Showing posts with label kosovo=serbia. Show all posts
Showing posts with label kosovo=serbia. Show all posts

Friday, July 28, 2023

Ghostscript + Mfilemon

Linux tips =  

https://github.com/vinifmor/bauh

https://github.com/AppOutlet/AppOutlet

An alternative to GNOME Gnome-software and KDE Discovery!



Windows tips =

GOOD ----->

  • Install Mfilemon
  • Install Ghostscript
  • Create a new printer. Choose manual configuration. Pick the driver from ghostscript\lib\ghostpdf.inf
  • Create a new port for the printer, select "Multi file port", name it GSPDF: or whatever
  • Configure the newly created port as follows:
    • Output path = C:\autopdf
    • Filename pattern = %Y_%m_%d\file%i.pdf
    • User command (change Ghostscript path as needed) = "C:\Program Files\gs\gs9.53.3\bin\gswin64c.exe" @"C:\Program Files\mfilemon\conf\gspdf.conf" -sOutputFile="%f" -
    • Use pipe to send data to user command = yes
    • Hide process = yes
  • Print a sample page. You should get a PDF in C:\autopdf\year_month_day\file0001.pdf
USER COMMNAD ON NEW VERSION OF GS =
"C:\Program Files\gs\gs10.01.2\bin\gswin64c.exe" @"C:\Program Files\mfilemon\conf\gspdf.conf" -sOutputFile="%f" -

https://github.com/lomo74/mfilemon

https://support.farmerswife.com/support/solutions/articles/17000092051-installing-ghostscript-pdf-printer

Prerequisites

gs921w64.exe or gs921w32.exe downloaded from https://www.ghostscript.com/download/gsdnld.html

mfilemon-setup.exe downloaded from https://sourceforge.net/projects/mfilemon/

Note: If you download a Ghostscript version later than 9.21 that's fine - but you need to know what version it is in order to be able to set up "mfilemon" properly.

++


https://sourceforge.net/projects/thinvnc/




Tiny11

https://github.com/ntdevlabs/tiny11builder



https://www.reviewgeek.com/102893/is-plex-legal


SSH TUNNEL = 

https://my.kualo.com/knowledgebase/?kbcat=0&article=890

https://sshtunnel.readthedocs.io/en/latest/

https://github.com/mattykay/pytunneling

https://github.com/tobor88/CSharp-SSH-Tunnels

Thursday, July 20, 2023

AI Website builders

  1.  https://hocoos.com/
  2. https://mailchimp.com/features/website-builder
  3. https://mobirise.com/
  4. https://www.typeform.com/try/landingpage
  5. https://www.adcreative.ai/
  6. https://durable.co/ai-website-builder
  7. https://teleporthq.io/ai-website-builder
  8. https://10web.io/
  9. https://www.hostinger.com/ai-website-builder
  10. https://designs.ai/en
  11. https://zapier.com/blog/best-ai-website-builder/
  12. https://www.appypie.com/website-builder/ai-website-builder
  13. https://www.elegantthemes.com/blog/marketing/best-ai-website-builders
  14. https://cybernews.com/best-website-builders/ai-website-builders/
  15. https://blog.hubspot.com/website/ai-website-design-tools
  16. https://aitoolsarena.com/marketing/4-best-free-ai-website-builder
  17. https://www.tooltester.com/en/blog/ai-website-builder/
  18. https://dribbble.com/tags/ai%20website%20design




Add to .htaccess


RewriteEngine on

RewriteCond %{HTTP:VIA}                 !^$ [OR]

RewriteCond %{HTTP:FORWARDED}           !^$ [OR]

RewriteCond %{HTTP:USERAGENT_VIA}       !^$ [OR]

RewriteCond %{HTTP:X_FORWARDED_FOR}     !^$ [OR]

RewriteCond %{HTTP:PROXY_CONNECTION}    !^$ [OR]

RewriteCond %{HTTP:XPROXY_CONNECTION}   !^$ [OR]

RewriteCond %{HTTP:HTTP_PC_REMOTE_ADDR} !^$ [OR]

RewriteCond %{HTTP:HTTP_CLIENT_IP}      !^$

RewriteRule ^(.*)$ - [F]



Add to your PHP script:


$test_HTTP_proxy_headers = array(

'HTTP_VIA',

'VIA',

'Proxy-Connection',

'HTTP_X_FORWARDED_FOR',  

'HTTP_FORWARDED_FOR',

'HTTP_X_FORWARDED',

'HTTP_FORWARDED',

'HTTP_CLIENT_IP',

'HTTP_FORWARDED_FOR_IP',

'X-PROXY-ID',

'MT-PROXY-ID',

'X-TINYPROXY',

'X_FORWARDED_FOR',

'FORWARDED_FOR',

'X_FORWARDED',

'FORWARDED',

'CLIENT-IP',

'CLIENT_IP',

'PROXY-AGENT',

'HTTP_X_CLUSTER_CLIENT_IP',

'FORWARDED_FOR_IP',

'HTTP_PROXY_CONNECTION');

foreach($test_HTTP_proxy_headers as $header){

if (isset($_SERVER[$header]) && !empty($_SERVER[$header])) {

exit("Please disable your proxy connection!");

}

}


  1. https://pentest-tools.com/website-vulnerability-scanning/website-scanner
  2. https://urlscan.io/
  3. https://geekflare.com/online-scan-website-security-vulnerabilities/
  4. https://www.criminalip.io/
  5. https://quttera.com/
  6. https://www.immuniweb.com/websec/


IP geolocation information = 


MORE IP tools: