|
You are here |
ayende.com | ||
| | | | |
rcoh.me
|
|
| | | | | I always wondered how Google Authenticator style 2-factor codes worked. The process of going from QR code to rotating 6-digit pin seemed a bit magical. A few days ago, my curiosity found itself coupled with some free time. Here's what I found: What's in the QR Code I scanned the QR code from Github with a barcode scanning app. Here's what's inside: otpauth://totp/Github:rcoh?secret=onswg4tforrw6zdf&issuer=Github Not too surprising. It tells us the protocol, TOTP, who is issuing this OTP code (Github), and most importantly the secret:1 | |
| | | | |
hjr265.me
|
|
| | | | | I remember seeing a tool many years ago that could hide other files in BMP image files. I was a bit too young to understand how it worked, but I think I understand the trick now: Understand the structure of the file type at the byte level. Find a spot that can hold an arbitrary length of data. Sneak in whatever you want in there. As a proof of concept, I used Go to make Sneak - a program to add or extract a hidden file in a ZIP archive. | |
| | | | |
ravendb.net
|
|
| | | | | We recently got a support request from a user in which they had the following issue:We have an index that is using way too much disk space. We don't ne... | |
| | | | |
tonybaloney.github.io
|
|
| | | |||