Archive for the ‘Geek’ Category

This Is The Re-Mux

April 3, 2008 Comments off

Thanks to a Twitter post from Sarah Lane I got hipped to a site called MuxTape, where you can upload your MP3’s and make a “mix tape” to share with your friends over the internets. It’s kind of like You Tube but for music, and it lets you create a play list so that you can set the song order.

I gotta tell you that I’m lovin the concept, being a DJ I have come across plenty of songs that I’ve wanted to share with others. Unfortunately other than having them buy the CD solely on my recommendation or illegally download the song (something that I would never endorse) I haven’t really found a good way do this… until now!

So I’ve taken the liberty of uploading a couple of songs that I’ve remixed or extended for play in the club. Most of them stem from the original being just way too damn short to get away with playing or from the “No Rap Rule” we have. So keep in mind that these songs were intended to be played in a strip club and have hot stripper chicks dancing to them while they play… hehehe

Admittedly I’m no professional when it comes to remixing a song, but I’m kinda proud of what I’ve been able to do so far, and inevitably whenever I play one in the club someone always asks about it. Always makes me feel good when something I did just to satisfy the curiosity of rather I could do it or not gets me a little praise from total strangers. I’m generally a shy person, but when you get me in the DJ booth I love to show off, and in a gentleman’s club if you can get the customers to shift their attention from the ½ naked woman on the stage to the 300 lbs Mexican guy in the DJ booth… you’ve gotta be doing something!

Anyway, without further a due… here’s my MuxTape and the play list:

AFI – Prelude 12/21
Digital Underground – April Showers
Kid Rock & Metallica – American Bad Ass (Sad But True)
I.C.P. – Fire Rain

And as long as I’m giving out “Twitter Plugs” don’t forget to check out my tweets @


How To Hack Facebook In less than 1 Minute

March 30, 2008 Comments off

Umm… yea… the title says it all, non-harmfull but it still screams hours of fun… enjoy 🙂

Categories: Geek, tech Tags: , , , , , , , , ,

So Long & Farewell

March 26, 2008 Comments off

3GP your days are numbered! You’ve been a great little proggy for a long time, but unfortunately I’ve strayed and tasted the fruit of another. Don’t’ get me wrong, I plan on keeping you around for a little while and stringing you a long, just in case things don’t work out as well as I hope with this new video converter, but to be honest I think we‘ve simply grown apart… and we both know it.

It’s not you, it’s me… oh who am I kidding? It’s you that I have a problem with. I’m tired of you constantly letting the audio and video fall out of sync with each other; I know it’s not on a consistent basis, but enough is enough. We’ve been together for a long time, since the first week or so after the Sony PSP came out, and I’ve kept you around long after I made my move to the iPod, but I think it’s time that we went out separate ways.

I’ve kept you around for a long time and been loyal when it came to video conversion, but I have to tell you… this new proggy, Jodix, is just more dependable than you. Although I’ve enjoyed your ease of use, simply being “easy” is not a good reason to keep someone around. So it is with great sadness that I remove you from my hard drive.

A Little g33k Fun

January 30, 2008 1 comment

I can’t help but find the humor in this:

The other day I had to rest my router back to the original factory setting. I was having trouble getting my laptop to connect after messing around with the port forwarding option, and figured it would be easier to start over than try and figure out what I had messed up. Simple enough right? But what fallowed has filled me with amusement for the past few weeks, and gives me a chuckle every time I think about it.

Normally when I make changes on my router I’ll use my PC, but for whatever reason I used my laptop this time… no biggie. Almost immediately after resetting my router my laptop detected a wireless network named “linksys”, witch is the default name for my router. So without thought, I logged in using the default password “admin”, and just out of curiosity I decided to look at the log to see if anyone else had connected to my network. To my surprise, I found four other people who had connected to it.

So rather than kick them off I decided to have a little fun with them. I immediately changed the access password, changed my network name from the default “linksys” to “FBI Mobile 934”, and sat back to have a little chuckle to myself as I pictured all the police and highway patrol officers who live in my neighborhood befuddled as they started to wonder why there was a mobile FBI unit within wireless range of their houses. LOL!

Not to mention the building down the road, full of collage students who must have surly started to panic as they noticed that they were illegally downloading music on an FBI server… good times! I left it that way for a while, and went on about my business.

Anyways, after the amusement wore off, I decided to go in and actually set my router up; turn off the SSID and turn the encryption on. For those of you that don’t know, when you do this, your laptop will immediately disconnect, and reconnect to your network using the new settings. The only problem was that when my laptop reconnected, it connected to “linksys” again, I quickly looked at my available wireless networks and seen that the one I had just set up was still in there, but the signal strength wasn’t what it should have been… I hadn’t just set up my router; I had inadvertently changed all of the settings on one of my neighbors’ routers. LMAO!

I could have been the nice guy, went back in and changed all of the settings back to “default“, but… well… that didn’t happen.

After thinking about it for a while, the building full of collage students was the most likely owner of this router; given how many computers were connected to it, and they were probably the only ones in the neighborhood in need of a large unsecured wireless network anyway; one person paying the bill or all of them chipping in for one connection while the whole building mooches off of it. So again I just sat back and laughed my ass off as I thought about this entire building full of collage students unable to connect to the internet and not know why. My head quickly filled with the image of everybody in the building clambering to get a hold of that one motherfucker who owned the router, bitching because they can’t get connected, and him not knowing how to fix it, because he wasn’t even smart enough to change the password from the factory default.

Did I feel bad? For a second, then I thought about how I almost got into a fight with some of them at the beginning of the year, because they tried to steel my daughter’s bike off of my front porch… so “fuck em”, fuck them and their term papers… bitches.

The Dark Arts

December 12, 2007 Comments off

It’s no secret that since I’ve gotten access to the internet I’ve used that “wealth of knowledge” at my fingertips to learn how to do some rather insidious things. From hacking pay-per-copy Xerox machines for free copies, accessing the menus of Coke and Pepsi vending machines to change the prices to anything I want them to be (up to and including free), to accessing your home phone system to make calls without your knowledge, and even the secret phone number to the #########‘# ### ###### #### #######. I should add that I’ve never called it or been tempted to because I don’t need a black SUV showing up at my house with several “Men In Black” in it wanting to question me as to where and how I got it. But here’s a hint: if you dial the number, no matter what area code you use, it rings to the same phone, the same person will answer, and shortly there after a few gentlemen in black suits with tiny earpieces in their left ears will show up at your door and start asking “A LOT” of questions. The existence of this number has been somewhat of an “internet urban legend“, but believe me it‘s real. So if you’ve got a lot of spare time on your hands and no fear of being whisked off to some secret “black ops sight” for questioning, then have fun and go at it. I hear waterboarding can be fun.

I’ve never used anything I’ve learned for my own personal gain, it’s always been more of a challenge to know something just for the sake of knowing it, besides karma’s a bitch! But here lately, I’ve been talking to Tony and Joe about a new project to work on, and it’s kind of rekindled that fire to learn more about the “Dark Arts”. I’ve been carrying around a copy of “Hack-god” Kevin Mitnick’s The Art of Deception, I’ve read this book many times before, and it never ceases to amaze me how easy it is to get information… any information.

The Art of Deception is a book about Social Engineering: the practice of hacking the person, not the computer to get the information you want. In it Kevin shares “hypothetical” stories about how he and others may have been able to get sensitive information about people and companies. I should add that social engineers don’t refer to this book as “The Social Engineer’s Bible” for nothing, it’s written under the pretext of educating people on how to protect themselves from being “hacked”, but it’s impossible to explain how to protect weaknesses without explaining what they are and how to exploit them first.

Excerpt from Kevin Mitnick‘s The Art of Deception:

Mary H’s Phone Call

Date/Time: Monday, November 23, 7:49 AM
Place: Mauersby & Storch Accounting, New York

To most people, accounting work is number crunching and bean counting, generally viewed as being about as enjoyable as having a root canal. Fortunately, not everyone sees the work that way. Mary Harris, for example, found her work as a senior accountant absorbing, part of the reason she was one of the most dedicated accounting employees at her firm.

On this particular Monday, Mary arrived early to get a head start on what she expected to be a long day, and was surprised to find her phone ringing. She picked it up and gave her name.

“Hi, this is Peter Sheppard, I’m with Arbuckle Support, the company that does tech support for your firm. We logged a couple of complaints over the weekend from people having problems with the computers there. I thought I could troubleshoot before everybody comes into work this morning. Are you having any problems with your computer or connecting to the network?”

She told him she didn’t know yet. She turned her computer on and while it was booting, he explained what he wanted to do.

“I’d like to run a couple of tests with you,” he said. “I’m able to see on my screen the keystrokes you type, and I want to make sure they’re going across the network correctly. So every time you type a stroke, I want you to tell me what it is, and I’ll see if the same letter or number is appearing here. Okay?”

With nightmare visions of her computer not working and a frustrating day of not being able t get any work done, she was more than happy to have this man help her. After a few moments, she told him, “I have the login screen, and I’m going to type in my ID. I’m typing it now– M… A… R… Y…D.”

“Great so far,” he said. “I’m seeing that here. Now, go ahead and type your password but don’t tell me what it is. You should never tell anybody your password, not even tech support. I’ll just see asterisks here–your password is protected so I can’t see it.” None of this was true, but it made sense to Mary. And then he said, “Let me know once your computer has started up.”

When she said it was running, he had her open two of her applications, and she reported that they launched “just fine.”

Mary was relieved to see that everything seemed to be working normally. Peter said, “I’m glad I could make sure you’ll be able to use your computer okay. And listen,” he went on, “we just installed an update that allows people to change their passwords. Would you be willing to take a couple of minutes with me so I can see if we got it working right?

She was grateful for the help he had given her and readily agreed. Peter talked her through the steps of launching the application that allows a user to change passwords, a standard element of Windows 2000 operating system. “Go ahead and enter your password,” he told her. “But remember not to say it out loud.”

When she had done that, Peter said, “Just for this quick test, when it asks for your new password, enter ‘test123’. Then type it again in the Verification box, and click Enter.”

He walked her through the process of disconnecting from the server. He had her wait a couple of minutes, then connect again, this time trying log on with her new password. It worked like a charm, Peter seemed very pleased, and talked her through changing back to her original password or choosing a new one–once more cautioning her about not saying the password out loud.

“Well, Mary,” Peter told her. “We didn’t find any trouble, and that’s great. Listen, if any problems do come up, just call us over here at Arbuckle. I’m usually on special projects but anybody here who answers can help you.” She thanked him and they said good-bye.

Simple as that, SYSTEM COMPROMISED! Did you see what happened?… neither did she. I’m gonna leave you hanging and see if any of you can spot exactly what happened, and I’ll update this post in about a week or so with the answer… MWHAHAhaha..ha..h..a…

Pimp My Optimus

December 10, 2007 Comments off

A friend pointed me to this the other day, I’m not big fan of G4 and what they’ve done to TechTV, but as a “Transformers Geek” I had to share it.

“I AM the goddamn truck!” – LMAO