1.7 default tls1
-Dhttps.protocols=SSLv3,TLSv1,TLSv1.1,TLSv1.2
-Djavax.net.debug=ssl
1.8 default tls1.2
1.7 default tls1
-Dhttps.protocols=SSLv3,TLSv1,TLSv1.1,TLSv1.2
-Djavax.net.debug=ssl
1.8 default tls1.2
https://groups.google.com/a/chromium.org/g/chromium-dev/c/urswDsm6Pe0
https://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
https://aws.amazon.com/builders-library/making-retries-safe-with-idempotent-APIs/
https://answers.sap.com/questions/13359226/preventing-http-retry-requests-eg-via-approuter.html
LC_CTYPE=zh_TW.big5 7z x file.zip
LC_CTYPE=zh_TW.big5 busybox unzip file.zip
TODO: filename in big5
ls -i
find . -inum 12321475 -exec mv {} new-filename \;
find . -inum 12321475 -print0 | xargs -0 mv -t new-filename
wmctrl
wmctrl -d
wmctrl -l
wmctrl -i -a <win id>
wmctrl -i -r <win id> 0,x,y,w,h
wmctrl -lx
0x00a00002 1 aterm.XTerm box Terminal
0x01000002 1 google-chrome.Google-chrome box WeChat/Weixin for Web - Google Chrome
0x01000005 1 google-chrome.Google-chrome box about:blank - Google Chrome
0x01000006 1 google-chrome.Google-chrome box QR-slot.png (500×500) - Google Chrome
wmctrl -i -r 0x01000005 -e 0,150,40,1000,800
wmctrl -i -r 0x01000002 -e 0,0,140,900,800
xdotool
xdotool search wechat
xdotool search ""
sudo tc qdisc add dev eth0 root netem delay 200ms
sudo tc qdisc del dev eth0 root netem delay 200ms
sudo tc qdisc add dev eth0 root netem delay 1000ms
sudo tc qdisc del dev eth0 root netem delay 1000ms
sudo tc qdisc del dev eth0 root netem delay 2000ms
M1
S50
UID
UFUID
FUID
CUID
rc522
pn532
https://github.com/ikarus23/MifareClassicTool
https://github.com/ondryaso/pi-rc522
https://github.com/mxgxw/MFRC522-python
https://stackoverflow.com/questions/41326384/re-writing-uid-and-block-0-on-chinese-supposed-to-be-writable-mifare-1k-card-i
There are 2 types of UID writeble cards:
Block 0 writable cards: you can write block 0 at any moment
Backdoored cards
If writing block 0 does not work, you probably have a backdoored card: To enable the backdoor, you need to send the following sequence to the card: (everything in hexadecimal)
RC522 > Card: 50 00 57 cd (HLTA + CRC)
RC522 > Card: 40 (7 bits only)
Card > RC522: A (4 bits only)
RC522 > Card: 43
Card > RC522: A (4 bits only)
Then you can write to block 0 without authentication. If it still does not work, your card is probably not UID changeable.
芢聆湮苤: 褫夔岆 1024-byte 湮苤腔縐
楷冞: 50 00 57 cd
楷冞: 40 (7 bits)
彶善: a (4 bits)
楷冞: 43
彶善: 0a
Name Pin # Pin name
SDA 24 GPIO8
SCK 23 GPIO11
MOSI 19 GPIO10
MISO 21 GPIO9
IRQ None None
GND Any Any Ground
RST 22 GPIO25
3.3V 1 3V3
sudo raspi-config
spi
remote-gpio
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install python3-dev python3-pip
sudo apt-get install python-spidev python3-spidev
???
sudo pip3 install spidev
sudo pip3 install mfrc522
git clone https://github.com/lthiery/SPI-Py.git
cd SPI-Py/
git checkout 8cce26b9ee6e69eb041e9d5665944b88688fca68
git checkout 8cce26b9ee6e69eb041e9d5665944b88688fca68
git checkout -b 8cce26b9ee6e69eb041e9d5665944b88688fca68
sudo python setup.py install
sudo python3 setup.py install
git clone https://github.com/mxgxw/MFRC522-python.git
cd MFRC522-python
python Read.py
注意:0扇区不能随意乱写,0扇区写不符合算法规则的数据会导致卡片锁死。
byte0-byte3 为UID
byte4 为check byte 算法 byte4 = byte0 ^ byte1 ^ byte2 ^ byte3
byte5为0x08
byte6 为0x04,
byte7 为0x00,Byte5,Byte6和byte7是m1卡片类型不可随意更改。
https://www.gushiciku.cn/pl/pi9z/zh-tw
https://www.tspweb.com/key/%E6%89%8B%E6%9C%BAnfc%E6%9A%B4%E5%8A%9B%E7%A0%B4%E8%A7%A3ic%E5%8D%A1%E5%AF%86%E9%92%A5.html