A little experiment

Thought about getting a nicer email signature earlier on, while adding the qr code image to my signature, the most natural thing to do was just to upload it to cubie and link it. Just realised that this could result in some interesting phenomenon. Basically, whenever someone opens the email, it ...

cloudflare

Finally decided to try out cloudflare to see if my site would load faster. I had already created an account ages ago but was hesitant due a a few reasons. 1) Changing DNS will affect my MX records and during transition period, my emails might be lost if settings are wrong. 2) Complicated setup ...

Allure of sysprep

For someone like me, who has over the years collected an entire treasure trove of applications and utilities for all purposes, sysprep is a godsend. I wont have to re-install and re-configure all my programs when migrating to a new computer. However, having done so 4 times for my last windows ...

webview vs native

And so, this month I will be rather busy volunteering on developing an app for the scouts. Some pointers I have picked up so far... 1) You need to pick somewhere to stop supporting. If you are supporting all versions of Android since 1.5. There is gonna be a whole lot of functionality that you ...

iptables -F

This command should be removed or come with confirmation message before execution. Today, I wanted to to turn my blacklist into a whitelist. Reason being as I added new services, I don't always remember to add in new rules, as a result, I was exposing quite a number of potentially sensitive ...

Linux box to AP with hostapd/dhcpd/iptables

2 weeks after my last failure, my hands started itching again and I tried to bridge my ethernet connection to a wireless adapter running in AP mode. Some reasons which resulted in my failures in previous occasions 1) Networking on a headless server - When playing with networks, you need to work ...

Stealing code

Much of client side web technology today runs directly from source, E.g. HTML/CSS/JS... , which means source code is readily available to anyone who wants it, a far cry from software where source code is often kept tightly under wraps. As such, it is very simple to just copy out chunks of code ...

Spoofing NUS WPA2 and stealing credentials

Warning Content in this post is for educational purposes only, it may be illegal to carry out the exploit mentioned. The author is not responsible for any action taken against you if you carry it out. This exploit is possible because of configuration settings in PEAP where certificate ...