Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
I want to change slug x to slug y, it is so important and critical change.
There are ~ 150 tables with bunch of columns so Mysql search wouldn't be efficient. I tried to search from backup file. But I couldn't succeded with zgrep.
I would like to search 'x'|/x/ but not x-y or www.x.com it is actually simple regex but couldn't achieve with zgrep could you please give some advice how to use zgrep for this purpose ?
zgrep "'x'|/x/" daily_backup.sql.gz
any help would be appreciated.
Something like this?
zcat daily_backup.sql.gz| grep -E "'x'|/x/"
-E puts grep into 'extended regexp' so the alternation operator | works
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 1 year ago.
Improve this question
Trying to save the captured web traffic of the raw HTTP request/response while using mitmproxy:
Followed https://github.com/mitmproxy/mitmproxy/blob/main/examples/contrib/jsondump.py with
mitmproxy -s /pkg/mitmproxy/jsondump.py, and with
$ cat ~/.mitmproxy/config.yaml
dump_destination: "/tmp/mitmproxy.log.json"
But my "/tmp/mitmproxy.log.json" was never written to.
Then tried mitmproxy -w outfile as per Dump packets collected with mitmproxy, but the output is not in JSON format
Then tried mitmproxy -s /pkg/mitmproxy/jsondump.py -w outfile and the output is still not in JSON format.
Mitmproxy currently has no JSON export. We're tentatively planning to support HAR export soon though. There's a community-contributed example for this here, which I think is in better shape than the jsondump one: https://github.com/mitmproxy/mitmproxy/blob/main/examples/contrib/har_dump.py
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
I'm using Trifacta Wrangler to rearrange some datasets, stored in CSV files. I have to produce a CSV file as output, but when I do that Trifacta Wrangler surrounds every value, even integers and floats, with quotes, even if the column type is correctly set. How can I avoid that?
This can be changed by looking under the "More Options" accordion on job run output: there's an option labeled "include quotes" that controls this.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
I upgraded my license from a trial to a full license but PHPStorm exits immediately without asking for the new license.
There was a deamon still running phpstorm. Run
ps aux | grep java
and find the java process with a lot of PHPStorm flags, e.g.
-Didea.platform.prefix=PhpStorm
Kill it. Restart
phpstorm.sh
It should operate as normal.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
when our website was infected,we always just change the root password and the mysql password,fix the code where have vulnerability。But I think it is not enough , does anyone have more advance on it? I just have no idea that whether he has the backdoor in our system or have other attack that I haven't know about。
The problem is, that after the system was once hacked, you cannot be 100% sure that the hacker did not leave you a backdoor, unless he left a log of what he did.
The best way would be complete reset the system. Re-install the OS and completely rebuild the server. However that might not always be an option.
I would advise you to
Rebuild the system
Check all code using sql in you app to use prepared statements
log the sql for some time and go through it, to see if the hacker tries again and make double sure you get the code he aims at
(original post spoke of injection - not infection)
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I dont have phpmyadmin on my server. Dont really need it, but I need to run one query, is it possible to do it via SSH? CentOS 6.5
command that I need to run looks like this
update wp_wpa_anm set cat = concat(cat,'12,') where scp_egn = 'aut'
Something like this should work
mysql -u username -p database_name -ppassword -e "Select 1"
Have a look here for more examples