I luvz hacking challenges sites - do you?

Size: px
Start display at page:

Download "I luvz hacking challenges sites - do you?"

Transcription

1 I luvz hacking challenges sites - do you? Yaniv Miron aka Lament HackFest 2014 CANADA

2 / About me Yaniv Miron aka Lament Security Researcher and Consultant Certified Locksmith & CISO Certified Found IBM, Oracle, Microsoft, Apache, Facebook (F-U for not giving me credit & bounty) and more.

3 Some of them are Stego, Logic and Reversing. / What s going on here? There are many CTF games and these hacking challenges are kind of online Capture The Flag. I would like to share my experience with demoing some examples of these online hacking challenges.

4 Hacking challenges sites? There are different sites that offer challenges, some of them actually grade and rank the users and some just let the users download challenges and try them offline.

5 HackThisSite.Org One of the largest sites in this area Different cool challenges in there

6 Other sites Many more

7 The Ranks Different levels gives different ranks

8 The Different Challenges

9 Because it s a small % out of the real challenges and you need to learn somehow. Why the h311 are you giving solutions? Unfortunately most of them are somewhere online. Unfortunately people just copy the solutions from others and paste the answer.

10 Solutions There are different ways to solve different tasks, it could be that there are easier ways than what I m showing here but this is the path that I took. I m trying to show how to think rather than just show the quick way to get a solution. Sometimes it makes the solution more complicated.

11 DEMO Time!

12 Stego5.bmp #1 Hack The Planet stego5.bmp

13 Stego5.bmp #2 First thing first, is it really a BMP file?

14 Looks like it: Stego5.bmp #3

15 Stego5.bmp #4 So what s next? I think I saw something similar in the past Maybe as a user avatar? Let s save it avatar.jpg

16 Stego5.bmp #5 We have a problem You can t really compare BMP (The original) and JPG (the Avatar) Or can we?

17 Stego5.bmp #6 Let s just turn the JPG to BMP

18 Stego5.bmp #7 Now let s try to compare them with some hex

19 Stego5.bmp #8

20 Stego5.bmp #9 LSB? It s widely used in Stego

21 Stego5.bmp #10 We will take the stego5.bmp hex, turn it into binary.

22 Stego5.bmp #11 Lets write a python script cuz we re kewl

23 Stego5.bmp #12 And back to ascii Looks interesting syn-ack-? maybe it s

24 Logic.Binary #1 Q1: Binary:

25 Logic.Binary #2 Binary are 1 s and 0 s isn t it? Clean the 2 s and the 3 s Binary:

26 Logic.Binary #3 Put it nicely Binary:

27 Logic.Binary #4 Binary -> ASCII Answer is: i win

28 Logic.Riddle #1 Q2: I call, but I never talk. I knock, but I never enter. I feel a bit insecure.

29 Logic.Riddle #2 Port scanner knocks but never enter, calling the ports but never talks with them. Insecure? A2: nmap

30 Logic.URL #1 Q3: Sometimes when you are coding a web based program you make a mistake with URL's. Correct this link. The link we get is: ks

31 Logic.URL #2 A3: It looks like a Google link, as this is the format Google is using. Let s change it to: cks

32 Logic.URL #3

33 Q4: Logic.Num #1

34 Logic.Num #2 1 of 2 = 12 1 of 1 and 1 of 2 = of 1 and 1 of 2 = of 3, 2 of 1 and 1 of 2 = of 1, 1 of 3, 1 of 2, 2 of 1 and 1 of 2 = of 1, 1 of 3, 1 of 1, 2 of 2, 2 of 1 and 1 of 2 = A4:

35 Reversing.app7 #1 We get a file called app7win.zip with 2 files inside: app7win.exe encrypted.enc Let s try to run it

36 Reversing.app7 #2 So it seems that we need to find a password here Let s try to remove the encrypted.enc file from the folder, maybe it will help:

37 Reversing.app7 #3 Let s see what s inside this encrypted.enc file Doesn t look promising (at least at the moment)

38 Reversing.app7 #4 Let s see it with OllyDbg

39 Reversing.app7 #5 jnz->jz? YEAH! We got junk

40 Reversing.app7 #6 Oh well It didn t worked Off we go to IDA Pro

41 Reversing.app7 #7 So we need to get 0DCAh

42 Reversing.app7 #8 Oh no it s not gonna be that easy dude

43 Reversing.app7 #9 This is the interesting part which handles our buffer and the.enc file

44 Reversing.app7 #10 The general thing that is happening in this block is that it runs 5 times and every time reads a character from the.enc file. The characters that were read (in hex) are "31,4D,39,35,33" or in ascii "1M953". This is not the password but it will help us get the password (this is the key from the.enc file)

45 Reversing.app7 #11

46 Reversing.app7 #12 Next, the app takes the user input + [ENTER=A] So if our input is A it will be 41+A=4B, if it s AA it will be A=8C Then place it in var_1c and xor it with each of the 5 chars.

47 Reversing.app7 #13

48 Reversing.app7 #14 Adds all of them and place the result in var_18 which needs to be cmp with "0DCAh" (3530). So 31xor8C+4Dxor8C+39xor8C+35xor8C+33 xor8c =3AB Is it true??? Nop

49 Reversing.app7 #15

50 Reversing.app7 #16 So to solve this problem we need to have: 31xorX+4DxorX+39xorX+35xorX+33xorX= 0DCA So what is X???

51 Reversing.app7 #17 To solve it we can just brute force it. So we will try first "A" as input, then "AA" then "AAA" until we will get the right result. At the end the result was that as long as our input equal 753 (2F1) it would solve the problem. Therefore it doesn't really matter what is the input as long as it's 753 together.

52 Reversing.app7 #18 I have used: ccccccc2 We need to remember that at the end of our input there is "enter" which is 10 so our total should be actually 743. c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ c(99)+ 2(50)+ENTER(10)=753. So: 31xor2F1+4Dxor2F1+39xor2F1+35xor2F1 +33xor2F1=0DCA

53 Reversing.app7 #19

54 Reversing.app7 #20 Game over!

55 Reversing.app13 #1 Let s run it

56 Reversing.app13 #2

57 Reversing.app13 #3 So let s skip IDA & Olly and check the hints

58 Reversing.app13 #4 We can monitor the time that takes the app to check every number that we enter Python script that gets and monitor how much time takes the app to check it Slowest number is the right one (?) Close even explorer.exe because it takes CPU power and could change our results

59 Reversing.app13 #5 So let s do a quick & dirty BF to this app

60 Reversing.app13 #6 And run it

61 Reversing.app13 #7

62 Reversing.app13 #8 Let s just to it 3 more times, every time adding the last value instead of the dummy one that we had

63 Reversing.app13 #9 Our monitoring worked!

64 Forensics.1 #1 We get this: And a file: image.tar.gz

65 Forensics.1 #2

66 Forensics.1 #3 So we need to find a password First thing first, extract the file. We get a dd file - image.dd Let s check what s in there real quick

67 Forensics.1 #4 Looks like we got an NTFS windows system

68 Forensics.1 #5

69 So it s mounted Forensics.1 #6

70 Forensics.1 #7 3 empty folders

71 Forensics.1 #8 Well it s a forensics challenge So probably we need to recover some deleted data. Let s try to see what kind of deleted files are there.

72 Forensics.1 #9

73 Forensics.1 #10 We ve got 17 files, different types.

74 Forensics.1 #11 Oh boy well let s check the other files We ve got a media file: Voic 1.wav When played we can hear the Tech Support guy telling stacy that the password is her phone number. And what is her phone number?

75 Forensics.1 #12 Let s dig some more, we can see that there is a file called Termination - Allen Smith.docx

76 Forensics.1 #13 Using the phone number we can extract the content of Your new password is.rar Inside there is a file called Your new password is.docx Inside we got our password

77 Forensics.1 #14 We ve saved the world again!

78 To Wrap It Up Hacking challenges sites are KEWL It helps you practice your skills & prepare for CTF games You have a community to support you while trying

79 # E [0] F # Q? the lounge now or) >> lament [AT] ilhack [DOT] org Join In god we trust, all others we monitor.

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired?

9 R1 Get another piece of paper. We re going to have fun keeping track of (inaudible). Um How much time do you have? Are you getting tired? Page: 1 of 14 1 R1 And this is tell me what this is? 2 Stephanie x times y plus x times y or hm? 3 R1 What are you thinking? 4 Stephanie I don t know. 5 R1 Tell me what you re thinking. 6 Stephanie Well.

More information

A practicalintroduction to embedded programming. Brian Plancher 10/17/2018

A practicalintroduction to embedded programming. Brian Plancher 10/17/2018 A practicalintroduction to embedded programming Brian Plancher Brian_Plancher@g.harvard.edu 10/17/2018 This week s task is simple: 1. Since the boards you made 2 weeks ago are perfect and are still in

More information

Intro. Scheme Basics. scm> 5 5. scm>

Intro. Scheme Basics. scm> 5 5. scm> Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if

More information

INSIDE THE ULTIMA ONLINE CLIENT - INSERTING A SLEEP

INSIDE THE ULTIMA ONLINE CLIENT - INSERTING A SLEEP INSIDE THE ULTIMA ONLINE CLIENT - INSERTING A SLEEP GOAL The Ultima Online client utilizes too much CPU power when it s not doing anything useful. For example, when we are at the logon screen or when we

More information

PSoC Academy: How to Create a PSoC BLE Android App Lesson 3: Configure the BLE Component 1

PSoC Academy: How to Create a PSoC BLE Android App Lesson 3: Configure the BLE Component 1 1 Welcome back. At this point we ve completely configured our schematic. The schematic will define all of the firmware that will run inside of our project. Remember there s two things going on. There will

More information

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only.

The purchaser of the ebook is licensed to copy ebook for use with immediate family members only. Copyright 2017 Leah Nieman www.leahnieman.com All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form by any means, electronic, mechanical,

More information

Xchange for Samsung MAC User Guide. Version 2.4

Xchange for Samsung MAC User Guide. Version 2.4 Xchange for Samsung MAC User Guide Version 2.4 Contents Welcome to Xchange for Samsung Mac Desktop Client... 32 How to Install Xchange... 3 Where is it?... 43 The Dock menu... 4 The menu bar... 4 Preview

More information

4Sight for Mac User Guide. Version 2.4

4Sight for Mac User Guide. Version 2.4 4Sight for Mac User Guide Version 2.4 Contents Welcome to 4Sight for Mac Desktop Client... 3 How to Install 4Sight... 3 Where is it?... 4 The Dock menu... 4 The menu bar... 4 Phone window... 5 Preview

More information

(Refer Slide Time 6:48)

(Refer Slide Time 6:48) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 8 Karnaugh Map Minimization using Maxterms We have been taking about

More information

How To Upload Your Newsletter

How To Upload Your Newsletter How To Upload Your Newsletter Using The WS_FTP Client Copyright 2005, DPW Enterprises All Rights Reserved Welcome, Hi, my name is Donna Warren. I m a certified Webmaster and have been teaching web design

More information

5 R1 The one green in the same place so either of these could be green.

5 R1 The one green in the same place so either of these could be green. Page: 1 of 20 1 R1 Now. Maybe what we should do is write out the cases that work. We wrote out one of them really very clearly here. [R1 takes out some papers.] Right? You did the one here um where you

More information

1.7 Limit of a Function

1.7 Limit of a Function 1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:

More information

Lab #2 Physics 91SI Spring 2013

Lab #2 Physics 91SI Spring 2013 Lab #2 Physics 91SI Spring 2013 Objective: Some more experience with advanced UNIX concepts, such as redirecting and piping. You will also explore the usefulness of Mercurial version control and how to

More information

CTF Workshop. Crim Synopsys, Inc. 1

CTF Workshop. Crim Synopsys, Inc. 1 CTF Workshop Crim2018 31.10.2018 2018 Synopsys, Inc. 1 CTF (Capture the Flag) Capture the Flag (CTF) is a computer security competition. CTF are usually designed test and teach computer security skills.

More information

Web Hosting. Important features to consider

Web Hosting. Important features to consider Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,

More information

Jacksonville Linux User Group Presenter: Travis Phillips Date: 02/20/2013

Jacksonville Linux User Group Presenter: Travis Phillips Date: 02/20/2013 Jacksonville Linux User Group Presenter: Travis Phillips Date: 02/20/2013 Welcome Back! A Quick Recap of the Last Presentation: Overview of web technologies. What it is. How it works. Why it s attractive

More information

No con Name Facebook CTF Quals 2013

No con Name Facebook CTF Quals 2013 No con Name Facebook CTF Quals 2013 Dragon Sector write-ups Team information Please use the following e mail address to contact our team's captain: gynvael@coldwind.pl If qualified, we will provide a list

More information

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead 1 Question #1: What is the benefit to spammers for using someone elses UA code and is there a way

More information

MITOCW watch?v=se4p7ivcune

MITOCW watch?v=se4p7ivcune MITOCW watch?v=se4p7ivcune The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

10 Online Tools. To Streamline Your Personal Trainer Marketing

10 Online Tools. To Streamline Your Personal Trainer Marketing With the busy lives we lead, personal trainers often ask how to make their lives easier and how to automate and streamline their marketing. I ve found a suite of core services that tick all the doing more

More information

Download Sat study guide answers

Download Sat study guide answers Sat study guide answers DownloadSat study guide answers. Free Pdf Download 2004-08-04 12 00 20480 c windows system32 wmpui. Many national chain stores have unlocked phones n their websites - even places

More information

Servers & Developers. Julian Nadeau Production Engineer

Servers & Developers. Julian Nadeau Production Engineer Servers & Developers Julian Nadeau Production Engineer Provisioning & Orchestration of Servers Setting a server up Packer - one server at a time Chef - all servers at once Containerization What are Containers?

More information

Reverse Engineering For The Not So Backward

Reverse Engineering For The Not So Backward Reverse Engineering For The Not So Backward It is a Friday night and I am sitting home hyped up on caffeine and resting from a long work week. I like to relax on Friday nights and get stuff done, such

More information

Practical Malware Analysis

Practical Malware Analysis Practical Malware Analysis Ch 4: A Crash Course in x86 Disassembly Revised 1-16-7 Basic Techniques Basic static analysis Looks at malware from the outside Basic dynamic analysis Only shows you how the

More information

Lecture 1: Overview

Lecture 1: Overview 15-150 Lecture 1: Overview Lecture by Stefan Muller May 21, 2018 Welcome to 15-150! Today s lecture was an overview that showed the highlights of everything you re learning this semester, which also meant

More information

Rev101. spritzers - CTF team. spritz.math.unipd.it/spritzers.html

Rev101. spritzers - CTF team. spritz.math.unipd.it/spritzers.html Rev101 spritzers - CTF team spritz.math.unipd.it/spritzers.html Disclaimer All information presented here has the only purpose of teaching how reverse engineering works. Use your mad skillz only in CTFs

More information

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change

Chapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004

More information

COMP : Practical 9 ActionScript: Text and Input

COMP : Practical 9 ActionScript: Text and Input COMP126-2006: Practical 9 ActionScript: Text and Input This practical exercise includes two separate parts. The first is about text ; looking at the different kinds of text field that Flash supports: static,

More information

6 Stephanie Well. It s six, because there s six towers.

6 Stephanie Well. It s six, because there s six towers. Page: 1 of 10 1 R1 So when we divided by two all this stuff this is the row we ended up with. 2 Stephanie Um hm. 3 R1 Isn t that right? We had a row of six. Alright. Now before doing it see if you can

More information

Civil Engineering Computation

Civil Engineering Computation Civil Engineering Computation First Steps in VBA Homework Evaluation 2 1 Homework Evaluation 3 Based on this rubric, you may resubmit Homework 1 and Homework 2 (along with today s homework) by next Monday

More information

Week - 01 Lecture - 04 Downloading and installing Python

Week - 01 Lecture - 04 Downloading and installing Python Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and

More information

Clickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1

Clickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1 Presents A case study by Devin Zander A look into how absolutely easy internet marketing is. Money Mindset Page 1 Hey guys! Quick into I m Devin Zander and today I ve got something everybody loves! Me

More information

Chapter 1. Getting Started

Chapter 1. Getting Started Chapter 1. Hey, Logy, whatcha doing? What s it look like I m doing. I m cleaning the windows so we can get started on our new adventure. Can t you leave the housekeeping until later. We ve got Logo work

More information

Win-Back Campaign- Re-Engagement Series

Win-Back Campaign- Re-Engagement Series Win-Back Campaign- Re-Engagement Series At this point the re-engagement campaign has ended, so if the prospect still hasn t responded it s time to turn up the heat. NOTE: In the emails below, everywhere

More information

ICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions:

ICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions: Recorded in October, 2009 [Music Intro] ICANN Start, Episode 1: Redirection and Wildcarding Welcome to ICANN Start. This is the show about one issue, five questions: What is it? Why does it matter? Who

More information

Lesson 9 Transcript: Backup and Recovery

Lesson 9 Transcript: Backup and Recovery Lesson 9 Transcript: Backup and Recovery Slide 1: Cover Welcome to lesson 9 of the DB2 on Campus Lecture Series. We are going to talk in this presentation about database logging and backup and recovery.

More information

Decisions, Decisions. Testing, testing C H A P T E R 7

Decisions, Decisions. Testing, testing C H A P T E R 7 C H A P T E R 7 In the first few chapters, we saw some of the basic building blocks of a program. We can now make a program with input, processing, and output. We can even make our input and output a little

More information

Oracle Cloud. Content and Experience Cloud ios Mobile Help E

Oracle Cloud. Content and Experience Cloud ios Mobile Help E Oracle Cloud Content and Experience Cloud ios Mobile Help E82090-01 February 2017 Oracle Cloud Content and Experience Cloud ios Mobile Help, E82090-01 Copyright 2017, 2017, Oracle and/or its affiliates.

More information

If Statements, For Loops, Functions

If Statements, For Loops, Functions Fundamentals of Programming If Statements, For Loops, Functions Table of Contents Hello World Types of Variables Integers and Floats String Boolean Relational Operators Lists Conditionals If and Else Statements

More information

Hey there, I m (name) and today I m gonna talk to you about rate of change and slope.

Hey there, I m (name) and today I m gonna talk to you about rate of change and slope. Rate and Change of Slope A1711 Activity Introduction Hey there, I m (name) and today I m gonna talk to you about rate of change and slope. Slope is the steepness of a line and is represented by the letter

More information

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet. Mr G s Java Jive #2: Yo! Our First Program With this handout you ll write your first program, which we ll call Yo. Programs, Classes, and Objects, Oh My! People regularly refer to Java as a language that

More information

Transcriber(s): Aboelnaga, Eman Verifier(s): Yedman, Madeline Date Transcribed: Fall 2010 Page: 1 of 9

Transcriber(s): Aboelnaga, Eman Verifier(s): Yedman, Madeline Date Transcribed: Fall 2010 Page: 1 of 9 Page: 1 of 9 0:00 1 R1 The color s not going to show a little bit, but okay. Okay. So, um, a plus b quantity cubed, you said, means Stephanie a plus b times a plus b times a plus b /R1 3 R1 Okay, so you

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 04 Tutorial 1, Part 1 Ubuntu Hi everyone, welcome to the first

More information

BEGINNER PHP Table of Contents

BEGINNER PHP Table of Contents Table of Contents 4 5 6 7 8 9 0 Introduction Getting Setup Your first PHP webpage Working with text Talking to the user Comparison & If statements If & Else Cleaning up the game Remembering values Finishing

More information

MITOCW watch?v=0jljzrnhwoi

MITOCW watch?v=0jljzrnhwoi MITOCW watch?v=0jljzrnhwoi The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resources for free. To

More information

Chapter 1. Data types. Data types. In this chapter you will: learn about data types. learn about tuples, lists and dictionaries

Chapter 1. Data types. Data types. In this chapter you will: learn about data types. learn about tuples, lists and dictionaries Chapter 1 Data types In this chapter you will: learn about data types learn about tuples, lists and dictionaries make a magic card trick app. Data types In Python Basics you were introduced to strings

More information

Starting Boolean Algebra

Starting Boolean Algebra Boolean Algebra March 2, 27 Diagram for FunChip2 Here is a picture of FunChip2 that we created more or less randomly in class on /25 (used in various Activities): Starting Boolean Algebra Boolean algebra

More information

Computer Science 324 Computer Architecture Mount Holyoke College Fall Topic Notes: Bits and Bytes and Numbers

Computer Science 324 Computer Architecture Mount Holyoke College Fall Topic Notes: Bits and Bytes and Numbers Computer Science 324 Computer Architecture Mount Holyoke College Fall 2007 Topic Notes: Bits and Bytes and Numbers Number Systems Much of this is review, given the 221 prerequisite Question: how high can

More information

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins

Monitoring Tool Made to Measure for SharePoint Admins. By Stacy Simpkins Monitoring Tool Made to Measure for SharePoint Admins By Stacy Simpkins Contents About the Author... 3 Introduction... 4 Who s it for and what all can it do?... 4 SysKit Insights Features... 6 Drillable

More information

IMPORTANT WORDS AND WHAT THEY MEAN

IMPORTANT WORDS AND WHAT THEY MEAN MOBILE PHONES WHAT IS DATA Data is Internet. It can let you do lots of different things on your phone or tablet. You can send or receive texts, emails or photos, listen to music, watch TV shows, movies

More information

How To Set User Account Password In Windows 7 From Guest

How To Set User Account Password In Windows 7 From Guest How To Set User Account Password In Windows 7 From Guest To change the password of a specific user in windows 7 or 8.1, without knowing How to change or set Windows 7 default font settings to bold, italic?

More information

Mr G s Java Jive. #11: Formatting Numbers

Mr G s Java Jive. #11: Formatting Numbers Mr G s Java Jive #11: Formatting Numbers Now that we ve started using double values, we re bound to run into the question of just how many decimal places we want to show. This where we get to deal with

More information

(Refer Slide Time 3:31)

(Refer Slide Time 3:31) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions

More information

Digital Workflow 10 Tech Rules to Guide You

Digital Workflow 10 Tech Rules to Guide You Last updated: 10/11/10 Digital Workflow 10 Tech Rules to Guide You Introduction Whether your goal is to become paperless, or just to get more out of the technology you use, you need to (1) find the easy

More information

SPRITES Moving Two At the Same Using Game State

SPRITES Moving Two At the Same Using Game State If you recall our collision detection lesson, you ll likely remember that you couldn t move both sprites at the same time unless you hit a movement key for each at exactly the same time. Why was that?

More information

Having problems accessing the Closed Public Beta? This F.A.Q will guide you and answer the most frequently encountered problems.

Having problems accessing the Closed Public Beta? This F.A.Q will guide you and answer the most frequently encountered problems. Having problems accessing the Closed Public Beta? This F.A.Q will guide you and answer the most frequently encountered problems. I. Where can I retrieve my M&M Heroes 6 Beta Key 2. I didn t receive my

More information

CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability

CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability CIO 24/7 Podcast: Tapping into Accenture s rich content with a new search capability Featuring Accenture managing directors

More information

MITOCW watch?v=w_-sx4vr53m

MITOCW watch?v=w_-sx4vr53m MITOCW watch?v=w_-sx4vr53m The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resources for free. To

More information

Intro to x86 Binaries. From ASM to exploit

Intro to x86 Binaries. From ASM to exploit Intro to x86 Binaries From ASM to exploit Intro to x86 Binaries I lied lets do a quick ctf team thing Organization Ideas? Do we need to a real structure right now? Mailing list is OTW How do we get more

More information

Memory Addressing, Binary, and Hexadecimal Review

Memory Addressing, Binary, and Hexadecimal Review C++ By A EXAMPLE Memory Addressing, Binary, and Hexadecimal Review You do not have to understand the concepts in this appendix to become well-versed in C++. You can master C++, however, only if you spend

More information

Lesson 13 Transcript: User-Defined Functions

Lesson 13 Transcript: User-Defined Functions Lesson 13 Transcript: User-Defined Functions Slide 1: Cover Welcome to Lesson 13 of DB2 ON CAMPUS LECTURE SERIES. Today, we are going to talk about User-defined Functions. My name is Raul Chong, and I'm

More information

Subversion was not there a minute ago. Then I went through a couple of menus and eventually it showed up. Why is it there sometimes and sometimes not?

Subversion was not there a minute ago. Then I went through a couple of menus and eventually it showed up. Why is it there sometimes and sometimes not? Subversion was not there a minute ago. Then I went through a couple of menus and eventually it showed up. Why is it there sometimes and sometimes not? Trying to commit a first file. There is nothing on

More information

Detailed instructions for adding (or changing) your Avatar (profile picture next to your

Detailed instructions for adding (or changing) your Avatar (profile picture next to your Detailed instructions for adding (or changing) your Avatar (profile picture next to your name) on Ustream (disclaimer this is how it works for me using Internet Explorer it may look slightly different

More information

Basic Reliable Transport Protocols

Basic Reliable Transport Protocols Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they

More information

Integrating Spatial Data with the rest of your E&P Data

Integrating Spatial Data with the rest of your E&P Data Integrating Spatial Data with the rest of your E&P Data ESRI PUG Houston 11-March-2003 Ian Batty PPDM Association 1 PPDM Association Public Petroleum Data Model Association The PPDM Association is a non-profit

More information

Oracle Cloud. Content and Experience Cloud Android Mobile Help E

Oracle Cloud. Content and Experience Cloud Android Mobile Help E Oracle Cloud Content and Experience Cloud Android Mobile Help E82091-01 Februrary 2017 Oracle Cloud Content and Experience Cloud Android Mobile Help, E82091-01 Copyright 2017, Oracle and/or its affiliates.

More information

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,

More information

How To Create Backlinks

How To Create Backlinks How To Create Backlinks 1 Page Contents Who Is This Book For?... 3 A Trip In The Way-Back Machine... 4 A Little Refresher... 4 How To Build Backlinks... 6 Build Backlinks With Guest Posts... 7 Build Backlinks

More information

What did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation

What did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation Week 12 - Friday What did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation Here is some code that sorts an array in ascending order

More information

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 07 Tutorial 2 Part 1 Facebook API Hi everyone, welcome to the

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)

More information

Mobile Computing Professor Pushpedra Singh Indraprasth Institute of Information Technology Delhi Andriod Development Lecture 09

Mobile Computing Professor Pushpedra Singh Indraprasth Institute of Information Technology Delhi Andriod Development Lecture 09 Mobile Computing Professor Pushpedra Singh Indraprasth Institute of Information Technology Delhi Andriod Development Lecture 09 Hello, today we will create another application called a math quiz. This

More information

Locate it inside of your Class/DreamWeaver folders and open it up.

Locate it inside of your Class/DreamWeaver folders and open it up. Simple Rollovers A simple rollover graphic is one that changes somehow when the mouse rolls over it. The language used to write rollovers is JavaScript. Luckily for us, when we use DreamWeaver we don t

More information

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below.

The first thing we ll need is some numbers. I m going to use the set of times and drug concentration levels in a patient s bloodstream given below. Graphing in Excel featuring Excel 2007 1 A spreadsheet can be a powerful tool for analyzing and graphing data, but it works completely differently from the graphing calculator that you re used to. If you

More information

IT 280 Study Guide Winter Don Colton Brigham Young University Hawai i

IT 280 Study Guide Winter Don Colton Brigham Young University Hawai i IT 280 Study Guide Winter 2013 Don Colton Brigham Young University Hawai i March 27, 2013 1 This is the Official IT 280 Study Guide for the IT 280 Computer Networking class taught by Don Colton, Winter

More information

PHP & MySQL For Dummies, 4th Edition PDF

PHP & MySQL For Dummies, 4th Edition PDF PHP & MySQL For Dummies, 4th Edition PDF Here's what Web designers need to know to create dynamic, database-driven Web sites To be on the cutting edge, Web sites need to serve up HTML, CSS, and products

More information

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Relations Let s talk about relations! Grade 6 Math Circles November 6 & 7 2018 Relations, Functions, and

More information

Multiple Variable Drag and Drop Demonstration (v1) Steve Gannon, Principal Consultant GanTek Multimedia

Multiple Variable Drag and Drop Demonstration (v1) Steve Gannon, Principal Consultant GanTek Multimedia Multiple Variable Drag and Drop Demonstration (v1) Steve Gannon, Principal Consultant GanTek Multimedia steve@gantekmultimedia.com Back Story An associate of mine, Marc Lee (a Flash coder and fellow Articulate

More information

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017 ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 Combinational Logic Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke) Last

More information

Programming Project #6: Password File Cracker

Programming Project #6: Password File Cracker CSE231 Spring 2017 Programming Project #6: Password File Cracker (Edits: changed itertools permutations to product either works for these passwords, but product is the correct one. Removed lists and tuples

More information

CSCI 1100L: Topics in Computing Lab Lab 11: Programming with Scratch

CSCI 1100L: Topics in Computing Lab Lab 11: Programming with Scratch CSCI 1100L: Topics in Computing Lab Lab 11: Programming with Scratch Purpose: We will take a look at programming this week using a language called Scratch. Scratch is a programming language that was developed

More information

LeakDAS Version 4 The Complete Guide

LeakDAS Version 4 The Complete Guide LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...

More information

Text Input and Conditionals

Text Input and Conditionals Text Input and Conditionals Text Input Many programs allow the user to enter information, like a username and password. Python makes taking input from the user seamless with a single line of code: input()

More information

Image Credit: Photo by Lukas from Pexels

Image Credit: Photo by Lukas from Pexels Are you underestimating the importance of Keywords Research In SEO? If yes, then really you are making huge mistakes and missing valuable search engine traffic. Today s SEO world talks about unique content

More information

Blitz! (Outlook 2011 for Mac)

Blitz! (Outlook 2011 for Mac) Email Blitz! (Outlook 2011 for Mac) Finding your inbox unmanageable? Follow the tips in this document to take back control. Tips for having a thorough clear out The techniques here can be used when spring

More information

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018

Personal Internet Security Basics. Dan Ficker Twin Cities DrupalCamp 2018 Personal Internet Security Basics Dan Ficker Twin Cities DrupalCamp 2018 Overview Security is an aspiration, not a state. Encryption is your friend. Passwords are very important. Make a back-up plan. About

More information

marketing versus marketing automation What s the difference and why should B2B marketers care?

marketing versus marketing automation What s the difference and why should B2B marketers care? email marketing versus marketing automation What s the difference and why should B2B marketers care? who is this white paper for? You re a B2B marketer in a company that s been using email marketing for

More information

WHAT IS GOOGLE+ AND WHY SHOULD I USE IT?

WHAT IS GOOGLE+ AND WHY SHOULD I USE IT? CHAPTER ONE WHAT IS GOOGLE+ AND WHY SHOULD I USE IT? In this chapter: + Discovering Why Google+ Is So Great + What Is the Difference between Google+ and Other Social Networks? + Does It Cost Money to Use

More information

Meet our Example Buyer Persona Adele Revella, CEO

Meet our Example Buyer Persona Adele Revella, CEO Meet our Example Buyer Persona Adele Revella, CEO 685 SPRING STREET, NO. 200 FRIDAY HARBOR, WA 98250 W WW.BUYERPERSONA.COM You need to hear your buyer s story Take me back to the day when you first started

More information

Penguin/Panda SEO Interview with Eric Lanchares

Penguin/Panda SEO Interview with Eric Lanchares Penguin/Panda SEO Interview with Eric Lanchares Ezra: Hey, everyone. Ezra Firestone here. I m with my good buddy, Eric Lanchares, the SEO Doctor. I don t think they saw your wave. He s on a bouncy ball

More information

Getting Started. Excerpted from Hello World! Computer Programming for Kids and Other Beginners

Getting Started. Excerpted from Hello World! Computer Programming for Kids and Other Beginners Getting Started Excerpted from Hello World! Computer Programming for Kids and Other Beginners EARLY ACCESS EDITION Warren D. Sande and Carter Sande MEAP Release: May 2008 Softbound print: November 2008

More information

SIMPLE PROGRAMMING. The 10 Minute Guide to Bitwise Operators

SIMPLE PROGRAMMING. The 10 Minute Guide to Bitwise Operators Simple Programming SIMPLE PROGRAMMING The 10 Minute Guide to Bitwise Operators (Cause you've got 10 minutes until your interview starts and you know you should probably know this, right?) Twitter: Web:

More information

Backend IV: Authentication, Authorization and Sanitization. Tuesday, January 13, 15

Backend IV: Authentication, Authorization and Sanitization. Tuesday, January 13, 15 6.148 Backend IV: Authentication, Authorization and Sanitization The Internet is a scary place Security is a big deal! TODAY What is security? How will we try to break your site? Authentication,

More information

In today s video I'm going show you how you can set up your own online business using marketing and affiliate marketing.

In today s video I'm going show you how you can set up your own online business using  marketing and affiliate marketing. Hey guys, Diggy here with a summary of part two of the four part free video series. If you haven't watched the first video yet, please do so (https://sixfigureinc.com/intro), before continuing with this

More information

Part 6b: The effect of scale on raster calculations mean local relief and slope

Part 6b: The effect of scale on raster calculations mean local relief and slope Part 6b: The effect of scale on raster calculations mean local relief and slope Due: Be done with this section by class on Monday 10 Oct. Tasks: Calculate slope for three rasters and produce a decent looking

More information

StoryStylus Scripting Help

StoryStylus Scripting Help StoryStylus Scripting Help Version 0.9.6 Monday, June 29, 2015 One More Story Games, Inc. 2015 Contents Versions... 3 Scripting User Interface... 4 Script Triggers... 5 If-Then Scripting Language... 6

More information

Close Your File Template

Close Your File Template In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of

More information

Upload Your Site. & Update. How to

Upload Your Site. & Update. How to 15 From the book, The Non-Designer s Web Book, How to Upload Your Site by Robin Williams and john Tollett On the shelves in late September 1997 Robin Williams and John Tollett & Update Your web site is

More information

Web Server Setup Guide

Web Server Setup Guide SelfTaughtCoders.com Web Server Setup Guide How to set up your own computer for web development. Setting Up Your Computer for Web Development Our web server software As we discussed, our web app is comprised

More information

OpenCTF 2015 write-ups [vulscryptos]

OpenCTF 2015 write-ups [vulscryptos] OpenCTF 2015 write-ups [vulscryptos] vulscryptos scored 1910 pts, ranked 4th. So close! It was great fun. Many thanks to the organizers! 37. Sanity Check (trivia 10) Hack the Planet! 7. Runic Power (binary,

More information