-
Run the command:
python pixiv_auth.py login
This will open the browser with Pixiv login page.
See Also:
| Level | Score | Regex | Credit |
|---|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| copype amd64 D:\WinPE_amd64 | |
| Dism /Mount-Image /ImageFile:"D:\WinPE_amd64\media\sources\boot.wim" /Index:1 /MountDir:"D:\WinPE_amd64\mount" | |
| Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-WMI.cab" | |
| Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-WMI_en-us.cab" | |
| Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-NetFX.cab" | |
| Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\en-us\WinPE-NetFX_en-us.cab" | |
| Dism /Add-Package /Image:"D:\WinPE_amd64\mount" /PackagePath:"D |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| ARGS=1 | |
| E_BADARGS=65 | |
| TEM_FILE="/tmp/dict.tmp" | |
| if [ $# -ne "$ARGS" ] | |
| then | |
| echo "Usage:`basename $0` word" | |
| exit $E_BADARGS | |
| fi |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 原帖地址: http://topic.csdn.net/u/20110113/19/b0d5d506-4307-428b-a61d-7974aa66a2da.html | |
| 首先要说明的是:这里介绍的方法都是大部分是本人“悟”出来的,所以网上难有流传! | |
| 好方法不能自己私藏,否则就白忙乎这几天了,分享给有需要的朋友们。如果有转载,敬请注明来自*CSDN老邓*作品。 | |
| 呵呵,给自己打广告,实在是无耻之极,权当无聊之时打字之用。 | |
| 欢迎流传,为最优秀的分布式版本管理系统Git做宣传!! | |
| 步骤: | |
| 1. 下载:http://loaden.googlecode.com/files/gitconfig.7z | |
| 2. 解压到:<MsysGit安装目录>/cmd/,例如:D:\Program Files\Git\cmd |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| command -v mediainfo >/dev/null 2>&1 || { echo >&2 "mediainfo 命令不存在,请先安装 mediainfo。"; exit 1; } | |
| command -v ffmpeg >/dev/null 2>&1 || { echo >&2 "ffmpeg 命令不存在,请先安装 ffmpeg。"; exit 1; } | |
| out_size=24 | |
| length=$(mediainfo --Inform="Video;%Duration%" "$1") | |
| bitrate_all=$(echo "${out_size}*8192/(${length}/1000)" | bc) | |
| bitrate_audio_orig=$(mediainfo --Inform="Audio;%BitRate%" "$1") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| { | |
| "createBy": "http://liujiacai.net/gooreplacer/", | |
| "version": "3.9", | |
| "createAt": "Mon Nov 12 2018 12:22:14 GMT+0800 (China Standard Time)", | |
| "redirect-rules": [ | |
| { | |
| "src": "cdnjs.cloudflare.com", | |
| "kind": "wildcard", | |
| "dst": "cdnjs.loli.net", | |
| "enable": true |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| setInterval(function() { | |
| var childIframeArr = document.getElementsByTagName('iframe'); | |
| var newDocument = childIframeArr[0].contentWindow.document; | |
| var del = newDocument.getElementsByClassName("del del_btn author_display"); | |
| if (del.length > 0) { | |
| del[0].click(); | |
| setTimeout(function() { | |
| var del_yes = document.getElementsByClassName("qz_dialog_layer_btn qz_dialog_layer_sub"); | |
| if (del_yes.length > 0) { | |
| del_yes[0].click(); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 表格受密码保护时,我们修改数据Excel弹出“您试图更改的单元格或图表受保护,因而是只读的。 | |
| 若要修改受保护单元格或图表,请先使用‘撤消工作表保护’命令(在‘审阅’选项卡的‘更改’组中)来取消保护。 | |
| 可能会提示输入密码。这时候我们可以用VBA宏代码破解法来破解表格保护密码: | |
| 第一步:打开该文件,先解除默认的“宏禁用”状态,方法是点击工具栏下的“选项”状态按钮, | |
| 打开“Microsoft Office安全选项”窗口,选择其中的“启用此内容”,“确定” | |
| 再切换到“视图”选项卡,点击“宏”→“录制宏”,出现“录制新宏”窗口,在“宏名”定义一个名称为: | |
| PasswordBreaker,点击“确定”退出; | |
| 第二步:再点击“宏”→“查看宏”,选择“宏名”下的“PasswordBreaker”并点击“编辑”, | |
| 打开“Microsoft Visual Basic”编辑器,用如下内容替换右侧窗口中的所有代码: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| import re | |
| from urllib.request import urlopen | |
| url = 'https://its.pku.edu.cn/oper/liebiao.jsp' | |
| with urlopen(url) as response: | |
| the_page = response.read().decode('gbk') | |
| loc1 = the_page.find('netmask') |