Nimda Attack Log P Linux compatible. Takes any clf(common log format) or similar log file and parses it for nimda requests from an infected computer. With this info., it creates a webpage seperating the requests by monthly totals. Page is easily configured with commented variables. Great for server admins.
It is tutorial investigation of annihilation of cardiac rhythm of new block library simulink ,Block Heart VI1,by changing sinus parameters and inducing annihilation of cardiac rhythm,meaning that sudden death can be caused by electrical party.
Processing center allowing cash accepting POS terminals to clear the payments with the service providers. Typically in kiosk scenarios allowing the customers to pay mobile phone recharges and communal charges.
AttackTreeMonkey is an XSLT script that calculates values in an attack tree (using Libxslt or Saxon) and outputs XHTML. Attack trees are a way of modelling security systems and how they fail (see Bruce Schneier in Dr Dobbs Journal; 1999).
Cash Bar Script is a professional custom "Get Paid To Surf" and "Get Paid To Receive Email" site. Most of you already know how these sites work. Members download a 'banner bar' that displays advertisements on their computer....
Our cash randomizer is a great money generating site that is Multi-Level-Marketing based.
This MLM site requires members to join after they pay other members and the admin based on a three tier system.
Upon receipt of all...
This is a hack to get around the read-only nature of __closure__ on function objects. Watch your step!
Does not require multiprocessing, easy to hack, maybe not optimal but did the job for a make like tool I wrote.
I'm a hack programmer -- no formal education. So, I don't know if this is technically a "factory", "abstract factory" or something else.
It is a way to generate a class dynamically, perhaps based on run-time...
This is a quick-hack module I wrote up in a couple of hours that allows for a nicer syntax to build up struct-like binary packing and unpacking. The point was to get it to be concise and as C-like as possible. This script requires python3 for it's...
This useless hack allows normal functions to be attached to a 'ThunkSpace' which causes the function to be lazily evaluated when the thunk is referenced. It is just a experiment using closures and descriptors to try and change python function call...
this is a hack to get the "foo" module that's outside a package whithin a file of the package, when it also contains a module named "foo" (ie relative imports)
This hack allows you to add a cookie/header to a SOAPpy request. It uses a keyword args all-through to pass your own transports down to the SOAPpy core. It uses the ClientCookie module to store the cookies generated and/or to send the cookies.
Just a little bit of hack: a linear equations solver using eval and built-in complex numbers:
>>> solve("x - 2*x + 5*x - 46*(235-24) = x + 2")
Hack a class's __init__ method without subclassing the class
because a) you can't modify the original class and b) you can't modify other
classes already using the first class. This is a gross hack that should only
be used to work...
A hack to quickly replace multiple
characters/strings in a string with
characters from another string.
COCLICO Petits commerces, cash register machine software (POS software) for small retail businesses and shops. COCLICO Petits commerces can manage numerous counters using a web based network architecture. Based on Open Source softwares (Apache,...
Users can use this script and modify their TinyMCE editor to support CSS classes and ids in their RTE editor.
A bar will be added to...
This function uses frequency analysis to attack and decode messages
encoded using a /substitution cipher/ which exchanges each letter of the
alphabet for another. Unlike the famous "Caesar Shift" cipher, which
This mfile simulates the outcome of an attack in the risk game. The number of attackers and defenders may be specified by the user.