tag:blogger.com,1999:blog-55473412024-03-13T10:39:53.526+08:00The GunBlad3I've moved! <a href="http://pleasefeedthegeek.wordpress.com/">http://pleasefeedthegeek.wordpress.com/</a>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.comBlogger1030125tag:blogger.com,1999:blog-5547341.post-51386830930483331812009-09-01T12:29:00.002+08:002014-04-23T22:53:05.392+08:00I have moved!New/current blog location can be found at <a href="http://blog.rayfoo.info/">blog.rayfoo.info</a>, heh.<br />
<br />
The old stuff here and at <a href="http://pleasefeedthegeek.wordpress.com/">pleasefeedthegeek.wordpress.com</a> will be left behind for reference.Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-53875581616918409822009-08-08T11:50:00.003+08:002009-08-08T11:51:52.492+08:00Writing stuff that helps othersAfter looking at my stats for this site, it seems that the HOWTO posts are still of use to other people, not like those rants/etc :P<div><br /></div><div>Looks like I'll just stick to writing HOWTOs, etc :) Since it really does help people heh.</div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-88339748483658364202009-07-31T13:49:00.002+08:002009-07-31T13:54:15.243+08:00Nginx + PHP-FPM : $_SERVER[PHP_SELF] returning itself twiceWriting this down here in case anyone else encounters the same.<br /><br />I got the $_SERVER[PHP_SELF] returning itself twice (eg. /123.php/123.php instead of /123.php as it should be) with my Nginx and PHP-FPM server. (Nginx 0.7.61, PHP 5.3.0)<br /><br />Seems that the issue lies with the fastcgi configuration that I used. Make sure that this is not set.<br /><br /><blockquote style="font-family: courier new;"># fastcgi_param PATH_INFO $fastcgi_script_name; #do not use, causes php_self to screw up</blockquote>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com5tag:blogger.com,1999:blog-5547341.post-60026592919719596562009-04-29T00:54:00.008+08:002009-04-30T20:38:06.711+08:00HOWTO: Share internet connection (painlessly) from your Ubuntu machine over WirelessInternet connection sharing (ICS) had been one of the insane things that I've always made use of, be it in Windoze or otherwise. And now with us using mobile broadband, me having my Acer Aspire One notebook installed with Ubuntu on it, it's time to take up the challenge again to get this up and running! No need for Wireless@SG anymore, I can BECOME Wireless@SG! :D<br /><br />Problem was, after reading many Ubuntu forums and HOWTOs, trying out Firestarter many times (and I'm currently too lazy to learn to configure iptables myself manually), I was almost ready to give up, until I read up on ipmasq out of curiousity... You would need to use the terminal, so if you have an allergy to the terminal it'd be good to learn and overcome that first :)<br /><br />If this was helpful to you, or if you have any questions, do leave a comment!<br /><br />This HOWTO was done on the following:<br /><ul><li>Ubuntu Jaunty 9.0.4 UNR (Ubuntu Netbook Release)</li><li>Huawei E180 HSPA USB Modem</li><li>Acer Aspire One A150<br /></li></ul><br /><span style="font-weight: bold;font-size:130%;" >Here's what you do:</span><br /><span style="font-weight: bold;font-size:130%;" >1) Install dnsmasq and ipmasq</span><br />Run the following command in terminal:<br /><blockquote style="font-family: courier new;">sudo apt-get install dnsmasq ipmasq -y</blockquote><br /><span style="font-size:130%;"><span style="font-weight: bold;">2) Disable dnsmasq from autostarting</span></span><br />In your terminal, type:<br /><blockquote style="font-family: courier new;">sudo gedit /etc/default/dnsmasq</blockquote><br />Look for the line that states "ENABLED=1" and change it to "ENABLED=0"<br /><br /><span style="font-weight: bold;font-size:130%;" >3) Kill off dnsmasq daemon</span><br />We don't want dnsmasq to be running as a daemon here, since NetworkManager tries to start it for shared connections.<br /><blockquote style="font-family: courier new;">sudo killall dnsmasq</blockquote><br /><span style="font-size:130%;"><span style="font-weight: bold;">4) Enable wireless</span></span><br />You should know how to do this if it's not already on...<br /><br /><span style="font-weight: bold;font-size:130%;" >5) Configure wireless</span><br /><ol><li>Left click network manager applet in the top panel.</li><li>Select "Create new wireless network".</li><li>Type in the network name and change your security settings as needed.</li></ol>This would tell NetworkManager to create an ad-hoc wireless network.<br /><br /><span style="font-weight: bold;font-size:130%;" >6) Check wireless config</span><br /><ol><li>Right click network manager applet.</li><li>Select "Edit Connections...".</li><li>Go to the "Wireless" tab.</li><li>Select your ad-hoc network and click on "Edit".</li><li>Go to "IPv4 Settings" tab</li><li>The method should be "Shared to other computers"</li></ol>This is so that dnsmasq will run whenever this network is connected to, providing us a DHCP and DNS server for that ad-hoc network.<br /><br /><span style="font-weight: bold;font-size:130%;" >7) Configure ipmasq</span><br />In terminal, type:<br /><blockquote style="font-family: courier new;">sudo dpkg-reconfigure ipmasq</blockquote><ol><li>Should PPP connections recompute the firewall? Yes</li><li>Just press Ok</li><li>When should ipmasq be started? After network interfaces are brought up</li></ol><br /><span style="font-weight: bold;font-size:130%;" >8) Connect internet facing modem connection if not already done so</span><br />For me I just select my service provider and Ubuntu "dials up" to connect<br /><br /><span style="font-weight: bold;font-size:130%;" >9) Run ipmasq to configure iptables</span><br />iptables configs does the actual routing, ipmasq helps configure iptables PAINLESSLY :)<br />From terminal, type:<br /><span style="font-family:courier new;"></span><blockquote><span style="font-family:courier new;">sudo ipmasq</span></blockquote><br /><span style="font-weight: bold;font-size:130%;" >10) Get ipmasq to run whenever a network interface goes up or down</span><br />iptables configurations are not persistent, so I use ipmasq to autoconfig for me everytime a network interface goes up. Note that you can also use other methods to <a href="https://help.ubuntu.com/community/IptablesHowTo#Saving%20iptables">persist iptables</a>. NetworkManager fires off scripts in /etc/network/if-up.d whenever an interface goes up, so let's tell it to run ipmasq too.<br />In terminal, type these commands:<br /><span style="font-family:courier new;"></span><blockquote><span style="font-family:courier new;">cd /etc/network/if-up.d</span><br /><span style="font-family:courier new;">sudo gedit config-iptables</span></blockquote><span style="font-family:courier new;"></span>Copy and paste the following into the editor, save and exit.<br /><blockquote>#! /bin/sh<br /><br />/usr/sbin/ipmasq</blockquote>Then in terminal again, make the script executable:<br /><blockquote><span style="font-family:courier new;">sudo chmod +x config-iptables</span></blockquote>You will want ipmasq to autoconfig again when a network interface goes down, so run the following in terminal:<br /><blockquote><span style="font-family:courier new;">sudo cp config-iptables /etc/network/if-post-down.d</span></blockquote><br /><span style="font-weight: bold;font-size:130%;" >11) Connect client, start surfing :)</span><br />You're done! Now just get another wifi client to join in the ad-hoc network, and after it gets an IP automatically we should be good to go!Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com8tag:blogger.com,1999:blog-5547341.post-32510569020592547752009-04-05T01:47:00.002+08:002009-04-05T01:58:00.665+08:00Ubuntu on Acer Aspire One cannot see or join wireless networkIn case anyone encounters the same problems, hopefully this saves the sanity of these people trying to troubleshoot this.<br /><br />I'm using an Acer Aspire One A150, running Ubuntu Intrepid Ibex 8.10, madwifi-hal drivers as instructed <a href="https://help.ubuntu.com/community/AspireOne#Install Ubuntu Intrepid Ibex 8.10 on the Acer Aspire One">here</a>.<div><br /></div><div>I was not able to see my wireless network even though it could detect and join other networks. The problem was caused by the wireless network being set to a radio channel higher than 11.</div><div><br /></div><div>Possible solutions:</div><div>1) (recommended) Change the wireless AP channel to between 1 and 11.</div><div>2) If (1) is not possible for you, follow squire_uk's <a href="http://ubuntuforums.org/archive/index.php/t-1056042.html">forum post</a> made on February 10th, 2009, 06:11 PM for his fix.</div><div><br /></div><div>References:</div><div><ul><li><a href="https://help.ubuntu.com/community/AspireOne#Install Ubuntu Intrepid Ibex 8.10 on the Acer Aspire One">https://help.ubuntu.com/community/AspireOne#Install Ubuntu Intrepid Ibex 8.10 on the Acer Aspire One</a></li><li><a href="http://ubuntuforums.org/archive/index.php/t-1056042.html">http://ubuntuforums.org/archive/index.php/t-1056042.html</a></li></ul></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com2tag:blogger.com,1999:blog-5547341.post-53834247951354533622009-03-27T23:59:00.002+08:002009-03-30T10:17:37.218+08:00It (still) hurts like hellIt's probably been just over a year since the changes in my mum towards me, and even longer for her towards my brother, but the hurt and disappontment at my mum's actions are still basically there. Because of what she did which I thought of as nothing less than the betrayal and disowning of her sons.<br /><br />I think most people would never come close to understanding this kind of pain, which would be good if this were true... I'm grateful to God really for Yifen who really does love and know me, and I'm sure my sister-in-law does too for my brother. But even with the many people around who know about this and show concern, I believe the only one who can come close to understanding this would be my brother only.<br /><br />Which is why I get quite frustrated when people come and say "Oh, you should keep trying to contact her. See, your mum is so hurt." or "It's only right to keep trying because we need to honour our parents."<br /><br />Honouring father and mother I totally agree with. And that's because that is what God (or Christ) wants. But all this time thrashing it out in my mind what I still can't figure out is: why does it mean for me to honour her? Definitely far more than just fulfilling obligations/duty, but what I wish to do is exactly what's not possible now counting what's happened/happening. Totally frustrating...<br /><br />Still much more floating around in my head, and after so long a time of thinking heh. But all still in a mess..Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com1tag:blogger.com,1999:blog-5547341.post-35500874723681219632009-03-24T11:08:00.007+08:002009-03-24T12:04:51.592+08:00HP SWFScan Static Code Analysis Tool for Flash<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_evPUEWAwFrY/Schb1R51OhI/AAAAAAAAILQ/tGe-k9HTm3Q/s1600-h/SWFScan.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 185px;" src="http://1.bp.blogspot.com/_evPUEWAwFrY/Schb1R51OhI/AAAAAAAAILQ/tGe-k9HTm3Q/s320/SWFScan.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5316600331008031250" /></a><br />HP has released SWFScan, a free static code analysis tool for Flash. It does decompiling and static code analysis for a pretty huge list of vulnerabilities in Flash. Supports up to ActionScript 3.<br /><br />Using it is easy: point it to the flash file, click on "Get" to retrieve and decompile, then click on "Analyse" to well...Analyse the source code :)<br /><br />Decompiled source codes can be saved, and a HTML vulnerability report can be generated too after analysis.<br /><br />FAQ<br /><a href="http://www.communities.hp.com/securitysoftware/blogs/spilabs/archive/2009/03/20/hp-swfscan-faq.aspx">http://www.communities.hp.com/securitysoftware/blogs/spilabs/archive/2009/03/20/hp-swfscan-faq.aspx</a><br /><br />Blog post<br /><a href="http://www.communities.hp.com/securitysoftware/blogs/spilabs/archive/2009/03/20/exposing-flash-application-vulnerabilities-with-swfscan.aspx">http://www.communities.hp.com/securitysoftware/blogs/spilabs/archive/2009/03/20/exposing-flash-application-vulnerabilities-with-swfscan.aspx</a><br /><br />Download<span class="Apple-style-span" style="color: rgb(85, 26, 139); "><br /></span><div><a href="http://www.hp.com/go/swfscan">http://www.hp.com/go/swfscan</a><br /></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com2tag:blogger.com,1999:blog-5547341.post-86386702144012371632009-03-18T09:58:00.003+08:002009-03-18T10:07:43.720+08:00ProxyStrike!<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.edge-security.com/proxystrike.php"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 69px;" src="http://2.bp.blogspot.com/_evPUEWAwFrY/ScBXGv0xNLI/AAAAAAAAIK8/H8UkQhyPw3U/s320/3251415324_242d45c681.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5314343333725811890" /></a>Another <a href="http://www.edge-security.com/proxystrike.php">tool</a> to try out!<div><br /></div><div>From the site:</div><div><span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; font-family:Verdana;font-size:12px;"><p align="justify" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; "></p><blockquote><p align="justify" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; ">ProxyStrike is an active Web Application Proxy, is a tool designed to find vulnerabilities while browsing an application. It was created because the problems we faced in the pentests of web applications that depends heavily on Javascript, not many web scanners did it good in this stage, so we came with this proxy.<br /><br />Right now it has available Sql injection and XSS modules. Both modules are designed to catch as many vulnerabilities as we can, it's that why the SQL Injection module is a Python port of the great DarkRaver "Sqlibf". The XSS module is made by us, using our library Gazpacho (soon will be released as standalone tool).</p><p align="justify" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; ">The process is very simple, ProxyStrike runs like a passive proxy listening in port 8008 by default, so you have to browse the desired web site setting your browser to use ProxyStrike as a proxy, and ProxyStrike will analyze all the paremeters in background mode. For the user is a passive proxy because you won't see any different in the behaviour of the application, but in the background is very active. :)</p><p style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: 0px; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; "><b>Features:</b></p><ul style="list-style-type: none; list-style-position: initial; list-style-image: initial; margin-top: 1em; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; padding-left: 24px; "><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Plugin engine (Create your own plugins!)</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request interceptor</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request diffing</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request repeater</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Automatic crawl process</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Save/restore session</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Http request/response history</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request parameter stats</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request parameter values stats</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Request url parameter signing and header field signing</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Use of an alternate proxy (tor for example ;D )</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Sql attacks (plugin)</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Server Side Includes (plugin)</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Xss attacks (plugin)</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Attack logs</li><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; ">Export results to HTML or XML</li></ul></blockquote><ul style="list-style-type: none; list-style-position: initial; list-style-image: initial; margin-top: 1em; margin-right: 0px; margin-bottom: 1em; margin-left: 0px; padding-left: 24px; "><li style="padding-top: 0px; padding-right: 0px; padding-bottom: 4px; padding-left: 12px; line-height: 1.4em; background-image: url(http://www.edge-security.com/img/or-bullet.gif); background-repeat: no-repeat; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: 0px 5px; "></li></ul></span></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-41445866867118352482009-03-11T21:48:00.004+08:002009-03-11T22:29:13.395+08:00HOWTO: Determining the day of the week from the date in Microsoft LogparserOne of the issues we encountered in working with Microsoft Logparser is that we needed to determine which day of the week it was given a date. Though there wasn't any function to do so, it seemed that the solution was pretty simple, actually.<div><br /></div><div>(Apologize in advance for the bad reading formatting here, but these should work just by copying and pasting into your command prompt. For some additional sanity I colour the more important parts <span class="Apple-style-span" style="color: rgb(255, 0, 0);">red</span>, heh.)<br /><div><br /></div><div>The code itself to convert is like this:</div><div><span class="Apple-style-span" style="font-family:'courier new';"><blockquote><span class="Apple-style-span" style="font-size:small;"><span class="Apple-style-span" style="color: rgb(255, 0, 0);">MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7)</span></span></blockquote></span></div><div>Where DateTime is the input column with the datetime stamp. 86400 is the number of seconds in a day, and 7 is well....the number of days in a week :P</div><div><br /></div><div>The return values (proved consistent within the range of my testing) are with Sunday as 1, and running all the way to Saturday as 0, i.e.:</div><div>Sat - 0</div><div>Sun - 1</div><div>Mon - 2</div><div>Tue - 3</div><div>Wed - 4</div><div>Thu - 5</div><div>Fri - 6</div><div><br /></div><div>Combined into <span class="Apple-style-span" style="font-weight: bold;">a simple query</span>:</div><div><span class="Apple-style-span" style="font-size:small;"><blockquote>logparser -i:csv -o:datagrid "SELECT DISTINCT TO_DATE(DateTime), <span class="Apple-style-span" style="color: rgb(255, 0, 0);">MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7)</span> FROM datetest.csv"</blockquote></span></div><div>(datetest.csv is my input test file here.)</div><div><br /></div><div><br /></div><div>And making use of some additional (simple but crazy!) programming to<span class="Apple-style-span" style="font-weight: bold;"> output as days instead of numbers</span> (referencing from <a href="http://technet.microsoft.com/en-us/magazine/2006.08.insidemsft.aspx">this article</a>)<br /><span class="Apple-style-span" style="font-size:small;"><blockquote>logparser -i:csv -o:datagrid "SELECT DISTINCT TO_DATE(DateTime), Day <span class="Apple-style-span" style="color: rgb(255, 0, 0);">USING CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 0 THEN 'SAT' ELSE CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 1 THEN 'SUN' ELSE CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 2 THEN 'MON' ELSE CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 3 THEN 'TUE' ELSE CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 4 THEN 'WED' ELSE CASE MOD(DIV(TO_INT(TO_DATE(DateTime)), 86400), 7) WHEN 5 THEN 'THU' ELSE 'FRI' END END END END END END AS Day</span> FROM datetest.csv"</blockquote></span></div><div><br /></div><div style="text-align: center;">The output that I get :D</div><div><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_evPUEWAwFrY/SbfKgVCz3nI/AAAAAAAAIK0/xJAUoYalGlk/s1600-h/logparser+date+to+day.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 253px;" src="http://2.bp.blogspot.com/_evPUEWAwFrY/SbfKgVCz3nI/AAAAAAAAIK0/xJAUoYalGlk/s320/logparser+date+to+day.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5311936942260346482" /></a></div><div><br /></div><div>Hope this helped you. Any comments/feedback is much appreciated!</div><div><br /></div><div>References:</div><div><ul><li><a href="http://logparserplus.com/">http://logparserplus.com/</a><br /></li><li><a href="http://technet.microsoft.com/en-us/magazine/2006.08.insidemsft.aspx">http://technet.microsoft.com/en-us/magazine/2006.08.insidemsft.aspx</a><br /></li></ul></div></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com1tag:blogger.com,1999:blog-5547341.post-47391520974090066942009-03-08T01:23:00.001+08:002009-03-08T01:25:33.981+08:00Tweet Tweet!Have not been able to blog much lately, but have been doing more of microblogging on Twitter. So...you can follow me there ;)<div><br /></div><div><a href="http://twitter.com/g54zw00dcy4u1ls">http://twitter.com/g54zw00dcy4u1ls</a><br /></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-79681557541763761592009-02-22T22:44:00.002+08:002009-02-22T22:49:49.559+08:00Decision-making between married couplesMy wife is glad we don't do this :P<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_evPUEWAwFrY/SaFk_vsQyuI/AAAAAAAAIKA/jDRhGKDw0hQ/s1600-h/up+to+you.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 235px;" src="http://2.bp.blogspot.com/_evPUEWAwFrY/SaFk_vsQyuI/AAAAAAAAIKA/jDRhGKDw0hQ/s320/up+to+you.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5305632882315807458" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_evPUEWAwFrY/SaFloRQ0iwI/AAAAAAAAIKI/oQotpb7orQU/s1600-h/up+to+you2.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 251px;" src="http://1.bp.blogspot.com/_evPUEWAwFrY/SaFloRQ0iwI/AAAAAAAAIKI/oQotpb7orQU/s320/up+to+you2.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5305633578522282754" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_evPUEWAwFrY/SaFloYxxXjI/AAAAAAAAIKQ/UV0pMnGW1eY/s1600-h/up+to+you3.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 228px;" src="http://2.bp.blogspot.com/_evPUEWAwFrY/SaFloYxxXjI/AAAAAAAAIKQ/UV0pMnGW1eY/s320/up+to+you3.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5305633580539534898" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_evPUEWAwFrY/SaFloup92JI/AAAAAAAAIKY/1QBaS43udVg/s1600-h/up+to+you4.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 261px;" src="http://3.bp.blogspot.com/_evPUEWAwFrY/SaFloup92JI/AAAAAAAAIKY/1QBaS43udVg/s320/up+to+you4.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5305633586412378258" /></a><br /></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com2tag:blogger.com,1999:blog-5547341.post-57899988310174329272009-02-19T22:32:00.004+08:002009-02-19T22:41:48.603+08:00Code QualityAs I start to do support work (think everyone's starting to do everything over here...) I'm reminded of this...<div><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_evPUEWAwFrY/SZ1vms-rQpI/AAAAAAAAIJ0/BmLrd29t0vI/s1600-h/wtfm.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 302px;" src="http://1.bp.blogspot.com/_evPUEWAwFrY/SZ1vms-rQpI/AAAAAAAAIJ0/BmLrd29t0vI/s320/wtfm.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5304518646812066450" /></a><br /><div style="text-align: left;">Taken from <a href="http://www.osnews.com/story/19266/WTFs_m">OSnews</a>.</div></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-2009351655694091022009-02-19T09:50:00.002+08:002009-02-19T09:52:15.835+08:00Wireshark 1.0.6 is out<div><ul><li><a href="http://www.wireshark.org/download.html">Downloads page</a><br /></li><li><a href="http://www.wireshark.org/docs/relnotes/wireshark-1.0.6.html">Release notes</a></li></ul></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-65980370875061198792009-02-18T09:44:00.003+08:002009-02-18T23:00:07.741+08:00Siftables!<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_evPUEWAwFrY/SZwiHa_hd0I/AAAAAAAAIJk/WKrFcPClwH4/s1600-h/music-against-wood-320x213.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; height: 133px;" src="http://1.bp.blogspot.com/_evPUEWAwFrY/SZwiHa_hd0I/AAAAAAAAIJk/WKrFcPClwH4/s200/music-against-wood-320x213.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5304151972035786562" /></a><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_evPUEWAwFrY/SZwiHclTqSI/AAAAAAAAIJc/QgofJM5gULk/s1600-h/gantt320x238.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; height: 149px;" src="http://3.bp.blogspot.com/_evPUEWAwFrY/SZwiHclTqSI/AAAAAAAAIJc/QgofJM5gULk/s200/gantt320x238.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5304151972462700834" /></a><br />Really cool idea demo'ed by David Merrill at TED. Something like <a href="http://en.wikipedia.org/wiki/Furby">Furbys</a> on steroids, but in toy block form.<div><br /></div><div><ul><li><a href="http://blog.ted.com/2009/02/siftables_the_t.php">Blog post</a><br /></li><li><a href="http://www.ted.com/index.php/talks/david_merrill_demos_siftables_the_smart_blocks.html">Video</a><br /></li><li><a href="http://web.media.mit.edu/~dmerrill/siftables.html">Siftables page</a> (mit.edu)</li></ul></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-1397483380553746492009-02-04T09:59:00.003+08:002009-02-04T10:02:11.804+08:00Frustrated by a coworker’s use of old-school programming techniquesSaw this <a href="http://blogs.techrepublic.com.com/programming-and-development/?p=809&tag=nl.e055">article</a> in TechRepublic, and it's pretty good actually.<div><br /></div><div>Though it talks about working with coworkers who code really differently, the human aspect of handling this problem can be just about applied anywhere also.</div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-84301328681554321622009-02-02T23:54:00.002+08:002009-02-03T00:02:32.344+08:00Academic Earth<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_evPUEWAwFrY/SYcY9kOuURI/AAAAAAAAII0/PJIzpH7nAts/s1600-h/academic+earth.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 185px;" src="http://2.bp.blogspot.com/_evPUEWAwFrY/SYcY9kOuURI/AAAAAAAAII0/PJIzpH7nAts/s320/academic+earth.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5298230932601196818" /></a><br /><div>Here's another endeavour to bring free education out to the masses. Good mission, I'd say :)<br /></div><div><a href="http://www.academicearth.org/">http://www.academicearth.org/</a><br /></div><div><a href="http://www.academicearth.org/about">http://www.academicearth.org/about</a><br /></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-69189885390698292982009-01-17T22:40:00.000+08:002009-02-02T01:41:42.542+08:00Revelation<span class="Apple-style-span" style="border-collapse: collapse; font-family: arial; font-size: 13px; ">There're two ways when someone will reveal him/herself: when the listener asks, or when the person initiates it.<br /><br />It'll only be one way or the other.</span>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-80298477901077770372009-01-16T19:52:00.000+08:002009-02-02T01:40:59.090+08:00Plank vs Speck<span class="Apple-style-span" style="border-collapse: collapse; font-family: arial; font-size: 13px; ">The more you keep focused on the specks in others' eyes, the less you'll see the plank in yours.</span>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-56190316783771881122009-01-16T10:10:00.003+08:002009-01-16T10:13:45.452+08:00Application Boundaries Enforcer (ABE)This module enforces application boundaries at the browser end, and in the future possibly implemented as a web filtering proxy also.<div><a href="http://hackademix.net/2008/12/20/introducing-abe/">http://hackademix.net/2008/12/20/introducing-abe/</a><br /></div><div><br /></div><div>This module is not out as yet, but I'll be waiting for its release to see whether it really is a good thing to push to end users.</div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-62706539639190246682009-01-15T13:49:00.002+08:002009-01-15T13:53:24.871+08:00TODO: Check out XSS ProxySome things to check out when I have a bit of time to spare:<div><div><a href="http://xss-proxy.sourceforge.net/">http://xss-proxy.sourceforge.net/</a></div><div><a href="http://xss-proxy.sourceforge.net/Advanced_XSS_Control.txt">http://xss-proxy.sourceforge.net/Advanced_XSS_Control.txt</a></div><div><a href="http://hackathology.blogspot.com/2007/10/xss-proxy-poc.html">http://hackathology.blogspot.com/2007/10/xss-proxy-poc.html</a></div><div><a href="http://www.securiteam.com/tools/5UP0G0UEVO.html">http://www.securiteam.com/tools/5UP0G0UEVO.html</a></div><div><a href="http://ha.ckers.org/blog/20060718/attacking-applications-via-xss-proxies/">http://ha.ckers.org/blog/20060718/attacking-applications-via-xss-proxies/</a></div><div><a href="http://ha.ckers.org/blog/20070710/xss-proxy-tunnelling/">http://ha.ckers.org/blog/20070710/xss-proxy-tunnelling/</a></div><div><br /></div><div>Oh yeah, and this is a real gem :)</div><div>Server/network admins be warned...XSS can be really bad for you too...</div><div><a href="http://holisticinfosec.blogspot.com/2008/08/cross-site-scripting-can-be-used-to.html">http://holisticinfosec.blogspot.com/2008/08/cross-site-scripting-can-be-used-to.html</a><br /></div></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-19996551989423635112009-01-15T09:30:00.001+08:002009-01-15T09:32:12.723+08:00MSN Live MessengerMicrosoft has done it!<br /><br />It has made me change back from <a href="http://portableapps.com/apps/internet/miranda_portable">Miranda IM</a> to <a href="http://download.live.com/messenger">MSN Live Messenger</a> for MSN. That's how good the new version is.... ;DAnonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-85915168830204535502009-01-13T09:38:00.002+08:002009-01-13T09:40:08.976+08:00CWE/SANS TOP 25 Most Dangerous Programming Errors<div><a href="http://cwe.mitre.org/top25/">http://cwe.mitre.org/top25/</a><br /></div><a href="http://www.sans.org/top25errors/">http://www.sans.org/top25errors/</a><div><br /></div><div>Pretty much the same stuff, but a good list for reference/learning nonetheless.</div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-25251982667599938192009-01-06T12:24:00.004+08:002009-01-06T12:33:37.180+08:00YouTube Symphony OrchestraPity I don't play any instruments, thought this would be really really interesting.<div><a href="http://www.youtube.com/symphony">http://www.youtube.com/symphony</a><br /></div><div><br /></div><div>Basically people from all over the world are invited to send in their video recordings for their parts, which will be made into an online orchestra. The best will get to perform at New York City's Carnegie Hall in April 2009.</div><div><br /></div><div>They even have video recordings of the Tan Dun conducting for every instrument! So that you can practise on your own, online :D</div><div><br /></div><div>On a separate note, never thought classical music could be so nice after watching Nodame Cantabile, heh. :)</div><div><a href="http://www.animesuki.com/series.php/947.html">Nodame Cantabile</a></div><div><a href="http://www.animesuki.com/series.php/1073.html">Nodame Cantabile - Live Action</a></div><div><a href="http://www.animesuki.com/series.php/1293.html">Nodame Cantabile: Paris Chapter</a></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0tag:blogger.com,1999:blog-5547341.post-77021477498090137462008-12-31T08:00:00.003+08:002008-12-31T10:05:02.497+08:00Spam messages in Facebook<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_evPUEWAwFrY/SVrTSenK-aI/AAAAAAAAIF0/uEnFFOhw1uM/s1600-h/facebook+spam.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 231px;" src="http://4.bp.blogspot.com/_evPUEWAwFrY/SVrTSenK-aI/AAAAAAAAIF0/uEnFFOhw1uM/s320/facebook+spam.png" border="0" alt="" id="BLOGGER_PHOTO_ID_5285769427081165218" /></a><br /><br />Can't really figure out how this is possible, even applications that you install shouldn't be allowed to send chat messages on your behalf. Perhaps browser malware?<div><br /></div><div>Any ideas, anyone?<br /></div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com2tag:blogger.com,1999:blog-5547341.post-46997946357285891482008-12-30T23:12:00.003+08:002008-12-30T23:15:59.884+08:00INTERNET. SERIOUS BUSINESS.<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_evPUEWAwFrY/SVo7CSMqQhI/AAAAAAAAIFk/UA3xkquV3Eg/s1600-h/internet,+serious+business.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 240px;" src="http://4.bp.blogspot.com/_evPUEWAwFrY/SVo7CSMqQhI/AAAAAAAAIFk/UA3xkquV3Eg/s320/internet,+serious+business.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5285602023103414802" /></a><div style="text-align: center;">Serious business indeed.</div>Anonymoushttp://www.blogger.com/profile/04279052045720224056noreply@blogger.com0