Gumoz's Blog

The Gumoz's Blog

International English Keyboard with Accents and Spanish Characters for Macs with Windows (BootCamp)

with one comment

Simple but usefull

There are two certitudes in this world.

1.- Programmers are faster with English keyboards.

2.- Spanish language need accents.

How do you writte software in spanish using and english keyboard on your laptop?, you can certainly change your keyboard language but that is a pin in the neck. So I created this keyboard for you Windows developers that need to write documentation / titles / buttons in spanish but use an english keyboard for speed purposes.

1.- Download and Install using Setup File

2.- Select the “Ixaya” keyboard from the English / United States list.

(The keyboard is intended to be used in Macs with Windows but it should work on normal PC’s) (AltGr in Mac is the Alt key near the arrow keys (right alt))

AltGr + a = á
AltGr + e = é
AltGr + i = í
AltGr + o = ó
AltGr + u = ú
AltGr + n = ñ
Enjoy, Download

Written by gumoz

August 6, 2012 at 2:13 pm

Posted in Uncategorized

SofaWiki Spanish Translation

with one comment

There is no official spanish translation of SofaWiki so I made my own, you can download it here.

Installation instructions:

  1. uncompress the zip and copy the system-defaults-es.php file inside your /inc folder.
  2. edit the file api.php and add the line: include “$swRoot/inc/system-defaults-es.php”;
  3. if you want to translate the way the language appear, you can also add the following line to every language file inside inc/ (replacing /en for the language that you are editing): $swSystemDefaults[“es/en”] = “Español”;

Happy Collaboration with SofaWiki

Written by gumoz

March 17, 2011 at 5:16 pm

Posted in Software

Tagged with , ,

reflect and unpack, the use of .net reflector and some unpacking techniques

leave a comment »

I usually need to reverse engineer some stuff so I can learn the inner workings of software and hardware, there is a tool that I use when I need to check some source code from a .net binary (executables or dlls) that is called: .net reflector, this tools is super cool and useful because you can with a simple click check the source code of a compiled binary.

As you can see from the picture, it lets you open .net binaries and see the source code, it even allows you to see the comments, haha.

Well this is not enough because some people rely on packaging their software so that it gets encrypted inside a packing file which decrypts it on the fly to the memory when executing. Well, packaging is lame so when we need to reflect the source code of a packed software we will first unpack it (hahaha its easy), first you’ll need to identify the packaging, it depends on the platform the software is meant to execute for the packaging method or software used, so for example for a windows software we will use a PE Identifier like PEiD.


So after you identify the Packager you can use an unpacker software according to the packed binary. For example, I use .net unpack, a software so easy to use that opening a packed software is just as easy as making an infinite loop.

Well, the exact instructions are not provided here because you will use it for evil instead of good, unless you are me of curse (I use it to test our own software ability to stop reverse engineering efforts because PEMEX regulations tell us that our software should not be reverse engineer-able (I know, thats impossible).


Written by gumoz

December 19, 2010 at 1:06 am

Cyphernomicon – Cyberpunk

leave a comment »

I think that people interested in liberties and free speech should read the Cyphernomicon, it is a manifesto about cryptography and how to achieve anonymity.

Around that, there is something called Freenet.

Freenet is a network that uses peer-to-peer technology in conjunction with cypher algorithms to protect the individual from being tracked down, in Freenet you can share files and browse or publish sites called: freesites which are websites only available through the people connected in freenet. You can also put your computer in darknet mode which will allow only your friends to connect to your freesites and provides more anonymity (or at least is more difficult to detect).

Exist another networks like GNUNet and Entropy but I recommend Freenet because is more censorship-resistant. (frees-peech does not mean violate copyright laws).

Written by gumoz

December 18, 2010 at 4:37 pm

The War where you are and don’t know about, The CyberWar

leave a comment »

Today we are experiencing one of the first cybernetic wars that will be held in the next following days / years. The structures of power are changing, shifting to new distributed power structures held by the people, held by the ones that construct the world, held by us, the ones that speak out our lives every day, the ones that clean the baths, the ones that eat a donut, the ones that see those naked pictures on social networks, the ones that play online games, the ones that build houses, the ones that build computers, the ones that use money, the ones that eat vegetables. the ones, that create the world as it is, we are those ones, and we are those who are part of this new distributed power structure.

The governments around the world are censoring free speech and silencing everyone who tries to bring to the light the messy and dirty way of governing. They are trying to censure us, they are trying to censure you.

Today we  are in the middle of this new war that the governments are trying to held but will not manage to win, is not a war that kills people, is a war that kill economics, kill liberties, kill information, kill power structures, kill what matters in the world apart from living things, it kills our way of living, and the governments way of living; It all seams as if Governments and Individuals are two different entities from different worlds, as if they where aliens and we where the ones protecting our heart. Today the governments are the aliens, the ones that alienated the system.

Today we are combating those aliens with our best weapon, our knowledge.

The Governments attack:

Governments like China attacked Google and USA, USA attacked WikiLeaks, Amazon halted Wikileaks Hosting, Paypal canceled Wikileaks account, A Swiss Bank frizzed Assage’s assets (WikiLeaks Co-Founder), Visa and MasterCard banned Wikileaks from their transactions. (All this seams as governments attacks to the people isn’t it).

The People’s counterattack:

Several Independent Groups like Anonymous (and everyone who want’s to join) attacked Paypal and halted their operation, attacked the Swiss Bank and it halted operation, and they are attacking almost every political target that they see fit to defend Assage’s

The Governments counter-counterattack:

Now governments are targeting Anonymous and every website that they see fit.

The People’s again:

Sites like: and have been taken down also.


Seams like Paypal have managed to defend from the cyberattacks after hours of being halted and un-operational.

Whats next:

We don’t know how this will end, but a lot of companies and individuals have lose a lot of money in the middle of this war. I hope it ends soon and whichever structure of power that wins help us construct a better tomorrow.

Written by gumoz

December 7, 2010 at 12:24 am

Punish the lambs & make the wolfs rich.

leave a comment »

It is bad to let free assassins because they are defended by expensive lawyers, but it is worse to punish someone that barely do anything wrong because he can not defend himself.

When you create regulations, it gets sometimes to complicated because that rule can censor or punish a citizen with genuine motivations instead of helping the governments officials get wrongly intended citizens, as an example the new bill that was approved in the US to sensor rogue websites that create scams or have criminal motivations. With that bill, websites that have genuine intentions but that are being investigated by entities that want to mislead a truthfully well intentioned investigation can or will be censored / banned, and overall kill them off the DNS system by those mentioned entities. This can be done by entities like music conglomerates and overall content companies that does not know how to create revenue from an old-fashioned patent and authoring protection system. With this kind of bills any companies that feel themselves attacked by innovation and free speech will try to harm, stop and censor goodly intended websites if they fear to lose something by technology innovation, or freedom.

In Ixaya we promote the achievement of true freedom through technology Innovation.

Written by gumoz

November 18, 2010 at 7:01 pm

Posted in Freedom, Public affairs


with one comment

In my eternal search of purification and enhancement, I decided to detoxificate my body, in this post I will provide you with some techniques that I have been using.

Sitali Pranayam

The Sitali Pranayam also known as “refreshing breathing” is used in some kriyas “yoga technique for archiving  a specific result” .

  • Curl your tonge in the form of a U.
  • Inhale through the curved tongue.
  • Exhale through the nose.

You will feel a bitter flavor in your tongue, that is a sign of detoxification, after you are fully detox you will sense a sweet flavor.


The Agni-Prasana also known as “Breath of Fire” is a technique that will:

  • Enhance your pulmonary capacity
  • Liberate toxins and sediments from your lounges, mucosal revetment and blood vessels
  • Massage your internal organs
  • Detox your blood flow
  • Readjust your nervous system
  • Extend your life span

The Yogi Bhajan said that a person have a determined number of breathings since his birth to his death. The Breath of Fire is just one from the moment that you begin to the moment that you finish. That means that you can prolong your life span doing the breath of fire.

How to do it:

  • Inhale and exhale through your nose (you can also do it through your mouth)
  • Inhale pushing your diaphragm out.
  • Exhale constraining your diaphragm in.
  • Your breathing should be very fast, 2 or 3 times per second, and very strong. (After perfection of the technique you should be able to breath 120 to 180 times per minute).

Don’t do it if you are pregnant.

Walking and Running

Everybody know how to walk or run, but what it is important is to do it without surpassing your heart-rate zone. To calculate this zone only subtract your age from 180, this defines your uppermost limit before you start burning sugar instead of fat.

The fat burning zone is broken in three stages:

  1. Warm-up zone (125 – 135)
  2. Mostly Aerobic Pace or MAP (135 – 145)
  3. Most Efficient Pace or MEP (145 – 155)

How to identify your heart beat zone:

  • When you are in MAP or MEP:
  1. Your vision is clear and you can talk normally without short of breath
  2. You are in a steady, comfortable rhythm
  • When you are out of your aerobic zone:
  1. You are short of breth (especially when talking)
  2. You feel dizzy
  3. You are looking forward to finishing


The most effective exercise yet devised by man (according to NASA).

Safe, Easy to use, and effective, rebounding will:

  1. Strengthen your glandular system
  2. Increase circulation and oxigen flow
  3. Increase metabolism
  4. Enhance digestion, relaxation, sleep patters, nerve impulses and muscle fiber.
  5. Great for detox and cleanse
    • Stimulates the free-flowing system that drains away toxins, dead and cancerous cells, nitrogenous wastes, fat, infectious viruses, heavy metals, and other assorted junk cast of by the cells.
  6. Condition and Strengthen the heart.
  7. Strengthens the immune system:
    • The increased “G force” during rebounding will result in self-propelled immune cells to became 5 times more active.
    • The T-lumphocytes and macrophages are self-propelled through amebic action.
  8. Moves the cerebral-spinal fluid and is benefits the intestines.
  9. Beneficial for diabetes because reduces your body fat and provides an aerobic effect for your heart.
  10. Gives your body energy then it’s tired.
  11. Combat cancer:
    • If you supplement the rebound exercise with a diet with enzymes, the outer coating of cancer cells will be dissolved by the enzymes trypsin and chymotrypsin, so the immune cells will attack the cancer cells.

Written by gumoz

May 9, 2010 at 3:59 am

%d bloggers like this: