Firefox add-ons

I’ve been using Firefox since … well i don’t know, probably since i realised that IE sucks big time (and that’s some time ago). Anyway, we all know that with web-browsing comes along a lot of irritating stuff like pop-ups and gazilions of ads. Besides that our every move on the web si being monitored by different services, which makes things more anoying for IT guys. Common internet users don’t even know or care if they are being watched or not. Continue reading “Firefox add-ons”

My bash scripts

I’m currently running a dual boot Ubuntu 12.04 and Windows 7 but i only use Windows for gaming purposes. Since i got in touch with Linux (almost a year ago) i wanted something automated that would install everything i want, tweak stuff, disable stuff.

Yesterday i remebered that i want this and i started on some scripts. One of my teachers said that, and i quote “bash-scripting is for masochists” and i kinda agree, but i wanted to use a linux standard tool for this. Continue reading “My bash scripts”

RS485 and Python

Because i came to school 2 weeks late, (because of an extended summer vacation) i already had 2 project going and i didn’t knew what to do. In special subject 2, my coordinator teacher “suggested” (told me what to do :D) to play a bit with RS485 and make a script in Python related to that.

Here is a quick system overview:

Continue reading “RS485 and Python”

E-12 Odense

Electronik Messe is the biggest electronic fair organized in Denmark. This year it was held in Odense, between the 11th and the13th of September. Some of our teachers needed a few students to represent Lillebaelt and organize the official stand – and yes, i was between those few. Continue reading “E-12 Odense”

Wireless deauthentication

What’s it about?

I want to impersonate the gateway of a wireless network or another pc connected to the wireless network, without being connected to that network, in order to trick computers connected to it into doing what i want. First thing that i thought about was kicking them out, cloning theyr MAC and gaining access (this would be useful for networks with mac filters, radius servers etc). Continue reading “Wireless deauthentication”