sizeof(cat) logo

Browse around the articles and you'll have a pretty good idea of what this is about. I write about various programming languages, my projects, OSdev and privacy. Sometimes I do security audits.

Hacker. Security enthusiast. Privacy-oriented. Catalan. Not Phineas Fisher.

#Tor. #Ricochet. #Debian. #Gamedev.

Feel free to contact me. I might answer. Probably. Or not. Don't hold your breath. Or hold it. Ice bear don't care.

View my PGP key 0x07D947C6F1F79F53 | Download it.

Recent Posts

    World of Warcraft singleplayer

    Fri, Aug 25, 2017

    To run the Blizzard World of Warcraft - WoTLK (Wrath of the Lich King) 3.3.5 client on your macOS computer and play “singleplayer”, you will need a running WoW server, the WoW client and a database server (MySQL). Everything else will be downloaded and installed from the Internet. To download the WoW WoTLK client for macOS, start by searching your neighborhood’s torrent site (hint,

    Playing “singleplayer” can be lots of fun, basically you can explore the world at your pace, do quests, gather achievements, etc, the only part you will be missing is the other players in game. Dungeons and raids (level appropriate) might be hard if not impossible either.

    Flashing Tizen on newer Linux

    Wed, May 24, 2017

    If you try to flash Tizen OS (any version) on a new Ubuntu or Debian installation, you will notice lthor no longer plays nice with the Linux kernel, and it will fail without any messages. It has something to do with this.

    The problem is /dev/ttyACM0 is no longer detected, if you do a ls /dev/tty*, ttyACM0 is not there even if the device is connected. Two options:

    Wannacrypt0r (WannaCry) ransomware

    Sat, May 13, 2017

    Do not play with the samples unless you really know what you’re doing. You have been warned!

    All Windows versions before Windows 10 are vulnerable to the WannaCry (WannaCrypt, WannaCry, WanaCrypt0r, WCrypt or WCRY) ransomware if not patched for MS-17-010.

    The ransom is between $300 to $600, there is code to delete files in the virus so it’s not just a threat.

    Useful Linux commands

    Tue, May 9, 2017

    Below are some useful Linux commands for penetration testing, target reconaissance and capability assessment. Use them for good, not for evil.


    user@host:~$ traceroute <target>
    user@host:~$ traceroute
    traceroute to (, 24 hops max, 52 byte packets
     1 (  9.403 ms  7.301 ms  3.264 ms
     2 (  47.823 ms  3.649 ms  2.436 ms
     	... etc ...

    Qubit and Inter-Process Communication

    Sat, May 6, 2017

    One of the most important tasks of the kernel, in a client-server model, is to provide a means for clients and servers to send and receive messages. Clients need to be able to talk to servers, servers need to be able to talk back to clients, and servers need to talk to servers.

    I. Communication Mechanisms

    There are four parts to this communication infrastructure:

    1. Ports

    When a process that wants to be a server is created, it requests a port number from the kernel. Ports are the endpoints where clients and servers send their messages, kind of like a mailbox address. Each port has its own queue of messages being sent to, or returned by, the server.

    Javascript fun

    Thu, Feb 16, 2017

    Javascript is a fun language that allows you to write crazy AND valid code.

    Keep in mind that adding [] converts the expression to a String, for example:

    NetBeans SQLiteJDBC 5.0

    Tue, Feb 7, 2017

    In a few days my NetBeans SQLiteJDBC plugin will celebrate a whopping 8 years since its initial release (February 15, 2009). During this time I’ve learned a lot about both NetBeans and SQLite (and its JDBC drivers), what started as a simple NetBeans plugin to manage connections to a SQLite database (initially using the JDBC driver provided by Zentus, now using the Xerial’s driver) is still maintained (and used) after 8 years with over 60k downloads (in top 20 downloads).

    Qubit OS and bootloaders

    Sun, Jan 22, 2017

    When the computer is powered up, after the initial hardware scan and gathering, the BIOS then checks which device contains the boot information. This could be a floppy disk, CD-ROM, or typically, the primary hard drive. The first sector (bootsector) is read. The small program in this area reads a partition table that is kept at the end of the sector. This table has all of the hard drives, their partitions, and their purpose, listed. The one it looks for, specifically, is the one designated as the boot partition. Then, this little program turns over control to another program, called the bootloader, loading it from that boot partition and subsequently running it.

    Convert private key to PEM

    Tue, Jan 10, 2017

    Converting private keys to PEM format is very easy with the command below, make sure you replace PRIVATE_KEY_FILE with the name of the key file you want to convert.