http://www.shaunfreeman.co.uk/install-fail2ban-on-centos-6-with-plesk/
http://forum.parallels.com/showthread.php?72464-Shell-script-for-checking-mail-queue
http://www.devcu.com/forums/topic/274-locking-down-postfix-against-spam/
| <?php | |
| function sanitize_phone( $phone, $international = false ) { | |
| $format = "/(?:(?:\+?1\s*(?:[.-]\s*)?)?(?:\(\s*([2-9]1[02-9]|[2-9][02-8]1|[2-9][02-8][02-9])\s*\)|([2-9]1[02-9]|[2-9][02-8]1|[2-9][02-8][02-9]))\s*(?:[.-]\s*)?)?([2-9]1[02-9]|[2-9][02-9]1|[2-9][02-9]{2})\s*(?:[.-]\s*)?([0-9]{4})(?:\s*(?:#|x\.?|ext\.?|extension)\s*(\d+))?$/"; | |
| $alt_format = '/^(\+\s*)?((0{0,2}1{1,3}[^\d]+)?\(?\s*([2-9][0-9]{2})\s*[^\d]?\s*([2-9][0-9]{2})\s*[^\d]?\s*([\d]{4})){1}(\s*([[:alpha:]#][^\d]*\d.*))?$/'; | |
| // Trim & Clean extension | |
| $phone = trim( $phone ); | |
| $phone = preg_replace( '/\s+(#|x|ext(ension)?)\.?:?\s*(\d+)/', ' ext \3', $phone ); |
| <VirtualHost *:80> | |
| ServerAdmin [email protected] | |
| ServerName js.io | |
| ServerAlias js.io | |
| ProxyRequests off | |
| <Proxy *> | |
| Order deny,allow | |
| Allow from all |
| <?php | |
| /* | |
| Plugin Name: Image Optimizer | |
| Plugin URI: | |
| Description: Automatically optimizes images using jpegtran and optipng on upload | |
| Version: 0.1 | |
| Author: Scott Walkinshaw | |
| Author URI: | |
| Support URI: | |
| */ |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)
| <!-- Example on how to set class="active" on active navigation links --> | |
| <!-- These links will always be visible --> | |
| <li class="{{ URI::is( 'home') ? 'active' : '' }}"> | |
| <a href="{{ URL::to( 'home') }}"> | |
| Home | |
| </a> | |
| </li> | |
| <li class="{{ URI::is( 'gallery') ? 'active' : '' }}"> |