[Edit: If it doesn't work anymore, go to https://wmealing.github.io/sending-email-in-common-lisp.html]
Autoriser les applications moins sécurisées
Dans Google, paramètres du compte, sécurité
use cl-smpt library
(ql:quickload :cl-smtp)
[Edit: If it doesn't work anymore, go to https://wmealing.github.io/sending-email-in-common-lisp.html]
Autoriser les applications moins sécurisées
Dans Google, paramètres du compte, sécurité
use cl-smpt library
(ql:quickload :cl-smtp)
This is a quick-and-dirty guide to setting up a Raspberry Pi as a "router on a stick" to PrivateInternetAccess VPN.
Install Raspbian Jessie (2016-05-27-raspbian-jessie.img
) to your Pi's sdcard.
Use the Raspberry Pi Configuration tool or sudo raspi-config
to:
;;; cobol-mode.el --- Mode for editing COBOL code -*- lexical-binding: t; -*- | |
;; Copyright (C) 2013-2017 Edward Hart | |
;; Author: Edward Hart <[email protected]> | |
;; Maintainer: Edward Hart | |
;; Version: 1.0.0 | |
;; Created: 9 November 2013 | |
;; Keywords: languages |
http://carnal0wnage.attackresearch.com/ | |
http://www.mcgrewsecurity.com/ | |
http://www.gnucitizen.org/blog/ | |
http://www.darknet.org.uk/ | |
http://www.spylogic.net/ | |
http://taosecurity.blogspot.com.br/ | |
http://www.room362.com/ | |
http://blog.sipvicious.org/ | |
http://blog.portswigger.net/ | |
http://pentestmonkey.net/blog |
Please refer to:
-module(encode_uri_rfc3986). | |
-author('Renato Albano <[email protected]>'). | |
-export([encode/1]). | |
%% Taken from <http://erlangexamples.com/>, | |
%% from <http://github.com/CapnKernul/httparadise> | |
%% and <http://www.erlang.org/doc/man/edoc_lib.html> | |
encode([C | Cs]) when C >= $a, C =< $z -> |
(defn new-q [] (java.util.concurrent.LinkedBlockingDeque.)) | |
(defn offer! | |
"adds x to the back of queue q" | |
[q x] (.offer q x) q) | |
(defn take! | |
"takes from the front of queue q. if q is empty, block until something is offer!ed into it" | |
[q] (.take q)) |
# Copyright (C) 2011 Alessandro Ghedini <[email protected]> | |
# Updated 2012 by Mike Perry to extract syscall table addresses | |
# Updated 2014 by Francis Brosnan Blázquez to check for ia32 support | |
obj-m += noptrace2.o | |
KERNEL_VER=$(shell uname -r) | |
SCT := $(shell grep " sys_call_table" /boot/System.map-$(KERNEL_VER) | awk '{ print $$1; }') | |
SCT32 := $(shell grep "ia32_sys_call_table" /boot/System.map-$(KERNEL_VER) | awk '{ print $$1; }') |