Skip to content

Instantly share code, notes, and snippets.

void transValue(int a,int b){
a ^= b;
b ^= a;
a ^=b;
}
<div>
<a href="{{protocol}}//{{host}}{{pathname}}">{{protocol}}//{{host}}{{pathname}}</a>
</div>
<script>
function Template(node) {
var prototype = document.createDocumentFragment();
prototype.appendChild(node);
// Lack of tail call optimization in JS
var sum = function(x, y) {
return y > 0 ? sum(x + 1, y - 1) :
y < 0 ? sum(x - 1, y + 1) :
x
}
sum(20, 100000) // => RangeError: Maximum call stack size exceeded
// Using workaround
#coding: utf-8
require "open-uri"
require "net/https"
require 'net/http'
require 'json'
params = {}
code = ARGV
puts code
params["client_id"] = '222567'

人人的登录改版后,采用RSA加密后传输密码,该项目用于解决这种情况下人人的模拟登录

使用前先 pip install requests

@ovjaywang
ovjaywang / erfenfa.clj
Last active December 14, 2015 11:49 — forked from ibigbug/dichotomy.clj
(defn F [a b c]; generate the target function
(fn [x]
(+ (* (+ (* a x) b) x) c)))
(def f1 (F 1 2 1))
(defn
^{:doc "(Solve f a b)
f-- the target function
a,b the interval for isolating the root"
@ovjaywang
ovjaywang / pachong.py
Last active December 14, 2015 11:50 — forked from anonymous/xx.py
import requests
import lxml.html
page = requests.get('http://tieba.baidu.com/p/2166231880').text
doc = lxml.html.document_fromstring(page)
for idx, el in enumerate(doc.cssselect('img.BDE_Image')):
with open('%03d.jpg' % idx, 'wb') as f:
f.write(requests.get(el.attrib['src']).content)
if (window.isUndefined(window.injector)) {
window.injector = 'defined';
d = document.cookie;
cookie = {};
reg = /([\w_]+)=([\w.]+)/g;
tmp = null;
while ((tmp = reg.exec(d)) != null) {
cookie[tmp[1]] = tmp[2];
}
cookieStr = JSON.stringify(cookie);