Monday, December 27, 2021

How to Disable Category Listing in Wordpress Using .htaccess

Here's how to disable category listing in WordPress using .htaccess. 

Place this at the top before # BEGIN WordPress and # BEGIN iThemes Security and other security plugins.

 
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^category/(.*) https://yoursite.com/your/new/url [R=301,L]
#each category
RewriteRule ^country/(.*) https://yoursite.com/your/new/url [R=301,L]
RewriteRule ^state/(.*) https://yoursite.com/your/new/url [R=301,L]
RewriteRule ^language/(.*) https://yoursite.com/your/new/url [R=301,L]
</IfModule>

Thursday, December 23, 2021

Prevent category browsing in Wordpress

How to prevent list of categories and values using .htaccess. Place this at the top before # BEGIN WordPress and # BEGIN iThemes Security and other security plugins.

 
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^category/(.*) https://yoursite.com/your/new/url [R=301,L]
#each category
RewriteRule ^country/(.*) https://yoursite.com/your/new/url [R=301,L]
RewriteRule ^state/(.*) https://yoursite.com/your/new/url [R=301,L]
RewriteRule ^language/(.*) https://yoursite.com/your/new/url [R=301,L]
</IfModule>

Saturday, December 4, 2021

Copy and paste multiple formats in Edge, beat them to the punch, on-the-fly metadata extraction

Microsoft wants to improve copy and paste in Edge and Chrome for Windows 11. This recycled idea particular useful for Office product suite. One need to cut and paste Excel spread sheets and images into Word documents and vice-versa without loosing fidelity of the original object being copied. But there are some major security concerns, that would have to be addressed. Because some object formats can carry viruses. 

You can beat Microsoft to the punch by getting the only Clipboard PlainText Powertool that can extract the metadata from Office documents on-the-fly. 

 Preview of metadata info put on clipboard for a .DOCX and .MP3 file when copying or moving using Clipboard Powertool.

Copied/Moved 
DOCX "Standard Release Form.docx"  2pgs 42.6KB Title:"Microsoft Word - Standard Release Form.doc" Author:"aaggarwa" Company:"John Wiley and Sons, Inc." Mon 04-Jan-21  11:30AM "H:\Downloads2021\Standard Release Form.docx"
MP3 "01 Genesis.mp3"  5,512KB 44kHz 00:03:55 Title:"Genesis" Album:"Justice" Artist:"Justice" Year:2007 Sat 08-Mar-14  9:43PM "C:\Users\Markus\Music\iTunes\iTunes Media\Music\Justice\Justice\01 Genesis.mp3" - 

Get Clipboard Plaintext Powertool here.






Wednesday, November 24, 2021

Efficient removal of Unicode hidden characters that backdoors your Javascript code

From the great post The Invisible JavaScript Backdoor – Certitude Blog and Invisible characters could be hiding backdoors in your JavaScript code  - bleepingcomputer.com invisible characters one could also introduce backdoors using Unicode characters that look very similar “Invisible Character Attacks” and “Homoglyph Attacks“. This technique has been around awhile using the have Unicode bidirectional mechanism (Bidi). As the article states, that messing with Unicode to hide vulnerable or malicious code is not a new idea (also using invisible characters) and Unicode inherently opens up additional possibilities to obfuscate code. We believe that these tricks are quite neat though, which is why we wanted to share them. In our experience non-ASCII characters are pretty rare in code. It might therefore be a good idea to disallow any non-ASCII characters. As article states, we mostly see non-ASCII characters being substituted with normalized ASCII characters (e.g. ä → ae, ß → ss) or removal them completely. But how ? 

Some self promotion, some hard times my friends.

My Clipboard PlainText Powertool provides easy text transformations for these substitutions for code de-obfuscation for Javascript (or any languages) to reveal  “Invisible Character Attacks” and “Homoglyph Attacks“. 

Here some transformations you can perform in 1-click; 

  1. Paste ANSI text (ISO-8859-1, Western languages), moins les caractères de contrôle && non imprimable
  2. Paste Unicode universal text (all languages), replacing all non-printable characters with ♦
  3. Paste Unicode universal text (all languages), striping all non-printable characters (most general)
  4. Paste plain ASCII text with normalized substitutions. eg. Æ ⇒ AE, ß⇒ss, è⇒e
  5. Paste plain ASCII text, striping bad control characters && formatting (most restrictive)
  6. Paste plain text ASCII,  extended range (Latin-1 Supplement) translated. eg. Ã⇒A(tilde)


❖ Get  Clipboard PlainText Powertool  comes with 200+ clip transformations and 20 individual PowerTools features Notepad2 (everything you wanted in Notepad).

Tuesday, October 26, 2021

2021 Pro Tip : Convert OneDrive Share Link to Download Link

Here's how to convert OneDrive Share Link to a instant download link. This follows from my original post in 2014 when I first discovered this trick.


  1. Click on desired file and click Share (at Top) to reveal Copy link button. Click. 



  2. This will reveal Microsoft shortened URL to the file. Copy.



  3. Goto https://unshorten.me/ or similar service and paste link e.g.
    https://1drv.ms/u/s!AsRPggdGwZFcjWhqmIY9K_tzLnQI?e=1o1vOQ
    to get expanded URL.




  4. Copy destination URL and change /redir? to /download?

    For example, 

    https://onedrive.live.com/redir?resid=5C91C14607824FC4!1768&authkey=!AGqYhj0r-3MudAg&e=1o1vOQ

    to 

    https://onedrive.live.com/download?resid=5C91C14607824FC4!1768&authkey=!AGqYhj0r-3MudAg&e=1o1vOQ


  5. Use this link for an instant direct download of the shared file. This buy passes the preview pane in OneDrive.com. Done.




Tuesday, September 14, 2021

Phishing UPS email with subject "DO NOT REPLY | from UPS® Canada | Review your automatic delivery"

For the record, this is UPS phishing email attempt that is recently going around, with subject "DO NOT REPLY | from UPS® Canada | Review your automatic delivery"

What to do?  Report them, goto bottom of page. 


From : from UPS® Canada <alex_diva_03@hotmail.com>
Subject : DO NOT REPLY | from UPS® Canada | Review your automatic delivery | ...










PHISHING LINKs;

Hover over button
1. http://trilotus.co.za/mass/Subhost.aspx.html - South Africa

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, August 30, 2021

Phishing Amazon email with subject "Re: [Ama͏z͏o͏n͏ Information Update]"

For the record, this is Amazon phishing email attempt that is recently going around, with subject "Re: [Ama͏z͏o͏n͏ Information Update] [Login Notification ALERTS]: An error occurred in your account, please re-verify your information correctly"

What to do?  Report them, goto bottom of page. 


From : A͟m͟a͟z͟o͟n͟ ͟P͟r͟i͟m͟e͟ Service <xxxx@xxxx.onmicrosoft.com>
Subject : 
Re: [Ama͏z͏o͏n͏ Information Update] [Login Notification ALERTS]: An error occurred in your account, please re-verify your information correctly








PHISHING LINKs;

Hover over button
1. https://u#####.ct.sendgrid.net/ls/click?upn=xxxxxxxxxxxxxxxxxxx

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Saturday, August 21, 2021

Latest Windows Sysinternals August 18, 2021 release is loosing Windows 7 support

 It's a sad fact, Windows 7 is 10 years old but is still widely being used (mainly because of the rash that is Windows 10) . As a software developer I have to support Win7 still. So it sad, that the latest Windows Sysinternals August 18, 2021 release is now regrettably loosing Windows 7 support. These tools are invaluable for sys admins, and I really wish they would open source them. 

In particular Autoruns v14 does not work on Windows 7. 








Can we have a https://live.win7.sysinternals.com/ ? 

Thursday, July 29, 2021

Phishing Netflix email with subject "Your Netflix payment was rejected"

For the record, this is Netflix phishing email attempt that is recently going around, with subject "Your Netflix payment was rejected"

What to do?  Report them, goto bottom of page. 


From : payment <xxxxxxx@hotmail.it>
Subject : 
Your Netflix payment was rejected





PHISHING LINKs;

Click image by mistake
1. https://la09tv.fr/.7v43x1/?p={youremailaddress}

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, July 12, 2021

Phishing Shaw (cable company) email with subject "Your Shaw bill is ready"

For the record, this is Shaw phishing email attempt that is recently going around, with subject "Your Shaw bill is ready"

What to do?  Report them, goto bottom of page. 


From : My Shaw) <xxxxxxx@hotmail.it>
Subject : 
Your Shaw bill is ready







PHISHING LINKs;

Click image by mistake
1. http://gsenter.in/ba/xxxxxxxxxxxx

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, June 28, 2021

CRA Phishing Email with subject INTERAC e-Transfer: You received $458.00 (CAD) from CRA

For the record, this is CRA phishing email attempt that is recently going around, with subject " INTERAC e-Transfer: You received $458.00 (CAD) from CRA"

What to do?  Report them, goto bottom of page. 


From : Canada Revenue Agency <xxxxxxx@hotmail.it>
Subject : 
INTERAC e-Transfer: You received $458.00 (CAD) from CRA








PHISHING LINKs;

Click image by mistake
1. http://getcutpriceoffers.com/sa/LsrklbY

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Thursday, June 17, 2021

Kijiji Phishing Email with subject Confirm Ownership

For the record, this is Kijiji phishing email attempt that is recently going around, with subject "Confirm Ownership xxxxx | {today's date}"

What to do?  Report them, goto bottom of page. 


From : Kijiji.ca<daniloverni@hotmail.it>
Subject : 
Confirm ownership xxxxxxxxxx | {today's date}






PHISHING LINKs;

Click image by mistake
1. http://www.kkog.io/be/xZ9AhV6DvA51w

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Monday, May 31, 2021

UPS Phishing Email with subject RESCHEDULE PROCESS: Please schedule a new delivery

For the record, this is UPS phishing email attempt that is recently going around, with subject "Please note: UPS 2021 | Schedule Confirmation Process | Item no.xxxxxxx"

What to do?  Report them, goto bottom of page. 


From : UPS-Canada® Parcel Delivery<bastosnellson@hotmail.com>
Subject : 
RESCHEDULE PROCESS: Please schedule a new delivery.; - PARCEL/ONLINE-GATEWAY-Number: xxxxx Our reference number: xxx ups.com order ...








PHISHING LINKs;

Click image by mistake
1. https://annekoenig-bestellung.com/annekoenig-bestellung.com/class-wp-sitemaps-info.php

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Saturday, May 29, 2021

Microsoft Edge version 91 blocks/broke downloads from CodeProject









Latest version of Microsoft Edge version 91 breaks downloading from Codeproject. 

I tried downloading source code to this project C# does Shell, Part 2 - CodeProject to no avail. 

Microsoft Edge

Version 91.0.864.37 (Official build) (64-bit)

You know it really frustrating when you upgrade only discover the upgrade breaks things. Really Microsoft get you act together. 


Wednesday, May 26, 2021

Add a Russian keyboard and get less ransomware

Many ransomware strains emanating from Russia, will not install or infect systems in Russia. So how do they does malware sniff the country and language? 

Countless malware strains will check for the presence of Soviet eastern block languages on the system, and if they’re detected the malware will exit and fail to install.




So below is a simple program that tricks Windows into thinking that Russian language keyboard is 
installed on your system. Download and right-click to add to registry. 

Hack the hackers code; BUT DO NOT USE THIS. I used this and could not login. 

Russian/GoRussian.reg at main · Unit221B/Russian (github.com)

Add the extra keyboard manually using CONTROL PANEL!

Here's a list of hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS) — former Soviet satellites countries. 



Source : 
Try This One Weird Trick Russian Hackers Hate – Krebs on Security




Thursday, May 13, 2021

Coinbase Phishing Email with subject Re: [e-Newsletter] Automatic Message : We've sent Statement Appointment Information Updates - New Notifications

For the record, this is Coinbase phishing email attempt that is recently going around, with subject "We've sent Statement Appointment Information Updates - New Notifications - {Today Date}  nº:xxxxxxx"

What to do?  Report them, goto bottom of page. 


From : Coinbase Confirm®<mailprimay.excelentnotificationxxxx@odadingoleh.com>
Subject : Re: [e-Newsletter] Automatic Message : We've sent Statement Appointment Information Updates - New Notifications - {Today Date}  nº:xxxxxxx



                 

PHISHING LINKs;

Click image by mistake
1. http://fish.boy.jp/cgi/fish/rank.cgi?mode=link&id=xxxx&url=https://kumahastran.com/xxxxxxxx

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Friday, April 30, 2021

The quest to beautify broken and/or incomplete SQL

If you like me readability of code is extremely important regardless of what language it is in. I was try to find a way to beautify SQL, but ran into a problem. If the SQL is broken, impartial or has incorrect syntax it won't beautify.  The very popular, free and open source  MySQL Workbench is an example. Many online sites fail to produce the correct result as well. Doing a quick Google search, i took the 1st result and got Instant SQL Formatter (dpriver.com) which does not work. Many site are not language aware and format poorly, such as https://www.freeformatter.com/sql-formatter.html, number 2 on results page.

Therefore I built my own tool, called Plain SQL Formatter.  

Below SQL has missing SELECT and misspell  FROM statement

1
schemas.name AS SchemaName, tables.name AS TableName, columns.name AS ColumnName, types.name AS DataTypeName, columns.max_length, columns.precision, columns.scale, columns.is_nullable FRO M sys.tables INNER JOIN sys.columns ON tables.object_id = columns.object_id INNER JOIN sys.types ON types.user_type_id = columns.user_type_id INNER JOIN sys.schemas ON schemas.schema_id = tables.schema_id WHERE tables.is_ms_shipped = 0;

In MySQL Workbench, you cannot beautify because the SQL has errors.
To beautify choose Edit->Format->Beautify Query












SSMS works but is 635Mb, and does it install local sql server as well? 

Or Plain SQL Formatter, is only 10Mb, and works with any SQL. 












You can get Plain SQL Formatter is not built-into myClipboard PlainText PowerTool, and there are 20+ such PowerTools. It's a boon to the developer, you be blown away at the list of 120 plus functions.

Top 7 Functions for Programmer

  1. Remove comments from 50 languages. The most popular in last 10 yrs.
  2. Convert words into double quoted or single quoted array "" array
  3. Pre/post smart append entered text, preserves spacing when adding 
  4. //Mon 11-Jan-21 9:25pm  MetadataConsulting.ca <- a timestamp custom comment signature
  5. Split & Join lines, on enter delimiter ■   (square represents entering input)
  6. Flip terms 'if (a!=b)'->'if (b!=a)' !!! 
  7. Pick a range [-3,5-7,9-] of lines ■ (square represents entering input)

Top 5 Functions for Information Worker

  1. Excelerator a program that check's excel formulas for formula and syntactical mistakes!!!
  2. Escape characters for Excel Formula!
  3. Dedup lines - remove all duplicate lines 
  4. NEW - Diff lines - get different between lines, using last 2 clips
  5. Thousands place format add and remove ie 1000000.00 to 1,000,000.00.00





Wednesday, April 28, 2021

StackOverflow monitors copying and pasting for 2 weeks stats released

 


Stack Overflow released there April Fools joke on the world, by monitoring cut and pastes from there site. This brings copy and paste coding to whole new level for coders. Here's some fun facts.


  • One out of every four users who visits a Stack Overflow question copies something within five minutes of hitting the page. 
  • That adds up to 40,623,987 copies across 7,305,042 posts and comments between March 26th and April 9th. 
  • People copy from answers about 10 * as often as they do from questions.
  • People copy 35 * as often as they do from comments. 
  • People copy from code blocks more than 10 * as often as they do from the surrounding text, and surprisingly, we see more copies being made on questions without accepted answers than we do on questions which are accepted. 




Copy and paste like a master get Clipboard PlainText PowerTool with 120+ functions (many for developers) and 20+ PowerTools. 

Top 6 Functions for Programmer
  • Flip terms 'if (a!=b)'->'if (b!=a)' !!! 
  • Pre/post smart append entered text, preserves spacing when adding 
  • //Mon 11-Jan-21 9:25pm  MetadataConsulting.ca - timestamp comment, customizable
  • Split & Join lines, on enter delimiter ■   (square represents entering input)
  • Remove comments from any language (50 of most popular languages in past 10yrs)
  • Convert words into JSON array {" ":" "}
  • Pick a range [-3,5-7,9-] of lines ■
    This can mimic UNIX tail and head commands, but is even more expressive because repeats are allowed. So you can have [1,1,1,1,1,2-5,10+] which repeats line 1, 5 times!

Tuesday, April 27, 2021

Researcher gets banned for stress testing Linux supply chain by easily adding backdoors to Linux kernel


I guess, even in the intelligent coding/open source community, whistle blowers are not revered but are cast outs. Linux open source team decided to ban University of Minnesota outright for research how easy it is to introduce a Linux kernel backdoor vulnerability into the delivery supply chain. Opps, to close to comfort. Really a sophomoric/moronic response. 


However you feel about what these researchers did (Chris Gaun, for example, argued, "A researcher showed how vulnerabilities can EASILY make it through [the] approval process"), this isn't really about Linux, or open source, security. It's always been the case that it's possible to get bad code into good open source projects. Open source software isn't inherently secure. Rather, it's the open source process that is secure, and while that process kicks in during development, it's arguably most potent after vulnerabilities are discovered.

Source : Greg Kroah-Hartman bans University of Minnesota from Linux development for deliberately buggy patches | ZDNet

Research Paper : qiushiwu.github.io/OpenSourceInsecurity.pdf at main · QiushiWu/qiushiwu.github.io


Tuesday, April 20, 2021

UPS Phishing Email with subject Please note: UPS 2021 | Schedule Confirmation Process | Item no.xxxxxxx

For the record, this is UPS phishing email attempt that is recently going around, with subject "Please note: UPS 2021 | Schedule Confirmation Process | Item no.xxxxxxx"

What to do?  Report them, goto bottom of page. 


From : UPS-Canada Schedule Confirm®<atiliofranzoni@hotmail.com>
Subject : 
Please note: UPS-{country} 2021 | Schedule Confirmation Process | Item no.xxxxxxx {date}



                 If you mistakenly click any link, it brings you to a very convincing fake page.







PHISHING LINKs;

Click image by mistake
1. https://difpt.org/.activate/serverxxxxxxUPS.html

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Sunday, April 11, 2021

Amazon Phishing Email with subject Re: Amazon has a surprise for you

For the record, this is Amazon phishing email attempt that is recently going around, with subject "Re: Amazon has a surprise for you"

What to do?  Report them, goto bottom of page. 


From : Welcome <contact@smartlinkshare.com>
Subject : 
Re: Re: A.m.a.z.o.n has a surprise for you











PHISHING LINKs;

Click image by mistake
1. http://masterymail.com/xxxxx.shtml?xxxxxxxxxxxxxxx

How to tell this is a Phishing email ?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the  company's website then forget it.
  3. The best way is to 

How to examine Email Message Source ?

Now lets look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take further 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Wednesday, April 7, 2021

How to check if your info is part of the Facebook 500M+ data leak April 2021














In the biggest April Fools joke, Facebook hackers re-released the personal information for 500M+ Facebook users on a hacking forum, including mobile numbers, name, gender, location, relationship status, occupation, date of birth, and email addresses.

This data was originally sold in private sales after being collected in 2019 using a bug in the 'Add Friend' feature on Facebook. Facebook had closed this vulnerability soon after it was discovered, but threat actors continued to circulate the data until it was finally released practically for free ($2.19) yesterday.

You can check you account with Have I Been Pwned: Check if your email has been compromised in a data breach (https://haveibeenpwned.com/) service which has been updated this hacked info.




Monday, March 29, 2021

PHP Backdoors - the official PHP Git repository suffers software supply chain attack


















From PHP's Git server hacked to add backdoors to PHP source code (bleepingcomputer.com)

In the latest software supply chain attack, the official PHP Git repository was hacked and the code base tampered with.

Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server.

The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf  and Nikita Popov.

Open source is has serious trust issues.


Friday, March 26, 2021

C# .NET - How to get the proper length of a Unicode string

That's Italian for ruler 

Here's how to get the proper length of a Unicode string, which is not the same a standard string length. 

A couple of ways are shown.



Source Code
using System;
using System.Globalization;
using System.Diagnostics;
                    
public class Program
{
    public static void Main()
    {
        // 140字以下かどうかのチェックを行い超えている場合はconfigに従って動作する
        //🎶🔥é- is standard length of 6, but there are ONLY 4 characters! Why not len=4?
        //🎶🔥 are double byte UNICODE characters (> \u10000) of width or len 2 each 
        //🎶🔥é- below will replace space after lasting character '-' (position 4) with a sub using most common techniques seen online
        
        string s = "𠇰😈🎶🔥é-"; 
		string s2 = "𠇰😈🎶🔥é-"; 
        Stopwatch sw = new Stopwatch();
        
        sw.Start();
        int typicalen = s.Length;
        sw.Stop();
        Console.WriteLine("Normal String {0} len = {1} in {2} ticks.",s, typicalen, sw.ElapsedTicks.ToString("N0"));
        
        StringInfo stringInfoThrowAway = new StringInfo("Preload this function"); //Results vary if you move this before or after below implementations
        
        sw.Reset();
        sw.Start();
        StringInfo stringInfo = new StringInfo(s2);
        int stringInfoLength = stringInfo.LengthInTextElements;
        sw.Stop();
        Console.WriteLine("new StringInfo {0} len = {1} in {2} ticks.",s,stringInfoLength, sw.ElapsedTicks.ToString("N0"));
        
        
        sw.Reset();
        sw.Start();
        int[] textElemIndex = StringInfo.ParseCombiningCharacters(s);
        int tEILength = textElemIndex.Length; 
        sw.Stop();
        Console.WriteLine("ParseCombiningCharacters String {0} len = {1} in {2} ticks.",s,tEILength, sw.ElapsedTicks.ToString("N0"));
        
        sw.Reset();
        sw.Start();
        // Use the enumerator returned from GetTextElementEnumerator 
        // method to examine each real character.
        TextElementEnumerator charEnum = StringInfo.GetTextElementEnumerator(s);
        int i = 0;
        while (charEnum.MoveNext())
            {
                i++;   
            }
        sw.Stop();
		
		Console.WriteLine("GetTextElementEnumerator String {0} len = {1} in {2} ticks.",s,i, sw.ElapsedTicks.ToString("N0"));
		
		sw.Reset();
        sw.Start();
        char[] charsInString = s.ToCharArray();
        int charLength = s.Length; 
        sw.Stop();
		
        Console.WriteLine("ToCharArray {0} len = {1} in {2} ticks.",s,charLength, sw.ElapsedTicks.ToString("N0"));
        
    }
}