<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>108Mhz</title><description/><link>/</link><language>en</language><copyright>Copyright 2023, Ronalds Vilcins</copyright><lastBuildDate>Mon, 02 Jan 2023 00:00:00 +0000</lastBuildDate><generator>Hugo - gohugo.io</generator><docs>http://cyber.harvard.edu/rss/rss.html</docs><atom:link href="https://ronaldsvilcins.com/atom.xml" rel="self" type="application/atom+xml"/><item><title>Top bar hive</title><link>/2023/01/02/topbar/</link><description>&lt;p>&lt;img src="./topbar.png" alt="Top bar nuc" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="./topbar2.png" alt="Top bar nuc" loading="lazy" />
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2023/01/02/topbar/</guid><pubDate>Mon, 02 Jan 2023 00:00:00 +0000</pubDate></item><item><title>Backup docker container</title><link>/2022/07/28/docker-backup/</link><description>&lt;h5 id="how-to-back-up-docker-container">How To Back Up Docker Container &lt;a href="#how-to-back-up-docker-container" class="hash">#&lt;/a>&lt;/h5>
&lt;p>Before we back up a docker container, we need the &lt;code>container ID&lt;/code> of that specific container. Here, will use the &lt;code>ps&lt;/code> command to get the IDs of all the running containers.&lt;/p>
&lt;p>From here, we can copy the &lt;code>container ID&lt;/code> of the container we need to back up.&lt;/p>
&lt;p>So, to list all the IDs of all the running containers, use the following command:&lt;/p>
&lt;pre>&lt;code>docker ps -a
&lt;/code>&lt;/pre>
&lt;p>In the results, we&amp;rsquo;ll look for the &lt;code>container ID&lt;/code> of the docker container that we want to back up, copy it, and then use it with the Docker &lt;code>commit&lt;/code> command. The format for this command is:&lt;/p>
&lt;pre>&lt;code>docker commit -p &amp;lt;CONTAINER_ID&amp;gt; &amp;lt;BACKUP_NAME&amp;gt;
&lt;/code>&lt;/pre>
&lt;p>So, for example, if the &lt;code>container ID&lt;/code> of our container is &lt;code>5c7d78fcb634&lt;/code>, and the name of our backup is &lt;code>our-docker-backup&lt;/code>, the command will be:&lt;/p>
&lt;pre>&lt;code>docker commit -p 5c7d78fcb634 our-docker-backup
&lt;/code>&lt;/pre>
&lt;p>With this command we&amp;rsquo;ve first paused a running container with the &lt;code>-p&lt;/code> option, and we&amp;rsquo;ve made a commit to save the entire snapshot as a docker image with the name &lt;code>our-docker-backup&lt;/code>.&lt;/p>
&lt;p>We can also save the image as a &lt;code>tar&lt;/code> file on our local machine by using the command:&lt;/p>
&lt;pre>&lt;code>docker save -o ∽/our-docker-backup.tar our-docker-backup
&lt;/code>&lt;/pre>
&lt;p>We can check whether the file has been saved by using the command:&lt;/p>
&lt;pre>&lt;code>ls -l ∽/our-docker-backup.tar
&lt;/code>&lt;/pre>
&lt;p>When it saved as a &lt;code>tar&lt;/code> file we can move it do any other desired docker host system for a deployment.&lt;/p>
&lt;p>We can also redeploy our &lt;code>our-docker-backup&lt;/code> image on another docker host system by using the push command to push the image to a private docker repository.&lt;/p>
&lt;p>To do this, will use the command:&lt;/p>
&lt;pre>&lt;code>docker login
docker push our-docker-backup
&lt;/code>&lt;/pre>
&lt;p>Now that we&amp;rsquo;ve backed up our Docker container, let&amp;rsquo;s look at the procedure to restore Docker containers, either locally or on another machine.&lt;/p>
&lt;h2 id="httpssimplebackupscomblogdocker-container-backup-restore-guidehow-to-restore-a-docker-backup">&lt;a href="https://simplebackups.com/blog/docker-container-backup-restore-guide/#how-to-restore-a-docker-backup" target="_blank">
&lt;/a>
&lt;a href="#httpssimplebackupscomblogdocker-container-backup-restore-guidehow-to-restore-a-docker-backup" class="hash">#&lt;/a>&lt;/h2>
&lt;h5 id="how-to-restore-a-docker-backup">How To Restore A Docker Backup &lt;a href="#how-to-restore-a-docker-backup" class="hash">#&lt;/a>&lt;/h5>
&lt;p>If we&amp;rsquo;ve saved the &lt;code>tar&lt;/code> file on our host machine, we can restore it by using the docker &lt;code>load&lt;/code> command. To do this, we&amp;rsquo;ll use the command:&lt;/p>
&lt;pre>&lt;code>docker load -i ∽/our-docker-backup.tar
&lt;/code>&lt;/pre>
&lt;p>To make sure that the image was restored successfully, we can then list all the images using the following command:&lt;/p>
&lt;pre>&lt;code>docker images
&lt;/code>&lt;/pre>
&lt;p>If we&amp;rsquo;ve pushed the backup image to a docker repository, we can use the &lt;code>pull&lt;/code> command to pull the data from the repository.&lt;/p>
&lt;p>Here, we&amp;rsquo;ll use the command:&lt;/p>
&lt;pre>&lt;code>docker pull our-docker-backup:tag
&lt;/code>&lt;/pre>
&lt;p>Once we&amp;rsquo;ve restored the backed up image on our local machine, we can use the &lt;code>run&lt;/code> command to run a new instance of the restore docker image. to do this we use the command:&lt;/p>
&lt;pre>&lt;code>docker run -ti our-docker-backup:tag
&lt;/code>&lt;/pre></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2022/07/28/docker-backup/</guid><pubDate>Thu, 28 Jul 2022 00:00:00 +0000</pubDate></item><item><title>Cinema</title><link>/2022/07/28/cinema/</link><description>&lt;p>Haute Couture : Sylvie Ohayon. 2021&lt;/p>
&lt;p>Roujin-Z : Hiroyuki Kitakubo. 1991&lt;/p>
&lt;p>Tekkon Kinkreet : Michael Arias. 2006&lt;/p>
&lt;p>Ghost in the Shell 2 Innocence : Mamoru Oshii. 2004&lt;/p>
&lt;p>Everything Everywhere All at Once : Dan Kwan &amp;amp; Daniel Scheinert. 2022&lt;/p>
&lt;p>Shang-Chi and the Legend of the Ten Rings : Destin Daniel Cretton. 2021&lt;/p>
&lt;p>The Girl with the Dragon Tattoo : David Fincher. 2011&lt;/p>
&lt;p>Drive My Car : Ryûsuke Hamaguchi. 2021&lt;/p>
&lt;p>La dea fortuna : Ferzan Ozpetek. 2019&lt;/p>
&lt;p>The Tragedy of Macbbeth : Joel Coen. 2021&lt;/p>
&lt;p>First Man : Damien Chazlle. 2018&lt;/p>
&lt;p>Ergo Proxy : 2006&lt;/p>
&lt;p>Metropolis : Rintaro. 2001&lt;/p>
&lt;p>Trava - Fist Planet : Katsuhito Ishii, Takeshi Koike. 2001&lt;/p>
&lt;p>Legend of the Galactic Heroes : 1988-1997&lt;/p>
&lt;p>Cybersix : Carlos Meglia, Carlos Trillo. 1999-2000&lt;/p>
&lt;p>Les miserables : Tom Hooper. 2012&lt;/p>
&lt;p>Minamata : Andrew Levitas 2020&lt;/p>
&lt;p>Menocchio : Alberto Fasulo. 2019&lt;/p>
&lt;p>Bad trip : Kitao Sakurai. 2021&lt;/p>
&lt;p>Climax : Gaspar Noé. 2018&lt;/p>
&lt;p>The family friend : Paolo Sorrentino. 2006&lt;/p>
&lt;p>Paterson : Jim Jarmusch. 2016&lt;/p>
&lt;p>Fried Barry : Ryan Kruger. 2020&lt;/p>
&lt;p>A quiet place : John Krasinski. 2018&lt;/p>
&lt;p>This is England : Shane Meadows. 2006&lt;/p>
&lt;p>Corpus Christi : Jan Komasa. 2019&lt;/p>
&lt;p>The lighthouse : Robert Eggers. 2019&lt;/p>
&lt;p>Supermarkt : Roland Klick. 1974&lt;/p>
&lt;p>Clemency : Chinonye Chukwu. 2019&lt;/p>
&lt;p>So long my son : Wang Xiaoshuai. 2019&lt;/p>
&lt;p>A hidden life : Terrence Malick. 2019&lt;/p>
&lt;p>Isle of dogs : Wes Anderson. 2018&lt;/p>
&lt;p>This must be the place : Paolo Sorrentino. 2011&lt;/p>
&lt;p>Palm Springs : Max Barbakow. 2020&lt;/p>
&lt;p>Babyteeth : Shannon Murphy. 2019&lt;/p>
&lt;p>Himizu : Sion Sono. 2011&lt;/p>
&lt;p>An Elephant Sitting Still : Hu Bo. 2011&lt;/p>
&lt;p>The Distinguished Citizen : Gastón Duprat &amp;amp; Mariano Cohn. 2016&lt;/p>
&lt;p>At Eternity&amp;rsquo;s Gate : Julian Schnabel. 2018&lt;/p>
&lt;p>Minari : Lee Chung. 2021&lt;/p>
&lt;p>Bullit : Peter Yates. 1968&lt;/p>
&lt;p>Elephant : Gus Van Sant. 2003&lt;/p>
&lt;p>I Am Not Your Negro : Raoul Peck. 2016&lt;/p>
&lt;p>House of Gucci&lt;/p>
&lt;p>Coda&lt;/p>
&lt;p>The Outfit&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2022/07/28/cinema/</guid><pubDate>Thu, 28 Jul 2022 00:00:00 +0000</pubDate></item><item><title>Nano keystrokes</title><link>/2022/07/16/nano-keystrokes/</link><description>&lt;p>Nano is a text editor based on Pico text editor. Unlike Pico, Nano is
licensed under the GNU General Public License. Released as freeware by
Chris Allegretta in 1999, Nano became part of the GNU Project in 2001.&lt;/p>
&lt;p>Nano has 87 shortcuts and we have listed all of them below.&lt;/p>
&lt;h2 id="file">File &lt;a href="#file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Ctrl + O Write the current file to disk&lt;/p>
&lt;p>F3 Write the current file to disk&lt;/p>
&lt;p>Ctrl + X Close the current file buffer / Exit from Nano&lt;/p>
&lt;p>F2 Close the current file buffer / Exit from Nano&lt;/p>
&lt;p>Ctrl + R Insert another file into the current one&lt;/p>
&lt;p>F5 Insert another file into the current one&lt;/p>
&lt;p>Alt + &amp;lt; Switch to the previous file buffer&lt;/p>
&lt;p>Alt + , Switch to the previous file buffer&lt;/p>
&lt;p>Alt + &amp;gt; Switch to the next file buffer&lt;/p>
&lt;p>Alt + . Switch to the next file buffer&lt;/p>
&lt;p>Alt + D Count the number of words, lines, and characters&lt;/p>
&lt;p>Ctrl + L Refresh (redraw) the current screen&lt;/p>
&lt;h2 id="editing">Editing &lt;a href="#editing" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Alt + U Undo the last operation&lt;/p>
&lt;p>Alt + E Redo the last undone operation&lt;/p>
&lt;p>Alt + } Indent the current line&lt;/p>
&lt;p>Alt + { Unindent the current line&lt;/p>
&lt;p>Alt + ^ Copy the current line and store it in the cut buffer&lt;/p>
&lt;p>Alt + 6 Copy the current line and store it in the cut buffer&lt;/p>
&lt;p>Ctrl + K Cut the current line and store it in the cut buffer&lt;/p>
&lt;p>F9 Cut the current line and store it in the cut buffer&lt;/p>
&lt;p>Ctrl + U Uncut from the cut buffer into the current line&lt;/p>
&lt;p>Alt + V Insert the next keystroke verbatim&lt;/p>
&lt;p>Ctrl + I Insert a tab at the cursor position&lt;/p>
&lt;p>Ctrl + M Insert a newline at the cursor position&lt;/p>
&lt;p>Ctrl + D Delete the character under the cursor&lt;/p>
&lt;p>Ctrl + H Delete the character to the left of the cursor&lt;/p>
&lt;p>Alt + T Cut from the cursor position to the end of the file&lt;/p>
&lt;p>Ctrl + W Search for a string or a regular expression&lt;/p>
&lt;p>F6 Search for a string or a regular expression&lt;/p>
&lt;p>F16 Repeat last search&lt;/p>
&lt;p>Alt + W Repeat last search&lt;/p>
&lt;p>Ctrl + T Invoke the spell checker, if available&lt;/p>
&lt;p>F12 Ctrl + T Invoke the spell checker, if available&lt;/p>
&lt;p>Ctrl + \ Replace a string or a regular expression&lt;/p>
&lt;p>F14 Replace a string or a regular expression&lt;/p>
&lt;p>Alt + R Replace a string or a regular expression&lt;/p>
&lt;h2 id="formatting">Formatting &lt;a href="#formatting" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Ctrl + J Justify the current paragraph&lt;/p>
&lt;p>F4 Justify the current paragraph&lt;/p>
&lt;p>Alt + J Justify the entire file&lt;/p>
&lt;h2 id="navigation">Navigation &lt;a href="#navigation" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Ctrl + Y Move to the previous screen&lt;/p>
&lt;p>F7 Move to the previous screen&lt;/p>
&lt;p>Ctrl + V Move to the next screen&lt;/p>
&lt;p>F8 Move to the next screen&lt;/p>
&lt;p>Ctrl + B Go back one character&lt;/p>
&lt;p>Ctrl + F Go forward one character&lt;/p>
&lt;p>Alt + Space Go back one word&lt;/p>
&lt;p>Ctrl + Space go forward one word&lt;/p>
&lt;p>Ctrl + _ Go to line and column number&lt;/p>
&lt;p>F13 Go to line and column number&lt;/p>
&lt;p>Alt + G Go to line and column number&lt;/p>
&lt;p>Ctrl + ^ Mark text at the cursor position&lt;/p>
&lt;p>F15 Mark text at the cursor position&lt;/p>
&lt;p>Alt + A Mark text at the cursor position&lt;/p>
&lt;p>Ctrl + C Display the position of the cursor&lt;/p>
&lt;p>F11 Display the position of the cursor&lt;/p>
&lt;p>Ctrl + A Move to the beginning of the current line&lt;/p>
&lt;p>Ctrl + E Move to the end of the current line&lt;/p>
&lt;p>Alt + ( Move to the beginning of the current paragraph&lt;/p>
&lt;p>Alt + 9 Move to the beginning of the current paragraph&lt;/p>
&lt;p>Alt + ) Move to the end of the current paragraph&lt;/p>
&lt;p>Alt + 0 Move to the end of the current paragraph&lt;/p>
&lt;p>Alt + \ Move to the first line of the file&lt;/p>
&lt;p>Alt + | Move to the first line of the file&lt;/p>
&lt;p>Alt + / Move to the last line of the file&lt;/p>
&lt;p>Alt + ? Move to the last line of the file&lt;/p>
&lt;p>M + ] Move to the matching bracket&lt;/p>
&lt;p>Alt + - Scroll up one line without scrolling the cursor&lt;/p>
&lt;p>Alt + _ Scroll up one line without scrolling the cursor&lt;/p>
&lt;p>Alt + + Scroll down one line without scrolling the cursor&lt;/p>
&lt;p>Alt + = Scroll down one line without scrolling the cursor&lt;/p>
&lt;h2 id="enable--disable-settings">Enable / Disable settings &lt;a href="#enable--disable-settings" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Alt + X Help mode enable/disable&lt;/p>
&lt;p>Alt + C Constant cursor position display enable/disable&lt;/p>
&lt;p>Alt + O Use of one more line for editing enable/disable&lt;/p>
&lt;p>Alt + S Smooth scrolling enable/disable&lt;/p>
&lt;p>Alt + $ Soft wrapping of overlong lines enable/disable&lt;/p>
&lt;p>Alt + P Whitespace display enable/disable&lt;/p>
&lt;p>Alt + Y Colour syntax highlighting enable/disable&lt;/p>
&lt;p>Alt + H Smart home key enable/disable&lt;/p>
&lt;p>Alt + I Auto indent enable/disable&lt;/p>
&lt;p>Alt + K Cut to end enable/disable&lt;/p>
&lt;p>Alt + L Long line wrapping enable/disable&lt;/p>
&lt;p>Alt + Q Conversion of typed tabs to spaces enable/disable&lt;/p>
&lt;p>Alt + B Backup files enable/disable&lt;/p>
&lt;p>Alt + F Multiple file buffers enable/disable&lt;/p>
&lt;p>Alt + M Mouse support enable/disable&lt;/p>
&lt;p>Alt + N No conversion from DOS/Mac format enable/disable&lt;/p>
&lt;p>Alt + Z Suspension enable/disable&lt;/p>
&lt;p>&lt;a href="https://defkey.com/gnu-nano-shortcuts" target="_blank">
https://defkey.com/gnu-nano-shortcuts
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2022/07/16/nano-keystrokes/</guid><pubDate>Sat, 16 Jul 2022 00:00:00 +0000</pubDate></item><item><title>Useful knots</title><link>/2022/07/16/knots/</link><description>&lt;h1 id="some-basic-and-useful-knots">Some basic and useful knots. &lt;a href="#some-basic-and-useful-knots" class="hash">#&lt;/a>&lt;/h1>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_reef-240.png" alt="knot_reef" loading="lazy" />
&lt;/p>
&lt;p>Reef Knot or Kreuzknoten&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_slipstek-240.png" alt="knot_slipstek" loading="lazy" />
&lt;/p>
&lt;p>Slipstek&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_palstek01-240.png" alt="knot_palstek01" loading="lazy" />
&lt;/p>
&lt;p>Palstek or Bowline&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_PalstekWithSlipstek-240.png" alt="knot_PalstekWithSlipstek" loading="lazy" />
&lt;/p>
&lt;p>Fast method to make a Palstek using a Slipstek as a base.&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_figureOfEight-240.png" alt="knot_figureOfEight" loading="lazy" />
&lt;/p>
&lt;p>Figure of Eight&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_doubleFigureOfEight-240.png" alt="knot_doubleFigureOfEight" loading="lazy" />
&lt;/p>
&lt;p>Double Figure of Eight&lt;/p>
&lt;p>&lt;img src="https://nchrs.xyz/media/knots/knot_stevedore-240.png" alt="knot_stevedore" loading="lazy" />
&lt;/p>
&lt;p>Stevedore&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2022/07/16/knots/</guid><pubDate>Sat, 16 Jul 2022 00:00:00 +0000</pubDate></item><item><title>You Don't Need GUI</title><link>/2022/06/19/no-gui/</link><description>&lt;p>Graphical user interfaces are super friendly to computer users. They were introduced in reaction to the perceived steep learning curve of command-line interfaces (CLIs).&lt;/p>
&lt;p>However, they often require more resources, are less powerful and hard to automate via scripting.&lt;/p>
&lt;p>As a computer expert, we want to be more efficient and do our jobs better. We know that command words may not be easily discoverable or mnemonic, so we try to list some common tasks that you might be tempted to do in GUI.&lt;/p>
&lt;h2 id="quick-links">Quick links &lt;a href="#quick-links" class="hash">#&lt;/a>&lt;/h2>
&lt;ol>
&lt;li>&lt;a href="#copy-a-file">
copy a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#duplicate-a-file">
duplicate a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#copy-a-directory">
copy a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#duplicate-a-directory">
duplicate a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#move-a-file">
move a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#rename-a-file">
rename a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#move-a-directory">
move a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#rename-a-directory">
rename a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#merge-directories">
merge directories
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#create-a-new-file">
create a new file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#create-a-new-directory">
create a new directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#show-filedirectory-size">
show file/directory size
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#show-filedirectory-info">
show file/directory info
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#open-a-file-with-the-default-program">
open a file with the default program
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#open-a-file-in-any-application">
open a file in any application
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#zip-a-directory">
zip a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#unzip-a-directory">
unzip a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#peek-files-in-a-zip-file">
peek files in a zip file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#remove-a-file">
remove a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#remove-a-directory">
remove a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#remove-all-files-of-certain-criteria">
remove all files of certain criteria
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#list-directory-contents">
list directory contents
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#tree-view-a-directory-and-its-subdirectories">
tree view a directory and its subdirectories
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#find-a-stale-file">
find a stale file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#show-a-calendar">
show a calendar
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#find-a-future-date">
find a future date
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#use-a-calculator">
use a calculator
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#force-quit-a-program">
force quit a program
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#check-server-response">
check server response
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#view-content-of-a-file">
view content of a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#search-for-a-text-in-a-file">
search for a text in a file
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#search-in-all-files-in-current-working-directory-quickly-entire-disk-in-less-than-15-minutes">
search in all files in current working directory, quickly (entire disk in less than 15 minutes)
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#view-an-image">
view an image
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#show-disk-size">
show disk size
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#check-performance-of-your-computer">
check performance of your computer
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#know-whether-your-computer-is-under-load-and-whether-its-due-to-memory-or-cpu">
know whether your computer is under load, and whether it&amp;amp;rsquo;s due to memory or CPU
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#poweroff-or-reboot-your-computer">
poweroff or reboot your computer
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#locate-usb-drives">
locate USB drives
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#unmount-usb-drives">
unmount USB drives
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#format-usb-drives">
format USB drives
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#check-usb-format">
check USB format
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#run-command-on-all-files-of-a-directory">
run command on all files of a directory
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#quick-tips">
Quick tips
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#hotkeys">
Hotkeys
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="#i-cant-remember-these-cryptic-commands">
I can&amp;amp;rsquo;t remember these cryptic commands
&lt;/a>
&lt;/li>
&lt;/ol>
&lt;h2 id="copy-a-file">copy a file &lt;a href="#copy-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DRAG AND DROPPING A FILE, OR CMD/CTRL + C, CMD/CTRL + V A FILE&lt;/strong> :-1:&lt;/p>
&lt;p>Copy &lt;code>readme.txt&lt;/code> to the &lt;code>documents&lt;/code> directory&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cp readme.txt documents/
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="duplicate-a-file">duplicate a file &lt;a href="#duplicate-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND DUPLICATE A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cp readme.txt readme.bak.txt
&lt;/code>&lt;/pre>
&lt;p>More advanced:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cp readme{,.bak}.txt
# Note: learn how the {} works with touch foo{1,2,3}.txt and see what happens.
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="copy-a-directory">copy a directory &lt;a href="#copy-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DRAG AND DROPPING A DIRECTORY, OR CMD/CTRL + C, CMD/CTRL + V A DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;p>Copy &lt;code>myMusic&lt;/code> directory to the &lt;code>myMedia&lt;/code> directory&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cp -a myMusic myMedia/
# or
$ cp -a myMusic/ myMedia/myMusic/
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="duplicate-a-directory">duplicate a directory &lt;a href="#duplicate-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND DUPLICATE A DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cp -a myMusic/ myMedia/
# or if `myMedia` folder doesn't exist
$ cp -a myMusic myMedia/
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="move-a-file">move a file &lt;a href="#move-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DRAG AND DROPPING A FILE, OR CMD/CTRL + X, CMD/CTRL + V A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ mv readme.txt documents/
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Always&lt;/strong> use a trailing slash when moving files, &lt;a href="http://unix.stackexchange.com/a/50533" target="_blank">
for this reason
&lt;/a>
.&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="rename-a-file">rename a file &lt;a href="#rename-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND RENAME A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ mv readme.txt README.md
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="move-a-directory">move a directory &lt;a href="#move-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DRAG AND DROPPING A DIRECTORY, OR CMD/CTRL + X, CMD/CTRL + V A DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ mv myMedia myMusic/
# or
$ mv myMedia/ myMusic/myMedia
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="rename-a-directory">rename a directory &lt;a href="#rename-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND RENAME A DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ mv myMedia/ myMusic/
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="merge-directories">merge directories &lt;a href="#merge-directories" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DRAG AND DROPPING TO MERGE DIRECTORIES&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ rsync -a /images/ /images2/ # note: may over-write files with the same name, so be careful!
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="create-a-new-file">create a new file &lt;a href="#create-a-new-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND CREATE A NEW FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ touch 'new file' # updates the file's access and modification timestamp if it already exists
# or
$ &amp;gt; 'new file' # note: erases the content if it already exists
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="create-a-new-directory">create a new directory &lt;a href="#create-a-new-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND CREATE A NEW DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ mkdir 'untitled folder'
# or
$ mkdir -p 'path/may/not/exist/untitled folder'
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="show-filedirectory-size">show file/directory size &lt;a href="#show-filedirectory-size" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND SHOW FILE/directory INFO&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ du -sh node_modules/
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="show-filedirectory-info">show file/directory info &lt;a href="#show-filedirectory-info" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND SHOW FILE/DIRECTORY INFO&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ stat -x readme.md # on macOS
$ stat readme.md # on Linux
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="open-a-file-with-the-default-program">open a file with the default program &lt;a href="#open-a-file-with-the-default-program" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DOUBLE CLICKING ON A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ xdg-open file # on Linux
$ open file # on MacOS
$ start file # on Windows
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="open-a-file-in-any-application">open a file in any application &lt;a href="#open-a-file-in-any-application" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND OPEN WITH&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ open -a appName file
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="zip-a-directory">zip a directory &lt;a href="#zip-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND COMPRESS DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ zip -r archive_name.zip folder_to_compress
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="unzip-a-directory">unzip a directory &lt;a href="#unzip-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND UNCOMPRESS DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ unzip archive_name.zip
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="decompress-files-of-any-format">decompress files of any format &lt;a href="#decompress-files-of-any-format" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND UNCOMPRESS DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ unar archive_name.zip
$ unar archive_name.7z
$ unar archive_name.rar
$ unar archive_name.ISO
$ unar archive_name.tar.gz
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="peek-files-in-a-zip-file">peek files in a zip file &lt;a href="#peek-files-in-a-zip-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING WinRAR&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ zipinfo archive_name.zip
# or
$ unzip -l archive_name.zip
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="peek-files-in-a-compress-file-of-any-format">peek files in a compress file of any format &lt;a href="#peek-files-in-a-compress-file-of-any-format" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING WinRAR&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ lsar -l archive_name.zip
$ lsar -l archive_name.7z
$ lsar -l archive_name.ISO
$ lsar -l archive_name.rar
$ lsar -l archive_name.tar.gz
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="remove-a-file">remove a file &lt;a href="#remove-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND DELETE A FILE PERMANENTLY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ rm my_useless_file
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>IMPORTANT&lt;/strong>: The &lt;code>rm&lt;/code> command deletes &lt;code>my_useless_file&lt;/code> permanently, which is equivalent to move &lt;code>my_useless_file&lt;/code> to Recycle Bin and hit Empty Recycle Bin.&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="remove-a-directory">remove a directory &lt;a href="#remove-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING AND DELETE A DIRECTORY PERMANENTLY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ rm -r my_useless_folder
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="remove-all-files-of-certain-criteria">remove all files of certain criteria &lt;a href="#remove-all-files-of-certain-criteria" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell">$ find . -name &amp;quot;*.bak&amp;quot; -type f -delete
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>IMPORTANT&lt;/strong>: run &lt;code>find . -name &amp;quot;*.bak&amp;quot; -type f&lt;/code> first to see exactly which files you will remove.&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="list-directory-contents">list directory contents &lt;a href="#list-directory-contents" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP OPENING YOUR FINDER OR FILE EXPLORER&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ ls my_folder # Simple
$ ls -la my_folder # -l: show in list format. -a: show all files, including hidden. -la combines those options.
$ ls -alrth my_folder # -r: reverse output. -t: sort by time (modified). -h: output human-readable sizes.
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="tree-view-a-directory-and-its-subdirectories">tree view a directory and its subdirectories &lt;a href="#tree-view-a-directory-and-its-subdirectories" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP OPENING YOUR FINDER OR FILE EXPLORER&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ tree # on Linux
$ find . -print | sed -e 's;[^/]*/;|____;g;s;____|; |;g' # on MacOS
# Note: install homebrew (https://brew.sh) to be able to use (some) Linux utilities such as tree.
# brew install tree
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="find-a-stale-file">find a stale file &lt;a href="#find-a-stale-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING YOUR FILE EXPLORER TO FIND A FILE&lt;/strong> :-1:&lt;/p>
&lt;p>Find all files modified more than 5 days ago&lt;/p>
&lt;pre>&lt;code class="language-shell">$ find my_folder -mtime +5
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="show-a-calendar">show a calendar &lt;a href="#show-a-calendar" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP LOOKING UP WHAT THIS MONTH LOOKS LIKE BY CALENDAR WIDGETS&lt;/strong> :-1:&lt;/p>
&lt;p>Display a text calendar&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cal
&lt;/code>&lt;/pre>
&lt;p>Display selected month and year calendar&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cal 11 2018
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="find-a-future-date">find a future date &lt;a href="#find-a-future-date" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING WEBAPPS TO CALCULATE FUTURE DATES&lt;/strong> :-1:&lt;/p>
&lt;p>What is todays date?&lt;/p>
&lt;pre>&lt;code class="language-shell">$ date +%m/%d/%Y
&lt;/code>&lt;/pre>
&lt;p>What about a week from now?&lt;/p>
&lt;pre>&lt;code class="language-shell">$ date -d &amp;quot;+7 days&amp;quot; # on Linux
$ date -j -v+7d # on MacOS
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="use-a-calculator">use a calculator &lt;a href="#use-a-calculator" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING CALCULATOR WIDGET&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ bc -l
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="force-quit-a-program">force quit a program &lt;a href="#force-quit-a-program" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP CTRL + ALT + DELETE and choose the program to kill&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ killall -9 program_name
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="check-server-response">check server response &lt;a href="#check-server-response" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP OPENING A BROWSER&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ curl -i umair.surge.sh
# curl's -i (--include) option includes HTTP response headers in its output.
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="view-content-of-a-file">view content of a file &lt;a href="#view-content-of-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP DOUBLE CLICKING A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ cat apps/settings.py
# if the file is too big to fit on one page, you can use a 'pager' (less) which shows you one page at a time.
$ less apps/settings.py
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="search-for-a-text-in-a-file">search for a text in a file &lt;a href="#search-for-a-text-in-a-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP CMD/CTRL + F IN A FILE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ grep -i &amp;quot;Query&amp;quot; file.txt
&lt;/code>&lt;/pre>
&lt;p>&lt;img src="./grep.jpg" alt="grep" loading="lazy" />
&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="search-in-all-files-in-current-working-directory-quickly-entire-disk-in-less-than-15-minutes">search in all files in current working directory, quickly (entire disk in less than 15 minutes) &lt;a href="#search-in-all-files-in-current-working-directory-quickly-entire-disk-in-less-than-15-minutes" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP CMD/CTRL + F IN A DIRECTORY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ ripgrep -i &amp;quot;Query&amp;quot;
# brew install ripgrep
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="view-an-image">view an image &lt;a href="#view-an-image" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP USING PREVIEW&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ imgcat image.png
# Note: requires iTerm2 terminal.
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="show-disk-size">show disk size &lt;a href="#show-disk-size" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP RIGHT CLICKING DISK ICON OR OPENING DISK UTILITY&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ df -h
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="check-performance-of-your-computer">check performance of your computer &lt;a href="#check-performance-of-your-computer" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP OPENING YOUR ACTIVITY MONITOR OR TASK MANAGER&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ top
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="know-whether-your-computer-is-under-load-and-whether-its-due-to-memory-or-cpu">know whether your computer is under load, and whether it&amp;rsquo;s due to memory or CPU &lt;a href="#know-whether-your-computer-is-under-load-and-whether-its-due-to-memory-or-cpu" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell">$ glances
# brew install glances
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="poweroff-or-reboot-your-computer">poweroff or reboot your computer &lt;a href="#poweroff-or-reboot-your-computer" class="hash">#&lt;/a>&lt;/h2>
&lt;p>This can be useful when you&amp;rsquo;re patching a server that is acessed via SSH and you don&amp;rsquo;t have a GUI.&lt;/p>
&lt;pre>&lt;code class="language-shell"># poweroff
$ sudo shutdown -h now
# reboot
$ sudo shutdown -r now
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="locate-usb-drives">locate USB drives &lt;a href="#locate-usb-drives" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell">$ df
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="unmount-usb-drives">unmount USB drives &lt;a href="#unmount-usb-drives" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell">$ sudo umount /dev/sdb1
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="format-usb-drives">format USB drives &lt;a href="#format-usb-drives" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell"># FAT32
$ sudo mkfs.vfat /dev/sdb1
# NTFS
$ sudo mkfs.ntfs /dev/sdb1
# exFAT
$ sudo mkfs.exfat /dev/sdb1
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="check-usb-format">check USB format &lt;a href="#check-usb-format" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code class="language-shell">$ sudo fsck /dev/sdb1
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="run-command-on-all-files-of-a-directory">run command on all files of a directory &lt;a href="#run-command-on-all-files-of-a-directory" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;strong>STOP CLICKING THE FILES ONE BY ONE&lt;/strong> :-1:&lt;/p>
&lt;pre>&lt;code class="language-shell">$ for FILE in *; do echo $FILE; done
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="quick-tips">Quick tips &lt;a href="#quick-tips" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;img src="./cli_tips.jpg" alt="CLI tips" loading="lazy" />
&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="hotkeys">Hotkeys &lt;a href="#hotkeys" class="hash">#&lt;/a>&lt;/h2>
&lt;pre>&lt;code>Ctrl + A Go to the beginning of the line you are currently typing on
Ctrl + E Go to the end of the line you are currently typing on
Ctrl + L Clears the Screen, similar to the clear command
Ctrl + U Clears the line before the cursor position. If you are at the end of the line, clears the entire line.
Ctrl + H Same as backspace
Ctrl + R Lets you search through previously used commands
Ctrl + C Kill whatever you are running
Ctrl + D Exit the current shell
Ctrl + Z Puts whatever you are running into a suspended background process. fg restores it.
Ctrl + W Delete the word before the cursor
Ctrl + K Clear the line after the cursor
Ctrl + T Swap the last two characters before the cursor
Ctrl + F Move cursor forward one character
Ctrl + B Move cursor backward one character
Esc + T Swap the last two words before the cursor
Alt + T Same as Esc + T
Alt + F Move cursor forward one word on the current line
Alt + B Move cursor backward one word on the current line
Esc + F Same as Alt + F
Esc + B Same as Alt + B
Alt + . Paste the last word of the most recently command
Tab Auto-complete files and directory names
&lt;/code>&lt;/pre>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p>
&lt;h2 id="i-cant-remember-these-cryptic-commands">I can&amp;rsquo;t remember these cryptic commands &lt;a href="#i-cant-remember-these-cryptic-commands" class="hash">#&lt;/a>&lt;/h2>
&lt;p>You can always google or &lt;code>man&lt;/code> the commands you are not familiar with. Or, checkout &lt;a href="https://github.com/tldr-pages/tldr" target="_blank">
tldr
&lt;/a>
, a collection of simplified and community-driven man pages.&lt;/p>
&lt;p>&lt;a href="#quick-links">
Go to table of contents 🔼
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2022/06/19/no-gui/</guid><pubDate>Sun, 19 Jun 2022 00:00:00 +0000</pubDate></item><item><title>Calendario semine</title><link>/2021/11/28/calendario_semine/</link><description>&lt;h3 id="gennaio">Gennaio &lt;a href="#gennaio" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Carote | Cavolfiori | Cipolle | Fave | Lattughe | Melanzane | Meloni | Peperoni | Piselli | Porri | Prezzemolo | Ravanelli | Rucola | Spinaci | Valeriana | Zucchini&lt;/p>
&lt;h3 id="febbraio">Febbraio &lt;a href="#febbraio" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Carote | Cavolfiori | Cipolle | Fave | Lattughe | Melanzane | Meloni | Peperoni | Piselli | Porri | Prezzemolo | Ravanelli | Rucola | Spinaci | Valeriana | Zucchini&lt;/p>
&lt;h3 id="marzo">Marzo &lt;a href="#marzo" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Angurie | Asparagi | Barbabietole | Basilico | Bieta | Carote | Cavoli | Cime di rapa | Cipolle | Fave | Finocchi | Indivie | Lattughe | Melanzane | Meloni | Peperoni | Piselli | Pomodori | Porri | Prezzemolo | Rucola | Zucchini&lt;/p>
&lt;h3 id="aprile">Aprile &lt;a href="#aprile" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Angurie | Asparagi | Barbabietole | Basilico | Bieta | Carote | Cavoli | Cetrioli | Cime di rapa | Cipolle | Finocchi | Indivie | Lattughe | Melanzane | Meloni | Peperoni | Piselli | Pomodori | Porri | Prezzemolo | Rucola | Zucche | Zucchini&lt;/p>
&lt;h3 id="maggio">Maggio &lt;a href="#maggio" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Angurie | Asparagi | Barbabietole | Basilico | Bieta | Broccoli | Cardi | Carote | Cavoli | Cetrioli | Indivie | Lattughe | Melanzane | Meloni | Peperoni | Piselli | Pomodori | Porri | Prezzemolo | Rucola | Scarola | Zucchini&lt;/p>
&lt;h3 id="giugno">Giugno &lt;a href="#giugno" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Barbabietole | Bieta | Broccoli | Cardi | Carote | Cavolfiori | Cavoli | Cetrioli | Cicoria | Fagioli | Indivie | Lattughe | Meloni | Pomodori | Prezzemolo | Ravanelli | Rucola | Sedano | Zucca | Zucchini&lt;/p>
&lt;h3 id="luglio">Luglio &lt;a href="#luglio" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Bieta | Cavolfiori | Cavoli | Cicoria | Fagioli | Indivie | Lattughe | Prezzemolo | Rapa | Rucola | Zucchini&lt;/p>
&lt;h3 id="agosto">Agosto &lt;a href="#agosto" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Bieta | Carote| Cipolla | Cicoria | Finocchio | Fagioli | Indivie | Lattughe | Prezzemolo | Rapa | Ravanelli | Rucola | Scarola | Zucchini&lt;/p>
&lt;h3 id="settembre">Settembre &lt;a href="#settembre" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Cime di rapa | Carote | Cipolla | Indivie | Lattughe | Prezzemolo | Piselli | Rapa | Ravanelli | Scarola | Spinaci&lt;/p>
&lt;h3 id="ottobre">Ottobre &lt;a href="#ottobre" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Carote | Fave | Lattughe | Piselli | Ravanelli | Spinaci&lt;/p>
&lt;h3 id="novembre">Novembre &lt;a href="#novembre" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Carote | Fave | Lattughe | Piselli | Ravanelli | Spinaci&lt;/p>
&lt;h3 id="dicembre">Dicembre &lt;a href="#dicembre" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Carote | Fave | Lattughe | Piselli | Ravanelli | Spinaci&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/11/28/calendario_semine/</guid><pubDate>Sun, 28 Nov 2021 00:00:00 +0000</pubDate></item><item><title>Fusilli salmone e finocchio</title><link>/2021/11/28/fusilli-salmone-finocchio/</link><description>&lt;h3 id="ingredienti-per-4-persone">Ingredienti per 4 persone &lt;a href="#ingredienti-per-4-persone" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Fusilli: g 350 | Salmone affumicato: g 180 | Un finocchio | Una cipolla | Burro: g 40 | Vino bianco: mezzo decilitro | Olio evo | Sale e pepe&lt;/p>
&lt;p>Pelate la cipolla, tritatela, appassitela in una padella con il burro, bagnate con il vino bianco e lasciate evaporare. Riducete il salmone affumicato a pezzetti, unitelo nella padella con il soffritto di cipolla, portate sul fuoco e lasciate insaporire per qualche minuto. Mondate, lavate e tagliate i finocchi a fettine. Cuocete i fusilli, trasferiteli nella padella con il condimento, unite i finocchi, portate sul fuoco e saltate per qualche minuto. Disponete i fusilli nel piatto da portata e insaporiteli con un pizzico di pepe e un filo di olio.&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/11/28/fusilli-salmone-finocchio/</guid><pubDate>Sun, 28 Nov 2021 00:00:00 +0000</pubDate></item><item><title>Risotto al vermouth</title><link>/2021/11/28/risotto-vermouth/</link><description>&lt;p>Sbucciate e tritate 1 scalogno e fatelo appassire in un tegame con 20 g di burro e un pizzico di sale. Unite 320 g di riso Carnaroli, fatelo tostare per un istante, poi bagnate con 30 ml di Vermouth e lasciatelo evaporare. Portate a cottura il riso, versando 800 ml di brodo vegetale bollente, poco per volta e mescolando spesso. A parte sciogliete 20 g di burro in una padella e fatevi dorare 12 capesante, 1 minuto per lato. Con la punta di un coltellino, prelevate i semini da 1/2 baccello di vaniglia e mescolateli in poco brodo. Togliete il risotto dal fuoco e profumatelo con la vaniglia stemperata; incorporate 20 g di burro e qualche goccia di succo di limone, mescolate bene, coprite e lasciate riposare per 1 minuto. Distribuite il risotto nei piatti e completate con le capesante, 30 g di granella di pistacchi e un pizzico di erba cipollina pulita e tagliuzzata.&lt;/p>
&lt;p>(per 4 persone)&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/11/28/risotto-vermouth/</guid><pubDate>Sun, 28 Nov 2021 00:00:00 +0000</pubDate></item><item><title>Homemade Bokashi flakes</title><link>/2021/10/20/bokashi-flakes/</link><description>&lt;p>For the longest time, I thought worms were the love of my compost life. Cute, easy to care for, discreet when tucked in a cabinet or under the sink&amp;hellip;&lt;/p>
&lt;p>But recently, I&amp;rsquo;ve wiggled away from Red Wiggler earthworms (mostly Friend Zone now) to embrace my Bokashi Buckets &amp;mdash; airtight containers in which I ferment food scraps before burying them in soil. Once buried (or mixed into an aerobic compost pile) they fully decompose and transform into lovely, luscious earth.&lt;/p>
&lt;p>Bokashi, a Japanese word meaning fermented organic matter, doesn&amp;rsquo;t discriminate. As with worm bins, I can process fruit and veggie scraps in my bucket. BUT, I can ALSO process meat, dairy, cooked foods, ancient condiments and mysteries from the back of the fridge. All these latter items create chaos in a worm bin ecosystem and in general are best kept out of aerobic compost piles to avoid odor and pests. Bokashi is a food waste recycler&amp;rsquo;s dream!&lt;/p>
&lt;p>Maintaining a bokashi bucket is mindlessly easy (keep your eyes peeled for a how-to, coming up in a future post). All the hard work of fermentation is done by a powerful trio of anaerobic microbes called Effective Microorganisms (lactobacillus bacteria, phototrophic bacteria and yeast). They are sprinkled onto food scraps via an inoculated material often called bokashi bran, as wheat bran is a popular ingredient. I prefer the more generic term &amp;ldquo;bokashi flakes,&amp;rdquo; as any easily spreadable plant-based carbon material that can dust scraps like snowflakes will do. I&amp;rsquo;ve known folks who have used coffee chaff, sawdust and dry, crumpled leaves with great success.&lt;/p>
&lt;p>While bokashi flakes are readily available for purchase online, they are also super simple to make. If you&amp;rsquo;d like to save some cash, enjoy DIY projects, and have a few weeks to spare to allow your bokashi flakes to ferment and subsequently dry for long-term use and storage, follow the steps below to make bokashi flakes yourself!&lt;/p>
&lt;p>The following recipe is adapted from the guidelines provided by Teraganix, a distributor of a liquid form of Effective Microorganisms called EM-1. Their base recipe calls for 10 lbs of flake material. I have adjusted it for 3 lbs of wheat bran, which is roughly the amount in the plastic bag pictured above, is easy to make in my apartment and lasts for several months for a household of 2 .&lt;/p>
&lt;p>Materials:&lt;/p>
&lt;p>1.5 TB EM-1 Some people make their own microbe solution from every day items but it can be difficult to ensure optimized populations of each microbe group when collecting from the wild. I&amp;rsquo;ve tried it, with varying results. These days, I just stick to EM-1 for consistency.&lt;/p>
&lt;p>3 lb. Flake material Wheat bran can be purchased from an animal feed store for about $15 for 50 pounds. Considering a 2 lb bag of finished bokashi flakes can cost upwards of $15, you&amp;rsquo;re in for some serious savings! If you&amp;rsquo;re a savvy scrounger, you can freecycle items like coffee chaff, leaves, and untreated sawdust as well.&lt;/p>
&lt;p>1.5 TB Molasses This serves as fuel for the microbes. I&amp;rsquo;ve been using a bottle I got years ago during my ginger snap baking era which, come to think of it, I should resurrect.&lt;/p>
&lt;p>3 cups Water Container for mixing Make sure it&amp;rsquo;s big enough to hold your flake material and then some, as you&amp;rsquo;ll be mixing the flakes around and you don&amp;rsquo;t want to spill them all over your counter. Plastic bag A reused grocery store bag or a trash bag will do. Make sure there are no holes in the plastic.&lt;/p>
&lt;p>Instructions&lt;/p>
&lt;p>Dissolve the molasses in the water. Add EM-1 to the water mix. Pour dry flake material into the mixing container. Add 2/3 of the water mixture to the flake material and mix it together. Use your hands! It not only feels good, but is vital to determining when you&amp;rsquo;ve achieved the ideal moisture level. Squeeze a handful of flakes together. If it sticks together without dripping, as seen in the picture below, it&amp;rsquo;s perfect! Continue to the next section! If it crumbles apart like dust, it&amp;rsquo;s too dry. Slowly add the remaining liquid to your flakes, pausing periodically to squeeze test it until it achieves the conditions described above. If liquid oozes from the flakes, it&amp;rsquo;s too wet. Add more dry flake material until it achieves the conditions described above.&lt;/p>
&lt;p>How To Make Bokashi EM 1 Fermented Food Waste Wheat Bran&lt;/p>
&lt;p>The squeeze test always reveals if you&amp;rsquo;ve hit the right moisture balance! This handful is perfect! Once you&amp;rsquo;ve achieved the proper moisture level, put the dampened flakes into the plastic bag. Compress the bag contents to squeeze out as much air as you can from between the flakes and throughout the bag. Twist or tie the bag closed, sealing the flakes in a private, air-tight universe. Keep the bag in a warm, out-of-the-way corner like a cupboard or cabinet for a minimum of two weeks. In this quiet, dark, airless space, the microbes will ferment the flakes.&lt;br>
After a few weeks have passed, open the bag. It should have a sweet, yeast-y smell to it. You may see white mold on it, which is totally fine. If you see green/blue/black mold, something went wrong and the wrong microbes cultivated. Compost the bad batch and start over. Dry your flakes for long-term storage and use. Spread your bokashi flakes out in a thin layer on the floor or on a table to air out. You can do this in a tray, on a plate, or any other surface you don&amp;rsquo;t mind spreading flakes on. Heat and sunshine help speed things up.&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/10/20/bokashi-flakes/</guid><pubDate>Wed, 20 Oct 2021 00:00:00 +0000</pubDate></item><item><title>Homemade EM1</title><link>/2021/10/20/diy-em1/</link><description>&lt;p>Wikipedia:&lt;/p>
&lt;p>Effective Microorganisms, aka EM Technology, is a trademarked term now commonly used to describe a proprietary blend of 3 or more types of predominantly anaerobic organisms that was originally marketed as EM-1™ Microbial Inoculate but is now marketed by a plethora of companies under various names, each with their own proprietary blend. &amp;ldquo;EM™ Technology&amp;rdquo; uses a laboratory cultured mixture of microorganisms consisting mainly of lactic acid bacteria, purple bacteria, and yeast which co-exist for the benefit of whichever environment they are introduced, as has been claimed by the various em-like culture purveyors. It is reported[1] to include:&lt;/p>
&lt;p>Lactic acid bacteria: Lactobacillus plantarum; L. casei; Streptococcus Lactis. Photosynthetic bacteria: Rhodopseudomonas palustris; Rhodobacter sphaeroides. Yeast: Saccharomyces cerevisiae; Candida utilis (no longer used) (usually known as Torula, Pichia Jadinii). Actinomycetes (no longer used in the formulas): Streptomyces albus; S. griseus. Fermenting fungi (no longer used in the formulas): Aspergillus oryzae; Mucor hiemalis. The concept of &amp;lsquo;Friendly Microorganisms&amp;rsquo; was developed by Japanese horticulturist Teruo Higa, from the University of the Ryukyus in Okinawa Prefecture|Okinawa, Japan. He reported in the 1970s that a combination of approximately 80 different microorganisms is capable of positively influencing decomposing organic matter such that it reverts into a &amp;rsquo;life promoting&amp;rsquo; process. Higa invokes a &amp;lsquo;dominance principle&amp;rsquo; to explain the effects of his &amp;lsquo;Effective Microorganisms&amp;rsquo;. He claims that three groups of microorganisms exist: &amp;lsquo;positive microorganisms&amp;rsquo; (regeneration), &amp;rsquo;negative microorganisms&amp;rsquo; (decomposition, degeneration), &amp;lsquo;opportunist microorganisms&amp;rsquo;. In every medium (soil, water, air, the human intestine), the ratio of &amp;lsquo;positive&amp;rsquo; and &amp;rsquo;negative&amp;rsquo; microorganisms is critical, since the opportunist microorganisms follow the trend to regeneration or degeneration. Therefore, Higa believes that it is possible to positively influence the given media by supplementing with positive microorganisms.&lt;/p>
&lt;p>EM™ Technology is supposed to maintain sustainable practices such as farming and sustainable living, and also claims to support human health and hygiene, animal husbandry, compost and waste management, disaster clean-up (The Southeast Tsunami of 2004, the Kobe Earthquake, and Hurricane Katrina remediation projects), and generally used to promote functions in natural communities.&lt;/p>
&lt;p>EM™ has been employed in many agricultural applications, but is also used in the production of several health products in South Africa and the USA.[citation needed] (fuel additive products are no longer available).&lt;/p>
&lt;p>A High School in Malaysia, Sekolah Menegah Kebangsaan Dato&amp;rsquo; Onn Butterworth, Penang, are using EM to treat Greywater, minimise odour from Septic Tank &amp;amp; remove sludge from drains.&lt;/p>
&lt;p>This is a recipe I learned from a friend along time ago.&lt;/p>
&lt;p>EM/BAM: this a trade secret!(lactobacillus culture)&lt;/p>
&lt;p>1/4 cup rice&lt;/p>
&lt;p>1quart Mason Jar&lt;/p>
&lt;p>1 cup water&lt;/p>
&lt;p>1 fine mesh strainer&lt;/p>
&lt;p>80 oz milk depends on how much one is making&lt;/p>
&lt;p>1 gallon container or jar&lt;/p>
&lt;p>1 tsp. black-strap molasses&lt;/p>
&lt;p>Procedure:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Place rice and cup of water in mason jar and shake vigorously until water is cloudy white, strain off rice kernels and discard into tour compost bin or cook for dinner. I have heard of the Japanese adding a dash of nato to help ferment but not needed.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>place cap on loosely and store in a cabinet or cool dark place for 5-7 days.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Sift off top layer and strain liquid (serum)&lt;/p>
&lt;/li>
&lt;li>
&lt;p>measure your rice liquid and now add a ratio of 1 part fermented rice to 10 parts milk, I would culture in a 1 gallon jar. let sit for 5-7 days.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>Rice water and milk serum fermenting 3 days &amp;ndash; notice lid is only siting on top as to not build pressure. 5. sift off curd settlement and add to your soil or feed your animals it is good for their digestion, then there should be a light yellow serum left this is your unactivated serum.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Add 1 tsp molasses to feed and keep your bacteria alive and refrigerate. should have a shelf life of 6-12 months.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>to activate microorganism activities and to room temperature non-chlorinated water at a ratio of 1 part Serum to 20 parts water.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>feed to plants either straight into soil or follicular feeding.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
&lt;iframe src="https://www.youtube.com/embed/Ssw6c6iU3QA" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video">&lt;/iframe>
&lt;/div></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/10/20/diy-em1/</guid><pubDate>Wed, 20 Oct 2021 00:00:00 +0000</pubDate></item><item><title>Provoke</title><link>/2021/09/17/provoke/</link><description>&lt;h2 id="post-16lesson-plan">Post 16 lesson plan: &lt;a href="#post-16lesson-plan" class="hash">#&lt;/a>&lt;/h2>
&lt;h2 id="exploringprovocative-documents-for-thoughtwith-the-japaneseprovokephotographersyutaka-takanashitakuma-nakahiraanddaido-moriyama">Exploring provocative documents for thought with the Japanese Provoke photographers Yutaka Takanashi, Takuma Nakahira and Daido Moriyama. &lt;a href="#exploringprovocative-documents-for-thoughtwith-the-japaneseprovokephotographersyutaka-takanashitakuma-nakahiraanddaido-moriyama" class="hash">#&lt;/a>&lt;/h2>
&lt;p>From &lt;strong>Jon Nicholls&lt;/strong>, Thomas Tallis School&lt;/p>
&lt;p>This project aims to introduce students to an important period in Post War Japanese photography and to challenge them to respond to the idea that photography has its own language, independent of words. The photographers featured here attempted for a short period to challenge the rules and conventions of photography in the context of massive social upheaval. They asked important questions of photography, testing its power and influence. Their youthful experiments became massively influential for subsequent generations of photographers.&lt;/p>
&lt;p>The main subject of this project is **Provoke **&lt;em>(Purovōku),&lt;/em> an experimental magazine founded by photographers Yutaka Takanashi and Takuma Nakahira, critic Koji Taki, and writer Takahiko Okada in 1968. The magazine&amp;rsquo;s subtitle read as: &lt;em>shisō no tame no chōhatsuteki shiryō (Provocative documents for the sake of thought).&lt;/em>&lt;/p>
&lt;p>​Photographer Daido Moriyama, the photographer most often associated with the publication, did not join the magazine until the second issue. &lt;em>Provoke&lt;/em> lasted only three issues with a small print run, but was tremendously influential.&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/2546823.jpg?352" alt="Picture" loading="lazy" />
&lt;/p>
&lt;blockquote>
&lt;p>Today, when words have lost their material base&amp;mdash;in other words, their reality&amp;mdash;and seem suspended in mid-air, a photographer&amp;rsquo;s eye can capture fragments of reality that cannot be expressed in language as it is. He can submit those images as a document to be considered alongside language and ideology. This is why, brash as it may seem, Provoke has the subtitle, &amp;lsquo;provocative documents for thought.&amp;rsquo;&lt;br>
&amp;ndash; **Manifesto of the Provoke Group **by Koji Taki, Takuma Nakahira, Takahiko Okada, Yutaka Takanashi, and Daido Moriyama&lt;/p>
&lt;/blockquote>
&lt;p>&lt;em>Provoke&lt;/em> argued that the photographer can capture what cannot be expressed in words, presenting photographs as &amp;ldquo;documents&amp;rdquo; for others to read.  In Japanese, the visual style of the photographs in &lt;em>Provoke&lt;/em> has been described as: &amp;lsquo;&lt;strong>are-bure-boke&lt;/strong>&amp;rsquo;, which translates as &amp;lsquo;&lt;strong>grainy/rough, blurry, out-of-focus&lt;/strong>&amp;rsquo;. On 31 March 1970 the Provoke collective published the book &lt;em>Mazu tashikarashisa no sekai o suterō: Shashin to gengo no shisō&lt;/em> (First, Throw Out Verisimilitude - Thoughts on photography and language). It was to the be the last publication of this short lived but influential group. Each of the participants went on to establish their own individual visions in their subsequent careers.&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/849085.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/1482012.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/5766064.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/2400780.png" alt="" loading="lazy" />
]&lt;/p>
&lt;blockquote>
&lt;p>Photography was too explanatory, too narrational for me. [&amp;hellip;] It was natural for me to join Provoke. [&amp;hellip;] They said they were photographing atmosphere. But I was very precise and careful. [&amp;hellip;] But my work changed after I saw how they worked. I saw that I could not control everything. I understood that photography is only a fragment. I used to be a photographer who interprets things via language. And then &lt;em>Provoke&lt;/em> changed me.&lt;br>
&amp;ndash; &lt;strong>Yakuta Takanashi&lt;/strong>&lt;/p>
&lt;/blockquote>
&lt;p>You can check out some example spreads from each of the four publications using the following links:&lt;/p>
&lt;h2 id="provoke-1httpjosefchladekcombookyutaka_takanashi_takuma_nakahira_koji_taki_-_provoke_1">​&lt;a href="http://josefchladek.com/book/yutaka_takanashi_takuma_nakahira_koji_taki_-_provoke_1" target="_blank">
Provoke #1
&lt;/a>
&lt;a href="#provoke-1httpjosefchladekcombookyutaka_takanashi_takuma_nakahira_koji_taki_-_provoke_1" class="hash">#&lt;/a>&lt;/h2>
&lt;h2 id="provoke-2httpjosefchladekcombookyutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_2">&lt;a href="http://josefchladek.com/book/yutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_2" target="_blank">
Provoke #2
&lt;/a>
&lt;a href="#provoke-2httpjosefchladekcombookyutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_2" class="hash">#&lt;/a>&lt;/h2>
&lt;h2 id="provoke-3httpjosefchladekcombookyutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_3">&lt;a href="http://josefchladek.com/book/yutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_3" target="_blank">
Provoke #3
&lt;/a>
&lt;a href="#provoke-3httpjosefchladekcombookyutaka_takanashi_nakahira_takuma_daido_moriyama_koji_taki_-_provoke_3" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8006020_orig.png" alt="Picture" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/4830516.png?300" alt="Picture" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/1171159_orig.png" alt="Picture" loading="lazy" />
]&lt;/p>
&lt;h2 id="provoke-4--5httpjosefchladekcombooktakuma_nakahira_daido_moriyama_yutaka_takanashi_koji_taki_-_provoke_1-5_e381bee3819ae3819fe38197e3818be38289e38197e38195e381aee4b896e7958ce38292e38199e381a6e3828de58699e79c9fe381a8e8a880e8aa9ee381aee6809de683b3_-_first_throw_out_verisimilitude_thoughts_on_photography_and_languagefirst-throw-out-verisimilitude----thoughts-on-photography-and-language">&lt;a href="http://josefchladek.com/book/takuma_nakahira_daido_moriyama_yutaka_takanashi_koji_taki_-_provoke_1-5_%E3%81%BE%E3%81%9A%E3%81%9F%E3%81%97%E3%81%8B%E3%82%89%E3%81%97%E3%81%95%E3%81%AE%E4%B8%96%E7%95%8C%E3%82%92%E3%81%99%E3%81%A6%E3%82%8D%E5%86%99%E7%9C%9F%E3%81%A8%E8%A8%80%E8%AA%9E%E3%81%AE%E6%80%9D%E6%83%B3_-_first_throw_out_verisimilitude_thoughts_on_photography_and_language" target="_blank">
Provoke 4 &amp;amp;amp; 5: 
&lt;/a>
First, Throw Out Verisimilitude &amp;ndash; Thoughts on photography and language &lt;a href="#provoke-4--5httpjosefchladekcombooktakuma_nakahira_daido_moriyama_yutaka_takanashi_koji_taki_-_provoke_1-5_e381bee3819ae3819fe38197e3818be38289e38197e38195e381aee4b896e7958ce38292e38199e381a6e3828de58699e79c9fe381a8e8a880e8aa9ee381aee6809de683b3_-_first_throw_out_verisimilitude_thoughts_on_photography_and_languagefirst-throw-out-verisimilitude----thoughts-on-photography-and-language" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/1286112_orig.png" alt="Picture" loading="lazy" />
&lt;/p>
&lt;p>This book is often referred to as Provoke 4 &amp;amp; 5. Although the chapters are called provoke 1-5, the images are not from any previous Provoke publication, with the exception of a single image by Takuma Nakahira in chapter 1, which was previously published in Provoke issue 2. (This image also appears in his book For a Language to come.) The book is divided into the five sections, and six sections of text. It was published the same year that the Provoke group split up. The book resembles a kind of paperback novel, printed on rough matt paper.&lt;/p>
&lt;p>Thanks to Josef Chladek for kind permission to reproduce these images. Be sure to check out these and other amazing photography books on &lt;a href="http://josefchladek.com/complete_shelf" target="_blank">
Josef Chladek&amp;amp;rsquo;s virtual bookshelf
&lt;/a>
.&lt;/p>
&lt;blockquote>
&lt;p>&amp;hellip; the Provoke photographers campaigned against a world of seeming certainty and ceased to ask &amp;ldquo;What should we photograph?&amp;rdquo; or &amp;ldquo;How should we photograph?&amp;rdquo;, instead asking more fundamental questions such as &amp;ldquo;What is photography?&amp;rdquo;, &amp;ldquo;Who becomes a photographer?&amp;rdquo; or &amp;ldquo;What is seeing?&amp;rdquo;. Their characteristic grainy, blurry, shaky pictures are the photographic expression of their doubt about a photography [&amp;hellip;] They are attempts not to »shoot« the pictures actively, but rather to allow the pictures to develop on the basis of a deliberately passive stance, with the frequent use of wide-angle lenses and no-finder technique, and thus to rehabilitate the unruly nature (the independent action) of the camera that lies hidden in the concept of »expression«. By reflecting the difference between their own eye and the eye of the camera in the photos in an extreme manner, the Provoke photographers were in search of a way of capturing the form of the world that was eluding them.&lt;br>
&amp;ndash; from the article &lt;a href="http://www.americansuburbx.com/2010/06/takuma-nakahira-portrait-of-takuma.html" target="_blank">
&amp;lt;strong&amp;gt;&amp;amp;ldquo;A Portrait of Takuma Nakahira&amp;amp;rdquo;&amp;lt;/strong&amp;gt;
&lt;/a>
 (2005) on the ASX blog&lt;/p>
&lt;/blockquote>
&lt;p>The writer Minoru Shimizu describes Moriyama&amp;rsquo;s approach as follows (with particular reference to his 1972 book &amp;lsquo;Farewell Photography&amp;rsquo;:&lt;/p>
&lt;blockquote>
&lt;p>The features of this style can be listed: fragmentariness, a sense of speed, images appearing to be damaged, wildness, traces, a sense of unbalance, printing failures, time-lapse, scraps of negatives, scenes that come out of the dark only through the flash, no viewfinder etc. These are all expressions of a kind of &amp;lsquo;subtraction&amp;rsquo;, a means to erase the photographer&amp;rsquo;s self, his thoughts, subjective expressions and intentions. In other words, the photographs try to not see, not to think and not to choose [&amp;hellip;] To Moriyama, grainy, blurry, out-of-focus was an important method of deletion, but only in order to show the real world as it was. In other words, grainy, blurry, out-of-focus reveals the scars left after the membrane of the fake reality has been taken off in order to hollow out the &amp;lsquo;real&amp;rsquo; existence. This real world, then, is expressed through violence towards the photographs. The more real the photographs are, the more scars they have, the more they are worn away. The real world can only appear if the usual world disappears.&lt;br>
&amp;ndash; &lt;strong>Minoru Shimizu&lt;/strong>, Grainy, Blurry, Out-of-Focus: Daido Moriyama&amp;rsquo;s &amp;lsquo;Farewell Photography&amp;rsquo;&lt;/p>
&lt;/blockquote>
&lt;h2 id="other-photographs-byprovoke-groupmembers">Other photographs by Provoke Group members: &lt;a href="#other-photographs-byprovoke-groupmembers" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Subsequent publications by each of the Provoke members were equally challenging in their subject matter and visual style. Most famous of these are the books &amp;lsquo;&lt;a href="http://josefchladek.com/book/daido_moriyama_-_shashin_yo_sayonara_farewell_photography" target="_blank">
Farewell to Photography
&lt;/a>
&amp;rsquo; by Daido Moriyama, &amp;lsquo;&lt;a href="http://josefchladek.com/book/takuma_nakahira_-_for_a_language_to_come_kitarubeki_kotoba_no_tame_ni_%E4%B8%AD%E5%B9%B3%E5%8D%93%E9%A6%AC_%E6%9D%A5%E3%81%9F%E3%82%8B%E3%81%B9%E3%81%8D%E8%A8%80%E8%91%89%E3%81%AE%E3%81%9F%E3%82%81%E3%81%AB" target="_blank">
For a Language to Come
&lt;/a>
&amp;rsquo; by Takuma Nakihara and &amp;lsquo;&lt;a href="https://priskapasquer.com/yutaka-takanashi-towards-the-city-including-a-short-history-of-the-provoke-era-part-3/" target="_blank">
Towards the City
&lt;/a>
&amp;rsquo; by Yutaka Takanashi.&lt;/p>
&lt;p>&lt;strong>DAIDO MORIYAMA, FROM &amp;lsquo;FAREWELL TO PHOTOGRAPHY&amp;rsquo;, 1972&lt;/strong>&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/1527136.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/4292774.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8795097.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/5273117.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/4244271.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/4956906.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/7718096.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8315163.jpg" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/589365.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/6402635.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8821826.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/7306448.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/6205324.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/3420370.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;strong>TAKUMA NAKIHARA, FROM &amp;lsquo;FOR A LANGUAGE TO COME&amp;rsquo;, 1970&lt;/strong>
&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/6209564.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8448174.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/9663384.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/514792.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/2320174.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8259041.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/9662432.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/3955713.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/3721495.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/9121475.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/2091625.jpg" alt="" loading="lazy" />
&lt;/p>
&lt;blockquote>
&lt;p>The ambitious mission of &lt;em>Provoke&lt;/em> to create a new photographic language that could transcend the limitations of the written word was declared with the launch of the magazine&amp;rsquo;s first issue. The year was 1968 and Japan, like America, was undergoing sweeping changes in its social structure. A questioning of traditional social conventions and a loss of confidence in existing political powers was happening in many creative disciplines across Japan and formed the foundation that fuelled &lt;em>Provoke&amp;rsquo;s&lt;/em> mission. Unified under a manifesto that advocated conceptualism over realism, &lt;em>Provoke&lt;/em>&amp;rsquo;s photographers and writers moved beyond issues of what to photograph, and sought to uncover and question the essential nature of photography itself. The visual results flouted the precision of earlier documentary modes in favour of a less focused imagery that allowed for chance and the unknown to reveal itself in the photographic process.&lt;br>
&amp;ndash; &lt;strong>Russet Lederman&lt;/strong>, 2012&lt;/p>
&lt;/blockquote>
&lt;h2 id="other-resources">Other Resources: &lt;a href="#other-resources" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;a href="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/the_provoke_era_-_gallery_guide_-_web.pdf" title="Descargar archivo: The Provoke Era Gallery Guide from SFMoMA" target="_blank">
&amp;lt;strong&amp;gt;The Provoke Era Gallery Guide from SFMoMA&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;/p>
&lt;hr>
&lt;p>&lt;a href="https://vimeo.com/46305234" target="_blank">
Flip through The Cartier-Bresson Foundation publication
&lt;/a>
&lt;br>
​about &lt;strong>Yatuka Takanashi&lt;/strong>.&lt;/p>
&lt;p>​A wonderful short &lt;a href="https://www.youtube.com/watch?v=X_N75LZOxvU" target="_blank">
film about &amp;lt;strong&amp;gt;Takuma Nakahira&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;/p>
&lt;h2 id="the-influence-of-provoke">The Influence of Provoke &lt;a href="#the-influence-of-provoke" class="hash">#&lt;/a>&lt;/h2>
&lt;p>The Provoke group published their third volume in August 1969 and the group dissolved soon after. Published in December of 1969, &lt;em>Pursuit 1&lt;/em> is an homage in every way. Instead of &amp;ldquo;Provoke&amp;rdquo; we have &amp;ldquo;Pursuit.&amp;rdquo; Instead of &amp;ldquo;Provocative documents for thought&amp;rdquo; we have &amp;ldquo;Record of existential pusuit.&amp;rdquo; The book is the exact same size as Provoke Vol. 3. The photos are stylistically influenced by the Provoke photographers and deal with similar subject matter.&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/1886088.png" alt="" loading="lazy" />
]
&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8350607.png" alt="" loading="lazy" />
]
&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/266451.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/5822212.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/3321609.png" alt="" loading="lazy" />
]
&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/8845393.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/2888558.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/5128210.png" alt="" loading="lazy" />
]&lt;/p>
&lt;p>&lt;strong>Provoke camera app&lt;/strong>&lt;/p>
&lt;p>The &lt;a href="https://itunes.apple.com/gb/app/provoke-camera/id840633665?mt=8" target="_blank">
Provoke Camera app
&lt;/a>
 was inspired by Japanese photographers of the late 1960&amp;rsquo;s. It produces black and white images with a gritty, grainy, blurry look reminiscent of the &amp;ldquo;Provoke&amp;rdquo; era of photography, and in two formats: square format 126 and 35mm format 135. &lt;strong>Provoke Camera&lt;/strong> features 9 black and white live view effects:&lt;/p>
&lt;p>|&lt;/p>
&lt;p>1. HPAN High Contrast&lt;br>
2. NPAN Normal&lt;br>
3. LPAN Low Contrast&lt;br>
4. X800 More High Contrast with more noise.&lt;br>
5. I800 IR like filter.&lt;br>
6. Z800 +2EV with more noise.&lt;br>
7. D100 Darken with Blur&lt;br>
8. H100 High Contrast with Blur&lt;br>
9. E100 +1.5EV with Blur&lt;/p>
&lt;p>|&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/934174.jpeg?370" alt="Picture" loading="lazy" />
&lt;/p>
&lt;h2 id="flickr-groupprovokehttpswwwflickrcomgroups676271n21pool">Flickr group:&lt;a href="https://www.flickr.com/groups/676271@N21/pool/" target="_blank">
Provoke
&lt;/a>
  &lt;a href="#flickr-groupprovokehttpswwwflickrcomgroups676271n21pool" class="hash">#&lt;/a>&lt;/h2>
&lt;p>There are lots of tribute groups on Flickr of photographers who imitate (and pay homage to) their photo heroes. This group exists to help share photographs that reflect the visual style and subject matter of the &lt;strong>Provoke&lt;/strong> group:&lt;/p>
&lt;p>&lt;img src="https://www.photopedagogy.com/uploads/5/0/0/9/50097419/3689703_orig.png" alt="Picture" loading="lazy" />
&lt;/p>
&lt;h2 id="some-suggestions">Some suggestions: &lt;a href="#some-suggestions" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Look carefully at the photographs published in the various issues of &lt;strong>Provoke&lt;/strong>. How would you describe them? Write a list of words that might be used to capture the visual qualities, subjects and impact of these photographs on the viewer. &lt;/li>
&lt;li>How adequate is the phrase &amp;lsquo;&lt;strong>are-bure-boke&lt;/strong>&amp;rsquo;? What attitudes (to life and photography) can you discern in these images?&lt;/li>
&lt;li>What does the word &lt;strong>Provoke&lt;/strong> suggest to you? What is provocative about these photographs? Why do you think this was chosen as the title of the publication?&lt;/li>
&lt;li>&lt;strong>Provoke&lt;/strong> was a form of protest, formed by a heady mixture of attraction, ambivalence and repulsion, that caused the photographers and writers involved to make a bold, confrontational statement. Reflect on your own feelings about the society in which you live and the state of photography. What kinds of images and ways of making photographs seem appropriate to you for documenting these feelings and attitudes? Where would you go to make these pictures? Given Moriyama&amp;rsquo;s use of a consumer compact camera (rather than an expensive, professional rangefinder or SLR) would it matter to you what equipment you used?&lt;/li>
&lt;li>In order to explain the approach they were taking to photography in &lt;strong>Provoke&lt;/strong>, the participants &lt;a href="https://traceyfahy.wordpress.com/2012/02/06/provoke-manifesto/" target="_blank">
published a short manifesto
&lt;/a>
. There is a long history of artists, especially in the twentieth century, banding together and &lt;a href="https://www.royalacademy.org.uk/article/ten-game-changing-manifestos" target="_blank">
writing manifestos
&lt;/a>
. Imagine you decided to collaborate with classmates and/or friends to create an artistic collective. What would you write in your manifesto?&lt;/li>
&lt;li>Daido Moriyama has said: &amp;ldquo;&lt;em>[My] photos are often out of focus, rough, streaky, warped, etc. But if you think about it, a normal human being will in one day perceive an infinite number of images, and some of them are focused upon, others are barely seen out of the corner of one&amp;rsquo;s eye.&lt;/em>&amp;rdquo; What do you think he means? Watch the film &lt;a href="https://www.youtube.com/watch?v=foWAs3V_lkg" target="_blank">
&amp;lt;strong&amp;gt;Daido Moriyama: In Pictures&amp;lt;/strong&amp;gt;
&lt;/a>
 and make some notes. How would you summarise his attitude to photography?&lt;/li>
&lt;li>It is often more difficult to make &amp;lsquo;&lt;a href="https://www.photopedagogy.com/wrong.html" target="_blank">
wrong
&lt;/a>
&amp;rsquo; photographs than it is to follow the &amp;lsquo;rules&amp;rsquo; or conventions of photography. Attempt to make a series of images which respond as &lt;strong>instinctively&lt;/strong> to the world as possible. Consider the following questions:
&lt;ul>
&lt;li>​Will you use a film or digital camera? Will your camera be an SLR/DSLR, a compact camera, a disposable camera or a camera phone?&lt;/li>
&lt;li>Will you photograph in colour or black and white? &lt;/li>
&lt;li>Will you always look through the viewfinder?&lt;/li>
&lt;li>Will you always compose your image carefully?&lt;/li>
&lt;li>Will you always keep the camera level with the horizon?&lt;/li>
&lt;li>Will you always focus on your subject?&lt;/li>
&lt;li>Will your subjects conform to one or more genres of photography?&lt;/li>
&lt;li>Will you always photograph from your full height?&lt;/li>
&lt;li>Will you always carefully select your subjects?&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>Whilst you are making photographs, ask yourself the questions: &amp;ldquo;What is photography?&amp;rdquo;, &amp;ldquo;Who becomes a photographer?&amp;rdquo; and &amp;ldquo;What is seeing?&amp;rdquo;&lt;/li>
&lt;li>Once you have made a significant number of photographs, consider how you will &lt;strong>edit&lt;/strong>, &lt;strong>print&lt;/strong>, &lt;strong>sequence&lt;/strong> and &lt;strong>display&lt;/strong> them. You could continue to experiment at this stage by, for example, printing your images on unusual materials and/or using a scanner or photocopier to print/alter your photographs. You might decide to create your own photobook or magazine (like Provoke). You could also choose to collaborate with classmates. Again, don&amp;rsquo;t be afraid to question the &amp;lsquo;rules&amp;rsquo; about how photographs are generally displayed. Consider issues such as repetition, scale, materials, layering, orientation etc.&lt;/li>
&lt;li>Daido Moriyama reportedly told the publisher of his groundbreaking book &amp;lsquo;Farewell to Photography&amp;rsquo; to arrange the pictures in whatever way he liked. You could give a classmate a selection of your images and ask them to make their own sequence for a display or publication of some sort, thus delegating the responsibility of the final display to someone else.&lt;/li>
&lt;/ul></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/09/17/provoke/</guid><pubDate>Fri, 17 Sep 2021 00:00:00 +0000</pubDate></item><item><title>Learn zone focusing and hyperfocal</title><link>/2021/09/10/hyperfocal/</link><description>&lt;p>If you are new to Street Photography you might have heard the term &amp;ldquo;Zone Focusing&amp;rdquo; being discussed by more experienced street shooters from time to time. You might have even heard the term &amp;ldquo;Hyperfocal distance&amp;rdquo; too. If you have been shooting in the Streets for quite a while, you have probably looked into these terms and even tried applying them to your shooting style. Street Hunters that use manual lenses or film cameras without auto focus capabilities, swear by both methods and most of them have possibly reached a point where they can take sharp, in focus pictures using Zone Focusing or the Hyperfocal distance, faster than they would using any AF capable camera. But how you might ask? What is Zone Focusing? What is Hyperfocal Distance and how can it help a Street Photographer take sharp photos with a Manual Focus lens so fast!?&lt;/p>
&lt;p>During this post I will try and explain both terms as simply as possible, in my own words. I will give you my personal interpretations and I will also offer links to more &amp;ldquo;official&amp;rdquo; resources that explain the terms in a more scientific way if you wish to look into them further.&lt;/p>
&lt;p>Before we learn about those two terms though, we need to understand what happens when we focus with a lens. So let&amp;rsquo;s start.&lt;/p>
&lt;h2 id="focusing-with-any-lenshttps108mhzgithubio20210105zone-focusingfocusing-with-any-lens">Focusing With Any Lens &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#focusing-with-any-lens" target="_blank">
#
&lt;/a>
&lt;a href="#focusing-with-any-lenshttps108mhzgithubio20210105zone-focusingfocusing-with-any-lens" class="hash">#&lt;/a>&lt;/h2>
&lt;p>When focusing with any lens, what we tell the camera to do is to move an invisible mask back and forth along the visible area we can see through our viewfinder. This invisible mask can be short or long, or as Photographers refer to it, &lt;strong>shallow or deep depth of field&lt;/strong>. When we move the focus ring on a lens with our finger, we tell that invisible area to move back and forth. Now, the wider our Aperture the shallower the depth of field. In other words the wider the Aperture the shorter the invisible mask that has things in focus. I have illustrated my thoughts below using some rough designs I made to help you understand the concept.&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/shallow-dof.png" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/uploads/2014/09/shallow-dof.png&amp;#34; alt=&amp;#34;Shallow DOF - Streethunters.net&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/narrow-dof.png" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/uploads/2014/09/narrow-dof.png&amp;#34; alt=&amp;#34;Deep DOF - Streethunters.net&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>In addition to the designs, I have shot some photos at different f stops (Aperture settings) so you can see the differences. I have made faint marks of the size of the invisible mask area so you can understand what happens each time. I have shot the photos on the carpet floor on purpose, so you can see the area that is sharp much easier.&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/zone-focusing-f2.jpg" title="Zone focusing with an Aperture of f2.0" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/cache/zone-focusing-f2.jpg-nggid041051-ngg0dyn-200x150x100-00f0w010c011r110f110r010t010.jpg&amp;#34; alt=&amp;#34;Zone focusing with an Aperture of f2.0&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/zone-focusing-f56.jpg" title="Zone focusing with an Aperture of f5.6" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/cache/zone-focusing-f56.jpg-nggid041053-ngg0dyn-200x150x100-00f0w010c011r110f110r010t010.jpg&amp;#34; alt=&amp;#34;Zone focusing with an Aperture of f5.6&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/zone-focusing-f16.jpg" title="Zone focusing with an Aperture of f16" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/gallery/blog-post-learn-zone-focusing-and-hyperfocal-distance-in-street/cache/zone-focusing-f16.jpg-nggid041052-ngg0dyn-200x150x100-00f0w010c011r110f110r010t010.jpg&amp;#34; alt=&amp;#34;Zone focusing with an Aperture of f16&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;h2 id="zone-focusinghttps108mhzgithubio20210105zone-focusingzone-focusing">Zone Focusing &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#zone-focusing" target="_blank">
#
&lt;/a>
&lt;a href="#zone-focusinghttps108mhzgithubio20210105zone-focusingzone-focusing" class="hash">#&lt;/a>&lt;/h2>
&lt;p>This invisible mask can be moved from close to far from our viewfinder, can become shorter or longer and can be easily controlled by us when out on the streets. Of course, the wider the Aperture the harder it is to control this with precision. It can be done with lots of practice, but most Street Hunters, like shooting at f 8.0 and above to get a longer invisible mask thus getting more things in focus at the same time. So, if you haven&amp;rsquo;t understood what Zone Focusing is by what I have mentioned until now, let me lay it out for you in plain English.&lt;/p>
&lt;h3 id="my-definition-of-zone-focusinghttps108mhzgithubio20210105zone-focusingmy-definition-of-zone-focusing">My definition of Zone Focusing &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#my-definition-of-zone-focusing" target="_blank">
#
&lt;/a>
&lt;a href="#my-definition-of-zone-focusinghttps108mhzgithubio20210105zone-focusingmy-definition-of-zone-focusing" class="hash">#&lt;/a>&lt;/h3>
&lt;blockquote>
&lt;p>Zone Focusing is when we adjust our camera to be in focus for a particular zone, or a particular size of invisible mask. This can be a short zone or a long zone. You can set it to be in focus for 2 meters starting from 1 meter away from you, you can set it to be in focus for 4 meters starting 2 meters away from you and so on and so forth. To know what will be in focus and how to set your zone, you need to know 3 things. Without these 3 things, you can not set your zone focus to a specific setting.&lt;/p>
&lt;/blockquote>
&lt;ol>
&lt;li>Aperture&lt;/li>
&lt;li>Lens focal length&lt;/li>
&lt;li>Subject distance&lt;/li>
&lt;/ol>
&lt;p>&lt;em>&lt;del>If you are not familiar with all or some of those terms, please visit this awesome Photography glossary with illustrations by Tinyprints.com. You can read about all Photography terms there and enjoy some cool illustrations to help you understand everything better. I highly recommend you visiting this page.&lt;/del>&lt;/em>&lt;/p>
&lt;h2 id="how-do-i-set-my-zone-focushttps108mhzgithubio20210105zone-focusinghow-do-i-set-my-zone-focus">How Do I Set My Zone Focus? &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#how-do-i-set-my-zone-focus" target="_blank">
#
&lt;/a>
&lt;a href="#how-do-i-set-my-zone-focushttps108mhzgithubio20210105zone-focusinghow-do-i-set-my-zone-focus" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Knowing the above numbers let&amp;rsquo;s you estimate the zone focus size and distance very easily and vise versa, knowing what you want to set your zone focus too, can only be achieved by controlling these numbers. Of course, we live in an age where free online dof calculators exist and with those we can control our Zone Focusing very easily! One of the most well known ones is located at &lt;a href="http://www.dofmaster.com/" title="DOF Master" target="_blank">
www.dofmaster.com
&lt;/a>
. Using the &lt;a href="http://www.dofmaster.com/dofjs.html" title="Depth of field calculator" target="_blank">
Depth of Field Calculator
&lt;/a>
 or the &lt;a href="http://www.dofmaster.com/doftable.html" title="Depth of field table" target="_blank">
Depth of Field Table
&lt;/a>
 any Street Photographer can estimate the depth of field to set their zone focus. There is a mobile site version as well for using it on the go! You will notice that the website hasn&amp;rsquo;t been updated for quite a while and the latest camera models, from 2013 onwards specifically, aren&amp;rsquo;t listed, but don&amp;rsquo;t worry. If you use a digital camera and you know your sensor size, just use a camera of the same make with the same sensor size to make your calculations. So, for example, if I owned a Fuji X-Pro1 I would just use the Fuji X-Pro1 sensor size from the calculator to estimate my depth of field.&lt;/p>
&lt;h3 id="examplehttps108mhzgithubio20210105zone-focusingexample">Example &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#example" target="_blank">
#
&lt;/a>
&lt;a href="#examplehttps108mhzgithubio20210105zone-focusingexample" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Let&amp;rsquo;s perform an example so you can understand this better. If I want everything at 2 meters in focus at all times using an imaginary Fuji X-Pro1 camera, I have to set my settings to the following numbers:&lt;/p>
&lt;ol>
&lt;li>Aperture at f8 at least, I will go for f11&lt;/li>
&lt;li>Lens focal length at 35mm&lt;/li>
&lt;li>Subject distance&lt;/li>
&lt;/ol>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/Zone-Focus.png" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/uploads/2014/09/Zone-Focus.png&amp;#34; alt=&amp;#34;Zone Focusing&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/Zone-Focus.png" target="_blank">
&lt;/a>
Zone Focusing. Image from &lt;a href="http://www.dofmaster.com/" target="_blank">
www.dofmaster.com
&lt;/a>
&lt;/p>
&lt;p>By setting my imaginary X-Pro1 to those settings I know now I can shoot anything within the zone of 1,47m and 3.14m and get it in focus. That gives me a zone that is 1.67m wide that starts 1.47m away from my lens. Everything in that zone is in focus. Check out the graphic I have made below to better understand this.&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/zone-focusing.png" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/uploads/2014/09/zone-focusing.png&amp;#34; alt=&amp;#34;Zone Focusing&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>Wouldn&amp;rsquo;t it be cool if we didn&amp;rsquo;t have to worry about zones when shooting in the streets? Wouldn&amp;rsquo;t it be cool if we could could just set a starting point and then have everything from there onwards in focus? That is possible and that is the Hyperfocal distance.&lt;/p>
&lt;h2 id="hyperfocal-distancehttps108mhzgithubio20210105zone-focusinghyperfocal-distance">Hyperfocal Distance &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#hyperfocal-distance" target="_blank">
#
&lt;/a>
&lt;a href="#hyperfocal-distancehttps108mhzgithubio20210105zone-focusinghyperfocal-distance" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Hyperfocal distance is a similar concept to that of zone focusing with one difference. Instead of setting a zone distance in which everything is in focus, hyperfocal distance lets you have everything in focus from one point and onwards to infinity! Let me share with you my personal definition of Hyperfocal distance.&lt;/p>
&lt;h3 id="my-definition-of-hyperfocal-distancehttps108mhzgithubio20210105zone-focusingmy-definition-of-hyperfocal-distance">My definition of Hyperfocal distance &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#my-definition-of-hyperfocal-distance" target="_blank">
#
&lt;/a>
&lt;a href="#my-definition-of-hyperfocal-distancehttps108mhzgithubio20210105zone-focusingmy-definition-of-hyperfocal-distance" class="hash">#&lt;/a>&lt;/h3>
&lt;blockquote>
&lt;p>Hyperfocal distance is the focus distance that we set our lens too in order make our camera have everything in focus, from one starting point all the way up to infinity! The starting point of your Hyperfocal distance is affected by the same 3 things that you need to control when zone focusing. Without these 3 things, you can not set your Hyperfocal distance.&lt;/p>
&lt;/blockquote>
&lt;ol>
&lt;li>Aperture&lt;/li>
&lt;li>Lens focal length&lt;/li>
&lt;li>Subject distance&lt;/li>
&lt;/ol>
&lt;p>If you are not familiar with all or some of those terms, please visit this awesome &lt;a href="http://www.treat.com/photography-terms.htm" title="Photography Glossary" target="_blank">
Photography glossary with illustrations
&lt;/a>
 by Treat.com.&lt;/p>
&lt;h2 id="how-do-i-set-my-hyperfocal-distancehttps108mhzgithubio20210105zone-focusinghow-do-i-set-my-hyperfocal-distance">How Do I Set My Hyperfocal Distance &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#how-do-i-set-my-hyperfocal-distance" target="_blank">
#
&lt;/a>
&lt;a href="#how-do-i-set-my-hyperfocal-distancehttps108mhzgithubio20210105zone-focusinghow-do-i-set-my-hyperfocal-distance" class="hash">#&lt;/a>&lt;/h2>
&lt;p>This is very easy. Let&amp;rsquo;s pick up our imaginary Fuji X-Pro1 again. As we know from the previous example we performed for Zone focusing, the X-Pro1 has a 35mm lens. So, all we have to do is load the the &lt;a href="http://www.dofmaster.com/dofjs.html" target="_blank">
Depth of Field Calculator
&lt;/a>
 and punch in the following numbers:&lt;/p>
&lt;ol>
&lt;li>Aperture at f11&lt;/li>
&lt;li>Lens focal length at 35mm&lt;/li>
&lt;li>Subject distance&lt;/li>
&lt;/ol>
&lt;p>We get the same results as in the previous example, but now we need to focus on another number. That number is &lt;strong>5.45m&lt;/strong> and it is the Hyperfocal Distance.&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/Hyperfocal-distance.png" target="_blank">
&amp;lt;img src=&amp;#34;https://www.streethunters.net/wp-content/uploads/2014/09/Hyperfocal-distance.png&amp;#34; alt=&amp;#34;Hyperfocal distance&amp;#34; loading=&amp;#34;lazy&amp;#34; /&amp;gt;
&lt;/a>
&lt;/p>
&lt;p>&lt;a href="https://www.streethunters.net/wp-content/uploads/2014/09/Hyperfocal-distance.png" target="_blank">
&lt;/a>
Hyperfocal distance. Image from &lt;a href="http://www.dofmaster.com/" target="_blank">
www.dofmaster.com
&lt;/a>
&lt;/p>
&lt;p>That means, that if we focus our camera at 5.45m specifically using the distance meter on the lens (if that is available) or the distance meter on the camera LCD or viewfinder screen (if that is available), we can set our imaginary Fuji X-Pro1 to have everything from 2.725m an onwards in focus, all the way to infinity! This is one of the Street Photographer&amp;rsquo;s mightiest weapons. It is faster than any AF system in the world and it can be achieved on any old camera. As long as you know your numbers, you are fine!&lt;/p>
&lt;h2 id="quick-tip-how-to-set-zone-focus-or-hyperfocal-without-a-lens-with-a-distance-indicatorhttps108mhzgithubio20210105zone-focusingquick-tip-how-to-set-zone-focus-or-hyperfocal-without-a-lens-with-a-distance-indicator">Quick Tip: How To Set Zone Focus Or Hyperfocal Without A Lens With A Distance Indicator? &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#quick-tip-how-to-set-zone-focus-or-hyperfocal-without-a-lens-with-a-distance-indicator" target="_blank">
#
&lt;/a>
&lt;a href="#quick-tip-how-to-set-zone-focus-or-hyperfocal-without-a-lens-with-a-distance-indicatorhttps108mhzgithubio20210105zone-focusingquick-tip-how-to-set-zone-focus-or-hyperfocal-without-a-lens-with-a-distance-indicator" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Zone focusing and Hyperfocal distance are usually used when our lens doesn&amp;rsquo;t support Auto Focus, something like old manual lenses for example. Old manual glass, has distance indicators on it, making the zone focusing easy to set if you have calculated your numbers. But, what happens if you want to zone focus, using a modern AF lens that doesn&amp;rsquo;t have distance indicators on it? Some cameras like the Fuji X series cameras have distance information displayed in their OVFs and EVFs. So, all one has to do is to switch to manual and turn the focus ring until the correct distance is selected. There are cameras though that don&amp;rsquo;t have distance information. How do you overcome that hurdle? Well, quite easily actually. If you need to set your focus distance at 6 feet for example, all you have to do is put your back to a wall and walk 6 feet away. Then turn and focus on that wall and you are set. This isn&amp;rsquo;t an accurate way of zone focusing, but it works perfectly well, believe me I used to do this all the time with my SONY NEX-6 &amp;amp; SEL20F28 combo. Give it a go!&lt;/p>
&lt;h2 id="conclusionhttps108mhzgithubio20210105zone-focusingconclusion">Conclusion &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#conclusion" target="_blank">
#
&lt;/a>
&lt;a href="#conclusionhttps108mhzgithubio20210105zone-focusingconclusion" class="hash">#&lt;/a>&lt;/h2>
&lt;p>No matter what camera you use, be it a film camera or a digital camera, if your system supports manual focusing you can always take advantage of the ease of use and speed of Zone focusing or the Hyperfocal distance.&lt;/p>
&lt;h3 id="what-are-the-benefits-of-zone-focusing-and-hyperfocal-distancehttps108mhzgithubio20210105zone-focusingwhat-are-the-benefits-of-zone-focusing-and-hyperfocal-distance">What are the benefits of Zone focusing and Hyperfocal distance? &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#what-are-the-benefits-of-zone-focusing-and-hyperfocal-distance" target="_blank">
#
&lt;/a>
&lt;a href="#what-are-the-benefits-of-zone-focusing-and-hyperfocal-distancehttps108mhzgithubio20210105zone-focusingwhat-are-the-benefits-of-zone-focusing-and-hyperfocal-distance" class="hash">#&lt;/a>&lt;/h3>
&lt;ol>
&lt;li>First of all you avoid any possible focus hunting that could happen using a Auto Focus camera system.&lt;/li>
&lt;li>Secondly because you skip the focusing part altogether, a zone focused or hyperfocal set camera, fires shots much more instantaneously than any AF system.&lt;/li>
&lt;li>Last but not least, you can take sharp photos while shooting the street at night using a flash! You just set your zone or your hyperfocal distance, activate your flash and then you just fire and forget! Everything in focus, even in pitch black!&lt;/li>
&lt;/ol>
&lt;h3 id="useful-linkshttps108mhzgithubio20210105zone-focusinguseful-links">Useful links &lt;a href="https://108mhz.github.io/2021/01/05/zone-focusing/#useful-links" target="_blank">
#
&lt;/a>
&lt;a href="#useful-linkshttps108mhzgithubio20210105zone-focusinguseful-links" class="hash">#&lt;/a>&lt;/h3>
&lt;p>If you haven&amp;rsquo;t tried this before, next time you hit the streets give it a try. Below I have copy pasted all the useful links I referred to during my post for your convenience and also some links worth checking out to help you understand Zone focusing even better.&lt;/p>
&lt;ul>
&lt;li>&lt;a href="http://www.treat.com/photography-terms.htm" target="_blank">
Photography glossary with illustrations
&lt;/a>
 by &lt;a href="http://www.treat.com/" title="Treat" target="_blank">
Treat.com
&lt;/a>
.&lt;/li>
&lt;li>&lt;a href="http://www.dofmaster.com/dofjs.html" target="_blank">
Depth of Field Calculator
&lt;/a>
 by dofmaster.com&lt;/li>
&lt;li>&lt;a href="http://www.dofmaster.com/doftable.html" target="_blank">
Depth of Field Table
&lt;/a>
 by dofmaster.com&lt;/li>
&lt;li>&lt;a href="http://en.wikipedia.org/wiki/Depth_of_field#Zone_focusing" target="_blank">
Zone focusing as explained on Wikipedia
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="http://en.wikipedia.org/wiki/Depth_of_field#Hyperfocal_distance" target="_blank">
Hyperfocal distance as explained on Wikipedia
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.photographytalk.com/beginner-photography-tips/7356-a-beginner-s-guide-to-aperture-and-depth-of-field" target="_blank">
A Beginner&amp;amp;rsquo;s Guide to Aperture and Depth of Field
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;p>&lt;em>Stay Sharp &amp;amp; Keep Shooting!&lt;/em>&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://www.streethunters.net/" target="_blank">
Street Hunter
&lt;/a>
&lt;/li>
&lt;/ul></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2021/09/10/hyperfocal/</guid><pubDate>Fri, 10 Sep 2021 00:00:00 +0000</pubDate></item><item><title>How To Create Easy and Secure Passwords</title><link>/2020/12/04/create-secure-password/</link><description>&lt;p>The first step to making sure our passwords are their best is to leave the &amp;lsquo;password&amp;rsquo; mentality behind. We need to create &amp;lsquo;passphrases&amp;rsquo; instead. A passphrase is like a password but longer, using several words together. The longer the passphrase is, the better off we will be. But there is a point of diminishing returns in the length versus security trade-off.&lt;/p>
&lt;p>In Edward Snowden&amp;rsquo;s original email to the journalist he said:&lt;/p>
&lt;blockquote>
&lt;p>Please confirm that no one has ever had a copy of your private key and that it uses a strong passphrase. Assume your adversary is capable of one trillion guesses per second.&lt;/p>
&lt;/blockquote>
&lt;p>That is a lot of guesses per second! Granted, that journalist most likely had a much larger target than we do on their back, but this is still a great threshold to measure how effective our passphrases are. If we only use a password that is five characters long, even if it is full of symbols, it will be guessed in minutes not days.&lt;/p>
&lt;p>We should always assume there is an attacker with enough incentive to run a trillion guesses per second against our accounts. By doing so we raise the unlikeliness of a attack against us succeeding.&lt;/p>
&lt;h2 id="your-password-trick-isnt-clever">Your Password Trick Isn&amp;rsquo;t Clever &lt;a href="#your-password-trick-isnt-clever" class="hash">#&lt;/a>&lt;/h2>
&lt;p>The majority of people will choose a password from the culture around them. This is often a line from their favor book, song, or movie. Once the quote is selected they then mess around with in by adding capitalization, numbers, and symbols that are easy for them to remember. Let&amp;rsquo;s take a look at the following password from a classic Shakespearian work.&lt;/p>
&lt;p>&lt;code>AllTh3Worlds/ASt4ge&lt;/code>&lt;/p>
&lt;p>Even though we have more of a passphrase than a password here, there is a high provability that we were not the first to use this passphrase. By using a line from a work of art we place our accounts at more risk than we should. For all we know there is a computer program out there that takes popular phrases and mixes around variations to find a match.&lt;/p>
&lt;p>The reason passwords and phrases like the one above are a poor choice is something called entropy. At a basic level and in relation to passwords, entropy is how random a passphrase is in its final state. Unfortunately, we humans love patterns and are extremely terrible at creating randomness.&lt;/p>
&lt;p>What if we don&amp;rsquo;s use a line from culture but instead just pick random words? Even when we do this it is still far from being truly random. This is due to how ingrained our native language has become and all languages are predictable. Our brains love using idioms and rules of grammar, both of which kill entropy.&lt;/p>
&lt;h2 id="secure-passphrase-with-dice">Secure Passphrase with Dice &lt;a href="#secure-passphrase-with-dice" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Yes, dice. It is the best way to allow for the randomness of nature to create a ton of entropy. First we need to grab a &lt;em>&lt;a href="https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt" target="_blank">
Diceware Word List
&lt;/a>
&lt;/em> off the internet. The one linked in from the Electronic Frontier Foundation and is on optimized version of previous word lists.&lt;/p>
&lt;p>These word lists contain 7,776 words or 37 PDF pages of words for your passphrase-making pleasure. Next to each word is a five-digit number each between one and six. Now we need our dice. Real dice are always better than using a program because we can not be one hundred percent certain the program is truly random.&lt;/p>
&lt;p>Roll the dice until you have five numbers ranging between one and six. Write down the five numbers as they appear on a piece of paper. The five-digit number that is on the paper corresponds to a word on the list linked above. Congratulations, you have you first random word! Once you are done you will end up with a passphrase that looks like the following.&lt;/p>
&lt;p>&lt;code>acorn overstate ferris outlet mosaic laurel&lt;/code>&lt;/p>
&lt;p>We can then add capitalization, numbers, and symbols as we wish. However, the entropy comes from how many words we generate using the dice and word list. The longer the passphrase the more entropy we gain and the harder our passphrase will be to guess.&lt;/p>
&lt;h2 id="how-strong-are-dice-generated-passphrases">How Strong are Dice-Generated Passphrases? &lt;a href="#how-strong-are-dice-generated-passphrases" class="hash">#&lt;/a>&lt;/h2>
&lt;p>As mentioned, the strength of any password or phrase is determined by how many words we roll. If we only choose one word from the list, an attacker will have a one in 7,776 chance for guessing our word. The attacker may guess it on the first attempt or the 7,776th attempt with the average number of guesses being 3,888.&lt;/p>
&lt;p>So what if we roll our dice for two words? It does not simply double but there are now 77,762 possible combinations increasing the total possible phrases to 60,466,176! On average it will take 30 million tries to guess a two-word passphrase. Bump it up to five words and we get 14 quintilian tries! (That is with the attacker knowing that we used a word list and which one.)&lt;/p>
&lt;p>But how long will it take to guess these at one trillion guesses per second as Edward Snowden says we should assume? This is also exponential. If we were to use five words it would take an average of 165 days to crack. At six words it jumps to 3,505 years and seven words puts us at 27,256 millenia!&lt;/p>
&lt;h2 id="when-to-use-the-dice-method">When to Use the Dice Method? &lt;a href="#when-to-use-the-dice-method" class="hash">#&lt;/a>&lt;/h2>
&lt;p>I always recommend people use a service like &lt;em>Bitwarden&lt;/em> for their online passwords. It will generate a random password for you and no two will be the same. This is very important to keep your accounts safe. There is no need to use a diceware passphrase on each site you sign up for since that would require us to memorize too many six- or seven-word strings.&lt;/p>
&lt;p>The reason for this is because after we submit our password to a site it has to connect to a server and send back the results. It is not possible for an attacker to send a trillion requests to a web-sever without clogging its network. We are more likely to have our passwords stolen by a fake version of our favorite site. In that event, no level of entropy will help.&lt;/p>
&lt;p>However, we must use a diceware passphrase for our &lt;em>Bitwarden&lt;/em> master password and nowhere else! Every time we use the same passphrase on a different site we increase the chance of it getting stolen. This, in turn, kills the entropy we created with our dice.&lt;/p>
&lt;h2 id="remember">Remember &lt;a href="#remember" class="hash">#&lt;/a>&lt;/h2>
&lt;ol>
&lt;li>Never use the same password on more than one site.&lt;/li>
&lt;li>Use a service like &lt;em>Bitwarden&lt;/em> to create unique passwords for websites.&lt;/li>
&lt;li>Create other passwords using dice and the word list.&lt;/li>
&lt;li>Use at least six words in the diceware passphrase.&lt;/li>
&lt;li>Add capitalization, symbols, and numbers as you wish.&lt;/li>
&lt;/ol>
&lt;hr>
&lt;ul>
&lt;li>&lt;a href="https://jrswab.com" target="_blank">
JRSwab
&lt;/a>
&lt;/li>
&lt;/ul></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/12/04/create-secure-password/</guid><pubDate>Fri, 04 Dec 2020 00:00:00 +0000</pubDate></item><item><title>Study Less Study Smart</title><link>/2020/11/19/studyless-study-smart/</link><description>&lt;p>Marty Lobdell - Study Less Study Smart&lt;/p>
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
&lt;iframe src="https://www.youtube.com/embed/IlU-zDU6aQ0" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video">&lt;/iframe>
&lt;/div>
&lt;p>In brief:&lt;/p>
&lt;ul>
&lt;li>30 min study sessions with 5 min breaks&lt;/li>
&lt;li>no music except certain study music&lt;/li>
&lt;li>special desk/ room for studying/working&lt;/li>
&lt;li>learn concepts before facts (be able to explain things in your own words)&lt;/li>
&lt;li>take notes&lt;/li>
&lt;li>teach another person&lt;/li>
&lt;li>use mnemonics&lt;/li>
&lt;li>for textbooks:
&amp;ndash; feel free to move to different chapters- it&amp;rsquo;s not a novel&lt;/li>
&lt;/ul>
&lt;p>&amp;ndash; for each chapter: see images, main points and questions&lt;/p>
&lt;p>&amp;ndash; write down questions in the book&lt;/p>
&lt;p>&amp;ndash; read bold words, titles, names, main ideas and marked text&lt;/p>
&lt;p>&amp;ndash; read first and last sentence of each paragraph&lt;/p>
&lt;p>&amp;ndash; read the whole book&lt;/p>
&lt;p>&amp;ndash; try to answer questions&lt;/p>
&lt;p>&amp;ndash; reread the book and answer questions you couldn&amp;rsquo;t before&lt;/p>
&lt;p>&amp;ndash; reread with a marker and pencil&lt;/p>
&lt;p>&amp;ndash; answer questions, come up with your own for the main topics&lt;/p>
&lt;p>&amp;ndash; write an essay for topics that a child could understand&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/11/19/studyless-study-smart/</guid><pubDate>Thu, 19 Nov 2020 00:00:00 +0000</pubDate></item><item><title>Run a local server to share files</title><link>/2020/11/18/run-localserver/</link><description>&lt;p>Do not run this command in your home folder.&lt;/p>
&lt;p>mkdir -p /tmp/shared/&lt;/p>
&lt;blockquote>
&lt;p>cd /tmp/shared/&lt;/p>
&lt;/blockquote>
&lt;p>echo &amp;ldquo;Hello world&amp;rdquo; &amp;gt; WELCOME.txt&lt;/p>
&lt;h1 id="if-using-python-2x">If using Python 2.x &lt;a href="#if-using-python-2x" class="hash">#&lt;/a>&lt;/h1>
&lt;blockquote>
&lt;p>python -m SimpleHTTPServer&lt;/p>
&lt;/blockquote>
&lt;h1 id="python-3x">Python 3.x &lt;a href="#python-3x" class="hash">#&lt;/a>&lt;/h1>
&lt;blockquote>
&lt;p>python3 -m http.server&lt;/p>
&lt;/blockquote>
&lt;p>This will listen on port 8000 by default.&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/11/18/run-localserver/</guid><pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate></item><item><title>90 Linux Commands frequently used by Linux Sysadmins</title><link>/2020/10/31/90-linux-commands/</link><description>&lt;ol>
&lt;li>ip – from Iproute2, a collection of utilities for controlling TCP/IP networking and traffic control in Linux.&lt;/li>
&lt;li>ls – list directory contents.&lt;/li>
&lt;li>df – display disk space usage.&lt;/li>
&lt;li>du – estimate file space usage.&lt;/li>
&lt;li>free – display memory usage.&lt;/li>
&lt;li>scp – securely Copy Files Using SCP, with examples.&lt;/li>
&lt;li>find – locates files based on some user-specified criteria.&lt;/li>
&lt;li>ncdu – a disk utility for Unix systems.&lt;/li>
&lt;li>pstree – display a tree of processes.&lt;/li>
&lt;li>last – show a listing of last logged in users.&lt;/li>
&lt;li>w – show a list of currently logged in user sessions.&lt;/li>
&lt;li>grep – Search a file for a pattern of characters, then display all matching lines.&lt;/li>
&lt;li>uptime – shows system uptime and load average.&lt;/li>
&lt;li>top – shows an overall system view.&lt;/li>
&lt;li>vmstat – shows system memory, processes, interrupts, paging, block I/O, and CPU info.&lt;/li>
&lt;li>htop – interactive process viewer and manager.&lt;/li>
&lt;li>dstat – view processes, memory, paging, I/O, CPU, etc., in real-time. All-in-one for vmstat, iostat, netstat, and ifstat.&lt;/li>
&lt;li>iftop – network traffic viewer.&lt;/li>
&lt;li>nethogs – network traffic analyzer.&lt;/li>
&lt;li>iotop – interactive I/O viewer. Get an overview of storage r/w activity.&lt;/li>
&lt;li>iostat – for storage I/O statistics.&lt;/li>
&lt;li>netstat – for network statistics.&lt;/li>
&lt;li>ss – utility to investigate sockets.&lt;/li>
&lt;li>atop – For Linux server performance analysis.&lt;/li>
&lt;li>Glances and nmon – htop and top Alternatives:&lt;/li>
&lt;li>ssh – secure command-line access to remote Linux systems.&lt;/li>
&lt;li>sudo – execute commands with administrative privilege.&lt;/li>
&lt;li>cd – directory navigation.&lt;/li>
&lt;li>pwd – shows your current directory location.&lt;/li>
&lt;li>cp – copying files and folders.&lt;/li>
&lt;li>mv – moving files and folders.&lt;/li>
&lt;li>rm – removing files and folders.&lt;/li>
&lt;li>mkdir – create or make new directories.&lt;/li>
&lt;li>touch – used to update the access date and/or modification date of a computer file or directory.&lt;/li>
&lt;li>man – for reading system reference manuals.&lt;/li>
&lt;li>apropos – Search man page names and descriptions.&lt;/li>
&lt;li>rsync – remote file transfers and syncing.&lt;/li>
&lt;li>tar – an archiving utility.&lt;/li>
&lt;li>gzip – file compression and decompression.&lt;/li>
&lt;li>b2zip – similar to gzip. It uses a different compression algorithm.&lt;/li>
&lt;li>zip – for packaging and compressing (to archive) files.&lt;/li>
&lt;li>locate – search files in Linux.&lt;/li>
&lt;li>ps – information about the currently running processes.&lt;/li>
&lt;li>Making use of Bash scripts. Example: ./bashscript.sh&lt;/li>
&lt;li>cron – set up scheduled tasks to run.&lt;/li>
&lt;li>nmcli – network management.&lt;/li>
&lt;li>ping – send ICMP ECHO_REQUEST to network hosts.&lt;/li>
&lt;li>traceroute – check the route packets take to a specified host.&lt;/li>
&lt;li>mtr – network diagnostic tool.&lt;/li>
&lt;li>nslookup – query Internet name servers (NS) interactively.&lt;/li>
&lt;li>host – perform DNS lookups in Linux.&lt;/li>
&lt;li>dig – DNS lookup utility.&lt;/li>
&lt;li>wget – retrieve files over HTTP, HTTPS, FTP, and FTPS.&lt;/li>
&lt;li>curl – transferring data using various network protocols. (supports more protocols than wget)&lt;/li>
&lt;li>dd – convert and copy files.&lt;/li>
&lt;li>fdisk – manipulate the disk partition table.&lt;/li>
&lt;li>parted – for creating and manipulating partition tables.&lt;/li>
&lt;li>blkid – command-line utility to locate/print block device attributes.&lt;/li>
&lt;li>mkfs – build a Linux file system.&lt;/li>
&lt;li>fsck – tool for checking the consistency of a file system.&lt;/li>
&lt;li>whois – client for the whois directory service.&lt;/li>
&lt;li>nc – command-line networking utility. (Also, see 60 Linux Networking commands and scripts.)&lt;/li>
&lt;li>umask – set file mode creation mask.&lt;/li>
&lt;li>chmod – change the access permissions of file system objects.&lt;/li>
&lt;li>chown – change file owner and group.&lt;/li>
&lt;li>chroot – run command or interactive shell with a special root directory.&lt;/li>
&lt;li>useradd – create a new user or update default new user information.&lt;/li>
&lt;li>userdel – used to delete a user account and all related files.&lt;/li>
&lt;li>usermod – used to modify or change any attributes of an existing user account.&lt;/li>
&lt;li>vi – text editor.&lt;/li>
&lt;li>cat – display file contents.&lt;/li>
&lt;li>tac – output file contents, in reverse.&lt;/li>
&lt;li>more – display file contents one screen/page at a time.&lt;/li>
&lt;li>less – similar to the more command with additional features.&lt;/li>
&lt;li>tail – used to display the tail end of a text file or piped data.&lt;/li>
&lt;li>dmesg – prints the message buffer of the kernel ring.&lt;/li>
&lt;li>journalctl – query the systemd journal.&lt;/li>
&lt;li>kill – terminate a process.&lt;/li>
&lt;li>killall – Sends a kill signal to all instances of a process by name.&lt;/li>
&lt;li>sleep – suspends program execution for a specified time.&lt;/li>
&lt;li>wait – Suspend script execution until all jobs running in the background have been terminated.&lt;/li>
&lt;li>nohup – Run Commands in the Background.&lt;/li>
&lt;li>screen – hold a session open on a remote server. (also a full-screen window manager)&lt;/li>
&lt;li>tmux – a terminal multiplexer.&lt;/li>
&lt;li>passwd – change a user’s password.&lt;/li>
&lt;li>chpassword –&lt;/li>
&lt;li>mount / umount – provides access to an entire filesystem in one directory.&lt;/li>
&lt;li>systemctl – Managing Services (Daemons).&lt;/li>
&lt;li>clear – clears the screen of the terminal.&lt;/li>
&lt;li>env -Run a command in a modified environment.&lt;/li>
&lt;li>cheat – allows you to create and view interactive cheatsheets on the command-line.”&lt;/li>
&lt;li>tldr – Collaborative cheatsheets for console commands.&lt;/li>
&lt;li>bashtop – the ‘cool’ top alternative.&lt;/li>
&lt;li>bpytop – Python port of bashtop.&lt;/li>
&lt;/ol></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/10/31/90-linux-commands/</guid><pubDate>Sat, 31 Oct 2020 00:00:00 +0000</pubDate></item><item><title>The Filesystem Hierarchy Standard</title><link>/2020/10/21/fhs/</link><description>&lt;p>As with other Linux distributions, Kali Linux is organized to be consistent with the Filesystem Hierarchy Standard (FHS), allowing users of other Linux distributions to easily find their way around Kali. The FHS defines the purpose of each directory. The top-level directories are described as follows:&lt;/p>
&lt;ul>
&lt;li>/bin/: basic programs&lt;/li>
&lt;li>/boot/: Kali Linux kernel and other files required for its early boot process&lt;/li>
&lt;li>/dev/: device files&lt;/li>
&lt;li>/etc/: configuration files&lt;/li>
&lt;li>/home/: user’s personal files&lt;/li>
&lt;li>/lib/: basic libraries&lt;/li>
&lt;li>/media/*: mount points for removable devices (CD-ROM, USB keys, and so on)&lt;/li>
&lt;li>/mnt/: temporary mount point&lt;/li>
&lt;li>/opt/: extra applications provided by third parties&lt;/li>
&lt;li>/root/: administrator’s (root’s) personal files&lt;/li>
&lt;li>/run/: volatile runtime data that does not persist across reboots (not yet included in the FHS)&lt;/li>
&lt;li>/sbin/: system programs&lt;/li>
&lt;li>/srv/: data used by servers hosted on this system&lt;/li>
&lt;li>/tmp/: temporary files (this directory is often emptied at boot)&lt;/li>
&lt;li>/usr/: applications (this directory is further subdivided into bin, sbin, lib according to the same logic as in the root directory) Furthermore, /usr/share/ contains architectureindependent data. The /usr/local/ directory is meant to be used by the administrator for installing applications manually without overwriting files handled by the packaging system (dpkg).&lt;/li>
&lt;li>/var/: variable data handled by daemons. This includes log files, queues, spools, and caches.&lt;/li>
&lt;li>/proc/ and /sys/ are specific to the Linux kernel (and not part of the FHS). They are used by the kernel for exporting data to user space&lt;/li>
&lt;/ul></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/10/21/fhs/</guid><pubDate>Wed, 21 Oct 2020 00:00:00 +0000</pubDate></item><item><title>Useful commands</title><link>/2020/10/21/useful-commands/</link><description>&lt;h3 id="displaying-and-modifying-text-files">Displaying and Modifying Text Files &lt;a href="#displaying-and-modifying-text-files" class="hash">#&lt;/a>&lt;/h3>
&lt;p>The &lt;strong>cat&lt;/strong> file command (intended to concatenate files to the standard output device) reads a file and displays its contents on the terminal. If the file is too big to fit on a screen, you can use a pager such as &lt;strong>less&lt;/strong> (or &lt;strong>more&lt;/strong>) to display it page by page. The editor command starts a text editor (such as &lt;strong>Vi&lt;/strong> or &lt;strong>Nano&lt;/strong>) and allows creating, modifying, and reading text files. The simplest files can sometimes be created directly from the command interpreter thanks to redirection:command&amp;gt;file creates a file named file containing the output of the given command.command&amp;raquo;file is similar except that it appends the output of the command to the file rather than overwriting it.&lt;/p>
&lt;pre>&lt;code>$echo ”Kali rules!” &amp;gt; kali-rules.txt
$cat kali-rules.txt
Kali rules!
$echo ”Kali is the best!” &amp;gt;&amp;gt; kali-rules.txt
$cat kali-rules.txt
Kali rules!
Kali is the best!
&lt;/code>&lt;/pre>
&lt;h3 id="searching-for-files-and-within-files">Searching for Files and within Files &lt;a href="#searching-for-files-and-within-files" class="hash">#&lt;/a>&lt;/h3>
&lt;p>The &lt;strong>find&lt;/strong> directory criteria command searches for files in the hierarchy under directory ac-cording to several criteria. The most commonly used criterion is -name filename, which allows searching for a file by name. You can also use common wildcards such as &lt;strong>“*”&lt;/strong> in the file namesearch.&lt;/p>
&lt;pre>&lt;code>$find /etc -name hosts
/etc/hosts
/etc/avahi/hosts
$find /etc -name ”hosts*”
/etc/hosts
/etc/hosts.allow
/etc/hosts.deny
/etc/avahi/hosts
&lt;/code>&lt;/pre>
&lt;p>The grep expression files command searches the contents of the files and extracts lines matching the regular expression. Adding the &lt;strong>-r&lt;/strong> option enables a recursive search on all files contained in the directory. This allows you to look for a file when you only know a part of its contents.&lt;/p>
&lt;h3 id="managing-processes">Managing Processes &lt;a href="#managing-processes" class="hash">#&lt;/a>&lt;/h3>
&lt;p>The ps aux command lists the processes currently running and helps to identify them by showing their PID. Once you know the PID of a process, the kill -signal pid command allows you to send it a signal (if you own the process). Several signals exist; most commonly used are &lt;strong>TERM&lt;/strong>(a request to terminate gracefully) and &lt;strong>KILL&lt;/strong>(a forced kill).&lt;/p>
&lt;p>The command interpreter can also run programs in the background if the command is followed by &lt;strong>“&amp;amp;”&lt;/strong>. By using the ampersand, you resume control of the shell immediately even though the command is still running (hidden from view as a background process). The jobs command lists the processes running in the background; running &lt;strong>fg %job-number&lt;/strong>(for foreground) restores a job to the foreground. When a command is running in the foreground (either because it was started normally, or brought back to the foreground with fg), the &lt;strong>Control+Z&lt;/strong> key combination pauses the process and resumes control of the command line. The process can then be restarted in the background with &lt;strong>bg %job-number&lt;/strong>(for background).&lt;/p>
&lt;h3 id="managing-rights">Managing Rights &lt;a href="#managing-rights" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Linux is a multi-user system so it is necessary to provide a permissions system to control the set of authorized operations on files and directories, which includes all the system resources and devices(on a Unix system, any device is represented by a file or directory). This principle is common to all Unix-like systems.Each file or directory has specific permissions for three categories of users:&lt;/p>
&lt;ul>
&lt;li>Its owner (symbolized by u, as in user)&lt;/li>
&lt;li>ts owner group (symbolized by g, as in group), representing all the members of the group.&lt;/li>
&lt;li>The others (symbolized by o, as in other).&lt;/li>
&lt;/ul>
&lt;p>Three types of rights can be combined:&lt;/p>
&lt;ul>
&lt;li>reading (symbolized by r, as in read);&lt;/li>
&lt;li>writing (or modifying, symbolized byw, as in write);&lt;/li>
&lt;li>executing (symbolized by x, as in eXecute).&lt;/li>
&lt;/ul>
&lt;p>In the case of a file, these rights are easily understood: read access allows reading the content(including copying), write access allows changing it, and execute access allows running it (which will only work if it is a program).&lt;/p>
&lt;blockquote>
&lt;p>Two particular rights are relevant to executable files:setuid and setgid
(symbolized with the letter “s”).Note that we frequently speak of bit,
since each of these boolean values can be represented by a 0 or a 1.
These two rights allow any user to execute the program with the rights
of the owner or the group, respectively.This mechanism grants access
to features requiring higher level permissions than those you would
usually have. Since a setuid root program is systematically run under
the super-user identity, it is very important to ensure it is secure and
reliable. Any user who manages to subvert a setuid root program to call
a command of their choice could then impersonate the root user and have
all rights on the system. Penetration testers regularly search for these
types of files when they gain access to a system as a way of escalating
their privileges.&lt;/p>
&lt;/blockquote>
&lt;p>A directory is handled differently from a file. Read access gives the right to consult the list of its contents (files and directories); write access allows creating or deleting files; and execute access allows crossing through the directory to access its contents (for example, with the cd command).Being able to cross through a directory without being able to read it gives the user permission to access the entries therein that are known by name, but not to find them without knowing their exact name.&lt;/p>
&lt;blockquote>
&lt;p>Thes etgid bit also applies to directories. Any newly-created item in
such directories is automatically assigned the owner group of the parent
directory, instead of inheriting the creator’s main group as usual.
Because of this, you don’t have to change your main group (with the new
grp command) when working in a file tree shared between several users of
the same dedicated group.The sticky bit(symbolized by the letter “t”) is
a permission that is only useful in directories. It is especially used
for temporary directories where everybody has write access
(such as/tmp/): it restricts deletion of files so that only their owner
or the owner of the parent directory can delete them. Lacking this,
everyone could delete other users’ files in/tmp/.&lt;/p>
&lt;/blockquote>
&lt;p>Three commands control the permissions associated with a file:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>chownuser filechanges the owner of the file&lt;/p>
&lt;blockquote>
&lt;p>Frequently you want to change the group of a file at the same time that you change the owner. The chown command has a special syntax for that: chown user:group file&lt;/p>
&lt;/blockquote>
&lt;/li>
&lt;li>
&lt;p>chgrp group file alters the owner group&lt;/p>
&lt;/li>
&lt;li>
&lt;p>chmod rights file changes the permissions for the file&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>There are two ways of representing rights. Among them, the symbolic representation is probably the easiest to understand and remember. It involves the letter symbols mentioned above. You can define rights for each category of users (u/g/o), by setting them explicitly (with=), by adding (+), or subtracting (-). Thus the u=rwx, g+rw, o-r formula gives the owner read, write, and execute rights, adds read and write rights for the owner group, and removes read rights for other users.Rights not altered by the addition or subtraction in such a command remain unmodified. The letter a, for all, covers all three categories of users, so that a=rx grants all three categories the same rights (read and execute, but not write).The (octal) numeric representation associates each right with a value: 4 for read, 2 for write, and1 for execute. We associate each combination of rights with the sum of the three figures, and a value is assigned to each category of users, in the usual order (owner, group, others). For instance, the chmod 754 filecommand will set the following rights: read, write and execute for the owner (since 7 = 4 + 2 + 1); read and execute for the group (since 5 = 4 + 1); read-only for others. The 0 means no rights; thus chmod 600 file allows for read and write permissions for the owner, and no rights for anyone else. The most frequent right combinations are 755 for executable files and directories, and 644 for data files.To represent special rights, you can prefix a fourth digit to this number according to the same principle, where these tuid, setgid, and sticky bits are 4, 2, and 1, respectively. The command chmod 4754 will associate these tuidbit with the previously described rights. Note that the use of octal notation only allows you to set all the rights at once on a file; you cannot use it to add a new right, such as read access for the group owner, since you must take into account the existing rights and compute the new corresponding numerical value.The octal representation is also used with the umask command, which is used to restrict permissions on newly created files. When an application creates a file, it assigns indicative permissions,knowing that the system automatically removes the rights defined with umask. Enter umask in a shell; you will see a mask such as0022. This is simply an octal representation of the rights to be systematically removed (in this case, the write rights for the group and other users).If you give it a new octal value, the umask command modifies the mask. Used in a shell initialization file (for example,~/.bash_profile), it will effectively change the default mask for your work sessions.&lt;/p>
&lt;blockquote>
&lt;p>Sometimes we have to change rights for an entire file tree. All the commands above have a-R option to operate recursively in sub-directories.The distinction between directories and files sometimes causes problems with recursive operations. That is why the “X” letter has been introduced in the symbolic representation of rights. It represents a right to execute which applies only to directories(and not to files lacking this right). Thus,chmod -R a+X directory will only add execute rights for all categories of users (a) for all of the sub-directories and files for which at least one category of user (even if their sole owner) already has execute rights.&lt;/p>
&lt;/blockquote>
&lt;h3 id="disable-mitigation">Disable MItigation &lt;a href="#disable-mitigation" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Add this to your &lt;code>/etc/default/grub&lt;/code> under line &lt;code>GRUB_CMDLINE_LINUX=&amp;quot;rhgb quiet&amp;quot;&lt;/code>:&lt;/p>
&lt;pre>&lt;code>GRUB_CMDLINE_LINUX=&amp;quot;rhgb quiet mitigations=off&amp;quot;
&lt;/code>&lt;/pre></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/10/21/useful-commands/</guid><pubDate>Wed, 21 Oct 2020 00:00:00 +0000</pubDate></item><item><title>How to block Windows 10 telemetry using “hosts” file</title><link>/2020/10/18/windows-telemetry/</link><description>&lt;p>Since &lt;strong>Windows&lt;/strong> 8, &lt;strong>Microsoft&lt;/strong> has moved to a new commercial strategy: in addition with traditional selling of &lt;strong>OS&lt;/strong> licenses, started got revenues from searches, apps and games.&lt;br>
But to do this, &lt;strong>MS&lt;/strong> has started the collection of “telemetry” data, considered by many users as privacy-relevant.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-windows-10-telemetry">What is Windows 10 telemetry? &lt;a href="#what-is-windows-10-telemetry" class="hash">#&lt;/a>&lt;/h3>
&lt;p>According with a &lt;strong>ZDNet&lt;/strong> article: &lt;a href="https://www.zdnet.com/article/windows-10-telemetry-secrets/" target="_blank">
Windows 10 telemetry secrets: Where, when, and why Microsoft collects your data | ZDNet
&lt;/a>
:&lt;/p>
&lt;blockquote>
&lt;p>Microsoft defines telemetry as “system data that is uploaded by the Connected User Experience and Telemetry component,” also known as the Universal Telemetry Client, or UTC service. (More on that shortly.)&lt;br>
Microsoft uses telemetry data from Windows 10 to identify security and reliability issues, to analyze and fix software problems, to help improve the quality of Windows and related services, and to make design decisions for future releases.&lt;br>
Telemetry features aren’t unique to Microsoft and there’s nothing particularly secret about them. They’re part of a larger trend in the software industry to collect and analyze event data as part of a shift to data-driven decision making.&lt;/p>
&lt;/blockquote>
&lt;p>To the delight of privacy conscious users, there are a lot of tutorials: &lt;a href="https://websetnet.net/disable-telemetry-windows-10/" target="_blank">
Disable Telemetry in Windows 10 – WebSetNet
&lt;/a>
and suggestions focused on avoid (or rather, &lt;em>reduce&lt;/em>) the gathering of informations collected from &lt;strong>Windows 10&lt;/strong>, using tools like &lt;a href="http://forums.peerblock.com/" target="_blank">
PeerBlock
&lt;/a>
, personal firewalls, network devices (like a &lt;a href="https://pi-hole.net/" target="_blank">
Pi-hole
&lt;/a>
).&lt;/p>
&lt;p>In my opinion, a good trade-off may be a simple change on the “hosts” file.&lt;/p>
&lt;hr>
&lt;h3 id="what-is-hosts-file">What is “hosts” file? &lt;a href="#what-is-hosts-file" class="hash">#&lt;/a>&lt;/h3>
&lt;p>The hosts file is used to map hostnames to IP addresses, and its data overrides the results of &lt;strong>DNS&lt;/strong> queries.&lt;br>
It’s a plain text file, located in the Windows folder, at the following path:&lt;/p>
&lt;p>C:\Windows\System32\drivers\etc&lt;/p>
&lt;hr>
&lt;h3 id="a-customized-hosts-file">A customized hosts file &lt;a href="#a-customized-hosts-file" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Usually i use a custom hosts file created by &lt;a href="https://encrypt-the-planet.com/windows-10-anti-spy-host-file/" target="_blank">
ETP
&lt;/a>
: the file was realized analyzing with wireshark a dump of outgoing traffic of a brand-new &lt;strong>Windows 10&lt;/strong> installation.&lt;/p>
&lt;p>Obviously, this is not a final solution.&lt;br>
According with ETP’s notes:&lt;/p>
&lt;blockquote>
&lt;p>&lt;strong>You should also be aware:&lt;/strong> this hosts file will block certain functions and services like Bing search, Cortana and One Cloud. Windows updates will still be able to download.&lt;br>
&lt;strong>Windows 10 does communicate&lt;/strong> directly to IP addresses &lt;strong>which bypass the hosts file.&lt;/strong> You would also have to block Microsoft’s IP addresses Windows 10 communicates with.&lt;/p>
&lt;/blockquote>
&lt;hr>
&lt;h3 id="how-to-install-the-custom-file">How to install the custom file? &lt;a href="#how-to-install-the-custom-file" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Just four simple steps:&lt;/p>
&lt;ol>
&lt;li>Open &lt;a href="https://www.encrypt-the-planet.com/downloads/hosts" target="_blank">
this link
&lt;/a>
, and copy the whole text&lt;/li>
&lt;li>Start (with administrative rights) a Notepad (but &lt;strong>&lt;em>Notepad++&lt;/em>&lt;/strong> is better) and open the hosts file in &lt;em>&lt;strong>C:\Windows\System32\drivers\etc\hosts&lt;/strong>&lt;/em>.&lt;/li>
&lt;li>Replace the original hosts content with the text copied at step 1&lt;/li>
&lt;li>Save the file and restart your system.&lt;/li>
&lt;/ol></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/10/18/windows-telemetry/</guid><pubDate>Sun, 18 Oct 2020 00:00:00 +0000</pubDate></item><item><title>Simple Password Generator</title><link>/2020/09/04/password-generator/</link><description>&lt;p>#!/bin/bash&lt;/p>
&lt;p>#Simple Password Generator&lt;/p>
&lt;p>echo &amp;ldquo;This is a simple password generator&amp;rdquo;
echo &amp;ldquo;Please enter the length of the password: &amp;quot;
read PASS_LENGTH&lt;/p>
&lt;p>for p in $(seq 1 5);
do
openssl rand -base64 48 | cut -c1-$PASS_LENGTH&lt;/p>
&lt;p>done&lt;/p>
&lt;p>&lt;a href="https://github.com/AlexisAhmed/Shell-Scripts/blob/master/PasswordGenerator.sh" target="_blank">
&amp;amp;raquo;&amp;amp;raquo;
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/09/04/password-generator/</guid><pubDate>Fri, 04 Sep 2020 00:00:00 +0000</pubDate></item><item><title>How to Easily Host a Website on IPFS</title><link>/2020/07/03/host-ipfs/</link><description>&lt;h2 id="a-step-by-step-guide-to-easily-host-angular-reactjs-or-vuejs-apps-on-ipfs-using-cloudflare-and-pinata">A step by step guide to easily host Angular, ReactJS, or VueJS apps on IPFS using Cloudflare and Pinata &lt;a href="#a-step-by-step-guide-to-easily-host-angular-reactjs-or-vuejs-apps-on-ipfs-using-cloudflare-and-pinata" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;a href="https://www.cloudflare.com/" target="_blank">
Cloudflare
&lt;/a>
 and &lt;a href="http://pinata.cloud/" target="_blank">
Pinata
&lt;/a>
 are teaming up to bring you a blog post surrounding website hosting on the InterPlanetary File System (IPFS)!&lt;/p>
&lt;p>&lt;a href="https://www.cloudflare.com/" target="_blank">
Cloudflare
&lt;/a>
 has been operating an&lt;a href="https://blog.cloudflare.com/distributed-web-gateway/" target="_blank">
 IPFS gateway
&lt;/a>
 since last year and has seen amazing usage and feedback from the decentralized web community. In addition to the IPFS gateway, Cloudflare also has hassle-free SSL certificates for you while hosting websites on IPFS using the gateway.&lt;/p>
&lt;p>&lt;a href="https://pinata.cloud/" target="_blank">
Pinata
&lt;/a>
 is the easiest way to use IPFS by providing fast and reliable infrastructure and tools to store content on the IPFS ecosystem.&lt;/p>
&lt;p>This post will dive into how you can host a website on IPFS and how to keep it online using a combination of Cloudflare and Pinata.&lt;/p>
&lt;p>But, before jumping straight to the tutorial, it&amp;rsquo;s important to understand what&amp;rsquo;s happening behind the scenes when people talk about hosting a website on IPFS.&lt;/p>
&lt;h1 id="how-does-hosting-a-website-on-ipfs-work">How Does Hosting a Website on IPFS Work? &lt;a href="#how-does-hosting-a-website-on-ipfs-work" class="hash">#&lt;/a>&lt;/h1>
&lt;p>Hosting a website on IPFS requires two things:&lt;/p>
&lt;ul>
&lt;li>A source node that has the website &lt;a href="https://docs.ipfs.io/guides/concepts/pinning/" target="_blank">
pinned
&lt;/a>
 on IPFS.&lt;/li>
&lt;li>A retrieval node for you to retrieve the website from IPFS. For most people, this often takes the form of an &lt;a href="https://github.com/ipfs/go-ipfs/blob/master/docs/gateway.md" target="_blank">
IPFS gateway
&lt;/a>
.&lt;/li>
&lt;/ul>
&lt;h2 id="source-nodes">Source Nodes &lt;a href="#source-nodes" class="hash">#&lt;/a>&lt;/h2>
&lt;p>A source node is where content is initially added to and made available to the rest of the IPFS network. As other nodes begin requesting the desired content, the source node is where they will initially retrieve it from.&lt;/p>
&lt;h2 id="gateway-nodes">Gateway Nodes &lt;a href="#gateway-nodes" class="hash">#&lt;/a>&lt;/h2>
&lt;p>In order to retrieve desired content from the IPFS network, you need to have access to an IPFS node. This node will provide the IPFS network with the cryptographic hash of the content it wants and the IPFS network will find a node with a copy of the content to provide back to the retrieval node.&lt;/p>
&lt;p>While this retrieval node could be one running locally on your computer, for many of you, a retrieval node will take the form of an IPFS gateway. Gateways are essentially IPFS nodes that allow you to retrieve content from IPFS without hosting an IPFS node yourself. IPFS gateways do this by allowing anyone to retrieve content from IPFS by using a link typically formatted like this:&lt;/p>
&lt;p>&lt;a href="https://gateway.pinata.cloud/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ/" target="_blank">
https://gateway.pinata.cloud/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ/
&lt;/a>
&lt;/p>
&lt;p>The &amp;ldquo;QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ&amp;rdquo; part of the link above is the Content-Identifier (CID) that&amp;rsquo;s being asked for. It&amp;rsquo;s important to realize that you could retrieve that same content by visiting any public gateway, not just one run by &lt;a href="https://pinata.cloud/" target="_blank">
Pinata
&lt;/a>
. For example, try retrieving that CID at the following public gateways:&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://cloudflare-ipfs.com/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ" target="_blank">
https://cloudflare-ipfs.com/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://ipfs.io/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ" target="_blank">
https://ipfs.io/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;p>Notice how you retrieve the same content from each gateway? That&amp;rsquo;s because the CID provided to each gateway was the same. When you visited each gateway, it searched the IPFS network until it found the content for the CID &amp;ldquo;QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ&amp;rdquo;. Once that content was found, the gateway provided it back to you in your web browser.&lt;/p>
&lt;p>Make sense? Awesome! Now that you&amp;rsquo;ve learned a little bit about what&amp;rsquo;s going on behind the scenes, let&amp;rsquo;s get to the tutorial!&lt;/p>
&lt;h1 id="how-to-prepare-your-website-for-ipfs">How to Prepare Your Website for IPFS &lt;a href="#how-to-prepare-your-website-for-ipfs" class="hash">#&lt;/a>&lt;/h1>
&lt;p>Hosting a website on IPFS is slightly different than hosting it on a web server out in the cloud. Your website may require a little bit of tweaking in order to properly be served on the IPFS network.&lt;/p>
&lt;p>The important rules are:&lt;/p>
&lt;ul>
&lt;li>All of the content for your website must be contained in one build folder, with an index.html file.&lt;/li>
&lt;li>All links within your files should be relative links.&lt;/li>
&lt;/ul>
&lt;p>If you&amp;rsquo;re working with a javascript framework, things can be a little trickier. Here&amp;rsquo;s how you get three popular frameworks, &lt;a href="https://angular.io/" target="_blank">
Angular
&lt;/a>
, &lt;a href="https://reactjs.org/" target="_blank">
ReactJS
&lt;/a>
, and &lt;a href="https://vuejs.org/" target="_blank">
VueJS
&lt;/a>
, working with IPFS.&lt;/p>
&lt;h2 id="angular">Angular: &lt;a href="#angular" class="hash">#&lt;/a>&lt;/h2>
&lt;p>For the purposes of this tutorial, it&amp;rsquo;s assumed that you have a working &lt;a href="https://angular.io/" target="_blank">
Angular
&lt;/a>
 app. If you do not, check out the &lt;a href="https://angular.io/guide/quickstart" target="_blank">
Angular Quick Start Guide
&lt;/a>
 for more info.&lt;/p>
&lt;p>To prepare your Angular app, open up your application&amp;rsquo;s index.html in the src folder of your app. In the index.html, change the &lt;!-- raw HTML omitted --> tag to:&lt;/p>
&lt;!-- raw HTML omitted -->
&lt;!-- raw HTML omitted -->
&lt;p>Once you&amp;rsquo;ve made this change, build your app by running the following in the root of your project directory:&lt;/p>
&lt;p>ng build &amp;ndash;prod &amp;ndash;aot&lt;/p>
&lt;p>You should now have an updated IPFS compatible build in the &amp;ldquo;dist&amp;rdquo; folder of your Angular app.&lt;/p>
&lt;p>Here&amp;rsquo;s an example of an IPFS compatible Angular app:&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://github.com/PinataCloud/Angular-IPFS-Example" target="_blank">
Github Example
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://gateway.pinata.cloud/ipfs/Qmf6UXZ3EJET8VYM8dqeRe2J3c7AXebyfCQ41VDLt77aiy/" target="_blank">
IPFS Gateway Link
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;h2 id="reactjs">ReactJS: &lt;a href="#reactjs" class="hash">#&lt;/a>&lt;/h2>
&lt;p>For the purposes of this tutorial, it&amp;rsquo;s assumed that you already have a working &lt;a href="https://reactjs.org/" target="_blank">
React
&lt;/a>
 app. If you don&amp;rsquo;t, you can easily create one with &lt;a href="https://github.com/facebook/create-react-app" target="_blank">
Create-React-App
&lt;/a>
.&lt;/p>
&lt;p>In the root directory of your React application, open up the package.json file and add the following entry to the top of the file:&lt;/p>
&lt;p>&amp;ldquo;homepage&amp;rdquo;: &amp;ldquo;./&amp;rdquo;,&lt;/p>
&lt;p>Once you&amp;rsquo;ve made this change, build your app by running the following in the root of your project directory:&lt;/p>
&lt;p>npm run build&lt;/p>
&lt;p>You should now have an updated IPFS compatible build in the &amp;ldquo;build&amp;rdquo; folder of your React app.&lt;/p>
&lt;p>Here&amp;rsquo;s an example of an IPFS compatible React App&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://github.com/PinataCloud/React-IPFS-Example" target="_blank">
Github Example
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://gateway.pinata.cloud/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ/" target="_blank">
IPFS Gateway Link
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;h2 id="vuejs">VueJS: &lt;a href="#vuejs" class="hash">#&lt;/a>&lt;/h2>
&lt;p>For the purposes of this tutorial, it&amp;rsquo;s assumed that you already have a working &lt;a href="https://vuejs.org/" target="_blank">
Vue
&lt;/a>
 app. If you don&amp;rsquo;t, you can easily create one with &lt;a href="https://cli.vuejs.org/" target="_blank">
Vue CLI
&lt;/a>
.&lt;/p>
&lt;p>In the root directory of your Vue application, create a file called &amp;ldquo;vue.config.js&amp;rdquo;. In this file put the following:&lt;/p>
&lt;p>module.exports = {&lt;br>
publicPath: &amp;lsquo;./&amp;rsquo;&lt;br>
};&lt;/p>
&lt;p>Once you&amp;rsquo;ve made this change, build your app by running the following in the root of your project directory:&lt;/p>
&lt;p>npm run build&lt;/p>
&lt;p>You should now have an updated IPFS compatible build in the &amp;ldquo;dist&amp;rdquo; folder of your Vue app.&lt;/p>
&lt;p>Here&amp;rsquo;s an example of an IPFS compatible Vue App&lt;/p>
&lt;ul>
&lt;li>&lt;a href="https://github.com/PinataCloud/Vue-IPFS-Example" target="_blank">
Github Example
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://gateway.pinata.cloud/ipfs/QmXHmZuhmLX6wjtnTuByH1w12k4UWPNEgyW2WUyxbYudAE/" target="_blank">
IPFS Gateway Link
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;h1 id="adding-the-website-to-ipfs">Adding the Website to IPFS &lt;a href="#adding-the-website-to-ipfs" class="hash">#&lt;/a>&lt;/h1>
&lt;p>Now that you have our website prepared, you can move to the fun part. Hosting the website on IPFS.&lt;/p>
&lt;p>When hosting on IPFS, it&amp;rsquo;s important to keep in mind that IPFS isn&amp;rsquo;t a magical cloud that will store your data forever. In order for content to be reachable by other nodes on IPFS, a node with that content needs to be connected to other nodes on the network.&lt;/p>
&lt;p>This means that when hosting your website on IPFS, you need to make sure whatever node you&amp;rsquo;re hosting your content on should be online at all times. For this, you have two options:&lt;/p>
&lt;h2 id="the-easy-way">The Easy Way &lt;a href="#the-easy-way" class="hash">#&lt;/a>&lt;/h2>
&lt;p>For those of you who aren&amp;rsquo;t looking to maintain your own dedicated server to run an IPFS node, &lt;a href="https://pinata.cloud/" target="_blank">
Pinata
&lt;/a>
 provides an easy alternative. If you haven&amp;rsquo;t signed up for an account, you can do so for free at: &lt;a href="https://pinata.cloud/signup" target="_blank">
https://pinata.cloud/signup
&lt;/a>
.&lt;/p>
&lt;p>Once you have an account, visit the &lt;a href="https://pinata.cloud/pinataupload" target="_blank">
Pinata Upload page
&lt;/a>
 and go to &amp;ldquo;Upload Directory&amp;rdquo;. From here, simply browse your local machine for the directory containing your website&amp;rsquo;s build and click &amp;ldquo;Upload&amp;rdquo;.&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/60/1*wfiP3jIT3obpeXYNKq7lsg.png?q=20" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/525/1*wfiP3jIT3obpeXYNKq7lsg.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>Once the upload is finished, visit the &lt;a href="https://pinata.cloud/pinexplorer" target="_blank">
Pin Explorer
&lt;/a>
. You should see the record for your website at the top of the list.&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/60/1*HsP9DiU0eWXRMY-qq8uwOg.png?q=20" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/1674/1*HsP9DiU0eWXRMY-qq8uwOg.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>Go ahead and take note of the &amp;ldquo;IPFS Hash&amp;rdquo; and move on to the next step!&lt;/p>
&lt;h2 id="the-hard-way">The Hard Way &lt;a href="#the-hard-way" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Self-hosting a node on a cloud provider is a good option if you are looking to do everything yourself. If you are looking to go down this path, you can read our guide for the full setup process: &lt;a href="https://medium.com/pinata/how-to-deploy-an-ipfs-node-on-digital-ocean-c59b9e83098e" target="_blank">
How to Deploy an IPFS Node on Digital Ocean
&lt;/a>
.&lt;/p>
&lt;p>Once you have the node up and running, you&amp;rsquo;ll need to transfer your website&amp;rsquo;s build directory to the remote machine hosting your node. You can do this using &lt;a href="https://kb.iu.edu/d/agye" target="_blank">
SCP
&lt;/a>
 by running the following command on your local machine in the directory that contains your websites build folder:&lt;/p>
&lt;p>scp -r yourBuildFolder username@remoteAddress:pathOnRemoteMachine&lt;/p>
&lt;p>From here, you can add the folder to IPFS by running the following command on the remote machine hosting your IPFS node:&lt;/p>
&lt;p>ipfs add -r /path/to/directory-with-your-website&lt;/p>
&lt;p>Look for the last hash that is output. This will be your website&amp;rsquo;s hash on IPFS.&lt;/p>
&lt;p>If this worked, congratulations, you can now move on to the next step!&lt;/p>
&lt;h1 id="double-check-that-your-website-works-on-ipfs">Double-Check That Your Website Works on IPFS &lt;a href="#double-check-that-your-website-works-on-ipfs" class="hash">#&lt;/a>&lt;/h1>
&lt;p>Before you do anything else, double-check that your website works correctly on IPFS. To do so, visit: &lt;a href="https://gateway.pinata.cloud/ipfs/yourWebsiteHash" target="_blank">
https://gateway.pinata.cloud/ipfs/yourWebsiteHash
&lt;/a>
to confirm the website loads correctly.&lt;/p>
&lt;p>If you receive what looks like a file explorer by visiting your hash on a gateway, it&amp;rsquo;s likely that your application has some custom code that will need to be tweaked in order to work with IPFS.&lt;/p>
&lt;h1 id="improve-your-website-with-a-domain-and-cloudflare">Improve Your Website with a Domain and Cloudflare &lt;a href="#improve-your-website-with-a-domain-and-cloudflare" class="hash">#&lt;/a>&lt;/h1>
&lt;p>At this point in the guide, you should be able to reach your website by visiting a gateway like so:&lt;/p>
&lt;p>&lt;a href="https://gateway.pinata.cloud/ipfs/yourWebsiteHash" target="_blank">
https://gateway.pinata.cloud/ipfs/yourWebsiteHash
&lt;/a>
&lt;/p>
&lt;p>But, IPFS hashes aren&amp;rsquo;t very human readable and chances are you don&amp;rsquo;t want to type out something like, &lt;a href="https://gateway.pinata.cloud/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ/" target="_blank">
https://gateway.pinata.cloud/ipfs/QmWcLKHWqrRB95zQnb4vX8RRgoGsVm5YAUHyZyiAw4mCMQ/
&lt;/a>
, every time you visit your website. So, what can you do to make this better?&lt;/p>
&lt;p>You can put your website behind a domain name! Go ahead and buy one real quick. Got one? Great! Now that you have your very own domain name, let&amp;rsquo;s learn what&amp;rsquo;s needed to put your IPFS website behind it.&lt;/p>
&lt;h2 id="cloudflare-as-a-gateway-provider">Cloudflare as a Gateway Provider &lt;a href="#cloudflare-as-a-gateway-provider" class="hash">#&lt;/a>&lt;/h2>
&lt;p>To put a website hosted on IPFS behind a domain name, you need an IPFS gateway. For this guide we&amp;rsquo;re going to use &lt;a href="https://www.cloudflare.com/" target="_blank">
Cloudflare
&lt;/a>
 as a service provider to put our website behind a domain name.&lt;/p>
&lt;p>&lt;a href="https://www.cloudflare.com/" target="_blank">
Cloudflare
&lt;/a>
 currently provides a dedicated IPFS gateway service as part of its platform. What makes Cloudflare&amp;rsquo;s gateway different, is its ability to leverage Cloudflare&amp;rsquo;s &lt;a href="https://www.cloudflare.com/network/" target="_blank">
global network of 150&amp;#43; data centers
&lt;/a>
 as a caching layer. This means that content cached on Cloudflare&amp;rsquo;s gateway will resolve quickly no matter where you are in the world.&lt;/p>
&lt;p>Another benefit that Cloudflare&amp;rsquo;s provides is the ability to put your website behind HTTPS in a super easy way. If you are new to website hosting, this means that your user&amp;rsquo;s traffic will be encrypted between their computer and Cloudflare&amp;rsquo;s gateway. As a result, browsers will treat your website as more secure and you&amp;rsquo;ll even get a bump in search engine&amp;rsquo;s like google as your website is deemed safer for users to visit.&lt;/p>
&lt;h2 id="setting-up-your-dns-records-to-point-to-cloudflare">Setting Up Your DNS Records to Point to Cloudflare &lt;a href="#setting-up-your-dns-records-to-point-to-cloudflare" class="hash">#&lt;/a>&lt;/h2>
&lt;p>To hook your domain name up to Cloudflare and point it to your IPFS website, the following steps need to be taken:&lt;/p>
&lt;ol>
&lt;li>Go to where you purchased your domain name. There should be an area to manage &amp;ldquo;DNS records&amp;rdquo; for your domain name.&lt;/li>
&lt;li>Edit the records so that you have two entries:&lt;/li>
&lt;/ol>
&lt;ul>
&lt;li>A CNAME record for your &lt;code>your.domain&lt;/code> with a value of &lt;code>[www.cloudflare-ipfs.com](http://www.cloudflare-ipfs.com/)&lt;/code>&lt;/li>
&lt;li>A TXT record for &lt;code>_dnslink.your.domain&lt;/code> with a value of &lt;code>dnslink=/ipfs/yourWebsiteHash&lt;/code>&lt;/li>
&lt;/ul>
&lt;p>&lt;img src="https://miro.medium.com/max/60/1*88AaVDwvK_LSxACjOetITQ.png?q=20" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/633/1*88AaVDwvK_LSxACjOetITQ.png" alt="" loading="lazy" />
&lt;/p>
&lt;h2 id="securing-your-website-with-cloudflare">Securing Your Website with Cloudflare &lt;a href="#securing-your-website-with-cloudflare" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Now that your DNS records are pointing to Cloudflare&amp;rsquo;s gateway, you should be able to view your website by going to &lt;code>your.domain&lt;/code> . But there&amp;rsquo;s one more step you should take before finishing up and that&amp;rsquo;s applying a free SSL certificate to your website.&lt;/p>
&lt;p>Cloudflare makes this super easy. All you have to do is go to &lt;a href="https://www.cloudflare.com/distributed-web-gateway/" target="_blank">
https://www.cloudflare.com/distributed-web-gateway/
&lt;/a>
 and scroll to the bottom of the page to where you should see this:&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/60/1*DgAEZHkcTasOrg4-4hj_rw.png?q=20" alt="" loading="lazy" />
&lt;/p>
&lt;p>&lt;img src="https://miro.medium.com/max/1108/1*DgAEZHkcTasOrg4-4hj_rw.png" alt="" loading="lazy" />
&lt;/p>
&lt;p>Once you&amp;rsquo;re there, simply enter in the domain name for your website and hit &amp;ldquo;Submit&amp;rdquo;. If you see a message saying &amp;ldquo;Certificate is live&amp;rdquo;, congratulations, you&amp;rsquo;re finished!&lt;/p>
&lt;p>As an example of a finished website, check out &lt;a href="https://deploypinata.com/" target="_blank">
https://deploypinata.com/
&lt;/a>
&lt;/p>
&lt;h1 id="troubleshooting">Troubleshooting &lt;a href="#troubleshooting" class="hash">#&lt;/a>&lt;/h1>
&lt;p>Here&amp;rsquo;s a few common issues you may run into and how to solve them&lt;/p>
&lt;h2 id="gateway-fails-to-find-your-website-on-ipfs">Gateway Fails to Find Your Website on IPFS &lt;a href="#gateway-fails-to-find-your-website-on-ipfs" class="hash">#&lt;/a>&lt;/h2>
&lt;p>The IPFS network is getting bigger and bigger every day. Sometimes, it can take awhile to find content. If a particular gateway is unable to retrieve your website, there&amp;rsquo;s a good chance it&amp;rsquo;s being overloaded from too many people requesting content at once. Try waiting awhile before attempting to retrieve your content on that gateway again.&lt;/p>
&lt;h2 id="you-received-error-failed-to-build-request-to-hostname-when-submitting-your-domain-to-cloudflare-for-the-ssl-cert">You Received &amp;ldquo;Error: Failed to build request to hostname.&amp;rdquo; When Submitting Your Domain to Cloudflare for the SSL Cert. &lt;a href="#you-received-error-failed-to-build-request-to-hostname-when-submitting-your-domain-to-cloudflare-for-the-ssl-cert" class="hash">#&lt;/a>&lt;/h2>
&lt;p>If you receive this message after you submit your domain name to Cloudflare, double check and make sure that you&amp;rsquo;re only submitting &lt;code>your.domain&lt;/code> into the text field. Inputs such as &lt;code>http://your.domain&lt;/code> or &lt;code>your.domain/&lt;/code> won&amp;rsquo;t work. For example our example website, &lt;a href="https://deploypinata.com/" target="_blank">
https://deploypinata.com/
&lt;/a>
, needed to be entered in as &lt;code>deploypinata.com&lt;/code> .&lt;/p>
&lt;h2 id="you-received-certificate-is-live-but-the-https-version-of-your-website-isnt-working">You Received &amp;ldquo;Certificate is live&amp;rdquo; but the HTTPS Version of Your Website Isn&amp;rsquo;t Working &lt;a href="#you-received-certificate-is-live-but-the-https-version-of-your-website-isnt-working" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Sometimes these things can take a little bit of time to propagate. Give it about an hour before contacting Cloudflare.&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/07/03/host-ipfs/</guid><pubDate>Fri, 03 Jul 2020 00:00:00 +0000</pubDate></item><item><title>Google Dorks Scanner Tool</title><link>/2020/05/08/google-dorks/</link><description>&lt;p>&lt;strong>Let&amp;rsquo;s use a easy-handy tool for pentesting a website and getting the required information in one key-press.&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>Supports Linux Distributions only.&lt;br>
Because its written in Shell Code, it runs even in Termux!!!&lt;/p>
&lt;/blockquote>
&lt;p>&lt;strong>Step #1 Clone &amp;lsquo;&lt;a href="https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan" target="_blank">
Fast-Google-Dorks-Scan
&lt;/a>
&amp;rsquo; Repository and Change Directory (cd) to Fast-Google-Dorks-Scan&lt;/strong>&lt;/p>
&lt;p>$ git clone &lt;a href="https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan.git" target="_blank">
https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan.git
&lt;/a>
$ cd Fast-Google-Dorks-Scan
$ ls&lt;/p>
&lt;p>&lt;strong>Step #2 Set executable permissions ( +x or 777 ) to the FGDS.sh file&lt;/strong> to make the google dorks finder runnable by system.&lt;/p>
&lt;p>$ chmod +x FGDS.sh&lt;/p>
&lt;p>&lt;strong>Step #3 Run the executable with website name with domain or also subdomain&lt;/strong> of which website you want to find google dorks of.&lt;/p>
&lt;p>$ ./FGDS.sh ethicalhackx.com&lt;/p>
&lt;p>&lt;strong>Optional Step:&lt;/strong> If you want to save the google dorks report into a text file then run with the following command.&lt;/p>
&lt;p>$ ./FGDS.sh ethicalhackx.com &amp;gt; ethicalhackx_report.txt&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/05/08/google-dorks/</guid><pubDate>Fri, 08 May 2020 00:00:00 +0000</pubDate></item><item><title>Start a web server in terminal</title><link>/2020/03/08/web-server-terminal/</link><description>&lt;p>I&amp;rsquo;ve searched for this three times this week, so I figured I&amp;rsquo;d better make sure I have a copy of it.&lt;/p>
&lt;p>&lt;strong>Python 2:&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>python -m SimpleHTTPServer 8000&lt;/p>
&lt;/blockquote>
&lt;p>Navigate to the project directory in the terminal and do that command. Then http://localhost:8000 will server up that directory (as in, it&amp;rsquo;s &lt;code>index.html&lt;/code> file).&lt;/p>
&lt;p>&lt;strong>Python 3:&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>python3 -m http.server 8080&lt;/p>
&lt;/blockquote>
&lt;p>&lt;strong>PHP:&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>php -S localhost:2222&lt;/p>
&lt;/blockquote>
&lt;p>&lt;strong>npm:&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>npm i -g serve serve&lt;/p>
&lt;/blockquote></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/03/08/web-server-terminal/</guid><pubDate>Sun, 08 Mar 2020 00:00:00 +0000</pubDate></item><item><title>About Secure Hashing Algorithm</title><link>/2020/02/09/secure-hashing/</link><description>
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
&lt;iframe src="https://www.youtube.com/embed/DMtFhACPnTY" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video">&lt;/iframe>
&lt;/div></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/02/09/secure-hashing/</guid><pubDate>Sun, 09 Feb 2020 00:00:00 +0000</pubDate></item><item><title>How change LUKS encryption</title><link>/2020/02/08/luks-encryption/</link><description>&lt;p>&lt;strong>Changing the Passphrase:&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksChangeKey /dev/sdX&lt;/p>
&lt;/blockquote>
&lt;p>&lt;strong>LUKs Drives With Multiple Passphrases:&lt;/strong>&lt;/p>
&lt;p>LUKS Drives can actually have multiple passphrases or key files associated with them, up to eight. To start, take a look at your drive and see how many keys it has. Chances are, you&amp;rsquo;ll only see key slot 0 occupied. That&amp;rsquo;s the first one.&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksDump /dev/sdX | grep -i key&lt;/p>
&lt;/blockquote>
&lt;p>If you have free slots open, you can always add another passphrase to your drive. Run the following command, and a new key will be appended in the first free slot.&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksAddKey /dev/sdX&lt;/p>
&lt;/blockquote>
&lt;p>When you&amp;rsquo;re managing multiple keys on the same drive, you&amp;rsquo;re going to need the ability to target specific ones. Once again, you can do that pretty simply with the -S flag. Just add the slot number after to pick a key to alter.&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksChangeKey /dev/sdX -S 2&lt;/p>
&lt;/blockquote>
&lt;p>&lt;strong>Removing a Passphrase&lt;/strong>&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksRemoveKey /dev/sdX&lt;/p>
&lt;/blockquote>
&lt;p>In case you&amp;rsquo;d prefer to specify it yourself, you can use the KillSlot command to remove the key in a certain slot. Just include the slot number after the drive, and that&amp;rsquo;s the one that&amp;rsquo;ll be removed.&lt;/p>
&lt;blockquote>
&lt;p>sudo cryptsetup luksKillSlot /dev/sdX 2&lt;/p>
&lt;/blockquote></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/02/08/luks-encryption/</guid><pubDate>Sat, 08 Feb 2020 00:00:00 +0000</pubDate></item><item><title>Vimium shortcuts</title><link>/2020/02/06/vimium/</link><description>&lt;p>Vimium is a Chrome extension that provides keyboard-based navigation and control of the web in the spirit of the Vim editor.&lt;/p>
&lt;h2 id="keyboard-bindings">Keyboard Bindings &lt;a href="#keyboard-bindings" class="hash">#&lt;/a>&lt;/h2>
&lt;p>Modifier keys are specified as &lt;!-- raw HTML omitted -->c-x&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->m-x&lt;!-- raw HTML omitted -->, and &lt;!-- raw HTML omitted -->a-x&lt;!-- raw HTML omitted --> for ctrl+x, meta+x, and alt+x respectively. See the next section for how to customize these bindings.&lt;/p>
&lt;p>Once you have Vimium installed, you can see this list of key bindings at any time by typing &lt;!-- raw HTML omitted -->?&lt;!-- raw HTML omitted -->.&lt;/p>
&lt;p>&lt;strong>Navigating the current page&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>
? show the help dialog for a list of all available keys
h scroll left
j scroll down
k scroll up
l scroll right
gg scroll to top of the page
G scroll to bottom of the page
d scroll down half a page
u scroll up half a page
f open a link in the current tab
F open a link in a new tab
r reload
gs view source
i enter insert mode -- all commands will be ignored until you hit Esc to exit
yy copy the current url to the clipboard
yf copy a link url to the clipboard
gf cycle forward to the next frame
gF focus the main/top frame
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Navigating to new pages&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>o Open URL, bookmark, or history entry
O Open URL, bookmark, history entry in a new tab
b Open bookmark
B Open bookmark in a new tab
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Using find&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>/ enter find mode
-- type your search query and hit enter to search, or Esc to cancel
n cycle forward to the next find match
N cycle backward to the previous find match
&lt;/code>&lt;/pre>
&lt;p>For advanced usage, see regular expressions on the wiki.&lt;/p>
&lt;p>&lt;strong>Navigating your history&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>H go back in history
L go forward in history
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Manipulating tabs&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>J, gT go one tab left
K, gt go one tab right
g0 go to the first tab
g$ go to the last tab
^ visit the previously-visited tab
t create tab
yt duplicate current tab
x close current tab
X restore closed tab (i.e. unwind the 'x' command)
T search through your open tabs
&amp;lt;a-p&amp;gt; pin/unpin current tab
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Using marks&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>ma, mA set local mark &amp;quot;a&amp;quot; (global mark &amp;quot;A&amp;quot;)
`a, `A jump to local mark &amp;quot;a&amp;quot; (global mark &amp;quot;A&amp;quot;)
`` jump back to the position before the previous jump
-- that is, before the previous gg, G, n, N, / or `a
&lt;/code>&lt;/pre>
&lt;p>&lt;strong>Additional advanced browsing commands&lt;/strong>:&lt;/p>
&lt;pre>&lt;code>]], [[ Follow the link labeled 'next' or '&amp;gt;' ('previous' or '&amp;lt;')
- helpful for browsing paginated sites
&amp;lt;a-f&amp;gt; open multiple links in a new tab
gi focus the first (or n-th) text input box on the page
gu go up one level in the URL hierarchy
gU go up to root of the URL hierarchy
zH scroll all the way left
zL scroll all the way right
v enter visual mode; use p/P to paste-and-go, use y to yank
V enter visual line mode
&lt;/code>&lt;/pre>
&lt;p>Vimium supports command repetition so, for example, hitting &lt;!-- raw HTML omitted -->5t&lt;!-- raw HTML omitted --> will open 5 tabs in rapid succession. &lt;!-- raw HTML omitted -->Esc&lt;!-- raw HTML omitted --> or &lt;!-- raw HTML omitted -->&amp;lt;c-[&amp;gt;&lt;!-- raw HTML omitted -->) will clear any partial commands in the queue and will also exit insert and find modes.&lt;/p>
&lt;p>There are some advanced commands which aren’t documented here; refer to the help dialog &lt;!-- raw HTML omitted -->(type ?)&lt;!-- raw HTML omitted --> for a full list.&lt;/p>
&lt;p>&lt;strong>Custom Key Mappings&lt;/strong>&lt;/p>
&lt;p>You may remap or unmap any of the default key bindings in the “Custom key mappings” on the options page.&lt;/p>
&lt;p>Enter one of the following key mapping commands per line:&lt;/p>
&lt;ul>
&lt;li>&lt;!-- raw HTML omitted -->map key&lt;!-- raw HTML omitted --> command: Maps a key to a Vimium command. Overrides Chrome’s default behavior (if any).&lt;/li>
&lt;li>&lt;!-- raw HTML omitted -->unmap key&lt;!-- raw HTML omitted -->: Unmaps a key and restores Chrome’s default behavior (if any).&lt;/li>
&lt;li>&lt;!-- raw HTML omitted -->unmapAll&lt;!-- raw HTML omitted -->: Unmaps all bindings. This is useful if you want to completely wipe Vimium’s defaults and start from scratch with your own setup.&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>Examples&lt;/strong>:&lt;/p>
&lt;ul>
&lt;li>&lt;!-- raw HTML omitted -->map &lt;!-- raw HTML omitted --> scrollPageDown&lt;!-- raw HTML omitted --> maps ctrl+d to scrolling the page down. Chrome’s default behavior of bringing up a bookmark dialog is suppressed.&lt;/li>
&lt;li>&lt;!-- raw HTML omitted -->map r&lt;!-- raw HTML omitted --> reload maps the r key to reloading the page.&lt;/li>
&lt;li>&lt;!-- raw HTML omitted -->unmap &lt;!-- raw HTML omitted -->&lt;!-- raw HTML omitted --> removes any mapping for ctrl+d and restores Chrome’s default behavior.&lt;/li>
&lt;li>&lt;!-- raw HTML omitted -->unmap r&lt;!-- raw HTML omitted --> removes any mapping for the r key.&lt;/li>
&lt;/ul>
&lt;p>Available Vimium commands can be found via the “Show available commands” link near the key mapping box on the options page. The command name appears to the right of the description in parenthesis.&lt;/p>
&lt;p>You can add comments to key mappings by starting a line with &lt;!-- raw HTML omitted -->&amp;quot;&lt;!-- raw HTML omitted --> or &lt;!-- raw HTML omitted -->#&lt;!-- raw HTML omitted -->.&lt;/p>
&lt;p>The following special keys are available for mapping:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;!-- raw HTML omitted -->&amp;lt;c-&lt;em>&amp;gt;&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->&amp;lt;a-&lt;/em>&amp;gt;&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->&amp;lt;m-*&amp;gt;&lt;!-- raw HTML omitted --> for ctrl, alt, and meta (command on Mac) respectively with any key. Replace &lt;!-- raw HTML omitted --> * &lt;!-- raw HTML omitted --> with the key of choice.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;!-- raw HTML omitted -->left&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->right&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->up&lt;!-- raw HTML omitted -->, &lt;!-- raw HTML omitted -->down&lt;!-- raw HTML omitted --> for the arrow keys&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;!-- raw HTML omitted -->space&lt;!-- raw HTML omitted --> for the space key&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;!-- raw HTML omitted -->f1&lt;!-- raw HTML omitted --> through &lt;!-- raw HTML omitted -->f12&lt;!-- raw HTML omitted --> for the function keys
Shifts are automatically detected so, for example, &lt;!-- raw HTML omitted -->c-&amp;amp;&lt;!-- raw HTML omitted --> corresponds to &lt;!-- raw HTML omitted -->ctrl+shift+7&lt;!-- raw HTML omitted --> on an English keyboard.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>&lt;a href="https://github.com/philc/vimium" target="_blank">
Vimium
&lt;/a>
- &lt;a href="http://yourbay.me/all-about-tech/2016/05/26/vimium-shortcuts/" target="_blank">
yourbay
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/02/06/vimium/</guid><pubDate>Thu, 06 Feb 2020 00:00:00 +0000</pubDate></item><item><title>Encryption and HUGE numbers</title><link>/2020/02/03/encryption-and-huge-numbers/</link><description>
&lt;div style="position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;">
&lt;iframe src="https://www.youtube.com/embed/M7kEpw1tn50" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border:0;" allowfullscreen title="YouTube Video">&lt;/iframe>
&lt;/div></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/02/03/encryption-and-huge-numbers/</guid><pubDate>Mon, 03 Feb 2020 00:00:00 +0000</pubDate></item><item><title>Hacking tools list</title><link>/2020/01/31/hacking-tools/</link><description>&lt;h2 id="penetration-testing--hacking-tools-list">&lt;strong>Penetration Testing &amp;amp; Hacking Tools List&lt;/strong> &lt;a href="#penetration-testing--hacking-tools-list" class="hash">#&lt;/a>&lt;/h2>
&lt;h3 id="online-resources--hacking-toolshttpsgithubcomenaqxawesome-pentestonline-resources">&lt;a href="https://github.com/enaqx/awesome-pentest#online-resources" target="_blank">
&amp;lt;strong&amp;gt;Online Resources – Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#online-resources--hacking-toolshttpsgithubcomenaqxawesome-pentestonline-resources" class="hash">#&lt;/a>&lt;/h3>
&lt;h4 id="penetration-testing-resourceshttpsgithubcomenaqxawesome-pentestpenetration-testing-resources">&lt;a href="https://github.com/enaqx/awesome-pentest#penetration-testing-resources" target="_blank">
&amp;lt;strong&amp;gt;Penetration Testing Resources&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#penetration-testing-resourceshttpsgithubcomenaqxawesome-pentestpenetration-testing-resources" class="hash">#&lt;/a>&lt;/h4>
&lt;ul>
&lt;li>&lt;a href="http://www.pentest-standard.org/" target="_blank">
Penetration Testing Execution Standard (PTES)
&lt;/a>
– Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.&lt;/li>
&lt;li>&lt;a href="https://www.owasp.org/index.php/Main_Page" target="_blank">
Open Web Application Security Project (OWASP)
&lt;/a>
– Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.&lt;/li>
&lt;li>&lt;a href="https://github.com/nixawk/pentest-wiki" target="_blank">
PENTEST-WIKI
&lt;/a>
– Free online security knowledge library for pentesters and researchers.&lt;/li>
&lt;li>&lt;a href="http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html" target="_blank">
Penetration Testing Framework (PTF)
&lt;/a>
– Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.&lt;/li>
&lt;li>&lt;a href="http://www.xss-payloads.com/" target="_blank">
XSS-Payloads
&lt;/a>
– Ultimate resource for all things cross-site including payloads, tools, games and documentation.&lt;/li>
&lt;li>&lt;a href="http://www.isecom.org/mirror/OSSTMM.3.pdf" target="_blank">
Open Source Security Testing Methodology Manual (OSSTMM)
&lt;/a>
– Framework for providing test cases that result in verified facts on which to base decisions that impact an organization’s security.&lt;/li>
&lt;li>&lt;a href="https://attack.mitre.org/" target="_blank">
MITRE’s Adversarial Tactics, Techniques &amp;amp;amp; Common Knowledge (ATT&amp;amp;amp;CK)
&lt;/a>
– Curated knowledge base and model for cyber adversary behavior.&lt;/li>
&lt;/ul>
&lt;h3 id="exploit-developmenthttpsgithubcomenaqxawesome-pentestexploit-development">&lt;a href="https://github.com/enaqx/awesome-pentest#exploit-development" target="_blank">
&amp;lt;strong&amp;gt;Exploit Development&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#exploit-developmenthttpsgithubcomenaqxawesome-pentestexploit-development" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://www.vividmachines.com/shellcode/shellcode.html" target="_blank">
Shellcode Tutorial
&lt;/a>
– Tutorial on how to write shellcode.&lt;/li>
&lt;li>&lt;a href="http://shell-storm.org/shellcode/" target="_blank">
Shellcode Examples
&lt;/a>
– Shellcodes database.&lt;/li>
&lt;li>&lt;a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/" target="_blank">
Exploit Writing Tutorials
&lt;/a>
– Tutorials on how to develop exploits.&lt;/li>
&lt;/ul>
&lt;h3 id="osint-resourceshttpsgithubcomenaqxawesome-pentestosint-resources">&lt;a href="https://github.com/enaqx/awesome-pentest#osint-resources" target="_blank">
&amp;lt;strong&amp;gt;OSINT Resources&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#osint-resourceshttpsgithubcomenaqxawesome-pentestosint-resources" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://osintframework.com/" target="_blank">
OSINT Framework
&lt;/a>
– Collection of various OSINT Hacking Tools broken out by category.&lt;/li>
&lt;li>&lt;a href="https://inteltechniques.com/menu.html" target="_blank">
Intel Techniques
&lt;/a>
– Collection of OSINT tools. Menu on the left can be used to navigate through the categories.&lt;/li>
&lt;li>&lt;a href="http://netbootcamp.org/osinttools/" target="_blank">
NetBootcamp OSINT Tools
&lt;/a>
– Collection of OSINT links and custom Web interfaces to other services such as &lt;a href="http://netbootcamp.org/facebook.html" target="_blank">
Facebook Graph Search
&lt;/a>
and &lt;a href="http://netbootcamp.org/pastesearch.html" target="_blank">
various paste sites
&lt;/a>
.&lt;/li>
&lt;li>&lt;a href="https://wigle.net/" target="_blank">
WiGLE.net
&lt;/a>
– Information about wireless networks world-wide, with user-friendly desktop and web applications.&lt;/li>
&lt;/ul>
&lt;h3 id="social-engineering-resourceshttpsgithubcomenaqxawesome-pentestsocial-engineering-resources">&lt;a href="https://github.com/enaqx/awesome-pentest#social-engineering-resources" target="_blank">
&amp;lt;strong&amp;gt;Social Engineering Resources&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#social-engineering-resourceshttpsgithubcomenaqxawesome-pentestsocial-engineering-resources" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://www.social-engineer.org/framework/general-discussion/" target="_blank">
Social Engineering Framework
&lt;/a>
– Information resource for social engineers.&lt;/li>
&lt;/ul>
&lt;h3 id="lock-picking-resourceshttpsgithubcomenaqxawesome-pentestlock-picking-resources">&lt;a href="https://github.com/enaqx/awesome-pentest#lock-picking-resources" target="_blank">
&amp;lt;strong&amp;gt;Lock Picking Resources&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#lock-picking-resourceshttpsgithubcomenaqxawesome-pentestlock-picking-resources" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.youtube.com/user/SchuylerTowne/" target="_blank">
Schuyler Towne channel
&lt;/a>
– Lockpicking videos and security talks.&lt;/li>
&lt;li>&lt;a href="https://www.youtube.com/user/bosnianbill" target="_blank">
bosnianbill
&lt;/a>
– More lockpicking videos.&lt;/li>
&lt;li>&lt;a href="https://www.reddit.com/r/lockpicking" target="_blank">
/r/lockpicking
&lt;/a>
– Resources for learning lockpicking, equipment recommendations.&lt;/li>
&lt;/ul>
&lt;h3 id="operating-systemshttpsgithubcomenaqxawesome-pentestoperating-systems">&lt;a href="https://github.com/enaqx/awesome-pentest#operating-systems" target="_blank">
&amp;lt;strong&amp;gt;Operating Systems&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#operating-systemshttpsgithubcomenaqxawesome-pentestoperating-systems" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://rawsec.ml/en/security-related-os/" target="_blank">
Security related Operating Systems @ Rawsec
&lt;/a>
– Penetration testing tools &amp;amp; Hacking Tools list Related Complete list of security operating systems.&lt;/li>
&lt;li>&lt;a href="https://n0where.net/best-linux-penetration-testing-distributions/" target="_blank">
Best Linux Penetration Testing Distributions @ CyberPunk
&lt;/a>
– Description of main penetration testing distributions.&lt;/li>
&lt;li>&lt;a href="http://distrowatch.com/search.php?category=Security" target="_blank">
Security @ Distrowatch
&lt;/a>
– Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.&lt;/li>
&lt;li>&lt;a href="https://github.com/cuckoosandbox/cuckoo" target="_blank">
cuckoo
&lt;/a>
– Open source automated malware analysis system.&lt;/li>
&lt;li>&lt;a href="http://www.caine-live.net/" target="_blank">
Computer Aided Investigative Environment (CAINE)
&lt;/a>
– Italian GNU/Linux live distribution created as a digital forensics project.&lt;/li>
&lt;li>&lt;a href="http://www.deftlinux.net/" target="_blank">
Digital Evidence &amp;amp;amp; Forensics Toolkit (DEFT)
&lt;/a>
– Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.&lt;/li>
&lt;li>&lt;a href="https://tails.boum.org/" target="_blank">
Tails
&lt;/a>
– Live OS aimed at preserving privacy and anonymity.&lt;/li>
&lt;/ul>
&lt;h2 id="hacking-tools">&lt;strong>Hacking Tools&lt;/strong> &lt;a href="#hacking-tools" class="hash">#&lt;/a>&lt;/h2>
&lt;h3 id="penetration-testing-distributionshttpsgithubcomenaqxawesome-pentestpenetration-testing-distributions">&lt;a href="https://github.com/enaqx/awesome-pentest#penetration-testing-distributions" target="_blank">
&amp;lt;strong&amp;gt;Penetration Testing Distributions&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#penetration-testing-distributionshttpsgithubcomenaqxawesome-pentestpenetration-testing-distributions" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.kali.org/" target="_blank">
Kali
&lt;/a>
– GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools&lt;/li>
&lt;li>&lt;a href="https://archstrike.org/" target="_blank">
ArchStrike
&lt;/a>
– Arch GNU/Linux repository for security professionals and enthusiasts.&lt;/li>
&lt;li>&lt;a href="https://www.blackarch.org/" target="_blank">
BlackArch
&lt;/a>
– Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.&lt;/li>
&lt;li>&lt;a href="http://networksecuritytoolkit.org/" target="_blank">
Network Security Toolkit (NST)
&lt;/a>
– Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.&lt;/li>
&lt;li>&lt;a href="http://www.pentoo.ch/" target="_blank">
Pentoo
&lt;/a>
– Security-focused live CD based on Gentoo.&lt;/li>
&lt;li>&lt;a href="https://backbox.org/" target="_blank">
BackBox
&lt;/a>
– Ubuntu-based distribution for penetration tests and security assessments.&lt;/li>
&lt;li>&lt;a href="https://www.parrotsec.org/" target="_blank">
Parrot
&lt;/a>
– Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.&lt;/li>
&lt;li>&lt;a href="https://inteltechniques.com/buscador/" target="_blank">
Buscador
&lt;/a>
– GNU/Linux virtual machine that is pre-configured for online investigators.&lt;/li>
&lt;li>&lt;a href="https://labs.fedoraproject.org/en/security/" target="_blank">
Fedora Security Lab
&lt;/a>
– Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.&lt;/li>
&lt;li>&lt;a href="https://github.com/trustedsec/ptf" target="_blank">
The Pentesters Framework
&lt;/a>
– Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.&lt;/li>
&lt;li>&lt;a href="https://github.com/adi0x90/attifyos" target="_blank">
AttifyOS
&lt;/a>
– GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.&lt;/li>
&lt;/ul>
&lt;h3 id="docker-for-penetration-testinghttpsgithubcomenaqxawesome-pentestdocker-for-penetration-testing">&lt;a href="https://github.com/enaqx/awesome-pentest#docker-for-penetration-testing" target="_blank">
&amp;lt;strong&amp;gt;Docker for Penetration Testing&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#docker-for-penetration-testinghttpsgithubcomenaqxawesome-pentestdocker-for-penetration-testing" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;code>docker pull kalilinux/kali-linux-docker&lt;/code> &lt;a href="https://hub.docker.com/r/kalilinux/kali-linux-docker/" target="_blank">
official Kali Linux
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull owasp/zap2docker-stable&lt;/code> – &lt;a href="https://github.com/zaproxy/zaproxy" target="_blank">
official OWASP ZAP
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull wpscanteam/wpscan&lt;/code> – &lt;a href="https://hub.docker.com/r/wpscanteam/wpscan/" target="_blank">
official WPScan
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull citizenstig/dvwa&lt;/code> – &lt;a href="https://hub.docker.com/r/citizenstig/dvwa/" target="_blank">
Damn Vulnerable Web Application (DVWA)
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull wpscanteam/vulnerablewordpress&lt;/code> – &lt;a href="https://hub.docker.com/r/wpscanteam/vulnerablewordpress/" target="_blank">
Vulnerable WordPress Installation
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull hmlio/vaas-cve-2014-6271&lt;/code> – &lt;a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/" target="_blank">
Vulnerability as a service: Shellshock
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull hmlio/vaas-cve-2014-0160&lt;/code> – &lt;a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/" target="_blank">
Vulnerability as a service: Heartbleed
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull opendns/security-ninjas&lt;/code> – &lt;a href="https://hub.docker.com/r/opendns/security-ninjas/" target="_blank">
Security Ninjas
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull diogomonica/docker-bench-security&lt;/code> – &lt;a href="https://hub.docker.com/r/diogomonica/docker-bench-security/" target="_blank">
Docker Bench for Security
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull ismisepaul/securityshepherd&lt;/code> – &lt;a href="https://hub.docker.com/r/ismisepaul/securityshepherd/" target="_blank">
OWASP Security Shepherd
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull danmx/docker-owasp-webgoat&lt;/code> – &lt;a href="https://hub.docker.com/r/danmx/docker-owasp-webgoat/" target="_blank">
OWASP WebGoat Project docker image
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker-compose build &amp;amp;&amp;amp; docker-compose up&lt;/code> – &lt;a href="https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker" target="_blank">
OWASP NodeGoat
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull citizenstig/nowasp&lt;/code> – &lt;a href="https://hub.docker.com/r/citizenstig/nowasp/" target="_blank">
OWASP Mutillidae II Web Pen-Test Practice Application
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull bkimminich/juice-shop&lt;/code> – &lt;a href="https://github.com/bkimminich/juice-shop#docker-container--" target="_blank">
OWASP Juice Shop
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull kalilinux/kali-linux-docker&lt;/code> – &lt;a href="https://www.kali.org/news/official-kali-linux-docker-images/" target="_blank">
Kali Linux Docker Image
&lt;/a>
&lt;/li>
&lt;li>&lt;code>docker pull phocean/msf&lt;/code> – &lt;a href="https://hub.docker.com/r/phocean/msf/" target="_blank">
docker-metasploit
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;h3 id="multi-paradigm-frameworkshttpsgithubcomenaqxawesome-pentestmulti-paradigm-frameworks">&lt;a href="https://github.com/enaqx/awesome-pentest#multi-paradigm-frameworks" target="_blank">
&amp;lt;strong&amp;gt;Multi-paradigm Frameworks&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#multi-paradigm-frameworkshttpsgithubcomenaqxawesome-pentestmulti-paradigm-frameworks" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.metasploit.com/" target="_blank">
Metasploit
&lt;/a>
– post exploitaion Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.&lt;/li>
&lt;li>&lt;a href="http://fastandeasyhacking.com/" target="_blank">
Armitage
&lt;/a>
– Java-based GUI front-end for the Metasploit Framework.&lt;/li>
&lt;li>&lt;a href="https://github.com/infobyte/faraday" target="_blank">
Faraday
&lt;/a>
– Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.&lt;/li>
&lt;li>&lt;a href="https://github.com/juansacco/exploitpack" target="_blank">
ExploitPack
&lt;/a>
– Graphical tool for automating penetration tests that ships with many pre-packaged exploits.&lt;/li>
&lt;li>&lt;a href="https://github.com/n1nj4sec/pupy" target="_blank">
Pupy
&lt;/a>
– Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,&lt;/li>
&lt;/ul>
&lt;h3 id="vulnerability-scannershttpsgithubcomenaqxawesome-pentestvulnerability-scanners">&lt;a href="https://github.com/enaqx/awesome-pentest#vulnerability-scanners" target="_blank">
&amp;lt;strong&amp;gt;Vulnerability Scanners&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#vulnerability-scannershttpsgithubcomenaqxawesome-pentestvulnerability-scanners" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.rapid7.com/products/nexpose/" target="_blank">
Nexpose
&lt;/a>
– Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.&lt;/li>
&lt;li>&lt;a href="https://www.tenable.com/products/nessus-vulnerability-scanner" target="_blank">
Nessus
&lt;/a>
– Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.&lt;/li>
&lt;li>&lt;a href="http://www.openvas.org/" target="_blank">
OpenVAS
&lt;/a>
– Free software implementation of the popular Nessus vulnerability assessment system.&lt;/li>
&lt;li>&lt;a href="https://github.com/future-architect/vuls" target="_blank">
Vuls
&lt;/a>
– Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.&lt;/li>
&lt;/ul>
&lt;h3 id="static-analyzershttpsgithubcomenaqxawesome-penteststatic-analyzers">&lt;a href="https://github.com/enaqx/awesome-pentest#static-analyzers" target="_blank">
&amp;lt;strong&amp;gt;Static Analyzers&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#static-analyzershttpsgithubcomenaqxawesome-penteststatic-analyzers" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/presidentbeef/brakeman" target="_blank">
Brakeman
&lt;/a>
– Static analysis security vulnerability scanner for Ruby on Rails applications.&lt;/li>
&lt;li>&lt;a href="http://cppcheck.sourceforge.net/" target="_blank">
cppcheck
&lt;/a>
– Extensible C/C++ static analyzer focused on finding bugs.&lt;/li>
&lt;li>&lt;a href="http://findbugs.sourceforge.net/" target="_blank">
FindBugs
&lt;/a>
– Free software static analyzer to look for bugs in Java code.&lt;/li>
&lt;li>&lt;a href="https://github.com/nccgroup/sobelow" target="_blank">
sobelow
&lt;/a>
– Security-focused static analysis for the Phoenix Framework.&lt;/li>
&lt;li>&lt;a href="https://pypi.python.org/pypi/bandit/" target="_blank">
bandit
&lt;/a>
– Security oriented static analyser for python code.&lt;/li>
&lt;/ul>
&lt;h3 id="web-scannershttpsgithubcomenaqxawesome-pentestweb-scanners">&lt;a href="https://github.com/enaqx/awesome-pentest#web-scanners" target="_blank">
&amp;lt;strong&amp;gt;Web Scanners&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#web-scannershttpsgithubcomenaqxawesome-pentestweb-scanners" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://cirt.net/nikto2" target="_blank">
Nikto
&lt;/a>
– Noisy but fast black box web server and web application vulnerability scanner.&lt;/li>
&lt;li>&lt;a href="http://www.arachni-scanner.com/" target="_blank">
Arachni
&lt;/a>
– Scriptable framework for evaluating the security of web applications.&lt;/li>
&lt;li>&lt;a href="https://github.com/andresriancho/w3af" target="_blank">
w3af
&lt;/a>
– Hacking Tools for Web application attack and audit framework.&lt;/li>
&lt;li>&lt;a href="http://wapiti.sourceforge.net/" target="_blank">
Wapiti
&lt;/a>
– Black box web application vulnerability scanner with built-in fuzzer.&lt;/li>
&lt;li>&lt;a href="https://secapps.com/" target="_blank">
SecApps
&lt;/a>
– In-browser web application security testing suite.&lt;/li>
&lt;li>&lt;a href="https://www.webreaver.com/" target="_blank">
WebReaver
&lt;/a>
– Commercial, graphical web application vulnerability scanner designed for macOS.&lt;/li>
&lt;li>&lt;a href="https://wpscan.org/" target="_blank">
WPScan
&lt;/a>
– Hacking Tools of Black box WordPress vulnerability scanner.&lt;/li>
&lt;li>&lt;a href="https://code.google.com/archive/p/cms-explorer/" target="_blank">
cms-explorer
&lt;/a>
– Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.&lt;/li>
&lt;li>&lt;a href="https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project" target="_blank">
joomscan
&lt;/a>
– on of the best Hacking Tools for Joomla vulnerability scanner.&lt;/li>
&lt;li>&lt;a href="https://github.com/tijme/angularjs-csti-scanner" target="_blank">
ACSTIS
&lt;/a>
– Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.&lt;/li>
&lt;/ul>
&lt;h3 id="network-toolshttpsgithubcomenaqxawesome-pentestnetwork-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#network-tools" target="_blank">
&amp;lt;strong&amp;gt;Network Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#network-toolshttpsgithubcomenaqxawesome-pentestnetwork-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://zmap.io/" target="_blank">
zmap
&lt;/a>
– Open source network scanner that enables researchers to easily perform Internet-wide network studies.&lt;/li>
&lt;li>&lt;a href="https://nmap.org/" target="_blank">
nmap
&lt;/a>
– Free security scanner for network exploration &amp;amp; security audits.&lt;/li>
&lt;li>&lt;a href="https://github.com/rafael-santiago/pig" target="_blank">
pig
&lt;/a>
– one of the Hacking Tools forGNU/Linux packet crafting .&lt;/li>
&lt;li>&lt;a href="https://github.com/vesche/scanless" target="_blank">
scanless
&lt;/a>
– Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.&lt;/li>
&lt;li>&lt;a href="http://www.tcpdump.org/" target="_blank">
tcpdump/libpcap
&lt;/a>
– Common packet analyzer that runs under the command line.&lt;/li>
&lt;li>&lt;a href="https://www.wireshark.org/" target="_blank">
Wireshark
&lt;/a>
– Widely-used graphical, cross-platform network protocol analyzer.&lt;/li>
&lt;li>&lt;a href="http://network-tools.com/" target="_blank">
Network-Tools.com
&lt;/a>
– Website offering an interface to numerous basic network utilities like &lt;code>ping&lt;/code>, &lt;code>traceroute&lt;/code>, &lt;code>whois&lt;/code>, and more.&lt;/li>
&lt;li>&lt;a href="https://github.com/netsniff-ng/netsniff-ng" target="_blank">
netsniff-ng
&lt;/a>
– Swiss army knife for for network sniffing.&lt;/li>
&lt;li>&lt;a href="http://sniff.su/" target="_blank">
Intercepter-NG
&lt;/a>
– Multifunctional network toolkit.&lt;/li>
&lt;li>&lt;a href="https://sparta.secforce.com/" target="_blank">
SPARTA
&lt;/a>
– Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.&lt;/li>
&lt;li>&lt;a href="https://github.com/iphelix/dnschef" target="_blank">
dnschef
&lt;/a>
– Highly configurable DNS proxy for pentesters.&lt;/li>
&lt;li>&lt;a href="https://dnsdumpster.com/" target="_blank">
DNSDumpster
&lt;/a>
– one of the Hacking Tools for Online DNS recon and search service.&lt;/li>
&lt;li>&lt;a href="https://github.com/m0rtem/CloudFail" target="_blank">
CloudFail
&lt;/a>
– Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.&lt;/li>
&lt;li>&lt;a href="https://github.com/fwaeytens/dnsenum/" target="_blank">
dnsenum
&lt;/a>
– Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.&lt;/li>
&lt;li>&lt;a href="https://github.com/makefu/dnsmap/" target="_blank">
dnsmap
&lt;/a>
– One of the Hacking Tools for Passive DNS network mapper.&lt;/li>
&lt;li>&lt;a href="https://github.com/darkoperator/dnsrecon/" target="_blank">
dnsrecon
&lt;/a>
– One of the Hacking Tools for DNS enumeration script.&lt;/li>
&lt;li>&lt;a href="http://www.mavetju.org/unix/dnstracer.php" target="_blank">
dnstracer
&lt;/a>
– Determines where a given DNS server gets its information from, and follows the chain of DNS servers.&lt;/li>
&lt;li>&lt;a href="https://github.com/chrislee35/passivedns-client" target="_blank">
passivedns-client
&lt;/a>
– Library and query tool for querying several passive DNS providers.&lt;/li>
&lt;li>&lt;a href="https://github.com/gamelinux/passivedns" target="_blank">
passivedns
&lt;/a>
– Network sniffer that logs all DNS server replies for use in a passive DNS setup.&lt;/li>
&lt;li>&lt;a href="https://github.com/robertdavidgraham/masscan" target="_blank">
Mass Scan
&lt;/a>
– best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.&lt;/li>
&lt;li>&lt;a href="https://github.com/hatRiot/zarp" target="_blank">
Zarp
&lt;/a>
– Network attack tool centered around the exploitation of local networks.&lt;/li>
&lt;li>&lt;a href="https://github.com/mitmproxy/mitmproxy" target="_blank">
mitmproxy
&lt;/a>
– Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.&lt;/li>
&lt;li>&lt;a href="https://github.com/r00t-3xp10it/morpheus" target="_blank">
Morpheus
&lt;/a>
– Automated ettercap TCP/IP Hacking Tools .&lt;/li>
&lt;li>&lt;a href="https://github.com/justmao945/mallory" target="_blank">
mallory
&lt;/a>
– HTTP/HTTPS proxy over SSH.&lt;/li>
&lt;li>&lt;a href="https://github.com/jtesta/ssh-mitm" target="_blank">
SSH MITM
&lt;/a>
– Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.&lt;/li>
&lt;li>&lt;a href="https://github.com/netzob/netzob" target="_blank">
Netzob
&lt;/a>
– Reverse engineering, traffic generation and fuzzing of communication protocols.&lt;/li>
&lt;li>&lt;a href="https://github.com/sensepost/DET" target="_blank">
DET
&lt;/a>
– Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.&lt;/li>
&lt;li>&lt;a href="https://github.com/samyk/pwnat" target="_blank">
pwnat
&lt;/a>
– Punches holes in firewalls and NATs.&lt;/li>
&lt;li>&lt;a href="https://www.monkey.org/~dugsong/dsniff/" target="_blank">
dsniff
&lt;/a>
– Collection of tools for network auditing and pentesting.&lt;/li>
&lt;li>&lt;a href="http://tgcd.sourceforge.net/" target="_blank">
tgcd
&lt;/a>
– Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.&lt;/li>
&lt;li>&lt;a href="https://github.com/ShawnDEvans/smbmap" target="_blank">
smbmap
&lt;/a>
– Handy SMB enumeration tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/secdev/scapy" target="_blank">
scapy
&lt;/a>
– Python-based interactive packet manipulation program &amp;amp; library.&lt;/li>
&lt;li>&lt;a href="https://github.com/USArmyResearchLab/Dshell" target="_blank">
Dshell
&lt;/a>
– Network forensic analysis framework.&lt;/li>
&lt;li>&lt;a href="http://www.iwaxx.com/debookee/" target="_blank">
Debookee
&lt;/a>
– Simple and powerful network traffic analyzer for macOS.&lt;/li>
&lt;li>&lt;a href="https://github.com/dripcap/dripcap" target="_blank">
Dripcap
&lt;/a>
– Caffeinated packet analyzer.&lt;/li>
&lt;li>&lt;a href="https://github.com/RUB-NDS/PRET" target="_blank">
Printer Exploitation Toolkit (PRET)
&lt;/a>
– Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.&lt;/li>
&lt;li>&lt;a href="http://h.foofus.net/?page_id=218" target="_blank">
Praeda
&lt;/a>
– Automated multi-function printer data harvester for gathering usable data during security assessments.&lt;/li>
&lt;li>&lt;a href="https://github.com/reverse-shell/routersploit" target="_blank">
routersploit
&lt;/a>
– Open source exploitation framework similar to Metasploit but dedicated to embedded devices.&lt;/li>
&lt;li>&lt;a href="https://github.com/infobyte/evilgrade" target="_blank">
evilgrade
&lt;/a>
– Modular framework to take advantage of poor upgrade implementations by injecting fake updates.&lt;/li>
&lt;li>&lt;a href="https://github.com/evilsocket/xray" target="_blank">
XRay
&lt;/a>
– Network (sub)domain discovery and reconnaissance automation tool.&lt;/li>
&lt;li>&lt;a href="http://www.ettercap-project.org/" target="_blank">
Ettercap
&lt;/a>
– Comprehensive, mature suite for machine-in-the-middle attacks.&lt;/li>
&lt;li>&lt;a href="https://www.bettercap.org/" target="_blank">
BetterCAP
&lt;/a>
– Modular, portable and easily extensible MITM framework.&lt;/li>
&lt;li>&lt;a href="https://github.com/byt3bl33d3r/CrackMapExec" target="_blank">
CrackMapExec
&lt;/a>
– A swiss army knife for pentesting networks.&lt;/li>
&lt;li>&lt;a href="https://github.com/CoreSecurity/impacket" target="_blank">
impacket
&lt;/a>
– A collection of Python classes for working with network protocols.&lt;/li>
&lt;/ul>
&lt;h3 id="wireless-network-hacking-tools">Wireless Network Hacking Tools &lt;a href="#wireless-network-hacking-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://www.aircrack-ng.org/" target="_blank">
Aircrack-ng
&lt;/a>
– Set of Penetration testing &amp;amp; Hacking Tools list for auditing wireless networks.&lt;/li>
&lt;li>&lt;a href="https://kismetwireless.net/" target="_blank">
Kismet
&lt;/a>
– Wireless network detector, sniffer, and IDS.&lt;/li>
&lt;li>&lt;a href="https://code.google.com/archive/p/reaver-wps" target="_blank">
Reaver
&lt;/a>
– Brute force attack against WiFi Protected Setup.&lt;/li>
&lt;li>&lt;a href="https://github.com/derv82/wifite" target="_blank">
Wifite
&lt;/a>
– Automated wireless attack tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/FluxionNetwork/fluxion" target="_blank">
Fluxion
&lt;/a>
– Suite of automated social engineering based WPA attacks.&lt;/li>
&lt;/ul>
&lt;h3 id="transport-layer-security-toolshttpsgithubcomenaqxawesome-pentesttransport-layer-security-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#transport-layer-security-tools" target="_blank">
&amp;lt;strong&amp;gt;Transport Layer Security Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#transport-layer-security-toolshttpsgithubcomenaqxawesome-pentesttransport-layer-security-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/nabla-c0d3/sslyze" target="_blank">
SSLyze
&lt;/a>
– Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.&lt;/li>
&lt;li>&lt;a href="https://github.com/WestpointLtd/tls_prober" target="_blank">
tls_prober
&lt;/a>
– Fingerprint a server’s SSL/TLS implementation.&lt;/li>
&lt;li>&lt;a href="https://github.com/drwetter/testssl.sh" target="_blank">
testssl.sh
&lt;/a>
– Command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.&lt;/li>
&lt;/ul>
&lt;h3 id="web-exploitationhttpsgithubcomenaqxawesome-pentestweb-exploitation">&lt;a href="https://github.com/enaqx/awesome-pentest#web-exploitation" target="_blank">
&amp;lt;strong&amp;gt;Web Exploitation&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#web-exploitationhttpsgithubcomenaqxawesome-pentestweb-exploitation" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project" target="_blank">
OWASP Zed Attack Proxy (ZAP)
&lt;/a>
– Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.&lt;/li>
&lt;li>&lt;a href="https://www.telerik.com/fiddler" target="_blank">
Fiddler
&lt;/a>
– Free cross-platform web debugging proxy with user-friendly companion tools.&lt;/li>
&lt;li>&lt;a href="https://portswigger.net/burp/" target="_blank">
Burp Suite
&lt;/a>
– One of the Hacking Tools ntegrated platform for performing security testing of web applications.&lt;/li>
&lt;li>&lt;a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/" target="_blank">
autochrome
&lt;/a>
– Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.&lt;/li>
&lt;li>&lt;a href="https://github.com/beefproject/beef" target="_blank">
Browser Exploitation Framework (BeEF)
&lt;/a>
– Command and control server for delivering exploits to commandeered Web browsers.&lt;/li>
&lt;li>&lt;a href="https://www.owasp.org/index.php/OWASP_OWTF" target="_blank">
Offensive Web Testing Framework (OWTF)
&lt;/a>
– Python-based framework for pentesting Web applications based on the OWASP Testing Guide.&lt;/li>
&lt;li>&lt;a href="https://github.com/rastating/wordpress-exploit-framework" target="_blank">
WordPress Exploit Framework
&lt;/a>
– Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.&lt;/li>
&lt;li>&lt;a href="https://github.com/espreto/wpsploit" target="_blank">
WPSploit
&lt;/a>
– Exploit WordPress-powered websites with Metasploit.&lt;/li>
&lt;li>&lt;a href="http://sqlmap.org/" target="_blank">
SQLmap
&lt;/a>
– Automatic SQL injection and database takeover tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/epinna/tplmap" target="_blank">
tplmap
&lt;/a>
– Automatic server-side template injection and Web server takeover Hacking Tools .&lt;/li>
&lt;li>&lt;a href="https://github.com/epinna/weevely3" target="_blank">
weevely3
&lt;/a>
– Weaponized web shell.&lt;/li>
&lt;li>&lt;a href="https://www.wappalyzer.com/" target="_blank">
Wappalyzer
&lt;/a>
– Wappalyzer uncovers the technologies used on websites.&lt;/li>
&lt;li>&lt;a href="https://github.com/urbanadventurer/WhatWeb" target="_blank">
WhatWeb
&lt;/a>
– Website fingerprinter.&lt;/li>
&lt;li>&lt;a href="http://blindelephant.sourceforge.net/" target="_blank">
BlindElephant
&lt;/a>
– Web application fingerprinter.&lt;/li>
&lt;li>&lt;a href="https://github.com/EnableSecurity/wafw00f" target="_blank">
wafw00f
&lt;/a>
– Identifies and fingerprints Web Application Firewall (WAF) products.&lt;/li>
&lt;li>&lt;a href="https://github.com/kurobeats/fimap" target="_blank">
fimap
&lt;/a>
– Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.&lt;/li>
&lt;li>&lt;a href="https://github.com/D35m0nd142/Kadabra" target="_blank">
Kadabra
&lt;/a>
– Automatic LFI exploiter and scanner.&lt;/li>
&lt;li>&lt;a href="https://github.com/P0cL4bs/Kadimus" target="_blank">
Kadimus
&lt;/a>
– LFI scan and exploit tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/hvqzao/liffy" target="_blank">
liffy
&lt;/a>
– LFI exploitation tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/commixproject/commix" target="_blank">
Commix
&lt;/a>
– Automated all-in-one operating system command injection and exploitation tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/kost/dvcs-ripper" target="_blank">
DVCS Ripper
&lt;/a>
– Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.&lt;/li>
&lt;li>&lt;a href="https://github.com/internetwache/GitTools" target="_blank">
GitTools
&lt;/a>
– One of the Hacking Tools that Automatically find and download Web-accessible &lt;code>.git&lt;/code> repositories.&lt;/li>
&lt;li>&lt;a href="https://www.thoughtcrime.org/software/sslstrip/" target="_blank">
sslstrip
&lt;/a>
–&lt;br>
One of the Hacking Tools Demonstration of the HTTPS stripping attacks.&lt;/li>
&lt;li>&lt;a href="https://github.com/LeonardoNve/sslstrip2" target="_blank">
sslstrip2
&lt;/a>
– SSLStrip version to defeat HSTS.&lt;/li>
&lt;li>&lt;a href="http://nosqlmap.net/" target="_blank">
NoSQLmap
&lt;/a>
– Automatic NoSQL injection and database takeover tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/codingo/VHostScan" target="_blank">
VHostScan
&lt;/a>
– A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.&lt;/li>
&lt;li>&lt;a href="https://github.com/fuzzdb-project/fuzzdb" target="_blank">
FuzzDB
&lt;/a>
– Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.&lt;/li>
&lt;li>&lt;a href="https://github.com/ChrisTruncer/EyeWitness" target="_blank">
EyeWitness
&lt;/a>
– Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.&lt;/li>
&lt;li>&lt;a href="https://github.com/maaaaz/webscreenshot" target="_blank">
webscreenshot
&lt;/a>
– A simple script to take screenshots of list of websites.&lt;/li>
&lt;/ul>
&lt;h3 id="hex-editorshttpsgithubcomenaqxawesome-pentesthex-editors">&lt;a href="https://github.com/enaqx/awesome-pentest#hex-editors" target="_blank">
&amp;lt;strong&amp;gt;Hex Editors&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#hex-editorshttpsgithubcomenaqxawesome-pentesthex-editors" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://hexed.it/" target="_blank">
HexEdit.js
&lt;/a>
– Browser-based hex editing.&lt;/li>
&lt;li>&lt;a href="https://hexinator.com/" target="_blank">
Hexinator
&lt;/a>
– World’s finest (proprietary, commercial) Hex Editor.&lt;/li>
&lt;li>&lt;a href="http://frhed.sourceforge.net/" target="_blank">
Frhed
&lt;/a>
– Binary file editor for Windows.&lt;/li>
&lt;li>&lt;a href="http://www.suavetech.com/0xed/0xed.html" target="_blank">
0xED
&lt;/a>
– Native macOS hex editor that supports plug-ins to display custom data types.&lt;/li>
&lt;/ul>
&lt;h3 id="file-format-analysis-toolshttpsgithubcomenaqxawesome-pentestfile-format-analysis-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#file-format-analysis-tools" target="_blank">
&amp;lt;strong&amp;gt;File Format Analysis Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#file-format-analysis-toolshttpsgithubcomenaqxawesome-pentestfile-format-analysis-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://kaitai.io/" target="_blank">
Kaitai Struct
&lt;/a>
– File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.&lt;/li>
&lt;li>&lt;a href="https://codisec.com/veles/" target="_blank">
Veles
&lt;/a>
– Binary data visualization and analysis tool.&lt;/li>
&lt;li>&lt;a href="http://hachoir3.readthedocs.io/" target="_blank">
Hachoir
&lt;/a>
– Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.&lt;/li>
&lt;/ul>
&lt;h3 id="defense-evasion-toolshttpsgithubcomenaqxawesome-pentestdefense-evasion-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#defense-evasion-tools" target="_blank">
&amp;lt;strong&amp;gt;Defense Evasion Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#defense-evasion-toolshttpsgithubcomenaqxawesome-pentestdefense-evasion-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.veil-framework.com/" target="_blank">
Veil
&lt;/a>
– Generate metasploit payloads that bypass common anti-virus solutions.&lt;/li>
&lt;li>&lt;a href="https://github.com/Exploit-install/shellsploit-framework" target="_blank">
shellsploit
&lt;/a>
– Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.&lt;/li>
&lt;li>&lt;a href="http://nullsecurity.net/tools/binary.html" target="_blank">
Hyperion
&lt;/a>
– Runtime encryptor for 32-bit portable executables (“PE &lt;code>.exe&lt;/code>s”).&lt;/li>
&lt;li>&lt;a href="https://github.com/govolution/avet" target="_blank">
AntiVirus Evasion Tool (AVET)
&lt;/a>
– Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.&lt;/li>
&lt;li>&lt;a href="https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/" target="_blank">
peCloak.py
&lt;/a>
– Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.&lt;/li>
&lt;li>&lt;a href="https://github.com/v-p-b/peCloakCapstone" target="_blank">
peCloakCapstone
&lt;/a>
– Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/Mr-Un1k0d3r/UniByAv" target="_blank">
UniByAv
&lt;/a>
– Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.&lt;/li>
&lt;/ul>
&lt;h3 id="hash-cracking-hacking-toolshttpsgithubcomenaqxawesome-pentesthash-cracking-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#hash-cracking-tools" target="_blank">
&amp;lt;strong&amp;gt;Hash Cracking Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#hash-cracking-hacking-toolshttpsgithubcomenaqxawesome-pentesthash-cracking-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://www.openwall.com/john/" target="_blank">
John the Ripper
&lt;/a>
– One of the best Hacking Tools for Fast password cracker.&lt;/li>
&lt;li>&lt;a href="http://hashcat.net/hashcat/" target="_blank">
Hashcat
&lt;/a>
– Another One of the Hacking Tools The more fast hash cracker.&lt;/li>
&lt;li>&lt;a href="https://digi.ninja/projects/cewl.php" target="_blank">
CeWL
&lt;/a>
– Generates custom wordlists by spidering a target’s website and collecting unique words.&lt;/li>
&lt;li>&lt;a href="https://github.com/lmammino/jwt-cracker" target="_blank">
JWT Cracker
&lt;/a>
– Simple HS256 JWT token brute force cracker.&lt;/li>
&lt;li>&lt;a href="http://rarcrack.sourceforge.net/" target="_blank">
Rar Crack
&lt;/a>
– RAR bruteforce cracker.&lt;/li>
&lt;li>&lt;a href="https://github.com/glv2/bruteforce-wallet" target="_blank">
BruteForce Wallet
&lt;/a>
– Find the password of an encrypted wallet file (i.e. &lt;code>wallet.dat&lt;/code>).&lt;/li>
&lt;/ul>
&lt;h3 id="windows-utilitieshttpsgithubcomenaqxawesome-pentestwindows-utilities">&lt;a href="https://github.com/enaqx/awesome-pentest#windows-utilities" target="_blank">
&amp;lt;strong&amp;gt;Windows Utilities&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#windows-utilitieshttpsgithubcomenaqxawesome-pentestwindows-utilities" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://technet.microsoft.com/en-us/sysinternals/bb842062" target="_blank">
Sysinternals Suite
&lt;/a>
– The Sysinternals Troubleshooting Utilities.&lt;/li>
&lt;li>&lt;a href="http://www.ampliasecurity.com/research/windows-credentials-editor/" target="_blank">
Windows Credentials Editor
&lt;/a>
– Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.&lt;/li>
&lt;li>&lt;a href="http://blog.gentilkiwi.com/mimikatz" target="_blank">
mimikatz
&lt;/a>
– Credentials extraction tool for Windows operating system.&lt;/li>
&lt;li>&lt;a href="https://github.com/PowerShellMafia/PowerSploit" target="_blank">
PowerSploit
&lt;/a>
– PowerShell Post-Exploitation Framework.&lt;/li>
&lt;li>&lt;a href="https://github.com/GDSSecurity/Windows-Exploit-Suggester" target="_blank">
Windows Exploit Suggester
&lt;/a>
– Detects potential missing patches on the target.&lt;/li>
&lt;li>&lt;a href="https://github.com/SpiderLabs/Responder" target="_blank">
Responder
&lt;/a>
– LLMNR, NBT-NS and MDNS poisoner.&lt;/li>
&lt;li>&lt;a href="https://github.com/adaptivethreat/Bloodhound/wiki" target="_blank">
Bloodhound
&lt;/a>
– Graphical Active Directory trust relationship explorer.&lt;/li>
&lt;li>&lt;a href="https://www.powershellempire.com/" target="_blank">
Empire
&lt;/a>
– Pure PowerShell post-exploitation agent.&lt;/li>
&lt;li>&lt;a href="https://github.com/rabbitstack/fibratus" target="_blank">
Fibratus
&lt;/a>
– Tool for exploration and tracing of the Windows kernel.&lt;/li>
&lt;li>&lt;a href="https://labs.mwrinfosecurity.com/tools/wepwnise/" target="_blank">
wePWNise
&lt;/a>
– Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.&lt;/li>
&lt;li>&lt;a href="https://github.com/nccgroup/redsnarf" target="_blank">
redsnarf
&lt;/a>
– Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.&lt;/li>
&lt;li>&lt;a href="https://github.com/trustedsec/unicorn" target="_blank">
Magic Unicorn
&lt;/a>
– Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or &lt;code>certutil&lt;/code> (using fake certificates).&lt;/li>
&lt;li>&lt;a href="https://github.com/byt3bl33d3r/DeathStar" target="_blank">
DeathStar
&lt;/a>
– Python script that uses Empire’s RESTful API to automate gaining Domain Admin rights in Active Directory environments.&lt;/li>
&lt;/ul>
&lt;h3 id="gnulinux-utilitieshttpsgithubcomenaqxawesome-pentestgnulinux-utilities">&lt;a href="https://github.com/enaqx/awesome-pentest#gnulinux-utilities" target="_blank">
&amp;lt;strong&amp;gt;GNU/Linux Utilities&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#gnulinux-utilitieshttpsgithubcomenaqxawesome-pentestgnulinux-utilities" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/PenturaLabs/Linux_Exploit_Suggester" target="_blank">
Linux Exploit Suggester
&lt;/a>
– Heuristic reporting on potentially viable exploits for a given GNU/Linux system.&lt;/li>
&lt;/ul>
&lt;h3 id="macos-utilitieshttpsgithubcomenaqxawesome-pentestmacos-utilities">&lt;a href="https://github.com/enaqx/awesome-pentest#macos-utilities" target="_blank">
&amp;lt;strong&amp;gt;macOS Utilities&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#macos-utilitieshttpsgithubcomenaqxawesome-pentestmacos-utilities" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/Trietptm-on-Security/Bella" target="_blank">
Bella
&lt;/a>
– Pure Python post-exploitation data mining and remote administration tool for macOS.&lt;/li>
&lt;/ul>
&lt;h3 id="ddos-toolshttpsgithubcomenaqxawesome-pentestddos-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#ddos-tools" target="_blank">
&amp;lt;strong&amp;gt;DDoS Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#ddos-toolshttpsgithubcomenaqxawesome-pentestddos-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/NewEraCracker/LOIC/" target="_blank">
LOIC
&lt;/a>
– Open source network stress tool for Windows.&lt;/li>
&lt;li>&lt;a href="http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html" target="_blank">
JS LOIC
&lt;/a>
– JavaScript in-browser version of LOIC.&lt;/li>
&lt;li>&lt;a href="https://github.com/gkbrk/slowloris" target="_blank">
SlowLoris
&lt;/a>
– DoS tool that uses low bandwidth on the attacking side.&lt;/li>
&lt;li>&lt;a href="https://sourceforge.net/projects/high-orbit-ion-cannon/" target="_blank">
HOIC
&lt;/a>
– Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common counter measures.&lt;/li>
&lt;li>&lt;a href="https://sourceforge.net/projects/t50/" target="_blank">
T50
&lt;/a>
– Faster network stress tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/epsylon/ufonet" target="_blank">
UFONet
&lt;/a>
– Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using; &lt;code>GET&lt;/code>/&lt;code>POST&lt;/code>, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.&lt;/li>
&lt;/ul>
&lt;h3 id="social-engineering-toolshttpsgithubcomenaqxawesome-pentestsocial-engineering-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#social-engineering-tools" target="_blank">
&amp;lt;strong&amp;gt;Social Engineering Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#social-engineering-toolshttpsgithubcomenaqxawesome-pentestsocial-engineering-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/trustedsec/social-engineer-toolkit" target="_blank">
Social Engineer Toolkit (SET)
&lt;/a>
– Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.&lt;/li>
&lt;li>&lt;a href="https://github.com/securestate/king-phisher" target="_blank">
King Phisher
&lt;/a>
– One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.&lt;/li>
&lt;li>&lt;a href="https://github.com/kgretzky/evilginx" target="_blank">
Evilginx
&lt;/a>
– MITM attack framework used for phishing credentials and session cookies from any Web service.&lt;/li>
&lt;li>&lt;a href="https://github.com/sophron/wifiphisher" target="_blank">
wifiphisher
&lt;/a>
– Automated phishing attacks against WiFi networks.&lt;/li>
&lt;li>&lt;a href="https://github.com/ring0lab/catphish" target="_blank">
Catphish
&lt;/a>
– Tool for phishing and corporate espionage written in Ruby.&lt;/li>
&lt;li>&lt;a href="https://github.com/4w4k3/BeeLogger" target="_blank">
Beelogger
&lt;/a>
– Tool for generating keylooger.&lt;/li>
&lt;/ul>
&lt;h3 id="osint-toolshttpsgithubcomenaqxawesome-pentestosint-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#osint-tools" target="_blank">
&amp;lt;strong&amp;gt;OSINT Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#osint-toolshttpsgithubcomenaqxawesome-pentestosint-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://www.paterva.com/web7/" target="_blank">
Maltego
&lt;/a>
– One of the Hacking Tools and Proprietary software for open source intelligence and forensics, from Paterva.&lt;/li>
&lt;li>&lt;a href="https://github.com/laramies/theHarvester" target="_blank">
theHarvester
&lt;/a>
– E-mail, subdomain and people names harvester.&lt;/li>
&lt;li>&lt;a href="https://github.com/ilektrojohn/creepy" target="_blank">
creepy
&lt;/a>
– Geolocation OSINT tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/laramies/metagoofil" target="_blank">
metagoofil
&lt;/a>
– Metadata harvester.&lt;/li>
&lt;li>&lt;a href="https://www.exploit-db.com/google-hacking-database/" target="_blank">
Google Hacking Database
&lt;/a>
– Database of Google dorks; can be used for recon.&lt;/li>
&lt;li>&lt;a href="https://github.com/JohnTroony/Google-dorks" target="_blank">
Google-dorks
&lt;/a>
– Common Google dorks and others you probably don’t know.&lt;/li>
&lt;li>&lt;a href="https://github.com/k3170makan/GooDork" target="_blank">
GooDork
&lt;/a>
– Command line Google dorking tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/jgor/dork-cli" target="_blank">
dork-cli
&lt;/a>
– Command line Google dork tool.&lt;/li>
&lt;li>&lt;a href="https://www.censys.io/" target="_blank">
Censys
&lt;/a>
– Collects data on hosts and websites through daily ZMap and ZGrab scans.&lt;/li>
&lt;li>&lt;a href="https://www.shodan.io/" target="_blank">
Shodan
&lt;/a>
– World’s first search engine for Internet-connected devices.&lt;/li>
&lt;li>&lt;a href="https://bitbucket.org/LaNMaSteR53/recon-ng" target="_blank">
recon-ng
&lt;/a>
– One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.&lt;/li>
&lt;li>&lt;a href="https://github.com/techgaun/github-dorks" target="_blank">
github-dorks
&lt;/a>
– CLI tool to scan Github repos/organizations for potential sensitive information leak.&lt;/li>
&lt;li>&lt;a href="https://github.com/melvinsh/vcsmap" target="_blank">
vcsmap
&lt;/a>
– Plugin-based tool to scan public version control systems for sensitive information.&lt;/li>
&lt;li>&lt;a href="http://www.spiderfoot.net/" target="_blank">
Spiderfoot
&lt;/a>
– Multi-source OSINT automation tool with a Web UI and report visualizations&lt;/li>
&lt;li>&lt;a href="https://github.com/Hood3dRob1n/BinGoo" target="_blank">
BinGoo
&lt;/a>
– GNU/Linux bash based Bing and Google Dorking Tool.&lt;/li>
&lt;li>&lt;a href="https://github.com/DanMcInerney/fast-recon" target="_blank">
fast-recon
&lt;/a>
– Perform Google dorks against a domain.&lt;/li>
&lt;li>&lt;a href="https://github.com/Smaash/snitch" target="_blank">
snitch
&lt;/a>
– Information gathering via dorks.&lt;/li>
&lt;li>&lt;a href="https://github.com/1N3/Sn1per" target="_blank">
Sn1per
&lt;/a>
– ons of the Hacking Tools for Automated Pentest Recon Scanner.&lt;/li>
&lt;li>&lt;a href="https://www.threatcrowd.org/" target="_blank">
Threat Crowd
&lt;/a>
– Search engine for threats.&lt;/li>
&lt;li>&lt;a href="https://www.virustotal.com/" target="_blank">
Virus Total
&lt;/a>
– VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.&lt;/li>
&lt;li>&lt;a href="https://github.com/upgoingstar/datasploit" target="_blank">
DataSploit
&lt;/a>
– OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.&lt;/li>
&lt;li>&lt;a href="https://github.com/michenriksen/aquatone" target="_blank">
AQUATONE
&lt;/a>
– Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.&lt;/li>
&lt;li>&lt;a href="http://intrigue.io/" target="_blank">
Intrigue
&lt;/a>
– Automated OSINT &amp;amp; Attack Surface discovery framework with powerful API, UI and CLI.&lt;/li>
&lt;li>&lt;a href="https://www.zoomeye.org/" target="_blank">
ZoomEye
&lt;/a>
– Search engine for cyberspace that lets the user find specific network components.&lt;/li>
&lt;/ul>
&lt;h3 id="anonymity-toolshttpsgithubcomenaqxawesome-pentestanonymity-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#anonymity-tools" target="_blank">
&amp;lt;strong&amp;gt;Anonymity Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#anonymity-toolshttpsgithubcomenaqxawesome-pentestanonymity-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.torproject.org/" target="_blank">
Tor
&lt;/a>
– Free software and onion routed overlay network that helps you defend against traffic analysis.&lt;/li>
&lt;li>&lt;a href="https://onionscan.org/" target="_blank">
OnionScan
&lt;/a>
– One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.&lt;/li>
&lt;li>&lt;a href="https://geti2p.net/" target="_blank">
I2P
&lt;/a>
– The Invisible Internet Project.&lt;/li>
&lt;li>&lt;a href="https://github.com/GouveaHeitor/nipe" target="_blank">
Nipe
&lt;/a>
– Script to redirect all traffic from the machine to the Tor network.&lt;/li>
&lt;li>&lt;a href="http://webkay.robinlinus.com/" target="_blank">
What Every Browser Knows About You
&lt;/a>
– Comprehensive detection page to test your own Web browser’s configuration for privacy and identity leaks.&lt;/li>
&lt;/ul>
&lt;h3 id="reverse-engineering-toolshttpsgithubcomenaqxawesome-pentestreverse-engineering-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#reverse-engineering-tools" target="_blank">
&amp;lt;strong&amp;gt;Reverse Engineering Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#reverse-engineering-toolshttpsgithubcomenaqxawesome-pentestreverse-engineering-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://www.hex-rays.com/products/ida/" target="_blank">
Interactive Disassembler (IDA Pro)
&lt;/a>
– Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, &lt;a href="https://www.hex-rays.com/products/ida/support/download_freeware.shtml" target="_blank">
IDA Free
&lt;/a>
.&lt;/li>
&lt;li>&lt;a href="https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx" target="_blank">
WDK/WinDbg
&lt;/a>
– Windows Driver Kit and WinDbg.&lt;/li>
&lt;li>&lt;a href="http://www.ollydbg.de/" target="_blank">
OllyDbg
&lt;/a>
– x86 debugger for Windows binaries that emphasizes binary code analysis.&lt;/li>
&lt;li>&lt;a href="http://rada.re/r/index.html" target="_blank">
Radare2
&lt;/a>
– Open source, crossplatform reverse engineering framework.&lt;/li>
&lt;li>&lt;a href="http://x64dbg.com/" target="_blank">
x64dbg
&lt;/a>
– Open source x64/x32 debugger for windows.&lt;/li>
&lt;li>&lt;a href="http://debugger.immunityinc.com/" target="_blank">
Immunity Debugger
&lt;/a>
– Powerful way to write exploits and analyze malware.&lt;/li>
&lt;li>&lt;a href="http://www.codef00.com/projects#debugger" target="_blank">
Evan’s Debugger
&lt;/a>
– OllyDbg-like debugger for GNU/Linux.&lt;/li>
&lt;li>&lt;a href="https://github.com/wisk/medusa" target="_blank">
Medusa
&lt;/a>
– Open source, cross-platform interactive disassembler.&lt;/li>
&lt;li>&lt;a href="https://github.com/joelpx/plasma" target="_blank">
plasma
&lt;/a>
– Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.&lt;/li>
&lt;li>&lt;a href="https://github.com/longld/peda" target="_blank">
peda
&lt;/a>
– Python Exploit Development Assistance for GDB.&lt;/li>
&lt;li>&lt;a href="https://github.com/0xd4d/dnSpy" target="_blank">
dnSpy
&lt;/a>
– one of the Hacking Tools to reverse engineer .NET assemblies.&lt;/li>
&lt;li>&lt;a href="https://github.com/devttys0/binwalk" target="_blank">
binwalk
&lt;/a>
– Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.&lt;/li>
&lt;li>&lt;a href="https://github.com/Cisco-Talos/pyrebox" target="_blank">
PyREBox
&lt;/a>
– Python scriptable Reverse Engineering sandbox by Cisco-Talos.&lt;/li>
&lt;li>&lt;a href="https://github.com/snare/voltron" target="_blank">
Voltron
&lt;/a>
– Extensible debugger UI toolkit written in Python.&lt;/li>
&lt;li>&lt;a href="http://www.capstone-engine.org/" target="_blank">
Capstone
&lt;/a>
– Lightweight multi-platform, multi-architecture disassembly framework.&lt;/li>
&lt;li>&lt;a href="https://github.com/fireeye/rVMI" target="_blank">
rVMI
&lt;/a>
– Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.&lt;/li>
&lt;li>&lt;a href="https://www.frida.re/" target="_blank">
Frida
&lt;/a>
– Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.&lt;/li>
&lt;/ul>
&lt;h3 id="physical-access-toolshttpsgithubcomenaqxawesome-pentestphysical-access-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#physical-access-tools" target="_blank">
&amp;lt;strong&amp;gt;Physical Access Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#physical-access-toolshttpsgithubcomenaqxawesome-pentestphysical-access-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://lanturtle.com/" target="_blank">
LAN Turtle
&lt;/a>
– Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.&lt;/li>
&lt;li>&lt;a href="http://usbrubberducky.com/" target="_blank">
USB Rubber Ducky
&lt;/a>
– Customizable keystroke injection attack platform masquerading as a USB thumbdrive.&lt;/li>
&lt;li>&lt;a href="https://samy.pl/poisontap/" target="_blank">
Poisontap
&lt;/a>
– Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.&lt;/li>
&lt;li>&lt;a href="https://www.wifipineapple.com/" target="_blank">
WiFi Pineapple
&lt;/a>
– Wireless auditing and penetration testing platform.&lt;/li>
&lt;li>&lt;a href="https://proxmark3.com/" target="_blank">
Proxmark3
&lt;/a>
– RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.&lt;/li>
&lt;/ul>
&lt;h3 id="side-channel-toolshttpsgithubcomenaqxawesome-pentestside-channel-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#side-channel-tools" target="_blank">
&amp;lt;strong&amp;gt;Side-channel Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#side-channel-toolshttpsgithubcomenaqxawesome-pentestside-channel-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://chipwhisperer.com/" target="_blank">
ChipWhisperer
&lt;/a>
– Complete open-source toolchain for side-channel power analysis and glitching attacks.&lt;/li>
&lt;/ul>
&lt;h3 id="ctf-toolshttpsgithubcomenaqxawesome-pentestctf-tools">&lt;a href="https://github.com/enaqx/awesome-pentest#ctf-tools" target="_blank">
&amp;lt;strong&amp;gt;CTF Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#ctf-toolshttpsgithubcomenaqxawesome-pentestctf-tools" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/zardus/ctf-tools" target="_blank">
ctf-tools
&lt;/a>
– Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.&lt;/li>
&lt;li>&lt;a href="https://github.com/Gallopsled/pwntools" target="_blank">
Pwntools
&lt;/a>
– Rapid exploit development framework built for use in CTFs.&lt;/li>
&lt;li>&lt;a href="https://github.com/sourcekris/RsaCtfTool" target="_blank">
RsaCtfTool
&lt;/a>
– Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.&lt;/li>
&lt;/ul>
&lt;h3 id="penetration-testing-report-templateshttpsgithubcomenaqxawesome-pentestpenetration-testing-report-templates">&lt;a href="https://github.com/enaqx/awesome-pentest#penetration-testing-report-templates" target="_blank">
&amp;lt;strong&amp;gt;Penetration Testing Report Templates&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#penetration-testing-report-templateshttpsgithubcomenaqxawesome-pentestpenetration-testing-report-templates" class="hash">#&lt;/a>&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="https://github.com/juliocesarfort/public-pentesting-reports" target="_blank">
Public Pentesting Reports
&lt;/a>
– Curated list of public penetration test reports released by several consulting firms and academic security groups.&lt;/li>
&lt;li>&lt;a href="https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf" target="_blank">
Pentesting Report Template
&lt;/a>
– testandverification.com template.&lt;/li>
&lt;li>&lt;a href="https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf" target="_blank">
Pentesting Report Template
&lt;/a>
– hitachi-systems-security.com template.&lt;/li>
&lt;li>&lt;a href="http://lucideus.com/pdf/stw.pdf" target="_blank">
Pentesting Report Template
&lt;/a>
– lucideus.com template.&lt;/li>
&lt;li>&lt;a href="https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdf" target="_blank">
Pentesting Report Template
&lt;/a>
– crest-approved.org templage.&lt;/li>
&lt;li>&lt;a href="https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf" target="_blank">
Pentesting Report Template
&lt;/a>
– pcisecuritystandards.org template.&lt;/li>
&lt;/ul>
&lt;h2 id="vulnerability-databases--hacking-toolshttpsgithubcomenaqxawesome-pentestvulnerability-databases">&lt;a href="https://github.com/enaqx/awesome-pentest#vulnerability-databases" target="_blank">
&amp;lt;strong&amp;gt;Vulnerability Databases – Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#vulnerability-databases--hacking-toolshttpsgithubcomenaqxawesome-pentestvulnerability-databases" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://cve.mitre.org/" target="_blank">
Common Vulnerabilities and Exposures (CVE)
&lt;/a>
– Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.&lt;/li>
&lt;li>&lt;a href="https://nvd.nist.gov/" target="_blank">
National Vulnerability Database (NVD)
&lt;/a>
– United States government’s National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.&lt;/li>
&lt;li>&lt;a href="https://www.kb.cert.org/vuls/" target="_blank">
US-CERT Vulnerability Notes Database
&lt;/a>
– Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).&lt;/li>
&lt;li>&lt;a href="http://seclists.org/fulldisclosure/" target="_blank">
Full-Disclosure
&lt;/a>
– Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.&lt;/li>
&lt;li>&lt;a href="http://www.securityfocus.com/bid/" target="_blank">
Bugtraq (BID)
&lt;/a>
– Software security bug identification database compiled from submissions to the SecurityFocus mailing Penetration testing tools list and other sources, operated by Symantec, Inc.&lt;/li>
&lt;li>&lt;a href="https://www.exploit-db.com/" target="_blank">
Exploit-DB
&lt;/a>
– Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.&lt;/li>
&lt;li>&lt;a href="https://technet.microsoft.com/en-us/security/bulletins#sec_search" target="_blank">
Microsoft Security Bulletins
&lt;/a>
– Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).&lt;/li>
&lt;li>&lt;a href="https://technet.microsoft.com/en-us/security/advisories#APUMA" target="_blank">
Microsoft Security Advisories
&lt;/a>
– Archive of security advisories impacting Microsoft software.&lt;/li>
&lt;li>&lt;a href="https://www.mozilla.org/security/advisories/" target="_blank">
Mozilla Foundation Security Advisories
&lt;/a>
– Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.&lt;/li>
&lt;li>&lt;a href="https://packetstormsecurity.com/files/" target="_blank">
Packet Storm
&lt;/a>
– Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.&lt;/li>
&lt;li>&lt;a href="https://cxsecurity.com/" target="_blank">
CXSecurity
&lt;/a>
– Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.&lt;/li>
&lt;li>&lt;a href="http://www.securiteam.com/" target="_blank">
SecuriTeam
&lt;/a>
– Independent source of software vulnerability information.&lt;/li>
&lt;li>&lt;a href="https://www.vulnerability-lab.com/" target="_blank">
Vulnerability Lab
&lt;/a>
– Open forum for security advisories organized by category of exploit target.&lt;/li>
&lt;li>&lt;a href="http://zerodayinitiative.com/advisories/published/" target="_blank">
Zero Day Initiative
&lt;/a>
– Bug bounty program with the publicly accessible archive of published security advisories, operated by TippingPoint.&lt;/li>
&lt;li>&lt;a href="https://vulners.com/" target="_blank">
Vulners
&lt;/a>
– Security database of software vulnerabilities.&lt;/li>
&lt;li>&lt;a href="https://www.0day.today/" target="_blank">
Inj3ct0r
&lt;/a>
(&lt;a href="http://mvfjfugdwgc5uwho.onion/" target="_blank">
Onion service
&lt;/a>
) – Exploit marketplace and vulnerability information aggregator.&lt;/li>
&lt;li>&lt;a href="https://osvdb.org/" target="_blank">
Open Source Vulnerability Database (OSVDB)
&lt;/a>
– Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.Hacking Tools&lt;/li>
&lt;li>&lt;a href="https://hpi-vdb.de/" target="_blank">
HPI-VDB
&lt;/a>
– Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.Hacking Tools&lt;/li>
&lt;/ul>
&lt;h2 id="security-courses--hacking-tools--hacking-toolshttpsgithubcomenaqxawesome-pentestsecurity-courses">&lt;a href="https://github.com/enaqx/awesome-pentest#security-courses" target="_blank">
&amp;lt;strong&amp;gt;Security Courses – Hacking Tools – Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#security-courses--hacking-tools--hacking-toolshttpsgithubcomenaqxawesome-pentestsecurity-courses" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.offensive-security.com/information-security-training/" target="_blank">
Offensive Security Training
&lt;/a>
– Training from BackTrack/Kali developers.&lt;/li>
&lt;li>&lt;a href="http://www.sans.org/" target="_blank">
SANS Security Training
&lt;/a>
– Computer Security Training &amp;amp; Certification.&lt;/li>
&lt;li>&lt;a href="http://opensecuritytraining.info/" target="_blank">
Open Security Training
&lt;/a>
– Training material for computer security classes.&lt;/li>
&lt;li>&lt;a href="https://trailofbits.github.io/ctf/" target="_blank">
CTF Field Guide
&lt;/a>
– Everything you need to win your next CTF competition.&lt;/li>
&lt;li>&lt;a href="http://azcwr.org/" target="_blank">
ARIZONA CYBER WARFARE RANGE
&lt;/a>
– 24×7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.&lt;/li>
&lt;li>&lt;a href="http://cybrary.it/" target="_blank">
Cybrary
&lt;/a>
– Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book ‘Penetration Testing for Highly-Secured Environments’.&lt;/li>
&lt;li>&lt;a href="http://computersecuritystudent.com/" target="_blank">
Computer Security Student
&lt;/a>
– Many free tutorials, great for beginners, $10/mo membership unlocks all content.&lt;/li>
&lt;li>&lt;a href="https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material" target="_blank">
European Union Agency for Network and Information Security
&lt;/a>
– ENISA Cyber Security Training material.&lt;/li>
&lt;/ul>
&lt;h2 id="information-security-conferences--hacking-toolshttpsgithubcomenaqxawesome-pentestinformation-security-conferences">&lt;a href="https://github.com/enaqx/awesome-pentest#information-security-conferences" target="_blank">
&amp;lt;strong&amp;gt;Information Security Conferences – Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#information-security-conferences--hacking-toolshttpsgithubcomenaqxawesome-pentestinformation-security-conferences" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.defcon.org/" target="_blank">
DEF CON
&lt;/a>
– Annual hacker convention in Las Vegas.&lt;/li>
&lt;li>&lt;a href="http://www.blackhat.com/" target="_blank">
Black Hat
&lt;/a>
– Annual security conference in Las Vegas.&lt;/li>
&lt;li>&lt;a href="http://www.securitybsides.com/" target="_blank">
BSides
&lt;/a>
– Framework for organising and holding security conferences.&lt;/li>
&lt;li>&lt;a href="https://events.ccc.de/congress/" target="_blank">
CCC
&lt;/a>
– Annual meeting of the international hacker scene in Germany.&lt;/li>
&lt;li>&lt;a href="https://www.derbycon.com/" target="_blank">
DerbyCon
&lt;/a>
– Annual hacker conference based in Louisville.&lt;/li>
&lt;li>&lt;a href="http://phreaknic.info/" target="_blank">
PhreakNIC
&lt;/a>
– Technology conference held annually in middle Tennessee.&lt;/li>
&lt;li>&lt;a href="http://shmoocon.org/" target="_blank">
ShmooCon
&lt;/a>
– Annual US East coast hacker convention.&lt;/li>
&lt;li>&lt;a href="http://www.carolinacon.org/" target="_blank">
CarolinaCon
&lt;/a>
– Infosec conference, held annually in North Carolina.&lt;/li>
&lt;li>&lt;a href="https://2016.chcon.nz/" target="_blank">
CHCon
&lt;/a>
– Christchurch Hacker Con, Only South Island of New Zealand hacker con.&lt;/li>
&lt;li>&lt;a href="http://www.summercon.org/" target="_blank">
SummerCon
&lt;/a>
– One of the oldest hacker conventions, held during Summer.&lt;/li>
&lt;li>&lt;a href="https://2016.hack.lu/" target="_blank">
Hack.lu
&lt;/a>
– Annual conference held in Luxembourg.&lt;/li>
&lt;li>&lt;a href="https://hackfest.ca/" target="_blank">
Hackfest
&lt;/a>
– Largest hacking conference in Canada.&lt;/li>
&lt;li>&lt;a href="https://conference.hitb.org/" target="_blank">
HITB
&lt;/a>
– Deep-knowledge security conference held in Malaysia and The Netherlands.&lt;/li>
&lt;li>&lt;a href="https://www.troopers.de/" target="_blank">
Troopers
&lt;/a>
– Annual international IT Security event with workshops held in Heidelberg, Germany.&lt;/li>
&lt;li>&lt;a href="http://hack3rcon.org/" target="_blank">
Hack3rCon
&lt;/a>
– Annual US hacker conference.&lt;/li>
&lt;li>&lt;a href="http://thotcon.org/" target="_blank">
ThotCon
&lt;/a>
– Annual US hacker conference held in Chicago.&lt;/li>
&lt;li>&lt;a href="http://www.layerone.org/" target="_blank">
LayerOne
&lt;/a>
– Annual US security conference held every spring in Los Angeles.&lt;/li>
&lt;li>&lt;a href="https://deepsec.net/" target="_blank">
DeepSec
&lt;/a>
– Security Conference in Vienna, Austria.&lt;/li>
&lt;li>&lt;a href="http://www.skydogcon.com/" target="_blank">
SkyDogCon
&lt;/a>
– Technology conference in Nashville.&lt;/li>
&lt;li>&lt;a href="http://secuinside.com/" target="_blank">
SECUINSIDE
&lt;/a>
– Security Conference in &lt;a href="https://en.wikipedia.org/wiki/Seoul" target="_blank">
Seoul
&lt;/a>
.&lt;/li>
&lt;li>&lt;a href="http://def.camp/" target="_blank">
DefCamp
&lt;/a>
– Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.&lt;/li>
&lt;li>&lt;a href="https://2016.appsecusa.org/" target="_blank">
AppSecUSA
&lt;/a>
– Annual conference organized by OWASP.&lt;/li>
&lt;li>&lt;a href="http://brucon.org/" target="_blank">
BruCON
&lt;/a>
– Annual security conference in Belgium.&lt;/li>
&lt;li>&lt;a href="http://www.infosecurityeurope.com/" target="_blank">
Infosecurity Europe
&lt;/a>
– Europe’s number one information security event, held in London, UK.&lt;/li>
&lt;li>&lt;a href="http://nullcon.net/website/" target="_blank">
Nullcon
&lt;/a>
– Annual conference in Delhi and Goa, India.&lt;/li>
&lt;li>&lt;a href="https://www.rsaconference.com/" target="_blank">
RSA Conference USA
&lt;/a>
– Annual security conference in San Francisco, California, USA.&lt;/li>
&lt;li>&lt;a href="https://www.swisscyberstorm.com/" target="_blank">
Swiss Cyber Storm
&lt;/a>
– Annual security conference in Lucerne, Switzerland.&lt;/li>
&lt;li>&lt;a href="https://www.virusbulletin.com/conference/index" target="_blank">
Virus Bulletin Conference
&lt;/a>
– Annual conference going to be held in Denver, USA for 2016.&lt;/li>
&lt;li>&lt;a href="http://www.ekoparty.org/" target="_blank">
Ekoparty
&lt;/a>
– Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.&lt;/li>
&lt;li>&lt;a href="https://44con.com/" target="_blank">
44Con
&lt;/a>
– Annual Security Conference held in London.&lt;/li>
&lt;li>&lt;a href="https://www.balccon.org/" target="_blank">
BalCCon
&lt;/a>
– Balkan Computer Congress, annually held in Novi Sad, Serbia.&lt;/li>
&lt;li>&lt;a href="http://fsec.foi.hr/" target="_blank">
FSec
&lt;/a>
– FSec – Croatian Information Security Gathering in Varaždin, Croatia.&lt;/li>
&lt;/ul>
&lt;h2 id="information-security-magazines--hacking-toolshttpsgithubcomenaqxawesome-pentestinformation-security-magazines">&lt;a href="https://github.com/enaqx/awesome-pentest#information-security-magazines" target="_blank">
&amp;lt;strong&amp;gt;Information Security Magazines – Hacking Tools&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#information-security-magazines--hacking-toolshttpsgithubcomenaqxawesome-pentestinformation-security-magazines" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.2600.com/Magazine/DigitalEditions" target="_blank">
2600: The Hacker Quarterly
&lt;/a>
– American publication about technology and computer “underground.”&lt;/li>
&lt;li>&lt;a href="http://www.phrack.org/" target="_blank">
Phrack Magazine
&lt;/a>
– By far the longest running hacker zine.&lt;/li>
&lt;/ul>
&lt;h2 id="awesome-lists--hacking-tools-httpsgithubcomenaqxawesome-pentestawesome-lists">&lt;a href="https://github.com/enaqx/awesome-pentest#awesome-lists" target="_blank">
&amp;lt;strong&amp;gt;Awesome Lists – Hacking Tools –&amp;lt;/strong&amp;gt;
&lt;/a>
&lt;a href="#awesome-lists--hacking-tools-httpsgithubcomenaqxawesome-pentestawesome-lists" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://gbhackers.com/kalitutorials/" target="_blank">
Kali Linux Tools
&lt;/a>
– List of Hacking tools present in Kali Linux.&lt;/li>
&lt;li>&lt;a href="http://sectools.org/" target="_blank">
SecTools
&lt;/a>
– Top 125 Network Security Hacking Tools.&lt;/li>
&lt;li>&lt;a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets" target="_blank">
Pentest Cheat Sheets
&lt;/a>
– Awesome Pentest Cheat Sheets.&lt;/li>
&lt;li>&lt;a href="https://github.com/fffaraz/awesome-cpp" target="_blank">
C/C&amp;#43;&amp;#43; Programming
&lt;/a>
– One of the main language for open source security tools.&lt;/li>
&lt;li>&lt;a href="https://github.com/quozd/awesome-dotnet" target="_blank">
.NET Programming
&lt;/a>
– Software framework for Microsoft Windows platform development.&lt;/li>
&lt;li>&lt;a href="https://github.com/alebcay/awesome-shell" target="_blank">
Shell Scripting
&lt;/a>
– Command line frameworks, toolkits, guides and gizmos.&lt;/li>
&lt;li>&lt;a href="https://github.com/dreikanter/ruby-bookmarks" target="_blank">
Ruby Programming by @dreikanter
&lt;/a>
– The de-facto language for writing exploits.&lt;/li>
&lt;li>&lt;a href="https://github.com/markets/awesome-ruby" target="_blank">
Ruby Programming by @markets
&lt;/a>
– The de-facto language for writing exploits.&lt;/li>
&lt;li>&lt;a href="https://github.com/Sdogruyol/awesome-ruby" target="_blank">
Ruby Programming by @Sdogruyol
&lt;/a>
– The de-facto language for writing exploits.&lt;/li>
&lt;li>&lt;a href="https://github.com/sorrycc/awesome-javascript" target="_blank">
JavaScript Programming
&lt;/a>
– In-browser development and scripting.&lt;/li>
&lt;li>&lt;a href="https://github.com/sindresorhus/awesome-nodejs" target="_blank">
Node.js Programming by @sindresorhus
&lt;/a>
– Curated list of delightful Node.js packages and resources.&lt;/li>
&lt;li>&lt;a href="https://github.com/dloss/python-pentest-tools" target="_blank">
Python tools for penetration testers
&lt;/a>
– Lots of pentesting tools are written in Python.&lt;/li>
&lt;li>&lt;a href="https://github.com/svaksha/pythonidae" target="_blank">
Python Programming by @svaksha
&lt;/a>
– General Python programming.&lt;/li>
&lt;li>&lt;a href="https://github.com/vinta/awesome-python" target="_blank">
Python Programming by @vinta
&lt;/a>
– General Python programming.&lt;/li>
&lt;li>&lt;a href="https://github.com/ashishb/android-security-awesome" target="_blank">
Android Security
&lt;/a>
– Collection of Android security-related resources.&lt;/li>
&lt;li>&lt;a href="https://github.com/bayandin/awesome-awesomeness" target="_blank">
Awesome Awesomness
&lt;/a>
– The List of the Lists.&lt;/li>
&lt;li>&lt;a href="https://github.com/paragonie/awesome-appsec" target="_blank">
AppSec
&lt;/a>
– Resources for learning about application security.&lt;/li>
&lt;li>&lt;a href="https://github.com/apsdehal/awesome-ctf" target="_blank">
CTFs
&lt;/a>
– Capture The Flag frameworks, libraries, etc.&lt;/li>
&lt;li>&lt;a href="https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges" target="_blank">
InfoSec § Hacking challenges
&lt;/a>
– Comprehensive directory of CTFs, wargames, hacking challenge websites,Penetration testing tools list practice lab exercises, and more.&lt;/li>
&lt;li>&lt;a href="https://github.com/carpedm20/awesome-hacking" target="_blank">
Hacking
&lt;/a>
– Tutorials, tools, and resources.&lt;/li>
&lt;li>&lt;a href="https://github.com/paralax/awesome-honeypots" target="_blank">
Honeypots
&lt;/a>
– Honeypots, tools, components, and more.&lt;/li>
&lt;li>&lt;a href="https://github.com/onlurking/awesome-infosec" target="_blank">
Infosec
&lt;/a>
– Information security resources for pentesting, forensics, and more.&lt;/li>
&lt;li>&lt;a href="https://github.com/Cugu/awesome-forensics" target="_blank">
Forensics
&lt;/a>
– Free (mostly open source) forensic analysis tools and resources.&lt;/li>
&lt;li>&lt;a href="https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/" target="_blank">
Malware Analysis
&lt;/a>
– Tools and resources for analysts.&lt;/li>
&lt;li>&lt;a href="https://github.com/caesar0301/awesome-pcaptools" target="_blank">
PCAP Tools
&lt;/a>
– Tools for processing network traffic.&lt;/li>
&lt;li>&lt;a href="https://github.com/sbilly/awesome-security" target="_blank">
Security
&lt;/a>
– Software, libraries, documents, and other resources.&lt;/li>
&lt;li>&lt;a href="https://github.com/meitar/awesome-lockpicking" target="_blank">
Awesome Lockpicking
&lt;/a>
– Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys.&lt;/li>
&lt;li>&lt;a href="https://github.com/danielmiessler/SecLists" target="_blank">
SecLists
&lt;/a>
– Collection of multiple types of lists used during security assessments.&lt;/li>
&lt;li>&lt;a href="https://github.com/PaulSec/awesome-sec-talks" target="_blank">
Security Talks
&lt;/a>
– Curated list of security conferences.&lt;/li>
&lt;li>&lt;a href="https://github.com/jivoi/awesome-osint" target="_blank">
OSINT
&lt;/a>
– Awesome OSINT list containing great resources.&lt;/li>
&lt;li>&lt;a href="https://github.com/InQuest/awesome-yara" target="_blank">
YARA
&lt;/a>
– YARA rules, tools, and people.&lt;/li>
&lt;/ul>
&lt;h2 id="security-stuffs">Security stuffs &lt;a href="#security-stuffs" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://github.com/sbilly/awesome-security" target="_blank">
&amp;lt;strong&amp;gt;Awesome security&amp;lt;/strong&amp;gt;
&lt;/a>
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.&lt;/li>
&lt;/ul>
&lt;p>&lt;a href="https://gbhackers.com/hacking-tools-list/" target="_blank">
Source
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2020/01/31/hacking-tools/</guid><pubDate>Fri, 31 Jan 2020 00:00:00 +0000</pubDate></item><item><title>Noisy</title><link>/2019/09/08/noisy/</link><description>&lt;h1 id="noisy">Noisy &lt;a href="#noisy" class="hash">#&lt;/a>&lt;/h1>
&lt;p>A simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity.&lt;/p>
&lt;p>Tested on MacOS High Sierra, Ubuntu 16.04 and Raspbian Stretch and is compatable with both Python 2.7 and 3.6&lt;/p>
&lt;h2 id="getting-started">Getting Started &lt;a href="#getting-started" class="hash">#&lt;/a>&lt;/h2>
&lt;p>These instructions will get you a copy of the project up and running on your local machine&lt;/p>
&lt;h3 id="dependencies">Dependencies &lt;a href="#dependencies" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Install &lt;code>requests&lt;/code> if you do not have it already installed, using &lt;code>pip&lt;/code>:&lt;/p>
&lt;pre>&lt;code>pip install requests
&lt;/code>&lt;/pre>
&lt;h3 id="usage">Usage &lt;a href="#usage" class="hash">#&lt;/a>&lt;/h3>
&lt;p>Clone the repository&lt;/p>
&lt;pre>&lt;code>git clone https://github.com/1tayH/noisy.git
&lt;/code>&lt;/pre>
&lt;p>Navigate into the &lt;code>noisy&lt;/code> directory&lt;/p>
&lt;pre>&lt;code>cd noisy
&lt;/code>&lt;/pre>
&lt;p>Run the script&lt;/p>
&lt;pre>&lt;code>python3 noisy.py --config config.json
&lt;/code>&lt;/pre>
&lt;p>The program can accept a number of command line arguments:&lt;/p>
&lt;pre>&lt;code>$ python noisy.py --help
usage: noisy.py [-h] [--log -l] --config -c [--timeout -t]
optional arguments:
-h, --help show this help message and exit
--log -l logging level
--config -c config file
--timeout -t for how long the crawler should be running, in seconds
&lt;/code>&lt;/pre>
&lt;p>only the config file argument is required.&lt;/p>
&lt;h3 id="output">Output &lt;a href="#output" class="hash">#&lt;/a>&lt;/h3>
&lt;pre>&lt;code>$ docker run -it noisy --config config.json --log debug
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): 4chan.org:80
DEBUG:urllib3.connectionpool:http://4chan.org:80 &amp;quot;GET / HTTP/1.1&amp;quot; 301 None
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): www.4chan.org:80
DEBUG:urllib3.connectionpool:http://www.4chan.org:80 &amp;quot;GET / HTTP/1.1&amp;quot; 200 None
DEBUG:root:found 92 links
INFO:root:Visiting http://boards.4chan.org/s4s/
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): boards.4chan.org:80
DEBUG:urllib3.connectionpool:http://boards.4chan.org:80 &amp;quot;GET /s4s/ HTTP/1.1&amp;quot; 200 None
INFO:root:Visiting http://boards.4chan.org/s4s/thread/6850193#p6850345
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): boards.4chan.org:80
DEBUG:urllib3.connectionpool:http://boards.4chan.org:80 &amp;quot;GET /s4s/thread/6850193 HTTP/1.1&amp;quot; 200 None
INFO:root:Visiting http://boards.4chan.org/o/
DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): boards.4chan.org:80
DEBUG:urllib3.connectionpool:http://boards.4chan.org:80 &amp;quot;GET /o/ HTTP/1.1&amp;quot; 200 None
DEBUG:root:Hit a dead end, moving to the next root URL
DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): www.reddit.com:443
DEBUG:urllib3.connectionpool:https://www.reddit.com:443 &amp;quot;GET / HTTP/1.1&amp;quot; 200 None
DEBUG:root:found 237 links
INFO:root:Visiting https://www.reddit.com/user/Saditon
DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): www.reddit.com:443
DEBUG:urllib3.connectionpool:https://www.reddit.com:443 &amp;quot;GET /user/Saditon HTTP/1.1&amp;quot; 200 None
...
&lt;/code>&lt;/pre>
&lt;h2 id="build-using-docker">Build Using Docker &lt;a href="#build-using-docker" class="hash">#&lt;/a>&lt;/h2>
&lt;ol>
&lt;li>Build the image&lt;/li>
&lt;/ol>
&lt;p>&lt;code>docker build -t noisy .&lt;/code>&lt;/p>
&lt;p>&lt;strong>Or&lt;/strong> if you&amp;rsquo;d like to build it for a &lt;strong>Raspberry Pi&lt;/strong> (running Raspbian stretch):&lt;/p>
&lt;p>&lt;code>docker build -f Dockerfile.pi -t noisy .&lt;/code>&lt;/p>
&lt;ol>
&lt;li>Create the container and run:&lt;/li>
&lt;/ol>
&lt;p>&lt;code>docker run -it noisy --config config.json&lt;/code>&lt;/p>
&lt;h2 id="custom-noisyconf-file">Custom noisy.conf file: &lt;a href="#custom-noisyconf-file" class="hash">#&lt;/a>&lt;/h2>
&lt;p>&lt;a href="https://github.com/holdTheDoorHoid/NoisyConfigg/blob/master/config.json" target="_blank">
Noisy.conf
&lt;/a>
&lt;/p></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2019/09/08/noisy/</guid><pubDate>Sun, 08 Sep 2019 00:00:00 +0000</pubDate></item><item><title>Scheduling a shutdown</title><link>/2019/09/08/shutdown-schedule/</link><description>&lt;h2 id="scheduling-a-shutdown">Scheduling a shutdown &lt;a href="#scheduling-a-shutdown" class="hash">#&lt;/a>&lt;/h2>
&lt;p>To shutdown run the command:&lt;/p>
&lt;blockquote>
&lt;p>sudo shutdown -P +60&lt;/p>
&lt;/blockquote>
&lt;p>That will wait 60 mins before starting the shutdown sequence.&lt;/p>
&lt;p>You could do:&lt;/p>
&lt;blockquote>
&lt;p>sudo shutdown -P 1:00&lt;/p>
&lt;/blockquote>
&lt;p>to shutdown at 1 AM and&lt;/p>
&lt;blockquote>
&lt;p>sudo shutdown -P now&lt;/p>
&lt;/blockquote>
&lt;p>to shutdown now.&lt;/p>
&lt;p>A message is broadcast to all terminals to warn about the shutdown.&lt;/p>
&lt;p>Cancel a pending shutdown After, starting a shutdown, if the time argument is not &amp;ldquo;+0&amp;rdquo; or &amp;ldquo;now&amp;rdquo;, you can use:&lt;/p>
&lt;blockquote>
&lt;p>sudo shutdown -c&lt;/p>
&lt;/blockquote></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/2019/09/08/shutdown-schedule/</guid><pubDate>Sun, 08 Sep 2019 00:00:00 +0000</pubDate></item><item><title/><link>/1/01/01/russian-moltiplication/</link><description>&lt;h2 id="decentralization">Decentralization &lt;a href="#decentralization" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Digital technology decentralization: &lt;a href="https://redecentralize.org/" target="_blank">
Redecentralize
&lt;/a>
&lt;/li>
&lt;li>Decentralized search alternative &lt;a href="https://yacy.net/" target="_blank">
Yacy
&lt;/a>
&lt;/li>
&lt;li>Ethereum development knowledge: &lt;a href="https://kauri.io/" target="_blank">
Kauri
&lt;/a>
&lt;/li>
&lt;li>Ethereum Name Service: &lt;a href="https://app.ens.domains" target="_blank">
Ens Domain
&lt;/a>
&lt;/li>
&lt;li>Ethereum distribuited platform: &lt;a href="https://swarm-gateways.net" target="_blank">
Swarm
&lt;/a>
&lt;/li>
&lt;li>Dweb search engine: &lt;a href="https://ipfs.io/ipns/almonit.eth.link/#/discover" target="_blank">
Almonit
&lt;/a>
&lt;/li>
&lt;li>IPFS pinning service: &lt;a href="https://pinata.cloud" target="_blank">
Pinata
&lt;/a>
&lt;/li>
&lt;li>Tutorials on decentralized web protocols: &lt;a href="https://proto.school" target="_blank">
ProtoSchool
&lt;/a>
&lt;/li>
&lt;li>Resources for Dat Project: &lt;a href="https://github.com/dat-land/awesome-dat" target="_blank">
AwesomeDat
&lt;/a>
&lt;/li>
&lt;li>Dat Protocol Forum: &lt;a href="https://dat.discourse.group/" target="_blank">
Dat Discourse
&lt;/a>
&lt;/li>
&lt;li>P2P chat platform: &lt;a href="https://cabal.chat/download.html" target="_blank">
Cabal
&lt;/a>
&lt;/li>
&lt;li>Searching the universe: &lt;a href="https://ipfs-search.com" target="_blank">
IPFS Search
&lt;/a>
&lt;/li>
&lt;li>Email services for Ethereum community: &lt;a href="https://ethmail.cc/" target="_blank">
ETHMail
&lt;/a>
&lt;/li>
&lt;li>Recommended Gas Prices in Gwei: &lt;a href="https://ethgasstation.info/" target="_blank">
ETH Gas Station
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="utility">Utility &lt;a href="#utility" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Markdown editor on line: &lt;a href="https://demo.hedgedoc.org/" target="_blank">
Headge
&lt;/a>
&lt;/li>
&lt;li>Receive and send emails anonymously: &lt;a href="https://simplelogin.io/" target="_blank">
Simplelogin
&lt;/a>
&lt;/li>
&lt;li>Local ad blocker: &lt;a href="https://github.com/tanrax/maza-ad-blocking" target="_blank">
Maza ad blocker
&lt;/a>
&lt;/li>
&lt;li>Break out of localhost: &lt;a href="https://telebit.cloud/" target="_blank">
Telebit
&lt;/a>
&lt;/li>
&lt;li>Stay safe online: &lt;a href="https://restoreprivacy.com/" target="_blank">
Restore privacy
&lt;/a>
&lt;/li>
&lt;li>Share encrypted text and code snippets: &lt;a href="https://hackerpaste.hns.siasky.net/" target="_blank">
Hackerpaste
&lt;/a>
&lt;/li>
&lt;li>Enforce privacy &amp;amp; security on Windows: &lt;a href="https://privacy.sexy/" target="_blank">
Privacy.Sexy/
&lt;/a>
&lt;/li>
&lt;li>Storing your text: &lt;a href="https://www.protectedtext.com/" target="_blank">
Protectedtext
&lt;/a>
&lt;/li>
&lt;li>Search engine for PDF files: &lt;a href="https://www.pdfdrive.com/" target="_blank">
Pendrive
&lt;/a>
&lt;/li>
&lt;li>Share your localhost environment: &lt;a href="http://localhost.run/" target="_blank">
LocalHostRun
&lt;/a>
&lt;/li>
&lt;li>Digital poetry book: &lt;a href="https://temper.jonaspelzer.com" target="_blank">
Temper
&lt;/a>
&lt;/li>
&lt;li>Email pwned check: &lt;a href="https://haveibeenpwned.com/" target="_blank">
Have i been pwned?
&lt;/a>
&lt;/li>
&lt;li>Temp Email: &lt;a href="https://hnet.com/mail/" target="_blank">
Hnet
&lt;/a>
&lt;/li>
&lt;li>Generate secure password: &lt;a href="https://passwordsgenerator.net/" target="_blank">
Pwd Gen
&lt;/a>
&lt;/li>
&lt;li>Anonymous URL Shortener: &lt;a href="https://anon.to" target="_blank">
Anon.to
&lt;/a>
&lt;/li>
&lt;li>Privacy Eyewear: &lt;a href="https://www.reflectacles.com/" target="_blank">
Reflectacles
&lt;/a>
&lt;/li>
&lt;li>Block ads and malwares with hosts files: &lt;a href="https://github.com/StevenBlack/hosts" target="_blank">
StevenBlack/hosts
&lt;/a>
&lt;/li>
&lt;li>Diagram with anyone: &lt;a href="https://www.diagrams.net/" target="_blank">
Diagrams
&lt;/a>
&lt;/li>
&lt;li>OSINT research tool: &lt;a href="https://synapsint.com/index.php" target="_blank">
SynapsInt
&lt;/a>
&lt;/li>
&lt;li>Convert to markdown: &lt;a href="https://euangoddard.github.io/clipboard2markdown/" target="_blank">
Past to markdown
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="hacking">Hacking &lt;a href="#hacking" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Security podcasts: &lt;a href="https://dayzerosec.com/" target="_blank">
Day0
&lt;/a>
&lt;/li>
&lt;li>Free class for web security: &lt;a href="https://www.hacker101.com/" target="_blank">
Hacker101
&lt;/a>
&lt;/li>
&lt;li>Hackers conference: &lt;a href="https://www.defcon.org/index.html" target="_blank">
DEFCon
&lt;/a>
&lt;/li>
&lt;li>Shared community password recovery: &lt;a href="https://hashes.org/" target="_blank">
Hashes
&lt;/a>
&lt;/li>
&lt;li>Some free E-book: &lt;a href="https://please.dont-hack.me/books/hacking/" target="_blank">
Plese don&amp;amp;rsquo;t hack me
&lt;/a>
&lt;/li>
&lt;li>A collection of awesome write-ups: &lt;a href="https://medium.com/bugbountywriteup" target="_blank">
InfoSeccWriteUp
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="surfing">Surfing &lt;a href="#surfing" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Playlists algorithmically-generated: &lt;a href="http://everynoise.com/" target="_blank">
Every Noise at Once
&lt;/a>
&lt;/li>
&lt;li>Social Bookmarking for Introverts: &lt;a href="https://pinboard.in/" target="_blank">
Pinboard
&lt;/a>
&lt;/li>
&lt;li>The final heartbeats of our beloved www: &lt;a href="https://href.cool/" target="_blank">
Href.Cool
&lt;/a>
&lt;/li>
&lt;li>Linking the hypertext kingdom: &lt;a href="https://www.kickscondor.com/" target="_blank">
Kickscondor
&lt;/a>
&lt;/li>
&lt;li>Alternative Twitter front-end: &lt;a href="https://nitter.net/" target="_blank">
Nitter
&lt;/a>
&lt;/li>
&lt;li>Alternative Youtube front-end: &lt;a href="https://invidio.us/" target="_blank">
Invidious
&lt;/a>
&lt;/li>
&lt;li>StyleGan2 face generator: &lt;a href="https://www.thispersondoesnotexist.com/" target="_blank">
StyleGAN 2
&lt;/a>
&lt;/li>
&lt;li>A computer science portal: &lt;a href="https://www.geeksforgeeks.org/" target="_blank">
Geeks for Geeks
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="gaming">Gaming &lt;a href="#gaming" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Minimal, casual chess app: &lt;a href="https://e4e5.app" target="_blank">
e4e5
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="code">Code &lt;a href="#code" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Tutorials for programmers: &lt;a href="http://zetcode.com/" target="_blank">
ZetCode
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="music">Music &lt;a href="#music" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>Some Heresy noise: &lt;a href="https://heresy.london/noise" target="_blank">
Heresy
&lt;/a>
&lt;/li>
&lt;li>Ambient: &lt;a href="https://soundcloud.com/cargocollective/" target="_blank">
CargoCollectiveSoundcloud
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="http://thisisgetme.com/" target="_blank">
Thisisgetme
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="photography">Photography &lt;a href="#photography" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.moriyamadaido.com/en/" target="_blank">
Daido Moriyama
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://mem-inc.jp/artists_e/shigeru-onishi/" target="_blank">
Shigeru Onishi
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="http://oliviabee.com/" target="_blank">
Olivia Bee
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.youtube.com/watch?v=ga6ZwfsS1cA" target="_blank">
Tokio Noise
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.youtube.com/watch?v=gyCumQ78ZoI" target="_blank">
Wabi-Sabi Photography
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.rennieellis.com.au/" target="_blank">
Rennie Ellis
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://photogpedia.com/saul-leiter-quotes/" target="_blank">
Saul Leiter
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://americansuburbx.com/2010/06/takuma-nakahira-portrait-of-takuma.html" target="_blank">
Takuma Nakahira
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://erickimphotography.com/blog/2012/08/27/10-things-anders-petersen-can-teach-you-about-street-photography/" target="_blank">
10 Things Anders Petersen Can Teach You About Street Photography
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://vimeo.com/368781600" target="_blank">
A film with and about Anders Petersen
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://fkmagazine.lv/2012/01/30/interview-with-anders-petersen/" target="_blank">
Interview with Anders Petersen
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="http://stephenshore.net/" target="_blank">
Stephen Shore
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.hartmanfineart.net//artist/issei-suda" target="_blank">
Issei Suda
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://japan-photo.info/yutaka-takanashi-towards-the-city-including-a-short-history-of-the-provoke-era-part-3/" target="_blank">
Yutaka Takanashi – Towards the City
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://ed-templeton.com/" target="_blank">
Ed Templeton
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.martinparr.com/" target="_blank">
Martin Parr
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.hugomichellgallery.com/portfolio/trent-parke/minutes-to-midnight/" target="_blank">
Trent Parke
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="recipes">Recipes &lt;a href="#recipes" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.youtube.com/watch?v=rZighZxBMqQ" target="_blank">
Chinese steamed buns
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://www.youtube.com/watch?v=J7lL82jLflc" target="_blank">
Mozzarella at home
&lt;/a>
&lt;/li>
&lt;li>&lt;a href="https://p.teknik.io/Raw/GFGG9" target="_blank">
Salt ratio table
&lt;/a>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="terra">Terra &lt;a href="#terra" class="hash">#&lt;/a>&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://www.youtube.com/watch?v=0Os-ujelkgw" target="_blank">
Terra preta
&lt;/a>
&lt;/li>
&lt;/ul></description><author>ronalds.vilcins@gmail.com (Ronalds Vilcins)</author><guid>/1/01/01/russian-moltiplication/</guid><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate></item></channel></rss>