Entering the search string below let’s you use twitter location
search to see their tweets:
geocode:38.890550,-77.009017,.02km
The above string will give you Tweets in a 0.02km radius around the
Capitol. You can expand or shrink the geofence however you like however
you like. But if you want to search Twitter for a specific date range,
for example, 1/6/2021, you’ll need to add that as well:
Posted onEdited onInnetworkDisqus: Word count in article: 314Reading time ≈1 mins.
Configuring Proxy Settings
In the development world, setting up a proxy is a common task,
especially when working behind a corporate firewall or when you want to
ensure secure and private browsing. Proxies act as intermediaries
between your computer and the internet, helping in filtering requests,
improving security, and managing network traffic more efficiently.
NPM
Setting up Proxy in NPM
To configure npm to use a proxy, you can use the
npm config set command as follows:
1 2
npm config set proxy "http://localhost:7890" npm config set https-proxy "http://localhost:7890"
Here, http://localhost:7890 is the address of your proxy
server. Change it according to your proxy server's IP address and port
number.
Removing Proxy Configuration
If you need to remove the proxy configuration, for instance, when
you're not behind a proxy anymore, you can use the
npm config delete command:
Replace localhost:7890 with your proxy server's IP
address and port. Note the difference in the protocol (http
vs. https) for http_proxy and
https_proxy.
Removing Proxy
Configuration
To revert the changes or to disable the use of a proxy, you can
unset these environment variables:
➜ code file ./vspro/passwords.txt ./vspro/passwords.txt: ASCII text
这次,文件描述不再提到CRLF换行符,说明转换成功。
重新尝试破解
转换换行符后,我再次运行了fcrackzip命令,这次成功破解了ZIP文件的密码。
end
This experience highlights that, when working across different
platforms, even minor details like line breaks can lead to significant
obstacles. Despite their seeming insignificance, these differences can
greatly impact how files are processed and texts are parsed. Thankfully,
with the use of straightforward tools and commands, these issues can be
easily overcome, allowing for a seamless workflow.
I hope this blog post assists those facing similar challenges in
cross-platform tasks, such as password cracking or any activity
involving text file processing. Remember, when you come across unusual
issues, it's worth starting with the basics, like the seemingly trivial
matter of line breaks.