Feature Request: Search feature for NS encypted cookies
Feature Request: Search feature for NS encypted cookies
I'd like to see a 'Search' or 'Find' feature added to NS>Options>Advanced>HTTPS>Cookies if possible.
Either add the above suggestion (if possible) or else the encrypted cookie list should be in alphabetical order like the whitelist is. While scrolling through the cookie list to find a particular URL to delete, I thought I'd never find it.
Either add the above suggestion (if possible) or else the encrypted cookie list should be in alphabetical order like the whitelist is. While scrolling through the cookie list to find a particular URL to delete, I thought I'd never find it.
Phule
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
This is why I liked having the text file, prefs.js, in Fx 2+. You can open it with your text editor and use the search or find function to find anything quickly, including your forced HTTPS sites and cookies.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US at an expert level; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20 diehard
Re: Feature Request: Search feature for NS encypted cookies
Curiosity. About how many cookies do you have in the list?
(prefs.js continues to be a plain text file.)
(prefs.js continues to be a plain text file.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.23) Gecko/20090825 SeaMonkey/1.1.18
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: Feature Request: Search feature for NS encypted cookies
I may be wrong on this but cookies are not kept in the prefs.js file anyway, so not really an issue. I think it uses a sqllite db to maintain it, so accessing it does require some interface. However, I can't imagine one would have so many cookies that you can't use the interface already provided. I mean if you ARE holding that many cookies, you really need to reconsider.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
These are not cookie cookies, these are NoScript HTTPS cookies, which are stored in prefs.js.
(Later versions of <Mozilla> cookie cookies are stored in an sqllite db.)
(Later versions of <Mozilla> cookie cookies are stored in an sqllite db.)
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.23) Gecko/20090825 SeaMonkey/1.1.18
Re: Feature Request: Search feature for NS encypted cookies
Actually, they're not NS "cookies", or cookies at all. It's a *list* of which cookies you wish for NS to force HTTPS on. My mistake, and thanks for pointing it out. I was thinking of the fact that the MZ cookies were in the sql file, much as Guardian pointed out.therube wrote:These are not cookie cookies, these are NoScript HTTPS cookies, which are stored in prefs.js.
(Later versions of <Mozilla> cookie cookies are stored in an sqllite db.)
I too wondered just how many items OP had in the list -- do you have that many bank accounts and credit cards, etc.? ... but the question was asked, so....

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US at an expert level; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20 diehard
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: Feature Request: Search feature for NS encypted cookies
Ok, we were not talking literatively, we were talking about the options list. Ok, you are right, it would be in the prefs.js, sorry.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
There are 110 cookies, but the prefs.js file stored in my Macintosh computer just shows the following 3 lines.Tom T. wrote: Actually, they're not NS "cookies", or cookies at all. It's a *list* of which cookies you wish for NS to force HTTPS on. My mistake, and thanks for pointing it out. I was thinking of the fact that the MZ cookies were in the sql file, much as Guardian pointed out.
I too wondered just how many items OP had in the list -- do you have that many bank accounts and credit cards, etc.? ... but the question was asked, so....
pref("extensions.firefox-pdf-mac.scaleFactor", "1.0");
pref("extensions.firefox-pdf-mac.autoScales", true);
pref("extensions.firefox-pdf-mac.displayMode", 1); // kPDFDisplaySinglePageContinuous
The prefs.js file is located at /Users/bob/Library/Application Support/FireFox/Profiles/rftfes6.default/extensions/colesbury@gmail.com/defaults/preferences/prefs.js
Phule
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
I know zero about Mac, and I'm presently on F2.20, out of eccentricity, I suppose. But when I opened prefs.js with Wordpad and used "Find" = "Forced", it took me right to my list of NS Force HTTPS: for example (I won't list all out of privacy, of course) *hushmail.com. I wasn't sure of the exact wording for secure cookies, so clicked "next", and it took me to user_pref("noscript.secureCookiesForced", with the list of sites whose cookies are to be forced secure. I would think you could do this in a Mac by opening prefs.js with the proper text editor and using its search command.
If this is still stored in prefs.js in F3, it should work. Will grab my portable F3.5.3 and check it out. Back in a few.
I don't understand why anyone's email address should be part of the file path name to the Fx profile's prefs.js. Are you sure that isn't for the Thunderbird email extension (which I don't have)? In Windows, once you get to Firefox\profiles\xxxxxxxx.default, prefs.js is right in there. You *don't* go into Extensions.
If this is still stored in prefs.js in F3, it should work. Will grab my portable F3.5.3 and check it out. Back in a few.
I don't understand why anyone's email address should be part of the file path name to the Fx profile's prefs.js. Are you sure that isn't for the Thunderbird email extension (which I don't have)? In Windows, once you get to Firefox\profiles\xxxxxxxx.default, prefs.js is right in there. You *don't* go into Extensions.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
Re: Feature Request: Search feature for NS encypted cookies
OK, here I am on F3.5.3, as you can see by the useragent below. The file path to the Profile folder is slightly different, since it's stored on the portable (flash drive) but no matter. The profile is the same once you open it. Opened prefs.js with Wordpad (r-click "edit" also works in Windows), searched "cookiesforced" and voila! -- there's the list. You also could obviously search for the specific one you want, by site name instead of by going to the Forced list first, e. g. search "hushmail" -- it may come up three or four times before you get to the HTTPS Force part. Either way.
CAUTION: Note the warning at the top of prefs.js:
So it can be edited only when *all* instances of Fx are closed.
Also CAUTION to non-tech users: Do not edit system or application files unless you are sure of what you are doing. You should always make a backup copy, and you may lose your settings and/or have to reinstall Firefox. The above is undocumented, but was provided to answer phule's request for an easy way to search through a lengthy list of HTTPS-forced sites.
@ Giorgio: Alphabetizing them automatically would make phule's task easy from the GUI even without a search feature, and wouldn't be too hard to accomplish, would it?
CAUTION: Note the warning at the top of prefs.js:
Code: Select all
* If you make changes to this file while the application is running,
* the changes will be overwritten when the application exits.
Also CAUTION to non-tech users: Do not edit system or application files unless you are sure of what you are doing. You should always make a backup copy, and you may lose your settings and/or have to reinstall Firefox. The above is undocumented, but was provided to answer phule's request for an easy way to search through a lengthy list of HTTPS-forced sites.
@ Giorgio: Alphabetizing them automatically would make phule's task easy from the GUI even without a search feature, and wouldn't be too hard to accomplish, would it?
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
I'm not using Thunderbird but Apple Mail and I'm unsure where the email address came from nor who it belongs to. I found one work-around to the problem though. Open NS>Options>Advanced>HTTPS>Cookies, select all the names and paste them to a text editor file. This isn't very elegant but works.Tom T. wrote:I know zero about Mac, and I'm presently on F2.20, out of eccentricity, I suppose. But when I opened prefs.js with Wordpad and used "Find" = "Forced", it took me right to my list of NS Force HTTPS: for example (I won't list all out of privacy, of course) *hushmail.com. I wasn't sure of the exact wording for secure cookies, so clicked "next", and it took me to user_pref("noscript.secureCookiesForced", with the list of sites whose cookies are to be forced secure. I would think you could do this in a Mac by opening prefs.js with the proper text editor and using its search command.
If this is still stored in prefs.js in F3, it should work. Will grab my portable F3.5.3 and check it out. Back in a few.
I don't understand why anyone's email address should be part of the file path name to the Fx profile's prefs.js. Are you sure that isn't for the Thunderbird email extension (which I don't have)? In Windows, once you get to Firefox\profiles\xxxxxxxx.default, prefs.js is right in there. You *don't* go into Extensions.
Phule
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
.phule wrote:I'm not using Thunderbird but Apple Mail and I'm unsure where the email address came from nor who it belongs to.
That would scare me until I found out. The fact that an email address unknown to you is in your files calls for further investigation. Worst case: Your info, possibly keylogger, is being emailed to that person. Probably not, but why *is* it there? Sounds like an inquiry to Apple Mail support is in order.
Now, why didn't I (or anyone else) think of that? Elegance isn't the goal; results are. Cool!phule wrote:I found one work-around to the problem though. Open NS>Options>Advanced>HTTPS>Cookies, select all the names and paste them to a text editor file. This isn't very elegant but works.

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
Re: Feature Request: Search feature for NS encypted cookies
I looked at some of the other files in /Users/bob/Library/Application Support/FireFox/Profiles/rftfes6.default/extensions/colesbury@gmail.com/ and discovered that the email address is of the author of the plugin "Firefox PDF Plugin for Mac OS X" which I have added to Firefox.Tom T. wrote:That would scare me until I found out. The fact that an email address unknown to you is in your files calls for further investigation. Worst case: Your info, possibly keylogger, is being emailed to that person. Probably not, but why *is* it there? Sounds like an inquiry to Apple Mail support is in order.
Phule
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
FireFox 56.0,NoScript 5.1.2, BetterPrivacy-1.77
Adblock Plus 2.9.1. Mac OS X 10.12.5
Apple iMac 2.7 GHz Intel Core i5
8 GB 1066 MHz DDR3 RAM
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
Re: Feature Request: Search feature for NS encypted cookies
Learn something new every day ... never seen an extension whose author put his email addy in the name or file path of the extension. What if his email address changes? That happens... especially since he's using gmail, and not his own personal domain (e. g., Giorgio's address at his domain, informaction.com, which isn't so likely to change).
If you're sure it's legit, cool. But it still seems very strange on the part of the developer. Cheers.
If you're sure it's legit, cool. But it still seems very strange on the part of the developer. Cheers.
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.20) Gecko/20081217 Firefox/2.0.0.20
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: Feature Request: Search feature for NS encypted cookies
Unfortunately some less experienced developers will do things like this. It is not commonplace but it does happen and I have seen a few other oddities out there too. You can try bringing it up with the developer and ask them to update it in their next release or just ignore it.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3