- In legacy GRUB the default is /boot/grub/menu.list
- In GRUB2 the default is /boot/grub/grub.cfg
- We mainly edit /etc/default/grub, which controls mainly the appearance of the GRUB menu.
- We may also edit the scripts in /etc/grub.d/
- These are the scripts that boot your operating systems, control external applications such as memtest&os_prober
- theming./boot/grub/grub.cfgis built from- /etc/default/grub&- /etc/grub.d/*
- update-grub
- grub>prompt, that is the full GRUB 2 command shell.
- GRUB2 started normally and loaded the normal.modmodule other modules which are located in/boot/grub/[arch]/
- If GRUB2 didn’t find grub.cfgfile then,grub rescue>is prompted that means it couldn’t findnormal.mod, so it probably couldn’t find any of the boot files.
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | // insert your Spotify client id and secret here | |
| let clientId = "xxx" | |
| let clientSecret = "xxx" | |
| // use your spotify country iso code to optimize search results | |
| let spotifyCountry = "DE" | |
| // optional: the ip of your node-sonos-http-api and room name; use "sonos" as parameter in your widget settings to activate it | |
| let sonosUrl = "http://192.168.178.10:5005/Kitchen" | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | # Removes Webroot SecureAnywhere by force | |
| # Run the script once, reboot, then run again | |
| # Webroot SecureAnywhere registry keys | |
| $RegKeys = @( | |
| "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\WRUNINST", | |
| "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WRUNINST", | |
| "HKLM:\SOFTWARE\WOW6432Node\WRData", | |
| "HKLM:\SOFTWARE\WOW6432Node\WRCore", | |
| "HKLM:\SOFTWARE\WOW6432Node\WRMIDData", | 
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
- If you want to add a link, comment or send it to me
- Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak
- Royce Williams list sorted by vendors responses Royce List
- Very detailed list NCSC-NL
- The list maintained by U.S. Cybersecurity and Infrastructure Security Agency: CISA List
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | #!/bin/bash | |
| # Sets the WSL eth0 adapter to the same MTU as a Juniper Networks Virtual Adapter, from the Windows side. | |
| # This can help make certain connections (SSH/HTTPS specifically) more stable/reliable, as they can use | |
| # larger packets when initiating connections or sending large chunks of data. | |
| # Recommended to run in ~/.profile to persist across reboots. Remember to make this script executable. | |
| # Add to sudoers file if running in ~/.profile | |
| # %sudo ALL=(ALL) NOPASSWD: /usr/sbin/ip link set mtu * dev * | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | # WSL2 network port forwarding script v1 | |
| # for enable script, 'Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser' in Powershell, | |
| # for delete exist rules and ports use 'delete' as parameter, for show ports use 'list' as parameter. | |
| # written by Daehyuk Ahn, Aug-1-2020 | |
| # Display all portproxy information | |
| If ($Args[0] -eq "list") { | |
| netsh interface portproxy show v4tov4; | |
| exit; | |
| } | 
- Google Safe Browsing: Report a Malware Page https://safebrowsing.google.com/safebrowsing/report_badware/?hl=en
- Report an unsafe site - Microsoft Security Intelligence
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | Collection of DNS service IPs and URLs for blocking malware | 
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | set prompt=$T$H$H$H$H$H$H$S%computername%\%username%$S$M$P$+$G | |
| 22:14 DESKTOP\User C:\Users\User> | |
| set prompt=$T$H$H$H$H$H$H$S%UserName%@%ComputerName%$B$M$P$+$G | |
  
    
      This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
      Learn more about bidirectional Unicode characters
    
  
  
    
  | REM How to Run Windows Installer in Safe Mode Windows 10 with Command Prompt | |
| REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer" /VE /T REG_SZ /F /D "Service" | |
| REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer" /VE /T REG_SZ /F /D "Service" | |
| net start msiserver |