1. Куча / Говнокод #19614

    0

    1. 01
    2. 02
    3. 03
    4. 04
    5. 05
    6. 06
    7. 07
    8. 08
    9. 09
    10. 10
    11. 11
    12. 12
    13. 13
    14. 14
    15. 15
    16. 16
    17. 17
    18. 18
    19. 19
    20. 20
    21. 21
    22. 22
    23. 23
    24. 24
    objNewFile.WriteLine "	if (!table.nodeType) table = document.getElementById(table)"
    objNewFile.WriteLine "	var ctx = {worksheet: name || 'Worksheet', table: table.innerHTML}"
    objNewFile.WriteLine "	window.location.href = uri + base64(format(template, ctx))"
    objNewFile.WriteLine "}"
    objNewFile.WriteLine "})()"
    objNewFile.WriteLine "</script>"
    objNewFile.WriteLine "<input type=""button"" onclick=""tableToExcel('table1', 'Export data')"" value=""Export data to Excel"">"
    	
    objNewFile.WriteLine "<table id=""table1"" BORDER=""1"" width=""100%"">" 
    objNewFile.WriteLine "<tr><th width=""2%"">id</th><th>Computer</th><th>AV Name</th><th>AV Status</th><th>AV Bases</th><th>Host Status</th></tr>"
    
    for each comp in comps 
    	compid = compid + 1 
    		
    	Set WshShell = WScript.CreateObject("WScript.Shell")
    	Ping = WshShell.Run("ping -n 1 " & comp, 0, True)
    	Select Case Ping
    	Case 0
    		On Error Resume next 
    		Set oWMI = GetObject("winmgmts:\\" & comp & "\root\SecurityCenter2") 
    		On Error Resume next 
    		Set colAVItems = oWMI.ExecQuery("Select * from AntiVirusProduct") 
    		If colAVItems.count = 0 Then 
    			objNewFile.WriteLine "<tr><th>" & compid & "</th><th>" & comp & "</th><th><font color=""red"">No AntiViruses found</font></th><th><font color=""red"">Disabled</font></th><th><font color=""red"">NOT Up to Date</font></th><th><font color=""green"">Online</font></th></tr>"

    И это висит на главной Волан-де-сайта!

    gost, 12 Марта 2016

    Комментарии (0)
  2. Куча / Говнокод #19583

    +8

    1. 1
    TOO_ENOUGH_DATA

    3_14dar, 06 Марта 2016

    Комментарии (2)
  3. Куча / Говнокод #19570

    +4

    1. 01
    2. 02
    3. 03
    4. 04
    5. 05
    6. 06
    7. 07
    8. 08
    9. 09
    10. 10
    #!/bin/bash
    echo "(find-file \"$1\")" >> ~/.emacs.d/cmdfile
    
    В emacs периодически дергается
    
    (defun read-cmd-file ()
      (load-file "~/.emacs.d/cmdfile")
      (delete-file "~/.emacs.d/cmdfile"))
    
    (run-with-idle-timer 1 t 'read-cmd-file)

    гуру emacs ЛОРа

    CHayT, 03 Марта 2016

    Комментарии (8)
  4. Куча / Говнокод #19568

    −1

    1. 1
    https://drive.google.com/file/d/0B9WcAoQS5ukUZ1NMQkxMdXBSMWM/view?usp=sharing

    Many-To-One PHP edition.

    хуита, 03 Марта 2016

    Комментарии (0)
  5. Куча / Говнокод #19553

    −3

    1. 1
    2. 2
    3. 3
    >ipconfig   | find "IP"
    ═рёЄЁющър яЁюЄюъюыр IP фы  Windows
            IP-рфЁхё  . . . . . . . . . . . . : 192.168.1.60

    ЧЗХ (кодировка)?

    3_14dar, 01 Марта 2016

    Комментарии (58)
  6. Куча / Говнокод #19550

    +4

    1. 1
    2. 2
    3. 3
    4. 4
    5. 5
    6. 6
    7. 7
    8. 8
    9. 9
    // Итальянский код
    
    if (...) {
       ...
    } else {
       ...
    } elsinio {
       ...
    }

    3_dar, 29 Февраля 2016

    Комментарии (5)
  7. Куча / Говнокод #19548

    +2

    1. 01
    2. 02
    3. 03
    4. 04
    5. 05
    6. 06
    7. 07
    8. 08
    9. 09
    10. 10
    11. 11
    12. 12
    13. 13
    boost_include_path_list = \
        "/usr/local/include/" \
        "/usr/local/boost_1_57_0/" \
        "C:\\boost_1_59_0\\" \
        "C:\\Program Files (x86)\\boost_1_57_0\\"
    
    for(path, boost_include_path_list) {
        exists($$path) {
            boost_include_path = $$path
        }
    }
    
    INCLUDEPATH += $$boost_include_path

    qmake, кроссплатформенность

    Xom94ok, 29 Февраля 2016

    Комментарии (13)
  8. Куча / Говнокод #19546

    0

    1. 1
    2. 2
    3. 3
    4. 4
    Ку всем
    Посоны
    Как привязать БД для авторизации к html странице?
    Не php а html

    Написал мне Вася Пупкин, дипломированный специалист в области информационных технологий

    kegdan, 29 Февраля 2016

    Комментарии (39)
  9. Куча / Говнокод #19542

    +1

    1. 1
    Верните мой WCT!

    d_fomenok, 27 Февраля 2016

    Комментарии (54)
  10. Куча / Говнокод #19541

    0

    1. 01
    2. 02
    3. 03
    4. 04
    5. 05
    6. 06
    7. 07
    8. 08
    9. 09
    10. 10
    11. 11
    12. 12
    13. 13
    14. 14
    15. 15
    16. 16
    17. 17
    18. 18
    19. 19
    20. 20
    21. 21
    22. 22
    23. 23
    24. 24
    25. 25
    26. 26
    27. 27
    28. 28
    29. 29
    30. 30
    31. 31
    32. 32
    33. 33
    34. 34
    35. 35
    36. 36
    37. 37
    38. 38
    39. 39
    40. 40
    41. 41
    42. 42
    43. 43
    44. 44
    45. 45
    46. 46
    47. 47
    48. 48
    49. 49
    50. 50
    51. 51
    52. 52
    53. 53
    54. 54
    55. 55
    56. 56
    57. 57
    58. 58
    59. 59
    60. 60
    61. 61
    62. 62
    63. 63
    64. 64
    65. 65
    66. 66
    67. 67
    68. 68
    69. 69
    70. 70
    71. 71
    72. 72
    73. 73
    74. 74
    75. 75
    76. 76
    77. 77
    78. 78
    79. 79
    80. 80
    81. 81
    82. 82
    83. 83
    84. 84
    85. 85
    86. 86
    87. 87
    88. 88
    // Private method of server, which dispatches active incoming connection.
    // Function receives address string and uses it as key to retrieve cached connection.
    // Fetched connection is getting read by bufio.Reader, parsed to header and data string if it's size was pointed in header.
    // Next, the parsed data handles by protocol and writes a response message.
    // The process turns in loop until whether input stream will get an EOF or an error will be occurred.
    // In the last case it will be return some error message to a client.
    // Anyway, at the end connection will be broken up.
    func (server *Server) dispatch(address string) {
    	defer server.free_chan()
    	if server.Stat.Connections[address] != nil {
    		server.Stat.Connections[address].State = "conn_new_cmd"
    	}
    	connection := server.connections[address]
    	connectionReader := bufio.NewReader(connection)
    	// let's loop the process for open connection, until it will get closed.
    	for {
    		// let's read a header first
    		if server.Stat.Connections[address] != nil {
    			server.Stat.Connections[address].State = "conn_read"
    		}
    		received_message, n, err := readRequest(connectionReader, -1)
    		if err != nil {
    			if server.Stat.Connections[address] != nil {
    				server.Stat.Connections[address].State = "conn_swallow"
    			}
    			if err == io.EOF {
    				server.Logger.Info("Input stream has got EOF, and now is being closed.")
    				server.breakConnection(connection)
    				break
    			}
    			server.Logger.Warning("Dispatching error: ", err, " Message: ", received_message)
    			if !server.makeResponse(connection, []byte("ERROR\r\n"), 5){
    				break
    			}
    		} else {
    			if server.Stat.Connections[address] != nil {
    				server.Stat.Connections[address].Cmd_hit_ts = time.Now().Unix()
    			}
    			// Here the message should be handled
    			server.Stat.Read_bytes += uint64(n)
    			parsed_request := protocol.ParseProtocolHeader(string(received_message[ : n - 2]))
    			server.Logger.Info("Header: ", *parsed_request)
    
    			if (parsed_request.Command() == "cas" || parsed_request.Command() == "gets") && server.cas_disabled ||
    			   parsed_request.Command() == "flush_all" && server.flush_disabled{
    				err_msg := parsed_request.Command() + " command is forbidden."
    				server.Logger.Warning(err_msg)
    				if server.Stat.Connections[address] != nil {
    					server.Stat.Connections[address].State = "conn_write"
    				}
    				err_msg = strings.Replace(protocol.CLIENT_ERROR_TEMP, "%s", err_msg, 1)
    				server.makeResponse(connection, []byte(err_msg), len(err_msg))
    				continue
    			}
    
    			if parsed_request.DataLen() > 0 {
    				if server.Stat.Connections[address] != nil {
    					server.Stat.Connections[address].State = "conn_nread"
    				}
    				received_message, _, err := readRequest(connectionReader, parsed_request.DataLen())
    				if err != nil {
    					server.Logger.Error("Error occurred while reading data:", err)
    					server.breakConnection(connection)
    					break
    				}
    				parsed_request.SetData(received_message[0 : ])
    			}
    			server.Logger.Info("Start handling request:", *parsed_request)
    			response_message, err := parsed_request.HandleRequest(server.storage, server.Stat)
    			server.Logger.Info("Server is sending response:\n", string(response_message[0 : len(response_message)]))
    			// if there is no flag "noreply" in the header:
    			if parsed_request.Reply() {
    				if server.Stat.Connections[address] != nil {
    					server.Stat.Connections[address].State = "conn_write"
    				}
    				server.makeResponse(connection, response_message, len(response_message))
    			}
    			if err != nil {
    				server.Logger.Error("Impossible to send response:", err)
    				server.breakConnection(connection)
    				break
    			}
    		}
    		if server.Stat.Connections[address] != nil {
    			server.Stat.Connections[address].State = "conn_waiting"
    		}
    	}
    }

    memcache на go

    alek0585, 27 Февраля 2016

    Комментарии (1)