diff --git a/LICENSE b/LICENSE old mode 100755 new mode 100644 diff --git a/site/__init__.py b/site/__init__.py old mode 100755 new mode 100644 diff --git a/site/constants.py b/site/constants.py index 2da1257..ddbdaba 100644 --- a/site/constants.py +++ b/site/constants.py @@ -2,7 +2,7 @@ page_menu = [ ('Home', '/'), #('About', '#about'), - #('Competition', '/competition'), + ('Competition', '/competition'), ('Contact', '#mailing-list-signup')] banner_images = [ diff --git a/site/generate.py b/site/generate.py index c8f28e8..4bd59bc 100644 --- a/site/generate.py +++ b/site/generate.py @@ -22,10 +22,10 @@ def examples(): #this is as simple as you can get web.page.section('put some content on the page') - + #render to the template web.template.body.append(web.page.render()) - + #finish of the page return footer() diff --git a/site/html/blog.html b/site/html/blog.html index ff929fa..821f5f9 100644 --- a/site/html/blog.html +++ b/site/html/blog.html @@ -23,7 +23,7 @@
- +It would seem that everyone and their dog are getting their own Quadcopter or quadrotor (often misreported in the media as a drone, but that’s another story). A recent build day ran by Reading Hackspace allowed me to jump into their … Continue reading
Occasionally you may find that a notable Twitter profile may remove tweets, or be shut down before preservation can be initiated by the forensic examiner. Should this be the case, you may be required to refer to caching services such as Google Cache or Twicsy for example. I recently had need to evidence data found on Twicsy, however the web interface isn't exactly forensic friendly when it comes to how it displays the data. Twicsy.com is a Twitter picture search engine, which appears to duplicate the original textual data from a tweet containing an image, and stores this information on their own web server. The image from a tweet is simply referred to from the source, and if the tweet is deleted or the profile removed, you'll find the image won't exist any more. However the textual data does still remains on Twicsy's website despite the original tweet not existing. After discovering this I wrote a ruby script to extract each of the archived tweets and place it into a format which is readable.
I’ve resurrected the Sensor Node project and I am experimenting in reducing the power consumption even further. This time I’ve removed the 3.3v voltage regulator from the circuit and I’ve […]
Also known as “When responsible disclosure gets you no-where, make them listen by going public” but it didn’t have such a good ring to it. So, to the meat of the business. I have a Nokia Lumia 920 which a … Continue reading
Since my last attempt at using an ESP8266 to get the date and time from the internet I’ve tried out another module, this time with the NodeMCU firmware. This is […]
So i’ve obtained some ESP8266 WiFi modules lately and have been having a play with them. If you’ve not heard of the ESP8266 they are tiny serial controlled WiFi modules […]
Following a recent discussion I had with a university dive club member about a request to remove a back-link from a now dead forum from a travel insurance company, I thought I’d take this opportunity to delve into the mystical … Continue reading
I was sent a link to to the following great article on power saving techniques for microprocessors and in particular the ATMEga328P which is the chip used in the Arduino. […]
As anyone who has used the Arduino IDE over time will tell you, this crappy piece of software has barely changed since the Arduino first surfaced. It has no autocompletion, […]
I’ve added a page to the blog that includes a link to my famous Complete Beginners Guide to the Arduino. It’s a few years since I last updated it and […]
I appear to be getting 7mA current draw when the MCU is in sleep mode. This is not good. Even if left in sleep mode the battery would die in […]
After powering the sensor via a digital pin on the ATMega (see my last post) I can’t say i’ve noticed any increase in battery life. With a read and transmit every […]
In an attempt to increase battery life further I’ve now got the HTU21D humidity and temperature sensor powered by a digital pin from the ATMega328p. In code the sensor is […]
I’ve had the wireless sensor node with sleep functions transmitting every two seconds for a week now to see how fast or slow the power loss was. After about 5 […]
A little experiment script I cobbled together for live incident tracking over Twitter, very useful for identifying, and evidencing signs of racism or death threats towards others. If the scenario requires it, geo data can be included in the capture, along with tweet source which identifies how the tweet was made either via a mobile device or a web browser. Also quite handy if and when exhibits need to be seized, and you need to narrow down what device the tweets were made from.
After a couple of requests from members on Forensic Focus, I've updated this script so that profiles can be accessed / extracted via Twitter's API update 1.1. I had converted the original script into an executable which was available for download on SourceForge, however since the API now requires authentication, I don't like the idea of packaging my own API keys into this. All this means is that you will require your own API keys, which you can create at Twitter's Application management page.
This is a great script for obtaining the metainfo contained within torrent files. Due to the encoding used, keyword searches conducted during computer forensic analysis may not return any results when analyzing these types of files. This ruby script decodes the torrent, allowing an examiner to view the contained information, such as tracker list, file names, file sizes, directories, MD5 sum, etc. Credit goes to Rob Williams for creating this, all I did was alter the Bencoding Library, as I was unable to get the original to function. Hopefully you'll find this as useful as I did!
So I wrote this back in late 2012, for use with the Twitter API V1.0. Unfortunately this script it is now some what redundant as the API was updated in June 2013 to use OAuth. However I'm re-posting this, as it was originally hosted on launchpad.net, but I'm now centralizing all my scripts on github.com. Despite the current condition of the script, it may prove valuable to someone out there, you just never know!