Posts

Short video guide how to use TAM

Image

Some valuable notes how to run TAM

 https://alg0z.blogspot.com/2023/09/some-valuable-notes-how-to-run-tam.html

TAM ChangeLog..

Image
 2023 08 15 1.7-17: now it's possible to rename files.. So, how to: ren <file index> <new name> press TAB to expand <file index> into full or short form - just type command "ren <file index>" and press TAB. Tip: press F12 to reset command line. 2023 08 17 1.7-23: makes possible to copy files ==>> cp <file index> <new name> Actually, "cp" command has the same routine as the "ren". PS.. keep in mind: this variant overwrites existing file silently. 2023 08 18 1.7-29: 'cp' command is safe. 2023 08 19 1.7-31: resolved sad problem w/ apostrophe in file names :) 2023 08 21 so far the're problem to search files with apostrophe in their names, thus we can use crutch-ish workaround: -in_name  'grep==-E  [^a-zA-Z.\d\s]s\s|[^a-zA-Z.\d\s]t\s' 2023 08 23 1.7-35: "rm  <file index>" to delete file. TIP: killed file gives "::D" mark in the table, otherwise a file wasn't removed....

TAW..

 Now, my Dear Readers, meet TAW to run it on W10/11 w/ Powershell :)  https://github.com/SarK0Y/TAM

TAM..

  GOAL: The very reason of this project is to make Your life easy for a little bit thanks to efficient automation of daily routine. FUNCTIONS: For now, TAM makes possible to find files in whatever directory and run them with chosen viewers. hmmm.. yea, looks rather boring ain't it??? :)) well, let's look on some examples & details will show You how this "boring" feature can make Your life better. Examples: So, actually we have hella number of files & we (in many cases) need to use regex to make searching through that endless damn heap efficient, but the most of us have no time to learn such stuff + regex software have some differences. 2nd moment, we need not just run files, but run them with different options. So, let's deal w/ example..  python3 ./tam.py -path0 "/tst"  -find_files -tmp_file "/tmp/tst02" -in_name ".mp3" -view_w "vlc --sout-x264-b-bias=-15" -view_w "smplayer"  -cols 2 -rows 15 -col_w 100 -i...

\Valuable remark 1 for BASIC cyber security\

 Use 3rd-party browser, because Edge is very piece of the system & Windows has rights to import its customized proxy for broader goals. +++++++++++++++++++ My the Best wishes to You, Dear Reader. 🙂👽🙃

/Key element of basic cyber security/

 So, let's take for model Windows + Router : our very goals have been... Protect ourselves from botnets & trojans. Teach Windows to behave not that bossy w/ its hidden activities & annoying updates. 1st of the all, we need to block direct access of Windows to Internet: it can be achieved w/ Router's Firewall (You can block/allow access by mac address + can change mac address of network card(s) in W10/11). 2nd step is, opt web proxy: it can be Router's Proxy / Linux machine in Your local network (for example, Squid proxy is rather good shot) / external VPN (then it takes to opt Router's Firewall additionally). It's obvious that Microsoft can easily bypass such protection, but here has been the juridical catch - they would have shot selves in their own feet, if they would have used trojan-like approaches in so open manner. There been very Law for big corporations... Any controversial/dirty practice must be either well-hidden or non-existed at all. However, som...