Stealing sneakers from NIKE

June 14, 2013

stealing-sneakers-from-nike  Facebook  Twitter  Google +  

as the whole crafty geeks knows, nike has a target=_blank>rvsp system via twitter.


they are offering free footwears to followers who sends promotion codes. im absolutely strange their marketing strategies and not so interested. but my interest point is that cheap pictures. actually you can find this cloaked text block via any graphic editor. just open image, decrease color depth and floodfill an empty area. thats it! you found the block. any ocr engine can easily read that result.
i created a php function which can process same steps via programmaticaly. you can find it in /code/objdetect.php target=_blank>devzone section.
other requirements for a full featured rvsp bot: - grab twitter client class
- install tesseract OCR engine and you have to write few lines of code which can process this steps: 1 - read nike account's timeline with a spesific time interval (~30sec) 2 - if new tweet appears with url*** download that image 3 - extract highlighted hashtag with /code/objdetect.php target=_blank>this function 4 - convert extracted part of image to string with target=_blank>tesseract ocr library
5 - send DM to nike's twitter account with target=_blank>this class
good luck.

  Most popular entries

VR Experiences #1: Oculus Rift

The 80's childs are familiar with virtual reality term. we seen this subject in the action at johnny mnemonic, the lawnmowerman etc.if you're not living in a cave, probably should know the

Stealing sneakers from NIKE

as the whole crafty geeks knows, nike has a rvsp system via twitter. they

Bytecheleby at revision

Looks like our portable shell "Bytecheleby" still useful on scene. im started to enhance it by using my newest libraries and lots of new stuff. stay connected for latest releases

Pain and Suffer inside: Displaylink Adapter

as mentioned on my recent tweets, was looking for a low cost multi-display solution about couple weeks. gaming oriented gfx cards already

Entering system level command line

I get this trick from a sysadmin friend. it allows to enter system level shell access in Windows Vista and later versions. useful for bypass UAC and ntfs file permission create SuperC