• Texas BBQ Barn – Ribs That Melt in Your Mouth

    There’s a certain romance in smoky air, sizzling grills, and the promise of meat cooked low and slow. Last week, I found myself at Texas BBQ Barn – a place that’s slowly becoming a rite of passage for rib lovers in Cyberjaya.

    The Food

    I started light with the mushroom soup – creamy, earthy, and the kind of starter that warms you up before the meat storm. The spaghetti was cooked al dente, nothing groundbreaking but a good filler to balance the heavy proteins. The grilled chicken surprised me – tender, smoky, and seasoned just enough to let the char do the talking.

    But the star of the night? The ribs.

    Juicy, smoky, and with that perfect balance of sweetness and fat (“berlemak” in the best way possible). Each bite slid off the bone and melted in the mouth. It’s the kind of dish you keep thinking about long after the table is cleared.

    According to BBQ tradition, great ribs are judged by three things: smoke ring, tenderness, and sauce. Texas BBQ Barn nailed all three. The meat carried that pinkish smoke ring, was fall-off-the-bone without being mushy, and the glaze hit that sweet-tangy balance without overpowering the meat.

    The Vibe

    The environment is okay – not your fancy five-star steakhouse, but it delivers what it promises: casual, hearty dining. One thing to note: parking can be a bit tricky during peak hours, so come early if you don’t want to circle the block.

    Interestingly, I noticed they host a lot of birthday packages and perks. Families and groups seemed to enjoy the communal vibes, and it adds a festive edge to the otherwise rustic setting.

    Birthday Twist

    Now, here’s the funny part – even though it was my birthday, my son argued that he should be the one getting the presents. Classic four-year-old logic! Ha ha. Of course, I gave in and bought him a little gift to keep the peace.

    As for me, I decided to treat myself too – not just with ribs, but with gear for my homelab hobby. Picked up some SBC boards (I already have a Waveshare V4 and Raspberry Pi Zero 2), plus a GL.iNet Slate 7 portable router. That router is going to be a lifesaver for family vacations and my wife’s outstation trips – secure, encrypted, and keeping all our devices connected wherever we go.

    Final Thoughts

    Texas BBQ Barn isn’t just another eatery; it’s a spot where you go when you want real meat, cooked with patience and passion. Come for the ribs, stay for the grilled chicken, and accept that parking might test your patience.

    Would I return? Without a doubt. Those ribs are worth every hassle. And hey, birthdays are always better when you mix smoky ribs with geeky gadgets.

  • 🚨 Why Your Wi-Fi Password Is the First Line of Defense (And How Attackers Really Think)


    TL;DR: Attackers don’t “break in,” they log in—usually because the passphrase is weak. Your win condition: WPA2/3 + AES, long random passphrases, proper network segmentation, and continuous telemetry on who/what is on your LAN.


    🧠 Threat Model: The Attacker’s Mental Model (Theory, not a how-to)

    • 🛰️ Access layer reality: If I can stand on your curb, I can interact with your RF. No badge swipe needed.
    • 🤝 Auth boundary target: The WPA2/WPA3 4-way handshake is a cryptographic challenge–response that proves knowledge of the PSK without revealing it. Attackers aim to observe, never alter, that exchange.
    • 🧮 Offline advantage: Once an auth artifact is captured, the “fight” moves offline where GPUs attempt PSK candidates at scale. That’s why password structure matters more than vibes.
    • 🧱 Post-auth pivot: Once on LAN, you’re just another host: L2/L3 discovery, weak IoT creds, flat networks, stale shares, chatty protocols. Defense is won in architecture, not heroics.

    Principle: Don’t be the lowest entropy in the room.


    📚 Crypto & Entropy (Why short passphrases implode)

    • Entropy ≈ log₂(search space).
      • 8 digits (00000000–99999999) ⇒ 10⁸ combos ⇒ ~26.6 bits. That’s nothing in 2025.
      • 16 chars from [a–zA–Z0–9!@#…] (~72 symbols) ⇒ 72¹⁶ ⇒ ~101.6 bits. That’s skyscraper-tall.
    • GPU reality check: Offline guessing scales horizontally. Your only durable defense is entropy + length.

    🛡️ Defender Playbook (Step-by-Step, Safe & Production-Minded)

    Harden the Air

    • WPA2-PSK (AES) or WPA3-SAE. Disable WEP/TKIP. Disable WPS.
    • Rotate the PSK when roommates change, contractors leave, or you publish it somewhere “temporarily.”

    Generate a strong PSK (copy-paste):

    # 24 bytes (~32 chars Base64) – strong and memorable enough
    openssl rand -base64 24
    
    # Or a cryptographically strong custom alphabet (20+ chars) in Python:
    python3 - <<'PY'
    import secrets, string
    alphabet = string.ascii_letters + string.digits + "!@#$%^&*()_-+=[]{}"
    print(''.join(secrets.choice(alphabet) for _ in range(24)))
    PY
    

    • Guest SSID → Internet-only, no LAN.
    • IoT SSID/VLAN → Egress to cloud only; no east-west.
    • Admin SSID → Your trusted devices only.

    Example: Internet-only policy for a guest interface

    (Linux nftables):

    # Drop guest-to-LAN; allow guest-to-Internet
    sudo nft add table inet filter
    sudo nft add chain inet filter guest_forward { type filter hook forward priority 0 \; }
    sudo nft add rule inet filter guest_forward iifname "wlan0_guest" ip daddr 10.0.0.0/8 drop
    sudo nft add rule inet filter guest_forward iifname "wlan0_guest" ip daddr 172.16.0.0/12 drop
    sudo nft add rule inet filter guest_forward iifname "wlan0_guest" ip daddr 192.168.0.0/16 drop
    sudo nft add rule inet filter guest_forward iifname "wlan0_guest" ct state established,related accept<br>sudo nft add rule inet filter guest_forward iifname "wlan0_guest" counter accept
    

    Quick VLAN carve-out (Linux host/gateway):

    # Create VLAN 30 for IoT
    
    sudo ip link add link eth0 name eth0.30 type vlan id 30
    sudo ip addr add 192.168.30.1/24 dev eth0.30
    sudo ip link set eth0.30 up
    
    # Hand off eth0.30 to your DHCP server / router stack
    

     Know Thy Devices (Continuous Inventory)

    • Baseline who’s on Wi-Fi and alert on surprise MACs.
    # Snapshot neighbors / ARP cache
    ip neigh show | sort
    
    # Quick ping sweep (adjust cidr)
    for i in $(seq 1 254); do ping -c1 -W1 192.168.1.$i >/dev/null && echo 192.168.1.$i; done
    
    • Treat unknown hostname + new MAC + odd vendor OUI as a page.

    Patch the RF Edge

    • Keep your AP/router on current firmware.
    • If your AP supports it, enable Management Frame Protection (MFP/PMF) (helps against certain deauth plays).

    Credential Hygiene at Scale

    • PSK too widely shared? Consider WPA2-Enterprise (802.1X + RADIUS) so each user/device has unique creds.
    • Pair with per-VLAN assignment via RADIUS attributes for real segmentation.

    Blast Radius Reduction

    • Lock down SMB/AFP/NFS to trusted subnets only.
    • Put fragile devices (CCTV, printers) behind deny-by-default rules; allow only what they need.

    🧪 Blue-Team “Lab” Checklist (Ethical, Permission-Only)

    Legal/ethical note: Only test networks you own or have explicit written authorization to assess. No exceptions.

    • 🧭 Scope: Document SSIDs, subnets, allowed testing windows, and success criteria (e.g., “no guest-to-LAN”).
    • 📊 Metrics that impress:
      • Time to detect new device (MTTD)
      • Time to contain rogue client (MTTC)
      • % of devices on isolated VLANs
      • PSK rotation cadence & password entropy distribution
    • 🧷 Controls to validate:
      • WPS disabled
      • WPA3 supported/enabled where possible
      • Guest isolation truly blocks RFC1918
      • IoT cannot talk east-west or reach admin hosts

    Defender-safe verification snippets:

    # Confirm your interface segregation (Linux)
    ip -br addr
    ip route show
    
    # See if your Wi-Fi stack negotiates robust ciphers (client-side sanity)
    nmcli -f ACTIVE,SSID,SECURITY dev wifi
    
    # Show OS services listening only on expected subnets
    ss -tulpn
    

    🧩 “Why My Lab Cracked 12345678 Instantly, But Choked on Random 20+”

    • Numeric 8-digit = tiny space → trivial.
    • Name+Year patterns = easily guessed with mangling rules.
    • Random 20–24 chars from a rich alphabet = astronomical space; offline rigs stall out geologically.

    It’s not magic. It’s math. Build for entropy; architect for isolation.


    🧰 Handy (Safe) Ops Snippets You Can Reuse

    Rotate PSK then notify household (template):

    Subject: Wi-Fi Security Maintenance — New Passphrase
    
    Hi all,
    We’ve rotated the home Wi-Fi passphrase as part of routine security hygiene.
    New SSID: <Your_SSID>
    New PSK: <LongRandomString>  (do not share outside household)
    Guest Wi-Fi remains Internet-only.
    
    If any device fails to connect, ping me.
    —<Your Name>
    

    Block IoT from reaching admin subnet (example, adjust subnets):

    # Deny IoT VLAN (192.168.30.0/24) from talking to Admin VLAN (192.168.10.0/24)
    sudo nft add rule inet filter guest_forward iifname "eth0.30" ip daddr 192.168.10.0/24 drop
    

    🏁 Executive Takeaways (The Stuff Hiring Managers Care About)

    • Policy → Control → Telemetry → Response: you closed the loop.
    • Measurable improvements (entropy, segmentation, MTTx).
    • Scalable patterns (WPA2-Ent + RADIUS, VLANs, least-privilege egress).
    • Boring is beautiful: most breaches die when basics are airtight.

  • My Meshtastic Adventure: From Canceled Orders to Building a Malaysian Node.

    Have you ever stumbled upon a tech project that’s part radio, part messaging app, and all community-driven? That’s what pulled me into the world of Meshtastic, a project that creates decentralized, off-grid communication networks using low-power LoRa radios. It’s a fancy way of saying you can send text messages without Wi-Fi or a cell signal. I decided to dive in, and it’s been quite the ride!


    What is Meshtastic? 🤔

    In simple terms, Meshtastic creates your own private messaging network using small radio devices. Think of it like a supercharged walkie-talkie that sends texts instead of voice. The “mesh” part is the magic: your message can automatically “hop” from one device to another to reach its destination, even if the person you’re messaging is miles away. It’s all open-source and built by a community of enthusiasts who love to tinker.


    What is an ESP32? 🧠

    The ESP32 is the brain of my Meshtastic device. It’s a powerful yet cheap microchip that includes both Wi-Fi and Bluetooth. This makes it incredibly versatile. While it can be a bit power-hungry for a portable device, having those extra connectivity options opens up a world of possibilities for other cool projects.



    The Rocky Start: Getting the Hardware

    My journey began with a couple of frustrating clicks on AliExpress. I tried to order the popular Heltec V3 board twice, and both times my order was canceled. Not one to give up, I found a local individual in Malaysia who could ship one to me. Sure, it was a bit more expensive than ordering directly from China, but the huge plus was getting it in my hands within hours. Even better, the device came pre-configured for Malaysia’s specific LoRa frequency.

    The kit included a nifty 3D-printed case in a fancy color. Assembling it was my first challenge. You don’t need to be an electronics wizard, but knowing which way to plug things in helps. The case, though custom-made for the Heltec V3, was a very tight fit. With my big fingers, I had to carefully bend some wires and the antenna connector to squeeze everything in. A small screwdriver became my best friend for poking around in those tight spaces.


    Flashing Firmware: Easier Than You Think!

    Once assembled, it was time to bring the device to life by installing the Meshtastic firmware. I was expecting a complicated process, but the Meshtastic team has made it incredibly simple.

    There’s no special hardware or coding knowledge required. You just go to the Meshtastic Web Flasher, plug your device into your computer, and follow the on-screen instructions. It’s brilliant.


    Joining the Malaysian Mesh Network

    With the firmware flashed, I was ready to connect. Following the fantastic Malaysian Meshtastic community documentation, I configured my node to communicate through the community’s MQTT server.

    This is where the magic happened. I opened the app and saw around 130 nodes registered across Malaysia and neighboring countries, with 30-40 active at any given time! The community is alive and kicking, with the WhatsApp and LoRa channels constantly buzzing with messages.

    Unfortunately, there were no other nodes in my immediate area. But thanks to the MQTT internet gateway, I could still chat with the entire network. And when I traveled to the Klang Valley, my device started connecting directly to other nodes via radio. It was so cool to see the “mesh” in action!


    How Meshtastic Works: A Visual Guide

    This diagram shows how it all fits together. Your message can travel directly to a nearby node, “hop” through other nodes to reach a distant one, or even travel over the internet via an MQTT gateway to connect with the wider community.


    Future Plans and Current Challenges

    My experience has been overwhelmingly positive, but it’s also highlighted a few challenges I’m excited to tackle.

    The Lone Node Problem 📡

    Since I’m the only node in my area for now, I’m planning to build a permanent, solar-powered repeater. The goal is to mount it high up on my roof or maybe even a tall tree to create a communication bubble with a 50-100 km radius. This could help connect entire neighborhoods! For this build, I’ll likely use a more power-efficient nRF chip, powered by the sun and a bank of 18650 batteries. Thankfully, Meshtastic has a remote administration feature, so I won’t have to climb up every time I need to change a setting.

    The Battery Life Conundrum 🔋

    My portable ESP32 node is awesome, but its battery life isn’t. The included 800 mAh battery lasts only about 4-5 hours, which isn’t practical for a full day out. My next mini-project is to find a larger 3D-printed case that can accommodate a bigger battery, aiming for something in the 1,000 to 3,000 mAh range.

    Platform Quirks

    The device works great on both my Windows PC and Android phone, connecting via Wi-Fi, Bluetooth, or a serial cable. For Mac and iOS users, the options are a bit more limited to Bluetooth and serial. Personally, I’ve found the Android app to be the most seamless experience.

    All in all, Meshtastic is a fascinating project that’s both accessible to beginners and deep enough for tinkerers. If you’re looking for a fun way to explore radio communication and join an active community, I can’t recommend it enough.

  • hello

    “From the ashes of downtime, I rose — refreshed, rebooted, and armed with a sharper mission. The crash was my resurrection; the restart is my revolution.”

    pendot