Jump to content

nicolaasjan

Member
  • Posts

    548
  • Joined

  • Last visited

  • Days Won

    7
  • Donations

    0.00 USD 
  • Country

    Netherlands

Everything posted by nicolaasjan

  1. Not exactly what you're looking for, but you can make a bookmarklet like this: Name: "Wayback Archive" Location: javascript:void(window.open('https://web.archive.org/web/*/'+location.href)); (will work in any browser) Try for example with: https://www.ghacks.net/
  2. In my my case this is not of any concern, because Windows XP is a Virtual Machine, with only read access to a shared folder on a Linux partition. In case something goes terribly wrong, I just replace it with a backup. This is nothing compared to the vulnerabilities in Windows XP itself. I've tried that, but it only gave me a headache, haha.
  3. (offtopic) I don't have MailNews, so I can't answer that unfortunately. But you might consider using Notepad++ for viewing/editing complex text files, like source code. Version 7.9.2 is the last version that runs on Windows XP. Comes with Italian language file as well. :
  4. Ah, sorry, you're right of course, I wasn't fully awake I guess, haha.
  5. There is no .NET Framework installed here, so I really can't tell... Besides, In Vista I install the Server 2008 updates, not the Server 2008 SP2 ones (I thought these were not applicable?). (stupid mistake)
  6. You can do this with each new IE9 update, just make sure to specify the correct KB number and name for package_2_/package_3_
  7. 32bit: http://download.windowsupdate.com/d/msdownload/update/software/secu/2021/04/windows6.0-kb5003165-x86_6934e71bbdd55abf9d13b4c1799463e7c8e66f49.msu 64bit: http://download.windowsupdate.com/d/msdownload/update/software/secu/2021/04/windows6.0-kb5003165-x64_f1d972f3a9fbdc5fbfefbfdb0a67e86e5d8dde6e.msu For the x64 update, you can install the IE part of it with a workaround: - start cmd as administrator - change location to the folder that contains the msu file, example cd /d C:\updates - copy/paste and execute these commands (preferably one by one) mkdir .\tmp expand.exe -f:*Windows*.cab *kb5003165-x64*.msu . >nul expand.exe -f:* *kb5003165-x64*.cab .\tmp >nul start /w PkgMgr.exe /ip /m:"%cd%\tmp\package_2_for_kb5003165~31bf3856ad364e35~amd64~~6.0.1.1.mum" /quiet /norestart start /w PkgMgr.exe /ip /m:"%cd%\tmp\package_3_for_kb5003165~31bf3856ad364e35~amd64~~6.0.1.1.mum" /quiet /norestart del /f /q *kb5003165-x64*.cab rd /s /q tmp
  8. That's what I understood from that thread I linked to. See also here: https://support.mozilla.org/en-US/questions/1076445 Don't be pedantic. I don't care. My days here are numbered. I wish them success with their data after that, haha.
  9. There is an old thread about this on the Pale Moon forum: https://forum.palemoon.org/viewtopic.php?t=14617 The technology involved a NPAPI plugin that could be set to "Never activate".
  10. My Serpent gave the same result as Pale Moon (stuck in the middle): Yes, but there are a lot of Android and ChromeOS users, so fingerprinting will become useless over time, when more and more people visit such sites. If the script is first party and the site doesn't work properly without it, what then? I think because 1069 people didn't have any of these apps installed (or the apps couldn't be detected)?
  11. It didn't work in Pale Moon. See also: https://forum.palemoon.org/viewtopic.php?f=65&t=26860 Chrome 90 (Windows 10, macOS Big Sur) Ubuntu: Only Firefox and Tor browser.
  12. That's probably because Android has a Linux kernel. https://chromium.googlesource.com/chromium/src/+/HEAD/docs/linux/sandboxing.md Type: chrome://sandbox/ in Chrome/Chromium and I saw this:
  13. It doesn't work in Chromium on Linux (it "detected" all 24 apps ,haha)
  14. @Sampei.Nihira This vulnerability has already been brought to the attention of Firefox developers: https://bugzilla.mozilla.org/show_bug.cgi?id=1711084
  15. They discovered Teamviewer, even in the Tor browser...
  16. Same here... Reverted to previous version.
  17. Yeah, I copied the code snippet from the eMatrix extension.
  18. @Sampei.Nihira: Will the "install.rdf" trick still work when 29.2.0 will be released or do they have more drastic plans? <!-- Pale Moon --> <targetApplication> <r:Description> <id>{8de7fcbb-c55c-4fbe-bfc5-fc555c87dbc4}</id> <minVersion>28.0</minVersion> <maxVersion>29.*</maxVersion> </r:Description> </targetApplication>
  19. Thanks! Just tested it and it works for the most part. Only glitch I saw, is the Web Developer submenu... Looks like this: But instead should look like this:
  20. Blocked here by default (Pale Moon 29.1.1; Linux)...: And in New Moon (28.10.3a1; XP) as well:
  21. I used the Dutch language pack, but I'm afraid the above method is a bit to complicated for me... Doesn't matter to much though, because I can understand English quite well.
  22. I see... Strange things happening there indeed. I mentioned the CookieKeeper add-on in that thread and even got a (not rude) answer from M.A.T.... But I'm not affected by the blacklist at all:
  23. @VistaLover To work around that stupid extension blocking: Turn it off completely in Preferences ---> Security [Edit} By the way, the Wayback Archive saved this strange Pale Moon page: https://web.archive.org/web/20210401105659/http://www.palemoon.org/
  24. Just tried it in a Windows 7 VM snapshot with the 32bit NL version, and about:support looks complete here. [Edit] That was the official installer. Will try with the portable one. Wait a moment. [Edit2] Looks normal again.
×
×
  • Create New...