Delete mass files in Linux
When deleting mass files "/usr/bin/rm: arg list too long" You can delete it with the command below. Find. | xargs -n 1000 rm -f
When deleting mass files "/usr/bin/rm: arg list too long" You can delete it with the command below. Find. | xargs -n 1000 rm -f
There are many types of icons and splash images required for developing iPhones and Android apps. This size is used in Fire Monkey, so please change the number in other environments. I was in a hurry to lose the existing program ... ㅠㅠ 1. Graphicsmagick installation 2. Splash image creation placement file GM Convert -Resize "320x480^" -Gravity Center -crop "320x480+0+0" "%1" Splash_320x480.png GM Convert -Resize "426x320^" -Gravity ...
The location is obtained through the Geolocation function, and if it is a browser that is not related or supported, the location is obtained with the IPI through the API provided by Naver. Before use, get Naver's API key to the address below (https://www.ncloud.com/product/applicationService/geolocation) <? Function Makesignature ($ Secretkey, $ Method, $ Basestring, $ Timestamp, $ AccessKey) { $ space = '; $ newline = "\ n"; $ hmac = $ method. $ space. $ baseString. $ signaute = base64_encode (hash_hmac ('SHA256', $ HMAC, $ Secretkey, True)); return $ signaute; } if ($ _ POST ['ORDER'] == 'geolocation') { $hostNameUrl = 'https://geolocation.apigw.ntruss.com'; $requestUrl= '/geolocation/v2/geoLocation'; $accessKey...
Recently, there was an issue about SNI interception, creating and disclosing Secret DPI and Secret SNI, and there are many opinions on running multiple programs, so we can bypass DNS encryption and SNI with one program. And when the program is terminated, the DNS is automatically set, but in this process, there is a user environment that cannot be internet if it is not set manually.
How to empty a log with a large capacity. CAT /Dev /Null> Loga aka For reference, it's a way to find a big file size. Find ./* -Size +File Size
Server name indication (SNI) is a program that interferes with interception and alteration. Previously, the speed decreased when using the Secret DPI, GoodbyeedPi, and MTU settings. Only fragmentation is detected in SNI, and other packets are used normally. (1) Before running (2) After running Kilho.net is exposed before the program execution (1), but after execution (2), you can confirm that it is divided into LHO.NET ...
Copyright © 2001-2024 Kilho.net. All Rights Reserved.