I learned how to make a monkey tool today. Monkey tools can be used for dressing tenons. The basic procedure is as follows.
Take 1in square stock and chamfer the edges. Take a slot punch and move it about an 1in from the corner - this is the hammer end. Line the slot punch up very carefully, so that its straight and divides the stock in the middle. Hit it a couple times to get a registration. Now, get the stock nice and hot, align the slot punch with the registration, hit it hard three times, cool the slot punch in water, rotate it by 180 degrees and repeat. At some point, the slot punch is almost through, flip the stock over and use the slot punch to punch out the remaining piece of metal. Now, use a drift to open up the hole to the desired size. Start the drift from the other side of the slot. Doing this over the hardy hole is a good idea. With the slot still inserted, dress up the faces. Then chamfer the corners. Cut off the other side for the length of the tenon and drill a hole of the right size.
That's it. Out of the four holes I drifted only two came out sort of in the middle
To get better control over the atmosphere in the forge, I have decided to build a blown gas forge based on a design
by Tim Zowada. The basic structure is provided by a 10 gallon compressed air tank I picked up from Lowes. Using Tim's forced-air manifold,
the forge should easily get up to welding temperature (2300F).
Jon who runs the TemperChi Glass Art Studio
is helping with building this thing and already has some cerawool for lining the inside. The Cerawool is going to get covered with a 1/4in layer of Satanite and then with an ITC-100 coating. The forge floor will be made from Bubble Alumina refractory
which has a heat rating of up 3300F and is supposed to be very resistant to flux. The inside diameter of the forge will be 8 inches and the length about 12 inches.
If you are interested in making glass beads
, you can learn that at the shop, too, as well as welding
A list of the top-10 malware
sites found by Google's infrastructure over the last two months is available at the Google Online Security Blog
. Gumblar and Martuz are among them as well as googleanalytlcs.net
. There certainly have been lots of compromised web servers recently.
The 2nd USENIX LEET workshop is going to take place on April 21st in Boston next week. The workshop program
looks really interesting. There are a number of really interesting talks; here are just a few:
- Spamcraft: An Inside Look At Spam Campaign Orchestration
- A Foray into Conficker's Logic and Rendezvous Points
- A View on Current Malware Behaviors
Last year's workshop was a blast and I expect that next week is going to be lots of fun, too. It is still possible to register on-site
for the workshop.
In preparation for CodeCon
, Nick and I wanted to see how HTTP performance differs between Libevent 1.4 and Libevent 2.0. HTTP is a good test case as it exercises many of the optimized components. Here is a preliminary result.
The libevent HTTP server is serving 200,000 bytes of content for each request. Apache's benchmark tool ab
was used to make 15,000 requests with 40 requests happening in parallel.
Requests per second: 1450.79 [#/sec] (mean)
Requests per second: 1961.99 [#/sec] (mean)
- 2.0 (evbuffer_add_reference):
Requests per second: 3979.31 [#/sec] (mean)
In Libevent 2.0, the evbuffer interface was rewritten to avoid memory copies where possible. This seems to result in a 35% performance improvement. The evbuffer_add_reference()
API allows external memory to be associated with an evbuffer and thus avoids another memory copy. This results in about 100% performance increase. In comparison to Libevent 1.4, this is almost 175% faster.
In the meantime, Nick is working on making IOCP available for Windows
WOOT is the Workshop on Offensive Technologies
. This year, it's being held for the third time and the call for papers
just came out. Submissions are solicited for a variety of interesting topics including:
- Vulnerability research (software auditing, reverse engineering)
- Exploit techniques and automation
- Malware design and implementation (rootkits, viruses, bots, worms)
The last two years were a lot of fun and this years organizers are an eclectic bunch
of well known folks. If you have anything in the works, go submit it and we will see you at the workshop.