I know I can do a mysqldump -not csv format or I can even get the csv format like below but it does not contain the table columns on them only the values

select * from AUDIT_RESULT 
INTO OUTFILE '/va/tmp/audit_nresult.csv'

But it does not contain the column names just the values

google sheet : extract number from string by matching the prefix

I have a cell contains this value/text :

T50 EX3 OF2 BE40 BL10 ZLD6 ZLS2 ZRS10 AA1

How to get the number with the ‘EX’ prefix ? in this case i want to extract that ‘3’ from EX3.

Also, this number can be any digit, for example it can be :




How to extract that ‘112’ and ‘00078’ and make it as number 112 and 78 ?


views – Extract more data on field_collection_item from REST APIs of Drupal

I am trying to display information regarding Contributed modules available on Drupal programmatically.

For that, I am taking the help of this documentation :

When I am calling API like:

In return I am receiving a JSON object with the following details:

"field_supporting_organizations": [
                    "uri": "",
                    "id": "1381907",
                    "resource": "field_collection_item"

Now, I want to extract more data on this field collection item, but I am unable to find the right API filters to do so.

Any help would be much appreciated.

regex – Extract Uppercase Words on Excel Function

I have supplier name together with product name in one cell as a string.
Each cell has a word that’s all uppercase (sometimes with a digit or a number).

enter image description here

“3LAB Anti – Aging Oil 30ml” i need to extract 3LAB.

“3LAB Aqua BB SPF40 #1 14g” i need to extract 3LAB.

“3LAB SAMPLE Perfect Neck Cream 6ml” i need to extract 3LAB.

“3LAB SAMPLE Super h” Serum Super Age-Defying Serum 3ml”” i need to extract 3LAB.

“3LAB TTTTT Perfect Mask Lifting Firming Brightening 28ml” i need to extract 3LAB.

“3LAB The Cream 50ml” i need to extract 3LAB.

“3LAB The Serum 40ml” i need to extract 3LAB.

“4711 Acqua Colonia Intense Floral Fields Of Ireland EDC spray 170ml” i need to extract EDC.

“4711 Acqua Colonia Intense Pure Brezze Of Himalaya EDC spray 50ml” i need to extract EDC.

I need to extract only that UPPERCASE supplier name to a new cell.
I’ve tried to create User Defined Function like this one, but it’s not working.
It’s returning #NAME? error.

Public Function UpperCaseWords(S As String) As String
  Dim X As Long
  Dim TempText As String
  TempText = " " & S & " "   
  For X = 2 To Len(TempText) - 1
    If Mid(TempText, X, 1) Like "(!A-Z )" Or Mid(TempText, X - 1, 3) Like "(!A-Z)(A-Z)(!A-Z)" Then
      Mid(TempText, X) = " "
    End If
  UpperCaseWords = Application.Trim(TempText)
End Function

Any Idea how to correct it and make it work?

I’ve found it here:

And why in this macro, in line For X = 2 To Len(TempText) - 1 the X is set to 2?

manipulate – extract COVID data across sub-regions of Asia and the Pacific

The following code extracts COVID data of Germany and gives the time series of confirmed cases, deaths and recoveries:

casesGer = 
  covid[Select[MatchQ[Entity["Country", "Germany"], #Country] &]][
    All, {#ConfirmedCases, #RecoveredCases, #Deaths} &][Total];
DateListLogPlot[casesGer, PlotTheme -> "Detailed"]

I wanted to apply the above code for the following sub-regions:

cAsia = {"Kazakhstan", "Kyrgyzstan", "Tajikistan", "Turkmenistan", 
eAsia = {"China", "Japan", "Mongolia", "NorthKorea", "SouthKorea"};
seAsia = {"Brunei", "Cambodia", "Indonesia", "Laos", "Malaysia", 
   "Myanmar", "Philippines", "Singapore", "Thailand", "EastTimor", 
sAsia = {"Afghanistan", "Bangladesh", "Bhutan", "India", "Iran", 
   "Maldives", "Nepal", "Pakistan", "SriLanka"};
wAsia = {"Armenia", "Azerbaijan", "Bahrain", "Cyprus", "Georgia", 
   "Iraq", "Israel", "Jordan", "Kuwait", "Lebanon", "Oman", "Qatar", 
   "SaudiArabia", "Syria", "Turkey", "UnitedArabEmirates", "WestBank",
    "GazaStrip", "Yemen"};

and produce a single time-series graph of confirmed cases, deaths, recoveries for each sub-region above. Using Manipulate is preferred.

Is it possible to extract encryption keys from software executing on your own system?

You don’t say that you’re dealing with malware, but I will assume you are.

If the application is doing encryption, then of course it has the key. The fundamental approaches are to either analyze the application binary on disk, or to let it run and analyze the running binary. But be aware that malware authors do not want their applications to be reverse-engineered, and they make that very difficult to do; so you are venturing into the field of “malware reverse engineering” which apparently has a median salary of $125,000 USD, which tells you a bit about how specialized the skillset is.

So when you reverse engineer the malware you may find for example that they use binary obfuscation techniques to make the binary very difficult to understand, for example to figure out what is code and what is data (ie the key you’re looking for). Another technique in this direction is whitebox crypto which aims to, for example take a traditional AES implementation and key, and combine them into a custom algorithm, so there actually is no key, just some very complicated code. You may also find that your malware sample is designed to detect when it is being monitored display completely different behaviour when it is being monitored (let’s call this the Volkswagen maneuver).

Finally, as @mti2935 points out,with some early ransomware it was actually possible to reverse all this and extract the encryption / decryption key from the malware sample. Then the malware people got wise and started using asymetric crypto where you need the public key to encrypt and the private key to decrypt. The public key would be embedded in the malware, and the private key would be kept on the command&control server (c&c). Therefore the malware contains what it needs to encrypt, but not matter how hard you look, the keys to decrypt are not in there.

To be even more clever, when the malware starts up, it can contact the c&c to get a unique public key so that they can demand separate payment for each instance of the malware because they are all using different keys.

In summary: Not easily. Good luck. If this you are asking about ransomware, sounds like you need to hire a malware specialty firm.

Can I extract photo from multi exposure photo from a Pentax K-70?

I accidentally selected the multi exposure mode on my Pentax K-70, so all my photos are overlapping.

Is there a way to extract the original photos?

matrix – Extract a submatrix

This must be an simple question. Here is my Mathematica code.

A = {{1, 0, 2, -1}, {0, -2, 1, 3}, {2, 1, -1, 0}, {-1, 3, 0, 2}}
K = Inverse[A - x]
T2 = {{a, b}, {c, d}}


  1. I would like to extract the submatrix formed by the first two rows and the first two columns of $A$. I tried

    A[[1 ;; 2, 1 ;; 2]

enter image description here

What is going on?

pentax – Can I extract photo from multi exposure photo?

I am a hoppy photographer. I have Pentax camera. I dont know anything about photo setting .

Look like I accidentally selected multi exposure mode . So my photos are overlap.

I want to know how to take back each photo from multi exposure photos ?