Since Firefox has decided to migrate itself into becoming a watered down version of Google Chrome, with similar telemetry and other anti-privacy nonsense included by default, I have looked through many of the alternatives and found that to me Pale Moon seems the best option available. Therefore I will now share my list of which add-ons I use, so that new users might use that as some inspiration for which ones they might want to consider using as well. Some parts are the same or very similar to the equivalent list I did for Firefox a while ago. The listing order is an approximation of how important I personally consider them right now.
Mozilla/5.0 (Windows NT 5.1; rv:11.0) Gecko Firefox/11.0 (via ggpht.com GoogleImageProxy) | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 | |
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36 | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36 | |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) | |
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36 | |
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.140 Safari/537.36 Edge/17.17134 | |
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko | |
Mozilla/5.0 (Windows NT 5.1; rv:7.0.1) Gecko/20100101 Firefox/7.0.1 |
### Basic Scanning Techniques | |
* Scan a single target | |
* `nmap [target]` | |
* Scan multiple targets | |
* `nmap [target1,target2,etc]` | |
* Scan a list of targets | |
* `nmap -iL [list.txt]` | |
* Scan a range of hosts | |
* `nmap [range of IP addresses] |
Getting confused about the piles of development tools that people use for Javascript? Here's a quick index of what is used for what.
Keep in mind that you shouldn't add tools to your workflow for the sake of it. While you'll see many production systems using a wide range of tools, these tools are typically used because they solved a concrete problem for the developers working on it. You should not add tools to your project unless you have a concrete problem that they can solve; none of the tools here are required.
Start with nothing, and add tools as needed. This will keep you from getting lost in an incomprehensible pile of tooling.
Typical examples: Gulp, Grunt
#################################################################
# How to install Arch in your Android (into the App TermuxArch)
# and be able to use your Android device like a personal computer
# even running a X server to have GUI
#################################################################
###############################
# Install Termux
This guide may assume some very basic programming knowledge, but not necessarily python. It aims to give anyone enough knowledge to start diving into data problems themselves by using these techniques, and tries to explain (fairly comprehensively) everything that is going on for the newcomer.
This guide will be covering several different topics and should equip you with enough knowledge to try some of what you read out on real problems.
A great set of video resources can be found here. Most of this setup process comes from these videos. This setup process should work fine for either a pi3 or a piZero, but the peripherals needed will change depending on which you are setting up.
- Download the newest version of Raspbian from The Raspberry Pi Org.
- Download a copy of The Unarchiver to extract the Raspbian
img
file. - Download a copy of Pi Filler from IvanX to easily flash the OS to the card.
- Right click on the OS zip file and open with The Unarchiver. Extracting the file to the same folder is fine.
- Once extracted, open up Pi Filler. Select your
img
file, insert your SD card, and continue through the prompts.
#!/bin/bash | |
TMP_DIR="/tmp" | |
URL_LINKS=$"http://www.blocklist.de/lists/ssh.txt | |
http://www.blocklist.de/lists/apache.txt | |
http://www.blocklist.de/lists/asterisk.txt | |
http://www.blocklist.de/lists/bots.txt | |
http://www.blocklist.de/lists/courierimap.txt | |
http://www.blocklist.de/lists/courierpop3.txt | |
http://www.blocklist.de/lists/email.txt |
#!/bin/bash | |
# all known shodan IP addresses | |
SCANNERIPADDRESSES=$"185.181.102.18 | |
94.102.49.193 | |
94.102.49.190 | |
89.248.167.131 | |
93.174.95.106 | |
185.163.109.66 | |
89.248.172.16 |