RSS

Category Archives: hack

NIC Bank’s Data Breach,Hack and subsequent Extortion

Allow me to write this post as a letter to NIC Bank, I feel  despite the numerous times I have advised them to rectify their security to better protect us,their users, its simply gone to deaf ears.Well here goes.

NIC

Dear NIC Bank,

How are you? Hope you are well. This days when I wake up every morning I have developed a routine I read all my tech blogs, check my email and check my NIC bank portal for fear of breach, for fear that my hard earned shillings may have been skimmed by some hungry hacker or even worse my data may have been sold on silk road. I know many wonder why am still banking with you if all I do is complain, I mean if you constantly argue with your spouse then its better walking out and sparing yourself the agony, but like a cocaine addict am hooked, am hooked to your seamless banking process, the short cues in banking halls, the cute banker chics you guys have, the asset finance and off course the online banking portal that has proved to be your Achilles heel.

If you have been reading my blog you may be aware I have written 2 posts the first one NIC-BANK’s poor Ebanking System and possible security Flaws dated 24th April 2014  and the second NIC-BANK’s improved Ebanking System subsequent to my Exposé  dated 11th November. In the first I alerted you of the gaping holes in your security.  I also expressed my fear that someone else may have found this flaw and not being as noble as me, exploited it for profit.  I was pleased when a few months later I noticed you had bumped up your security and added OTP to the online portal. But if you remember I mentioned that this may be a little to late, I wrote in part

To begin with if indeed the data they served was compromised they they should have purged the entire username password combo provided, instead they only solved the issue of passwords. The problem with this is a keen to a naked woman only covering her boobies, the rest of her is available for your ocular pleasure. The same applies if I had a set of pswd and usernames and the pswds change without the usernames changing then am already at first base if I had the old data. The next thing would be a clever combination of hacking tactics ranging from social engineering, actual key logging on the device to harvest the apps password and generating an OTP afterward, sitting on the data and joining all those IRC chats on the dark web and tor that list exploits on major brand software and the just cleverly generating the OTPs for your self etc

Fast forward to a couple of days ago, wifey called me up at work and informed me that there were a couple of guys arrested on the grounds of extorting cash for data. Allow me to speak a little about the 2 hacker guys, first I condemn heavily their extortion of money for data. The 2 guys asked for 200 bitcoins from this we can see this guys aren’t exactly noobs but also we can see that they are just average hackers. Allow me to explain why

There exists a market on the dark web, the other part of the internet where Google doesn’t even dare go, where all the hackers meet and chat exchange tools etc. I remember the first time I showed wifey the dark web she was blown away by the level of sophistication there, I mean if you think of the internet we use as  5/10  then the dark web is 10/10. This is the first place where kids grow up worshiping Anonymous and the Lulz, the place where lizard squad was born and their skills sharpened. Back to said market, its called Silk road, silk road buys anything from weapons to kiddie porn.Its like the wild wild west of the Internet. So Where am I going with this..allow me to indulge you and generalize as well. Kenyan Banks should be aware that there are guys out there who wont send you an email and ask for cash, there are guys who will sell hacked data, attack vectors etc on silk road and then from there the Chinese or Russians will get a hold of it and wreck havock, the things that this guys can do is even beyond the scope of this blog.

Long story short, the 2 guys will probably be found guilty right, they will end up in kamiti and get Anally raped and we will forget about the whole thing. One or two guys will get fired and new ones hired they will come with bravado and a big solex padlock to lock the server rooms. But do you think anything will be done.Look at the stock price following the hack, did it even dip a point,NO,look at the ques did they even shrink by a fraction,No.

This banks need to be monitored by the Central Bank, not only on banking practices but also on security,its all good that CBK protects your cash from fraudulent manipulation by the banks but that shouldn’t end there, they should protect Wanjiku from Chinese hackers who had a cluster setup in their house with enough brute force power to use said data hacked by the 2 to make them millions. Kenya has to wake up to the fact that the rest of the world has invested billions on cyber security and are still getting  hacked (look at sony,xbox etc) what do you think will happen when this hackers discover easy targets in Kenya/Africa? You will see several hacking rigs being setup and the smart ones wont even move from their desk, the 4 fiber connections to Kenya make remote hacks even easy.

So in parting NIC go ahead sentence them,sure cast stones on them but don’t forget you are to blame for what is happening/ what will happen

 

 
3 Comments

Posted by on January 16, 2015 in code, grad school, hack, idd sallim

 

Tags: , , , , , ,

Type of Code Clients I have met

So someone accused me of only writing about code this and code that, nimaka unaweza peleka Code Nakumatt upatiwe shopping au Butchery ya Kamau akukatie ka Nyama Nusu…of course not, there has to  be business involved or in the words of Uhuru Kenyatta, willing buyer willing seller…so today I will just talk a little bit about the two types of willing buyers I know/ have had the experience of working for.

I have been taught by time and of course by more seasoned business men to divide clients into two broad yet true categories: Clande/chips funga and Girlfriend/wifey

1.Clande/chips Client.

film_pick_up_line_801085

The name speaks for itself, this type is the tap and go…No strings attached no Numbers no natsing. Usually this is my best type of client since everyone goes home happy. A clande Client knows point blank what they want, and how they want it. They are straight forward, utapatiwa spec doc yako,depo na time line. Utafanya Kazi, ukimaliza UAT kiasi. bass…the story ends there final Installment paid and you both go home happy. In the event hamskizani, you both have the luxury of walking away since you just met and nothing has been invested yet in between the two of you.

The Good thing about this type of client is just like a clande kwa bar uko guaranteed not to sleep hungry . Its cash at hand so you are happy,your landlord is happy and even the real Clandes are happy. Moving along

2.Girlfriend/wifey Client

art-cartoon-couple-cute-drawing-heart-Favim.com-48970

Sasa huyu ni ule wa long term…yaani in other words ata sio Strings attached ni more like ropes.This is the worst client ever. Let me explain using the analogy of a real world Girlfriend. You meet a hot mama, someone you think is a keeper…unaanza courtship. if you take that leap of faith you should know you will be in it for the long haul,during which anaweza amua hakuvunjii (utaka nja baba)…the only thing you get are hugs and smonches…you will have to be there for her 24/7(kama customer care)..handling all her Hormonal maneno and stuff……you get the picture.

Back to the client, you meet a big client <usually some corporate or Gov deal> una strike ka deal nao ,depo labda 30% unapatiwa kazi inaanza….1 month in system changes zimeanza,sijui integration na system flani wanatumia,2 month HR wanataka module yao…una call meeting…”hii haikuwa kwa spec doc…bla bla bla” wanakuangalia “How much more will it cost us” una peana figure…na ju uko na Njaa 20% unapewa,una endelea na code…3 months later huna rent,dame yako ana kuagalianga asubuhi ana skia Nausea ju huna any..zako ni “Ngoja niko karibu kulipwa” …they drag payment…na the day they actually give you your loot ni Friday Jioni na ni cheque ita take 3 days ku mature kwa hivyo tuseme next week Thursday ndo utakuwa monied. DAFAQ

All the while hiyo monday next wana kuambia you drive to their place to sort some stuff out, nikama walikupatia fuel card  ya kutumia. The Girlfriend client will also catch feelings if there is a bug “aki na vile tume kulipa vipoa..” This are the clients who will ask for refunds/sue you/want you in the office every week etc.

Any who those are my two categories of clients. Hope one of you out there can relate.

In other news if you haven’t yet tried PesaBox here is the link>>, and here is a brief Wiki entry of how it works/what it does.

 

 
Leave a comment

Posted by on April 5, 2013 in code, hack, Humour

 

Tags: , , , ,

New MPESA application: Enter PesaBox

So I remember a while back reading this Post by Idd Salim on his bog, about him not being able to get his MPESA statement dating back more than 3 months. Safaricom does offer  you a statement at a fee of 25 bob a page read here  (with a 3 month cap of course ). So why not make a system that  does that for you for FREE 

Time to Unveil PesaBox that does exactly that,This will be a pictorial Blog with few words and More Images just to give an impression of the App and the web back-end

Available on Android : Google Play,Samsung Store,PesaBox site  {Symbian ,Blackberry,J2ME still in sand box stage,release date soon}

GooglePlayLogo

Uploaded: February- 18 -2013  (Google Play)

February- 18 -2013  (Samsung Store)

Description: 

What is PesaBox?

PesaBox is a mobile application that works by syncing all your MPESA transactions on-line to give you reports by logging in with your credentials on pesabox.co.ke

Benefits of using PesaBox

  1. Print out statements of your MPESA transactions
  2. Find out how much you spend on bills
  3. See your cash flow over any period of time*
  4. Find out where you transact most frequently
  5. Compare your income to your expenditure in your MPESA account and many more…

What reports are on PesaBox?

  1. Summarized reports
  2. Consolidated reports
  3. Expense reports
  4. Transaction statement
  5. Cash-flow report
  6. Deposit Vs Withdraws
  7. Income Vs Expenditure
  8. Money In VS Money Out
  9. Location Frequency
  10. Bills by Category

*Time period for reports can only span back to when you joined PesaBox

Download link: 1.) Google Play.

2.)PesaBox Website

View our Facebook page here>> ,feel free to like

image1 image2

App based Mini Statement  report

image3

– Once you are logged in to your personal page at pesabox.co.ke  here are the reports that you can get:

Bills by Category

Screen Shot 7

Summarized Report

Screen Shot 1

Transaction Statement

Screen Shot 2

Consolidated Report

Screen Shot 3

CashFlow Reports

Screen Shot 4

Location Frequency

Screen Shot 5

Deposits vs Withdrawals 

Screen Shot 6

 
Leave a comment

Posted by on February 18, 2013 in 254, code, hack, kenyan clones

 

Tags: , , ,

Coding WorkStations

So I  Remember a while ago…  I guess last year if am not wrong..me and a couple of techies exchanged photos of our current workstations (Yes I now it sounds lame…bite me!!!). Just to flaunt the impressive setups…but back then I was still in JKUAT so you can guess what I had for a work Station …Sisemi Kitu ask Marto and he may tell you….The big boys pulled out their impressive lairs, much to the amazement  of the smaller fish in the pond.So after completing College I embarked on the daunting task of building a perfect workstation….and I guess the below pictures offered me some Inspiration….. Mine is not yet done (For reasons best known to me..) But ikiisha I will share a couple of photos with you …It will be a simple setup ,enough to write code on,Listen to Nneka  or Asa and kama kawaida  Game to my Heart’s joy. so until then Amaze at the below……………

 

Jarod Lair (the guys who Owns StackOverflow).

Psleda’s WorkStation

Those are some of the bigboy workstations..I liked the simplicity of the next one….Sijui Mbona

David L’s Lair

 
Leave a comment

Posted by on October 23, 2012 in code, hack, kenyan clones, twitter

 

Tags: , , ,

Safaricom Domain Hosting & why not to use it.

So some time last week Safaricom finally sorted me out…I was having a problem affecting a domain transfer from Kenya Web hosting to them. Something as simple as getting an EPP code from KWH   emailing this to them and in turn transferring ownership to them took me forever to get sorted. In the middle I think I was told by both parties (Saf and KWH ) to contact their registrar (Enom) and ask what was wrong with the EPP I was getting….as if they would listen to me. Any way this is not a post about that…its more about a flaw I discovered in Safaricom’s   Web hosting  service. A flaw that may seem small to the rookie user but a goldmine to a skilled hacker. A flaw that I have contacted them about but I have been kindly called back (Using that weird 0722000000 number ) and told to write a detailed report of the said exploit ni kama mimi nafanya kazi huko…..

To begin I will first walk you through a little Comp stuff kiasi. Safaricom’s web server(s) …sijui ni ngapi…run on Linux. One common theme among all UNIX variants of operating system is the security model of the file system, based on users, groups, ownership and permissions. UNIX variants and Linux basically have users, each one belonging to one or several groups. Each file and directory on the file system is owned by one and only one user and group. The owning user doesn’t necessarily belong to the owning group, which allows for flexibility. The system knows who is permitted to do what on each directory and file by means of permissions. Permissions are usually written down as three digit octal numbers. (777,644…etc) The first number tells the system what the owning user can do, the second one tells it what the owning group can do and the third number tells it what everybody else (the rest of the “world”) can do. The commonly used numbers are 4 (read only), 5 (read and execute), 6 (read and write) and 7 (read, write and execute). The execute bit has a special meaning on directories: it means “browse”, i.e. allow someone to produce a list of the directory’s contents. This is different than “read”, which simply means allowing the user to read files from that directory if and only if he knows their name. Each program you run is owned by a user and a group. Apache is also a program. It runs “under” a user and group.

So, there you have it. The operating system knows who asks for access based on the user and group of the program which requests the access. It also knows what kind of access you request (read, write or execute/browse). When it finds the file or directory it can look up its owning user and group, as well as its permissions. It will first check if the owning and running user match. If they do, it will use the first number of the permissions to decide what to do. If not, it will check if the owning and running groups match and use the second number of the permissions to decide what to do. If all else fails, it will use the third number of the permissions (the “world” permissions) to decide. This is an elegant and effective system, until someone tries to use it unintelligently. Enter Safaricom.

Their Servers are configured to run PHP as an Apache module (a.k.a. mod_php). This means that your PHP files run under the same user and group as your web server. Usually, these are called “nobody”.

Normally when you upload you’re site with FTP, the FTP server runs under the user you used for logging in. Let’s say that your user name is “websitenoma” and you belong to a group named “users”. You now have all the directories and files you uploaded with FTP owned by websitenoma: users and run under nobody: nogroup This means that under the usual default directory and file permissions of 644 your PHP files can’t write to files on your site, or even list the contents of your own site’s directories!.So you start panicking…this is what happened to me, so I emailed the Guru Himself @iddsalim and he suggested I do the following to solve the problem:

chown -Rf yourloginname:www-data /home/websitename/public_html/avatar

chown a-rwx /home/ websitename /public_html/avatar

chmod ug+rwx /home/ websitename/public_html/avatar

Also, make sure /tmp is 777.

This in effect is correct, but the guys at Safaricom had already offered a “solution” to my problem

They had suggested(based on other sites that they helped prop) I set all the folders to 777 and the files to 644… which also was working…PHP files can now write to files. However, it actually works a bit too well for your site’s well-being the website would in effect be saying “Am open for hacking…please hack me….” Aje sasa Jaymo?? Let me explain

You see, on a shared host kama za Safaricom, you are not the only user. Other sites also have a user on the same system. To make things worse, the exact path (a.k.a. absolute file system path) to each site’s root is very predictable, usually in the format /home/ websitename/public_html. If someone wants to hack your site, all he has to do is create an account on the same server and try to write to one of your site’s files. With the 777 permissions, HE CAN DO THAT EVEN THOUGH HE DOESN’T HAVE YOUR USER NAME AND PASSWORD! Adding insult to injury, a clever hacker doesn’t even have to create an account on the same server. Your server runs a lot of software, such as a web server, an FTP server, a DNS server, an SSH server, a mail server and so on. If one of them is vulnerable, he can exploit them to write to your site’s files. Even if you lock everything down, shared hosts pose a wonderful opportunity to screw you without even knowing about it. Even though you have taken all measures to avoid exploits being able to run on your site, another site hosted on the same server might not be so keen on security.

But this is not something new….and it has been around for miaka mob sana..many people know about this,so there should ba a solution…and indeed there is. The server should ideally  run on suPHP. suPHP is a very clever workaround to the permissions problem. Instead of running PHP under the web server’s user and group, it runs PHP under the owning user and group of the PHP file. This means that only the first number of the permissions is important, while the second and third ones can be set to 4 (just read) or 5 (read, browse) for directories. Don’t use 0, as you’ll be denying access to non-PHP content, such as images, Javascript and CSS files. In this case, the perfect permissions are 0644 for files and 0755 for directories.But does Safaricom use this?? The answer is NO!!!

Safaricom does not- to my best Knowledge- use suPHP. In order for them to be able to cram ,1 – 1,000 sites on a single server. suPHP comes with a performance hit, so they don’t use it in order to be able to overcrowd their servers without bringing them to a screeching halt. So I was In a dilemma again….the second solution offered would have been a dedicated Server.

When you have a heavily trafficked web site you need to run it on a dedicated server. Since it’s a dedicated server, it implies that there is only going to be one site running on it. However, you want to put every CPU cycle to good use, therefore you can’t use suPHP due to its overhead and incompatibility with performance tuning tricks.This is all good and sweet, until you decide to install ISPConfig, au cPanel or any other pre-packaged server environment manager (SEM) on the server.

Why? Because the moment you do that, you enter “fuck me mode”. Your accepting  the settings “imposed” to you by the SEM. More specifically, all SEMs suppose that you are setting up a shared host and configure Apache to use a different user than the owning user of the one and only site you’ll be hosting. As a result – and because you can’t use the FTP layer due to the huge performance impact – you start giving 777 permissions.

Hacking pap!!!! !Lakini I would be be hosting just one site, therefore a hacker would have to penetrate this site’s security to hack your me. Or not. He could use one of the various system servers (FTP, mail, SSH, DNS, etc) as an attack vector .A way for him to perform a clever hack.  The 777 permissions give him the right to do so.

Stuck again. I call up my boy Jaws…the number one server guy I know. And he reminds me that  if I am using a dedicated server I would be the sys admin. And as such can edit Apache’s configuration file and do something magical. Configure Apache to run under the same user as the owning user of the one and only site am hosting. That’s right. It’s that simple. From that point, I  simply set 0700 permissions for directories and 0600 permissions for files….kazi kwisha…..

 
6 Comments

Posted by on July 22, 2012 in code, hack

 

TO KENYAN MOBILE DEVELOPERS #Advice

I have noticed this phenomenon with many Kenyan techies/wanna be techies/copy pasting techies/code stealing techies, everyone of them has this app idea they are working on, this awesome idea that will earn them a couple of million like @jmwai or like kina Mbugua Njihia and Steve Mutinda. So you will most of the time find them at iHub pale Kwa green members with their eclipse fired up….writing/copying/downloading code to build up their apps.”Sasa Jaymo nini mbaya na hiyo ?” Nothing really am ok with that, at least they are putting in work ki code…they are helping build that Konza city dream/mirage ….what really pisses me of is do most of them sit down to think what they are coding  before they actually do? Do they analyze the current market, study it well? As Dr.Okello my calculus 3 teacher would have said, do they account for Variable change? Do they have a target Demographic for their M-something solution? Maybe, maybe not!

Back in Undergraduate while doing Mathematics and Comp science at JKUAT we were taught the stages of software design and implementation ,the logical flow in developing software….but this is how this guys are doing it now days:

Techies’ come up with brilliant ideas on their own, and often they have not carried out some form of research to find out who is their user, what does their user need and what then would be an appropriate solution to meet this need?

Techies barely leave their desks when coding, or before they begin coding…what you have is brilliant techies with fantastical ideas that no one uses [after they’ve been developed] because the time was not taken to really understand what issues citizens face…

As if that’s not enough most of the apps put out are poorly done, in all aspects starting from design. This new breed of techies fails to understand that when it comes to design of an app’s interface it begins from a sketchpad and not the IDE!! Ask @martianskills of skyline designs and he will conquer. When it comes to design what is the current norm with these techies? The old school Dashboard layout…this design was launched in Google I/O 2010, 2010!! My friend 2010! But that’s what everyone of them is working with…then you fail to develop proper icons on top of that….you get a cheap looking app, aesthetics my friend go a long way…you just look at this  interface below… and tell me what you think .  ..just plain ugly!!!

<No Image>

Sasa ju you have seen a thwack one..let me show you one by @zacckOS and you will see what a mature interface looks like

and a snapshot from TafutaID:

Secondly: you have your interface…so sasa you are working on functionality, uliskia JSON ndo inatumika and you are all in….umechapa Google search and umepata some code….you slap them all together and viola….functionality achieved….Hata huwezi aibika!! Half of this app developers are just some  guys with kidogo Java knowledge, Kidogo  php, even less C  knowledge and barely any Python at all….you are writing server side code that is so vulnerable to exploit  on Databases you have propped with even more shifty coding….yaani SQL injection is so freaking easy even my 5 year old niece could hack!! Login forms that do not sanitize user inputs…passwords that are not encrypted being stored kwa DB! Au if they are they are all MD5 encrypted bila ata salt…how?? Why!!

Third: Everyone assumes its easy,its like siku hizi kama huna app wewe si mnoma…kama huna entry ume submit wewe ni toast! So everyone has an app….that is freaking great but hold on a minute! Does this breed of devs even watch trends at all? Flash back kiasi let me use my own example Based on  Gogle I/O 2010 I developed KwaRamani…using title bars, dashboard layouts, and themes. Based on Google I/O 2011 I developed TafutaID with support for storing data on cloud and pulling responses back with C2DM…2012 working with google drive….but hawa ma techie wanakuundia a flintstones  app based  on 90’s technology alafu ukiwa kwa lift unaskia wasee wakisema “aaaaiii Android ni rahisi….kitu simple kama JSON encode na HTTP  ndo wasee huona ngumu?” Sawa bratha…endelea kuandika software ya 1999 in the 21st Century

Fourth:  Market…ok app imeisha …finally all those hours of coding have amalgamated into something…you have even showed your ex the app and now she wants you back ju unakaa una bright future ahead! Yes you have that smirk! Ile ya Kanye West “….wait till I get my money right…” But wait a minute….none of your apps are on  the market!! Am not a well established techie, so I can relate to most of this techies not having the $25USD to set up the Android Market account…au Kama uko nayo its in KSH and huna VISA card to pay for the account…so you cant get it to the market….so the app stays kwa comp yako….and two months later your ex /baby mama I looking at you zile za Nyga please. That’s where people fail…kuna many ways to get it out to the masses. Samsung Store is free to upload, good old GetJar  bado iko,remember before Android,IOS na kina Symbian S40 came when Moi was still president and J2ME was the only way…Getjar and Waptrick was the ishh..and it still works so you can upload….watch the trends and kidogo you will learn/earn  and upload to Android Market.

Fifth: No man is an island….as cliché as that may sound its true…and when it comes to code no developer is an island either…ask for help when you get stuck…offer help when you are asked pia…don’t be wale wasee huficha answers kwa exam ati ndo wasee wasicopy (I can think of a couple form my JKUAT days) ….Gain a network sio hapo kwa couch ya ihub pekee. Try and enter competitions not for prize money but more for the exposure you will get and from the people you will meet

PARTING SHOT

Those are just my views, based on what I have observed….moving along swiftly, Last week I was privileged enough to have a long talk with Dele Akinsade- Microsoft Director, Developer Platforms –West, East & Central Africa and Indian Ocean islands…we talked about windows phone development, and I argued with him how Microsoft has not done enough for techies who want to develop on the platform, from the SDK itself to  lowering the price on phones running on this platform to allow penetration into the market. He  told me affordable  feature phones will be launched sometime this year but not running on windows phone 8 but 7.5 .Plus the Windows Phone 8 SDK is out and offers a lot to developers.So if you are a techie you can try and start developing on this platform before the phones arrive and have a niche before the rest.

 
11 Comments

Posted by on June 29, 2012 in 254, code, hack, Humour, true stories

 

ctrl -A,ctrl- C,ctrl- V coder

Wacha niongee ju nimenyamaza for long….ok I have credible reasons for that but before I start hauling insults left right and center let me first share one or two heart warming things with those readers  who give me   genuine reson to write:

First I have just completed 2 Apps this month  which is kinda great for a small time coder as my self.(I read the guy who worked on IRIS did the whole app in 8 hours…..) Si wezi danganya nikuambie they will be the next great Ideas out there but what I can garuntee is they are coded  like the Egyptians build the Pyramids{Pure Art}…The way KaBinti looks {Pure beauty} The way my erection feels {Hardcore} So after all those man hours of coding I had to indulge in kidogo froth Thursday to Sato style…just the way Jaymo likes it.No wonder @mwas_LT was complaining about me drunk tweeting

While on that  topic of coding wacha nigusie kitu, I have great respect for the Kenyan code greats,@iddsalim Mohamed Maway @mbuguanjihia ,jaws na wengi wengineo I have blooged about them in way too many occassions, so let me talk about my league of coders,guys who come to me for code advice and I also replicate , this coders deserve attention pia.I have respect for kindred spirits  like @TayianaC Brenda Angweyi @twinkioko @ZacckOS people who actually ask for help code ikileta nyef nyef, guys who help you build your code skills by helping them solve bugs in theirs,but wale wamenichokesha ni ma copy pasters ma ctrl -A,ctrl- C,ctrl- V coders 

Haya sasa nime jam,why did i  have to go there,So here is what happened Coder flani…ata si coder,ni ka jamaa kanajifunza code,after kissing ass a whole semester i decided to help him with code kiasi, i recon its me giving back to society,Nothing wrong with that right? so mbona ume jam basi Jaymo, Well the dude carries a flash with him like kila tyme,so i chuck out kiasi and am guessing ndo workspace ili fanyiwa maneno, I come back to find dude with the Dog ate my homework  look,reading some pearl script i was working on for a pal,Kajamaa kakadaii ati ohhh wacha kaende kame pata what he wanted.

So mimi bila kujua nikaendelea na works,2 weeks later I hear he is doing Beta Testing <unaanza aje Beta bila Pre-Alpha na Alpha>. So i check out his .apk,walahi ni code ya Jaymo.Design,dimens,styles kila kitu….mpaka my customized quickactions.Yote…yangu

Mtu huambiwa asirushe mawe kama huna proof so i decompile his piece of crap,nyga ata ku obfusicate ni kazi ngumu kwake…manze code ni yangu, mpaka method namimg,class names…drawable names,raw zote…in other word this is just my work…..Nikajam,nika toka nje kuona kama kuna mahali nje ya mlango yangu imeandikwa opensource,au github HQ

Na mimi si ule msee wa kuketi na wezi chini tukiongea{Intelectual theft},Damu yangu ya umeru haiwezi, kwanza ilikuwa inadai nitafute panga nimshikishe adabu…but any way there are several  ways to correct a wrong.Tuesday  ndo nili roll  out operation shikisha adabu…4 hours attack on his computer….na ju haka ka jamaa ni ka WI-Fi junkie running a windows machine haikuwa kazi ngumu kuingia na ku erase my code from his HardDrive, re wrtite his and make all his methods echo “DAWAA YA WIZI NI ADHABU”…sasa naskia kana sema ati kana target machine yangu for subbotage.So here is what i have planned, you all know bubble gum Riddim…ile Riddim huchezwa kila mahali siku hizi, kinyozi,kibanda, choo,ma3 za kayole..bass hiyo..haka kajamaa kakidai za ovyo hivyo ndo source code yake itakuwa

Buda you really want to play it like that????

 
3 Comments

Posted by on February 26, 2012 in 254, campo, code, hack, JKUAT, twitter

 

Tags: , ,