Loading

Zawgyi ဖြန့္ကို Unicode 5.1 အေနနွင့္ ျမင္ခ်င္လွပါတယ္ ဆိုသူမ်ားအတြက္ ၅ စကဿကန့္ Guide :P

Myanmar3, Padauk, Parabaik, စေသာဖြန့္မ်ားကို ဥပမာ FontForge ျဖင့္ဖြင့္ပါ။


ျပီးလ်ွင္ ေဇာ္ဂ်ီသို့ေျပာင္းပါ။


ျပီးလ်ွင္ ေဆ့ဖ္လုပ္ပါ။


ျပီးပါျပီး။ ေဟာသလို Confirm လုပ္နိုင္ပါတယ္။
ယူနီကုတ္ ၅.၁ဟုတ္မဟုတ္ ေသခ်ာေအာင္ Myanmar NLP ဆိုတာေတာင္ ပါေသး။


ဟားဟားဟားဟား

#Memo - Firefox 3.5.1 may release this weekend or on Monday

Firefox 3.5.1 may release this weekend or on Monday with critical javascript JIT buffer overflow code execution exploits fix

Everything Converted to Unicode 5.1

Everything Converted to Unicode 5.1 including Old Posts and Old Comments also.

# I did Export and Import All Posts.
# In case If my posts flood your RSS reader, please kindly use "read all" function.

Soe Min

Blog Template Converted to Unicode 5.1 and Myanmar3 Font Embedded

Blog Template Converted to Unicode 5.1 and Myanmar3 Font Embedded

ဘာျဖစ္လို့ ေျပာင္းသလဲ ဆိုရင္ ေျပာင္းခ်င္လို့ေျပာင္းပါတယ္။ အပ်င္းေျပေပါ့။
အခ်ိန္မေရြး အျခားတစ္ခုကို ထပ္ေျပာင္းရင္လဲ ေျပာင္းမွာပါ။ :-)

ေလာေလာဆယ္ေတာ့ Template ပဲေျပာင္းထားပါတယ္။ က်န္တာေတြ ေတာ့ ေျဖးေျဖးေပါ့ :D

အဓိက ေခါင္းစဉ္နဲ့ လက္သံုးစကားပဲ အေရးျကီးတာ။ :P

Cheers,

#Memo - Mecab - Japanese Part-Of-Speech and Morphological Analyzer

#Memo - Mecab - Japanese Part-Of-Speech and Morphological Analyzer

http://mecab.sourceforge.net

# I really like to write one for Myanmar too. Still needs some knowledges.

# I like this song - Koda Kumi - TABOO

http://www.youtube.com/watch?v=9xVgZ-ACHo8

#Memo - ls

make ls.bat in windows folder

dir %1 %2 %3 %4 %5 %6 %7 %8 %9

then i can use ls on windows too :P

Getting Direct Download Link from MediaFire

- normal mediafire links are
http://www.mediafire.com/download.php?xxxxxxxxxxx
or
http://www.mediafire.com/?xxxxxxxxxxx

- in the page content, there is a javascript function calling, cu
cu('xxxxxxxxxxx','yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy','zzzzz')

- xxxxxx, and yyyyy.... is important key to retrive direct link

- set dummy cookie in request header like this,
('Cookie','ukey=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
this is important, mediafire do check that cookie, if not there, it will return dummy page

- send request to -
http://www.mediafire.com/dynamic/download.php?qk=xxxxxxxxxxx&pk=yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy&r=zzzzz

- in response content, find following infos
var sServer = 'download00000.mediafire.com';
var sQk = 'xxxxxxxxx';
var sFile = 'FILE_NAME.EXT';
Please report this key to support (KKKKKKKKKKKK)

build direct download url form that.

http://download00000.mediafire.com/KKKKKKKKKKKg/xxxxxxxxxxxx/FILE_NAME.EXT

- please note that character g after KKKKKKKKK is needed

- mediafire can use download accelerators, so it is useful when you want to download hundreds of files, first, dump direct links and pass it to download accelerators

Cheers,

Seems All the ImagesHack Pictures are Hi-Jacked!!!

According to JPG pictures,

I found the following info in the header. [That can be fake]

- Adobe Photoshop CS4 Macintosh
- 2009:07:10 18:58:53

and the following saved history by Photoshop. [I dont think this is a fake]
you will see save times history and software type, ids also.

<xmpMM:History> 
<rdf:Seq>
<rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:038011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T10:04:02-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:048011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T10:04:02-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:068011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T15:53:32-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:078011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T15:53:32-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:088011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T16:47:09-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:098011740720681195FEFFD04DA8F980" stEvt:when="2009-07-10T16:47:09-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5850B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T17:00:51-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5950B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T17:00:51-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5A50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T17:08:14-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5B50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T17:08:14-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5C50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T18:18:48-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5D50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T18:18:48-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5E50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T18:58:53-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
<rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:5F50B08A4220681195FEFFD04DA8F980" stEvt:when="2009-07-10T18:58:53-06:00" stEvt:softwareAgent="Adobe Photoshop CS4 Macintosh" stEvt:changed="/"/>
</rdf:Seq>
</xmpMM:History>

may be you can also analyze the image, i backuped the picture file in googlepages

http://soemin.mark.googlepages.com/imageshack.jpg

Added "Hyper Estraier" to probably use list for AngelX

Hyper Estraier: a full-text search system for communities

The guy who invented Tokyo Cabinet did that. seems very nice one too.

# Default route is being dropped, Well, Finally it is a Cisco Bug

Default route is being dropped,

Troubleshooting around 3 weeks,

Well, Finally it was a Cisco Bug

- CSCsq83540

- Happens on cisco 12000 series
- with SIP Card
- on certain VRF
- default route coming from remote site
- all traffics from CE to default route is dropped (pointing to null interface, what the hell is that)

workarounds
- reboot the card (if there is many customer on it, that will be very problem)
- can try adding new vrf (cannot do that, coz vrf id is fixed here)

Google Chrome OS and Microsoft Bing

Google started doing OS based on Linux Kernel, called Chrome OS

http://googleblog.blogspot.com/2009/07/introducing-google-chrome-os.html

The idea should be simple,

Google Start doing OS because Microsoft's Bing Search Engine is not that bad :-)

Yet Another Cisco Type 7 Password Decryptor

Type 7 Password Decryptor in Bash, and in C

http://www.securiteam.com/tools/6V0011PEBY.html

in Javascript, C , Perl

http://www.busindre.com/exploits-para-encriptacion-tipo-7-de-cisco-escritos-en-c-perl-y-javascript/

Google results for online password decryptors
online decryptors

Almost all of online password decryptor has password length limitations (means fails on long password)

decrypt password using a cisco router (this is perfect, if you have router or emulator)

http://yebo-blog.blogspot.com/2007/12/cisco-iostype-7.html

And Finally, Here is my Cisco Type 7 Password Decryptor with Python (unlimited password length), and Its only One Line :-)

http://www.darkc0de.com/others/cisco_decrypt.py

you can decrypt such long password
print decrypt("12181613140A1F002C2A372C353431170117100550584B57520F10"
"1C10584B53555346500D5A15035E5617170005480F000E324848080A0111131808022B38202E3226"
"261506050707574A5C55551D071E174A5C51524151520A4802015944001507175F0D071C254A4F1A"
"1D0316010F0A05392F22292031241214120500455D5E52470A0519055D5E5640565355185F00064B"
"53021215005D0A150B274D5D0D1F0404160D0D172E2D253B3733230003100212525F59405008020B"
"125F5944575454470F5D07145C51050002025A180209205F4A0F181613140A1F002C2A372C3534311701")

Thanks d3hydr8 for publishing this in my favorite site darkc0de.com, yay!

and thanks for packet storm too
http://packetstorm.linuxsecurity.com/filedesc/cisco_decrypt.py.txt.html
http://packetstorm.linuxsecurity.com/Crackers/cisco_decrypt.py.txt

aTxIvG4001

BGP-EIGRP Redistribution Stuck!

BGP-EIGRP Redistribution Stuck and made me half day to troubleshoot that, Garr!

We use MPLS with BGP on backbone and customer use EIGRP, and redistribution done on both ways on edges routers.

In BGP Routing Table, Routes are there, but its not get redistributed into EIGRP.

and clearing the eigrp session does not work! Garr!

clear ip eigrp vrf <vrfno> neighbor <neighbor_ip> 

All the Configurations are OK.

Finally I have to remove / reconfigure same configurations on all the address-families for redistributions on that customer.

router eigrp <as_num>
address-family ipv4 vrf <addr_family_name>
redistribute bgp <as_num> metric <some_values>
network <ipaddress> <wildcard>
no auto-summary
autonomous-system <as_num>
exit-address-family

router bgp <as_num>
address-family ipv4 vrf <addr_family_name>
redistribute eigrp <as_num>
no auto-summary
no synchronization
exit-address-family

And Following commands are helpful during this troubleshooting

sh ip eigrp vrf <vrfno> accounting
sh ip eigrp vrf <vrfno> topology | include <certain_route>
sh ip bgp vpnv4 vrf <vrfno> | include <certain_route>

Hum! I've learned something but BGP only is better :P

Cheers,
Soe Min

#Memo : Telneting into Router with Python (using telnetlib)

% python
>>>
>>> # importing telnetlib
>>> import telnetlib
>>>
>>> # telnet into 192.168.1.1
>>> t=telnetlib.Telnet("192.168.1.1")
>>>
>>> # wait until Username is appear
>>> t.read_until("Username: ")
>>>
>>> # send the username
>>> t.write("<username>\n")
>>>
>>> # wait until Password is appear
>>> t.read_until("Password: ")
>>>
>>> # send the password
>>> t.write("<password>\n")
>>>
>>> # wait until > is appear
>>> t.read_until(">")
>>>
>>> # send the enable password
>>> t.write("<enable>\n")
>>>
>>> # wait till # is appear
>>> t.read_until("#")
>>>
>>> # Now you are in Global Configuration Mode
>>>

Cheers,
Soe Min

New Attack on AES-256, Oh NO!!!

http://www.cgisecurity.com/2009/07/new-attack-on-aes.html

http://www.schneier.com/blog/archives/2009/07/new_attack_on_a.html

Algorithm Aes-192-256.pdf
(very complex algorithms :P)

AES-256 ဆိုတဲ့ Encryption မွာေတာင္ Key ကို ခက္ခက္ခဲခဲ မေပးထားခဲ့ရင္ ေဖာက္တာ ေအာင္ျမင္ေနတယ္ ဆိုပါတယ္။ Gaaarrrrrrr

ဒါေျကာင့္ သင့္ပတ္စေဝါ့ကို အေဖာက္မခံရေအာင္ Encryption Program ကို အားမကိုးပဲနဲ့ Key ကို ခက္ခက္ခဲခဲေပးဖို့ လိုလာလိမ့္မယ္။

In 2012, All Cell Phone will use USB as Charger

http://www.asahi.com/business/update/0630/TKY200906300287.html

၂၀၁၀ ကေန အစျပုျပီး ၂၀၁၂ ေနာက္ပိုင္းမွာ Cell Phone အားလံုးဟာ USB ကို အသံုးျပုျပီး Charge လုပ္ရမယ့္ပံုရွိပါတယ္။

ကြန္ပ်ူတာလူတိုင္းရွိတာမဟုတ္တာနဲ့၊ လူတိုင္း ၂၄နာရီ ကြန္ပ်ူတာဖြင့္ထားတာ မဟုတ္ေတာ့၊
ေနာက္ဆိုရင္ အိမ္မွာ မီး ပလပ္ေပါက္အျပင္ USB ပလပ္ေပါက္ပါ လိုလာမလား မသိဘူး။

က်ေနာ္ဖတ္ေသာ အျခား ဘေလာ့ / ဆိုဒ္မ်ား