Hunt for free SMS

29/06/2018

I was using afreesms.com, but for some reason I got barred! So I googled for another free service, and the first tutorial got me to install Bluestacks – an android emulator – and an app called TextMe.

TextMe-capture

TextMe – Useful if you live in “the US, Canada & More”

Yeah, I saw that it said “Send free texts to your friends in the US, Canada & More!”  I just assumed that “& More” included Europe FFS! I mean, it knew I was in the UK and slipped me geo-located ads…

TextMe-UK-ads

But I was wrong.  US and Canada… And the More?  Not Europe, not the UK.  It’d be cool for users in the US and Canada for sure.  Apparently you can send and even receive SMS on your free new number!

No good for me though.  Time wasted.  So let’s make up for it by finding a solution to my self-imposed goal – sending texts for free to UK numbers.

I decided to keep to BlueStacks, figuring that phones are natural text-senders.  So I googled appropriately and founds this:

whatsapp-free-sms

So I followed the instructions, configured the app, matched my phone number with SMS verification… and that was the only text message that emanated from Bluestacks.  Shubham Kedia was rewarded with free texts on his laptop, but I wasn’t.  😦

In the end I found my free SMS… and more!  Actual phone calls! For free!

globfone-free-sms-etc

Free SMS… and calls! And P2P video chats and file-sharing! For free! WTF???

Globfone.com is wicked.  Free international VOIP calls FFS!!  Okay, so they are time-restricted, but it’s still there to use for free.  And the peer-to-peer stuff looks like it’s cool, though I haven’t tried it myself.

Anyway, I did it.. eventually…  Got free text messages from my laptop.  Hurray!!!!

bmc-black


Python: Automated login to local hot spot

27/06/2018

BTWifi-page

I’ve been using a BTWifi-with-FON hot spot for internet access.  The way it works is: user clicks on connect in wifi manager, then browses to https://www.btopenzone.com:8443/home, fills in the form with User email address and Password.  This lets the user access the internet for anything between 1 and 3 hours, depending on time of day and day of week.  Then access runs out and the user must sign in again.

If you’re using the hotspot for an extended period of time, having to go through this palaver can be pretty irritating.  Luckily I’ve started learning python, which is an excellent language for automating this kind of procedure.  So this is the script I have written to make my use of the hot spot a little less stressful:

import pymsgbox
import requests
import time
import sys

def log_in():

    url = “https://www.btopenzone.com:8443/tbbLogon”
    values = {“username”: “foo@bar.com”,
    “password”: “foobar”}
    requests.post(url, data=values)

def vpn_check():
    p = requests.get(“http://www.icanhazip.com/”)
    ip = p.text.rstrip()
    if ip == “!!!.!!!.!!!.!!!”:
        # uncomment line below for vpn connection confirmation
        #pymsgbox.native.alert(“Logged into VPN”, t)
        sys.exit(0)

test_url = ‘https://www.btopenzone.com:8443/home’
response = requests.get(test_url)
html = response.content

page_start = str(html[0:1000])

t = time.strftime(“%X”)

if “DANTE” not in page_start:
    vpn_check()
    pymsgbox.native.alert(“Signed OUT, click me to sort it”, t)
    log_in()
    #uncomment following lines for signed-in confirmation
#else:
    #pymsgbox.native.alert(“Signed in”, t)

At the top of the script I import the modules I need. Pymsgbox provides pop-up message functionality. Requests handles the webpage parsing and filling in the online form.  Time enables the script to display the time in the pop-up boxes. And it uses sys so it can drop out of the vpn_check() function.

Next up, it defines the log_in() function.  Although the user navigates to https://www.btopenzone.com:8443/home to sign in, the form url is http://www.btopenzone.com:8443/tbbLogon.  The values to be provided are username (the user’s email address) and password (a password).  According to the ancient custom, here I have used foo@bar.com as user’s email address, and the password is foobarRequests delivers these values to the form url.

The script goes on to define the vpn_check() function. As this is a public wifi hotspot I use a vpn service, Invisible Browsing VPN aka ibVPN.  The vpn_check() function checks whether the computer is using a vpn by comparing the public ip address to that used by the vpn service.  Here the vpn ip address is represented by X.X.X.X.  If the ip address is the same as the vpn’s address, the script terminates.

Now the script proper starts.  It checks whether we are already signed in to the BTWifi service.  This is performed by going to a particular url – https://www.btopenzone.com:8443/home and examining the html source code.  If the computer is already signed in, that webpage will redirecte us to http://home.bt.com/bt-wifi-01364197228851.  The first thousand characters of that page’s html source code contains the string “DANTE”.  If the string is present, we know we are signed in and the script terminates.  If the string is not present, the computer is either using a vpn or is not signed in to BTWifi.

 

So the script performs the vpn_check(), using the online service at http://www.icanhazip.com to check the computer’s public ip address.  If this matches the vpn ip address, X.X.X.X we know the computer is signed into BTWifi and using the vpn.  If the public ip address does not match the vpn ip address, we deduce that we are not using the vpn and therefore we are not signed in.  So a pop-up message tells the user that we are not signed in, and if the user wants to sign in he should click the OK button.  If he clicks the button, the script goes on to the log_in() function, to sign in to BTWifi.

With log_in() the script navigates to the sign-in form at https://www.btopenzone.com:8443/TBBLogon, and fills in the form fields with the values.  We are signed in, and the script terminates.

On my computers, which use either Windows 7 or Windows 8.1 operating systems, I have scheduled this script to run every 5 minutes.  It regularly checks the computer’s signed-in status, putting up a message if the computer is no longer signed in. The message box says : “Signed OUT, click me to sort it.” Click the button and the script signs into the wifi.  This is much less stressful than having the palaver of going to the wifi sign-in page and dealing with the form.

This script is very much a work in progress.  Look at the code and you will see a number of lines commented out.  Uncommented, these lines of code provide confirmation when the script finds out it is signed into the wifi or using the vpn.  These were used for testing.  I intend to comment out the message that we are not signed in, and have the script deal with it in the background.  This will allow me to work online or watch a streaming video without interruption – unless a connection problem arises!

I have found that sometimes there is a connection error, python raises an exception and program exception is interrupted. If I’m running the script in IDLE the exception output is printed in the interactive shell, but if it is working in the background, scheduled to run every 5 minutes I won’t get any error info.  I am going to see if a try/except block will deal with it. I plan to have basic error info printed in a pymsgbox pop-up.  I can then investigate what’s up with the connection, whether the problem is with the hot-spot or my own hardware. Sometimes when I’m experiencing connection problems, I run diagnostics on network connection and Windows resets my network adapter and that fixes the problem!

If anyone has any suggestions about this script please let us know in Comments.  Constructive criticism is welcome.  If anyone else finds this helpful (perhaps you also use a BTWifi-with-FON hot spot?), let us know!  And maybe buy me a coffee…?  🙂

Buy Me A Coffee


RFC for new HTTP codes

25/06/2018
webopedia-404-error

HTTP error code, shamelessly borrowed from webopedia.com. Thanks Webopedia!!

I was watching some DEFCON talks on Youtube and came across a reference to an RFC for “a new series of HTTP status codes covering developer fouls”, the 7XX range.  Here are some examples:

701 – Meh

718 – I am not a teapot

721 – Known Unknowns

722 – Unknown Unknowns

725 – It works on my machine

726 – It’s a feature, not a bug

739 – Fucking Windows

759 – Unexpected “T_PAAMAYIM_NEKUDOTAYIM”

771 – Cached for too long

772 – Not cached long enough

773 – Not cached at all

774 – Why was this cached?

775 – Out of cash

786 – Try it now

791 – The Internet shut down due to copyright restrictions

796 – Some DNS fuckery idno

797 – This is the last page of the Internet. Go back!

RFC is by and copyright of John Barton 2012-17, released under Creative Commons license Attribution-NonCommercial-ShareAlike 4.0 International

bmc-orange


The Cypherpunk Manifestos

24/06/2018

Reading a lot about privacy and anonymity and cryptography and cryptocurrency and Darknet hidden services and Tor lately.  Something that has caught my attention is the Cypherpunk movement, and their manifestos.

bitcoin

Without anonymous currency, we don’t have real anonymity

The earliest one seems to be The Crypto Anarchist’s Manifesto, written by Timothy C May in 1988.  Here’s a link to it.  Written thirty years ago, but very of the moment even now.  Read how it opens:

Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.

A cypherpunk’s manifesto” by Eric Hughes, is also very relevant, even though it is 26 years old.  Here’s a bit:

Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can’t get privacy unless we all do, we’re going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don’t much care if you don’t approve of the software we write. We know that software can’t be destroyed and that a widely dispersed system can’t be shut down.

Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation’s border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.

This is stuff that could have been written yesterday.  The technologies required for true anonymity have broken out fairly recently: encryption, cryptocurrency, all this has come to a head now.  If we don’t seize this opportunity, maybe we don’t deserve it.

bmc-yellow


Darknet part 2: the Silk Road

24/06/2018
alex-winter-keanu-reeves

Alex Winter, director of “The Deep Web”, with co-star from the Bill & Ted movies Keanu Reeves

Welcome to part 2 of my mini-series of content related to the Darknet.  This time I want to share with you the documentary film “The Deep Web” directed by Alex Winter.  Its subject is the Silk Road and it poses some important questions about who did what and why.  It’s an interesting and entertaining film.  It questions some of the so-called “facts” we have taken for granted about the hidden marketplace.  And we wonder: who really was “Dread Pirate Roberts”, the shadowy “leader” of the Silk Road?

Coming soon: Darknet users who were caught, and what they did wrong

bmc-purple


Darknet Part 1: What is the darknet and why should I care?

23/06/2018

 

Welcome to Part 1 of my guide to the Darknet.  Well, I say “mine” but it’s actually by many people.  And, just so you all know I’m not trying to pass off this guide as my own words, I’m going to show the words actually coming out of their true creators’ mouths, thanks to the miracle of video streaming over the internet! Thanks be to Youtube,eh!!

Okay, part 1 of this series is a primer on the Deep Web and the Darknet.  It’s a TEDx talk by Alex Winter (of Bill & Ted fame), entitled “The Darknet isn’t what you think”.  There are some misconception about what illegal services were available through the Silk Road website.  For instance child pornography was banned.  Stolen goods weren’t allowed.  Ads for contract killers weren’t allowed.

Anyway, check out the vid.  Enjoy!

Next time: A film about the rise and fall of the Silk Road

 


How to get a bash shell on Windows 7 & 8

22/06/2018

Windows 10 has a built-in bash shell. I use Windows 7 and 8.1 so I was dead jealous. But I’m also an inveterate  googler, so I googled “bash windows” and found two different ways to run a bash shell on the versions of  Windows that I use: git-bash and MSYS2.

Git-bash is part of Git for Windows (“We bring the awesome Git SCM to  Windows”); MSYS2 is “a software distro and building platform for Windows” based  on Cygwin but because it is just providing a CLI (no X-server, no GUI) it is fast enough and not so buggy. Both use the MinGW  terminal, and both provide a pretty full bash environment. They were made so developers can work on Windows apps but retain the *nix-like environment.

git-bash

git-bash MINGW64 terminal

MSYS2 uses the pacman package manager, and has software repos so users can install extra packages (eg  openssh). Git-bash doesn’t provide extra installation as such: but as it runs Windows .exe apps, it is  possible to install .exes and, by placing them strategically you can run them in the terminal window – I  have so far been able to install nmap and wget to run on the command line. To get wget on git-bash, I  downloaded the standalone wget executable and placed it on the $PATH. To get nmap to work, I edited $PATH  so it included /c/Program Files (x86)/Nmap.

msys2-bash-terminal

The MSYS2 terminal

I haven’t decided which one I prefer – I’m currently running them side-by-side. One bugbear with git-bash  is that to run python the user has to prefix it with “winpty”. Winpty is “a Windows software package providing an interface similar to a  Unix pty-Master for communicating with Windows console programs”. Interestingly it is described as a tool  for Cygwin and MSYS2, but it is not needed for MSYS2 to run python; just git-bash (well, for python anyway – maybe I just haven’t yet come across a need for it in MSYS2).

Has anyone else here tried these? Any other ways to run a *nix shell on Windows?  Let us know what you think!

 bmc-orange


Less than a day to save the internet

19/06/2018

On 20 June 2018, less than 24 hours from now, the European Parliament votes on whether to adopt the Directive on Copyright in the Digital Single Market – a $60 million filter to automate takedown of copyrighted material from Youtube.  This is a compromise measure that no one really wants:

Big rightsholders say that it still lets crucial materials slip through the cracks. Indie rightsholders say that it lets big corporations falsely claim copyright over their works and take them down. Google hates Content ID because they spent $60,000,000 developing a system that makes everyone miserable, and YouTubers and their viewers hate it because it overblocks so much legit content.

But all of this has escaped the EU’s notice. Under Article 13 (which will be voted up or down in a key committee on June 20), every EU platform will be obliged to filter everything users post — not just videos, but stills, audio, code, games, text, everything.

No filter exists that can even approximate this, and the closest equivalents are mostly run by American companies, meaning that US Big Tech is going to get to spy on everything Europeans post and decide what gets censored and what doesn’t.

But we can stop it, by contacting the members of the committee and telling them what a mistake it would be to vote for the Directive.  You can tweet and email the committee members using this online tool.

So if you want to automate internet censorship and destroy the creative media, do nothing.  But if you’re not a colossal idiot, contact the MEPs and tell them to vote against Article 13.

hulk-against-article-13

Learn more about Article 13

Contact the MEPs

 
bmc-black


Thanks for all the goati!

19/06/2018

Goati makes me smile.  It is, says Wikipedia,  “a creative respelling of the word fish, used to illustrate irregularities in English pronunciation and spelling.”  It is often attributed to George Bernard Shaw, a supporter of the cause for English spelling reform, but does not appear in any of his known writing.  It is pronounced like so:

gh as in enough or rough,
o as in women,
ti as in nation or motion
So, is pronounced fish.

But there’s another work that plays with English’s eccentric pronunciation and spelling – a poem titled “The Chaos”, by Dutch writer, traveller and teacher Gerard Nolst Trenité.

Dearest creature in Creation,
Studying English pronunciation,
⁠I will teach you in my verse
⁠Sounds like corpsecorpshorse and worse.
It will keep you, Susybusy,
Make your head with heat grow dizzy;
Tear in eye your dress you’ll tear.
⁠So shall I! Oh, hear my prayer,
Pray, console your loving poet,
Make my coat look new, dear, sew it?
⁠Just compare heartbeard and heard,
Dies and dietlord and word,
Sword and swardretain and Britain,
(Mind the latter, how it’s written!)
Made has not the sound of bade,
⁠Say—said, pay—paidlaid, but plaid.
Now I surely will not plague you
With such words as vague and ague,
⁠But be careful how you speak,
⁠Say breaksteak, but bleak and streak,
Previouspreciousfuchsiavia;
Pipesniperecipe and choir,
Clovenovenhow and low;
Scriptreceiptshoepoemtoe,
Hear me say, devoid of trickery:
Daughterlaughter and Terpsichore,
Typhoidmeaslestopsailsaisles;
Exilessimilesreviles;
Whollyhollysignalsigning;
Thamesexaminingcombining;
Scholarvicar and cigar,
Solarmicawar and far.
From “desire”: desirableadmirable from “admire”;
Lumberplumberbier but brier;
Chathambroughamrenown but known,
Knowledgedone, but gone and tone,
OneanemoneBalmoral;
Kitchenlichenlaundrylaurel;
GertrudeGermanwind and mind;
SceneMelpomenemankind;
Tortoiseturquoisechamois-leather,
ReadingReadingheathenheather.
⁠This phonetic labyrinth
⁠Gives mossgrossbrookbroochninthplinth.
Billet does not end like ballet;
Bouquetwalletmalletchalet;
Blood and flood are not like food,
⁠Nor is mould like should and would.
Banquet is not nearly parquet,
Which is said to rime with “darky”.
Viscousviscountload and broad;
Toward, to forward, to reward,
And your pronunciation’s O.K.
When you say correctly croquet;
Roundedwoundedgrieve and sieve;
Friend and fiendalive and live;
Libertylibraryheave and heaven;
Rachelachemoustacheeleven.
⁠We say hallowed, but allowed;
Peopleleopardtowed, but vowed
Mark the difference, moreover,
Between moverploverDover,
Leechesbreecheswiseprecise;
Chalice but police and lice.
Camelconstableunstable;
Principledisciplelabel;
Petalpenal and canal;
Waitsurmiseplaitpromisepal.
Suitsuiteruncircuitconduit
Rime with “shirk it” and “beyond it”,
⁠But it is not hard to tell,
⁠Why it’s pallmall, but Pall Mall.
Musclemusculargaoliron;
Timberclimberbullionlion,
Worm and stormchaisechaoschair;
Senatorspectatormayor.
Ivyprivyfamousclamour
And enamour rime with “hammer.”
Pussyhussy and possess.
Desert, but dessertaddress.
Golfwolfcountenancelieutenants
Hoist, in lieu of flags, left pennants.
Riverrivaltombbombcomb;
Doll and roll and some and home.
Stranger does not rime with anger,
Neither does devour with clangour.
Soul, but foul and gaunt, but aunt;
Fontfrontwontwantgrandandgrant,
Shoesgoesdoes.[1]) Now first say: finger,
And then: singergingerlinger.
Realzealmauvegauze and gauge;
Marriagefoliagemirageage.
Query does not rime with very,
Nor does fury sound like bury.
Dostlostpost and dothclothloth;
JobJobblossombosomoath.
Though the difference seems little,
We say actual, but victual,
SeatsweatchastecasteLeigheightheight;
Putnutgranite, but unite.
Reefer does not rime with “deafer,”
Feoffer does, and zephyrheifer.
DullbullGeoffreyGeorgeatelate;
Hintpintsenate, but sedate;
ScenicArabicpacific;
Scienceconsciencescientific;
Tour, but our, and succourfour;
Gasalas and Arkansas!
Seaideaguineaarea,
PsalmMaria, but malaria;
Youthsouthsoutherncleanse and clean;
Doctrineturpentinemarine.
Compare alien with Italian,
Dandelion with battalion,
Sally with allyyeaye,
EyeIayayewheykeyquay!
Say aver, but everfever,
Neitherleisureskeinreceiver.
⁠Never guess—it is not safe;
⁠We say calvesvalveshalf, but Ralf!
Herongranarycanary;
Crevice, and device, and eyrie;
Face but preface, but efface,
Phlegmphlegmaticassglassbass;
Large, but targetgingiveverging;
Oughtoutjoust and scour, but scourging;
Ear, but earn; and wear and tear
⁠Do not rime with “here”, but “ere”.
Seven is right, but so is even;
HyphenroughennephewStephen;
Monkeydonkeyclerk and jerk;
Aspgraspwasp; and cork and work.
Pronunciation—think of psyche!—
Is a paling, stout and spikey;
⁠Won’t it make you lose your wits,
⁠Writing “groats” and saying groats?
It’s a dark abyss or tunnel,
Strewn with stones, like rowlockgunwale,
Islington and Isle of Wight,
Housewifeverdict and indict!
Don’t you think so, reader, rather,
Saying latherbatherfather?
⁠Finally: which rimes with “enough,”
Thoughthroughploughcoughhough, or tough?
Hiccough has the sound of “cup”……
My advice is—give it up!

So… English.  I don’t know if it has the desired effect of helping students to learn English pronunciation/spelling (or even if that is a true reason for its existence) but it certainly helps me to smile.

Buy Me A Coffee


McCormack Tesla bursts into flames on Twitter

17/06/2018

Actor Mary McCormack posted this video footage on Twitter of her husband’s Tesla electric car bursting into flames.  Flames shot out from underneath the vehicle as it sat in traffic on the streets of West Hollywood.  Mary McCormack tweeted that the fire was not as a result of an accident, which suggests to me that this “just happened.”  I’m wondering if this means it is a “feature” of Teslas rather than a bug?

Actually, to be fair to Tesla, McCormack did say that the incident “came out of the blue”, which does rather suggest that the incident is something of a one-off.  However, when you take into consideration the rather deadly nature of Tesla-related incidents lately, one really does need to wonder if it is the most sensible electric car make to buy at the moment.  Tesla called the incident “an extraordinarily unusual occurrence” and said it was investigating.

In no way do I mean to suggest that Tesla electric cars are more dangerous than their competitors.  As far as I know, all electric cars are death-traps!  Or perhaps none of them are – other than the ones I’ve reported on recently, of course!!  😉

bmc-orange