Heat Your Room With A Computer

It’s totally possible to warm up your room in the cold wintertime using only your computer.

Computers can produce a lot of heat. Many desktops can produce over 300 watts of heat, with laptops clocking in in the 30-80 watt range. Either one, when run at full power, will give you a noticeable boost of heat in your room. The trick is, however, to get the computer running a full steam ahead.

Fireplace.lol can be your burning candlelight to warm your room. It works by carrying out complex computation on your computer in order to produce the excess heat you might need on a cold winters night.




OnionScan –help – Usage, Flags and Command Examples

Command Examples:

Having trouble? You can also run the web-version of onionscan at onionscan.io
Run without OnionScan Correlations Lab

./onionscan --timeout 60 --fingerprint  --depth 2 --verbose --webport 0 examplesite.onion

Basic Scan with Correlations Lab Running on http://localhost:8080/

./onionscan examplesite.onion

Help Printout:

$ ./onionscan
Usage of ./onionscan:
    onionscan [flags] hiddenservice | onionscan [flags] --list list | onionscan --mode analysis
  -batch int
        number of onions to scan concurrently (default 10)
  -cookie string
        if provided, onionscan will use this cookie
  -crawlconfigdir string
        A directory where crawl configurations are stored
  -dbdir string
        The directory where the crawl database will be 
        stored (default "./onionscandb")
  -depth int
        depth of directory scan recursion (default: 100) (default 100)
        true disables some deeper scans e.g. directory probing with the 
        aim of just getting a fingerprint of the service. (default true)
        print out a json report providing a detailed report of the scan.
        print out a simple report as json, false by default
  -list string
        If provided OnionScan will attempt to read from the given list, 
        rather than the provided hidden service
  -mode string
        one of scan or analysis. In analysis mode, webport must be set. 
        (default "scan")
  -reportFile string
        the file destination path for report file - if given, the prefix 
        of the file will be the scanned onion service. If not given, the report will be written to stdout
  -scans string
        a comma-separated list of scans to run e.g. web,tls,... 
        (default: run all)
        print out a simple report detailing what is wrong and how to fix it, 
        true by default (default true)
  -timeout int
        read timeout for connecting to onion services (default 120)
  -torProxyAddress string
        the address of the tor proxy to use (default "")
        print out a verbose log output of the scan
  -webport int
        if given, onionscan will expose a webserver on localhost:[port] 
        to enabled searching of the database (default 8080)

Adsense Auto Ads with Regular Ads

After seeing Adsense Auto Ads beta feature pop up on my account, I was excited to jump right in. I did, however, worry adsense would be too conservative in placing ads or just not place the right type of ads for my site. In an effort to not have a couple day drop of a good chunk of revenue, I simply placed the auto-ad code in along with the existing ads on my site.

Auto Ads Setup Screen

I will be monitoring the performance closely and may remove the hard-coded ads to see if performance keeps up.

Set up Auto ads on your site

Copy and paste this code in between the <head> tags of your site. It’s the same code for all your pages. You don’t need to change it even if you change your global preferences. See our code implementation guide for more details.
For those of you looking to get started with auto-ads, you may be able to place the following code onto your site (with your own publisher-id).
<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
 (adsbygoogle = window.adsbygoogle || []).push({
 google_ad_client: "ca-pub-0545639743190253",
 enable_page_level_ads: true

The auto-ads management page can be found at:


but since the program is still in beta, many users don’t have access yet.


Google also has the Auto Ads for AMP pages, in their documentation for the AMP implementation,  things are set out more clearly:


NoBing Chrome Extension Changing Names

NoBing was removed from the chrome web store after a copyright complaint from Microsoft (see below). Now relaunched as Bongle.

From: <[email protected]>
Date: Sun, Sep 10, 2017 at 5:42 PM
Subject: [7-1658000018900] Chrome Web Store Takedown Notice


Google was notified that some of your materials allegedly infringe upon the trademarks of others, the details of the removed extension may be found at the end of this message.

Please note that repeated violations may result in a suspension of your Chrome Web Store Publisher account. If you have any further concerns about this issue, please address them directly to the complainant in the Trademark Infringement Notice provided.

The affected extension(s) are listed below:
The Chrome Web Store Team

On 08/14/17 18:27:22 [email protected]appdetex.com wrote:

full_name: Alexis Meghrouni Rivas {Submitted by AppDetex}
your_title: Director, Enforcement Strategies and Services
companyname: Microsoft Corporation
address: 501 W. Grove Street
UScountry_residence: US
contact_email_noprefill: [email protected]appdetex.com
phone: 8722402777
trademark_relationship: Note: AppDetex is authorized by Microsoft
Corporation to facilitate the submission of and correspondence regarding

tm_work: BING 2008/26333: ZA 2008/26332: ZA BING 2008/26334: ZA 2008/26335:
ZA BING IR 996797: CH IR 996700: CH BING 2008/26331: ZA 2013/15673: ZA BING
228425: EG 228426: EG BING IR 996700: SG IR 996797: SG BING IR 1171876:
SG,CH BING 1641400: TW TN/E/2013/1081: TN BING 9/1/12: EC IR 996700: TR
BING IR 996797: TR IR 1171876: UA BING IR 1171876: TR 46975: TT BING
BOR46697: TH 1383046: TW BING 1378808: TW IR 1171876: WO BING BOR 46695: TH
BOR46696: TH BING 228427: EG 15 Book 225: SV BING 165426: GT 193689: GT
BING 165423: GT 165427: GT BING IR 1171876: PH 4-2009-2253: PH BING 198768:
GT 57278: PE BING 204996: PE 199089: GT BING 83129: PE 57276: PE BING
57277: PE 82295: QA BING 82296: QA IR 1171876: RU BING IR 996797: RU
1232/92: SA BING 1232/93: SA 1232/94: SA BING IR 996700: RU IR 996797: RO
BING 82298: QA 82297: QA BING 82299: QA 82300: QA BING IR 996700: RO
126683: AE BING 161169: AE 159655-C: BO BING 159654-C: BO 159656-C: BO BING
159657-C: BO 388741: CO BING IR 996700: EM 159658-C: BO BING I
trademark_explain: The app uses the trademarks of Microsoft Corporation
without authorization. In this instance, the app uses “Bing” in the title
and “Bing” imagery in the icon.

tm_sworn_statement1: tm_good_faith
tm_sworn_statement2: tm_swear
NoticeToDeveloper: agree1
signature_date: 8/14/17
signature: Alexis Meghrouni Rivas {Submitted by AppDetex}
subject_lr_trademark: Your Request to Google
hidden_product: chromewebstoreextensionsgallery
geolocation: US

:—- Automatically added fields —-:
Language: en
IIILanguage: en
country_code: US
auto-helpcenter-id: 1647639
auto-helpcenter-name: legal
auto-internal-helpcenter-name: legal
auto-user-logged-in: false
auto-user-was-internal: false
IssueType: lr_trademark
form-id: lr_trademark
form: lr_trademark
subject-line-field-id: subject_lr_trademark
AutoDetectedBrowser: Chrome 45.0.2454.101
AutoDetectedOS: Intel Mac OS X 10_11_0
MendelExperiments: 10800027,10800108,10800141,10800161,10800169
Form.support-content-visit-id: 0-636383500115619980-1101090361

Bongle – The NoBing Extension (Redirect Bing->Google Search)

NoBing has been relaunched as Bongle after a copyright complaint by Microsoft.

NoBing is a simple tool to allow you to have the look of bing while simultaneously giving you the search results of google.

Find Bongle in the chrome web store here.

Questions, comments, and requests can be made below!

equihxbdrjn5czx2.onion Another Equifax Hack Tor Site

Another darknet site has popped up for the equifax hack, although no large data samples have been provided to give us convincing proof the site is real, they do provide some alleged screenshots of internal equifax management systems.

As a “Sample” of the data, they provide the SSN, DOB, and address of Donald Trump, Kim Kardashian, and Bill Gates – although this data is hardly proof as you can find all the information on these three people publically in google.

The sample screenshots appear to be taken by a Mac.


The Ethereum and Bitcoin addresses provided for the ransom have not received any payments as of yet:



The email provided, EQUIHAX AT PROTONMAIL.COM, has been reported to ProtonMail’s abuse team.

PGP Key given on the site:

Version: GnuPG v1


PastHole Hacking Team

The PastHole hacking team is the hacking group claiming responsibility for the 2017 Equifax data breach – affecting nearly half of the US population.

Their only contact with the outside world has been through their ransom request site badtouchyonqysm3.onion as well as their anonymous email [email protected].

The group may have a Russian origin based off the tag “Оборудование для взлома” added to the bottom of one of their email responses.