Continuity plan

Having a good continuity plan is important in case of unexpected incidents. Today, I brought my tablet in for servicing as the touch screen got a little wonky. It started exhibiting "phantom touches" and was bordering on unusable as it would cause foreground applications to go out of focus, ...

Default printer settings

I have never paid much attention to setting default printer, normally setting it to the most commonly used printer for convenience sake. However, a reason episode made me think twice on whether it is wise. Recently, while using my hybrid laptop in school, a dialog popped up and disappeared ...

Hiding compressed files in images

Have been doing this for quite some time, just wanted to share the method. The following code should work on Linux/Mac. Step 1. Zip/Rar/7z your secret file zip hideme.zip s3cr3t Step 2. Append the zip file to a random image file cat hideme.zip > randompic.jpg Thats all. When you open the jpg, ...

Hijacking QR codes

Just finished printing my poster for a school project in which contained a QR code for users to download an android app. It was my first time printing out 300dpi@A1 size and thankfully it turned out well (A reprint would have cost $12). Anyway, that is beside the point. More importantly, the QR ...

Interesting bluetooth experiment

Earlier on, I paired my bluetooth keyboard to both my android and windows OS dual boot configuration. It is a hassle to keep re-pairing the keyboard whenever I switch OSes. This was done by pairing it with the android and extracting the link key, which is a 32bit binary code and then replacing ...

A little experiment

Thought about getting a nicer email signature earlier on, while adding the qr code image to my signature, the most natural thing to do was just to upload it to cubie and link it. Just realised that this could result in some interesting phenomenon. Basically, whenever someone opens the email, it ...

Spoofing NUS WPA2 and stealing credentials

Warning Content in this post is for educational purposes only, it may be illegal to carry out the exploit mentioned. The author is not responsible for any action taken against you if you carry it out. This exploit is possible because of configuration settings in PEAP where certificate ...