https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
# Run the Tailscale Docker container on a Mikrotik router | |
# Based on Mikrotik container documentation: | |
# https://help.mikrotik.com/docs/display/ROS/Container | |
# Tailscale container documentation: | |
# https://hub.docker.com/r/tailscale/tailscale | |
# Tested on an hAP AX^3 with RouterOS 7.7 |
add address=1.37.34.225 list=IP-TIKTOK | |
add address=14.225.18.245 list=IP-TIKTOK | |
add address=14.225.18.246/31 list=IP-TIKTOK | |
add address=14.225.20.144 list=IP-TIKTOK | |
add address=14.225.20.146/31 list=IP-TIKTOK | |
add address=14.225.20.148 list=IP-TIKTOK | |
add address=14.225.20.152 list=IP-TIKTOK | |
add address=14.225.26.15 list=IP-TIKTOK | |
add address=14.225.240.101 list=IP-TIKTOK | |
add address=14.225.240.103 list=IP-TIKTOK |
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
// ==UserScript== | |
// @name Recaptcha Solver (Automatically solves Recaptcha in browser) | |
// @namespace Recaptcha Solver | |
// @version 2.1 | |
// @description Recaptcha Solver in Browser | Automatically solves Recaptcha in browser | |
// @author engageub | |
// @match *://*/recaptcha/* | |
// @connect engageub.pythonanywhere.com | |
// @connect engageub1.pythonanywhere.com | |
// @grant GM_xmlhttpRequest |
iperf3
serverwg-quick down wg0
/etc/wireguard/wg0.conf
fileVMware vSphere 6 Enterprise Plus | |
1C20K-4Z214-H84U1-T92EP-92838 | |
1A2JU-DEH12-48460-CT956-AC84D | |
MC28R-4L006-484D1-VV8NK-C7R58 | |
5C6TK-4C39J-48E00-PH0XH-828Q4 | |
4A4X0-69HE3-M8548-6L1QK-1Y240 | |
VMware vSphere with Operations Management 6 Enterprise | |
4Y2NU-4Z301-085C8-M18EP-2K8M8 | |
1Y48R-0EJEK-084R0-GK9XM-23R52 |
UTC: 2025-10-18 18:08
virtualex-itv/chocolatey-packages
This file is automatically generated by the update_all.ps1 script using the Chocolatey-AU module.
Ignored | History | Force Test | [Rele
#!/bin/sh /etc/rc.common | |
# OpenWrt /etc/init.d/ script to automatically add ipsets across reboots | |
# For more info about how to write init scripts https://openwrt.org/docs/techref/initscripts | |
# | |
# howto: | |
# - upload this file as /etc/init.d/autoipset | |
# - # chmod 755 /etc/init.d/autoipset | |
# - # /etc/init.d/autoipset enable | |
# - # /etc/init.d/autoipset start |
cscript.exe %windir%\system32\slmgr.vbs /rilc | |
cscript.exe %windir%\system32\slmgr.vbs /upk | |
cscript.exe %windir%\system32\slmgr.vbs /ckms | |
cscript.exe %windir%\system32\slmgr.vbs /cpky | |
cscript.exe %windir%\system32\slmgr.vbs /ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T | |
sc config LicenseManager start= auto & net start LicenseManager | |
sc config wuauserv start= auto & net start wuauserv | |
clipup -v -o -altto c:\ |
Well, there are some vendor locked dongles out there (I'm looking at you Panasonic!) that use regular off-the-shelf chips but cost a lot of money and not $5 that they're really worth. E.g. there's the AJ-WM50E dual band AC dongle (sold for 160 USD) that you should use with AG-UX180 camera to get wifi CCU running.
I happen to have one such dongle, couple of summer holiday nights and family far, far away. Why not do some hacking then?
The camera is - as far as I can tell - running Linux or a similar system. If so, it has a limited set of tools to get to know what's getting connected to it.
Make the not-so-Panasonic dongle resemble the Panasonic one as much as possible, so that the camera just enables it thinking it's legit.