AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Wget command not found2/3/2024 I don’t recommand this but I just verified it will work… The frist example under How to Download a File with wget you’d run in a jupyter cell with the following: !wget You can find examples of using wget here. The exclamation point at the front of a typical command line command lets you run something you’d normally run in terminal in a Jupyter cell. ![]() Just put an exclamation in front of any wget command example you see. It is easy to use in your Jupyer notebook. Type the following in a Jupyter cell to get the help manual for this command line utility. You’ll note the one that got installed via conda is two years old and so much more recent than that one at PyPi. And you’ll note it isn’t well maintained as it hasn’t been updated since 2015 if you look at releases. If you search wget at PyPi there you do get a wget listed, but this isn’t what you installed via conda. (Or at least not the one you installed so far.) One way to learn which are Python and aren’t is if you could install it via pip and it is at pypi, the Python Package Index, like numpy or pandas then it is a Python package and you may be able to use import. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc Per the Anaconda page for wget,the documentation for wget is at where it says Where did you find code telling you to type that? (Maybe from the poorly maintained project I reference later?) All of the sources are routing to 0.0.0.0 so it should prevent any browsing of the sites, which in turn should prevent any application vulnerabilities.That isn’t how wget works normally. I’m not interested in censoring the network per say, but stuff like that and shady ad networks are all over the place, and I wanted to block those at least. I was hoping that Suricata were serve the same purpose, but it doesn’t block content really, goatse, two girls one cup that sort of stuff. address=/domain-name/127.0.0.1Įcho "Config generated, $(wc -l < $GENFILE) unique hosts to block" ' $TMPFILE > $GENFILE # format file for dnsmasq. # Whitelist sites from blocking (add inside quotes, space-separated) # Blacklist additional sites (add inside quotes, space-separated) GENFILE="/usr/local/etc/dnsmasq.d/dnsmasq.custom" # dnsmasq custom config TMPFILE="/tmp/dnsmasq.work" # dnsmasq temporary file # Adapted for pfSense from Tomato WAN Up script v3.3 by haarp Here’s a copy of the bash script I’m trying to run. ![]() I feel like that may be a bit too far too soon, if anyone else has had this problem, or knows if indeed the solution is recompiling the kernel (i’d just re-install pfsense), please let me know.Īs a follow up, curl isn’t installed by default either. When i do some searching for that error I’m getting solutions saying I should recompile the kernel. Pkg: wrong architecture: FreeBSD:10:amd64 instead of FreeBSD:11:amd64 I tried installing it via pkg_get but apprently that’s been depricated so I tried using pkg install, but it wasn’t able to find it, then when I tried searching for it nothing came back. I found a script that would work to do this, but it was held up because wget isn’t install on the version of BSD that is install with PFSense. ![]() I want to add a cron job to update my host file with a bad actor host file (basically malicious ads and bad websites) to black hole them, rather than updating the local host files of each computer I wanted to do it on the router.
0 Comments
Read More
Leave a Reply. |