('utf-8', errors="ignore").split('\n') | |
| a = [i.split(":")[1][1:-1] for i in a if "All User Profile" in i] | |
| for i in a: | |
| try: | |
| results = subprocess.check_output(['netsh', 'wlan', 'show', 'profile', i, 'key=clear']).decode('utf-8', errors="ignore").split('\n') | |
| results = [b.split(":")[1][1:-1] for b in results if "Key Content" in b] | |
| try: | |
| print ("{:<30}| {:<}".format(i, results[0])) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| To revert to a previous commit, ignoring any changes: | |
| git reset --hard HEAD |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000