Solved: Word 2013 does not immediately save files

After repeatedly working on a file, hitting save, attaching the file to an email, and realizing I sent the unsaved version of the file; I decided to dig into this odd behavior of Microsoft Word 2013.

My initial workaround was completely closing all Word windows, but I didn’t want to have to close all of my documents to save one.

After a little more digging a simple setting solves this problem. Go to File -> Options -> Advanced. Scroll down to Save and uncheck "Allow background saves".

Convenient Device Charging

A simple solution to charging multiple devices, keeping cords out of the way, and making everything easily accessible is using a pencil drawer and a multi port charger.

Device Charging Drawer

Items

Steps:

  1. Drill a 7/8 inch hole in the back of the drawer.
  2. Attach the USB charger to the drawer with the Velcro strips.
  3. Screw the drawer into the underside of your desk.
  4. Attach USB cables and charge.
  5. Purchase Links

MacGyver Season 1 Episode 7 Fact Check

My take on the accuracy and plausibility of MacGyver Season 1 Episode 7: Can Opener aired November 4, 2016 on a scale of (Accurate, Probable, Possible, Unlikely, Bogus).

If there are any other statements or events you would like me to analyze, please add a comment with a brief description and the time in the show.


1:48 Gas truck, Fire hose, and cable lock to create a ring of fire

Unlikely (guess): It's not clear why the gas truck has a nozzle on top. It is unlikely that the cable lock would create a tight enough seal. I think it is unlikely that a bullet would provide enough heat to ignite the gasoline.


10:19 Riley: "They ran a security update and patched the hole in their system I was using as a back door."

Accurate: Calling it a "Back Door" might not be 100% accurate; however having a reliable exploit for a known vulnerability would be just as good.


12:20 An inhaler won't spray, because the pin in the cartridge is missing.

Possible: While using a piece of a fork to temporarily replace the pin could work, it would probably not be that reliable. Additionally, the problem is with the cartridge and not the inhaler, so inserting a new cartridge would have fixed the problem.


17:02 Jack: "'Jail', what an idiot. I just bypassed his password.
Riley: "It was in sleep mode Jack. You literally could have hit any key."

Bogus: Jack hit 9 keys to type 'jail'. Then the screensaver (not sleep mode) turned off when Jack pressed <enter>. It should have turned off when the first key was pressed.


19:58 Mac: "A towel soaked in water can pack a pretty good punch. Add some powered bleach to give it a little bit of a sting. Wrap the whole thing in a sheet for extra range, and you have yourself a weapon from the middle ages called a flail."

Possible (guess): While the towel soaked in water is not an insignificant amount of mass, I doubt it would be hard enough to reliably incapacitate an attacker.


26:42 Hydrogen electrolysis

Unlikely (guess): Mac uses a radio battery, salt from food, and water to create hydrogen. It's hard to tell if the battery contains enough power to produce enough hydrogen and I have no idea how much hydrogen would be necessary to blow the steel door out. I highly doubt they could survive the pressure necessary to blow out the door. Using the wires from the light fixture to ignite the hydrogen appears realistic. He only undoes a wire nut, so he could be fairly confident of not shocking himself.


31:00 Ladder from shelves

Unlikely: Mac's paperclip screwdriver would not be stiff enough to unscrew most shelve. Most shelves use the shelves as the horizontal supports, so it is not possible to use one end as a ladder once the shelves have been removed.


31:53 Chemical embrittlement

Bogus: Fire extinguisher (CO2), Alcohol to create a very cold liquid to embrittle steel bars. Mac does not put enough of his mixture on the bars to possibly do anything.


35:57 Manually flashing a car's taillight

Accurate: Auto electrical systems run on 12V so Mac can safely touch the wires with his bare hands.


37:50 Torture using Nitrogen

Bogus: According to Wikipedia, inert gas asphyxiation does not cause pain, since pain comes from high CO2 levels.


39:08 Pressure vessel rocket

Bogus: Somehow Mac is able to magically kick the valve off of a nitrogen tank, turning it into a projectile that perfectly takes out the bad guys.

MacGyver Season 1 Episode 6 Fact Check

My take on the accuracy and plausibility of MacGyver Season 1 Episode 6: Wrench aired October 28, 2016 on a scale of (Accurate, Probable, Possible, Unlikely, Bogus).

If there are any other statements or events you would like me to analyze, please add a comment with a brief description and the time in the show.


2:15 Airbag to shatter glass and blow a hole though at least 3 feet of loosely packed dirt.

Unlikely (guess): While the airbag should be powerful enough to shatter the glass when placed directly against it, it is unlikely the airbag would have enough power to blow a hole though 3 feet of loosely packed dirt.


9:10 Mac: "3D Printed Polymer Detonator, invisible to X-rays"

Bogus: The packaging could be 3D printed out of plastic so it is invisible to X-Rays, but at 9:22 the internals of the detonator are shown to contain AA size batteries, a 7 segment display, wires, and PCB which contain metal and would show up on an X-ray.

macs1e6-bomb

10:19 Using bomb suits, a dumpster, and car to direct the blast of a bomb into the sewer system.

Unlikely (guess): It's hard to tell how much the bomb suits would direct the explosion; however, the manhole cover is probably at least 1" thick steel (most covers that are greater than 24" in diameter are at least 1" thick according to Neenah Foundry) vs. a dumpster that is 1/8" steel. Also, the car is parked on the plastic lid of the dumpster to hold the dumpster down.


13:15 Riley: "GSM SIM chips have a 15 digit serial number"

Bogus: My T-Mobile GSM SIM Start Kit has a 19 digit SIM Card Number.


15:20 Smartphone (can't tell what type) camera on a long ribbon cable

Unlikely: I can't tell what type of smartphone MacGyver uses; however, most modern smartphones keep cables as short as possible:


16:45 A smoking computer with embedded plastic explosives will explode soon...

Bogus: Plastic explosive can burn; however, fire will not cause plastic explosive to explode.


18:00 diesel fuel will dissolve plastic explosive

Unknown


36:00 Disarming a bomb: a bolt must be unscrewed with a rope

Unknown: This seems highly unlikely to me.

How to Verify OpenSSH Source

Download the source, signature, and old key from http://www.openssh.com/portable.html. I picked 3 different mirrors:

Download the current key from the MIT PGP Public Key Server at 0xD3E5F56B6D920D30.

Verify the current key is signed with the old key:

Kenjis-MacBook-Air:ssh kenji$ gpg --import DJM-GPG-KEY.asc

gpg: key 86FF9C48: "Damien Miller (Personal Key) <[email-removed]>" not changed
gpg: Total number processed: 1
gpg:              unchanged: 1

Kenjis-MacBook-Air:ssh kenji$ gpg --import 0xD3E5F56B6D920D30.asc

gpg: key 6D920D30: public key "Damien Miller <[email-removed]>" imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0  valid:   1  signed:   0  trust: 0-, 0q, 0n, 0m, 0f, 1u

Kenjis-MacBook-Air:ssh kenji$ gpg --check-sigs 0xD3E5F56B6D920D30

pub   3200R/6D920D30 2013-12-10 [expires: 2021-01-01]
uid                  Damien Miller <[email-removed]>
sig!         86FF9C48 2013-12-10  Damien Miller (Personal Key) <[email-removed]>
sig!3        6D920D30 2013-12-10  Damien Miller <[email-removed]>
sub   3200R/672A1105 2013-12-10 [expires: 2021-01-01]
sig!         6D920D30 2013-12-10  Damien Miller <[email-removed]>

Verify the signature of the openssh source.

Kenjis-MacBook-Air:ssh kenji$ gpg --verify openssh-7.1p2.tar.gz.asc openssh-7.1p2.tar.gz

gpg: Signature made Wed Jan 13 17:13:46 2016 PST using RSA key ID 6D920D30
gpg: Good signature from "Damien Miller <[email-removed]>"
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 59C2 118E D206 D927 E667  EBE3 D3E5 F56B 6D92 0D30

Full Process

Download the OpenSSH source, signature, and old key as described above.

Use pgpdump to determine the full Key ID used to sign the tarball.

Kenjis-MacBook-Air:pgpdump-0.29 kenji$ ./pgpdump openssh-7.1p2.tar.gz.asc 
Old: Signature Packet(tag 2)(428 bytes)
	Ver 4 - new
	Sig type - Signature of a binary document(0x00).
	Pub alg - RSA Encrypt or Sign(pub 1)
	Hash alg - SHA512(hash 10)
	Hashed Sub: signature creation time(sub 2)(4 bytes)
		Time - Wed Jan 13 17:13:46 PST 2016
	Sub: issuer key ID(sub 16)(8 bytes)
		Key ID - 0xD3E5F56B6D920D30
	Hash left 2 bytes - d2 4c 
	RSA m^d mod n(3197 bits) - ...
		-> PKCS-1

If you don’t have pgp dump, you can use gpg --verify to see the short key ID:

Kenjis-MacBook-Air:ssh kenji$ gpg --verify openssh-7.1p2.tar.gz.asc openssh-7.1p2.tar.gz
gpg: Signature made Wed Jan 13 17:13:46 2016 PST using RSA key ID 6D920D30
gpg: Can't check signature: public key not found

OR you can manually parse the signature packet as described below.

Download the signature key from the MIT PGP Public Key Server at 0xD3E5F56B6D920D30.

The OpenSSH mailing list (https://lists.mindrot.org/pipermail/openssh-unix-dev/2013-December/031905.html) shows that Damien Miller is the signer of the portable source. Search for all of his keys on the MIT Key Server https://pgp.mit.edu/pks/lookup?search=Damien+Miller&op=index. This shows 0xD3E5F56B6D920D30 and 0xCE8ECB0386FF9C48 (i.e. DJM-GPG-KEY.asc) belonging to Damien Miller. Even though the 0xCE8ECB0386FF9C48 is listed as revoked, I think the keys can be trusted; because DJM-GPG-KEY.asc continues to be posted on the OpenSSH mirrors, and the creation date for 0xD3E5F56B6D920D30 is consistent with the mailing list announcement.

Verify the signature on the current key and the source as described above.

PGP Signature Parsing

Extract the raw signature:

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=
=0gQS
-----END PGP SIGNATURE-----

Copy this into a file.

Convert the base64 to binary and then view in a hex editor:

base64 -D <file> | xxd
0000000: 8901 ac04 0001 0a00 0605 0256 96f6 4a00  ...........V..J.
0000010: 0a09 10d3 e5f5 6b6d 920d 30d2 4c0c 7d17  ......km..0.L.}.
0000020: 7cbb 53fc f910 d7a0 5df6 ba1b 4ec1 0018  |.S.....]...N...
0000030: df57 09cf 6801 7f68 e705 5fc1 133c 4134  .W..h..h.._..<A4
0000040: 2be9 39b1 3d10 208c c962 b445 20a3 1d00  +.9.=. ..b.E ...
0000050: 717f 0a16 e187 6400 0ac1 6716 dec5 7b54  q.....d...g...{T
0000060: 7d73 a551 d701 d5c7 383a a82f bee7 e4b4  }s.Q....8:./....
0000070: cb79 b718 35ed 548a bfcb 48db 7982 4f42  .y..5.T...H.y.OB
0000080: 1bb3 7769 a73f 8f34 01f6 2f37 0a59 35db  ..wi.?.4../7.Y5.
0000090: 1ebe cf43 3638 aae7 d9df 7e91 e800 cab9  ...C68....~.....
00000a0: 7a9f 5050 cdc7 ba0b 1227 a14e b482 ec08  z.PP.....'.N....
00000b0: 4833 759a 82ab f675 1049 3645 bf0a 2df0  H3u....u.I6E..-.
00000c0: a969 d343 a20e 0f90 3ffc 40cb 556d 12a9  .i.C....?.@.Um..
00000d0: 0d7f e27e e658 19a4 a224 70d3 1cc5 c519  ...~.X...$p.....
00000e0: e71c a8e1 c081 aac2 3e68 3a80 c5cd 939a  ........>h:.....
00000f0: e97b 4e70 8c21 f555 de99 3979 1aaf 996a  .{Np.!.U..9y...j
0000100: 2691 140d 5344 7b15 5d54 f54e 0494 801d  &...SD{.]T.N....
0000110: ccbb 2dcf c8e1 4798 7119 94bc 9f3e b355  ..-...G.q....>.U
0000120: fd68 e857 5f33 a2c5 4677 67a0 181f 232b  .h.W_3..Fwg...#+
0000130: ac73 7eda 4f7a 8567 7625 8fc1 2233 e761  .s~.Oz.gv%.."3.a
0000140: 3ac4 1b68 0955 ebd2 4b23 cf7c 1b83 1fbd  :..h.U..K#.|....
0000150: 34e5 45e7 c668 d7d7 8de8 d7f5 1f81 0fdc  4.E..h..........
0000160: ad1a 3439 e333 996c 072a 6118 6939 5bbb  ..49.3.l.*a.i9[.
0000170: 1051 cd2e e18b f0e1 16dc f551 95f0 8fd9  .Q.........Q....
0000180: 49d7 70e5 63eb a0d4 179a c3b4 e9e3 b67b  I.p.c..........{
0000190: 2f0f 3942 3809 a293 7bc5 167d cef8 3179  /.9B8...{..}..1y
00001a0: 05f7 79bc 303e d576 6078 9580 ac16 2f    ..y.0>.v`x..../
Packet Tag: 0x89 = Old Format Packet, Tag = 2, 2 octet packet length
Packet Length: 0x01AC = 428 bytes
Signature Version: 0x04 = Version 4
Signature Type: 0x00 = Binary Signature
Signature Algorithm: 0x01 = RSA
Hash Algorithm: 0x0A = SHA-512
Hashed Subpacket(s) Size: 0x0006 = 6 bytes
Hashed Subpacket: 0x05025696f64A
   Size: 0x05 = 5 bytes
   Type: 0x02 = Signature Creation Time
   Time: 0x5696f64a = Wed Jan 13 17:13:46 PST 2016
Unhashed subpacket(s) size: 0x000A = 10 bytes
Unhashed subpacket: 0x09 10D3 E5F5 6B6D 920D 30
   Size: 0x09 = 9 bytes
   Type: 0x10 = placeholder for backwards compatibility
   Key ID: D3E5F56B6D920D30
Left 16 bits of hash: 0xD24C
MPI Length: 0x0C7D = 3197 bits = 400 bytes