There is a script that should tear out a part of the text from the server response. But I can’t figure out the regular schedule; it only processes the first word, and then no.
Code:
+xhr.responseText.match(/_COOKIE.*?(.*?)<\/td><\/tr>/m)[1] Or prompt a regular schedule that ALL server answer pulled out.
It should check cookies, the line in the server response, and it needs to be received. Looks like that:
HTTP_COOKIE => __cfduid = d7a5bc6e25f6043evev21781dbb1d591bd8b1460834789; cf_clearance = b743425f1830b8averea106810887d155501c350d; 1460834814-604800; login = yXRWPuMMQ2sd dfSgc% 252F0KM985nSZ6cDNwuaFfA% 253D% 253D; password = 31567518v43v43b3975711da84e068fa78; chat_token = P38SgjlpTok4KfdfvbedfvnRKIxWuAxK4OHBkWBLnlrDe% 2BxMNQ% 3D; user_id = 78001175; real_user_id = 78001175; social_id = 296400; __auc = 333d543ga154208ab39c1e7529ec; OAGEO = NL% 7C% 7C% 7C% 7C% 7C% 7C% 7C% 7C% 7C% 7C; OAID = d4f0c5982d3sdfva46de6bf377999630; _ym_uid = 1460834849654078056; __utma = 4986037.946172708.1460834854.1460841308.1460868718.3; __utmc = 4986037; __utmz = 4986037.1460834854.1.1.utmcsr = (direct) | utmccn = (direct) | utmcmd = (none); _ym_isad = 2; __unam = 7639673-154208d00a