FujiFilm x100F Day One test

FujiFilm x100F camera, day one, testing without cracking the manual open (as yet … and yes, I’ll read it cover-to-cover several times over).

First test shot, Aperture Priority:

Crazy-high ISO (read, 3200!), but still came out more than acceptable in the final result (pixel-peep to see the noise/grain) for web use and general tom-foolery. And of course, my trusty sidekick was around to be my Guinea pig.

Second test shot, still Aperture Priority, with Acros film simulation (2500 ISO):

She really, really dislikes the Auto-Focus beeping.

Finally, we went out to test some outdoor shots at the pavilion mall nearby. There was hardly a soul around … figures, right? The below was a complete blind shot, not looking through the viewfinder nor the LCD on the back of the camera. Obviously 1/60 shutter speed selected automatically wasn’t quite enough, and I should have used continuous focus rather than single-shot. But, I just wanted to test. Back in my DSLR days, I rarely shot auto-anything (as far as the exposure triangle … I found auto-focus to be pretty spot on with my old gear). I’ll put this little rig through its paces over the next few months to see what it’s capable of handling, and decide from there what I need to manually set.

But with only dabbling for about a dozen shots, most of them testing the various film simulations in jpg files, I am duly impressed with this camera. It’s got mojo and soul. Lots of it. Fuji was a bit color-blind when it came to labeling the box for my tele-converter lens, however. Ordered black, and got silver from Amazon. Can’t blame Amazon, as the outer shipping box straight from Fuji had a “black” label on it. The inner product box was correctly labeled silver, though. It does give off that quasi-Leica vibe with the black body and silver attachment lens, and my son really likes the two-tone look, so I kept it. Black… silver… they both take the same quality of photos.


Desktop Furball

Link here.

This would be why I can’t seem to get anything done at my desk in the evenings…

Matlock at the Border

Every photo should tell a story. (Sometimes, I like to make them up…)

Gretta and Elza just finished the heist of the week … knocked over an ATM and planned on high-tailing it to Vegas with their $12,000 windfall. But first, they knew they had to lay low for a bit. Let the heat die down.

What better place to throw the fuzz off their tail than a Taco Bell.

Our wily protagonist Matlock, however, wasn’t fooled so easily. His fatal mistake was approaching their table as they finished their tacos. He never saw them slip the tranquilizers into his Baja Blast Mountain Dew. By the time has was fast asleep, drooling on his Oxford shirt, they were on the open road of Interstate 40 in a stolen Chrysler 300 … giggling like schoolgirls to Dr. Dre and Snoop blaring on the radio.

Ville of Biscuits

Link here.

I’ve been allowing myself to get back into photography after a five or six year hiatus. I have certainly missed the fun of shooting (particularly street photography), but I have certainly not missed the requests for work done for free. That was the main reason I sold all my gear so many years ago. But here I am, and enjoying it all quite a bit (on the quiet).

The above photo was taken and processed by me. Shot with a Samsung S8. Mmhm, you read that correctly. A smart phone that can shoot in RAW format. Toss it into Lightroom, then call it a day. Simple, just the way I like it. Zing.

Get REKT – Win10 Edition 

WARNING: This post is for educational purposes only. Well, that and possibly to underscore the importance of full-disc encryption (FDE) of a machine in the event an adversary has physical access to the computer but not the account passwords. Play nice, kids.

As much as I want to get some of my fiction writing up here, far too many opportunities arise in the technology security arena. And … well, I can’t just leave a sleeping bear lie… I have to poke it several times with a sharp stick.

Let’s say you work in I.T. and need to gain access to a computer of an old employee but they disabled your admin and maintenance accounts in Win10.  Or, you only have a local account (good choice, you) on a Win10 machine and somehow forgot your login password (bad luck, you). Or you simply want to break into a Windows account on a computer you physically have (stolen, from your cheating spouse that ran off with Nigerian royalty to cash in a massive bank account … whatever – I’m not here to judge and this is supposed to be theoretical).

Breaking into a Windows computer without a password or password-reset disc should be difficult, right? Wrong. Five reboots and five tiny commands are all it takes. Let’s dive in:

First, you want to get a Command Prompt at the Windows login screen (you know, where you would normally enter the password that you obviously don’t have). This is primarily done by getting into the Recovery mode of the machine. Don’t have a Recovery Disc or similar? No problem… Windows 8 and 10 will automatically go into Recovery mode after three failed boot-up sequences. In other words, power on the computer, let the computer get somewhere in the boot-up process (but before the login screen appears) and pull the power plug. Sure, this is potentially damaging to the Operating System, but if you want to make an omelette you have to break a few eggs.

In the Recovery section, usually under Advanced Options, there should be a choice for Command Prompt. But alas, this terminal is locked to only the recovery partition (like the X: drive of the system). DOS commands to change directory (cd) will not work. Stuck like Chuck, right?


Not to worry – we are going to use this terminal window to change the Ease of Access shortcut available on the login screen (the Utility Manager) to a far more useful process – a terminal window for the C: drive with elevated privileges. Yes, that icon no one ever uses.

From your currently (fairly useless) Command Prompt at the X:, type the following two commands (the “move” command is one line, and the “copy” command is the other line, but the spacing of the page here may display those separate commands on two lines… just type the “move” and “copy” commands on one line before hitting Enter after each):

move c:\windows\system32\utilman.exe c:\windows\system32\utilman.exe.bak

copy c:\windows\system32\cmd.exe c:\windows\system32\utilman.exe

And voila, we have replaced the Ease of Access function on the login screen with cmd.exe. Next, type the following command into the (not so) useless X: terminal window to reboot:

wpeutil reboot

Upon reboot, click the following icon between the WiFi icon and Power icon (yeah, I never used this icon before either):

You should now be presented with a Command Prompt for C: overlaid on the login screen (no authentication or password necessary). From here, type the following two commands to add a new account to the machine (with no password), and then elevate that account into the administrators group:

net user username /add

net localgroup administrators username /add

Obviously the “username” above is your choice of a new user login (like GetRekt or something similarly clever and haxxorz). You can close the terminal window, reboot, and see your new admin account with no password allowing you entry to the computer.

pwnage and WEAK SAUCE.

It should also be noted that the (rather weak) security of this computer is now even more broken until the above steps are undone and the icon reverted back to its far less useful, albeit original, function.

Lesson for today boys and girls? Always use full-disc encryption to prevent kiddie level compromise like this. Any sort of FDE (BitLocker, VeraCrypt, TrueCrypt, et al) will prevent this exploit from being a possibility on your computer.

Featured image used under CC license from NASA.gov