- https://youtube.com/@campingwithsteve (personal experience camping)
- https://youtube.com/@WeirdExplorer (personal experience fruit/culture)
- https://youtube.com/@AlexRothman (history/culture)
- https://youtube.com/@PeterSantenello (investigative journalism about travel/cultures)
- https://youtube.com/@Azeal (interviews about human experiences (if you believe them))
- https://youtube.com/@HorsesOnYT (reflective cultural analysis)
- https://youtube.com/@justinmonarch (reflective self help philosophy)
- https://youtube.com/@NoBoilerplate (systematic self help)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Error Code Error Code NT Status Description | |
0x00000000 0x00000000 NT_STATUS_OK “The operation completed successfully.” | |
0xC0000001 0x0000001f NT_STATUS_UNSUCCESSFUL “A device attached to the system is not functioning.” | |
0xC0000002 0x00000001 NT_STATUS_NOT_IMPLEMENTED “Incorrect function.” | |
0xC0000003 0x00000057 NT_STATUS_INVALID_INFO_CLASS “The parameter is incorrect.” | |
0xC0000004 0x00000018 NT_STATUS_INFO_LENGTH_MISMATCH “The program issued a command but the command length is incorrect.” | |
0xC0000005 0x000003e6 NT_STATUS_ACCESS_VIOLATION “Invalid access to memory location.” | |
0xC0000006 0x000003e7 NT_STATUS_IN_PAGE_ERROR “Error performing inpage operation.” | |
0xC0000007 0x000005ae NT_STATUS_PAGEFILE_QUOTA “Insufficient quota to complete the requested service.” |
https://docs.splunk.com/Documentation/Splunk/latest/Forwarding/Protectagainstlossofin-flightdata
How can data loss be avoided?
The architecture is such that the UDP data sources must be converted to TCP backed by reliable delivery. Additionally, the forwarders and indexers may be configured to send application level ACKs back to sending forwarders.
splunkd
delivery of packets is as follows:
- data is sent in chunks of 64KB.
- By default the forwarder is not looking for, nor is the indexer signaled to send, ACKs upon block receipt.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#original from http://community.spiceworks.com/topic/262635-linux-does-not-register-on-the-windows-ad-dns | |
# reply of Phil6196 Oct 1, 2012 at 12:41 AM (EDT) | |
ADDR=`/sbin/ifconfig eth0 | grep 'inet addr' | awk '{print $2}' | sed -e s/.*://` | |
HOST=`hostname` | |
echo "update delete $HOST A" > /var/nsupdate.txt | |
echo "update add $HOST 86400 A $ADDR" >> /var/nsupdate.txt | |
echo "update delete $HOST PTR" > /var/nsupdate.txt | |
echo "update add $HOST 86400 PTR $ADDR" >> /var/nsupdate.txt | |
nsupdate /var/nsupdate.txt |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### sense api powershell examples | |
# with reference: | |
# https://www.jokecamp.com/blog/invoke-restmethod-powershell-examples/ | |
# https://msdn.microsoft.com/en-us/powershell/reference/5.1/microsoft.powershell.utility/invoke-restmethod | |
## enter your email address and password (will use securestring later) | |
$emailAddress = "email@contoso.corp" | |
$password = "insertpassword" | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#you can do the below if you have root. | |
# if you don't have root, you can uninstall the Samsung Setup Wizard. Not sure if this is at all valuable, as you can configure APNs manually worst case. Best case, it has no affect on OTA activations (which I truly don't think it does): | |
# adb shell | |
# pm uninstall -k --user 0 com.sec.android.app.setupwizard | |
# cycle airplane mode and you'll see you don't get the notification. | |
"sim card is not from verizon wireless" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://dl.google.com/android/repository/tools_r25.2.3-windows.zip | |
https://medium.com/@felipecsl/bypassing-certificate-pinning-on-android-for-fun-and-profit-1b0d14beab2b#.pnph846be | |
http://www.security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf | |
https://stackoverflow.com/questions/64364407/app-not-installing-in-android-11-but-works-on-previous-versions | |
1) download apktool and the build tools (http://androidsdkoffline.blogspot.com/p/android-sdk-build-tools.html) and platform tools (https://developer.android.com/studio/releases/platform-tools.html) | |
"C:\Users\mbrown\Desktop\Sense APK\apktool" d base.apk |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#baseline_layer.json is exported layer from the navigator... there certainly is a way to create the json from scratch reviewing specs, but it was very fsat to just do this. | |
$sourcefile = ".attack nav layers\baseline_layer.json" | |
$offtechoutfile = ".\attack nav layers\offensive_techs.json" | |
$deftechoutfile = ".\attack nav layers\defensive_techs.json" | |
#goal here is to: | |
# define two att&ck navigator layer json files | |
# one is for offensive techniques |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# summary: | |
# Process ATT&CK and D3FEND data to indicate likelihood an ATT&CK technique is a choke point as defined in this article (https://medium.com/mitre-engenuity/where-to-begin-prioritizing-att-ck-techniques-c535b50983f4). This theory considers the following conjecture: MITRE will assign research hours to align with prioritization of offensive technique (resulting severity, frequency of observation, etc). This theory considers the following facts: ATT&CK procedure examples are well documented, D3FEND offensive blast radius is well documented. | |
# Remember to see "Limitations and future work" section of the above blog post/article. | |
# also see "BIASES WHEN MAPPING TO MITRE ATT&CK" section of (https://www.cisa.gov/uscert/sites/default/files/publications/Best%20Practices%20for%20MITRE%20ATTCK%20Mapping.pdf) | |
# this covers the following biases: Novelty bias, Visibility bias, Producer bias, Victim bias, Availability bias... | |
# you won't ever be able to eliminate these, either within yourself, on your team, o |
NewerOlder