Current Selector’s Name

So… suppose you wanna log the name of the ‘current’ method. You could hardcode the method name, right there… virtually everywhere… or you can do this:

[cc lang=”objc”]
NSLog(@”[ %@ ] did something”, NSStringFromSelector(_cmd));
[/cc]

It’s simple. Yet, its something i didn’t know… three days ago!.

Coda 2 for OSX

Time has come to write few lines about Panic’s fellows. This week they have released an awesome tool named ‘Coda‘. For those who never heard about it, it’s an html editor. I’ve tested TextWrangler, TextMate, BBEditor, Sublime, just to name few. But this one has everything already in there.

It has svn / git integration, and it’ll also allow you to upload your new websites to Amazon S3, or any webhosting you might be using.

Furthermore, if you buy it through the AppStore, you’ll get iCloud Sync. Which means that your website-credentials are gonna be stored safely in Apple’s backends.

These days i’m not thaaaat into HTML editing. But i’m using this dude to do my svn commits (i don’t like Xcode’s svn integration… haven’t you noticed?).

If you’re looking, by chance, for an HTML editor for OSX… just give coda a try. You won’t regret it. They even have an iPad version..!

Bruteforcing WEP Keys

Today… we’ll take a look at WEP key-breaking. We’ll use a linux live-cd distribution called backtrack. It’s a linux distribution bundled with a load of hacking / cracking tools. It’s free, and it’s pretty cool.

So… first step… download and burn it!.
I’ll assume you know how to boot it and launch a bash terminal. Let’s begin from there.
We’re gonna use two command-line tools: airodump-ng and aircrack-ng. So… let’s open a terminal, and type the following commands:

[cc lang=”bash”]
airmon-ng start [interface]
(Your interface is probably gonna be called something like wlan0…  you can check the available interfaces with ifconfig command).
airodump-ng wlan0 –write OUTPUT-FILE
[/cc]

What’s going on here?. Airmon will set your wifi card into promiscuous mode. Which means that it won’t just let you see packets sent to your own mac address. Instead, you’re gonna need to monitor all of the traffic in the air.

On top of that, airodump-ng will dump into a file all of the traffic recorded. Why?. In order to successfully crack a WEP key, you need to gather at least 10k ‘Initialization Vectors’. We’re not gonna get into details of what is that… not in this post. But the point is that.. wanna crack a WEP… need a lot of traffic.

Let’s go on. Launch a second bash terminal, and type the following:

[cc lang=”bash”]aircrack-ng OUTPUT-FILE-01.cap[/cc]

This second tool is gonna ask you which network is it that you wanna crack, and it’ll try to break the WEP encryption. If it’s unable to do it with the current traffic log, you’ll get a message saying something like ‘try with 10000 IVs’, or ‘try with 15000’.

It’s just a matter of time now…

Santana goes Shapeshifter

I’m not really sure how this works. It’s as if a lot of musicians wanted to put out, all together, new records. It’s pretty cool to find out that there are new albums of your favorite artists… yeah!.

I’ve been listening to Santana’s latest album, Shapeshifter. As a friend of mine always says, he’s been playing the same notes for the last 30 years, or so. But anyways, he’s great at doing it. So i really recommend you check it out..!

My favorite track, for whatever reason, is called ‘Dom’. He’s just a genius!.

Tracklisting: 
01. Shape Shifter 6:15
02. Dom 3:51
03. Nomad 4:48
04. Metatron 2:38
05. Angelica Faith 5:02
06. Never The Same Again 5:01
07. In The Light Of A New Day 5:06
08. Spark Of The Divine 1:02
09. Macumba In Budapest 4:01
10. Mr. Szabo 6:19
11. Eres La Luz 4:50
12. Canela 5:22
13. Ah, Sweet Dancer 3:08

Twitter iOS SDK

I recently had to integrate one of my apps with Twitter. Let me say you something. I HATE TWITTER guys. Why?. Because everything is soooo complicated. Although there is a direct integration between Twitter and iOS 5, they have made it really hard for developers.

Why?. If you need to post tweets, backend side, you need to ask for ‘Reverse Auth‘ permissions.. and it’s not something that can be done automatically. They have to personally approve this.

So… if you’re like me, stressed dealing with those guys, check this out: https://github.com/bengottlieb/Twitter-OAuth-iPhone.

What is that?. A nice iOS library, which implements OAuth authentication against twitter servers. I’m tuning it, just a little bit. There is a ‘PIN’ mechanism implemented right there, which i’m not particular fond of. But besides that, it’ll help you open a WebView as a modalViewController, and authenticate the user into twitter.

Not the best i’ve imagined.. but the problem is solved. My idea is to implement a hybrid. If the user has no credentials stored in iOS 5, then i’ll fall back to this framework. Makes sense.. right?.

%d