Disclaimer
This article is for research purposes. If you do this, I will not be held responsible for any license violations that may occur.
- MC60H-DWHD5-H80U9-6V85M-8280D
- 4A4RR-813DK-M81A9-4U35H-06KND
This article is for research purposes. If you do this, I will not be held responsible for any license violations that may occur.
irssi or weechat.
sudo apt install tor hexchattor command to start the tor service on 127.0.0.1:9050.Taken from https://github.com/pixeltris/TwitchAdSolutions.
My filters tab add twitch.tv##+js(twitch-videoad).Settings tab, enable I am an advanced user, then click the cog that appears. Modify the value of userResourcesLocation from unset to the full url of the solution you wish to use (if a url is already in use, add a space after the existing url). e.g. userResourcesLocation https://github.com/pixeltris/TwitchAdSolutions/raw/master/vaft/vaft-ublock-origin.jsThe way Windows handles the recycle bin is by moving your “deleted” files to a secret directory called $RECYCLE.BIN on the root of whatever storage device you’re removing from. The problem starts when you move from one device to another after “deleting” something. Files accumulate, but you can’t see them normally, including sensitive ones. The only way you can is either by enabling View Protected Operating System Files in explorer.exe, or by using Everything which caches this directory.
The below command shows how to manually clear this directory:
rmdir /q /s C:\$RECYCLE.BIN
Change the drive letter to whatever mounted storage media you want to clear out.
Arch-based distros:
sudo apt install spice-vdagent qemu-guest-agent
Debian-based distros:
sudo pacman -Syu spice-vdagent qemu-guest-agent
Lastly, turn off completely – not restart – your VM. This means a complete power off. Then, turn it back on.
pkill tor, or simply close tor.rm -rf ~/.tortor.Encrypting VMs is a best practice.
If you have any sensitive data, or something that needs to be hidden, encrypting your VMs is a necessity! Think about how vulnerable VMware files are to attackers. Instead of having to take your hard drive, they simply have to pull a file, then boot it up themselves, duplicate it, or who knows what.
In a day in age where VMs are so ubiquitous (especially VMware Workstation ones), this is extremely important.
Consider this: there are risks to not encrypting your VMs, but no risk to encrypting them. Why take the risk?
Generally install and activate your SSH service/daemon. Set the port to something other than the default 22. Finally, port forward it onto the Internet.
As an optional recommendation, disable PasswordAuthentication in your /etc/ssh/sshd_config and instead use SSH keys.
Install sshfs-win-manager, sshfs-win, and WinFsp. These are three different types of programs that allow you to mount sshfs shares natively on Windows. Mount the server + directory you want to use via the sshfs-win-manager front-end.
After the directory is mounted, create a New Vault using Cryptomator. Set a secure and unique password, and ensure you keep the recovery password in a secure area.
Very basic tips to “lockdown” your Android device. Obviously, the best recommendation would be to not use a phone at all, but realistically, in this day in age, that’s not possible.