Open the cmd as administrator and run:
netsh interface portproxy add v4tov4 listenaddress=192.168.0.134 listenport=5173 connectaddress=172.29.30.127 connectport=5173
listenaddress= Your PC local IP Address got fromipconfig
| <input type="text" name="cpf" placeholder="CPF" required oninput="cpfMask(this);" pattern="\d{3}\.\d{3}\.\d{3}-\d{2}"> | |
| <script> | |
| function cpfMask(i) { | |
| let v = i.value; | |
| let digits = v.replace(/[^0-9]/g, '').substring(0, 11); | |
| let formatted = digits; | |
| formatted = formatted.replace(/^(\d{3})(\d)/, "$1.$2"); | |
| formatted = formatted.replace(/^(\d{3})\.(\d{3})(\d)/, "$1.$2.$3"); |
| #!/bin/bash | |
| # https://twitter.com/fideloper/status/1460646396172939266/photo/1 | |
| # Export from one DB, import into another | |
| mysqldump some_db_name | pv | mysql -h remote-host another_db_name |
| ;(function(window, document, undefined) { | |
| // rAF polyfill | |
| (function() { | |
| var lastTime = 0; | |
| var vendors = ['ms', 'moz', 'webkit', 'o']; | |
| for(var x = 0; x < vendors.length && !window.requestAnimationFrame; ++x) { | |
| window.requestAnimationFrame = window[vendors[x]+'RequestAnimationFrame']; | |
| window.cancelAnimationFrame = window[vendors[x]+'CancelAnimationFrame'] || window[vendors[x]+'CancelRequestAnimationFrame']; | |
| } |
| var noop = function () {}; | |
| var trackEvent = function () { | |
| var ga = window.ga, | |
| toArray = Array.prototype.slice, | |
| params = ['send', 'event'].concat(toArray.call(arguments)); | |
| if (typeof ga === 'undefined') { | |
| /*console.log('trackEvent'); | |
| console.log(params);*/ |
| var preloadImages = function(images, callback) { | |
| var current = 0, | |
| imageEvtHandler = function() { | |
| if (current++ === images.length && typeof callback === "function") | |
| callback.call(this); | |
| }; | |
| if (images.length > 0) { | |
| for (var i = images.length - 1; 0 <= i; i--) { | |
| var img = new Image; |