I hereby claim:
- I am ceres-c on github.
- I am ceresc (https://keybase.io/ceresc) on keybase.
- I have a public key ASD8_o1ADB4ACh4_E3D0vNOwVzk-yAetJPR7mnJBXyNyPwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#include <stdio.h> | |
#include <stdlib.h> | |
#define NUMROW 40 | |
#define NUMCOL 40 | |
void drawCircle (char *canvas, int r, int xCenter, int yCenter); | |
void drawEllipse (char *canvas, int width, int height, int xCenter, int yCenter); | |
void drawRhombus (char *canvas, int a, int b, int xCenter, int yCenter); | |
void fillEmpty (char *canvas, int nRow, int nCol); |
#!/bin/bash | |
# set wpa_supplicant debug level to 1, disable timestamps, disable show_keys | |
[ "$UID" == 0 ] || { echo "Only root can run this"; exit 0;} | |
LOG="/var/log/wpa_supplicant.log" | |
echo "Stopping NetworkManager" | |
systemctl stop NetworkManager |
2018-07-11 - Big Mac [2€] | |
2018-07-12 - Confezione patatine grandi [1€] | |
2018-07-13 - McFlurry [1,50€] | |
2018-07-14 - 9 McNuggets [1,50€] | |
2018-07-15 - Tasty Basket [7€] | |
2018-07-16 - McWrap Caesar Cheese [3€] | |
2018-07-17 - Bibita media + Borsa Coca Cola [2€] | |
2018-07-18 - Le Ricche [1€] | |
2018-07-19 - McFlurry [1,50€] | |
2018-07-20 - McMenu Classic Double Cheeseburger/Double Cheeseburger BBQ [4€] |
#!/usr/bin/python3 | |
# Author: ceres-c 2019-01-06 | |
# Updates recursively cue files to reflect track's title present in flac files. | |
import os | |
from mutagen.flac import FLAC | |
def cueupdater (path, cuefile): | |
title = None |
FROM base/devel:latest | |
MAINTAINER federico@ceres-c.it | |
# update system | |
RUN \ | |
pacman -Syyu --noconfirm | |
# install basic dependencies | |
RUN \ |
//------------------------------------------------ | |
//--- 010 Editor v8.0 Binary Template | |
// | |
// File: MifareUltralight.bt | |
// Authors: ceres-c | |
// Version: 1.0 | |
// Purpose: Mifare Ultralight structure parsing. | |
// Commonly used in tickets. | |
// Category: Electronics | |
// File Mask: |
#! /bin/python3 | |
import os | |
from urllib.parse import unquote | |
import httpx | |
import lxml.html | |
unit_id = 100009140 # Numeric unit id, can be found in URL as "id" parameter | |
cookies = {'ASP.NET_SessionId': ''} # Alphanumeric cookie |
The X230 I use for playing with Coreboot has a Intel Corporation 82579LM ethernet card with WoL support. Problem is, when the laptop is woken up via a WoL packet, the e1000e driver in linux is not able to bring up the network card correctly.
As highlighted on this Arch forums post, the problem can be solved resetting the PCI device before the driver is loaded. This mkinitcpio hook does exactly that if you add reset-e1000e
as the first hook in your HOOKS
list. Don't forget to rebuild your initrd.
WPAD is the Windows Proxy Auto Discovery service, used since Windows 95, IIRC, to automatically discover network configurations. Since Windows 10 Microsoft decided for some reason that users shall NOT be allowed to disable this (mostly) useless and problematic service.
Problem is: on my laptop this feature used up to 20% of the CPU while doing nothing at all due to some bug I don't want to dig into. The best part is that it often triggered after disconnection from a wireless network. Discovering proxies makes lot of sense once you are NOT connected to any network, huh? Also, there were multiple vulnerabilities related to this service and cute tools such as Responder leverage on it.
The service can still be disabled writing in the registry, but it will be randomly re-enabled by windows after upda