Skip to main content

Posts

Blocklist-Update.sh

Blocklist-Update.sh is a script that I wrote to manage blocklists from bluetack etc to be used in conjunction with Transmission torrent downloader in Linux/MacOS. The script can be taylored to work with Qbittorrent as well, but the placement of the blocklists means you'd have to redirect the blocklist to go somewhere locally manageable as Transmission uses its own blocklist directory in .config. I believe there are about 10 lists there now. It works well for my needs. It can be ran weekly using crontab in standard user profile.  To download:  blocklist-update.sh To download the others:  Github

NOSCRIPT CONFIGURATION FOR PALE MOON SPECIFICALLY

I wrote an article before about making Pale Moon more private. I covered a few of the settings and back end changes I make each time I install it. I mentioned Noscript, but I didn’t give any details about how I set it up. First though, you have to get the version already marked for your version of “Firefox” or in this case, Pale Moon. If you went to https://addons.palemoon.org/addon/noscript/ you would probably find the Pale Moon addons page devoted to the newest possible Noscript being marked specifically for Pale Moon. Other versions may work, but these are hybrid addons and the closer we get to Noscript 10, the less I trust it to work with Pale Moon specifically. I just opt to stick with 5.0.6. There have been people asking about what happens when Maone, the developer stops supporting the hybrid versions of Noscript, “Will it work with Pale Moon?” Why yes it will. Noscript blocks scripts, that’s its main function and it will do that as long as Java script exists on a page. ...

ARCH FOR NEW USERS

MANJARO UPDATES, MAINTENANCE, SECURITY AND NEW USERS Arch Linux, a rolling release distribution, has great documentation. Everything to do with a terminal command even for Ubuntu can be found in the Arch Wiki or some other form of Arch documentation. The problem with Arch Linux is that it is so very difficult to install for new users. Many times when going into an arch related forum, you get called names and ridiculed for asking a question. Manjaro Linux on the other hand, they don’t do that. They are knowledgeable and helpful. They offer almost immediate assistance, at least within 24 hours. They have equally good documentation for a lot of the things related to Arch and their own distro. Many times, it is encouraged still to use the Arch Wiki, however. STABLE, TESTING, UNSTABLE There are three branches within the Manjaro package management world. Each has their own set of mirrors. When switching between them, it is advisable to use sudo pacman-mirrors b(ranch) an...

CODE SIGNING ISSUES WITH PALE MOON BROWSER

Code signing is a good way for software products to be authenticated when being installed upon Windows systems. Code signing can mean the make or break for some applications. When Google-Chrome downloads something that isn’t signed, it gets flagged. Internet Explorer tried to do this too. Windows UAC even complains about unsigned applications. Firefox, Chrome, Opera, Avast, Photoshop, all have CA’s. It currently looks as if Pale Moon’s prior arrangement has essentially been terminated. Pale Moon, like other applications, sought signing from similar vendors as Firefox and the like. But it appears that they failed to do their part to get re-authenticated and thus can no longer offer signing to applications. This lead Moonchild to continue reaching out to various vendors on the open source sector. Certum, a company for signing based in Poland, appeared on the outside to have everything that Moonchild was looking for. After working with them for what seemed to be forever, Moonchild p...

PROGRAMMING LANGUAGES: A BIT OF HISTORY AND THEIR USES.

Programming is fundamental with computing. Most people today only surf the web, check bank statements, pirate movies, etc. Programming is the back end for every piece of software that facilitates these fun past times. Not all programming languages are the same, there is HTML to handle websites, Css to handle web design, Php can be used for login credentials and other nifty things, there is even a language for handling simple, everyday tasks. Machine code: Machine code was used prior to any known compiled language as it communicated with the CPU directly and it was the language that the CPU spoke. Machine code would use numbers, preferably binary, to manage data that was input into the computer. The time of the first GUI applications were still a long way off. Computers during this time, were merely used to handle data calculations. Machine language was used in the construction of computers and people who understood binary could do almost anything with the machines at the tim...

FOLLOW UP TO THE EARLIER ARTICLE ABOUT THE MELTDOWN/SPECTRE BUG

Earlier today, I published an article here on Blogger about the recent flaws found in kernels and processor firmware. I was a bit vague and unclear, but after doing more reading, I can give you a small set of instructions in regards to possible workarounds for now. These are just temporary and they may include a potential increase in RAM usage for those using these applications. Google-Chrome has yet to release their own workarounds inside the browser for the mentioned vulnerabilities on their side, however, the Chromium project released a small post about how users could reduce the attack vector in the browser by enabling one or two possible back end features themselves. Here I will attempt to better explain what this is and how to reduce your own vulnerability, assuming that you’re on Chrome or another chromium based browser. The recent vulnerabilities are targeted at all processor architectures and as I previously mentioned, do make use of Kernel memory via going through the ...

LINUX FIREWALL APPLICATIONS PT.1

The Linux firewall is managed by a service called Iptables. Iptables is a net-filter built into the Linux or Unix kernel. It is used even when third party applications are called. Iptables was initially released in 1998, but since has had a rewrite in favor of a new utility to be written into the kernel. People still use Iptables, most companies utilize this over third party applications just because they don’t want a middle man in between them and the computer’s settings. It is also more powerful using Iptables over third party applications as well because you’re interacting directly with the Kernel. Some third party applications that I frequently use include UFW for command line working with the firewall and GUFW for a gui for t he same command line firewall. Fedora and Red Hat have their own firewall service as firewall daemon. The Linux firewall is more robust than the Windows firewall in that it doesn’t try to discriminate traffic. It tells the user in the form of logs who is tal...

SPECTRE AND MELTDOWN

A few articles have already been written about these two kernel vulnerabilities within Linux. At time of this writing, several kernels have been released to kernel.org which help mitigate exploitation of the kernel via way of user apps which can then gain access to privileged, root user memory allocated for the kernel itself. Spectre and Meltdown both seem to utilize what is known as “speculative execution” to allow an attacker to see passwords or keys that the chip(processor) handles. This would allow anyone watching a free ride into your accounts. These flaws are based on the processor itself and have an affect on Windows, Mac and Linux. Sadly, the best possible solution would be to replace all the chips currently in use by PC’s, but this is not really an option for everyone. Outside of this, many applications, browsers and the like have made strides to mitigate these attacks. Microsoft has already released patches. These vulnerabilities are serious, so you should update as soon as...