粉丝164获赞580

哈喽,现在我演示一下如何用手机去上路这个 usb 三二。首先呢咱准备一个这,嗯, top c 转这个 usb a 的一个转接器,这是 otg 线,然后这是一个手机,然后把这个手机插上去, 然后把这个 sp 三二通过连接线插到这个 usb 转换器上, ok, 现在已经充电。这个是我这个手机软件,上面 就是我装的有这个串口,串口软件,所以说他会弹出来,咱这边点取消就可以, 就是不使用这些软件打开, 然后呢接下来就是,呃,打开这个 usb 三二,稍 工具,可以在这个上面看到。 嗯,这个上面是,我上面有四个是默认的一个提示,是布特搂的,这个是分区表,然后布特和这个烧的这个构件, 然后这个一千八千,这个是十六进制的地址,这个是阿都纳达默认的一个地址。然后现在的话就是可以找一个这个文件,咱们稍录进去测试一下。 这边呢我就是写了一个简单的工程, 然后如果,呃这个运行的话,应该是会打印这个的。到了兄弟, 接下来就是编一个并文件,把它放在手机里面。好,现在是编也 ok, 然后这个并文件是在这个地方,然后把它拿到,拿出来, 把这个放在手机里面, 这样的话就是他已经是放在咱这个手机里面了, 他放在这个 sd 卡的挡漏的目录, 然后咱现在的话就是稍录一下这个固件试一下,那就是选这个地方选择文件 觅食当路的目录选择这个文件。好,现在的话就是这个文件你就选择好了, 然后现在点开始烧路的话,咱看一下效果,就开始烧路, 然后点确定。 ok, 现在上面显示已经正在稍录了,咱稍等片刻,等待他完成。 ok, 上面显示上路成功。那么咱现在验证一下这个程序是否运行起来了。嗯,咱打开一个串口的工具看一下, 还有这个创口工具,他可以看到,他可以就是用来看这个创口数据,咱选择 usb 这个设备, 然后点连接,然后现在现在他显示是乱吗?可能是这个波特律不对,然后咱这边看一下波特律,设置一下这里面对,现在那个波特律,咱是一一五二零零。 ok, 再看一下这个代码,他是幺幺五二零零的分辨率,不是分辨率是幺五二零零的波特率。 好,那这样的话咱现在再看一下这个打印,把它先清掉,然后连接设备,看到没?兄弟们,这个已经打印出来了,证明这个程序代码是稍录成功的。 好,这个就是手机上的这个雅思拼命文件,这样的一个好处就是当你有这个当 印象就是上路别人的 usb 这个文件的时候,就是可以不接触电脑,用手机的话就可以了,当然就是。呃,这个是我自己写的, 就是用一些开源的一些库开的库,比如说这个 suv 三二 fls, 这个,这个是也是官方提供的一个库,他是用于各种的,比如说单面机,像这个也是必须上路。 然后我是把这个放在安卓上面的,然后这个库是 usb 串口的库,就是读取 usb 设备的主要是这两个库。 然后这里面是谁?我把那个随缘的代码给拿过来了,这个就是一个简单的介绍,后面 话我会把这个软件完善一点,因为现在这个软件的话,他还不能设置波特率啊。好,今天就到这里吧,拜拜。

hello, 大家好,我是 michael。 在这个视频里面,我们会讲解一下 free rtox task 的创建和删除。首先啊, 让我们来看一下这个 menu 里面,这个 free rtos 的 这个 free rtos reference menu 里面啊,关于这个 task 的创建函数, ok, so, 嗯,我们来看一下啊,这个啊,这里是 task 创建函数 task create 这里是 task create static, 这是 task create restricted 啊,他有三个创创建函数啊,多数我们用第一个啊,我们看一看,这就是我们所需要的 task 创建函数 x task create 啊,这就是这个函数。 然后我们回到我们啊,最开始的 hollower 这个实力,我们来看看基于这一个啊, example code, 我们怎样来创建一个?创建一个 task 用这个,哎, we task create 这个 function。 首先啊,首先我们必须创建一个啊, task 主体,这是个 task 主体函数。 what and my task 啊,这是一个 task 主体函数,这个 task 的 imple pyramid 一输入参数是一个 word 指形, word 指针型啊, word 指针型的输入参数 为什么定义它?之所以啊,它是一个定义为 word 指针型。呃, 用这种方式的话,我们就可以强制转换任何其他类型啊,传,传入这个 task 啊,函数 在这个 task 函数里面,我们再显示的转换回来。好,那, 那我们看一下这个,这个 task 里面应该怎样编写这个代码。 好,我们先来看一看啊,这个 task created function, 这第一个就是这个 task coat the task function 这个函数的指针啊,这个函数的指针, 这个函数呢,它是一个,它是一个简单的 c 函数啊,没有返回,没有退出啊,它是一个无限,无限循环,无限循环体啊,一个 y loop。 然后呢,这个参数啊,是一个简单的这个参数啊,是一个简单的指针 指向一个 function, 是一个简单的指针指向一个 function。 好,那我们来啊,编写这个代码,在这个代码里面,首先它是一个无限循环的循环体,所以我们用啊 wire loop 啊,你也可以用 full loop why one 去创造一个这样的无线循环题。好,在这个循环题里面我们做什么呢?我们打印一些信息出来啊,我们从以前的扣里面拷贝一些信息,拷贝, 拷贝这个 hollower, okay, 我们拷贝到我们的 task function 里面。好,在这个 well loop 里面,我们不断的 print out 这个 hollower in the。 啊, in the task 表示这个信息是从这个 task 里面打印出来的。啊,这个 task 里面打印出来的信息。 好,下一步我们做一些延时啊, delay, 我们做一些 delay。 延时啊,在每一个 print alt 之间啊,有一些延时。好, 好,下一步啊,下一步我们啊,注视掉所有的源代码啊, remove 掉所有的源代码,去掉原来的 hello over 的源代码。在这个 a p p may 里面,我们要调用这个啊, task create 这个函数来创建一个 task。 okay, 我们要调用它来创建一个 task。 好,这是我们的 test create 函数。第一个参数啊,第一个参数是这个 test 的指针啊, 那么呢,就看一下这个。呃,函数啊,第一个参数是它的 task function 指针, 也就是我们现在创建的 my task。 好的,嗯,这就是我们的第一个参数。 第二个参数,第二个参数是它的 task name, 它的名字。 task name 啊,我们可以在这里写为 my task。 一啊,我们的第一个 task。 好,下一个参数,下一个参数是它的 stack, stack 表示分配有多少内存给这个 task, 这个 stack 是一个很大的呃呃, topic。 然后呢,我们啊会 讨论,以后再讨论,详细讨论。然后我们现在设置它为一零二四 e k 的 stock。 好, 暂时设置为这一个啊,具体的值得确定,我们会在以后的视频中讨论。然后下一个参数,这个 是 task 呃的传递参数,这个参数会由这个 create task 传递到 my task 里面去,通过这个 avoid 指针传递进去。如果不设置的话,我们可以设置为空 啊,设置为空 a, 下一个是 priority, priority 是 priority 是他的优先级别。这个啊,空闲 task 的优先级别是零,最低优先级别是零。所以我们可以设置我们的 task 为一 啊,比这个空闲 task 的级别高一个级别。然后下面这个是 task 的句柄啊,这个 task handle 啊,有很多的作用,我们可以 通过这个 task handle 获得许多关于创建的 task 的信息啊,比如说 task 名字啊,停止 task, 启动 task 等等。啊,在这里我们没有用到这个 task。 我们先设置它尾空。先设置它尾空。 好啊,啊,我们先简单的创建一个 task, 用这种方法先简单的创建这个 task。 好,我们保存这个,找存这个代码,在这个代码里面。呃,创建一个 my task, 这个 my task 是 print out hollower in the task print 这个 information。 下一步我们需要 bne, 按着下载。 好,我们在这里啊,这是 command three 啊,这个是芯片 test 芯片类型啊,这个是编译 project, 这是 fresh, 这是 monitor。 呃,这一个按钮呢?它可以编译下载和 打印信息一起啊,这一个是把前面三个命令集中在了一起啊,我们可以按一下,试一下,他就会先编一整个项目,他会先编一整个项目, 先对它进行 b a, e 啊,等于啊,需要一定的时间。 yeah, 生成了 e, l f 文件生成了并文件啊,生成了并文件,现在生成并文件好,编译成功,编译成功。 好,下一步,正在下载。好,正在 download 好, fresh done, fresh done, 下载成功,下一步,启动我们的创口监视器 monitor, 启动我们的 monitor 好,已经 print out hallower in the task, 这说明我们的 task 已经成功的创建,并且,呃,打印出我们 所需要的消息。 hello, what in the task 啊,这表示已经成功的创建了一个 task。 好,我们已经成功的创建了一个 task。 下一步就要啊删除这个 task, 删除这个 task 呢?呃,一个重要的方法是啊,获取这个 task 的句柄 task handle, 根据这个 task handle, 然后调用 task delete 函数来删除这个,删除这个。呃, 与 handle 相关的 task。 好,我们来看一下 该怎么做。 我们先拷贝啊,这个定义。 好,被这个 task handle 这个变量这个定义啊,好,搬到这,然后我们定义一个变量, 定义一个 my 啊,定义一个 my handle 是 task handle 类型的一个病量 好,这个变量复制为空,这个变量复制为空。在这个最后这个参数啊,在这个最后这个参数。我们先保存一下,把这个 my handle 这个这个变量,呃, 他需要传递到。啊,那再看一下这个啊, 看一下这个函数, 这个 task delete 这个函数,这个 task delete 这个函数会根据这个 task handle 啊删除。哎, 这个就是他是个 handle 所在的位置,我们需要传递这个,呃,地址,这个,这个任务问物巨丙的地址啊, 这个任务剧本的地址,所以我们应该的应该写代码,像这样写代码,写他的地址,取取这个 my handle 的地址啊,在这个最后这个参数这里。 好,然后呢,我们再调用这个 we task delete 这个函数,去去删除,除, 去删除这个创建了的函数。呃,创建了的任务去删除这个差,创建了的任务。好,这个据屏递换掉我们自己的据屏。好, 我们再进行一些判断,判断这个啊,句柄是不是为空,如果不,如果不为空的情况下,我们再进行删除, 如果不为空啊,我们对他这对这个任务进行删除。 对这个啊,与 my handle 相关的任务进行删除。现在我们格式化一下代码,你可以看到在 visual studio 里面啊, 啊,编写代码是多么舒服的一件事情,可以很容易的格式化代码。好,这就是 task delete function, 它会删除。然后我们又开始呃, b a e 啊,我们开始 b a e download 这个代码。这个任务啊,这个任务被创建之后马上被删除。 啊,这个是任务被创建之后马上被删除。然后我们看一下啊,这个,呃, print 信息是否还会输出? 是否是否仍然会?呃,像以前一样输出。 好,现在正在链接串进这个并文件好,编译成功,然后现在正在 download 好, fresh done, 然后我们启动这个监控,监控程序 monitor 查看这个信息。好,你,你会看到这个啊,你会看到 在这个 starting scheduler 之后, cpu start 之后没有输出任何啊。 hello, 我的信息,这意味着我们创建这个,创建这个,创建这个任务以后, 这个任务马上被删除了,他还来不及,他还来不及 print out 这些信息。所以啊,那我们应该怎样处理呢?来看看我们应该怎样处理 好。我们应该在这个删除之前,这个创建之后加一些延时啊,让这个 print out 在这个 print out 有时间执行让这个 print out 有时间执行。好, 好,我们再 copy 这个 delay 函数,我们 copy 这个 delay 函数加到这个 task create 的后面啊,然后再删除。删除这个任务,然后我们看是否可以 已打印出这个消息。那我们看,我们来,那我们来继续编译啊。编译,编译,这个项目 正在链接 好产生,并文件 编一成功,然后再 fresh fresh 成功, fresh done, 然后打开我们的 monitor。 好,你会看到 hollower in the task 被 print out 了一次啊, 被 print out 了一次,在我们呃延时之后被 print out 了一次,然后这个任务就被这个无一的例删掉删除了。 那我们现在改改它,改这个比例为八八千,看看我们会 print out 啊,多少次啊?看我们 print out 多少次,这个八千应该会 print out。 八 是 hello, 我,好,那我们来看一看他是不是会 print out 八次, 仍然按这个按钮啊。 build fresh and monitor 好,仍然开始编译这个项目。 链接 产生 e l f 文件好产 生这个,并文件好,编译成功,然后我们开始 fresh。 好,我们打开我们的新的 monitor, 打开我们的新的经验式创口顺序。 好,你会看到一个,两个,三个,四个,五个,六个,七个,八个。好,我们再来看一下 啊,一个,两个,三个,四个,五个,六个,七个,八个。 so 啊,他 print out 了,八个啊,信息八个 hollower in the task。 证明啊,这个 delay 是是成功的。 delay 了八,呃,八倍, 然后呢? delete 了八倍以前的时间,然后呢?这个,呃 task 的列函数删除了这个 task, 呃,删除这个 task 以后就。呃,再也不能 print out。 呃,任何的信息,再也不能 print out 任何信息。 好,呃,我们还有一种方法来删除这个 task, 那应该怎么做呢?我们在会在这个 task function 里面删除,然后我们先啊, 我们先把这一段代码给去掉,先把这一段代码去掉, 好,注视掉,把它注视掉,然后把这 这一段代码也注视掉,然后改这个地方是,呃,仍然为空,仍然为空。然后呢?我们在这个啊 拷贝这个 v task 得利函数记 my task, 把这个 my handle 设置为空, 当它设置为空的时候,这个 task delete 函数会删除当前的 task, 它会删除当前的 task。 这个 yo 循环呢,它会一直在这里循环,所以我们要去掉这个 yo, 去掉这个 yo, 让它有机会,让这个 task 有机会去跑这个 task delete 函数。然后呢?我们也 copy 啊,这个 print out information 选的这,呃,这个函,这些方式,这些代码,然后我们修改啊,第一次 print alt 为 first, 这是第一次 print alt 啊,改为 first first time。 第一次 print out, 这边呢就是第二次 print out second time 啊,这边呢就是 third time, 第三次,表示我们会 print 三次 however 出去,然后再 delete 这个 task 好, 然后再删除这个 task。 这种方法呢就是删除这个 task, 在这个 task 里面啊,在这个 task 里面自己删除自己,当这个 task 被创建以后,然后再自己把自己给删除掉。好,这就是这个 task, 这个 my task delete 掉,他自己先 print out 三次啊。 information, 然后我们仍然啊 build fresh and monitor, 然后来查看一下这个 oppo 信息。 好,来查看一下这些打印信息是否是跟我们想的一样。 好,他在 b a e 这个 项目, bne 这个项目 产生的,并文件编译成功。然后呢?啊,他正在 fresh, 好,开始运,开始啊,开始运行啊,他已经已经运行完了,我们来看一看。 在这里 hollower, first hollower, first hollower, second hollower, third, 这三个信息已经被啊打印出来了,这三个信息已经被打印出来了。在这个啊,在这个 函数,在这个任务里面,我们调用了 v task delete 这个函数来删除啊,这个函数本身,这个任务本身来删除这个任务本身。 好,这就是我们另外一种啊,这是我们另外一种删除任务的方法。这就是啊,我们 这个视频所要讲的任务的创建和删除,任务的创建和删除。好,这个视频啊,就到这里,我是麦克啊,我们下个视频再见,谢谢。

all right, so we've got all sorts of cool stuff here starting off with the esp 32 marauder mini, so this thing's kind of cool it has all of the functionality of the actual esp 32 marauder hero angle it so i've got the screen protectors still on here technically these are lord condos well this is mine but the big one is condos so i don't want to take this green protectors off, but this has all the same stuff that the full size marauder has it's just in a smaller form factor this thing's really cool you can throw a battery in it take it with you so yeah esp 32 marauder mini you can purchase all of these devices including the new wi fi hat that he's got with the sd card reader on the just call me coco tindy link down below it restocks every first and 15th of the mum all right, so let's get right on into it one thing to keep in mind is that these applications on all forms work pretty much the same way including the flipper the flippers got a boiled down interface made by a cocoa code who's absolutely awesome actually help me with some questions i had about this video but it's slim down but nearly all of the functionality as far as at least the wi fi stuff is still in the app so let's grab this guy and see where i can put it so it's not gonna have crazy glare on it this will work so let's start our journey of whimsy and wonder in wi fi we're gonna go right into the sniffers and see what we've got here so the top option right here is the probe request snip we can open this up right now so what this is going to do is attract for probe requests now a probe request is when a y wi fi device is basically pinging other devices looking for nearby surfaceide identifiers or ssids this will show up down at the bottom of the mac address which is a media access control it's going to show the addresses of any nearby cell phones or pretty much anything that's looking for access points even a cell phone that's idle it may send hundreds of pro requests per hours so it's actually a really good way of determining which wi fi devices are in any given area so yeah you can see it's popping stuff up there so we'll pop back to the earliest screen so moving down the list we go to beacon sniff so the beacon sniff is simply yes, sniffing out wi fi access points nearby it's going to show the mac address and the essid, which is just the extended server side identifier of any you know wi fi device in the area it doesn't do anything with this information it's just showing it to us so we are not actually do something with the information we can go back here and then down here we can scan aps so when we run scan aps it's gonna do the exact same thing but now it's gonna save the access points to a list once they're on the list we can run attacks and stuff on them which we'll show in a few minutes all right so the next one is gonna be the deoth sniff deoth sniff really hard to say for some reason what this is doing is simply that it's searching for the authentication packets so the authentication packet simply floods in access point with the authentication frames, which will tell it's to either take a certain device off the network or kick every device off the network or can basically go on at that point in snip handshakes like we've done before and then when the device tries to reconnect we could use those handshakes to crack the wi fi pass you could even execute a man in the middle attack to act as an intermediary and monitor all the network traffic from a device which could reveal any personal data than these baby setting logins credentials banking data literally anything so what i'm gonna do now is i'm actually going to use the marauder app and then we're gonna run a deoff attack and boom you can see immediately how many of these things are going on tap to exit so the next one is the ea paul, ea p o l and p m k i d scan i'm gonna have a real hard time saying that over and over again, but basically what this does is it search for those specific packets sent over wi fi the ea paw, there's extensive authentication protocol over land those are packets that are the four way hand shake packets that the device uses to authenticate credentials with an access point we use those earlier again to crack through hash cat so the pmkid which is pairwise master key identifier those packets are similar to the handshake packets but there's only one of them and it doesn't require the device to be de authenticated and reauthenticated this way a hacker can grab only one file and use that to grab the hash over the wi fi network so for those of you wondering a hack is simply just a string of data that's converted to another type it's typically using you know encryption, so that you're not just transmitting your wi fi passwords over plain text, but yeah this scanner scans for those specific packets so if it finds them, then it will save them to the sd card now right now you can see it's not really finding anything it's not us to because i live in the middle of nowhere and it actually just has a graph that shows kind of when packets are being grabbed obviously since i'm not grabbing much it's not showing much so we'll exit out of here, but this is super useful so the next one is the detect ponagachi feature now, i haven't been able to get this to work i'm not sure why but yeah i've got my little ponagachi right now with my sensor tape, which magically appeared at some point during the video weird and yeah i can't really see it, but whatever not a huge deal obviously we have scan aps we already went through that so that's no big deal then we have the raw capture, so the raw capture is just basically showing everything that it can find around me um showing the mac addresses of it and then showing the r s s, i which is the received signal strength indicator, which just says how strong the signal is so, but showing me everything that's around me the mac address and how strong the signal is for that which is kind of fun, but you know not super practically useful at least not right now, so the station sniff is kind of cool what it's gonna do is it's gonna go through and actually scan different devices connected to a specific network so first of all i have to go back here i'm going to let's see i don't clear select a piece i'm going to go ahead and select my access points and then when we go back back to sniffers back to station sniff now this is going to sniff out any device that's attached to that network so then we can do a targeted de authentication attack directly to any of those particular devices now, i do have a reasonably well secured network at this point and i'd set a five gigahert network i do have some things that are on two point four, but most of these aren't gonna show up, but what's gonna happen is it's gonna populate a list that we'll be able to select through so that's kind of cool and then the last option here is the signal monitor it doesn't actually work right now, because you have you have to connect to a network directly and then it just tells you the difference in signal strength for that network not something i've found particular use for so i won't really even bother going over that because i mean i can't imagine you're gonna use that in your everyday life, so let's go back and let's go to attacks so our first attack is a beacon spam list so basically it'll spam any aps or ssids that are in our list right now, so for this one actually we'll go into general and we're gonna just go to add an ssid and with this horrible keyboard i'm just gonna do a sideways too, but we'll figure it out a s q u a c a where's the letter patriot patrick cool select that it adds it up here get out of here go back and then we're gonna go to attacks beacon spam list so right now and i'll show you on the computer in post so right now it's sending out that ssid and you can see it pop up on the wi fi list now, you can add any number of ssids to this and make your own rick roll right with the program so that's pretty cool, so let's back out of there the next one that we have is beacon spam random so what this is gonna do is it's gonna create a bunch of random ssids and they're gonna broadcast that you can see the number of packets per second this creates a lot of ssids which is very annoying really please don't use this in public this is a really annoying thing to do it pops up tons and tons of different channels and this is one of those things that you could get in trouble for moving on we have the rick roll beacon we'll click on that everybody knows what this does this sends out aps to the the lyrics of rick astley's classic song never gonna give you up this has been you know kind of the mainstay of this for a long time everybody knows what this does so the next one is probe request flood so what this is gonna do is gonna send probe request to an access point over and over again and a raptory this can effectively jam the access point is it's gonna take up pretty much all of the resources of the hardware and can make us our devices will not be able to connect to it it works by selecting the access point or points in the general tab so we can go back and then general i still have access points done, but just for the sake of argument yeah we're still still selected back back and then attacks and then i can just run the probe request flood it's most effective if you have a smaller number of access points you can select multiple, but obviously it's a flood so if you've got ten devices selected it's not gonna flood very well, i'm not gonna run this on my own network because i don't need to foot my own network so moving on all right so the next one we have is the dr blood this is gonna send the authentic agent packets to all of the aps on our list so this is gonna de authenticate any vulnerable devices on the network and while the attack is running those devices just won't be able to reconnect to it they'll be continually booted off the network and not be able to access it same thing is the flood before the more things you have on the list you know the worst the attacks gonna work again i'm not gonna run these attacks on my own network because it's effectively gonna kick all my devices off and i just don't have time for that we also have the ap clone spam i can click on that it's not gonna show anything, but what that is it's gonna basically send out cloned ssids for any of the access points in our list so it's gonna look like there's a of those could get really confusing if somebody's actually trying to access the network and i don't know which one to actually log into and the last option here is the de off targeted so the de off targeted works by we go back to general, we're gonna go ahead and select the stations down here and it's going to show all of the individual items or all the individual devices that are on our attach tower network, you can see access points and you can see different devices here so if i go back there, so i selected a device bites mac address run the de off target attack and that's going to attack the single device on the network and try to de authenticate just that one device it's really nice if you're trying to have like you know research things and you don't want to de off everything you can select one item and just de off that so that's super cool so, that is our last attack, so we can go back and check out some of the general options these are all the general options they show up we talked about some of them, but we can go over the rest of them so this is how you join wi fi for the wi fi monitor or the single monitor? sorry, it's kind of cool shut down wi fi will just basically shut down the wi fi connection so you won't be on it anymore if you do log onto wi fi it will log off if you run any of the stiffing things or run any of the attacks it'll automatically leave the wi fi right, there, now we have generate ssids now this is going to generate a list of 20 random essids that can be used in the beacon spam it's just 20 random short ap name or ssids for that matter so instead of making all your own it'll do that and when you run a flood it will just show those generated ssids add ssid which is just what we did before so we added our own ssid to our list that we can use for the same plugs and the same attacks clearing ssids, clearing aps clearing stations that's all the same stuff it's gonna just go through and clear those specific items at ip that's what we did before and then select stations you know we showed that before so that's pretty much the wi fi capability of the esp 32 morada right there gonna go back go back and now we're on the main menu so one of the things that you don't really or most people don't realize that yeah the esp 32s do have bluetooth capabilities so we can load up the sniffer right here and just do a bluetooth sniff and it's gonna go through and sniff any device that might be transmitting on bluetooth right now so yeah let's see what we come up with a few moments later let's see if it crashed it did this to me last time okay, so it actually crashed we're gonna restart it yeah i'm up sure if it's because we ran all the attacks or what but at some point in time doing all the things that we did will basically make the bluetooth part crash when you run it we'll just restart it and run the same thing again and i'm pretty sure bluetooth sniffers bluetooth sniffer there we go it works perfectly fine there's some weird bug in it not a big deal but yeah that happened the last time i ran this so yeah let's pop back you can see all the other cool stuff my flippers and my vector little robots some other cool stuff so yeah there's a bunch in there so detect card skimmers pretty cool it will detect the credit card skimmers that people are installing on you know credit card or atm readers you know supermarkets or gas stations and things like this i thought about getting one to show off but i don't want to be on a list of people that have bought credit card skimmers so that one's gonna have to wait till a later date and then back general and then you can just shut down bluetooth so that's how it works so basically you can just do sniffing on bluetooth again that's a pretty cool feature as far as general apps goes it's just the draw thing so you can draw things and you know draw whatever you want not exactly you know not picasso but yeah look at me hi cool, so that's it and to get out of this it took me a second to figure out you just draw up towards the corner hello there。