I generally create .NET Core web services in Visual Studio. I’ve heard good things about the more light-weight and easy-to-configure Visual Studio Code, but I’ve only barely tried it myself yet. I’m sure I will give it another go sometime soon, but for now I’m fairly content with VS – with one exception.
A while back, I wrote a post about how to improve the log command in git by adding a customized alias for it. I’ve been fairly happy with that alias, but I kept missing one thing: A date, or some similar indicator of the age of each commit. Today, I finally set aside time to improve it, and here`s the result:
lg = log --format=\"%h: %Cgreen%an %ar %Creset(%ci) %n %s\" -10
I lock my PC every time I leave it (Shortcut: Win + L), and until recently, that would cause my screen to shut off too after only a minute. When it can take upwards of 30 seconds to turn the screen back on, that can get pretty annoying if you’re just gone for that one minute.
You would perhaps think there was a simple setting for adjusting the time it takes before your screen turns off – and there is – but for some reason, it seems to be disabled and hidden in Windows by default. To enable it, you’ll need to make a change to your Windows registry. Once you’ve done that, you can easily adjust the timeout as you like.Continue reading
Today I’m officially opening a new category on my site: Capture The Flag – or CTF for short.
If you’re into security, you probably know what a CTF is. If not, you may have heard of them from paintball and other similar competitions, or from team-based computer games. In those cases, the goal is typically to win or score points by reaching (“capturing”) a flag; possibly by stealing it from an opposing team.
In the context of cyber security, a “flag” will typically be a token in the form of a text string. The goal then is to find a way to circumvent some security system in order to find and gain access to one or more such tokens. For each new level in a CTF game, there will be new security barriers to overcome and new tokens to find.
A typical token in a security CTF game may look like this:
This particular flag is taken from the CTF game at hacker101.com, which is affiliated with the bug bounty program at hackerone.com. Once you’ve found a token, you copy it into a form and submit it in exchange for points
There are countless free CTF-games available, some of them permanent, others limited to a specific time. Until now, I’ve not partaken in more than a handful of beginner-level games, but I’m hoping to do more of this going forward, and that’s what this category will be about. Nothing advanced; just a simple log of my games, including some hints about solutions I’ve found, and perhaps a few thoughts around them.
For the moment, I’m keeping the posts under this category private, until I see how it works out, and how much I end up using it. If and when I decide my posts have enough quality and value to be worth sharing, you’ll find them here.
When code builds but looks invalid, and intellisense is dead
I recently encountered what I at first thought was a bug in Visual Studio, but which turned out to be a poorly described configuration error on my part.
The problem manifests itself like this:Continue reading