Final Clock Post

I’ve finally moved to Colorado, and I had to leave the big clock behind, and luckily I had finished it: I finilized the code, installed the clock in my church, and programmed it for there needs. The code is stored here if someone want to see it. If you want to check it out run: git clone https://github.com/solarkennedy/clock.git I have a little more technical info on my wiki, but it basically goes like this:

Read Full Post…

Toorcamp: Day 2

After this second day of talks and no missle silo, there was this strange influx of women as the sunset approached. Turns out they were not for the camp, they were for the band: They thought it was cool I guess. Somehow the owner of the silo booked these two events to have them intersect. Why else would 3 bands play in the middle of nowhere? Afterwards there was free beer, and let me tell you, geeks can party hardy all night long:

Read Full Post…

ToorCamp: Day 1

When I first arrived at toor camp, I was issued a Hardhat and a kit of electronics to construct my own badge: [](/uploads/DCAM0007-toorcamp.jpg) What a cool start! Combined with the already cool scenery: Only one problem: no silo access. We’ll see if that changes for day two…

Read Full Post…

Decrypting an eBook to make it Searchable

So I spent $22 on an ebook for school. It has this crappy DRM that only lets me view the pdf on one computer using only “Adobe Digital Editions”. If that wasn’t so bad, only a small subset of the text is OCR’d, so most of it isn’t even searchable! Now I’m pissed, but wait, what do you say? These files are just RSA encrypted, and I have the key?

Read Full Post…

My Wireless Cracking Tool

I’ve become a semi-expert on wireless networking and their security features.. and how to get around them. Before I continue I want to emphasize: The act of cracking encryption is not illegal just like picking a lock is not illegal. It is the unauthorized access of that network which is illegal, just like breaking and entering is illegal. So. To sum it up, there are two types of encryption. There is the weak kind (wep) and the strong kind (wpa).

Read Full Post…

Discrete Wavelets Final Project - Decaptcha,

This semester I took a class on Discrete Wavelets. It was awesome. The coolest part was our group final project. My group had the best topic by far: Decoding a Captcha! (Click on any of the following images to view them full size) We’ve all seen Captchas before. They are used on websites to make sure that the person on the website is a real human, not a computer program. Why do we want to break them?

Read Full Post…

Verizon FiOS Wireless Key Calculator!

More Update: There are new AP’s that don’t conform to this pattern. If the calculator doesn’t work on yours, maybe it is like these non-conforming-wep keys Update: A cool cool guy named Dylan Taylor wrote a java implementation of this script: http://www.fwc.dylanmtaylor.com/ if you need an offline version Update: I wrote a bash implementation to make it easy to script, and for offline usage In my previous post I showed a correlation between the WEP key of a Verizon FiOS install and the MAC address of the access point.

Read Full Post…

My Desktop

Posting a screenshot of your desktop is the cool thing for geeks to do apparently. It’s Ubuntu 8.10, no big surprise there. I’m using the “Dusk” theme with the proposed background for the next Ubuntu. I really like it.

Read Full Post…