Verify Permissions
diskutil verifyPermissions /
Repair Permissions
diskutil repairPermissions /
function reloadCSS() { | |
const links = document.getElementsByTagName('link'); | |
Array.from(links) | |
.filter(link => link.rel.toLowerCase() === 'stylesheet' && link.href) | |
.forEach(link => { | |
const url = new URL(link.href, location.href); | |
url.searchParams.set('forceReload', Date.now()); | |
link.href = url.href; | |
}); |
import org.apache.log4j.Logger; | |
import org.springframework.expression.EvaluationContext; | |
import org.springframework.expression.spel.standard.SpelExpressionParser; | |
import org.springframework.security.access.expression.ExpressionUtils; | |
import org.springframework.security.access.expression.method.DefaultMethodSecurityExpressionHandler; | |
import org.springframework.security.access.expression.method.MethodSecurityExpressionHandler; | |
import org.springframework.security.util.SimpleMethodInvocation; | |
import java.lang.reflect.Method; |
@Bean | |
EmbeddedServletContainerCustomizer containerCustomizer( | |
@Value("${keystore.file}") Resource keystoreFile, | |
@Value("${keystore.pass}") String keystorePass) throws Exception { | |
String absoluteKeystoreFile = keystoreFile.getFile().getAbsolutePath(); | |
return (ConfigurableEmbeddedServletContainer container) -> { | |
if (container instanceof TomcatEmbeddedServletContainerFactory) { |
http://filippo.io/Heartbleed/ is a great service to the community.
I wouldn’t recommend testing hosts againt an online tool. All you do is create a log for a security savvy person with vulnerable hosts. While not quite the same, this is similar to uploading private keys or passwords to a service to check if they are secure.
Luckily it is easy to run the software locally, as the author was so kind to provide the source. I don’t read go very well, but a cursory glance suggests that the software does what it says on the tin, so we don’t worry about it phoning home.
This is the first time I’m building a go project, so I have to install go first. brew install go
is easily done. You can get binary distributions for your OS from the go homepage: https://code.google.com/p/go/downloads/list
#!/usr/bin/env python2 | |
""" | |
Author: takeshix <[email protected]> | |
PoC code for CVE-2014-0160. Original PoC by Jared Stafford ([email protected]). | |
Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP. | |
""" | |
import sys,struct,socket | |
from argparse import ArgumentParser |
uninstall
JetBrains settings:curl -sL https://gist.github.com/denji/9731967/raw/jetbrains-uninstall.sh | bash -s
backup
JetBrains settings:curl -sL https://gist.github.com/denji/9731967/raw/jetbrains-backup.sh | bash -s
// Just before switching jobs: | |
// Add one of these. | |
// Preferably into the same commit where you do a large merge. | |
// | |
// This started as a tweet with a joke of "C++ pro-tip: #define private public", | |
// and then it quickly escalated into more and more evil suggestions. | |
// I've tried to capture interesting suggestions here. | |
// | |
// Contributors: @r2d2rigo, @joeldevahl, @msinilo, @_Humus_, | |
// @YuriyODonnell, @rygorous, @cmuratori, @mike_acton, @grumpygiant, |