Create a directory to contain everything
touch certindex
echo 1000 > certserial
Instructions to obtain WireGuard details of your NordVPN account. These can be used to setup a WireGuard tunnel on your router to NordVPN.
Source: https://forum.gl-inet.com/t/configure-wireguard-client-to-connect-to-nordvpn-servers/10422/27
If you have any linux machine, use that or install a vm if you don't have one.
Get their official linux app installed. Make sure you have wireguard installed too. And set the used technology to Nordlynx by running nordvpn set technology nordlynx
The Brother PTP300BT label maker is intended to be controlled using the official Brother P-Touch Design & Print iOS/Android app. The app has arbitrary limits on what you can print (1 text object and up to 3 preset icons), so I thought it would be a fun challenge to reverse engineer the protocol to print whatever I wanted.
Python code at the bottom if you want to skip the fine details.
Intitially I had a quick peek at the Android APK to see if there was any useful information inside. The code that handles the communication with the printer in Print&Design turned out to be a native library, but the app clearly prepares a bitmap image and passes it to this native library for printing. Bitmaps are definitely something we can work with.
You are a security consultant. A large enterprise customer hires you to ensure that their security operations are following industry standard control frameworks. For this project, the customer wants you to focus on technology solutions that will discourage malicious activities. Which type of control framework should you focus on?
[ ] Preventative
[ ] Deterrent
[ ] Detective
[ ] Corrective
[ ] Assessment
declare global { | |
var logger: bunyan | |
} | |
import * as bunyan from 'bunyan' | |
globalThis.logger = bunyan.createLogger({ | |
name: "LOGGER" | |
}) |
# Build Server | |
LIB_DIR=~/.opt/lib | |
BIN_DIR=~/.opt/bin | |
INCLUDE_DIR=~/.opt/include | |
cmake ../ -DProtobuf_INCLUDE_DIR=$INCLUDE_DIR/ -DProtobuf_PROTOC_LIBRARIES=$LIB_DIR/ -DProtobuf_PROTOC_EXECUTABLE=$BIN_DIR/protoc -Dsodium_INCLUDE_DIR=$INCLUDE_DIR -Dsodium_LIBRARY_RELEASE=$LIB_DIR/libsodium.a -Dsodium_LIBRARY_DEBUG=true -DUTEMPTER_INCLUDE_DIR=$INCLUDE_DIR -DProtobuf_LITE_LIBRARY=$LIB_DIR/libprotobuf-lite.so -DUTEMPTER_LIBRARIES=$LIB_DIR/libutempter.so -DCMAKE_INSTALL_PREFIX=$HOME/.opt | |
# Server | |
etserver --daemon --pidfile ~/.etserver.pid |
// ==UserScript== | |
// @name GST in Australia | |
// @namespace http://tampermonkey.net/aliexpress-gst | |
// @version 0.1 | |
// @description try to take over the world! | |
// @author You | |
// @match https://www.aliexpress.com/* | |
// @icon https://www.google.com/s2/favicons?domain=aliexpress.com | |
// @grant none | |
// ==/UserScript== |
@echo off | |
title youtube-dl %* | |
cd /d %USERPROFILE%\Downloads | |
youtube-dl --embed-thumbnail --extract-audio --audio-format mp3 -o "%%(title)s.%%(ext)s" %* |
life360_username="---" | |
life360_password="---" | |
import requests | |
urlPrefix = "https://api.life360.com/v3/" | |
print("Authorising...") | |
auth = requests.post(urlPrefix + "oauth2/token.json",headers=dict(Authorization="Basic cFJFcXVnYWJSZXRyZTRFc3RldGhlcnVmcmVQdW1hbUV4dWNyRUh1YzptM2ZydXBSZXRSZXN3ZXJFQ2hBUHJFOTZxYWtFZHI0Vg=="), data=dict(grant_type="password",username=life360_username,password=life360_password)) | |
assert auth.status_code ==200 |