Posts

Most Recent Post

Reviving an old computer

You got an old computer to revive ?
Use the following steps to get the maximum from it:


Hardware Cleaning (dust) Open the computer cover and use a vacuum cleaner, leaf blower or just blow hard with your own mouth all over the internals to make sure that as much dust gets off the computer (suggesting doing this procedure outside)


Fans oiling After all dust is gone, it is time to oil the fans, get your favorite oiling spray (wd40 is my suggestion) and oil the joints of the fans you will find in the computer.

Make several spins of the fans while the oil is trickling into them to make sure they get oiled right.

[If after starting the computer and letting it run for several hours it seems there is a fan that doesn't start - replace it]


Formatting & Installing windows (Optional) If you get to the conclusion that you want to format this computer (make sure you have a windows license handy), then the following steps will be unneeded.

In this case, I suggest using a partitioning tool t…

Setting Up the Perfect fMan for my Needs

fMan is the best file manager out there.

But as one of its best features is minimalism, some configurations are in order to make it more suitable to my needs.

So lets begin tweaking fMan to be the best file manager for my needs.

Install fMan
Install Search FunctionalityCtrl+Shift+P will bring up the command palette, "install a plugin"Install plugin: Search Now you can search for any specific file from inside fMan by clicking CTRL+f7 (or command palette and search for "search").

Install Preview FunctionalityInstall plugin: Preview (This enables previewing any file using f3)For the preview to work, you need to install a 3rd party previewer, so install QuickLookNow click on any file with the f3 keyWhen asked for a preview utility, point it to: %localappdata%\Programs\QuickLook\QuickLook.exe Enjoy this quick and amazing preview functionality (better than any other around), you can preview ANY file, be it a compressed file, exe, text or an image!

Global HotKey to start f…

Essential Apps Every Windows User Should have in his Arsenal

As a general thumb of rule, I suggest installing the minimal number of applications on your windows system, if you are not sure you need it just don't install it.

The logic behind my above rule of thumb is that the more applications you have the more your windows system becomes/might become unstable and the more your registry becomes cluttered etc, windows has a very generous set of tools by default, so you might need to add just a minimal set of your own tools if that.

That being said, a good application can save you a lot of time and work, so those which are needed I encourage you to install, thus I am writing this blog post to introduce you to my minimal set of tools which make my life so much easier.

Each one of the tools I will write about deserves its own post comparing it to the competition, but this post will only focus on a list (with some descriptions) of the tools.

Must Have As a file manager I suggest using fman, that is only if you work strongly on files all over your…

Profiling Java @ 2019

A good profiler can really help you in your work while coding Java (I assume while coding any coding language but I am referring to Java here)

It can find memory leaks (Which object and how many of it takes the most of your limited memory?), CPU bottlenecks and other surprising data like the time consumed by each network call / DB query etc.

Thus it is not so surprising to find many different java profilers around.

I will try to map here the Java profiling tools lying around
My short list of requirements will include the following:
Profiler Requirements
Constantly updated profiler (how a profiler built to profile Java6 will behave with Java11?)Clear GUI - As I will want to dive into the profiling data - it will be much simpler using UIFree (With a big advantage to the open sourced ones)(Optional) Remote profiling
List of Profilers Dead Profilers (At least 5 years without an update)JIP - Java Interactive Profiler - Last update 2010Profiler4J - Last Update 2006Patty - Last Update 2006JVM…

File managers at 2018-2019

What is a file manager ? A file manager is an application which manages files mainly by doing simple file functionality like copy/move/delete/rename etc.

The functionality of a file manager can broaden to many other file-related aspects like a graphic tree of your local hard drive, comparison of directories, edit/view of files, pack/unpack and many more functions.

The main look of a file manager will be a two-pane frame in which you can see two different directories at a glance, while performing functions related to the right pane, left pane or both (like copying a file from the left pane to the right).

There are many modern file managers (a lot of file managers exist today) most have the basic functionality I mentioned earlier, and each one has its own flavor, adding functionality by using a plugin system or having the special functionality at the core level of the file manager.


Why people used them in the past ? In the past (I am talking about the DOS era 1980-1997), a file manager…

MITM Attack or How to get Access to Your Neighbour's Gmail

I will try to explain the two main methods of getting the victim's access to sites he visits (even those protected by HTTPS).

The methods I will talk about are based on MITM (Man in the middle) attack.
Both methods require you to connect to the victim's wifi beforehand (prerequisite).

1. Listen to all traffic from the devices on your network to the router.
2. Cheat the router and the victim to pass all of their traffic through you (as a proxy, thus gaining access to all traffic).

Listen The first method (listening mode) is more non-detectable as you don't actually disturb the victim or the router, you just listen to the packets of traffic as they go through the air.
This method can be done using two main modes:
I. Promiscuous mode - Which is a mode you can use even on windows OS, and can be enabled on many network devices.
This mode is not recommended ever using as it has lots of limitations, the most prominent one is that it can listen to traffic only on non-encrypted netw…

MITM Attack Using Windows at 2018

A year ago I wrote about my first stab at MITM attacks.

In this post I want to focus on MITM attacks using windows only tools.

What is MITM Attack? A Man In The Middle attack is an attack where the attacker is connected to the same network as the victim while positioning himself between the victim and the router thus makes himself a sort of a proxy while grabbing all of the network packets on the fly with the possibility of dumping them or even altering them.
So instead of:
Victim -> Router

It is altered to:
Victim -> Attacker -> Router

How does the MITM work ? Without delving deeply to technicalities, the attacker will need three main tools:
A. Spoofing tool - this one will make the attacker spoof the network to make the victim believe the attacker is the router thus sending all of its packets to the attacker instead of to the router, then the attacker will forward those packets to the router.

B. Dumping tool - A tool to capture all of those packets going through the attacker.