Protected: git
There is no excerpt because this is a protected post.
Protected: nmap
There is no excerpt because this is a protected post.
Protected: nmap-table
There is no excerpt because this is a protected post.
Protected: do-droplets
There is no excerpt because this is a protected post.
chrome extension
mkdir real` without` keyboard` browsing cd ‘.\reactNative fullstack\’ ni popup.html ni popup.js ni manifest.json vim manifest.json ______________________________________________________________ // put a manifest like this: { “manifest_version”: 2, “name”: “GTmetrix Analyzer Plugin”, “description”: “This extension will analyze a page using GTmetrix”, “version”: “1.0”, “browser_action”: { “default_icon”: “icon.png”, “default_popup”: “popup.html” }, “permissions”: [ “activeTab” ] } ______________________________________________________________ vim […]
tinyMCE
// get the content of tinyMCEed textarea and put it into previewText to send by myself let mainTextarea = $(this).prevAll(“textarea”); let mainTextareaID = $(mainTextarea).attr(‘id’); tinyMCE.get(mainTextareaID).focus(); let previewText = tinyMCE.activeEditor.getContent(); $(‘#text’).val(previewText); $(‘#editDay_submit’).click();
Protected: editor shortcuts
There is no excerpt because this is a protected post.
Useful websites for programmers
When learning CS, there are some useful sites you must know to get always informed to do your technologies even better and learn new things. Here is a non-exhaustive list of massive sites you should visit. This list will get updated as soon as I can get another link, but you can also contribute by […]
how to start hacking?
I’d like to learn how to hack, how do I start? This question has been asked and answered many times. We’ll summarize the opinion of our fellow redditors, but we encourage you check on every thread and read every single answer. Define your interests You really need to decide what area you are interested in. […]
How To Send Fake Mail Anonymously Using SETOOLKIT [Kali Linux]
The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security elements such as firewalls, IDS/IPS, proxies, and honey pots deployed inside every organization, we hear news about how hackers compromise secured facilities of the government or ofprivate organizations because of the human element involved […]