npm init -y
Create a folder called src and add an empty index.js file. The code that webpack compiles goes in here including any Javascript modules and the main Tailwind file.
# Open a new kitty terminal window on MacOS | |
# | |
# 1. Copy this script into AppleScript Editor and save it somewhere | |
# 2. Use something like Apptivate to run the script on a global hotkey: | |
# http://www.apptivateapp.com/ | |
# | |
# Note this script doesn't work well as a Service through Automator as the | |
# "click menu" functionality requires accessibility privileges granted. | |
# Services run as the focused app, so that setup would require every context | |
# the shortcut is run from to have accessibility granted. |
#!/usr/bin/env bash | |
################################################################################ | |
# Script to initiate (or connect to) a tmux session | |
############################################################################### | |
# Starts session and returns, or attaches to existing session name and exits. | |
function tm_session { # session name | |
#echo tmux start-server | |
tmux start-server | |
#echo tmux has-session -t $1 |
// ==UserScript== | |
// @name Medium Paywall Bypass | |
// @namespace Violentmonkey Scripts | |
// @run-at document-start | |
// @match *://*.medium.com/* | |
// @match *://medium.com/* | |
// @match *://*/* | |
// @grant none | |
// @version 2.3 | |
// @inject-into content |
to check if the server works - https://webrtc.github.io/samples/src/content/peerconnection/trickle-ice | |
stun: | |
stun.l.google.com:19302, | |
stun1.l.google.com:19302, | |
stun2.l.google.com:19302, | |
stun3.l.google.com:19302, | |
stun4.l.google.com:19302, | |
stun.ekiga.net, | |
stun.ideasip.com, |
echo -e "\e[1;40m" ; clear ; while :; do echo $LINES $COLUMNS $(( $RANDOM % $COLUMNS)) $(( $RANDOM % 72 )) ;sleep 0.05; done|awk '{ letters="abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789@#$%^&*()"; c=$4; letter=substr(letters,c,1);a[$3]=0;for (x in a) {o=a[x];a[x]=a[x]+1; printf "\033[%s;%sH\033[2;32m%s",o,x,letter; printf "\033[%s;%sH\033[1;37m%s\033[0;0H",a[x],x,letter;if (a[x] >= $1) { a[x]=0; } }}' |
%a - The abbreviated weekday name (''Sun'') | |
%A - The full weekday name (''Sunday'') | |
%b - The abbreviated month name (''Jan'') | |
%B - The full month name (''January'') | |
%c - The preferred local date and time representation | |
%d - Day of the month (01..31) | |
%H - Hour of the day, 24-hour clock (00..23) | |
%I - Hour of the day, 12-hour clock (01..12) | |
%j - Day of the year (001..366) | |
%m - Month of the year (01..12) |
Good morning friends. As some of you might have seen, Discord released two new safety-related blog posts today! I'd highly recommend reading them both and sharing them with your communities. Wanted to give a little commentary on them as well, as someone familiar with these scams.
https://discord.com/blog/protecting-users-from-scams-on-discord
This is a blog acknowledging the recent surge in scams on Discord. Notably, it also mentions the FTC's report indicating an internet-wide surge in scams in 2021. It discusses general advice for both general users and for server admins and mods. It's a pretty good writeup, but it is missing some things.
"Why Would Someone Want Access to My Account?"