Unblock url.com

Reddit J-Pop

2010.03.28 22:03 Reddit J-Pop

A place for content and discussion revolving around the Japanese popular music scene
[link]


2009.09.24 06:25 learn programming

A subreddit for all questions related to programming in any language.
[link]


2012.12.12 18:01 RoflJoe Full-Length Music Albums on YouTube

Post full albums from YouTube. Share and discover.
[link]


2024.05.13 16:31 dScryb May Dispatch: Opus updates, 450 new tracks, DELVE, May giveaway, and more

May Dispatch: Opus updates, 450 new tracks, DELVE, May giveaway, and more
Hello Gamemasters and Friends,
Let's start with the May Giveaway and then get into the updates.

Enter the May Giveaway

Our good friend Bob from the YouTube channel Bob World Builder, along with Eventyr Games, have just launched DELVE—a 200+-page guide to dungeons for 5E Dungeons & Dragons and Shadowdark RPG on Kickstarter. To celebrate, we're giving away the following:
It’s free to enter: dScryb Giveaway
Languorbloom by Daniel Caballero

Opus Updates

If you're not already aware, Opus is a freshly-built, single-page web app that brings together dScryb's text, ambiences, sound effects, and music. It can play high-quality audio for your in-person or virtual players, and it works with Kenku FM for Discord integration.
Opus
Here's what we've added since the last newsletter:
  • Mobile responsive design and support
  • Rich text formatting and hyperlinks, and support for common hotkeys such as CTRL + B
  • Edit in place for block text and titles
  • Image embedding with URL
  • Fading in and out for ambience, and crossfading for music
  • Pinning in Roam
  • Improve search UI in collections
  • Collection blocks have anchor links
  • Opus FAQ page
  • Performance updates
  • Bug fixes (including a critical bug that affected players' music)
We've also added nearly 450 new sound effects, mainly spells, weapon attacks and monster deaths!
Right now, on the content side, our priority is composing sound effects and descriptions for all 5e spells, followed by monsters. We expect all 5e spell sound effects to be published this month.
Hear what's new. Try Opus!

Opus Roadmap

We're continuing to enhance the user interface, including general polish and bug fixes—but our main focus for the next few weeks will be database improvements utilizing Node.js. It's not sexy but it will improve performance and unblock certain features that we're excited to develop next.
After that, the next two items in our roadmap are (1) advanced music playlist and sfx board selection in collections; and then (2) player-fired SFX and Character files.
We want to encourage participation in the beta, so we're currently offering a free 14-day trial on all subscriptions. (We recommend trialing the Celestial subscription, as this unlocks all content within Opus.) This offer is available to everyone, including current Composer, Hero, and Player subscribers.
Start your free trial!

Delve – A Guide to Dungeons for 5E & Shadowdark RPG

DELVE is a 200+-page guide to dungeons for 5E Dungeons & Dragons and Shadowdark RPG by Bob World Builder and Eventyr Games.
DELVE combines classic advice with modern resources that’ll make crawling through dungeons fun for the players and easy for the GM!
DELVE Kickstarter
DELVE has advice and guides for building awesome dungeons, new player options for dungeon delving characters, and plug-and-play dungeons filled with unique monsters, hazards, traps, and challenges!
You can check out the DELVE Kickstarter here.

New Auto-SFX Feature in Foundry

Version 4.4.3 of the dScryb Foundry module is out with the Auto-SFX feature! Go try it out!
How it works:
We've mapped hundreds of sound effects to hundreds of weapons, spells, items, monster deaths and more. All these assignments can be overwritten (and reverted) by the user. Also, an item that doesn't have a sound effect assignment can receive a custom sound effect assignment by the user.
When these events occur, such as a weapon attack or monster death, the mapped sound effect is automatically played for everyone to hear.
dScryb's Foundry VTT Module: Auto-SFX
As we publish more sound effects, it will only get better. We aim to have all 5e spells done by the end of the month.
Currently, this feature is only available for the 5e game system, but we have our sites on the Pathfinder game system next.
And there's more great development coming soon for this module!
If you haven't already seen it, our friend Fondue from Dice & Easy released a fantastic walkthrough of the dScryb Foundry VTT module.

March dScryb Giveaway Winner, Alex!

dScryb congratulates the winner of the February dScryb giveaway, Alex!
We thank everyone who participated in the giveaway.

More Fantastic Content

dScryb has published over 14,650 scenes, 4,750 sounds, and 75 maps!

Join Us on Discord!

Vote on new sound effects and ambiences and stay in-the-know about dScryb’s upcoming features and content by joining our Discord server! The team and I are there often, and our writers, editors, illustrators, and composers occasionally pop by to say hello and answer questions. There’s great discussion taking place each day. We look forward to seeing you.
If Discord’s not your thing, you can email me via [info@dscryb.com](mailto:info@dscryb.com) with your questions, suggestions, or concerns, and I’ll get back to you.
Happy adventures, David
submitted by dScryb to dScryb [link] [comments]


2024.05.06 02:22 Techhead7890 Cosmetic Filtering and "Invalid Filter: Bad Domain Error"

Hi all, I was trying to apply cosmetic/CSS filters to specific URLs rather than a whole domain, but I'm not entirely sure if this is possible. Basically, I wanted to block a CSS class on most pages because it was used on an annoying div, but if I went to a specific subpage, I wanted that CSS class to be unblocked so I could see the div. This threw the error in the title.
Whenever I had ## in the filter already, and tried to modify it by adding a slash after the TLD, or add to the start of a URL, it would throw the "Invalid Filter: Bad Domain Error". For example, hello.com/##.class or hello.com###id would return this error.
I was eventually advised that "these filters are applied to all pages on the specified domain" and that "Cosmetic filtering in uBlock Origin primarily works with domain names rather than URL patterns." Can anyone confirm if that's an accurate understanding?
If this is true, then I would like to suggest that the error acknowledges this is in some way because of the cosmetic filtering restricting the input to only domain names, rather than trying to assume that whatever the input given is supposed to be a domain name.
Is this something I should submit to the Github issue tracker? I've never used it before so is it as simple as just filling out the form? Thanks in advance!
submitted by Techhead7890 to uBlockOrigin [link] [comments]


2024.05.04 06:27 Few-Ad3972 My experience with PureFibre X 3.0 Gigabit Internet

(This is a throwaway)
It's fast!
 Speedtest by Ookla Server: TELUS - Vancouver, BC (id: 3049) ISP: Shaw Communications Idle Latency: 2.50 ms (jitter: 0.14ms, low: 2.48ms, high: 3.00ms) Download: 3094.32 Mbps (data used: 3.1 GB) 11.54 ms (jitter: 0.40ms, low: 2.46ms, high: 12.58ms) Upload: 3067.65 Mbps (data used: 1.5 GB) 7.62 ms (jitter: 0.62ms, low: 2.41ms, high: 9.48ms) Packet Loss: Not available. Result URL: https://www.speedtest.net/result/c/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 
I have had Shaw (now Rogers) 1.5Gb down/150Mb up for many years. Telus sent me a SPRINGSAVINGS promo code for Residential service. The promo was:
1.0Gb up/1.0Gb down for $65/month on a 2-year contract 1.5Gb up/1.5Gb down for $75/month on a 2-year contract 3.0Gb up/3.0Gb down for $85/month on a 2-year contract 
I signed up for 3.0Gb and after a lengthy installation process, I was testing. I never canceled Rogers/Shaw yet. However, the brass tacks of it all is I hate to report that Telus filters incoming ports for Residential service. If this matters to you, it's a big problem. Their security measures policy mentions certain ports are blocked but in fact, all incoming ports seem to be blocked.
From a consumer-like-me point of view, the security policy is stupidly restricting "to protect me". However, if you pay (a lot) more, you can get a business account that does not block any ports. Go figure.
I had 15 days to trial the service and decided to cancel after 5 days. There is no option (I've talked to many Telus departments - tech support tiers, loyalty, business sales, etc) to unblock ports except to go to a business account which doesn't block ports. The business account is over $200/month on a 3-year contract (without a promo). With a promo, I was offered as low as $115/month on a 5-year contract, $135/month on a 3-year contract.
There are a lot of technical details behind my testing but not worth mentioning here. Things may be different on the lower tier speeds but for 3Gb, you receive the Network Access Hub (Technicolor NH20T), an SPF+ XGS PON and the WiFi 6E. The NH20T is what's registered on the Telus back end, so you cannot bypass the NAH, plugging the SPF+ module directly into another device.
It was a fun 5 days... but it wasn't something that was going to work for me in the long run. Again, if having incoming ports open is important to you, don't bother. Rogers/Shaw doesn't block ports.
submitted by Few-Ad3972 to telus [link] [comments]


2024.05.03 23:50 cdbessig Santander Bank - Web Filter List on Firewall

Hey All,
We have a client who runs a large and popular financial news site. They recently rebranded to a new .com url and we have just found out they seem to be blocked in santander bank.
Looking at their screenshot the block reason is "SCIB - Blocked Categories".
My belief is that it is possible that since the site is new it has not been assigned a category by the firewall vendor and thus is in a "uncategorized" category, which may be blocked by their corporate IT policy. The best course of action is to work with their corporate IT team to get the site unblocked and categorized properly so whatever vendor they are using can propagate it to any other customers who may also use a similar ruleset.
Of course our client and this end user in the bank just want to throw their hands up and not realize why it can't be fixed. They're constantly pushing us for an update and the fact that there must be something we can do.
The only thing I can think of is the fact that these firewalls use url databases. For example, PAN-DB for palo alto firewalls. I am thinking if we can find out what firewall manufacturer they use, we can find out the url list and then submit a category or appeal or something to see if our site is listed appropriately or not at all as a legitimate financial news organization.
I am not sure if they use palo alto or what - and I couldnt see a way to query this "PAN-DB", so I'm here asking for any ideas.
Thanks!
submitted by cdbessig to sysadmin [link] [comments]


2024.04.30 18:29 thesaltedradish Is the site down?

when i put in the url for old character ai, it says i have to unblock challenges.cloudflare.com (on both mobile and desktop! come on i don't like the new site *sob*)
the new site doesn't let me log in properly either :( on mobile it's stuck on the verification page. really sucks. i had all these plot ideas.
submitted by thesaltedradish to CharacterAI [link] [comments]


2024.04.20 02:14 LaLaLaLuzy Information on the Doxxing of Kenji. Names Involved: Dovealove, Mofongo Boys(RiiKami, Kage, Phoenixx, and AndySSJ5), and Thintrovert

Last Edit: April 28, 2024 10:58am EST
Preface: I imagine you've seen this comment already, but I decided to make a post and not need to constantly update the comments for whatever reason. Links below lead to Youtube, Imgur, and Twitter. If you can't access Twitter, I have screenshots available. Hopefully this is all the info, but I imagine there will be more.
I may use the full name or shortened name of the vtubers interchangeably.
Videos and Screenshots
Rough Timeline
  1. Kenji was doxxed by a secret dox chat with Dove and others
    1. There may be a separate secret hate chat that had Mofongo Boys' Kage, Dovealove, Thin, and others
    2. The "hate group" and "dox group" are claimed to be separate by Thin and Maki uses "Hate group" in their tweet, but not "dox"
  2. Kenji revealed his face to "out-dox" the dox chat on Feb 11, 2023 stream(according to Erundel and Kenji tries to play it off)
  3. Kenji had a [clip] of him calling Zaion LanZa (now Sayu) a p*dophile and his chat supposedly doxxed [sensitive information]
    1. The [italics] indicates removed links or text. The [clip] or other videos related to Zaion's dox can be found, but doxxing is not allowed on this subreddit and would go against this entire post's purpose.
    2. Due to Kenji's chat supposedly doxxing information on Zaion, some people don't have sympathy for Kenji's own dox.
    3. I cannot confirm which order point 2 and point 3 occur, but Kenji's face reveal was Feb 11 and Zaion's termination tweet was March 10. So the clip likely happened before or around March 10, 2023.
  4. Kenji being doxxed is now revealed and Mofongo Boys' members are apologizing over Twitter (and Kage has a stream clip on Erundel's coverage) and cutting ties with Dovealove.
  5. Dovealove and Kage seem to be having the worst experience.
    1. Dove confirming themselves of being the doxxer and tweeted by Kenji. Dove is also accused by @/hayayena of spreading rumors and being manipulative.
    2. Kage getting an angry tweet from Kenji and @/OliDeliber accusing him of being "the most awful client"
  6. Twitter is going mob mentality on anyone Kenji is against, whether they are confirmed (Dove, Thin, Kage) or simply guilty by association (Phoenixx, AndySSJ5, and RiiKami) or Sayu.
  7. Sayu and Kenji have come to an agreement and ask their fans to not harass
    1. Prior to the reconiclliation, there were angry tweets screenshotted and shared on kurosanji (they side with Sayu and don't brigade, just view screenshots) (Kenji tweeting Sayu blocked him, Sayu unblocking to talk, Kenji's tweet response to DM, Sayu's response)
    2. April 23, 2024 EST: Kenji told fans on a Twitch stream to not harass Sayu (Reddit Clip Post)
    3. April 24, 2024 EST: Kenji has fans or trolls using the drama to continue to harass Sayu. Sayu privated her Twitter (Reddit Screenshot Post).
  8. Kage posted an apology video
    1. Explains his background experience
    2. He is graduating
    3. Some tried doxxing him
    4. Video description claims that the "hate" and "dox" group chat are separate
Dove, Thin, and Mofongo Boys
The Mofongo Boys were a group of male vtuber friends (RiiKami, Kage, Phoenixx, and AndySSJ5) and other friends (like Dove and Thin) would collab too. RiiKami and Andy also removed all Mofongo Boys channel links on their youtube channel (personally noted on April 18th EST).
submitted by LaLaLaLuzy to VirtualYoutubers [link] [comments]


2024.04.19 22:07 LaLaLaLuzy Kenji's Dox that involves Dovealove and Mofongo Boys (Phoenixx, Kage, AndySSJ, and RiiKami)

Last Edit: April 28, 2024 10:58am EST
Preface: I imagine you've seen this comment already, but I decided to make a post and not need to constantly update the comments for whatever reason. Links below lead to Youtube, Imgur, and Twitter. If you can't access Twitter, I have screenshots available. Hopefully this is all the info, but I imagine there will be more.
I may use the full name or shortened name of the vtubers interchangeably.
Videos and Screenshots
Rough Timeline
  1. Kenji was doxxed by a secret dox chat with Dove and others
    1. There may be a separate secret hate chat that had Mofongo Boys' Kage, Dovealove, Thin, and others
    2. The "hate group" and "dox group" are claimed to be separate by Thin and Maki uses "Hate group" in their tweet, but not "dox"
  2. Kenji revealed his face to "out-dox" the dox chat on Feb 11, 2023 stream(according to Erundel and Kenji tries to play it off)
  3. Kenji had a [clip] of him calling Zaion LanZa (now Sayu) a p*dophile and his chat supposedly doxxed [sensitive information]
    1. The [italics] indicates removed links or text. The [clip] or other videos related to Zaion's dox can be found, but doxxing is not allowed on this subreddit and would go against this entire post's purpose.
    2. Due to Kenji's chat supposedly doxxing information on Zaion, some people don't have sympathy for Kenji's own dox.
    3. I cannot confirm which order point 2 and point 3 occur, but Kenji's face reveal was Feb 11 and Zaion's termination tweet was March 10. So the clip likely happened before or around March 10, 2023.
  4. Kenji being doxxed is now revealed and Mofongo Boys' members are apologizing over Twitter (and Kage has a stream clip on Erundel's coverage) and cutting ties with Dovealove.
  5. Dovealove and Kage seem to be having the worst experience.
    1. Dove confirming themselves of being the doxxer and tweeted by Kenji. Dove is also accused by @/hayayena of spreading rumors and being manipulative.
    2. Kage getting an angry tweet from Kenji and @/OliDeliber accusing him of being "the most awful client"
  6. Twitter is going mob mentality on anyone Kenji is against, whether they are confirmed (Dove, Thin, Kage) or simply guilty by association (Phoenixx, AndySSJ5, and RiiKami) or Sayu.
  7. Sayu and Kenji have come to an agreement and ask their fans to not harass
    1. Prior to the reconiclliation, there were angry tweets screenshotted and shared on kurosanji (they side with Sayu and don't brigade, just view screenshots) (Kenji tweeting Sayu blocked him, Sayu unblocking to talk, Kenji's tweet response to DM, Sayu's response)
    2. April 23, 2024 EST: Kenji told fans on a Twitch stream to not harass Sayu (Reddit Clip Post)
    3. April 24, 2024 EST: Kenji has fans or trolls using the drama to continue to harass Sayu. Sayu privated her Twitter (Reddit Screenshot Post).
  8. Kage posted an apology video
    1. Explains his background experience
    2. He is graduating
    3. Some tried doxxing him
    4. Video description claims that the "hate" and "dox" group chat are separate
Dove, Thin, and Mofongo Boys
The Mofongo Boys were a group of male vtuber friends (RiiKami, Kage, Phoenixx, and AndySSJ5) and other friends (like Dove and Thin) would collab too. RiiKami and Andy also removed all Mofongo Boys channel links on their youtube channel (personally noted on April 18th EST).
submitted by LaLaLaLuzy to u/LaLaLaLuzy [link] [comments]


2024.04.19 12:47 mupet0000 PSA: Microsoft Store issues resolved by unblocking an IP range

I’ve recently been testing out an Intune deployment and finding app installations failing sometimes with the error code 0x80d02017.
Further investigation showed that sometimes the Microsoft Store couldn’t be opened with the error “Sorry about that! Something went wrong, but we are making it right. Try refreshing or come back later.”. If the store did load, it failed to install apps/updates with the error “something happened on our end”.
I checked out my Intune configuration and GPOs but nothing set to block the store.
Checked the firewall and found connections to a set of IPs coming from all of our Windows machines being blocked. We block all explicit IP address connections (1.2.3.4) on port 80 & 443 that do not use a DNS name (url.website.com) unless explicitly whitelisted.
Anyway it turns out that the range 151.139.43.0/24 is being used to push Microsoft store content and app updates. They are not using a DNS name, they are connecting direct by IP. By unblocking this range, the store behaves like normal and Intune app deployment works.
Usually updates come from URLs and they’re much easier to manage/categorise, so it’s very frustrating that Microsoft are pushing updates via IP addresses. I hope this helps someone else facing the same problems, as I couldn’t find anything online about this IP address range.
submitted by mupet0000 to sysadmin [link] [comments]


2024.04.19 02:58 Butta_69 Need thermostat wiring guidance

Need thermostat wiring guidance
I just bought an old condo in December. The heat went out in Feb and took 6 HVAC techs to fix it (2-3 of them even ghosted me because it didn't seem worth their time). One guy finally fixed the heat by unblocking some filter in the condenser and putting in a new thermostat. Now the cooling system doesn't work lol. I called the guy and he said it had something to do with the thermostat wiring, specifically that it couldn't turn on the condenser?
It has a wonky electric air handler / condenser setup:
Air handler - Coleman model #AP30BBB21 - Link to technical manual
Condenser - Ameristar model #M4HP4030A1000A - Link
Thermostat - Honeywell T6 Pro Programmable Thermostat
I found the wiring section in the air handler technical manual linked above, and tried a few things. The options are confusing. Here is the current wiring setup that works with the heat:
https://preview.redd.it/onngvmz94cvc1.jpg?width=3024&format=pjpg&auto=webp&s=ecd218c7ed4dddd5b1299654739008a6ae8cc3f2
submitted by Butta_69 to hvacadvice [link] [comments]


2024.04.04 09:49 dai_webb 3rd party patches failing to install using NinjaRMM

Hello.
We have recently rolled out NinjaRMM across our endpoints and have seen a lot of failures to install 3rd party patches (things like FileZilla, Notepad++, WebEx, Chrome, etc).
I've already overcome a few issues (we're behind Sophos SG firewalls, and by default all web traffic is blocked, unless proxied, so I've unblocked thousands of Amazon IP addresses). I've also added the URLs to the exclusions for web filtering. These are the hosts I've used:

Now, in the logs, I'm seeing HTTP 401 errors. As the log is really verbose, and consists of thousands of lines, here's what stands out:

SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
ALPN: server accepted http/1.1
Server certificate:
subject: CN=*.ninjarmm.com
start date: Jan 30 00:00:00 2024 GMT
expire date: Feb 27 23:59:59 2025 GMT
subjectAltName: host "agent-app.ninjarmm.com" matched cert's "*.ninjarmm.com"
issuer: C=US; O=Amazon; CN=Amazon RSA 2048 M03
SSL certificate verify ok.
using HTTP/1.1
<-HTTP/1.1 401 Unauthorized
<-Date: Thu, 04 Apr 2024 05:53:53 GMT
<-Content-Type: application/json
<-Content-Length: 135
<-Connection: close
<-Server: nginx/1.21.5
<-Vary: Accept-Encoding
<-
Closing connection
TLSv1.2 (OUT), TLS alert, close notify (256):
CURLINFO_HTTP_CODE=401
CURLINFO_HTTP_CONNECTCODE=0
06:53:53.294 E 3PPWRK:1876 [ serverresponse.cpp:73] RspSize[135] StatusCode[401] RequestURL[agent/credential] ResponseCode[FAILURE] ErrorInfo[HTTP 401 Unauthorized]
06:53:53.294 E 3PPWRK:1876 [ distressmonitor.cpp:293] Distress Signal[FAILED_HTTP_POST_FETCH_CREDENTIALS]:(5) Got error 401 when POST
06:53:53.294 E 3PPWRK:1876 [ credentialmanager.cpp:123] Won't retry to fetch credentials...
06:53:53.294 E 3PPWRK:1876 [ ProcessUtils.cpp:85] Failed to retrieve credentials from server.

Has anybody else seen anything similar?
submitted by dai_webb to sysadmin [link] [comments]


2024.03.26 05:15 Ming233 A new FIDO Scam?

Greetings Community,
I'm eager to share a cautionary tale about a scam that involved FIDO, to raise awareness among you all. Here's the gist of my situation:
I've set my iPhone to block unknown and scam calls, allowing only contacts to reach me, with FIDO 1(888)481-3436 being a whitelisted contact. My ongoing plan was $27.25 for 80GB of data with a free iPhone 11.
On the 13th of March, a call came in from FIDO (whitelisted number: 1(888)481-3436), who presented a special deal: a monthly rate of $48.9 for 80GB of data and a free iPhone 15 Pro Max featuring 1TB of storage. The proposition caught my interest, but due to my busy schedule, I asked for the call to be rescheduled. Unfortunately, there's no record of this conversation since it took place over the phone, and the representative mentioned they were unable to provide the details via email.
On March 15, I got another call from FIDO - 1(888)481-3436, where they asked for just my email and a verbal "I confirm" to move forward. After this, I was transferred by the FIDO agent to someone claiming to be from Best Buy to arrange delivery, which began to make me wary. Despite my reservations, I went along with it but soon noticed inconsistencies between the initial offer and what was actually being processed in my account. The monthly payment was adjusted from $27.25 to $45.9, and my data plan was unexpectedly upgraded from 80GB to 100GB, contrary to the originally stated $48.9 for 80GB. To add to my concern, a FedEx shipping label for an iPhone 15 Pro Max with 512GB was emailed to me within an hour, deviating further from the deal described. This discrepancy gave me pause, especially when I found out the FIDO customer service center had closed early that Friday, leaving me no way to clarify these issues immediately. Unfortunately, there's no written record of these discussions since they occurred over the phone, and the representative mentioned they were unable to send any offer details via email.
On the morning of March 16, I reached out to FIDO via their website, using the "AskJack" feature, to report inaccuracies with the plan and phone. The FIDO representative apologized for the mix-up and promised to correct the order and upgrade the phone to the 1TB version, instructing me to return the 512GB model. Concerned about potential extra charges, I queried about the specifics of the plan—$48.9 monthly with a complimentary phone, sounding almost too attractive. The agent reassured me that there were no additional fees and acknowledged the initial mistake in the order setup, committing to resolve it. They also mentioned a finance payment would appear on my account before I shipped the 512GB phone back via Canada Post, yet assured me my account was secure and there was nothing to worry about. I have saved the chat history of this conversation for reference.
Around noon on March 16, I received a barrage of calls from 1(888)683-0142. Typically, scam numbers might call once or twice, but this one was persistent, calling me six times in quick succession. Deciding to investigate, I unblocked the number to see what the caller wanted. A person, claiming to be a FIDO agent but lacking professionalism, instructed me to contact him once the phone arrived. He offered to assist with activating the new iPhone and with the return of the incorrect one via Canada Post. I agreed to his request but, preferring not to engage further and to save time, I blocked the number again shortly after.
In the afternoon of March 16, upon reviewing my account, I noticed a finance payment listed for the iPhone 15 Pro Max 1TB. Interestingly, there was no such payment for the 512GB version, which seemed odd and only served to diminish my confidence in FIDO's system. Logically, I would have expected the finance payment to apply to the 512GB model, not the 1TB one, given the circumstances. This discrepancy added to my growing concerns about how the situation was being handled.
On Monday, March 18, I was surprised to receive two new phones at the same time. Faced with the task of returning one, I only found a Purolator return label in my email, which lacked a specific destination. Recalling a previous chat on March 15 where a FIDO agent mentioned Canada Post for returns, I sought clarification through "AskJack." The agent confirmed that Purolator was indeed correct, dispelling my initial belief in Canada Post. Given my cautious nature, I probed further about the finance payment being assigned to the 1TB phone instead of the 512GB model, and the monthly rate being $45.9, not the $48.9 initially quoted. The agent affirmed the accuracy of these details, explaining the presence of a separate $75.31 monthly charge for the 512GB phone, which was not initially disclosed, and a $95.22 charge for the 1TB phone on top of the plan, effectively obscuring the phone charge in the FIDO app. Exhausted by the complexities of this deal, I requested to return both phones and revert to my original plan (better plan). The agent instructed me to use the provided Purolator tracking number for the return and mentioned that a supervisor would contact me within the next three business days at 1(888)481-3436. I informed the agent of my intention to keep the chat log for records, ensuring I had documentation of our conversation.
I decided to hold off on returning the phones right away, opting to wait for a call back from the FIDO supervisor at the official number, 1(888)481-3436. However, no such call came through; instead, my phone was inundated with numerous scam calls, a significant increase from the one or two scam calls I used to receive daily. Now, it's escalated to more than ten scam calls a day.
On the afternoon of March 22, seeking resolution, I reached out through "AskJack" once more. This time, the agent advised me to initiate the call myself, as it seemed unlikely that a manager would contact me as promised. Following their suggestion, I attempted to call FIDO, only to find that they were closed, their business hours ending at 5:00 PM MST on Fridays.
On the morning of March 23, I contacted the FIDO support center at 1(888)481-3436, requesting to speak directly with a supervisor. Initially met with resistance from the agent, who explained he couldn't simply transfer my call, I spent 30 minutes explaining my predicament. Eventually, he grasped the severity of my situation and revealed a crucial piece of information: FIDO does not conduct promotions over the phone. He advised me to return both iPhones using the provided Purolator label, assuring its safety.
However, upon finally being transferred to a supervisor after a lengthy wait, I was met with a contradiction. The supervisor informed me that the Purolator method was incorrect; FIDO exclusively uses Canada Post for returns, complete with a provided address and PO#. The FIDO supervisor is going to provide me two Canada Post return labels. Each label is for one phone only. The label will be email to me shortly, which I never receive this email. Due the the a stark departure from the initial instructions and to document this conversation, I requested the supervisor email me all the details, emphasizing the importance of having an official record from a FIDO domain, not an unfamiliar one. Yet, she informed me that their system prohibits email correspondence in such matters, offering only a case number as a form of documentation. She assured me that upon receipt of the returned phones, they would proceed to revert my plan. Regrettably, this conversation wasn't recorded, leaving me with just the case number as proof of our interaction.
By 18:51 on March 25, I hadn't received any Canada Post return label or any relevant email, yet an unexpected email arrived from FIDO stating that "a new PIN" had been created for my account. Attempting to log in to the FIDO app and website to consult "AskJack," I discovered my account was suspended. Unsuccessful in reaching anyone through the 1(888)-481-3436 number, I decided to visit a FIDO store directly for assistance.
Upon discussing the situation with a FIDO store representative, I was met with a dismissive reaction and a smile. The agent suggested that I had fallen victim to a scam, emphasizing his point by noting that the initial contact number, 1(888)-481-3436, was flagged as a scam number upon searching Google, with a Reddit post titled "new scam call never seen before : Rogers" appearing as a top result. Despite my insistence that this was the official support number for FIDO, the agent remained adamant that it was a scam. Frustrated, I showed him the contact information listed on the FIDO website for verification. However, he stood by his assertion and advised me to dial 611 for support, indicating there was nothing further he could do to assist me in the store.
On the morning of March 26, I reached out to a FIDO agent through the "AskJack" feature. The agent expressed regret over the fraudulent situation but stated they were unable to revert my plan back to the original "$27.25 with 80GB data" or offer me "the free iPhone with $48.9 with 80GB data" deal. This left me wondering about my next steps and whether I would have to purchase the phone. After a five-minute wait with no further response, the agent disconnected, ending the conversation and preventing me from saving the chat history. I attempted to contact an agent again via "AskJack," only to be told once more that they were powerless to help. They mentioned that the fraud department would contact me via an unknown number and advised me to unblock all numbers to ensure communication. However, I was skeptical about this assurance, recalling a promise from a conversation on March 18 that went unfulfilled. Consequently, I decided to directly contact the fraud department 1-888-764-3771 myself.
In my opinion, this offer is too good to believe, but I have the following concern and questions:
  1. Is it possible for a scammer to dispatch phones from FIDO to me, utilizing only my email and address through FIDO's system, assuming the scammer have access to my name and other details from the black market?
  2. What is the scammer's motive for sending me the phones? It seems more logical that they could have simply redirected the phones to themselves using my account details.
  3. Why does FIDO seem indifferent to this issue? Are they profiting from the victims' losses?
  4. Is 1-888-482-3436 a scam number? Despite the FIDO store representative's insistence that it is, this number is officially listed on FIDO's website under their contact information for home phone services.
  5. Given the untrusted of the number 1-888-482-3436 , I attempted to reach FIDO through the "AskJack" feature. The FIDO "AskJack" agent recommended returning the phones via Purolator, while his supervisor was adamant that I should be sent back through Canada Post(Same as the unprofessional Scamer). Who should I trust?
  6. So far, FIDO appears to be the only party benefiting from this situation. The scammer didn't get the phone, and I've lost my original contract and personal information. Should I stop using FIDO and block FIDO monthly payment from bank account?

Personal Analysis of Interest Relationships:
submitted by Ming233 to FidoMobile [link] [comments]


2024.03.21 11:44 Aggressive_Scale5514 Addressing Common Issues with Robots.txt: Effective Solutions

Ensuring your website is properly indexed and crawled by search engines is paramount. Enter robots.txt – a powerful tool used to dictate which parts of your site search engine bots can access. However, like any technical aspect of SEO, robots.txt files are not immune to glitches. In this comprehensive guide, we’ll explore common issues with robots.txt and offer practical solutions to address them effectively.
Misplaced Robots.txt: Root Directory Matters
When it comes to robots.txt, location is everything. Placing it in the wrong directory can render it invisible to search engine bots, leading to unintended consequences.
Solution: Ensure your robots.txt file resides in the root directory of your website. This ensures optimal visibility to search engine crawlers, enhancing your site’s indexing efficiency.
Tackling Wildcard Woes
While wildcard characters like asterisks (*) offer flexibility, they can also inadvertently block or allow access to vast portions of your website, posing a risk to your SEO strategy.
Solution: Adopt a minimalist approach to wildcard usage, testing each directive meticulously. Strike a delicate balance between restricting access and ensuring essential content remains accessible to search engine bots.
Evading Noindex Dilemma
As search engines evolve, relying solely on robots.txt to enforce noindex directives becomes obsolete, potentially leading to unexpected indexing of sensitive pages.
Solution: Embrace alternative methods such as robots meta tags or x-robots directives embedded within page code. Transition seamlessly to these modern techniques to safeguard sensitive content from search engine indexing.
Unblocking Vital Resources: Balancing Accessibility
Blocking critical resources like JavaScript and CSS files can impair search engine bots’ ability to render and index your webpages accurately, affecting your site’s overall visibility.
Solution: Review and amend your robots.txt directives to ensure essential resources are accessible to search engine crawlers. Strike a balance between blocking non-essential files while permitting access to vital resources for optimal indexing.
Embracing XML Sitemaps
While not a direct robots.txt issue, omitting the XML sitemap URL from your robots.txt file can hinder search engine crawlers’ ability to navigate and index your site efficiently.
Solution: Incorporate the URL of your XML sitemap into your robots.txt file to provide search engine bots with a roadmap to your site’s structure. This proactive measure enhances crawling efficiency, boosting your site’s search visibility.
Securing Unfinished Projects
Allowing search engine bots to index developmental or unfinished webpages can tarnish your site’s reputation and user experience, leading to negative SEO implications.
Solution: Implement a disallow directive in your robots.txt file for development sites to prevent premature indexing. Remember to remove this directive upon site completion to ensure seamless transition to the live environment.
Opting for Relative URLs
While absolute URLs offer clarity in certain contexts, using them in robots.txt files can lead to ambiguity and misinterpretation by search engine bots.
Solution: Embrace relative URLs in your robots.txt directives to accurately convey crawling restrictions to search engine crawlers. Opting for relative paths ensures seamless navigation of crawling directives, mitigating potential indexing errors.
Navigating Deprecated Elements
With evolving search engine algorithms, deprecated elements like crawl-delay and noindex directives in robots.txt files risk becoming obsolete, impacting your SEO strategy.
Solution: Embrace modern SEO standards and best practices, opting for alternative methods to achieve similar objectives. Stay abreast of search engine updates and adapt your robots.txt directives accordingly to ensure compliance with current standards.

Conclusion

Mastering robots.txt entails navigating through a maze of potential pitfalls with finesse and precision. By addressing common issues proactively and implementing effective solutions, you can optimize your website’s robots.txt file to enhance search engine visibility and propel your digital presence forward.
Promote your website’s SEO prowess with Info Hub Digital, the best SEO services provider in India and US. Trust us to navigate the complexities of robots.txt optimization and elevate your site’s search engine ranking to new heights.
Address
Headquarter
Info Hub Digital,
105-B, Space-31,
Khadi Machine Chowk, Kondhwa, Pune, Maharashtra 411048
[inquiry@infohubdigital.com](mailto:inquiry@infohubdigital.com)
+1 (888) 694-8634 / +91 82610 89655
Social Connect
Facebook : https://www.facebook.com/infohubdigital
LinkedIn : https://www.linkedin.com/company/info-hub-digital/?viewAsMember=true
Instagram : https://www.instagram.com/infohubdigital/
Youtube : https://www.youtube.com/channel/UCgItRHcStCiekuQB1z0ie2w
Twitter : https://twitter.com/InfoHub_Digital
submitted by Aggressive_Scale5514 to u/Aggressive_Scale5514 [link] [comments]


2024.03.21 06:34 AdditionalHandle3594 How to Use Yuyu Proxy for Unblocking?

How to Use Yuyu Proxy for Unblocking?
Yuyu Proxy serves as an online platform offering a free web proxy service, providing users with a simple, swift, and cost-effective method to circumvent internet restrictions. This intermediary service facilitates seamless web navigation, safeguarding users' actual IP addresses. By leveraging Yuyu Proxy, individuals gain access to popular websites such as Google, YouTube, Facebook, TikTok, Instagram, and more, all while ensuring privacy and security.
https://preview.redd.it/c060ec48jmpc1.jpg?width=891&format=pjpg&auto=webp&s=2a19402ddcd7d049ea61df8149ef38f9944d846c
Users can connect to Yuyu proxy servers situated in different countries to unblock websites and content that may be restricted in their current location. Websites like YouTube often tailor content based on the user's location, restricting access to specific regions. Proxies enable unrestricted access to a wealth of global entertainment resources.
Utilizing a proxy serves as an effective solution when visiting websites without divulging privacy. Certain smaller websites may pose security risks by potentially accessing and misusing IP information and other sensitive data. By using a proxy, the target website perceives the IP address of the proxy server instead of the user's actual IP, providing an added layer of security.

How to Use Yuyu Proxy

  1. Visit the Yuyu Proxy website at yuyuproxy.com
  2. Enter the desired URL you wish to access or utilize the quick links available below the input box, featuring commonly used websites.
  3. Click on "Go" and await the loading indicator.
  4. Once loaded, verify if your real IP address has been substituted.
  5. Search for IPinfo. Confirm the IP address change and proceed with secure browsing.
While Yuyu Proxy caters to basic proxy needs, consider OkeyProxy for top-tier speed and service as a premier proxy provider. Offering residential proxies, ISP Proxies, and datacenter proxies, OkeyProxy ensures a comprehensive proxy solution for diverse personal and business requirements.
submitted by AdditionalHandle3594 to u/AdditionalHandle3594 [link] [comments]


2024.03.20 14:48 DebtIllustrious5458 Want a VPN but don't know how to use it? Well, you've landed in the perfect place.

Want a VPN but don't know how to use it? Well, you've landed in the perfect place.
The internet's a fantastic tool, but let's be honest, it can feel like the Wild West sometimes. Hackers lurk in the shadows, and who knows who else might be snooping around?
A VPN (Virtual Private Network) is like your digital invisibility cloak. It encrypts your data and routes it through a secure tunnel, keeping your browsing private and safe from prying eyes.

Here's a quick guide to using a VPN like a champ:

Be efficient, anonymous and, most importantly, learn to cover your own tracks.

  1. Pick Your Posse: There's a herd of VPNs out there, all promising the world but, technically, they do the same. Do some research and find one that fits your needs and budget. In my personal experience and cyber-security-obsession, I recommend using www.nordvpn.com (best one so far).
  2. Saddle Up! Go to the VPN website or download and install the VPN app on your device (phone, computer, tablet). Most offer free trials, so you can test it out before committing.
  3. Time to Connect! Open the VPN app you downloaded and choose a server location. Tip: don't use browser extensions, download the app instead. Choose whatever country you like.
  4. Go Forth and Surf Securely Voila! Once connected, your internet traffic is encrypted and routed through the chosen server. Now you can browse freely, knowing your data is safe.
Bonus Tip: VPNs can also be handy for unblocking geo-restricted content. I personally don't like governments trying to control the things I watch so I keep it ALWAYS active (Just remember, some streaming services have terms of service against using VPNs, so check first!)

Have fun on social media, but be careful! Always be protected with a VPN.
Even though it gives you GREAT protection, a VPN is a powerful tool, but it's not foolproof. Always practice safe browsing habits and be cautious about what information you share online.
Stay Secure and Anonymous Out There, Partner!
submitted by DebtIllustrious5458 to VPNSquad [link] [comments]


2024.03.16 21:18 Carson7946 100% Working The Pirate Bay Proxies List ( Updated March, 2024)

Introducing the latest The Pirate Bay Proxies List, curated from various subreddits and with the input of our Reddit community members.

Before Torrenting, Ensure 3 things:

  1. VPN (Essential. Always stay connected to a VPN while torrenting for your own security.)

Here are Some Top VPNs Recommended by Redditors to Unblock Torrenting Sites:

- Cyberghost VPN (Click here for 82% OFF Today) [Recommended]
- NordVPN (Click here for 69% OFF Today) [Recommended]
- Surfshark (Get a 30-day Free Trial)

More Suggestions in the Sidebar.

Additional Requirements:

  1. Torrent Client (qBittorrent is preferred, but BitTorrent works too)
  2. Adblocker plugin (Adblock Plus, Free) [Don't skip this as it blocks most ads/pop-ups]

**The Pirate Bay Proxies List (Updated November, 2023)**

ThePirateBay.org - Official Website.

- https://tpb27.ukpass.co/
- https://pirate-proxy.top/
- https://thepiratebay10.org/
- https://pirate-proxy.top/
- https://thepiratebaye.org/
- https://mirrorbay.org/ (Archive Copy)

These are reliable Pirate Bay proxies that are effective for our needs. Finding working proxies for The Pirate Bay is challenging these days. If you know any others, please share in the comments.

Note: I've personally tested all these proxies. If you encounter any issues, message me directly or report the problem, and I'll remove them from the list. Just to clarify, I don't own any of these websites.

Also, the official TPB site is operational. Use any of the mentioned VPNs to access it securely.
submitted by Carson7946 to ThePirateBays [link] [comments]


2024.03.16 00:54 kevrev Adguard DNS filtering with MacOS and iCloud Private Relay

Disclaimer: I have searched Google and through this subreddit so apologies in advance if this has already been asked and answered.
AdGuard officially says that they don't support iCloud Private Relay with their DNS filtering; however, we know this works on iOS. As well, I've noticed with other DNS services (link 1, link 2, link 3), this does work by unblocking/bypassing the mask.icloud.com URLs.
I'm wondering if a similar trick would work with the AdGuard for MacOS app?
submitted by kevrev to Adguard [link] [comments]


2024.03.15 04:47 DenigratingDegenerat How to Migrate All Your Data From Chrome to Firefox + How To Install uBlock Origin + Recommended Setup & Extension(s)

SKIP TO "Switiching from Chrome to Firefox" FOR TUTORIAL

Ahoy there, sailors! I previously posted this on animepiracy but it has since been removed. (Sent a DM to the mods in hopes to get the post back up) And so I've decided to post this here, if you haven't heard about it already, Chrome Manifest V3 is coming, once introduced ALL your V2 extensions on Chrome & Chromium-based browsers will be disabled. Yes, all of them. Including your adblockers, Manifest V3 will limit the functionality of ALL extensions which of course includes adblockers and their ability to do their job adequately.
Straight from the horse's mouth:
We will begin disabling Manifest V2 extensions in pre-stable versions of Chrome (Dev, Canary, and Beta) as early as June 2024, in Chrome 127 and later.
Users impacted by the rollout will see Manifest V2 extensions automatically disabled in their browser and will no longer be able to install Manifest V2 extensions from the Chrome Web Store.
Also in June 2024, Manifest V2 extensions will lose their Featured badge in the Chrome Web Store if they currently have one. Source
What does this mean? For those of you that use Chrome and haven't seen an ad in ages, you will start seeing them soon. You won't be able to do much about it, sure there will be workarounds but they won't nearly be as safe as the already available and well-vetted extensions. And I'm certain adblocker devs are already hard at work but...
If you haven't considered switching to Firefox before, now is the time. The following guide is from Firefox themselves, I merely copied and pasted it. All images from the official tutorial are linked to the original source. Here's a link to the guide: https://support.mozilla.org/en-US/kb/switching-chrome-firefox

Switching from Chrome to Firefox

Switching from Google Chrome to Firefox is easy and risk-free! Firefox can automatically import your bookmarks, history, and other data from Chrome without deleting it or interfering with any of its settings. Give it a try.
1. Don't remove Chrome [yet]… We'll need it to import your bookmarks and other
2. Download and install Firefox from Mozilla's download page.
3. Quit Chrome if you have it running.
4. Open your newly-installed Firefox. The import tool will appear.
5. Choose the Google Chrome profile and the data you wish to import.
Chrome import profile (image)
6. Click the Import button to start the import process.
7. Click the Done button when the import has completed.
See the Import bookmarks and other data from Google Chrome article for more information.
Note: If you saved your open tabs in Google Chrome, find the “From Google Chrome” folder in the Firefox Bookmarks Toolbar, select the “Open Tabs” folder you created and click Open All in Tabs to open the tabs in Firefox. Open all bookmarks in tabs (image)

Recommended Extensions

The following guide(s) were written by me, the uBlock Origin one was originally a guide I made in a comment for someone when I first made my account and figured it'd fit in perfectly in this post.
The following are extensions I personally use, and highly recommend. I've also provided a guide on how to install uBlock Origin as well as recommended settings for both it and Firefox itself. If you have suggestions or add-ons that you personally would recommend feel free to comment them below, I'll add them to the post.

uBlock Origin

uBlock Origin is, according to the creator(s), not an "ad blocker" but a wide-spectrum content blocker with CPU and memory efficiency as a primary feature. Unlike Adblocker or Adblocker Plus there are no "acceptable" ads. If it's an ad, it's bad. That seems to be their motto. You can do a variety of things regarding adblocking like; block javascript, remote fonts, disable cosmetic filtering, block large media on a site & block all popups. That's all out of the box, it also provides a vast constantly updated filter list and even allows for your own custom filters.
If you have any questions regarding uBlock Origin and/or need help check out uBlockOrigin as well as these resources:
uBlock Origin Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Fixes for common issues: https://old.reddit.com/uBlockOrigin/wiki/solutions
YouTube MegaThread: https://old.reddit.com/uBlockOrigin/comments/1atwzem/youtube_detection_ads_breakages_2024_02_18_ubo/
Official Wiki: https://github.com/gorhill/uBlock/wiki
Github:https://github.com/gorhill/uBlock
UBO is pretty much the only extension you'll really need regarding ads, UBO + Enhanced Tracking Protection that Firefox provides by default is good enough.

Installing Ublock Origin on Firefox

Select the 3 lines on the top right of your browser, if you hover your mouse over it should say "Open application menu". Select "Add-on and themes", alternatively use the key combo: CTRL+SHIFT+A
Select the search bar, it should say: "Search addons.mozzila.org, enter "Ublock Origin" it will open a new tab and it should be the first result and have a "Recommended" highlight to it. Click on the result, then select the "Add to Firefox" button, afterwards when prompted select "Add"

Customizing Ublock Origin settings

After having installed it you should see a red icon with UB on the top right of your browser, click on it. If you do not see a the extension, locate the puzzle piece on your toolbar (when hovering over it should say "Extensions". After selecting it you should see a pop-up you should then see "uBlock Origin", select the gear icon next to it, then "Pin to Toolbar".
After clicking on UB on the Toolbar you should see a prompt, this allows you to do a variety of different things regarding blocking ads but what you want to click is the gear icons on the bottom-right of the extension pop-up. When hovering over it with your mouse cursor it should say "Open the dashboard".
This will open a new tab for adjusting your settings, Select "Filter lists". From there check the following options:
✔️Auto-update filter lists
✔️Suspend network activity until all filter lists are loaded
✔️Parse and enforce cosmetic filters
Built-in
✔️uBlock filters
Ads
✔️AdGuard - Ads
✔️AdGuard - Mobile Ads
✔️EasyList
Privacy
✔️AdGuard Tracking Protection
✔️AdGuard URL Tracking Protection
✔️Block Outsider Intusion into LAN
✔️EasyPrivacy
Malware protection, security
✔️Online Malicious URL Blocklist
✔️Phishing URL blocklist
Multipurpose
✔️Peter Low's Ad and tracking server list
Annoyances
✔️AdGuard - Annoyances
✔️EasyList - Annoyances
✔️uBlock filter - Annoyances

Change DNS Settings

The following is only really necessary in order to bypass website access limitations. If a website is blocked despite the VPN this should unblock it depending on your DNS choice. I can't give a recommendation without being biased, FireFox has default DNS's but it's recommended to use other DNS providers. Also, please be aware that using a DNS can break sites and some DNS's may not work with Firefox for a variety of reasons.
After choosing a DNS, open the application menu (the three lines at the top-right), select "Settings", go to "Privacy & Security" scroll all the way down to the bottom of the page. Select "Max Protection", under "Choose Provider" copy and paste the "Host Name" of whatever DNS you ended up choosing from the MegaThread link. "Max Protection" causes Firefox to always use the DNS that you've chosen no matter what. Whereas "Default Protection" allows Firefox to make that choice for you, and "Increased Protection" allows you to make the choice of whether or not to use it (only if their "Secure DNS" fails).
DNS Resolvers (Straight from the Wiki): https://www.privacyguides.org/en/dns/

Extra Privacy (Recommended)

The following are simple personal adjustments to Firefox that I'd recommend.
Under "Privacy & Security" in "Settings", at the top of the page select "Custom" and select the following options:
✔️Cookies ✔️All cross-site cookies (may cause websites to break)
✔️Tracking content ✔️In all windows
✔️Cryptominers
✔️Known fingerprinters
✔️Suspected fingerprinters ✔️In all windows
The following are also in the "Privacy & Security" tab.
Under "Website Privacy Preferences"
✔️Tell websites not to sell or share my data
✔️Send websites a “Do Not Track” request
Under "HTTPS-Only Mode"
✔️Enable HTTPS-Only Mode in all windows

Adsbypasser

The following extension is a link shortener bypasser.
From their description:
This user script helps you to:
  • skip countdown ads or continue pages.
  • prevent ad pop-up windows.
It CANNOT help you to solve reCAPTCHAs.
Lite edition removes image-hosting site support from Full edition. If you prefer to use other userscripts to deal with image-hosting sites, you can use the Lite edition.
This extension is really really useful for bypassing link redirects where you end up on some random advertising site. Or those that send you through countdown after countdown. You'll still have to wait through the countdowns in some cases and still have to do the captcha regardless... but at the very least you'll get to where you want to. Though be warned this will install one or both of the following extensions on Firefox: TamperMonkey or ViolentMonkey. These are extensions that allow you to install userscripts which may be malicious. Most aren't, of course this one isn't. Point is, be careful of what userscripts you use, should you decide this extension/userscript is for you.
Adsbypasser UserScript Install: https://adsbypasser.github.io/
ViolentMonkey Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/violentmonkey/
TamperMonkey Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/tampermonkey/

How To Install Adsbypasser

1.\ Install either ViolentMonkey or Tampermonkey by visiting their respective extension links provided above. I highly recommend installing ViolentMonkey over Tampermonkey because of it's higher compatibility with Adbypasser.
2. After installing your chosen add-on, go to https://adsbypasser.github.io/ and you will see two different install options: Install Full Edition and Install Lite Edition, the differences are as aforementioned.
3.\ After selecting your install of choice a new tab will open, revealing the userscript, should you choose to review and verify it, now is your chance.
4.\ After reviewing it, or not, simply select the Install option, or alternatively press CTRL+ENTER
And that's it! Now you've installed a pretty powerful redirect bypasser that is updated regularly. You can access your userscripts and the settings of your user script by doing the following:
ViolentMonkey & TamperMonkey: Simply select the icon of your extension, if it's not there follow the steps provided for pinning extensions to your toolbar provided in the uBlock Origin install instructions. You will then see a popup beside your browser URL section, select the gear icon (If you hover over it, it should say Dashboard or Open Dashboard) Here you can; see all your userscripts, update, edit, disable, and remove your them here.
In order to completely delete a userscript visit the dashboard/configuration. Then find the userscript you wish to delete, select the trashcan icon. In both extensions the icon is to the far right of the userscript.
This will then move the "deleted" userscript to a trash bin. On TamperMonkey it can be found by locating the trash bin icon on the top-right side of the screen (it should also say Trash Bin when you hover over it), once located select it. Here you will be given the choice to Restore or Delete the userscript. Select Delete if you wish to remove it completely, or Restore if you accidentally deleted it.
The same applies to ViolentMonkey, delete the userscript then locate the `Recycle Bin on the bottom left side of the screen. Select it, on the far right of the deleted user scripts should be a trash bin icon and a curved arrow pointing to the left. The trash can icon will delete the userscript whereas the curved arrow will restore it.
The following extension is for my fanlation Light Novel homies out there.

WebToEpub

WebToEpub Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/webtoepub-for-baka-tsuki/
WebToEpub converts novels on a variety of sites to EPUB, it took me longer than I'd like to admit to get it working properly. So, for those like me here's how to do it.
1. Find the novel you want to read and go to the chapter list.
2. You can either copy and paste the link into the extension via an empty tab or you can simply click on the extension itself and it will take you to the EPUB conversion page.
3. Select the chapters you wish to convert.
4. Select Pack EPUB
Sorry for the block of text and seemingly all over the place nature of this post I just want people to be able to transition from Chrome to Firefox comfortably as well as recommend some extensions I think are neat.
That's all I've got for now, and again, if anyone has any extensions (and maybe guides for them), that they'd like me to add to this post just comment or DM me!

Happy Sailing!🏴‍☠️⛵🏴‍☠️

Edit:

(hopefully) Fixed number lists by inserting a \ between the number and the period. Also fixed some grammar, formatted/adjusted certain sections for better visibility, as well as added a link to the DNS resolvers suggested by the Official Wiki of the sub. I also added a simple-to-follow guide for installing Adbypasser via TampeMonkey or ViolentMonkey, as well as how to; view, delete, and restore user scripts.
submitted by DenigratingDegenerat to Piracy [link] [comments]


2024.03.13 04:18 Numerous_Listen6898 Help! Unionbank

Help! Unionbank
How to troubleshoot this? Been accessing my account through atm with few machine in different areas, whenever i try doing transactions lagi sinasabi "your profile is blocked due to consecutively putting incorrect pin, we cannot proceed with the transaction" tapos pag i uunblock ko sa ub app ganito na lagi yung nalabas! Letcheng ub customer support walang kwenta esp yung landline nilang bot lang kausap ko ayaw i proceed sa live call. Sa sobrang secured nila pati yung may ari di na maka gamit jusko!!
Ps. Na unblock ko na sya on the first try, pero nung triny ko na sa atm, naka block parin daw!! Jusko ub!
submitted by Numerous_Listen6898 to DigitalbanksPh [link] [comments]


2024.03.06 03:28 TuToneShoes I'm seeing ads on surfline.com

The ad-blocking was working a few days ago. Hopefully the uBlock team are on the case. I do miss the days when uBlock also unblocked the premium cams but I read that they have a policy of not unblocking paywalls. I get it but it still sucks.
Edit: Adding URL where I see the ads -
https://www.surfline.com/surf-report/bondi-beach/5842041f4e65fad6a7708bf8?camId=60ac3b5265ee6f35cef85e38
submitted by TuToneShoes to uBlockOrigin [link] [comments]


2024.02.11 22:54 hcsteve Optimum has blocked my web site for "security threat detected"

Optimum has blocked my web site for
Optimum has blocked my web site and shows a message that says "security threat detected", and there is no information on how to unblock it.
https://preview.redd.it/pwz5euzo11ic1.png?width=3002&format=png&auto=webp&s=fd5cedd2266dd770f3c86a7e86844175fc86e625
This is definitely an Optimum issue - it works fine on my phone when not connected to my home wifi. Optimum's DNS servers appear to be rewriting the responses for mydomain.com and www.mydomain.com to point to their "security threat" page. Here is the response from 65.19.96.252, which is the DNS server I get from Optimum via DHCP.
% dig @65.19.96.252 www.mydomain.com ; <<>> DiG 9.10.6 <<>> @65.19.96.252 www.mydomain.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9898 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.mydomain.com. IN A ;; ANSWER SECTION: www.mydomain.com. 0 IN A 167.206.37.136 ;; Query time: 21 msec ;; SERVER: 65.19.96.252#53(65.19.96.252) ;; WHEN: Sun Feb 11 16:48:00 EST 2024 ;; MSG SIZE rcvd: 62 
DNS responses from 8.8.8.8 show the intended response, which is a redirect through namesilo.com.
% dig @8.8.8.8 www.mydomain.com ; <<>> DiG 9.10.6 <<>> @8.8.8.8 www.mydomain.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58552 ;; flags: qr rd ra; QUERY: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;www.mydomain.com. IN A ;; ANSWER SECTION: www.mydomain.com. 3603 IN CNAME parking.namesilo.com. parking.namesilo.com. 300 IN A 198.251.81.30 parking.namesilo.com. 300 IN A 204.188.203.154 parking.namesilo.com. 300 IN A 198.251.84.92 parking.namesilo.com. 300 IN A 107.161.23.204 parking.namesilo.com. 300 IN A 168.235.88.209 parking.namesilo.com. 300 IN A 209.141.38.71 parking.namesilo.com. 300 IN A 70.39.125.243 parking.namesilo.com. 300 IN A 173.44.37.208 parking.namesilo.com. 300 IN A 45.58.190.82 parking.namesilo.com. 300 IN A 104.238.249.57 parking.namesilo.com. 300 IN A 64.32.22.102 ;; Query time: 64 msec ;; SERVER: 8.8.8.8#53(8.8.8.8) ;; WHEN: Sun Feb 11 16:46:45 EST 2024 ;; MSG SIZE rcvd: 253 
I've run my web site through the blacklist checkers on virustotal.com, urlvoid.com, and mxtoolbox.com, and there are no warnings. This web site is very simple - it's just a redirect to a linktr.ee URL. I'm at my wits' end here - there seems to be no way to even request to unblock a web site, other than maybe posting here and begging ItsOptimum.
submitted by hcsteve to OPTIMUM [link] [comments]


2024.02.10 03:30 WhiteeyScience Help with proxy

Help with proxy
I want to make an unblocked games website using ultra violet proxy https://github.com/titaniumnetwork-dev/Ultraviolet I want it to be similar to interstellar, https://github.com/InterstellarNetwork/Interstellar
Can someone tell me how I could do this/what does it require, and my next question is, how does it work when I click on a game on interstellar and it loads the game/url through the proxy?
submitted by WhiteeyScience to webdev [link] [comments]


2024.02.07 15:12 ACEDT Wildcard Unblock Filter

I've had this issue come up on pretty much every Google site (docs, Colab, etc), and I'm curious: Is it possible to wildcard unblock things with URL or static filters? Google uses lots of sub domains like *-colab.googleusercontent.com and doc-*-docstext.googleusercontent.com, and so far I have not been able to noop those without resorting to nooping the entire googleusercontent.com domain. It would be great to be able to do that case by case. Any ideas?
submitted by ACEDT to uBlockOrigin [link] [comments]


http://activeproperty.pl/