diff --git a/docs/README.md b/docs/README.md index dceb039..c68ba74 100644 --- a/docs/README.md +++ b/docs/README.md @@ -60,7 +60,7 @@ Publication date: 2020-09-09T17:25:25.799Z ### Step 1: add PGP public key to GitHub account -Go to https://github.com/settings/keys, click "New GPG key", paste your PGP public key and click "Add GPG key". +Go to https://github.com/settings/keys, click “New GPG key”, paste your PGP public key and click “Add GPG key”. ### Step 2: enable Git [signing](https://git-scm.com/book/en/v2/Git-Tools-Signing-Your-Work) diff --git a/how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md b/how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md index dc2893e..615bd7f 100644 --- a/how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md +++ b/how-to-backup-and-encrypt-data-using-rsync-and-veracrypt-on-macos/README.md @@ -169,7 +169,7 @@ The VeraCrypt volume has been successfully created. ### Step 12 (optional): mount, rename and dismount encrypted volume -By default, VeraCrypt encrypted volumes with Mac OS Extended filesystem are named "untitled". +By default, VeraCrypt encrypted volumes with Mac OS Extended filesystem are named “untitled”. #### Mount encrypted volume diff --git a/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md b/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md index 7a219c4..ecd1bb7 100644 --- a/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md +++ b/how-to-configure-self-hosted-vpn-kill-switch-using-pf-firewall-on-macos/README.md @@ -27,11 +27,11 @@ Publication date: 2020-08-21T15:42:23.029Z ### Step 1: enable PF -Open "System Preferences", click "Security & Privacy", then "Firewall" and enable "Turn On Firewall". +Open “System Preferences”, click “Security & Privacy”, then “Firewall” and enable “Turn On Firewall”. ![firewall](firewall.png?shadow=1) -Then, click "Firewall Options...", disable all options except "Enable stealth mode". +Then, click “Firewall Options…”, disable all options except “Enable stealth mode”. ![firewall-options](firewall-options.png?shadow=1) diff --git a/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md b/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md index 216bc14..a8b8318 100644 --- a/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md +++ b/how-to-disable-ipv6-on-ios-cellular-only-and-macos/README.md @@ -19,17 +19,17 @@ Publication date: 2020-07-18T10:28:23.605Z ### Step 2 (on Mac): create new profile using cmd + n -### Step 3 (on Mac): configure "General" settings +### Step 3 (on Mac): configure “General” settings ![apple-configurator-general](./apple-configurator-general.png?shadow=1) ### Step 4 (on iPhone): find APN settings -Open "Settings", then "Cellular", then "Cellular Data Network". +Open “Settings“, then “Cellular“, then “Cellular Data Network“. ![ios-cellular-data-network](./ios-cellular-data-network.png?shadow=1&width=240) -### Step 5 (on Mac): configure "Cellular" settings +### Step 5 (on Mac): configure “Cellular” settings ![apple-configurator-cellular](./apple-configurator-cellular.png?shadow=1) @@ -41,13 +41,13 @@ Open "Settings", then "Cellular", then "Cellular Data Network". ![apple-configurator-iphone](./apple-configurator-iphone.png?shadow=1) -### Step 9 (on Mac): click on "Profile" tab, then "Add Profiles...", select saved provisioning profile and click "Add" +### Step 9 (on Mac): click on “Profile” tab, then “Add Profiles…”, select saved provisioning profile and click “Add” ![apple-configurator-add-profile](./apple-configurator-add-profile.png?shadow=1) ### Step 10 (on iPhone): review profile -Open "Settings", then "Profile Downloaded" and tap "Install" +Open “Settings”, then “Profile Downloaded” and tap “Install” ![ios-install-profile](./ios-install-profile.png?shadow=1&width=240) @@ -79,7 +79,7 @@ networksetup -setv6off "Thunderbolt Ethernet" ### Step 1 (on iPhone): remove provisioning profile -Open "Settings", then "General", then "Profile", and tap provisioning profile, then "Remove Profile". +Open “Settings”, then “General”, then “Profile”, and tap provisioning profile, then “Remove Profile”. ![ios-remove-profile](./ios-remove-profile.png?shadow=1&width=240) diff --git a/how-to-self-host-a-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md b/how-to-self-host-a-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md index 5b253c4..04550fc 100644 --- a/how-to-self-host-a-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md +++ b/how-to-self-host-a-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos/README.md @@ -402,7 +402,7 @@ systemctl restart dnsmasq ### Step 21: install strongSwan -If you are shown an "Old runlevel management superseded" warning, answer `Ok`. +If you are shown an “Old runlevel management superseded” warning, answer `Ok`. ```shell apt install -y strongswan libcharon-extra-plugins @@ -748,33 +748,33 @@ sysctl -p > Heads-up: when configuring strongSwan using certs and dnsmasq, two devices cannot use the same provisioning profile simultaneously. -Open "Apple Configurator 2", then click "File", then "New Profile". +Open “Apple Configurator 2”, then click “File”, then “New Profile”. -In "General", enter "Self-hosted strongSwan VPN" in "Name". +In “General”, enter “Self-hosted strongSwan VPN” in “Name”. ![apple-configurator-general](apple-configurator-general.png?shadow=1) -In "Certificates", click "Configure" and select "ca.crt". Then click "+" and select "john.p12". The password is the one from [step 28](#step-28-generate-client-cert). +In “Certificates”, click “Configure” and select “ca.crt”. Then click “+” and select “john.p12”. The password is the one from [step 28](#step-28-generate-client-cert). ![apple-configurator-certificates](apple-configurator-certificates.png?shadow=1) -In "VPN", click "Configure" and enter the settings from the following screenshot (replace `185.193.126.203` with IP of server). +In “VPN”, click “Configure” and enter the settings from the following screenshot (replace `185.193.126.203` with IP of server). -The "Child SA Params" are the same as "IKE SA Params". +The “Child SA Params” are the same as “IKE SA Params”. ![apple-configurator-vpn](apple-configurator-vpn.png?shadow=1) -Finally, click "File", then "Save", and save file as "john.mobileconfig". +Finally, click “File”, then “Save”, and save file as “john.mobileconfig”. ### Step 32: add VPN profile to iPhone using Apple Configurator 2 Unlock iPhone, connect it to Mac using USB cable and open Apple Configurator 2. -In "All Devices", double-click on iPhone, then "Add", and finally "Profiles". +In “All Devices”, double-click on iPhone, then “Add”, and finally “Profiles”. -Select "john.mobileconfig" and follow instructions. +Select “john.mobileconfig” and follow instructions. -On iPhone, open "Settings", then "Profile Downloaded" and tap "Install". +On iPhone, open “Settings”, then “Profile Downloaded” and tap “Install”. **If this steps fails (a recent update to Apple Configurator 2 has introduced a bug), please run the following and try again.** @@ -784,7 +784,7 @@ sed -i '' '/DNS<\/key>/,/<\/dict>/d' ~/Desktop/strongswan-certs/john.mobile ### Step 33: add VPN profile to Mac -This step is super simple, simply double-click "john.mobileconfig" and follow instructions. +This step is super simple, simply double-click “john.mobileconfig” and follow instructions. **If this steps fails (a recent update to Apple Configurator 2 has introduced a bug), please run the following and try again.** @@ -794,9 +794,9 @@ sed -i '' '/DNS<\/key>/,/<\/dict>/d' ~/Desktop/strongswan-certs/john.mobile ### Step 34: connect to VPN on iPhone or Mac -On iPhone, open "Settings", then enable "VPN". +On iPhone, open “Settings”, then enable “VPN”. -On Mac, open "System Preferences", click "Network", then "Self-hosted strongSwan VPN" and finally "Connect" and enable "Show VPN status in menu bar". +On Mac, open “System Preferences”, click “Network”, then “Self-hosted strongSwan VPN” and finally “Connect” and enable “Show VPN status in menu bar”. ### Step 35: test for leaks diff --git a/how-to-spoof-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md b/how-to-spoof-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md index e8b13a6..4b52d89 100644 --- a/how-to-spoof-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md +++ b/how-to-spoof-your-mac-address-and-hostname-automatically-at-boot-on-macos/README.md @@ -143,7 +143,7 @@ $ networksetup -listallhardwareports | awk -v RS= '/en0/{print $NF}' 9c:f4:8e:d6:2b:7d ``` -"Spoofed hostname" is random and "Spoofed MAC address" doesn’t match "Hardware MAC address"? +“Spoofed hostname” is random and “Spoofed MAC address” doesn’t match “Hardware MAC address”? 👍