Capturing variable after slash in domain

I’m developing an ecommerce website with WordPress / Shopify API. I’d like to be able to capture discount codes through the URL.

So if the discount code was code40, I’d like the enduser to be able to go to website.com/code40 and have that discount code automatically feed into the checkout. I’ve tried a few different methods, but I’m struggling to get a working solution. I have a good idea on how I’m going to feed the variable into checkout, but I’m struggling with capturing the data after the URL. Is this something I should do through HTACCESS/PHP or maybe JavaScript and a cookie? Any suggestions?

Capturing SQL calls sent to a remote server from application

First of all, I’m not well versed in SQL anything at all. Closest I’ve ever needed to get was storing and retrieving data from a local SQLite db.

In essence I think I have a simple problem but it’s hard to orient yourself when everything is new.

My main tool at work is an ERP software, which is basically a front end to an SQL db.

Problem I have with it is that it’s very clumsy and doesn’t allow automation of even the most basic tasks.

What I want to do, is bypass the front-end completely and interact directly with the db to automate most of my tasks with python.

I can connect to the database just fine from python environment, but the schema is gigantic, there’s no way I’ll be able to find whatever it is I might be looking for.

So I need to capture the call front-end sends when I click a button (telling it to display specific set of data) to use that call as a guide.

Basically, how can I, an SQL noob, capture calls that a desktop application sends to a remote server?

Edit 1: My job is mostly analytical, so all of my automation will be for retrieval, analysis and visualization. I’m not very likely to mess anything up.

Edit 2: Tried running a Profiler and got the message:

"In order to run a trace against SQL Server you must be a member of sysadmin fixed server role or have the ALTER TRACE permission."

I’m not a sysadmin, don’t have an alter trace permission and reeeally don’t feel like asking for it 😀

Capturing a sneaky Bane

Our Kaganmadi just encountered a Bane last round, that is sneaky and tries to influence a Bête by whispering to them sneakily. Now we had stopped at a cliffhanger, having found out the following:

  • A Spirit Ward does silence it and break the influence, possibly for the time the victim remains in it.
  • The Spirit is rather good at dodging Sense Wyrm, having given us wildly conflicting readings at times, but enough evidence to try the ward, confirming it was a Spirit/Bane of sorts.

As other weapons in our Arsenal we have:

  • a bunch of Bête that could get into the Umbra and drag all people there
  • the same bunch could arguably tear the Bane a new one, provided we can force it to get to our claws
  • Rite of Summoning (several)
  • Rite of Binding (one)
  • Rite of Cleansing (several)
  • Spirit Speech (several)
  • Truth of Gaia (several, including a Fetish)
  • Scent of the true Form (one or more)
  • A Bubasti mildly reeking of Wyrm (as Bubasti all do)
  • Maybe 4 to 6 hours time to do what needs to be done till we have to get moving.

While we were hatching plans to try to “leave the bane behind” somehow trying to use the Umbra and the Spirit Ward. But surely we should have more options provided we could… Uhm… Force it bound into a rock?

What rules would apply to bind said unknown power Bane without knowing its Name as of yet to a rock, mayhaps turning it into a Talen, and how could our arsenal make it easier for us to force the result?

Capturing Alternate Point of Contact Information

Does anyone know of some good articles or documentation I can read for identifying the best practices to follow when designing the information architecture (forms) for allowing users to provide alternate contact information?

My objective is not gather information that is not required, such as: Do not collect phone from contacts who will not be called.

The scenarios I am looking at are:

  1. User does not need a secondary point of contact.
  2. User needs more than one secondary point of contact.
  3. User identifies a primary point of contact that is not themselves.
  4. In all scenarios the user can choose if themselves or the point of contact can receive calls or digital notifications.

The designs I have created led to a lot of yes/no questions which then showed additional form sections based on the answer. Users I have tested this with seem to enjoy this form and it captures all information they would need. however, although works well, it feels like I am reinventing the wheel or over complicating what should be a simple process.

Capturing multicast packets in WLAN

(I had to move this from Network Engineering stack exchange where I origianlly asked this question)

If a device in monitoring mode snoops on the traffic in a WLAN, can it CAPTURE and READ multicast packets?

For instance, if a device broadcasting packets to multicast address 239.255.255.250, can a monitoring device capture and read those packets?

Wireshark – capturing website info from other computers

first of my computer knowledge is very basic.

I am trying to find out what websites computers on my network are visiting.

Target device is a MacBook air, I have a bell homehub 300 and I’m running Wireshark on ubunto cinnamon 19.1

I’m running Wireshark in promiscuous mode and it only shows information from my computer.

Any help would be much appreciated.

capturing web-sockets packets from IOS using fiddler

I am using latest Fiddler version trying to capture web-sockets requests from an IOS application.

I am able to see only HTTP and HTTPS requests.

Laptop(Running fiddler on port 8888) and mobile both are on same network

  • Laptop IP – 192.168.4.2
  • mobile IP – 192.168.4.3 proxy configured to 192.168.4.2 port 8888

Is there any thing am missing out?..