Today I had to make changes to a Pixelmator document that I hadn’t touched in
years. Unfortunately, I didn’t seem to have all the used fonts installed and
I didn’t find a way in Pixelmator to see a list of all fonts used / the missing
fonts. So I went into my terminal and tried to figure out the format of the
file which turned out to be unnecessary since there is a little command line
tool built into your mac called
strings that allows allows you to pull all
the strings from a binary file.
Today I received the following mail in my inbox, pretending to be from someone who actually works at Cloud66:
Recently I was faced with the issue of having a device capable of playing MP3s from the network, but I only had MP4s available. Since the source files were too many and changing daily, transcoding them in advance and effectively mirroring them was not an option. The only solution would be to do it on demand. A great opportunity to get fancy with Docker.
Who doesn’t want to hack Pay TV? :) So do I. The challenge was a nice website with a tv on it that showed static and a form that requested a password. A quick analysis of the JS revealed the following interesting line:
The challenge was to find the first secret from a given webpage. The problem was that there was only a form that didn’t really work (it was meant to send you an email with login credentials).
Sometimes, you need to check if an IP address is in a specific subnet. E.g., when writing a GitHub webhook endpoint, you want to check that the originating IP is one of GitHub’s. There’s an API call you can make to get the list of subnets hook calls can originate from:
When you try to change request.POST in a Django view it will raise a QueryDict instance is immutable exception. In order to change/add values you have to create a shallow copy instead of a binding.
I’m currently developing on the WhatsAPI, but there’s one problem when you’re using an iPhone: no one has figured out yet how your password is being generated. On Android devices it’s just the md5 hash of the reverse of the IMEI number of your phone, but neither this nor all possible hash-combinations of the iPhone’s UDID did word. So I did some network sniffing and figured out how a device is being registered and how you can use this to manually reset your WhatsApp password.