$theTitle=wp_title(" - ", false); if($theTitle != "") { ?>
About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like
23 Mar // php the_time('Y') ?>
I recently (well today really) started playing with the Citrix Linux VDA. I took Ubuntu to test because I happen to like Ubuntu.
I didn’t get it to work correctly right away though and during troubleshooting I wanted to know where the VDA is storing it’s settings.
I found the following file /etc/xdl/ctx-vda.conf
with the following contents:
14 Mar // php the_time('Y') ?>
Even though I try not to visit the forbes.com site anymore due to their heavy usages of ads, anti adblocker and overwhelming number of cookies they’re trying to push, sometimes however I accidentally follow a tweet that leads to forbes.com and just notice it to late.
Besides wasting your bandwidth, mobile data and especially time there have been a few occasions were the forbes.com page was actually serving malware from their adfeeds.
It annoys me bigtime so let’s “fix” this:
First thing that happens upon visiting the forbes site is that you get a blurred background with a random ad or quote of the day and you need to press Continue to article
:
If you open the Developer console in Chrome (Application tab) you can see that Forbes uses a cookie that expires in 24 hours. This cookie make sure that you don’t see the “welcome” ad for 24 hours:
14 Mar // php the_time('Y') ?>
I will explain why in a seperate post, but on my MacBook Pro I wanted to use the Intel Thunderbolt driver under BootCamp instead of the ones supplied by Apple.
The Thunderbolt control program however refused with the following error message:
It’s really beyond me why Intel would deliberately block their Thunderbolt software on Apple hardware (under Windows). Believing this was just a simple hardcoded hardware check rather than any hardware issue that would prevent the drivers to work I proceeded into finding where the check takes place.
13 Mar // php the_time('Y') ?>
Recently I stumbled upon an executable that appeared to be a PowerShell script converted into an executable.
I was curious to the actual script so I decided to have a look and see how I could convert the executable back into PowerShell.
Having seen similar techniques to turn vb scripts and java jar’s into executables I first looked if this particular executable was simply carrying the payload in the resource section.
I opened the executable with Resource Hacker and saw 2 resources (note that I am using a simple HelloWorld executable here in the screenshots). The first resource, named 1, is clearly a Unicode string with the title:
13 Mar // php the_time('Y') ?>
Just a very quick post (more like a note to self) but I wanted to split a string with the $ sign in PowerShell:
1 | 'one$two$three$four$five' -split '$' |
Took me a little while to realize that this doesn’t work as the split operator in Windows PowerShell uses a regular expression in the delimiter, rather than a simple character.
The easy fix is to Escape the $ sign with a backslash:
1 | 'one$two$three$four$five' -split '\$' |
Or alternatively use the SimpleMatch option:
1 | 'one$two$three$four$five' -split '$', 0, "SimpleMatch" |
The 0 represents the “return all” value of the Max-substrings parameter. You can use options, such as SimpleMatch, only when the Max-substrings value is specified.