WOT probes my web access history

 
I loaded a private web address using Chromium with the extension WOT v2.6.0 (by www [dot] mywot [dot] com).

Hours later, some unknown ec2-x.compute-x.amazonaws.com IP probed my private address.

I repeated the same test with another unique private URL, and hours later, the same ec2 IP loaded that private URL again.

Then I disabled the WOT extension in Chromium and repeated the same test with a new unique private URL. No more probes.

Bad WOT! You should just be checking whether a link has bad reputation instead of loading the web addresses I’ve visited.

Uninstalled.

How to reset lost root password on Raspberry Pi running Arch Linux

 
Assumption: SD is not encrypted

Plug SD onto another working computer, look for the “cmdline.txt” file and edit it by appending “init=/bin/sh” after “rootwait”. Save the file, remove the SD and plug it back to the RPi and boot.

You’ll be dropped into a shell. Change your passwd, then hit CTRL-ALT-DEL to trigger a reboot. Switch off the RPi when the shutdown completes, just before the boot starts. Unplug the SD and plug it onto the other working computer. Remove “init=/bin/sh” from “cmdline.txt” file.

Plug the SD back onto the RPi, boot and you can now login with the newly reset password.

https page that includes other resources which are not secure

Question: How to find out what contents on a HTTPS page is retrieved using HTTP, i.e. unencrypted in transit and thus open to sniffing?

Answer: Use Google Chrome web browser’s Developer Tools. Look under “Console” and you’ll see lines that look like this:

The page at https://www.example.com displayed insecure content from http://feeds.feedburner.com/notsecure.