Skip to content

Instantly share code, notes, and snippets.

View wangjiezhe's full-sized avatar
🏠
Working from home

Jiezhe Wang wangjiezhe

🏠
Working from home
View GitHub Profile
@wangjiezhe
wangjiezhe / regex_golf.md
Created April 8, 2021 03:12 — forked from jonathanmorley/regex_golf.md
Best possible answers collected so far for [Regex golf](http://regex.alf.nu/). === WARNING: SPOILERS ===
@wangjiezhe
wangjiezhe / WinPE.cmd
Created May 2, 2020 13:58
制作 WinPE iso 文件
copype amd64 D:\WinPE_amd64
Dism /Mount-Image /ImageFile:"D:\WinPE_amd64\media\sources\boot.wim" /Index:1 /MountDir:"D:\WinPE_amd64\mount"
Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-WMI.cab"
Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-WMI_en-us.cab"
Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-NetFX.cab"
Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-NetFX_en-us.cab"
Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D
@wangjiezhe
wangjiezhe / cld
Created May 2, 2020 13:57
命令行查询有道词典
#!/bin/bash
ARGS=1
E_BADARGS=65
TEM_FILE="/tmp/dict.tmp"
if [ $# -ne "$ARGS" ]
then
echo "Usage:`basename $0` word"
exit $E_BADARGS
fi
原帖地址: http://topic.csdn.net/u/20110113/19/b0d5d506-4307-428b-a61d-7974aa66a2da.html
首先要说明的是:这里介绍的方法都是大部分是本人“悟”出来的,所以网上难有流传!
好方法不能自己私藏,否则就白忙乎这几天了,分享给有需要的朋友们。如果有转载,敬请注明来自*CSDN老邓*作品。
呵呵,给自己打广告,实在是无耻之极,权当无聊之时打字之用。
欢迎流传,为最优秀的分布式版本管理系统Git做宣传!!
步骤:
1. 下载:http://loaden.googlecode.com/files/gitconfig.7z
2. 解压到:<MsysGit安装目录>/cmd/,例如:D:\Program Files\Git\cmd
@wangjiezhe
wangjiezhe / To_25M.sh
Last active October 21, 2024 10:16
Convert video to 25M for wechat
#!/usr/bin/env bash
command -v mediainfo >/dev/null 2>&1 || { echo >&2 "mediainfo 命令不存在,请先安装 mediainfo。"; exit 1; }
command -v ffmpeg >/dev/null 2>&1 || { echo >&2 "ffmpeg 命令不存在,请先安装 ffmpeg。"; exit 1; }
out_size=24
length=$(mediainfo --Inform="Video;%Duration%" "$1")
bitrate_all=$(echo "${out_size}*8192/(${length}/1000)" | bc)
bitrate_audio_orig=$(mediainfo --Inform="Audio;%BitRate%" "$1")
{
"createBy": "http://liujiacai.net/gooreplacer/",
"version": "3.9",
"createAt": "Mon Nov 12 2018 12:22:14 GMT+0800 (China Standard Time)",
"redirect-rules": [
{
"src": "cdnjs.cloudflare.com",
"kind": "wildcard",
"dst": "cdnjs.loli.net",
"enable": true
setInterval(function() {
var childIframeArr = document.getElementsByTagName('iframe');
var newDocument = childIframeArr[0].contentWindow.document;
var del = newDocument.getElementsByClassName("del del_btn author_display");
if (del.length > 0) {
del[0].click();
setTimeout(function() {
var del_yes = document.getElementsByClassName("qz_dialog_layer_btn qz_dialog_layer_sub");
if (del_yes.length > 0) {
del_yes[0].click();
@wangjiezhe
wangjiezhe / gist:be5d554cb7ca99b07114267193d26828
Last active October 19, 2017 06:03 — forked from parano/gist:1868242
Excel表格密码保护的解除方法
表格受密码保护时,我们修改数据Excel弹出“您试图更改的单元格或图表受保护,因而是只读的。
若要修改受保护单元格或图表,请先使用‘撤消工作表保护’命令(在‘审阅’选项卡的‘更改’组中)来取消保护。
可能会提示输入密码。这时候我们可以用VBA宏代码破解法来破解表格保护密码:
第一步:打开该文件,先解除默认的“宏禁用”状态,方法是点击工具栏下的“选项”状态按钮,
打开“Microsoft Office安全选项”窗口,选择其中的“启用此内容”,“确定”
再切换到“视图”选项卡,点击“宏”→“录制宏”,出现“录制新宏”窗口,在“宏名”定义一个名称为:
PasswordBreaker,点击“确定”退出;
第二步:再点击“宏”→“查看宏”,选择“宏名”下的“PasswordBreaker”并点击“编辑”,
打开“Microsoft Visual Basic”编辑器,用如下内容替换右侧窗口中的所有代码:
@wangjiezhe
wangjiezhe / pku-pac.py
Created November 24, 2016 10:26
Pac for domestic ip in PKU
#!/usr/bin/env python
import re
from urllib.request import urlopen
url = 'https://its.pku.edu.cn/oper/liebiao.jsp'
with urlopen(url) as response:
the_page = response.read().decode('gbk')
loc1 = the_page.find('netmask')
--- r8168-8.042/src/r8168_n.c.orig 2016-08-22 14:22:48.694631079 +0800
+++ r8168-8.042/src/r8168_n.c 2016-08-22 14:24:53.279449184 +0800
@@ -4320,7 +4320,11 @@
features &= ~NETIF_F_ALL_TSO;
if (dev->mtu > ETH_DATA_LEN) {
features &= ~NETIF_F_ALL_TSO;
+#if LINUX_VERSION_CODE < KERNEL_VERSION(4,5,0)
features &= ~NETIF_F_ALL_CSUM;
+#else
+ features &= ~NETIF_F_CSUM_MASK;