Cloudflare announces Universal SSL

Before the post-snowden era there was only 1% percent of the web that used SSL encryption, then after the revelations of the NSA’s surveillance programme the percentage of websites that were using SSL/TLS quickly jumped to 3%.

Encryption is one of the single most important things on the web in order to protect our data but still this number is incredibly low, and it shouldn’t be.


Today (29th September 2014) Cloudflare announces universal SSL, this means that anyone who uses Cloudflare’s network will have SSL by default, meaning anything north of 2+ million more websites will now be encrypted.


With the wake of this happening and the announcement from Google of the way page ranking now being more prominent for sites that are over HTTPS that we will soon see a trend. #savetheweb

You can read Cloudflare‘s blog entry about this here: 



How to: Using your spotify cached songs as a ringtone

Spotify is a great music streaming service but one of the things which annoyed me greatly about it was the fact that it wouldn’t easily let me access the songs I had stored in its offline cache from outside the app.

The reason why I wanted access to it from outside the app was not for illegal purposes like downloading the songs (Though this can be done, I am not advising you to do it. Do it at your own risk! the bitrate isn’t the greatest!) but just for using them as my ring tones.


After digging about in the file system I managed to find the location of the songs, luckily the songs aren’t using some stupid file extension (they use the mp3 format) but one thing about them is that the filename is hashed and probably salted too.

Just so you know, I am currently trying to figure out this salted hash (SHA-1, I believe) so that I can know what the song of each file is, as you can imagine if you have a lot of songs stored and you don’t have a relevant file name that it can be quite frustrating, if I can find out how the salting is done then I will update this post.

The way I accessed these files in the following location, wherever I put the $ on either side of a word means it’s a variable for the thing it’s called, in this case your spotify ID.

Songs location: /storage/emulated/0/Android/data/$SpotifyuserID$/LocalSync

Thankfully, Spotify’s data folder allows other apps to access it, but currently my phone is rooted and I am not sure of the architecture of Android enough to know if this is default so this may not work for you unless rooted but again I haven’t tried so cannot confirm, if someone can confirm whether or not you can access this folder on a non-rooted phone then that would be great. So far, I have worked out that the songs are hashed using SHA-1 but haven’t figured out what information they’re using for salting.

It turns out you cannot directly read or write to an apps folder from within another app (This is the case for Android 4.4+), in this case what is used for managing ring tones. (Again, if you’re rooted you might not have this issue, like myself) In this case you will need to copy the song from the apps directory to your home directory and use the song from there. I also found that even though the songs file names are hashed that the meta data has been left intact so from this you can find out the Artist, Song name, etc.. which will make finding your song far easier if you use a metadata viewer.


How to fix windows aero features when the Desktop Windows Manager (dwm.exe) crashes

Desktop Window Manager (DWM, previously Desktop Compositing Engine or DCE) is the window manager in Windows VistaWindows 7 and Windows 8 that enables the use of hardware acceleration to render thegraphical user interface of Windows.

t was originally created to enable portions of the new “Windows Aero” user experience, which allowed for effects such as transparency, 3D window switching and more. It is also included with Windows Server 2008, but requires the “Desktop Experience” feature and compatible graphics drivers to be installed.

Unfortunately, DWM isn’t very stable under machines which have an SLI configuration, this means it ends up crashing and so disables the Windows Aero features. Luckily, there is a simple to fix, we simply need to restart the service which handles these features.

Continue reading

Enabling Telnet on Windows 7

Telnet is very similar to SSH for Linux but is for Windows. It allows you to remotely execute commands to a computer on your network or over the internet. One of the use cases for telnet which I do is for remotely shutting down my computer or for trolling my sister when she is on my computer to think that anonymous are after her. By default telnet is not enabled or installed on a Windows 7 environment.

Continue reading

Locking down the WordPress administration control panel to specific IPs only

By utilizing a .htaccess file inside of the directory of wp-admin you can set control to deny all IP address to this folder and only allow your IP address.

To do this first cd to your wordpress directory and then cd to wp-admin like so…

cd /var/www/{wordpress directory}
cd wp-admin

Now create the .htaccess file.

nano .htaccess

Now adding the following lines of code:

AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName "WordPress Admin Access Control"
AuthType Basic
order deny,allow
deny from all
#whitelist address
allow from

With being your IP address, to add multiple IP addresses then add it to a new line with “allow from” followed by the IP address.

Creating a bootable USB drive with diskpart

This article will show you how to turn a USB drive into a bootable device using the MS-DOS utility tool, diskpart.

This is ideal if you don’t want to be carrying disks around with you, instead you can put just carry usb pendrives on your key chain instead.


Put the USB thumbdrive you wish to use into a computer and go to “My Computer”. Make note of the drive letter and its storage.

Run a elevated command prompt, this can be done by click on the start menu, typing in “cmd” and right-clicking and selecting “Run as Administrator”.

Now type in:

list disk
select disk ?
create partition primary
select partition 1
format fs=ntfs quick label="Bootable-USB-Drive"

With ? being the drive letter of the USB Drive.



Transferring windows files to the USB drive.

Now that you have a USB drive you can use, you will want to put Windows or a Linux Distribution on it. In this example, I will be showing how it’s done on Windows but the same can apply for creating a Linux distro bootable USB drive.

For this, you can simply copy the files over.

This can be done using the MS-DOS utility tool xcopy with the following command:

xcopy g:\Windows7\*.* e:\ /E /H /F

G:\Windows7 \ being the path and drive letter of where the files are located.

The two asterisks are means it will copy all the files with any file extension from the path G:\ and the E:\ being the location of where you want to copy the files, in this case it would be the USB drive, so whatever letter you have it assigned to.

The /E parameter means it will copy all directories and subdirectories, including empty ones.

The /H parameter means it will copy all hidden files.

The /F parameter means it will display the full source and destination file names while it is copying.

How to recover hard deleted emails from an outlook PST file

PST is the file format that is used to store MS Outlook data.

When you delete emails, contacts or some other items from Outlook, these emails are moved to “Deleted Items Folder” and this entire process called soft deletion.The soft deleted items of MS-Outlook can be completely recovered or restored by simply dragging or moving those emails from the “Deleted Items Folder” to desirable folder.

But, when an item is deleted using “Shift+Delete”, it does not go to the “Deleted Items Folder” and this functionality is known as “Hard Deletion” and the permanently lost data called hard deleted items of Outlook, so you would think this would be unrecoverable… well it is possible but not guaranteed that some of your hard deleted items can be restored.

This is done with the use of a Hex editor and Microsoft’s scanpst.exe which is used to repair a corrupt PST file.

Continue reading

Photos can reveal more than you think

Pretty much every digital camera or high-end smartphone stores EXIF data within each image it takes. This data can be useful for a number of reasons such as where a photo was took if geo-tagging is enabled, the exposure settings of your photo, the resolution of a photo, what your camera model is, the data the photo was taken and much, much more…

Continue reading

Was iCloud really ‘Hacked’?

So hundreds of revealing pictures of female celebrities were leaked last night, it was speculated that these were stolen from the celebrity’s iCloud accounts.

It also appears that these photos are authentic as a few of the victims have already admitted that the photos are legit, however some have denied this saying that they’re fake but they could be saying that as they are afraid of ruining their fame or are ashamed.

Continue reading