I have a few extensions of mine on Pootle and I decided to migrate those:
- cloudflare
- direct_mail_userfunc
- file_list
- ig_ldap_sso_auth
Currently all DNS queries are being queried over normal HTTP that can be intercepted and the hacker/scammer can then respond with a different IP address, misleading you to a clone of the original website that the hacker owns.
This can be avoided by installing Cloudflare's own app, cloudflared, on your machine to route all your DNS queries over HTTPS which is secure and can't be altered. It's also a lot faster! 💡 Learn More
This is a guide on how to install cloudflared to query Cloudflare's DNS server over an HTTPS connection.
There's a workaround that might be useful for some people - use the Shadowsocks app for Android TV. Because that app only accepts a JSON configuration file, you need to convert the Outline key to JSON.
{
"server":"YOUR-SERVER",
"server_port":12345,
"local_port":1080,
"password":"YOUR-PASSWORD",
"method":"chacha20-ietf-poly1305",| <?php | |
| namespace B13\AnyProject\PageErrorHandler; | |
| /* | |
| * This file is part of a b13 extension. | |
| * | |
| * It is free software; you can redistribute it and/or modify it under | |
| * the terms of the GNU General Public License, either version 2 | |
| * of the License, or any later version. | |
| * |
| # Useful for improving Time Machine backup prep. times, Mac App Store install speeds, etc. | |
| sudo sysctl debug.lowpri_throttle_enabled=0 | |
| # To restore defaults | |
| sudo sysctl debug.lowpri_throttle_enabled=1 |
| #!/bin/bash | |
| # Forticlient SSL VPN Client launching script utilizing expect. | |
| # -------------------------------------------- | |
| # CONFIGURATION | |
| # If empty - script will take some simple logic to locate appropriate binary. | |
| FORTICLIENT_PATH="" |
| /* This Source Code Form is subject to the terms of the Mozilla Public | |
| * License, v. 2.0. If a copy of the MPL was not distributed with this file, | |
| * You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| "use strict"; | |
| /* | |
| * thirty-two | |
| * https://github.com/chrisumbel/thirty-two | |
| * |
| /* | |
| * TypoScript | |
| */ | |
| # render headline | |
| #tt_content.gridelements_pi1.10 = < lib.stdheader | |
| tt_content.gridelements_pi1.20.10.setup { | |
| 1 < lib.gridelements.defaultGridSetup | |
| 1 { | |
| cObject = FLUIDTEMPLATE | |
| cObject { |
You should never let passwords or private data be transmitted over an untrusted network (your neighbor’s, the one at Starbucks or the company) anyway, but on a hacker congress like the #30C3, this rule is almost vital.
Hackers get bored easily, and when they’re bored, they’re starting to look for things to play with. And a network with several thousand connected users is certainly an interesting thing to play with. Some of them might start intercepting the data on the network or do other nasty things with the packets that they can get.
If these packets are encrypted, messing with them is much harder (but not impossible! – see the end of this article). So you want your packets to be always encrypted. And the best way to do that is by using a VPN.