Linux premium82.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
LiteSpeed
Server IP : 185.61.154.194 & Your IP : 216.73.216.77
Domains :
Cant Read [ /etc/named.conf ]
User : evicodqw
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
opt /
alt /
ruby18 /
share /
ri /
1.8 /
system /
Shellwords /
Delete
Unzip
Name
Size
Permission
Date
Action
cdesc-Shellwords.yaml
1.12
KB
-rw-r--r--
2023-07-26 13:47
escape-i.yaml
234
B
-rw-r--r--
2023-07-26 13:47
join-i.yaml
230
B
-rw-r--r--
2023-07-26 13:47
shellescape-i.yaml
839
B
-rw-r--r--
2023-07-26 13:47
shelljoin-i.yaml
726
B
-rw-r--r--
2023-07-26 13:47
shellsplit-i.yaml
829
B
-rw-r--r--
2023-07-26 13:47
shellwords-i.yaml
242
B
-rw-r--r--
2023-07-26 13:47
split-i.yaml
232
B
-rw-r--r--
2023-07-26 13:47
Save
Rename
--- !ruby/object:RI::MethodDescription aliases: - !ruby/object:RI::AliasName name: escape block_params: comment: - !ruby/struct:SM::Flow::P body: Escapes a string so that it can be safely used in a Bourne shell command line. - !ruby/struct:SM::Flow::P body: Note that a resulted string should be used unquoted and is not intended for use in double quotes nor in single quotes. - !ruby/struct:SM::Flow::VERB body: " open("| grep #{Shellwords.escape(pattern)} file") { |pipe|\n # ...\n }\n" - !ruby/struct:SM::Flow::P body: +String#shellescape+ is a shorthand for this function. - !ruby/struct:SM::Flow::VERB body: " open("| grep #{pattern.shellescape} file") { |pipe|\n # ...\n }\n" full_name: Shellwords#shellescape is_singleton: false name: shellescape params: (str) visibility: public