The Problem Solver The sample code can be found on GitHub here. Enjoy! The sample code can be found on GitHub here. With the typical AngularJS SPA application there are lots of AJAX calls going on to retrieve data from the server. Intercepting AngularJS AJAX requests In AngularJS all AJAX request are done using the $http service. 1: module.config(function ($httpProvider) { 2: $httpProvider.interceptors.push(function ($q, $rootScope) { 3: var requests = 0; 5: function show() { 6: if (! 7: $rootScope. 9: requests++; 12: function hide() { 13: requests--; 14: if (! 15: $rootScope. 19: return { 20: 'request': function (config) { 21: show(); 22: return $q.when(config); 23: }, 'response': function (response) { 24: hide(); 25: return $q.when(response); 26: }, 'responseError': function (rejection) { 27: hide(); 28: return $q.reject(rejection); Being able to intercept each request/response is nice but that still leaves us with the part of updating the user interface. 1: <div ng-app="myApp"> 3: </div> 4: <div ng-view=""></div> 5: </div> Try it
How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please support me on Patreon or SubscribeStar. The Jargon File contains a bunch of definitions of the term ‘hacker’, most having to do with technical adeptness and a delight in solving problems and overcoming limits. The hacker mind-set is not confined to this software-hacker culture. 1. 2. 3. 5. 2. 3. 4. 1. 2. 3. 4.
Top 15 Security/Hacking Tools & Utilities 1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. Yes, JTR 1.7 was recently released! John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. You can get JTR Here 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Get Nikto Here 5. Get SuperScan Here 6. p0f 7. 8.
NDS MODs - Nintendo DS & DSi XL Mods 99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories
iPod Touch Hacks - Jailbreak your iPod Touch and iPhone The Ultimate IFTTT Guide: Use the Web's Most Powerful Tool Like a Pro “If This Then That” is a free web-based service that gives you something better than the sum of its parts. The parts are the apps and devices you can connect together to create new experiences. Linden Tibbetts, Jesse Tane, and Alexander Tibbetts visualized their invention as a “digital duct tape”. The best thing about IFTTT? What is IFTTT Anyway? 2. What Are Services? 3. The Top 10 Applets You Should Be Using Right Now | The Top 5 Applets for Saving Money | The Top 5 Applets for Better Relationships | The Top 5 Applets for Job Hunters | The Top 5 Applets to Automate Your Social Life | The Top 5 Applets for Tech Lovers | The Top 5 Applets for Music Lovers | The Top 5 Applets for Photographers | The Top 5 Applets for Professionals | The Top 5 Applets for Parents | The Top 5 Applets for News Junkies 4. 5. Disabling Your IFTTT Account | What to Do When You Want to Disable or Delete Applets 1. 1.1 What is IFTTT Anyway? 1.2 Why Should I Use IFTTT? 1.3 What Can IFTTT Really Do For Me? 2. Yes! 3.