附上今年已有的

http://advent.perldancer.org/
http://perladvent.org/2011/
http://www.catalystframework.org/calendar
http://perl6advent.wordpress.com/

Thanks.

On Thu, Dec 1, 2011 at 6:58 PM, Fayland Lam <[email protected]> wrote:

> Hi guys.
>
> Call for arm!!!
>
> I'm sure I don't have so much modules/ideas to share with you this year.
> so anyone who can come up with a simple module/idea, that would be great.
>
> if possible, please add your stuff to
> https://github.com/PerlChina/advent.perlchina.org. or else, just send it
> in email, I'll handle the website.
>
> Thanks.
>
>
> 2011/12/1 Fayland Lam <[email protected]>
>
>> http://perlchina.github.com/advent.perlchina.org/2011/SocksOnTheFly.html
>>
>> =for advent_year 2011
>>
>> =for advent_day 1
>>
>> =for advent_title Socks on the fly
>>
>> =for advent_author Fayland Lam
>>
>> 去年的 A<../2010/|Advent> 我们讲过如果在 http/https 上铺上一层 A<../2010/Tor.html|Tor>.
>> 这次我们将更近一步,谈论如果在 Socket 上用上 socks proxy.
>>
>> 此次主角便是 M<IO::Socket::Socks::Wrapper>,无需更改所需模块的源码,轻松简易加套。
>>
>> 如下例子是使用 M<Net::Whois::Raw>。
>>
>> 查看它的源码,可以发现在 sub whois_query 里有 IO::Socket::INET->new 链接。所以在该 Socket 上使用
>> socks proxy 就变得非常简单。
>>
>> =begin pre
>>
>> use strict;
>> use warnings;
>> use Net::Whois::Raw;
>> use IO::Socket::Socks::Wrapper (
>>     'Net::Whois::Raw::whois_query()' => {
>>         ProxyAddr => '127.0.0.1',
>>         ProxyPort => 7070,
>>     },
>> );
>>
>> my $dominfo = whois('perlchina.org');
>> print $dominfo;
>>
>> =end pre
>>
>> 如果你有 monitor socks proxy 的工具,你就会发现该 whois query 是通过了本地的 7070 端口。
>>
>> 谢谢。
>>
>> --
>> Fayland Lam // http://www.fayland.org/
>>
>
>
>
> --
> Fayland Lam // http://www.fayland.org/
>



-- 
Fayland Lam // http://www.fayland.org/

-- 
您收到此邮件是因为您订阅了 Google 网上论坛的“PerlChina Mongers 讨论组”论坛。
要向此网上论坛发帖,请发送电子邮件至 [email protected]。
要取消订阅此网上论坛,请发送电子邮件至 [email protected]。
若有更多问题,请通过 http://groups.google.com/group/perlchina?hl=zh-CN 访问此网上论坛。

回复