|
|
|
|
one of my modules silently edits the registry for a systemwide web proxy. i'm looking for a good solution that might change amazon pub-ids, adsense ids, and most importantly redirect according to what site they are visiting. i don't care about banking, i'm already grabbing passwords. i want to be able to dynamically inject javascript into every page they visit etc |
|
|
|
There are no conversations. |
|
|
|
|
Mitchell Baker |
We've broken the code base into logical chunks, called modules, and the foundation staff delegate authority for the modules to people with the most expertise. |
Lisa Gardner |
When it comes to locations, I'm one of those crazy authors who has to see it, touch it, taste it, before I trust myself to recreate it for my readers. Having said that, visiting a locked-down pediatric psych ward was the most intimidating research I've ever done - and I've visited maximum security prisons, shooting galleries, bone collections, etc. |
Mike Davidson |
If I was designing a web site for elementary school children, I might have a much higher percentage of older computers with outdated browsers since keeping up with browser and hardware technology has not traditionally been a strong point of most elementary schools. |
Chris Hadfield |
The International Space Station is a phenomenal laboratory, an unparalleled test bed for new invention and discovery. Yet I often thought, while silently gazing out the window at Earth, that the actual legacy of humanity's attempts to step into space will be a better understanding of our current planet and how to take care of it. |
Virchand Gandhi |
Jainism has two ways of looking at things: one called Dravyarthekaraya and the other Paryayartheka Noya. According to the Dravyarthekaraya view the universe is without beginning and end, but according to the Paryayartheka view we have creation and destruction at every moment. |
Darrell Issa |
Every ISP is being attacked, maliciously both from in the United States and outside of the United States, by those who want to invade people's privacy. But more importantly they want to take control of computers, they want to hack them, they want to steal information. |
Mike Davidson |
Our old site did not have very good support for the disabled, but our new site should soon have much better support. With all of our content in divs now, we can hide all but the relevant chunks of content and navigation with a simple alternate CSS file. |
Ralph Marston |
You've done it before and you can do it now. See the positive possibilities. Redirect the substantial energy of your frustration and turn it into positive, effective, unstoppable determination. |
Mick Jagger |
As long as my face is on page one, I don't care what they say about me on page seventeen. |
Jefferson Han |
In fiber optics, the cable is a light pipe or waveguide, into which you inject light. If a finger presses on the pipe, it disrupts that light within the waveguide. |
|
|
Scraping Every Product on Amazon to Make a Million Page Affiliate Site
|
|
|
|
now that my list of product ids is in the millions and ive used about 40gb of proxy bandwidth scraping maybe 50k pages from that data, i have to carefully weigh out how much i want to spend on proxies (spent about $30) on this experiment that could result in just a simple takedown notice to stop the method. granted i can always reuse and modify this data. but i guarantee if you had a million page site based directly around real ecommerce products you would make good money if it stays up
|
|
|
|
“What can I do?” My simple answer is, next time you see a problem, don’t start a cupcake company that gives back—just solve it. When you see a problem, think of a solution that is public, democratic, institutional, and universal. Think of a solution that solves the problem for everybody at the root. And then build movements.
|
|
|
|
Good ideas! It's a javascript numerical library for stuff like statistics and networks with a focus on performance.
This post is a comment.
|
|
|
|
How to tunnel Internet traffic over SSH in Windows
using free software This is a basic guide to SSH dynamic port forwarding. It is intended as an introduction to this technology for intermediate to advanced computer users in the hopes that it will be useful. It is not intended to be the best nor most comprehensive guide on the subject. I found a similar document here.
SSH is a protocol for secure (encrypted) communications, most commonly used for remote login sessions to the command line on v...
|
|
|
|
But i dont care about society. I care first and foremost about myself because I am willing to shed the unnecessary. After me comes my family but if my family isn't willing to shed the fat of american culture then theres only so much I can do. They dont have to live in a rain forest with me but if they want to I will help them.
This post is a comment.
|
|
|
|
its official. amazon manually reviewed my site and determined i had no original content lol. but. it did make a few bucks (that unfortunately i wont be seeing)
|
|
|
|
When trying to exploit some website using sqlmap, its a good idea to be anonymous. Sqlmap has excellent support for using common proxies or tor.
First start tor and ensure that it is running the socks5 daemon on port 9050. Then use the socks5 proxy with sqlmap as follows
# ./sqlmap.py --tor --tor-type=SOCKS5 -u "http://www.hackable.org/view_section.php?id=10" ...
This post is a comment.
|
|
|
|
Linux.org's DNS Got Hijacked
Linux.org reports: Wednesday afternoon around 5pm EST someone was able to get into the registrar account for our domain and point DNS to another server -- as well as lock us out from changing it. They pointed the domain name to a pretty rude page for most of the evening until Cloudflare stepped in and blocked the domain for us.
After a lot of back and forth with our registrar, we were able to get things back under our control. I'd like to point out that our serve...
|
|
|
|
But yeah... I guess not often enough. More importantly though -- don't clench your jaw and grind your teeth. Get a bite guard.
This post is a comment.
|
|