all things über leet

Most Recent Articles

Another big blocklist update

Posted on Apr 7, 2014 in Technology, The Blog | 0 comments

The blocklist has been updated again. The file name has been changed and the old one will be deleted soon. This update has fine tuned things a lot better and reduced the total number of rules to 204,599. The compressed file size has been reduced to 3.3MB, uncompressed file size is 11.9MB and the Transmission parsed .bin file ends up as 1.6MB

The new URL to the file is

Read More

Sunset Invasion Toggle Mod for Crusader Kings II

Posted on Feb 3, 2014 in Uncategorized | 0 comments


Name: Sunset Invasion Toggle Mod for Crusader Kings II
Author: ProxyCell –
Date: 03/02/2014

Lets you toggle on/off the Sunset Invasion DLC invasion event. This is mainly meant for people who don’t like having to disable it from the launcher. The invasion is now off by default and you have to toggle it on. Includes complete localisation files and even a decision icon.

Note on the icon: I took it from: and it is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. The original author is Keepscases –

No license, no copyrights, just do whatever you want with it.

Download Sunset Invasion Toggle Mod Read More

Proper Immortality Mod for Crusader Kings II

Posted on Feb 3, 2014 in Alt.Game.Scene, CK2 | 0 comments


Name: Proper Immortality Mod for Crusader Kings II
Author: ProxyCell –
Date: 03/02/2014
Forum Thread:

Forum Thread:
This mod will provide you with access to the Immortal trait in the Character Customizer or whatever mods you want to include it with. It importantly includes a completed localisation file and a trait icon file already setup in this package. An immortal character will never die from old age or disease. However, it is still possible for them to be executed or killed by events.

Note on the icon: I took it from: and it is public domain.

No license, no copyrights, just do whatever you want with it.

Download Proper Immortality Mod Read More

Age Customizer Mod V2 for Crusader Kings II

Posted on Feb 3, 2014 in Alt.Game.Scene, CK2 | 0 comments


Author: ProxyCell –

Original Version:
Original Author: Skefrep –

Updated this great mod by giving it the latest traits.gfx from the latest version of the game (2.0.4), finished the incomplete localisation file, lowered the age cost for everything in the Character Customizer and also increased the max age to 100. These are meant for improved customization of your character’s age.

Download Age Customizer Mod V2 Read More

Massive Blocklist Update

Posted on Dec 25, 2013 in Technology | 0 comments

I made a massive update to the blocklist at

The number of IP addresses covered by it’s rules has doubled to 448,134 – This also includes whitelisted IP addresses alongside more blacklisted ones.

Read More

The Software Development Emotional Process

Posted on Apr 2, 2013 in The Blog | 0 comments

Stage 1 – Capital Stress
I go out and meet with the prospective client in person to discuss their project. This involves putting on the suit and tie and reminding myself not to swear/fart in their presence. I have to listen to their well-intentioned ideas and then demonstrate to them that I can implement all of this for $XYZ.

Stage 2 – Capital Relief
They trust me enough to sign a contract that outlines what I will do for $XYZ. I now have some of the money and huge financial incentive not to screw up this contract. I take everything super-serious and everything is being done by the book.

Stage 3 – Computational Stress
I begin by researching and planning out exactly what I will have to do. This often involves follow up meetings with the client to keep them abreast of what I am doing and to learn more about the inner workings of their existing systems.

Stage 4 – A Religious Experience
What was once logically impossible is now clear to me and while the scope of the project is going from “huge” to “masochistic” I am more confident then ever in my ability to accomplish this. My software design is nothing less than Divine Inspiration and I will be showered with accolades once its completed.

This stage is also known as the climax stage.

Stage 5 – Sobering Moment
Somehow the logic of my designs are no longer working. All I need is to do a bit more learning and research and this will all fit back together again. Piece of cake!

Stage 6 – Nervous
Nothing in any of the documentation clearly states what I have to do from this point. I am at a huge loss now but there is still some technical documents from 1996 that I haven’t fully explored yet and those are clearly the key the issues my code is suffering from!

Stage 7 – Outright panic
The client is getting antsy since I haven’t sent them as many updates. I have googled documentation, guides, tutorials, examples and online bulletin boards going back to the 1970s and I can’t find any freaking thing about my specific code problem! I asked on stack exchange but all that resulted was a 1000+ comment flame war about everything that is not pertinent to my question. They are denying the genocides committed in the name of atheism and why I have yet to switch over to their platform, language, IDE, package system, editor, religion, nation, political affiliation and sexual orientation.

I am screwed, but this is not the lowest emotional stage yet. Keep reading.

Stage 8 – Anger
I have found a number of open source software projects on a combination of github, google code, sourceforge and message boards that appear to do what I wanted to do all along. Of course it is not as elegant or efficient as what I was going to do if the documentation had been written by someone with intelligence but that is not the point! I was to be the eddie-murphy-golden-child and now I must resort to stealing other people’s code to get the job done!

(Note: I obviously do attribute, I just play down the role of “third party code” in my software to the client as being some compatibility workarounds to make sure it runs on their machines that I’m not familiar with)

Stage 9 – Desperation
Turns out their code was even worse than I thought. I have had to do more to “improve” it to the point where it actually works. I might as well have just spent another few years getting a PhD researching it and come to the same conclusions myself. I am frantically trying to work out ad hoc ways of getting their stuff working with mine and the client’s so I can just ship this and call it a day!

Stage 10 – Crushing disappointment
Despite my heroic efforts to get what the client wanted on paper down and out they expected it to be a lot “better”. By “better” they mean rubbish of course and now I must stab at my soul by degrading MY software. They don’t care that it is exactly what they agreed to in the contract! They want it to be needlessly tied into social networking, have a flash intro (yes, I have corp financial clients that still ask for this in 2013) and be branded with their corp’s tacky visual design standards. What only needed to be POSIX in the contract must now work on windows 2000 server. I demand more money and they resist until I threaten to keep everything they gave me so far and withhold all further development.

Stage 11 – Sick
I am now ruining what was once beautiful work even if it was just some cobbled-together bits that I put together myself and found online. It was functional and looked good doing it. Nothing like it had ever existed before and I was proud of my work once and now I can’t sleep or eat because of it. What used to have clean minimalist design now looks like a website from the 90s. It only loads in IE6 and crashes their server frequently. I warn the client that this will likely lead to breaches of their server but they don’t want to pay any attention to that or more money to me to resolve these issues. They want to be rid of me and my techno-babble.

Stage 12 – Genuinely Depressed
The client is calling me every few minutes and demanding that I fix problems that they forced me to implement to the software. They refuse to pay and threaten to fight me online in social media. I am constantly being harassed and threatened at this stage.

This is the lowest emotional point in software development.

Stage 13 – Acceptance
Me and client meet once more to discuss the future and agree on a plan to provide long term support for the product at a certain annual rate. I am happy that I have some money and they seem to hate me less than they did a few weeks ago.

The entire process repeats from here.

Read More

New Blocklist Page

Posted on Jan 5, 2013 in Technology | 0 comments

I have added in a new page that has a link to a blocklist file that you can use with Transmission or a bunch of other p2p, bittorrent or firewall applications.

This blocklist is a massive merging of maybe two dozen other ones and currently sits at 232730 IP address rules according to transmission. It is in my own opinion, the best blocklist out there. It adds in more blocklists than anything else and avoids blocking proxies, tor and educational/school addresses along with avoiding a few harmless corporations that are known to be neutral with p2p activity.

You can find it here:

The actual file can be found here and you can use this URL as the auto-update URL for your application: http://www.iruberleet/files/ipfilter.p2p.gz

Screen Shot 2013-01-05 at 5.52.47 PM

Read More

TorChat – Encrypted and anonymous instant messaging and file transfer

Posted on Aug 6, 2012 in Technology | 0 comments

TorChat is one of those things that we all really love and need to put more effort into developing, maintaining and using.

TorChat is an instant messaging client that lets you also send files to others and it does all of this over the Tor network. The Tor network is an anonymous routing network that is very robust and heavily used by people from all over the world to bypass censorship and surveillance by either their ISP, employer, family, community or even government. This anonymity is achieved by routing your connections through other Tor users who have opted-in to operate a Tor network node.

Tor lets you access the internet through it’s network but it also allows you to connect to resources that are only available on it’s network. These things are called Hidden Services. Since they are only accessible to people who are connecting to the Tor network you will have a connection that is encrypted end to end and is still anonymous.

This makes TorChat the best anonymous and encrypted instant messaging client out there. Please understand that the Tor network was never meant to handle heavy loads such as file transfers or bittorrent and can be very slow at times.

TorChat Native Mac Port Client of TorChat Portable Java Client of TorChat Read More