If you'd like to use Subresource Integrity in your <script ...> tag, to generate the string for a particular JS file:
curl FULL_URL_TO_JS_FILE | openssl dgst -sha384 -binary | openssl base64 -A
For example:
| view.watch("center", (center) => { | |
| const { latitude, longitude } = center; | |
| centerText = `Center: Lat: ${latitude.toFixed(4)} | Lon: ${longitude.toFixed(4)}`; | |
| }); | 
| # First create an ArcGIS Pro Project, with at least one template, and put the | |
| # name of it below. | |
| import arcpy | |
| TEMPLATE_NAME = "Square" | |
| aprx = arcpy.mp.ArcGISProject("basic.aprx") | |
| for lyt in aprx.listLayouts(): | |
| if lyt.name == TEMPLATE_NAME: | |
| # export! | |
| print(f" {lyt.name} ({lyt.pageHeight} x {lyt.pageWidth} {lyt.pageUnits})") | |
| lyt.exportToJPEG("out.jpg") | 
If you'd like to use Subresource Integrity in your <script ...> tag, to generate the string for a particular JS file:
curl FULL_URL_TO_JS_FILE | openssl dgst -sha384 -binary | openssl base64 -A
For example:
| // Most of these from https://restoreprivacy.com/firefox-privacy/ - | |
| user_pref("media.peerconnection.enabled", false); // block WebRTC | |
| user_pref("privacy.resistFingerprinting", true); // help to make Firefox more resistant to browser fingerprinting | |
| user_pref("privacy.trackingprotection.fingerprinting.enabled", true); // [try to] block fingerprinting | |
| user_pref("privacy.trackingprotection.cryptomining.enabled", true); // block cryptominers | |
| user_pref("privacy.trackingprotection.enabled", true); // enable Mozilla’s built-in tracking protection feature | |
| user_pref("privacy.firstparty.isolate", true); // isolate cookies to the first party domain, which prevents tracking across multiple domains | |
| user_pref("network.cookie.cookieBehavior", 1); // Only accept cookies from the originating site (block third-party cookies) | |
| user_pref("network.cookie.lifetimePolicy", 3); // set cookies to only last after N days [below] | |
| user_pref("network.cookie.lifetime.days", 7); | 
conda command in any terminal (Windows command prompt, Powershell, etc). Open a terminal and type conda to make sure the conda command is recognized.