Sunday, June 9, 2019

Moto Z3 Tweaks

1. Disable the following Packages:

pm disable-user --user 0 com.LogiaGroup.LogiaDeck
pm disable-user --user 0 com.amazon.appmanager
pm disable-user --user 0 com.android.backupconfirm
pm disable-user --user 0 com.android.bips
pm disable-user --user 0 com.android.bookmarkprovider
pm disable-user --user 0 com.android.calllogbackup
pm disable-user --user 0 com.android.chrome
pm disable-user --user 0 com.android.dreams.basic
pm disable-user --user 0 com.android.hotwordenrollment.okgoogle
pm disable-user --user 0 com.android.hotwordenrollment.tgoogle
pm disable-user --user 0 com.android.hotwordenrollment.xgoogle
pm disable-user --user 0 com.android.internal.display.cutout.emulation.corner
pm disable-user --user 0 com.android.internal.display.cutout.emulation.double
pm disable-user --user 0 com.android.internal.display.cutout.emulation.noCutout
pm disable-user --user 0 com.android.internal.display.cutout.emulation.tall
pm disable-user --user 0 com.android.nfc
pm disable-user --user 0 com.android.printspooler
pm disable-user --user 0 com.android.providers.calendar
pm disable-user --user 0 com.android.providers.partnerbookmarks
pm disable-user --user 0 com.android.proxyhandler
pm disable-user --user 0 com.android.sharedstoragebackup
pm disable-user --user 0 com.android.wallpaper.livepicker
pm disable-user --user 0 com.android.wallpaperbackup
pm disable-user --user 0 com.customermobile.preload.vzw
pm disable-user --user 0 com.discoveryscreen
pm disable-user --user 0 com.google.android.apps.docs
pm disable-user --user 0 com.google.android.apps.inputmethod.zhuyin
pm disable-user --user 0 com.google.android.apps.restore
pm disable-user --user 0 com.google.android.apps.tachyon
pm disable-user --user 0 com.google.android.apps.turbo
pm disable-user --user 0 com.google.android.apps.wallpaper
pm disable-user --user 0 com.google.android.apps.work.oobconfig
pm disable-user --user 0 com.google.android.backuptransport
pm disable-user --user 0 com.google.android.calendar
pm disable-user --user 0 com.google.android.feedback
pm disable-user --user 0 com.google.android.gm
pm disable-user --user 0 com.google.android.googlequicksearchbox
pm disable-user --user 0 com.google.android.inputmethod.japanese
pm disable-user --user 0 com.google.android.inputmethod.korean
pm disable-user --user 0 com.google.android.inputmethod.pinyin
pm disable-user --user 0 com.google.android.marvin.talkback
pm disable-user --user 0 com.google.android.onetimeinitializer
pm disable-user --user 0 com.google.android.partnersetup
pm disable-user --user 0 com.google.android.printservice.recommendation
pm disable-user --user 0 com.google.android.setupwizard
pm disable-user --user 0 com.google.android.syncadapters.contacts
pm disable-user --user 0 com.google.android.tag
pm disable-user --user 0 com.google.android.tts
pm disable-user --user 0 com.google.android.videos
pm disable-user --user 0 com.lenovo.FileBrowser2
pm disable-user --user 0 com.lenovo.lsf.user
pm disable-user --user 0 com.motorola.actions
pm disable-user --user 0 com.motorola.android.buacloudcontactadapter
pm disable-user --user 0 com.motorola.android.nativedropboxagent
pm disable-user --user 0 com.motorola.arselfie
pm disable-user --user 0 com.motorola.audiomonitor
pm disable-user --user 0 com.motorola.bug2go
pm disable-user --user 0 com.motorola.camera2
pm disable-user --user 0 com.motorola.cameramod
pm disable-user --user 0 com.motorola.contacts.preloadcontacts
pm disable-user --user 0 com.motorola.demo
pm disable-user --user 0 com.motorola.demo.env
pm disable-user --user 0 com.motorola.email
pm disable-user --user 0 com.motorola.faceunlock
pm disable-user --user 0 com.motorola.faceunlocktrustagent
pm disable-user --user 0 com.motorola.genie
pm disable-user --user 0 com.motorola.imagertuning_messi
pm disable-user --user 0 com.motorola.mot5gmod
pm disable-user --user 0 com.motorola.motocare
pm disable-user --user 0 com.motorola.motocare.internal
pm disable-user --user 0 com.motorola.motosignature.app
pm disable-user --user 0 com.motorola.mya
pm disable-user --user 0 com.motorola.nfc
pm disable-user --user 0 com.motorola.nfcui
pm disable-user --user 0 com.motorola.paks
pm disable-user --user 0 com.motorola.photoeditor
pm disable-user --user 0 com.motorola.projectormod
pm disable-user --user 0 com.motorola.setup
pm disable-user --user 0 com.motorola.setupwizard.controller
pm disable-user --user 0 com.motorola.setupwizard.devicesetup
pm disable-user --user 0 com.motorola.voiceauthtrustagent
pm disable-user --user 0 com.motorola.vzw.cloudsetup
pm disable-user --user 0 com.motorola.vzw.loader
pm disable-user --user 0 com.motorola.vzw.mot5gmod
pm disable-user --user 0 com.motorola.vzw.phone.extensions
pm disable-user --user 0 com.motorola.vzw.settings.extensions
pm disable-user --user 0 com.motorola.wallpaper.parallax
pm disable-user --user 0 com.securityandprivacy.android.verizon.vms
pm disable-user --user 0 com.telecomsys.directedsms.android.SCG
pm disable-user --user 0 com.vcast.mediamanager
pm disable-user --user 0 com.verizon.llkagent
pm disable-user --user 0 com.verizon.messaging.vzmsgs
pm disable-user --user 0 com.verizon.mips.services
pm disable-user --user 0 com.verizontelematics.verizonhum
pm disable-user --user 0 com.vzw.hss.myverizon
pm disable-user --user 0 com.vzw.qualitydatalog


2. Disable Wake Lock:
cmd appops set com.amazon.mShop.android.shopping WAKE_LOCK ignore
cmd appops set com.statefarm.pocketagent WAKE_LOCK ignore
cmd appops set com.nextdoor WAKE_LOCK ignore
cmd appops set com.cisco.wx2.android WAKE_LOCK ignore
cmd appops set com.roku.remote WAKE_LOCK ignore
cmd appops set com.tmkeen.alquran WAKE_LOCK ignore
cmd appops set com.cloudmosa.puffin WAKE_LOCK ignore
cmd appops set com.zillow.android.zillowmap WAKE_LOCK ignore
cmd appops set com.whatsapp WAKE_LOCK ignore
cmd appops set com.nest.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.authenticator2 WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.paypal.android.p2pmobile WAKE_LOCK ignore
cmd appops set ch.protonmail.android WAKE_LOCK ignore
cmd appops set com.symantec.cleansweep WAKE_LOCK ignore
cmd appops set com.duosecurity.duomobile WAKE_LOCK ignore
cmd appops set us.zoom.videomeetings WAKE_LOCK ignore
cmd appops set com.waze WAKE_LOCK ignore
cmd appops set com.microsoft.office.onenote WAKE_LOCK ignore
cmd appops set com.microsoft.emmx WAKE_LOCK ignore
cmd appops set org.thoughtcrime.securesms WAKE_LOCK ignore
cmd appops set com.microsoft.office.outlook WAKE_LOCK ignore
cmd appops set com.subway.mobile.subwayapp03 WAKE_LOCK ignore
cmd appops set epic.mychart.android WAKE_LOCK ignore
cmd appops set com.bestbuy.android WAKE_LOCK ignore
cmd appops set com.adguard.android WAKE_LOCK ignore
cmd appops set com.starbucks.mobilecard WAKE_LOCK ignore
cmd appops set com.twitter.android WAKE_LOCK ignore
cmd appops set com.netflix.mediaclient WAKE_LOCK ignore
cmd appops set com.tripadvisor.tripadvisor WAKE_LOCK ignore
cmd appops set com.x8bit.bitwarden WAKE_LOCK ignore
cmd appops set com.ubercab WAKE_LOCK ignore
cmd appops set com.amazon.avod.thirdpartyclient WAKE_LOCK ignore
cmd appops set com.ubnt.unifihome WAKE_LOCK ignore
cmd appops set com.chase.sig.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.translate WAKE_LOCK ignore
cmd appops set com.oasisfeng.greenify.pro WAKE_LOCK ignore
cmd appops set com.linkedin.android WAKE_LOCK ignore
cmd appops set com.cisco.webex.meetings WAKE_LOCK ignore
cmd appops set com.google.android.apps.chromecast.app WAKE_LOCK ignore
cmd appops set com.americanexpress.android.acctsvcs.us WAKE_LOCK ignore
cmd appops set com.netgear.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.pdfviewer WAKE_LOCK ignore
cmd appops set com.google.android.keep WAKE_LOCK ignore
cmd appops set com.azure.authenticator WAKE_LOCK ignore
cmd appops set securecomputing.devices.android.controller WAKE_LOCK ignore
cmd appops set com.google.android.GoogleCamera WAKE_LOCK ignore
cmd appops set com.google.android.apps.maps WAKE_LOCK ignore
cmd appops set com.google.android.youtube WAKE_LOCK ignore
cmd appops set com.lmi.motorola.rescuesecurity WAKE_LOCK ignore


Monday, June 3, 2019

Improve Android Battery with WAKE_LOCK

Run shell:
./adb shell

Example of disabled packages:
cmd appops set ch.protonmail.android WAKE_LOCK ignore
cmd appops set com.airbnb.android WAKE_LOCK ignore
cmd appops set com.amazon.appmanager WAKE_LOCK ignore
cmd appops set com.amazon.avod.thirdpartyclient WAKE_LOCK ignore
cmd appops set com.amazon.mShop.android.shopping WAKE_LOCK ignore
cmd appops set com.americanexpress.android.acctsvcs.us WAKE_LOCK
cmd appops set com.bestbuy.android WAKE_LOCK ignore
cmd appops set com.chrome.canary WAKE_LOCK ignore
cmd appops set com.cisco.webex.meetings WAKE_LOCK ignore
cmd appops set com.cloudmosa.puffin WAKE_LOCK ignore
cmd appops set com.costco.app.android WAKE_LOCK ignore
cmd appops set com.google.android.apps.authenticator2 WAKE_LOCK ignore
cmd appops set com.google.android.calculator WAKE_LOCK ignore
cmd appops set com.google.android.youtube WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.hulu.plus WAKE_LOCK ignore
cmd appops set com.linkedin.android WAKE_LOCK ignore
cmd appops set com.microsoft.office.officelens WAKE_LOCK ignore
cmd appops set com.microsoft.office.onenote WAKE_LOCK ignore
cmd appops set com.move.realtor WAKE_LOCK ignore
cmd appops set com.nest.android WAKE_LOCK ignore
cmd appops set com.netflix.mediaclient WAKE_LOCK ignore
cmd appops set com.nextdoor WAKE_LOCK ignore
cmd appops set com.paypal.android.p2pmobile WAKE_LOCK ignore
cmd appops set com.roku.remote WAKE_LOCK ignore
cmd appops set com.starbucks.mobilecard WAKE_LOCK ignore
cmd appops set com.statefarm.pocketagent WAKE_LOCK ignore
cmd appops set com.subway.mobile.subwayapp03 WAKE_LOCK ignore
cmd appops set com.symantec.cleansweep WAKE_LOCK ignore
cmd appops set com.target.ui WAKE_LOCK ignore
cmd appops set com.tmkeen.alquran WAKE_LOCK ignore
cmd appops set com.tripadvisor.tripadvisor WAKE_LOCK ignore
cmd appops set com.twitter.android WAKE_LOCK ignore
cmd appops set com.ubercab WAKE_LOCK ignore
cmd appops set com.ubnt.unifihome WAKE_LOCK ignore
cmd appops set com.waze WAKE_LOCK ignore
cmd appops set com.x8bit.bitwarden WAKE_LOCK ignore
cmd appops set com.zillow.android.zillowmap WAKE_LOCK ignore
cmd appops set epic.mychart.android WAKE_LOCK ignore
cmd appops set us.zoom.videomeetings WAKE_LOCK ignore

Tuesday, May 21, 2019

Pi Hole DHCP


sudo systemctl stop dhcpcd.service
sudo nano dhcp.leases
sudo systemctl restart dhcpcd.service
systemctl status dhcpcd.service
sudo systemctl daemon-reload

Tuesday, April 23, 2019

Tweak PI-Hole so Query Log and Long Term Queries Display in 100 Rows

This can be changed here
/var/www/html/admin/scripts/pi-hole/js/queries.js:
sudo nano  /var/www/html/admin/scripts/pi-hole/js/queries.js

Go down to:
"lengthMenu": [[10, 25, 50, 100, -1], [10, 25, 50, 100, "All"]],
and delete both number 10's to default it to 25, etc.


/var/www/html/admin/scripts/pi-hole/js/queries.js On the line that says
APIstring += "=100"
100 is the amount of queries displayed by default in Query Log. You can change that to display up to 500:
APIstring += "=500"

Thursday, April 11, 2019

Tweak Pi-Hole so logging won't burn out your SD card

Connect to Pi-Hole:
ssh pi@

Run:
sudo nano /etc/pihole/pihole-FTL.conf

Add the following
PRIVACYLEVEL=0
DBINTERVAL=60
MAXDBDAYS=7

 

Wednesday, April 10, 2019

Pi-Hole Blocking via Regex

BLOCKINGREGEX=^ab.+\.com$
will block all domains that start with “ab” (^ab), have at least one further character (.+) and end in “.com” (\.com$).
Examples for what would be blocked by this rule:
  • abc.com
  • abtest.com
  • ab.test.com
  • abr-------.whatever.com
Examples for what would notbe blocked by this rule:
  • testab.com (the domain doesn’t start with “ab”)
  • tab.test.com (the domain doesn’t start with “ab”)
  • ab.com (there is no character in between “ab” and “.com”)
  • test.com.something (the domain doesn’t end in “.com”)
(^|\.)ru$
will block the entire TLD .(.ru). Examples for what would be blocked by this rule:
  • abc.ru

Sunday, April 7, 2019

Disable macOS Mojave Services The Right Way

  1. Disable SIP in recovery mode
    $ csrutil disable
    and reboot.
  2. Add services you want to disable to
    /System/Library/Sandbox/com.apple.xpc.launchd.rootless.plist.
    For example, if you want to disable 'apsd', do the following:
    $ sudo nano /System/Library/Sandbox/com.apple.xpc.launchd.rootless.plist
    Add key(s) at bottom:
    <key>com.apple.apsd</key>
    <true></true>
  3. Unload agents and daemons previously added to the whitelist
    $ launchctl unload -w or $ sudo launchctl unload -w
    For example:
    $ sudo launchctl unload -w /System/Library/LaunchDaemons/com.apple.apsd.plist
  4. Reboot on recovery mode and enable SIP again with $ csrutil enable.
  5. Reboot again and agents and daemons will be unloaded with SIP enabled.
If you don't do the above, when you enable SIP again, the services will reload even if you unloaded them.


Some services I have disabled:

<key>com.apple.Safari.SafeBrowsing.Service.plist</key>
<true/>
<key>com.apple.SafariBookmarksSyncAgent.plist</key>
<true/>
<key>com.apple.SafariCloudHistoryPushAgent.plist</key>
<true/>
<key>com.apple.SafariHistoryServiceAgent.plist</key>
<true/>
<key>com.apple.SafariLaunchAgent.plist</key>
<true/>
<key>com.apple.SafariNotificationAgent.plist</key>
<true/>
<key>com.apple.SafariPlugInUpdateNotifier.plist</key>
<true/>
<key>com.apple.safaridavclient.plist</key>
<true/>
<key>com.apple.Safari.SafeBrowsing.Service.plist</key>
<true/>
<key>com.apple.SafariBookmarksSyncAgent.plist</key>
<true/>
<key>com.apple.SafariCloudHistoryPushAgent.plist</key>
<true/>
<key>com.apple.SafariHistoryServiceAgent.plist</key>
<true/>
<key>com.apple.SafariLaunchAgent.plist</key>
<true/>
<key>com.apple.SafariNotificationAgent.plist</key>
<true/>
<key>com.apple.SafariPlugInUpdateNotifier.plist</key>
<true/>
<key>com.apple.safaridavclient.plist</key>
<true/>
<key>com.apple.ReportCrash.Self.plist</key>
<true/>
<key>com.apple.ReportCrash.plist</key>
<true/>
<key>com.apple.CrashReporterSupportHelper.plist</key>
<true/>
<key>com.apple.ReportCrash.Root.Self.plist</key>
<true/>
<key>com.apple.ReportCrash.Root.plist</key>
<true/>
<key>com.apple.PhotoLibraryMigrationUtility.XPC.plist</key>
<true/>
<key>com.apple.cloudphotosd.plist</key>
<true/>
<key>com.apple.photoanalysisd.plist</key>
<true/>
<key>com.apple.photolibraryd.plist</key>
<true/>
<key>com.apple.DiagnosticReportCleanup.plist</key>
<true/>
<key>com.apple.diagnostics_agent.plist</key>
<true/>
<key>com.apple.InstallerDiagnostics.installerdiagd.plist</key>
<true/>
<key>com.apple.InstallerDiagnostics.installerdiagwatcher.plist</key>
<true/>
<key>com.apple.diagnosticd.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.bluetooth.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.getmobilityinfo.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.spotlight.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.timemachine.helper.plist</key>
<true/>
<key>com.apple.diagnosticextensions.osx.wifi.helper.plist</key>
<true/>
<key>com.apple.gamed.plist</key>
<true/>
<key>com.apple.GameController.gamecontrollerd.plist</key>
<true/>
<key>com.apple.spindump_agent.plist</key>
<true/>
<key>com.apple.metadata.mds.spindump.plist</key>
<true/>
<key>com.apple.spindump.plist</key>
<true/>
<key>com.apple.Siri.agent.plist</key>
<true/>
<key>com.apple.siriknowledged.plist</key>
<true/>

Tuesday, April 2, 2019

Updating Raspberry Pi & Pi-Hole

APT (Advanced Packaging Tool)

To update software in Raspbian, you can use the apt tool in a terminal. Open a terminal window from the taskbar or application menu:
Terminal

First, update your system's package list by entering the following command:
sudo apt-get update

Next, upgrade all your installed packages to their latest versions with the following command:
sudo apt-get dist-upgrade

Generally speaking, doing this regularly will keep your installation up to date, in that it will be equivalent to the latest released image available from
raspberrypi.org/downloads.

However, there are occasional changes made in the Foundation's Raspbian image that require manual intervention, for example a newly introduced package. These are not installed with an upgrade, as this command only updates the packages you already have installed.

Updating the kernel and firmware

The kernel and firmware are installed as a Debian package, and so will also get updates when using the procedure above. These packages are updated infrequently and after extensive testing.

Updating Pi-Hole

Updating is as simple as running the following command:
pihole -up

Script for Updating Pi-Hole

#!/bin/sh
sudo apt update
sudo apt -yf dist-upgrade
sudo apt-get -y --purge autoremove
sudo apt-get autoclean
pihole -g -up
pihole -up
 

Running Raspberry Pi Config Tool

sudo raspi-config
Open "Localisation Options" 
 

Monday, April 1, 2019

Disable Device Enrollment Notification on Apple macOS

Disable Device Enrollment Notification on Mac
Restart the Mac in Recovery Mode by holding Comment-R during restart

Open Terminal in the recovery screen and type

mv com.apple.ManagedClient.cloudconfigurationd.plist com.apple.ManagedClient.cloudconfigurationd.plist.bak
mv com.apple.ManagedClient.enroll.plist com.apple.ManagedClient.enroll.plist.bak
mv com.apple.ManagedClient.plist com.apple.ManagedClient.plist.bak
mv com.apple.ManagedClient.startup.plist com.apple.ManagedClient.startup.plist.bak
Restart computer

Monday, March 11, 2019

macOS pmset Performance Setting

sudo pmset -a sleep 0 highstandbythreshold 0 standbydelaylow 0 standby 0 proximitywake 0 autopoweroffdelay 0 standbydelayhigh 0 autopoweroff 0 gpuswitch 1 hibernatemode 3

Saturday, February 23, 2019

FireFox Important Modified Preferences

FEB, 2019

user_pref("accessibility.force_disabled", 1);
user_pref("accessibility.typeaheadfind.flashBar", 0);
user_pref("browser.cache.disk.capacity", 0);
user_pref("browser.cache.disk.enable", false);
user_pref("browser.cache.disk.filesystem_reported", 1);
user_pref("browser.cache.memory.max_entry_size", -1);
user_pref("browser.link.open_newwindow.restriction", 0);
user_pref("browser.sessionstore.interval", 3600000);
user_pref("browser.sessionstore.resume_from_crash", false);
user_pref("browser.startup.homepage", about:config);
user_pref("browser.tabs.insertRelatedAfterCurrent", false);
user_pref("browser.tabs.tabMinWidth", 32);
user_pref("browser.tabs.warnOnClose", false);
user_pref("browser.tabs.warnOnOpen", false);
user_pref("browser.urlbar.maxRichResults", 16);
user_pref("browser.urlbar.placeholderName", Google);
user_pref("browser.urlbar.speculativeConnect.enabled", false);
user_pref("browser.urlbar.suggest.history", false);
user_pref("browser.urlbar.suggest.openpage", false);
user_pref("browser.urlbar.timesBeforeHidingSuggestionsHint", 0);
user_pref("dom.battery.enabled", false);
user_pref("dom.disable_window_move_resize", true);
user_pref("dom.disable_window_open_feature.close", true);
user_pref("dom.disable_window_open_feature.menubar", true);
user_pref("dom.disable_window_open_feature.minimizable", true);
user_pref("dom.disable_window_open_feature.personalbar", true);
user_pref("dom.disable_window_open_feature.titlebar", true);
user_pref("dom.disable_window_open_feature.toolbar", true);
user_pref("dom.event.clipboardevents.enabled", false);
user_pref("dom.forms.autocomplete.formautofill", true);
user_pref("dom.ipc.processCount", 32);
user_pref("dom.webnotifications.enabled", false);
user_pref("extensions.formautofill.addresses.enabled", false);
user_pref("font.internaluseonly.changed", true);
user_pref("layers.acceleration.force-enabled", true);
user_pref("layers.tile-height", 1024);
user_pref("layers.tile-width", 1024);
user_pref("media.navigator.enabled", false);
user_pref("media.video_stats.enabled", false);
user_pref("network.cookie.cookieBehavior", 1);
user_pref("network.cookie.lifetimePolicy", 2);
user_pref("network.dns.disablePrefetch", true);
user_pref("network.http.referer.trimmingPolicy", 2);
user_pref("network.http.referer.XOriginTrimmingPolicy", 2);
user_pref("network.http.speculative-parallel-limit", 0);
user_pref("network.predictor.cleaned-up", true);
user_pref("network.prefetch-next", false);
user_pref("places.frecency.bookmarkVisitBonus", 1000);
user_pref("places.frecency.unvisitedBookmarkBonus", 1000);
user_pref("privacy.clearOnShutdown.offlineApps", true);
user_pref("privacy.clearOnShutdown.openWindows", true);
user_pref("privacy.clearOnShutdown.siteSettings", true);
user_pref("privacy.donottrackheader.enabled", true);
user_pref("privacy.firstparty.isolate", true);
user_pref("privacy.history.custom", true);
user_pref("privacy.sanitize.pending", [{"id":"shutdown","itemsToClear":["cache","cookies","offlineApps","history","formdata","downloads","sessions","siteSetti);
user_pref("privacy.sanitize.sanitizeOnShutdown", true);
user_pref("privacy.trackingprotection.cryptomining.enabled", true);
user_pref("privacy.trackingprotection.enabled", true);
user_pref("privacy.trackingprotection.fingerprinting.enabled", true);
user_pref("security.certerrors.recordEventTelemetry", false);
user_pref("security.dialog_enable_delay", 0);
user_pref("security.identitypopup.recordEventElemetry", false);
user_pref("services.sync.declinedEngines", passwords,tabs,forms,history);
user_pref("services.sync.engine.addresses.available", true);
user_pref("services.sync.engine.history", false);
user_pref("services.sync.engine.passwords", false);
user_pref("services.sync.engine.prefs.modified", false);
user_pref("services.sync.engine.tabs", false);
user_pref("signon.autofillForms", false);
user_pref("signon.importedFromSqlite", true);
user_pref("signon.rememberSignons", false);

Firefox Domains Pulled from Firefox about:config

Block the following:
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 experiments.mozilla.org
0.0.0.0 telemetry.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 search.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 tbpl.mozilla.org
0.0.0.0 shavar.services.mozilla.com
#0.0.0.0 detectportal.firefox.com



All Domains:
#0.0.0.0 detectportal.firefox.com
0.0.0.0 accounts.firefox.com
0.0.0.0 activations.cdn.mozilla.net
0.0.0.0 addons.mozilla.org
0.0.0.0 aus5.mozilla.org
0.0.0.0 auth.services.mozilla.com
0.0.0.0 blocked.cdn.mozilla.net
0.0.0.0 blocklist.addons.mozilla.org
0.0.0.0 code.cdn.mozilla.net
0.0.0.0 content.cdn.mozilla.net
0.0.0.0 crash-stats.mozilla.com
0.0.0.0 discovery.addons.mozilla.org
0.0.0.0 experiments.mozilla.org
0.0.0.0 fhr.cdn.mozilla.net
0.0.0.0 ftp.mozilla.org
0.0.0.0 incoming.telemetry.mozilla.org
0.0.0.0 input.mozilla.org
0.0.0.0 install.mozilla.org
0.0.0.0 location.services.mozilla.com
0.0.0.0 malware-error.mozilla.com
0.0.0.0 mozilla.com
0.0.0.0 mozilla.org
0.0.0.0 onyx_tiles.stage.mozaws.net
0.0.0.0 phish-error.mozilla.com
0.0.0.0 phish-report.mozilla.com
0.0.0.0 push.services.mozilla.com
0.0.0.0 search.services.mozilla.com
0.0.0.0 self-repair.mozilla.org
0.0.0.0 services.addons.mozilla.org
0.0.0.0 services.mozilla.com
0.0.0.0 setup.services.mozilla.com
0.0.0.0 shavar.services.mozilla.com
0.0.0.0 support.mozilla.org
0.0.0.0 tbpl.mozilla.org
0.0.0.0 telemetry-experiment.cdn.mozilla.net
0.0.0.0 telemetry.mozilla.org
0.0.0.0 tiles.services.mozilla.com
0.0.0.0 token.services.mozilla.com
0.0.0.0 versioncheck-bg.addons.mozilla.org
0.0.0.0 versioncheck.addons.mozilla.org
0.0.0.0 webextensions.settings.services.mozilla.com
0.0.0.0 wiki.mozilla.org

Sunday, January 27, 2019

Modify Android Permissions with ADB

First:
Lets get a list of permissions:
./adb shell pm list permissions -d -g


Second:
Query against each permission:
./adb shell cmd appops query-op {X} allow | sort
./adb shell cmd appops query-op {X} default | sort
Where {X} is the Permission Name. Example:
./adb shell cmd appops query-op READ_SMS allow | sort

Third:
Change the permission for a specific package:
./adb shell cmd appops set {Y} {X} ignore
Where {Y} is the package name, {X} is the Permission Name. Example:
 ./adb shell cmd appops set com.whatsapp WRITE_CONTACTS ignore

Fourth:
Some important permissions you need to change:
VIBRATE
RUN_IN_BACKGROUND
WRITE_SETTINGS
PICTURE_IN_PICTURE
WIFI_SCAN
CAMERA
USE_FINGERPRINT
MONITOR_LOCATION
MONITOR_HIGH_POWER_LOCATION
TOAST_WINDOW
READ_EXTERNAL_STORAGE
WRITE_EXTERNAL_STORAGE

Thursday, January 3, 2019

Create a Disk Image & Restore It (Mojave / APFS)

First of all, Apple you SUCK!!!

Now, that's out of the way, here is how to create a disk image for APFS and restore it:

  • Boot Mojave from an external USB (CMD + Option)
  • Open Terminal
    • Unmount the disk (disk0 is the built-in disk):
      • diskutil unmountDisk /dev/disk0
    • Create the image:
      • hdiutil create -srcdevice /dev/disk0s2 -format UDZO /Volumes/100G/Macintosh_HD_Backup.dmg
    • Scan the image
      • asr imagescan --source /Volumes/100G/Macintosh_HD_Backup.dmg
    • Restore the image
      • asr restore --source /Volumes/100G/Macintosh_HD_Backup.dmg --target /dev/disk0s2 --erase
      • When it asks to restore it to disk1, APFS, say 'y'.