❯ brew install blacktop/tap/ipsw
❯ ipsw download ota -V --macos --device Macmini9,1 --model J274AP
❯ unzip -l 8093b01ee46664b82427188ff61334501fd1b0d8.zip | grep DeviceTree
```bash | |
sudo rm -rf /Users/p.xing/Library/Application\ Support/iMazing/Prefs/.sets | |
``` |
### Unofficial Dump of UniFi system.cfg Properties | |
### | |
### WARNINGS: | |
### - This list is undocumented, unsupported, and incomplete. | |
### - Some options may be deprecated and ignored. | |
### - Some options WILL break your setup. | |
### - Some options work now but WILL break you in a future firmware update. | |
### | |
### USING THESE: | |
### See https://help.ui.com/hc/articles/205146040#2 |
❯ brew install blacktop/tap/ipsw
❯ ipsw download ota -V --macos --device Macmini9,1 --model J274AP
❯ unzip -l 8093b01ee46664b82427188ff61334501fd1b0d8.zip | grep DeviceTree
{ | |
"iOS": { | |
"iOS release": "01c1d682-6e8f-4908-b724-5501fe3f5e5c", | |
"iOS alternate": "c724cb61-e974-42d3-a911-ffd4dce11eda", | |
"iOS generic": "0c88076f-c292-4dad-95e7-304db9d29d34", | |
"iOS 11 developer beta": "b7580fda-59d3-43ae-9488-a81b825e3c73", | |
"iOS 11 AppleSeed beta": "f23050eb-bdfa-4b23-9eca-453e3b1a247c", | |
"iOS 11 public beta": "5839f7cf-9610-483a-980f-6c4266a22f17", | |
"iOS 12 developer beta": "ef473147-b8e7-4004-988e-0ae20e2532ef", | |
"iOS 12 public beta": "94bf0742-38e6-4379-adf9-ec9995dde586", |
(EDIT: Besides Reddit, I've also put this up on Github Gist)
So while looking for information on security keys before getting one myself, I got very confused reading about all the different modes and advertised features of Yubikeys and other similar dongles. The official documentation tends to be surprisingly convoluted at times, weirdly organized and oddly shy about a few of the limitations of these keys (which I'm making a point of putting front and center). Now that I have one, I decided to write down everything I figured out in order to help myself (and hopefully some other people reading this) make sense of all this.
Since I'm partly writing these notes for myself, there might be some back and forth between "exp
In Adobe Flash Player versions newer than 32.0.0.344 they added a "Timebomb" for the EOL.
the player would refuse to run any custom flash content after 12/01/2021,
instead it would just show this
So knowing this, Lets crack it!
I acturally started looking into this before the 12/01/2021 hit, but only recently did i acturally discover a way to bypass the killswitch
(also- im aware i was not the first to do this, but i still did do it)
== Visual Studio .NET 2003 (DO NOT COPY THIS LINE) == | |
Microsoft Visual Studio Solution File, Format Version 8.00 | |
# Visual Studio .NET 2003 | |
VisualStudioVersion = 7.1 | |
== Visual Studio 2005 (DO NOT COPY THIS LINE) == | |
Microsoft Visual Studio Solution File, Format Version 9.00 | |
# Visual Studio 2005 | |
VisualStudioVersion = 8.0 |
#!/bin/bash -e | |
unshare -m bash <<'EOF' | |
mount --make-rprivate / | |
for f in /etc/pacman.d/*.sync; do | |
filename="${f%.*}" | |
mount --bind "$f" "$filename" | |
done | |
pacman -Sy | |
EOF |
import base64 | |
import hashlib | |
import zlib | |
from ctypes import ( | |
CDLL, | |
POINTER, | |
LittleEndianStructure, | |
c_size_t, | |
c_ubyte, | |
c_uint64, |
#!/usr/bin/env zsh | |
set -e; | |
set +m; # Job control would've been nice, but manual round robin it is, sigh. | |
if [ -z "${ZSH_VERSION+x}" ]; then | |
echo 'Try again with zsh.'; | |
exit 1; | |
fi; |