- Zoom abuses the installer flow on MacOS to bypass permissions dialogs (source)
- Zoom sends identifying device info to Facebook, even when users don't have a Facebook account (source) (fixed)
- A bug in Zoom sent identifying information (including email addresses and profile pictures) of thousands of users to strangers (source)
- Zoom claims that meetings are end-to-end encrypted in their white paper and marketing materials, but meetings are only encrypted in transit, and are available in plaintext to Zoom servers and employees. (source)
zoomAutenticationTool
can be used to escalat
Update: I created jq-zsh-plugin that does this.
One of my favourite tools of my trade is jq. It essentially enables you to process json streams with the same power that sed, awk and grep provide you with for editing line-based formats (csv, tsv, etc.).
Another one of my favourite tools is fzf.
- macOS 10.15.5
- tmux 3.1b
macOS has ncurses version 5.7 which does not ship the terminfo description for tmux. There're two ways that can help you to solve this problem.
Instead of tmux-256color
, use screen-256color
which comes with system. Place this command into ~/.tmux.conf
or ~/.config/tmux/tmux.conf
(for version 3.1 and later):
First we install the following packages to use the openscap command-line tool: sudo apt-get install libopenscap8 python-openscap
We will also install the SCAP security guide: sudo apt install ssg-base ssg-debderived ssg-debian ssg-nondebian ssg-applications
#!/usr/bin/env docker build --compress -t pvtmert/tmux:static -f | |
FROM debian:stable | |
ENV CC clang | |
ENV DIR tmux-repo | |
ENV REPO https://github.com/tmux/tmux.git | |
#VOLUME /data | |
WORKDIR /data |
### Preseed for Ubuntu 16.04.3 LTS | |
# Derived from: https://help.ubuntu.com/lts/installation-guide/example-preseed.txt | |
### Localization | |
# Preseeding only locale sets language, country and locale. | |
d-i debian-installer/locale string en_US.UTF8 | |
d-i localechooser/supported-locales multiselect en_US.UTF-8 | |
d-i console-setup/ask_detect boolean false | |
d-i keyboard-configuration/xkb-keymap select GB |
Recently I came across a web service that required two-factor authentication using the Symantec VIP Access App. I already manage all of my OTP tokens in a different app (If you are on iOS I highly recommend using OTP Auth by Roland Moers.) and did not want to have to use yet another app to generate the TOTP.
There is a way to generate a Symantec VIP Access compatible token very easily if you have access to an environment which can run Python PIP. I happen to have Ubuntu Windows Subsystem Linux running on my machine. (If you are running Windows 10 and don't have this you should really check it out.) Let's get started...
Here we install python3-pip and qrencode so we can generate our secret, I
# The setup command allows filtering facts | |
# More info: https://docs.ansible.com/ansible/latest/modules/setup_module.html | |
# inventory_file = path to inventory file (if not normal role layout) | |
# host_group = group to query. use all for all hosts | |
ansible -i inventory_file host_group -m setup -a 'filter=ansible_distribution_version' | |
# For a Ubuntu Bionic Host the distribution facts look like this: | |
# "ansible_distribution": "Ubuntu", | |
# "ansible_distribution_file_parsed": true, | |
# "ansible_distribution_file_path": "/etc/os-release", |
I did a little research and have found that GIT Bash uses MINGW compilation of GNU tools. | |
It uses only selected ones. | |
You can install the whole distribution of the tools from https://www.msys2.org/ | |
and run a command to install Tmux. And then copy some files to installation folder of Git. | |
This is what you do: | |
Install before-mentioned msys2 package and run bash shell | |
Install tmux using the following command: pacman -S tmux | |
Go to msys2 directory, in my case it is C:\msys64\usr\bin |