1. Disable the following Packages:
pm disable-user --user 0 com.LogiaGroup.LogiaDeck
pm disable-user --user 0 com.amazon.appmanager
pm disable-user --user 0 com.android.backupconfirm
pm disable-user --user 0 com.android.bips
pm disable-user --user 0 com.android.bookmarkprovider
pm disable-user --user 0 com.android.calllogbackup
pm disable-user --user 0 com.android.chrome
pm disable-user --user 0 com.android.dreams.basic
pm disable-user --user 0 com.android.hotwordenrollment.okgoogle
pm disable-user --user 0 com.android.hotwordenrollment.tgoogle
pm disable-user --user 0 com.android.hotwordenrollment.xgoogle
pm disable-user --user 0 com.android.internal.display.cutout.emulation.corner
pm disable-user --user 0 com.android.internal.display.cutout.emulation.double
pm disable-user --user 0 com.android.internal.display.cutout.emulation.noCutout
pm disable-user --user 0 com.android.internal.display.cutout.emulation.tall
pm disable-user --user 0 com.android.nfc
pm disable-user --user 0 com.android.printspooler
pm disable-user --user 0 com.android.providers.calendar
pm disable-user --user 0 com.android.providers.partnerbookmarks
pm disable-user --user 0 com.android.proxyhandler
pm disable-user --user 0 com.android.sharedstoragebackup
pm disable-user --user 0 com.android.wallpaper.livepicker
pm disable-user --user 0 com.android.wallpaperbackup
pm disable-user --user 0 com.customermobile.preload.vzw
pm disable-user --user 0 com.discoveryscreen
pm disable-user --user 0 com.google.android.apps.docs
pm disable-user --user 0 com.google.android.apps.inputmethod.zhuyin
pm disable-user --user 0 com.google.android.apps.restore
pm disable-user --user 0 com.google.android.apps.tachyon
pm disable-user --user 0 com.google.android.apps.turbo
pm disable-user --user 0 com.google.android.apps.wallpaper
pm disable-user --user 0 com.google.android.apps.work.oobconfig
pm disable-user --user 0 com.google.android.backuptransport
pm disable-user --user 0 com.google.android.calendar
pm disable-user --user 0 com.google.android.feedback
pm disable-user --user 0 com.google.android.gm
pm disable-user --user 0 com.google.android.googlequicksearchbox
pm disable-user --user 0 com.google.android.inputmethod.japanese
pm disable-user --user 0 com.google.android.inputmethod.korean
pm disable-user --user 0 com.google.android.inputmethod.pinyin
pm disable-user --user 0 com.google.android.marvin.talkback
pm disable-user --user 0 com.google.android.onetimeinitializer
pm disable-user --user 0 com.google.android.partnersetup
pm disable-user --user 0 com.google.android.printservice.recommendation
pm disable-user --user 0 com.google.android.setupwizard
pm disable-user --user 0 com.google.android.syncadapters.contacts
pm disable-user --user 0 com.google.android.tag
pm disable-user --user 0 com.google.android.tts
pm disable-user --user 0 com.google.android.videos
pm disable-user --user 0 com.lenovo.FileBrowser2
pm disable-user --user 0 com.lenovo.lsf.user
pm disable-user --user 0 com.motorola.actions
pm disable-user --user 0 com.motorola.android.buacloudcontactadapter
pm disable-user --user 0 com.motorola.android.nativedropboxagent
pm disable-user --user 0 com.motorola.arselfie
pm disable-user --user 0 com.motorola.audiomonitor
pm disable-user --user 0 com.motorola.bug2go
pm disable-user --user 0 com.motorola.camera2
pm disable-user --user 0 com.motorola.cameramod
pm disable-user --user 0 com.motorola.contacts.preloadcontacts
pm disable-user --user 0 com.motorola.demo
pm disable-user --user 0 com.motorola.demo.env
pm disable-user --user 0 com.motorola.email
pm disable-user --user 0 com.motorola.faceunlock
pm disable-user --user 0 com.motorola.faceunlocktrustagent
pm disable-user --user 0 com.motorola.genie
pm disable-user --user 0 com.motorola.imagertuning_messi
pm disable-user --user 0 com.motorola.mot5gmod
pm disable-user --user 0 com.motorola.motocare
pm disable-user --user 0 com.motorola.motocare.internal
pm disable-user --user 0 com.motorola.motosignature.app
pm disable-user --user 0 com.motorola.mya
pm disable-user --user 0 com.motorola.nfc
pm disable-user --user 0 com.motorola.nfcui
pm disable-user --user 0 com.motorola.paks
pm disable-user --user 0 com.motorola.photoeditor
pm disable-user --user 0 com.motorola.projectormod
pm disable-user --user 0 com.motorola.setup
pm disable-user --user 0 com.motorola.setupwizard.controller
pm disable-user --user 0 com.motorola.setupwizard.devicesetup
pm disable-user --user 0 com.motorola.voiceauthtrustagent
pm disable-user --user 0 com.motorola.vzw.cloudsetup
pm disable-user --user 0 com.motorola.vzw.loader
pm disable-user --user 0 com.motorola.vzw.mot5gmod
pm disable-user --user 0 com.motorola.vzw.phone.extensions
pm disable-user --user 0 com.motorola.vzw.settings.extensions
pm disable-user --user 0 com.motorola.wallpaper.parallax
pm disable-user --user 0 com.securityandprivacy.android.verizon.vms
pm disable-user --user 0 com.telecomsys.directedsms.android.SCG
pm disable-user --user 0 com.vcast.mediamanager
pm disable-user --user 0 com.verizon.llkagent
pm disable-user --user 0 com.verizon.messaging.vzmsgs
pm disable-user --user 0 com.verizon.mips.services
pm disable-user --user 0 com.verizontelematics.verizonhum
pm disable-user --user 0 com.vzw.hss.myverizon
pm disable-user --user 0 com.vzw.qualitydatalog
2. Disable Wake Lock:
cmd appops set com.amazon.mShop.android.shopping WAKE_LOCK ignore
cmd appops set com.statefarm.pocketagent WAKE_LOCK ignore
cmd appops set com.nextdoor WAKE_LOCK ignore
cmd appops set com.cisco.wx2.android WAKE_LOCK ignore
cmd appops set com.roku.remote WAKE_LOCK ignore
cmd appops set com.tmkeen.alquran WAKE_LOCK ignore
cmd appops set com.cloudmosa.puffin WAKE_LOCK ignore
cmd appops set com.zillow.android.zillowmap WAKE_LOCK ignore
cmd appops set com.whatsapp WAKE_LOCK ignore
cmd appops set com.nest.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.authenticator2 WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.paypal.android.p2pmobile WAKE_LOCK ignore
cmd appops set ch.protonmail.android WAKE_LOCK ignore
cmd appops set com.symantec.cleansweep WAKE_LOCK ignore
cmd appops set com.duosecurity.duomobile WAKE_LOCK ignore
cmd appops set us.zoom.videomeetings WAKE_LOCK ignore
cmd appops set com.waze WAKE_LOCK ignore
cmd appops set com.microsoft.office.onenote WAKE_LOCK ignore
cmd appops set com.microsoft.emmx WAKE_LOCK ignore
cmd appops set org.thoughtcrime.securesms WAKE_LOCK ignore
cmd appops set com.microsoft.office.outlook WAKE_LOCK ignore
cmd appops set com.subway.mobile.subwayapp03 WAKE_LOCK ignore
cmd appops set epic.mychart.android WAKE_LOCK ignore
cmd appops set com.bestbuy.android WAKE_LOCK ignore
cmd appops set com.adguard.android WAKE_LOCK ignore
cmd appops set com.starbucks.mobilecard WAKE_LOCK ignore
cmd appops set com.twitter.android WAKE_LOCK ignore
cmd appops set com.netflix.mediaclient WAKE_LOCK ignore
cmd appops set com.tripadvisor.tripadvisor WAKE_LOCK ignore
cmd appops set com.x8bit.bitwarden WAKE_LOCK ignore
cmd appops set com.ubercab WAKE_LOCK ignore
cmd appops set com.amazon.avod.thirdpartyclient WAKE_LOCK ignore
cmd appops set com.ubnt.unifihome WAKE_LOCK ignore
cmd appops set com.chase.sig.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.translate WAKE_LOCK ignore
cmd appops set com.oasisfeng.greenify.pro WAKE_LOCK ignore
cmd appops set com.linkedin.android WAKE_LOCK ignore
cmd appops set com.cisco.webex.meetings WAKE_LOCK ignore
cmd appops set com.google.android.apps.chromecast.app WAKE_LOCK ignore
cmd appops set com.americanexpress.android.acctsvcs.us WAKE_LOCK ignore
cmd appops set com.netgear.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.pdfviewer WAKE_LOCK ignore
cmd appops set com.google.android.keep WAKE_LOCK ignore
cmd appops set com.azure.authenticator WAKE_LOCK ignore
cmd appops set securecomputing.devices.android.controller WAKE_LOCK ignore
cmd appops set com.google.android.GoogleCamera WAKE_LOCK ignore
cmd appops set com.google.android.apps.maps WAKE_LOCK ignore
cmd appops set com.google.android.youtube WAKE_LOCK ignore
cmd appops set com.lmi.motorola.rescuesecurity WAKE_LOCK ignore
Sunday, June 9, 2019
Monday, June 3, 2019
Improve Android Battery with WAKE_LOCK
Run shell:
./adb shell
Example of disabled packages:
cmd appops set ch.protonmail.android WAKE_LOCK ignore
cmd appops set com.airbnb.android WAKE_LOCK ignore
cmd appops set com.amazon.appmanager WAKE_LOCK ignore
cmd appops set com.amazon.avod.thirdpartyclient WAKE_LOCK ignore
cmd appops set com.amazon.mShop.android.shopping WAKE_LOCK ignore
cmd appops set com.americanexpress.android.acctsvcs.us WAKE_LOCK
cmd appops set com.bestbuy.android WAKE_LOCK ignore
cmd appops set com.chrome.canary WAKE_LOCK ignore
cmd appops set com.cisco.webex.meetings WAKE_LOCK ignore
cmd appops set com.cloudmosa.puffin WAKE_LOCK ignore
cmd appops set com.costco.app.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.authenticator2 WAKE_LOCK ignore
cmd appops set com.google.android.calculator WAKE_LOCK ignore
cmd appops set com.google.android.youtube WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.linkedin.android WAKE_LOCK ignore
cmd appops set com.microsoft.office.officelens WAKE_LOCK ignore
cmd appops set com.microsoft.office.onenote WAKE_LOCK ignore
cmd appops set com.move.realtor WAKE_LOCK ignore
cmd appops set com.nest.android WAKE_LOCK ignore
cmd appops set com.netflix.mediaclient WAKE_LOCK ignore
cmd appops set com.nextdoor WAKE_LOCK ignore
cmd appops set com.paypal.android.p2pmobile WAKE_LOCK ignore
cmd appops set com.roku.remote WAKE_LOCK ignore
cmd appops set com.starbucks.mobilecard WAKE_LOCK ignore
cmd appops set com.statefarm.pocketagent WAKE_LOCK ignore
cmd appops set com.subway.mobile.subwayapp03 WAKE_LOCK ignore
cmd appops set com.symantec.cleansweep WAKE_LOCK ignore
cmd appops set com.target.ui WAKE_LOCK ignore
cmd appops set com.tmkeen.alquran WAKE_LOCK ignore
cmd appops set com.tripadvisor.tripadvisor WAKE_LOCK ignore
cmd appops set com.twitter.android WAKE_LOCK ignore
cmd appops set com.ubercab WAKE_LOCK ignore
cmd appops set com.ubnt.unifihome WAKE_LOCK ignore
cmd appops set com.waze WAKE_LOCK ignore
cmd appops set com.x8bit.bitwarden WAKE_LOCK ignore
cmd appops set com.zillow.android.zillowmap WAKE_LOCK ignore
cmd appops set epic.mychart.android WAKE_LOCK ignore
cmd appops set us.zoom.videomeetings WAKE_LOCK ignore
Tuesday, May 21, 2019
Pi Hole DHCP
sudo systemctl stop dhcpcd.service
sudo nano dhcp.leases
sudo systemctl restart dhcpcd.service
systemctl status dhcpcd.service
sudo systemctl daemon-reload
Tuesday, April 23, 2019
Tweak PI-Hole so Query Log and Long Term Queries Display in 100 Rows
This can be changed here
/var/www/html/admin/scripts/pi-hole/js/queries.js:
sudo nano /var/www/html/admin/scripts/pi-hole/js/queries.js
Go down to:
"lengthMenu": [[10, 25, 50, 100, -1], [10, 25, 50, 100, "All"]],
and delete both number 10's to default it to 25, etc.
/var/www/html/admin/scripts/pi-hole/js/queries.js On the line that says
APIstring += "=100"
100 is the amount of queries displayed by default in Query Log. You can change that to display up to 500:
APIstring += "=500"
/var/www/html/admin/scripts/pi-hole/js/queries.js:
sudo nano /var/www/html/admin/scripts/pi-hole/js/queries.js
Go down to:
"lengthMenu": [[10, 25, 50, 100, -1], [10, 25, 50, 100, "All"]],
and delete both number 10's to default it to 25, etc.
/var/www/html/admin/scripts/pi-hole/js/queries.js On the line that says
APIstring += "=100"
100 is the amount of queries displayed by default in Query Log. You can change that to display up to 500:
APIstring += "=500"
Thursday, April 11, 2019
Tweak Pi-Hole so logging won't burn out your SD card
Connect to Pi-Hole:
ssh pi@
Run:
sudo nano /etc/pihole/pihole-FTL.conf
Add the following
PRIVACYLEVEL=0
DBINTERVAL=60
MAXDBDAYS=7
ssh pi@
Run:
sudo nano /etc/pihole/pihole-FTL.conf
Add the following
PRIVACYLEVEL=0
DBINTERVAL=60
MAXDBDAYS=7
Wednesday, April 10, 2019
Pi-Hole Blocking via Regex
BLOCKINGREGEX=^ab.+\.com$will block all domains that start with “ab” (
^ab
), have at least one further character (.+
) and end in “.com” (\.com$
).Examples for what would be blocked by this rule:
abc.com
abtest.com
ab.test.com
abr-------.whatever.com
testab.com
(the domain doesn’t start with “ab”)tab.test.com
(the domain doesn’t start with “ab”)ab.com
(there is no character in between “ab” and “.com”)test.com.something
(the domain doesn’t end in “.com”)
(^|\.)ru$
will block the entire TLD .(.ru
). Examples for what would be blocked by this rule:abc.ru
Sunday, April 7, 2019
Disable macOS Mojave Services The Right Way
- Disable SIP in recovery mode
$ csrutil disable
and reboot.
- Add services you want to disable to
/System/Library/Sandbox/com.apple.xpc.launchd.rootless.plist.
For example, if you want to disable 'apsd', do the following:
$ sudo nano /System/Library/Sandbox/com.apple.xpc.launchd.rootless.plist
Add key(s) at bottom:
com.apple.apsd
- Unload agents and daemons previously added to the whitelist
$ launchctl unload -w
or$ sudo launchctl unload -w
For example:
$ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.apsd.plist
- Reboot on recovery mode and enable SIP again with
$ csrutil enable
.
- Reboot again and agents and daemons will be unloaded with SIP enabled.
Some services I have disabled:
<key>com.apple.Safari.SafeBrowsing.Service.plist</key>
<true/>
<key>com.apple.SafariBookmarksSyncAgent.plist</key>
<true/>
<key>com.apple.SafariCloudHistoryPushAgent.plist</key>
<true/>
<key>com.apple.SafariHistoryServiceAgent.plist</key>
<true/>
<key>com.apple.SafariLaunchAgent.plist</key>
<true/>
<key>com.apple.SafariNotificationAgent.plist</key>
<true/>
<key>com.apple.SafariPlugInUpdateNotifier.plist</key>
<true/>
<key>com.apple.safaridavclient.plist</key>
<true/>
<key>com.apple.Safari.SafeBrowsing.Service.plist</key>
<true/>
<key>com.apple.SafariBookmarksSyncAgent.plist</key>
<true/>
<key>com.apple.SafariCloudHistoryPushAgent.plist</key>
<true/>
<key>com.apple.SafariHistoryServiceAgent.plist</key>
<true/>
<key>com.apple.SafariLaunchAgent.plist</key>
<true/>
<key>com.apple.SafariNotificationAgent.plist</key>
<true/>
<key>com.apple.SafariPlugInUpdateNotifier.plist</key>
<true/>
<key>com.apple.safaridavclient.plist</key>
<true/>
<key>com.apple.ReportCrash.Self.plist</key>
<true/>
<key>com.apple.ReportCrash.plist</key>
<true/>
<key>com.apple.CrashReporterSupportHelper.plist</key>
<true/>
<key>com.apple.ReportCrash.Root.Self.plist</key>
<true/>
<key>com.apple.ReportCrash.Root.plist</key>
<true/>
<key>com.apple.PhotoLibraryMigrationUtility.XPC.plist</key>
<true/>
<key>com.apple.cloudphotosd.plist</key>
<true/>
<key>com.apple.photoanalysisd.plist</key>
<true/>
<key>com.apple.photolibraryd.plist</key>
<true/>
<key>com.apple.DiagnosticReportCleanup.plist</key>
<true/>
<key>com.apple.diagnostics_agent.plist</key>
<true/>
<key>com.apple.InstallerDiagnostics.installerdiagd.plist</key>
<true/>
<key>com.apple.InstallerDiagnostics.installerdiagwatcher.plist</key>
<true/>
<key>com.apple.diagnosticd.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.bluetooth.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.getmobilityinfo.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.spotlight.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.timemachine.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.wifi.helper.plist</key>
<true/>
<key>com.apple.gamed.plist</key>
<true/>
<key>com.apple.GameController.gamecontrollerd.plist</key>
<true/>
<key>com.apple.spindump_agent.plist</key>
<true/>
<key>com.apple.metadata.mds.spindump.plist</key>
<true/>
<key>com.apple.spindump.plist</key>
<true/>
<key>com.apple.Siri.agent.plist</key>
<true/>
<key>com.apple.siriknowledged.plist</key>
<true/>
Tuesday, April 2, 2019
Updating Raspberry Pi & Pi-Hole
APT (Advanced Packaging Tool)
To update software in Raspbian, you can use the apt tool in a terminal. Open a terminal window from the taskbar or application menu:First, update your system's package list by entering the following command:
sudo apt-get update
Next, upgrade all your installed packages to their latest versions with the following command:
sudo apt-get dist-upgrade
Generally speaking, doing this regularly will keep your installation up to date, in that it will be equivalent to the latest released image available from
raspberrypi.org/downloads.
However, there are occasional changes made in the Foundation's Raspbian image that require manual intervention, for example a newly introduced package. These are not installed with an upgrade, as this command only updates the packages you already have installed.
Updating the kernel and firmware
The kernel and firmware are installed as a Debian package, and so will also get updates when using the procedure above. These packages are updated infrequently and after extensive testing.Updating Pi-Hole
Updating is as simple as running the following command:pihole -up
Script for Updating Pi-Hole
#!/bin/sh
sudo apt update
sudo apt -yf dist-upgrade
sudo apt-get -y --purge autoremove
sudo apt-get autoclean
pihole -g -up
pihole -up
Running Raspberry Pi Config Tool
sudo raspi-config
Monday, April 1, 2019
Disable Device Enrollment Notification on Apple macOS
Disable Device Enrollment Notification on Mac
Restart the Mac in Recovery Mode by holding Comment-R
during restart
Open Terminal in the recovery screen and type
mv com.apple.ManagedClient.cloudconfigurationd.plist com.apple.ManagedClient.cloudconfigurationd.plist.bak
mv com.apple.ManagedClient.enroll.plist com.apple.ManagedClient.enroll.plist.bak
mv com.apple.ManagedClient.plist com.apple.ManagedClient.plist.bak
mv com.apple.ManagedClient.startup.plist com.apple.ManagedClient.startup.plist.bak
Restart computer
Monday, March 11, 2019
macOS pmset Performance Setting
sudo pmset -a sleep 0 highstandbythreshold 0 standbydelaylow 0 standby 0 proximitywake 0 autopoweroffdelay 0 standbydelayhigh 0 autopoweroff 0 gpuswitch 1 hibernatemode 3
Saturday, February 23, 2019
FireFox Important Modified Preferences
FEB, 2019
user_pref("accessibility.force_disabled", 1);
user_pref("accessibility.typeaheadfind.flashBar", 0);
user_pref("browser.cache.disk.capacity", 0);
user_pref("browser.cache.disk.enable", false);
user_pref("browser.cache.disk.filesystem_reported", 1);
user_pref("browser.cache.memory.max_entry_size", -1);
user_pref("browser.link.open_newwindow.restriction", 0);
user_pref("browser.sessionstore.interval", 3600000);
user_pref("browser.sessionstore.resume_from_crash", false);
user_pref("browser.startup.homepage", about:config);
user_pref("browser.tabs.insertRelatedAfterCurrent", false);
user_pref("browser.tabs.tabMinWidth", 32);
user_pref("browser.tabs.warnOnClose", false);
user_pref("browser.tabs.warnOnOpen", false);
user_pref("browser.urlbar.maxRichResults", 16);
user_pref("browser.urlbar.placeholderName", Google);
user_pref("browser.urlbar.speculativeConnect.enabled", false);
user_pref("browser.urlbar.suggest.history", false);
user_pref("browser.urlbar.suggest.openpage", false);
user_pref("browser.urlbar.timesBeforeHidingSuggestionsHint", 0);
user_pref("dom.battery.enabled", false);
user_pref("dom.disable_window_move_resize", true);
user_pref("dom.disable_window_open_feature.close", true);
user_pref("dom.disable_window_open_feature.menubar", true);
user_pref("dom.disable_window_open_feature.minimizable", true);
user_pref("dom.disable_window_open_feature.personalbar", true);
user_pref("dom.disable_window_open_feature.titlebar", true);
user_pref("dom.disable_window_open_feature.toolbar", true);
user_pref("dom.event.clipboardevents.enabled", false);
user_pref("dom.forms.autocomplete.formautofill", true);
user_pref("dom.ipc.processCount", 32);
user_pref("dom.webnotifications.enabled", false);
user_pref("extensions.formautofill.addresses.enabled", false);
user_pref("font.internaluseonly.changed", true);
user_pref("layers.acceleration.force-enabled", true);
user_pref("layers.tile-height", 1024);
user_pref("layers.tile-width", 1024);
user_pref("media.navigator.enabled", false);
user_pref("media.video_stats.enabled", false);
user_pref("network.cookie.cookieBehavior", 1);
user_pref("network.cookie.lifetimePolicy", 2);
user_pref("network.dns.disablePrefetch", true);
user_pref("network.http.referer.trimmingPolicy", 2);
user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
user_pref("network.http.speculative-parallel-limit", 0);
user_pref("network.predictor.cleaned-up", true);
user_pref("network.prefetch-next", false);
user_pref("places.frecency.bookmarkVisitBonus", 1000);
user_pref("places.frecency.unvisitedBookmarkBonus", 1000);
user_pref("privacy.clearOnShutdown.offlineApps", true);
user_pref("privacy.clearOnShutdown.openWindows", true);
user_pref("privacy.clearOnShutdown.siteSettings", true);
user_pref("privacy.donottrackheader.enabled", true);
user_pref("privacy.firstparty.isolate", true);
user_pref("privacy.history.custom", true);
user_pref("privacy.sanitize.pending", [{"id":"shutdown","itemsToClear":["cache","cookies","offlineApps","history","formdata","downloads","sessions","siteSetti);
user_pref("privacy.sanitize.sanitizeOnShutdown", true);
user_pref("privacy.trackingprotection.cryptomining.enabled", true);
user_pref("privacy.trackingprotection.enabled", true);
user_pref("privacy.trackingprotection.fingerprinting.enabled", true);
user_pref("security.certerrors.recordEventTelemetry", false);
user_pref("security.dialog_enable_delay", 0);
user_pref("security.identitypopup.recordEventElemetry", false);
user_pref("services.sync.declinedEngines", passwords,tabs,forms,history);
user_pref("services.sync.engine.addresses.available", true);
user_pref("services.sync.engine.history", false);
user_pref("services.sync.engine.passwords", false);
user_pref("services.sync.engine.prefs.modified", false);
user_pref("services.sync.engine.tabs", false);
user_pref("signon.autofillForms", false);
user_pref("signon.importedFromSqlite", true);
user_pref("signon.rememberSignons", false);
user_pref("accessibility.force_disabled", 1);
user_pref("accessibility.typeaheadfind.flashBar", 0);
user_pref("browser.cache.disk.capacity", 0);
user_pref("browser.cache.disk.enable", false);
user_pref("browser.cache.disk.filesystem_reported", 1);
user_pref("browser.cache.memory.max_entry_size", -1);
user_pref("browser.link.open_newwindow.restriction", 0);
user_pref("browser.sessionstore.interval", 3600000);
user_pref("browser.sessionstore.resume_from_crash", false);
user_pref("browser.startup.homepage", about:config);
user_pref("browser.tabs.insertRelatedAfterCurrent", false);
user_pref("browser.tabs.tabMinWidth", 32);
user_pref("browser.tabs.warnOnClose", false);
user_pref("browser.tabs.warnOnOpen", false);
user_pref("browser.urlbar.maxRichResults", 16);
user_pref("browser.urlbar.placeholderName", Google);
user_pref("browser.urlbar.speculativeConnect.enabled", false);
user_pref("browser.urlbar.suggest.history", false);
user_pref("browser.urlbar.suggest.openpage", false);
user_pref("browser.urlbar.timesBeforeHidingSuggestionsHint", 0);
user_pref("dom.battery.enabled", false);
user_pref("dom.disable_window_move_resize", true);
user_pref("dom.disable_window_open_feature.close", true);
user_pref("dom.disable_window_open_feature.menubar", true);
user_pref("dom.disable_window_open_feature.minimizable", true);
user_pref("dom.disable_window_open_feature.personalbar", true);
user_pref("dom.disable_window_open_feature.titlebar", true);
user_pref("dom.disable_window_open_feature.toolbar", true);
user_pref("dom.event.clipboardevents.enabled", false);
user_pref("dom.forms.autocomplete.formautofill", true);
user_pref("dom.ipc.processCount", 32);
user_pref("dom.webnotifications.enabled", false);
user_pref("extensions.formautofill.addresses.enabled", false);
user_pref("font.internaluseonly.changed", true);
user_pref("layers.acceleration.force-enabled", true);
user_pref("layers.tile-height", 1024);
user_pref("layers.tile-width", 1024);
user_pref("media.navigator.enabled", false);
user_pref("media.video_stats.enabled", false);
user_pref("network.cookie.cookieBehavior", 1);
user_pref("network.cookie.lifetimePolicy", 2);
user_pref("network.dns.disablePrefetch", true);
user_pref("network.http.referer.trimmingPolicy", 2);
user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
user_pref("network.http.speculative-parallel-limit", 0);
user_pref("network.predictor.cleaned-up", true);
user_pref("network.prefetch-next", false);
user_pref("places.frecency.bookmarkVisitBonus", 1000);
user_pref("places.frecency.unvisitedBookmarkBonus", 1000);
user_pref("privacy.clearOnShutdown.offlineApps", true);
user_pref("privacy.clearOnShutdown.openWindows", true);
user_pref("privacy.clearOnShutdown.siteSettings", true);
user_pref("privacy.donottrackheader.enabled", true);
user_pref("privacy.firstparty.isolate", true);
user_pref("privacy.history.custom", true);
user_pref("privacy.sanitize.pending", [{"id":"shutdown","itemsToClear":["cache","cookies","offlineApps","history","formdata","downloads","sessions","siteSetti);
user_pref("privacy.sanitize.sanitizeOnShutdown", true);
user_pref("privacy.trackingprotection.cryptomining.enabled", true);
user_pref("privacy.trackingprotection.enabled", true);
user_pref("privacy.trackingprotection.fingerprinting.enabled", true);
user_pref("security.certerrors.recordEventTelemetry", false);
user_pref("security.dialog_enable_delay", 0);
user_pref("security.identitypopup.recordEventElemetry", false);
user_pref("services.sync.declinedEngines", passwords,tabs,forms,history);
user_pref("services.sync.engine.addresses.available", true);
user_pref("services.sync.engine.history", false);
user_pref("services.sync.engine.passwords", false);
user_pref("services.sync.engine.prefs.modified", false);
user_pref("services.sync.engine.tabs", false);
user_pref("signon.autofillForms", false);
user_pref("signon.importedFromSqlite", true);
user_pref("signon.rememberSignons", false);
Firefox Domains Pulled from Firefox about:config
Block the following:
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 experiments.mozilla.org
0.0.0.0 telemetry.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 search.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 tbpl.mozilla.org
0.0.0.0 shavar.services.mozilla.com
#0.0.0.0 detectportal.firefox.com
All Domains:
#0.0.0.0 detectportal.firefox.com
0.0.0.0 accounts.firefox.com
0.0.0.0 activations.cdn.mozilla.net
0.0.0.0 addons.mozilla.org
0.0.0.0 aus5.mozilla.org
0.0.0.0 auth.services.mozilla.com
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 blocklist.addons.mozilla.org
0.0.0.0 code.cdn.mozilla.net
0.0.0.0 content.cdn.mozilla.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 discovery.addons.mozilla.org
0.0.0.0 experiments.mozilla.org
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 ftp.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 input.mozilla.org
0.0.0.0 install.mozilla.org
0.0.0.0 location.services.mozilla.com
0.0.0.0 malware-error.mozilla.com
0.0.0.0 mozilla.com
0.0.0.0 mozilla.org
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 phish-error.mozilla.com
0.0.0.0 phish-report.mozilla.com
0.0.0.0 push.services.mozilla.com
0.0.0.0 search.services.mozilla.com
0.0.0.0 self-repair.mozilla.org
0.0.0.0 services.addons.mozilla.org
0.0.0.0 services.mozilla.com
0.0.0.0 setup.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 support.mozilla.org
0.0.0.0 tbpl.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 telemetry.mozilla.org
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 token.services.mozilla.com
0.0.0.0 versioncheck-bg.addons.mozilla.org
0.0.0.0 versioncheck.addons.mozilla.org
0.0.0.0 webextensions.settings.services.mozilla.com
0.0.0.0 wiki.mozilla.org
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 experiments.mozilla.org
0.0.0.0 telemetry.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 search.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 tbpl.mozilla.org
0.0.0.0 shavar.services.mozilla.com
#0.0.0.0 detectportal.firefox.com
All Domains:
#0.0.0.0 detectportal.firefox.com
0.0.0.0 accounts.firefox.com
0.0.0.0 activations.cdn.mozilla.net
0.0.0.0 addons.mozilla.org
0.0.0.0 aus5.mozilla.org
0.0.0.0 auth.services.mozilla.com
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 blocklist.addons.mozilla.org
0.0.0.0 code.cdn.mozilla.net
0.0.0.0 content.cdn.mozilla.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 discovery.addons.mozilla.org
0.0.0.0 experiments.mozilla.org
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 ftp.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 input.mozilla.org
0.0.0.0 install.mozilla.org
0.0.0.0 location.services.mozilla.com
0.0.0.0 malware-error.mozilla.com
0.0.0.0 mozilla.com
0.0.0.0 mozilla.org
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 phish-error.mozilla.com
0.0.0.0 phish-report.mozilla.com
0.0.0.0 push.services.mozilla.com
0.0.0.0 search.services.mozilla.com
0.0.0.0 self-repair.mozilla.org
0.0.0.0 services.addons.mozilla.org
0.0.0.0 services.mozilla.com
0.0.0.0 setup.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 support.mozilla.org
0.0.0.0 tbpl.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 telemetry.mozilla.org
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 token.services.mozilla.com
0.0.0.0 versioncheck-bg.addons.mozilla.org
0.0.0.0 versioncheck.addons.mozilla.org
0.0.0.0 webextensions.settings.services.mozilla.com
0.0.0.0 wiki.mozilla.org
Sunday, January 27, 2019
Modify Android Permissions with ADB
First:
Lets get a list of permissions:
Second:
Query against each permission:
./adb shell cmd appops query-op {X} allow | sort
./adb shell cmd appops query-op {X} default | sort
Where {X} is the Permission Name. Example:
./adb shell cmd appops query-op READ_SMS allow | sort
Third:
Change the permission for a specific package:
./adb shell cmd appops set {Y} {X} ignore
Where {Y} is the package name, {X} is the Permission Name. Example:
./adb shell cmd appops set com.whatsapp WRITE_CONTACTS ignore
Fourth:
Some important permissions you need to change:
VIBRATE
RUN_IN_BACKGROUND
WRITE_SETTINGS
PICTURE_IN_PICTURE
WIFI_SCAN
CAMERA
USE_FINGERPRINT
MONITOR_LOCATION
MONITOR_HIGH_POWER_LOCATION
TOAST_WINDOW
READ_EXTERNAL_STORAGE
WRITE_EXTERNAL_STORAGE
Lets get a list of permissions:
./adb shell pm list permissions -d -g
Second:
Query against each permission:
./adb shell cmd appops query-op {X} allow | sort
./adb shell cmd appops query-op {X} default | sort
Where {X} is the Permission Name. Example:
./adb shell cmd appops query-op READ_SMS allow | sort
Third:
Change the permission for a specific package:
./adb shell cmd appops set {Y} {X} ignore
Where {Y} is the package name, {X} is the Permission Name. Example:
./adb shell cmd appops set com.whatsapp WRITE_CONTACTS ignore
Fourth:
Some important permissions you need to change:
VIBRATE
RUN_IN_BACKGROUND
WRITE_SETTINGS
PICTURE_IN_PICTURE
WIFI_SCAN
CAMERA
USE_FINGERPRINT
MONITOR_LOCATION
MONITOR_HIGH_POWER_LOCATION
TOAST_WINDOW
READ_EXTERNAL_STORAGE
WRITE_EXTERNAL_STORAGE
Thursday, January 3, 2019
Create a Disk Image & Restore It (Mojave / APFS)
First of all, Apple you SUCK!!!
Now, that's out of the way, here is how to create a disk image for APFS and restore it:
Now, that's out of the way, here is how to create a disk image for APFS and restore it:
- Boot Mojave from an external USB (CMD + Option)
- Open Terminal
- Unmount the disk (disk0 is the built-in disk):
- diskutil unmountDisk /dev/disk0
- Create the image:
- hdiutil create -srcdevice /dev/disk0s2 -format UDZO /Volumes/100G/Macintosh_HD_Backup.dmg
- Scan the image
- asr imagescan --source /Volumes/100G/Macintosh_HD_Backup.dmg
- Restore the image
- asr restore --source /Volumes/100G/Macintosh_HD_Backup.dmg --target /dev/disk0s2 --erase
- When it asks to restore it to disk1, APFS, say 'y'.
Subscribe to:
Posts (Atom)