/chrisallenlane/cheat/raw/master/cheat/autocompletion/cheat.bash
# mv cheat. Bash /etc/bash_completion. D/
Note: The team has uploaded automatic completion scripts for other interpreters on Git, which can be cloned and used on different interpreters. Use the links below to find the automatic completion
to this feature, simply clone the 'cheat.bash' script down and copy it to your system's correct path.
# wget Https://github.com/chrisallenlane/cheat/raw/master/cheat/autocompletion/cheat.bash
# MV Cheat.bash/etc/bash_completion.d/
Note: The team has uploaded automatic completion scripts for other interpreters on Git, which can be cloned and use
Reprinted from: http://blog.csdn.net/haoel/archive/2009/10/28/4737425.aspxOriginal link: http://coolshell.cn /? P = 1561 (cool shell)
Do you often forget some function names or attribute names in CSS? At that time, you must think that if you have a cheat sheet at hand, you can do that. Of course, this "cheat
This article is a translated version of the XSS defense Checklist Https://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_SheetIntroductionThis article describes a simple positive pattern that properly uses output transcoding or escaping (encoding or escaping) to defend against XSS attacks.Despite the huge amount of XSS attacks, following some simple rules can completely prevent this kind of serious attack.This article does not discuss the commercial and technical impact
achieved through here Document:See the following shell script for details:#!/bin/shif["$#"!="6"] ; Then Echo"Usage $ db_host db_port db_name table_name db_user db_passwd"Exit1fidb_host=$1db_port=$2db_name=$3table_name=$4db_user=$5db_passwd=$6Last_day= ' date-d"1 day Ago" "+%y%m%d"' Mysql-h $db _host-p $db _port-u $db _user $db _name-p $db _passwd_New like $table _name; Rename table $table _name to ${table
custom implementation.
Escape MisunderstandingIt's not that it's absolutely safe after escaping, for example1 The following code can be executed in Content-type as an XHTML document2 The following code, Escape is lost, interface execution can draw any DOM
Common Security methodsIt is generally assumed that InnerText does not execute code and can mitigate XSS attacks instead of innerHTML, but also relies on tags, and the following example can execute code
Dom b
Here you find my custom XSS and CSRF cheat sheet. I know that there are running good cheat sheets out there, but since some of them are offline from time to time, I decided to create a little collection of useful XSS stuff. I added some stuff from other well known cheat sheets (e.g. from http://ha.ckers.org/xss.html),
Tags: statement upd dealloc ace http int form Insert backPostgreSQL Cheat Sheet CREATE DATABASEDbName;CREATE TABLE (with auto numbering integer ID)TableName (
ID serial PRIMARY KEY,
name varchar () UNIQUE not NULL,
dateCreated timestamp DEFAULT current_timestampADD a primary keyTableName ADD PRIMARY KEY (ID);Create an INDEXIndexName On TableName (ColumnNames);Backup a Database(command line) DbName dbName
Easily use the "Explain Shell" script to understand Shell commands
When we work on Linux, everyone will find the help information of shell commands. Although built-in help such as man pages And whatis commands are helpful, the output of man pages is very lengthy unless it is a person with Linux experience, otherwise, i
administrative files are text files that can be edited directly, most of which are in the standard directory:/etc. We write shell scripts most of the time are processing text information, and the pipeline can be used in order to be connected to the use of ... ... | ... In this way, the book has an example of a passwd file with 5 tubes attached to it. Then a script was written to convert the text into an HT
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.