Registered since September 28th, 2017
Has a total of 3739 bookmarks.
Showing top Tags within 17 bookmarks
Tag selected: rule.
Saved by uncleflo on April 15th, 2020.
Join Jeff Cote, from PYS, as he goes through the building blocks of a marine electrical system. Jeff will share the lessons learned from designing and installing thousands of boat electrical systems. Sign up for the PYS Newsletter: https://confirmsubscription.com/h/r/2... Jeff Cote is a systems design engineer and owner of Pacific Yacht Systems, a full service shop delivering marine electrical and navigation solutions for recreational boats. Visit the PYS website and blog for info and articles on marine electrical systems, projects and testimonials.
Saved by uncleflo on December 19th, 2019.
Photographer Max Siedentopf has a new project that examines one of the most boring types of photography: the passport photo. The series shows that even though passport photos need to be boring, the photo shoots themselves don’t.
Official passport photo requirements are extremely restrictive and specify the exact framing (centered with the subject facing straight on), lighting (a clear background with no shadow), and facial expression (no smiling). “It seems almost impossible for any kind of self-expression,” Siedentopf says. His project, titled Passport Photos, “tries to challenge these official rules by testing all the things you could be doing while you are taking your official document photo.”
passport pleasant smiling photo restrictive frame facial shoot centered expression photographer exact ordinary photography facing document extremely straight official challenge clear rule reality project requirement suggestion inspiration idea article
Saved by uncleflo on April 18th, 2019.
This calculator can be used for property purchases that are: for first-time buyers, replacing main residence, additional property, residential or non-residential, freehold or leasehold. The calculator will work out the SDLT payable for most transactions. You should check the guidance if you are uncertain about how SDLT applies to your purchase or if you believe it may qualify for a relief. There are different rules for a corporate body purchasing residential property for more than £500,000.
calculator property purchase buyer residence freehold transaction guidance money cost expenditure residential house home flat calculate HMRC tax land stamp service rule leasehold relief body corporate buy
Saved by uncleflo on December 20th, 2018.
Ever asked yourself "Where can't I fly my drone in the UK?" or "What does a Flight Restriction Zone mean?" NoFlyDrones.co.uk can help. Your free, easy to use tool showing no fly zones in the UK. We use the rules and regulations of the UK Air Navigation Order (CAP393) to present a simple graphical tool to aid safe flight planning for hobbyists and professional drone operators alike.
Saved by uncleflo on October 15th, 2018.
IIS URL Rewrite 2.1 enables Web administrators to create powerful rules to implement URLs that are easier for users to remember and easier for search engines to find. By using rule templates, rewrite maps, .NET providers, and other functionality integrated into IIS Manager, Web administrators can easily set up rules to define URL rewriting behavior based on HTTP headers, HTTP response or request headers, IIS server variables, and even complex programmatic rules. In addition, Web administrators can perform redirects, send custom responses, or stop HTTP requests based on the logic expressed in the rewrite rules.
Saved by uncleflo on June 22nd, 2018.
Well, first rule – you should not do this. But if there is good reason, consider using such query for searching in index-based arrays: SELECT * FROM table WHERE your_field_here REGEXP '.*;s:[0-9]+:"your_value_here".*' In case you have assoc array serialized you can use: SELECT * FROM table WHERE your_field_here REGEXP '.*"array_key_here";s:[0-9]+:"your_value_here".*' Of course it won’t be very fast but in small tables should be enough
Saved by uncleflo on January 24th, 2018.
This page describes the behavior of the reference client. The Bitcoin protocol is specified by the behavior of the reference client, not by this page. In particular, while this page is quite complete in describing the network protocol, it does not attempt to list all of the rules for block or transaction validity.
Saved by uncleflo on December 28th, 2017.
In computing, a comma-separated values (CSV) file stores tabular data (numbers and text) in plain text. Each line of the file is a data record. Each record consists of one or more fields, separated by commas. The use of the comma as a field separator is the source of the name for this file format. The CSV file format is not standardized. The basic idea of separating fields with a comma is clear, but that idea gets complicated when the field data may also contain commas or even embedded line-breaks. CSV implementations may not handle such field data, or they may use quotation marks to surround the field. Quotation does not solve everything: some fields may need embedded quotation marks, so a CSV implementation may include escape characters or escape sequences. In addition, the term "CSV" also denotes some closely related delimiter-separated formats that use different field delimiters. These include tab-separated values and space-separated values. A delimiter that is not present in the field data (such as tab) keeps the format parsing simple. These alternate delimiter-separated files are often even given a .csv extension despite the use of a non-comma field separator. This loose terminology can cause problems in data exchange. Many applications that accept CSV files have options to select the delimiter character and the quotation character.
csv text format data plain text line file record field comma separator description store exchange specification export database spreadsheet platform stream list information type sequence proprietary standard wikipedia development howto reference administration rule technology recommendation protocol
Saved by uncleflo on February 11th, 2015.
Anatomy Of A Perfect Landing Page. Although there is no exact formula to making a perfect landing page, there are some common rules of thumb to increase your chances of making a winning one. If you’re looking for ideas on where to start with your next landing page design, the infographic below is a great place to begin. And remember, after you build your first landing page you must continually test variations to improve your conversion metrics.
Saved by uncleflo on January 20th, 2015.
This article provides a simple positive model for preventing XSS using output escaping/encoding properly. While there are a huge number of XSS attack vectors, following a few simple rules can completely defend against this serious attack. This article does not explore the technical or business impact of XSS. Suffice it to say that it can lead to an attacker gaining the ability to do anything a victim can do through their browser. Both reflected and stored XSS can be addressed by performing the appropriate validation and escaping on the server-side. DOM Based XSS can be addressed with a special subset of rules described in the DOM based XSS Prevention Cheat Sheet. For a cheatsheet on the attack vectors related to XSS, please refer to the XSS Filter Evasion Cheat Sheet. More background on browser security and the various browsers can be found in the Browser Security Handbook.
hacking scripting prevention cheat sheet owasp cross XSS rule guideline properly attack vector explore technical browser business output escape ecode serious security model filter evasion ability impact defend information administration development howto reference
Saved by uncleflo on October 11th, 2014.
We need to tell Apache where and what to rewrite. You have two options here - more commonly, you can place the code in a .htaccess file. This is nothing more than a text file which when present in a directory will be interpreted by Apache. You may already be familiar with a .htaccess file, as these allow you set all kinds of server options, e.g. as a custom 404 error page. The other alternative is only available if you have root access and that is to place the code inside your httpd.conf. See load issues for more information. Throughout this tutorial, I am assuming you are using a .htaccess file in the root of your domain (i.e. http://example.com/.htaccess), unless otherwise stated.
module rewrite apache httpd lamp php linux rule condition setup configure guide url htaccess access web server engine host virtual website seo google index text tutorial configuration error link base pattern syntax howto
Saved by uncleflo on August 31st, 2013.
"Writing udev rules" by Daniel Drake (dsd) Version 0.74. The most recent version of this document can always be found at: http://www.reactivated.net/writing_udev_rules.html
Saved by uncleflo on August 31st, 2013.
The kernel can add or remove almost any device in a running system. Changes in the device state (whether a device is plugged in or removed) need to be propagated to userspace. Devices need to be configured as soon as they are plugged in and recognized. Users of a certain device need to be informed about any changes in this device's recognized state. udev provides the needed infrastructure to dynamically maintain the device node files and symbolic links in the /dev directory. udev rules provide a way to plug external tools into the kernel device event processing. This enables you to customize udev device handling by, for example, adding certain scripts to execute as part of kernel device handling, or request and import additional data to evaluate during device handling.
Saved by uncleflo on August 30th, 2013.
URL rewriting can be one of the best and quickest ways to improve the usability and search friendliness of your site. It can also be the source of near-unending misery and suffering. Definitely worth playing carefully with it - lots of testing is recommended. With great power comes great responsibility, and all that.
Saved by uncleflo on August 24th, 2013.
When we first designed targeted policy, we defined a domain that allowed users and administrators to login and have the same access privileges they would have had if SELinux was disabled. Similarly, we wanted to allow third party applications to be installed and run without requiring the administrator/user to write special policy rules for these applications. They would just work.
Saved by uncleflo on August 12th, 2013.
Walter Schloss, a legendary value investor who learned directly from Benjamin Graham, the father of value investing, never graduated from college and was hired as a runner on Wall Street in 1934, at the age of 18. Schloss enrolled in the New York Stock Exchange Institute, where he took courses from Benjamin Graham on how to value businesses, find value stocks, and manage money.
Saved by uncleflo on September 24th, 2012.
Whereas recognition of the inherent dignity and of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world, Whereas disregard and contempt for human rights have resulted in barbarous acts which have outraged the conscience of mankind, and the advent of a world in which human beings shall enjoy freedom of speech and belief and freedom from fear and want has been proclaimed as the highest aspiration of the common people, Whereas it is essential, if man is not to be compelled to have recourse, as a last resort, to rebellion against tyranny and oppression, that human rights should be protected by the rule of law, Whereas it is essential to promote the development of friendly relations between nations,
No further bookmarks found.