from urlparse import urlparse import urllib def toGSBL(str_url, character_code) scheme, netloc, path, params, query, fragments = urlparse(unicode(str_url, character_code, 'ignore')) netloc = netloc.encode('idna') path = urllib.quote_plus(path.encode('utf-8'), '')ãif len(path) > 0 else '/' query = urllib.quote_plus(query.encode('utf-8'), '')ãif len(query) > 0 else '' return scheme + '://' + netloc
Google Safe Browsing APIã¯ç¹å®ã®URLããã¤ããªãå®å ¨ãå¦ãããã§ãã¯ããAPIããã£ã¨èª¿ã¹ãã¨ãã«ä¾¿å©ãªããã«Jupyterãã使ããããã«ãã¦ã¿ãã æ®éã®URLãå ¥ããã¨ä½ãå¤ãåºã¦ããªãã®ã§ãå®å ¨ã§ãªãURLããæ¢ããã®ã¨ããã¢ããã¥ã¡ã³ãã«URLãåãè¾¼ããããã«è¦å´ã®è·¡ãã import pycurl, io, json url = 'http://malware.testing.google.test/testing/malware/' api_key = 'your_api_key' data = ''' {{ "client": {{ "clientId": "your_client_name", "clientVersion": "0.1" }}, "threatInfo": {{ "threatTypes": ["THREAT_TYPE_UNS
Google Safe Browsingã£ã¦ããã¾ãã¦ã APIãããã®ã§Rubyããããã¤ãã®ã«ã¼ã«ã§ä¸æ£ã¨å¤æãã¦ãããã¡ã¤ã³(ã¾ãã¯å®è¡ãã¡ã¤ã«)ããã§ãã¯ãã¦ã¿ããã¨ãã¾ããã äºåæºå rubygems google-api-client ãã¤ã³ã¹ãã¼ã« APIKEYãç°å¢å¤æ°ã«ããã¦ãã Lookupã®ãµã³ãã«ã³ã¼ã google-api-clientã£ã¦ã»ã¨ãã©åççæãªã®ã§ãæ®éã«ä½¿ãæ¹ãã½ã¼ã¹ããè¦ããã¨ããã¨ãµãããªãããã¾ããã åçã«çæãããããããªããã¨ããã³ã¼ãããªãã¸ããªã«ä¸ç·ã«ä¸ãã£ã¦ããã®ã§ããã¡ããããã¥ã¡ã³ã代ããã«ãã§ãã¯ãã¾ãã https://github.com/google/google-api-ruby-client/tree/master/generated/google/apis safebrowsing_v4ã¯ãã®ã¸ãã§ããã Lo
The safebrowsing Go package can be used with the Google Safe Browsing APIs (v4) to access the Google Safe Browsing lists of unsafe web resources. Inside the cmd sub-directory, you can find two programs: sblookup and sbserver. The sbserver program creates a proxy local server to check URLs and a URL redirector to redirect users to a warning page for unsafe URLs. The sblookup program is a command li
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}