I have used MinuteKEY before. To easily bypass DO NOT COPY keys quite successfully. Todays errand was more about a quick solution then a security bypass. I was just copying normal keys today. Here is what i learned. With MinuteKEY, you could only make batch copies of the same key. In fact, the MinuteKEY kiosk locked your key into the machine until all the copying is done. There were zero protections against DO NOT COPY keys. They do however print keys right there in a variety of styles and colors.
This small exhibit includes audio/video recordings from the Daily Show cast as well as Trump Survivors. Even a set with a golden toilet and props to pose with. (i had to grab a tie, but it wasn’t long enough for me). We were given name tags upon our arrival complete with nickname (mine was “Buzzkill be3n”). you can see the whole exhibit in under an hour. well worth the visit!
Sunday June 17th is the last day in LA. 631 N Robertson Blvd. 12pm-10pm.
I have been consolidating some of my sites onto a single hosted Unifi controller. Documentation was outdated so I am going to post some useful info here. My original plan was to setup a basic apache2 site, use certbot to generate my certificates and then install them into the Unifi controller. The first frustration is that you cannot simply install the certs you want into the unifi controller. second frustration, java. once you get over that, it’s super easy.
I had some issues with the initial migration. i ended up having to start over. handy command to remove unifi controller with all it’s configuration and data.
apt-get remove unifi --purge Just remember, you will need to reinstall Unifi after. It will be bran new and back to the wizard.
Getting started with SSL, I learned mostly from here. First create a CSR with unifi through command line…
java -jar lib/ace.jar new_cert <hostname> <company> <city> <state> <country>
this creates unifi_certificate.csr.der and unifi_certificate.csr.pem inside the data directory where you already are (/usr/lib/unifi/). Now we need to feed the CSR into certbot. Note that at this point, i already have apache2 installed with a very simple virutalhost and site setup with the domain i am creating a cert for. Here is the command to feed the CSR generated by Unifi into certbot to be certified:
certbot certonly --apache --csr /usr/lib/unifi/data/unifi_certificate.csr.der
Certbot will make sure that domain is yours (and your apache config is working) and then output a signed cert and a chain that is almost everything you need to install the certificate back into the Unifi controller. Still in /usr/lib/unifi/data/ 0000_cert.pem is my signed cert and 0001_chain.pem is my signed cert plus the intermediate certificate. what’s missing is Let’s Encrypt’s Root certificate to validate the intermediate certificate and thus complete the chain of trust.
As you can see, it did turn out to be hardware, a GPU and CPU (ouch!). The flash storage was not it, but I figured that out eventually. This has been an issue since October! With many fixes attempted. It was a bit of a blow to my pride eventually having to turn to Apple, but they stepped up and got it done with only mild frustration on my part. Plus, they picked up the tab as my warranty is certainly expired. There comes a time when you realize that a fix would require more parts then you had at hand. I have been enjoying my functional desktop again, just in time for the new iMac Pro to make it obsolete.
check out 💩.be3n.com. for no reason at all.
Trading technology with my friends left me with some exciting new toys. Now with a bit more time since these devices were introduced there are lots of interesting demos for each. Though similar, these are very different devices and not intended to be used together. I am excited to see what they are capable of. Anything to replace the flat pointer driven systems we seem to be stuck with. I think I’ll integrate my Leap Motion with the Oculus i have on loan. So far, it’s hard to type without triggering my Myo Constantly.