Posts

Whenever I finish installing a fresh operating system, be it Windows or a Linux distribution, I always remap ctrl and caps lock on my keyboard. As I use the Control key a lot more than Caps Lock, I like having the former on the same line as my home row keys. So, this is what I normally do on Windows. Disclaimer: I have only tested this on Windows 10.

CONTINUE READING

After reading Jessie Frazelle’s Docker Containers on the Desktop post I was quite interested in making some Fedora image based docker containers for some apps I want to use.

CONTINUE READING

Configuration options to get some third-party apps working nicely with HiDPI on Fedora 21

CONTINUE READING

Install steps to get World of Warcraft on Fedora 20 working via wine.

CONTINUE READING

Steps to get Voxelands - the Fun-Focused Free Software Voxel World Game; working on Mac OS X

CONTINUE READING

Steps to get searx (a privacy-respecting metasearch engine) working with gunicorn and supervisord

CONTINUE READING

It has been almost close to 5 years that I have set my foot on the Malaysian soil. Came over to Malaysia in July, 2009 with the aim of studying a bachelor, and now that I have completed, the journey in Malaysia is almost coming to an end in 2 months. I have moved around quite a bit, so, it’s pretty easy to not give much thoughts when leaving. But Malaysia is one which I spent the better half of my teenage years, and the one where I got into free & open source software (more of the ideology and appreciation, than contributing) and volunteering at events.

CONTINUE READING

Points: 200 Description: There was a zip file on the desktop. I can’t remember the password for it. We¬†saw a zip file named: “null password.zip” on the desktop. When opened, there are 2 files which are encrypted. So it was clear that we needed to crack the zip. First we looked at some hints from the challenge creator ;) #Hint for FOR2 "User was too dumb to store the password in the protected zip file itself" #HackIM #ForensicChallenge @nullcon @null0x00

CONTINUE READING

I play security competitions called Capture The Flag (CTF) with a group called Glider Swirley Points: 500 Description: The client says that the system was compromise. There was no evidence found for the same. The client claims that some anti-forensics tool was used to remove the evidences. Our investigator agrees to it. Can you find out what was the command that was executed and at what time it was done?

CONTINUE READING

The magic of rsa (100) You were able to hear some whispering on the last crypto party! *whisper* $d$ is 35181901. Keep it secret or we are doomed! We were given 2 files for the challenge. 1) rsa.py #!/usr/bin/env python import sys n= 65354147 e = 13 d = ?? f = open( sys.argv[1] , "r" ) for line in f: line = int(line.strip()) # you'll have to insert the decrypt function for each line(number) here!

CONTINUE READING