m d3velopment a technical and security blog


Ford Ranger Wildtrak 3.2 Hacks & Tricks

Ranger 1As a service to others and a reminder to myself I am going to use this post to document various hacks and tricks I have discovered with the 2014 Ford Ranger Wildtrak 3.2. Most if not all of these tricks will work on other Ford Ranger models and on some Ford vehicles.

1. Follow Me Home Lights

When you exit your vehicle and don't want the "follow me home" safety lights or parking lights on, simply flash the head light flasher (left stick) and they will go out. You can also use this to turn the light on and off when the engine is turned off.

2. Roller Shutter (Wildtrak Only)

If you want to open the roller shutter a quarter-way (rather than fully), when you open the shutter grab the return strap and pull it to the left. This resets the latch mechanism and the shutter will stop at the first latching point. If you want to open the roller shutter completely pull the strap to the right and the latching mechanism will release.

3. Seatbelt Alarm

A seatbelt alarm sounds in the Ranger when the speed exceeds 20 km/hr and the driver or front passanger are not wearing a seat belt. Whilst this is a great safety feature it can also be a great irritation if you are simply moving your card in your drive way. To disable the seatbelt alarm completely:

a.  Turn key to ignition or start car,
b. Wait for seatbelt indicator light to go out on the dash,
c. Plug in and unplug seatbelt 4 times within 10 seconds, the seatbelt warning light will flash for a few seconds,
d. Once the seatbelt warning light stops flashing then the seatbelt alarm will be disabled for that seat. Repeat for any other seat/s in the vehicle as needed.

4. Window Reset

If you experience issues with your windows auto up/auto down after having had the battery disconnected:

a. Run window all the way up & release the switch,
b. Push switch up for another 5 sec or so, you will hear a click,
c. Run window all the way down and repeat the release, reapply, hold on sequence,
d. Window should now work with auto up and down.

5. Headlight Auto Mode Auto Off / Parker Lights Off

In headlight auto mode, if you want your headlights to switch of immediately when locking your ranger dip your high beam stalk once.

To turn of your parker lights off when door/doors left open dip your high beam stalk twice, this will lessen your chances of a flat battery.

Filed under: Vehicles No Comments

Norton ConnectSafe

Norton ConnectSafe is a free public DNS service offered by Symantec Corporation that claims to offer a faster and more reliable web browsing experience while blocking undesirable websites.

Users can use Norton ConnectSafe by setting their DNS server addresses to those of the Norton ConnectSafe servers. Client software for Windows, Mac OS X, and Android is available to automatically configure devices to use Norton ConnectSafe.

DNS queries routed through Norton ConnectSafe are checked using the Norton Safe Web database to ensure that they do not point to malicious or inappropriate websites. Symantec thus seeks to block malware and phishing attempts, as well as pornographic and inappropriate websites if the user desires.

Policy A — Security

This policy blocks all sites hosting malware, phishing sites, and scam sites. To choose Policy A, use the following IP addresses as preferred and alternate DNS server addresses:

Policy B — Security + Pornography

In addition to blocking unsafe sites, this policy also blocks access to sites that contain sexually explicit material.

Filed under: Security Continue reading

Windows 8 ‘godMode’

Although its name suggests perhaps even grander capabilities, Windows enthusiasts are excited over the discovery of a hidden "godMode" feature that lets users access all of the operating system's control panels from within a single folder.

To enter "godMode," one need only create a new folder and then rename the folder to the following:


Users are able to have a single place to do everything from changing the look of the mouse pointer to making a new hard-drive partition.

The trick is also said to works with Windows Vista, Windows 7 and Windows 8.

Filed under: Windows No Comments

Critical OpenSSL security exploit (aka Heartbleed)

Important: Critical OpenSSL security exploit

A serious vulnerability has been discovered in OpenSSL (the most popular SSL module used on Linux based servers). This exploit allows a third party to steal information that would otherwise be secured and encrypted with the SSL/TLS protocol.

If you have a virtual server (VPS) or dedicated server you urgently need to apply the latest OpenSSL patches. Instructions below -


  1. Login to WebHostManager
  2. Go to cPanel in the left hand menu
  3. Click Upgrade to Latest Version
  4. Follow upgrade instructions
  5. Go to Software in the left hand menu
  6. Click Update System Software
  7. Follow upgrade instructions

SW-Soft Plesk

  1. Login to the Plesk Control Panel
  2. Go to to Settings
  3. Run the Plesk Updater

For the CentOS operating system:

  1. SSH in as root
  2. Run the command ‘yum update’ from the command line
  3. Yum will update the at-risk packages

For Ubuntu or Debian operating system:

  1. SSH in as root
  2. Run the command ‘apt-get update && apt-get upgrade’

If you need assistance patching your systems consider contacting a technical services company such as Aorta Consulting.

Filed under: Linux, Security No Comments

Sysdig – Linux System Troubleshooting Tool

Sysdig is an open source Linux system troubleshooting tool which allows you to capture system state and activity from a running Linux instance, then save, filter and analyze it. It includes strace, tcpdump, lsof and a number of other utilities all compiled into one Swiss-army style tool.

Sysdig is designed to simplify system level troubleshooting, in-particular distributed, virtualized and cloud-based environments. Sysdig captures system calls and other system level events using a linux kernel facility called tracepoints, which means much less overhead than strace. It then “packetizes” this information, so that you can save it into trace files and filter it, a bit like you would do with tcpdump. This makes it very flexible to explore what processes are doing.

For installation instructions please click here.

Filed under: Linux No Comments