June 25, 2008 at 11:52 pm
· Filed under Development
I wanted to create a script that would convert a normal IP address to a long IP, just like mIRC Script’s $longip alias.
$longip(address)
Converts an IP address into a long value and vice-versa.
$longip(158.152.50.239) returns 2660774639
$longip(2660774639) returns 158.152.50.239
What I was originally trying to do was increase an IP by 1, but due to the octets only allowing up to 255, this became increasingly difficult to do.
What I decided to do in the end was convert the IP to a “longip” then increase it by 1, then convert the IP BACK to normal IP.
This required a way to convert an IP to and from longIP, I was told it could be done purely using shell script, here’s what I did…
Read the rest of this entry »
Permalink
June 18, 2008 at 11:37 am
· Filed under Sysadmin
Not so long ago I was asked to answer some questions for a friend of a friend who was writing a dissertation about the “hacking and warez scene” (which I have not been heavily involved in since I turned 18).
As I had known him for a long time, I felt obliged to help out, plus I was now interested in the questions that would be asked.
Based on what had been said I knew they were going to be questions on defining what a hacker is and what a hacker does, something i’ve been interested in defining for quite some time.
Here’s what I said…
Read the rest of this entry »
Permalink
June 16, 2008 at 12:02 pm
· Filed under Internet
Turn dynamic URLs into friendly URLs
I’m sure we’re all familiar with URLs that look like this:
http://www.example.com/?nav=page
These type of URLs aren’t particularly “friendly”, they are known as dynamic URLs. As a rule of thumb search engines such as Google don’t like them as much as “static URLs”.
However, Google has recently released an article on this very subject entitled Dynamic URLs vs. static URLs, I recommend you give it a read so you fully understand what we’re talking about.
Read the rest of this entry »
Permalink
June 3, 2008 at 4:31 pm
· Filed under Development
With the on-going abuse to email based systems, we are in need of ways to validate the email addresses we’re handling.
We all know what an email address looks like, we see them and use them every single day. But how do you know if it’s valid or not? The next obvious question should be, what defines a valid email address?
This is what I intend on investigating.
Read the rest of this entry »
Permalink