Posted: March 4th, 2012 | Author: xanda | Filed under: IT Related, My Self, Project | Tags: bahasa, checker, firefox, malaysia, melayu, mozilla, MyEja, spell, thunderbird | 1 Comment »
After 3-4 hours struggling to make it public so here we go.. MyEja, the Bahasa Malaysia dictionary for spell-checking in Firefox and Thunderbird
The open-source Firefox Add-on MyEja for spell-checking supports Firefox and Thunderbird platform-independently. It is based on the OpenOffice Extension “Kamus Bahasa Malaysia (Malay Dictionary)”. The contents of the dictionaries are untouched and is in original state in the initial release of MyEja . The latest versions of Firefox and Thunderbird are also supported. MyEja was founded by me and it is the second initiative project from Mozilla Malaysia Community.
Looking forward for the approval from Mozilla Add-on Team.. The add-on is accessible at https://addons.mozilla.org/en-US/firefox/addon/myeja/
Posted: March 2nd, 2012 | Author: xanda | Filed under: IT Related | Tags: crawler, google, nokogiri, ruby, scrubyt, web | No Comments »
I’ve talked about scRUBYt! once and I’ve been using it for years as my primary ‘Google crawler’ aka Google web-scraper. So it is not a surprise if I say.. It was part of MyLipas Defacement Crawler as well 😉
If you are using scRUBYt! as your Google web-scraper as well, I would suggest you to take a look at your script, since it might be broken by now. Its not only the gem itself, event the domain of their website, scrubyt.org, is now expired. (but yes the project is till in github). I’ve noticed that my crawler reported zero URL (scraped from Google) everyday and it made me to think of 2 possibilities; the strings return zero match, OR the scraper is broken. And guess what, my second thought was right.
Yes.. Its another day in lab looking back at the crawler/scraper code. Now I don’t really depend on scRUBYt anymore due to lack of support/maintenance and broken gem dependencies. So here come the Nokogiri. With the XPaths support I manage to get working crawler as for the replacement.. in just few minutes. But of course the code will be a bit longer but NVM.. It works like a charm! 😀
Posted: February 1st, 2012 | Author: xanda | Filed under: IT Related | Tags: GPGMail, lion, osx | 1 Comment »
I love to see the progress in GPGMail recently, especially after the release of Lion OSX. But usually it gonna take some time before come out with the installation package and publish it in their website (or upgradeable via Mail preferences)
So here is the way you can compile your own ‘nightly builds’ of GPGMail2 (tested on Lion OSX)
cd /tmp
git clone --recursive --depth 1 git://github.com/GPGTools/GPGMail.git -b lion
defaults write com.apple.mail EnableBundles -bool NO
cd GPGMail; make update install
defaults write com.apple.mail EnableBundles -bool YES
defaults write com.apple.mail BundleCompatibilityVersion 5
defaults write com.apple.mail BundleCompatibilityVersion 5.1
open /Applications/Mail.app |
cd /tmp
git clone --recursive --depth 1 git://github.com/GPGTools/GPGMail.git -b lion
defaults write com.apple.mail EnableBundles -bool NO
cd GPGMail; make update install
defaults write com.apple.mail EnableBundles -bool YES
defaults write com.apple.mail BundleCompatibilityVersion 5
defaults write com.apple.mail BundleCompatibilityVersion 5.1
open /Applications/Mail.app
Enjoy! 😀
Reference: https://github.com/GPGTools/GPGMail/wiki/Gpgmail-2
Posted: January 26th, 2012 | Author: xanda | Filed under: IT Related | Tags: libemu, python, shellcode | 2 Comments »
My small patch..

But NO its not finalize yet. Plus it haven’t been fully tested yet. Going to use Metasploit for the test tomorrow..
Posted: October 31st, 2011 | Author: xanda | Filed under: IT Related | No Comments »
Hi.. yeah as usually there will be a silent moment gap between posts.. 😛
Here is my short update..
I’ve recently presented at HITB Security Conference 2011 in Kuala Lumpur, Malaysia on Fun With JavaScript DeObfuscaton
It covers:
- Multiple basic obfuscations
- javascriptobfuscator.com obfuscation
- Edward Packer’s obfuscation
- JSidle obfuscation
- JSF*ck obfuscation
- jjencode obfuscation
It was done by having demo on each obfuscation explained. You can download my slides at http://conference.hitb.org/hitbsecconf2011kul/materials/ and if you have any questions/suggestions, we can have a private discussion at Skype / GTalk. Ping me in comment section or twitter and I’ll drop you my details.