start new:
tmux
start new with session name:
tmux new -s myname
| (function(open) { | |
| XMLHttpRequest.prototype.open = function(method, url, async, user, pass) { | |
| // Do some magic | |
| open.call(this, method, rewrittenUrl, async, user, pass); | |
| }; | |
| })(XMLHttpRequest.prototype.open); |
| #!/bin/bash | |
| # As the "bufferbloat" folks have recently re-discovered and/or more widely | |
| # publicized, congestion avoidance algorithms (such as those found in TCP) do | |
| # a great job of allowing network endpoints to negotiate transfer rates that | |
| # maximize a link's bandwidth usage without unduly penalizing any particular | |
| # stream. This allows bulk transfer streams to use the maximum available | |
| # bandwidth without affecting the latency of non-bulk (e.g. interactive) | |
| # streams. |
| <?php | |
| class DefaultController extends Controller | |
| { | |
| /** | |
| * Dashboard page. | |
| * @Permissions(perm="dashboard_view") | |
| * @Route("/", name="ITEDashboardBundle_index") | |
| * @Template() | |
| * @return array |
These are only examples, for a few very common actions. You are expected to write your own rules for the rest. The syntax is regular JavaScript, but see the polkit(8) manpage for the object structure and available API. These examples are for polkit versions 106 and later, with the JS interpreter. They won't work with Debian's polkit v105.
If you don't know the action name, either run pkaction and look for anything similar:
pkaction | grep cups
...or try to perform the actual action, cancel it, then look in your system logs:
journalctl -t polkitd -n 10 | grep action
This is my constantly updated CS:GO autoexec config. Changelogs can be found under revisions here
Put autoexec.cfg in ...\Steam\steamapps\common\Counter-Strike Global Offensive\csgo\cfg or take what you want from it and add to your autoexec config!
After the Wild West Simulator 2015 update, video.txt needs to be put in ...\Steam\userdata\<Steam3 ID>\730\local\cfg
| // /etc/polkit-1/rules.d/10-rules.rules | |
| // PolKit rules to allow mounting, rebooting and network management without a password. | |
| // User needs to be in storage, power and network groups. | |
| polkit.addRule(function(action, subject) { | |
| if (action.id.match("org.freedesktop.udisks2.") && subject.isInGroup("storage")) { | |
| return polkit.Result.YES; | |
| } | |
| }); |
I have managed to install this… and make it work. I implemented it for Facebook and Google, but you can extend it. My solution it is mostly as described in #116, with a bit of more code presented. The key aspects that lack in the #116 presentation (IMO) are:
oauth_user_provider in the security.yml with your custom created serviceHere are the steps:
routing.yml I have added all the routes for both bundles.config.yml mostly as it is presented in the HWIOAuthBundle.security.yml mostly as it is presented in the HWIOAuthBundle (though my routes are using /login pattern, not /connect). Also, the oauth_user_provider is set for my custom service.| import javax.net.ssl.SSLParameters; | |
| import javax.net.ssl.SSLSocket; | |
| import javax.net.ssl.SSLSocketFactory; | |
| import java.io.*; | |
| /** Establish a SSL connection to a host and port, writes a byte and | |
| * prints the response. See | |
| * http://confluence.atlassian.com/display/JIRA/Connecting+to+SSL+services | |
| */ | |
| public class SSLPoke { |
a minimal implementation
A demonstration of accepting unlimited-size uploads in PHP. The included
server.php pipes the POST body directly to /dev/null and returns a JSON
encoded hash of some useful stats. Using this method (streaming from stdin)
we are able to accept uploads of any size with little memory overhead.
Symlink apache config and reload