somethings from codeland

Thursday, December 29, 2005

Cracking the xbox (not the 360)

http://www.how2xbox.com/programs.htm

a decent link to some good resources...

gMail is GREAT

... ok so you have 2gigs of storage and you can access it from any browser etc... But now you also can preview a conversation by just right-clicking it.

First off if you don't have firefox then you should seriously consider praying and then go to mozilla.com and download it.

If you don't have a gmail account then go get one. Then go get greasemonkey. Now if you don't know, greasemonkey can do just about anything (provided you script the actions out). Its a great way to provide extra functionality to already one of the greatest browsers out there.

Ok so you have a new gmail account, and you have greasemonkey extension installed on firefox. Now you need the scripts installed. Head over to persistent.info and read through what he has to offer. I found the preview bubbles a great help in thumbing through email without having to get out of the inbox view. Another great one to get are the gmail macros. This will provide the functionality of not having to highlight/select all the messages you want to delete and go through the drop down menu to delete messages.

http://persistent.info/ - This guy is really all about greasemonkey scripts.

Wednesday, December 28, 2005

Adobe Reader too Slow

Ok so adobe reader and pdf's are a great thing right. Well make it even better and don't wait for all of those plugin's to load. Foxit is a really good pdf viewer that doesnt even have to install. Just start opening pdf's with it and you're all setup...

Apache for cygwin

To test out wordpress 2.0 on a project at work I am attempting to make apache for cygwin a native windows service. I found that cygrun -I

http://httpd.apache.org/docs/1.3/cygwin.html#serv


  • Installing Apache as a new Service

    Use the following statement to install
    httpd.exe as a new service:


      $ cygrunsrv -I service_name-p /usr/local/apache/bin/httpd.exe 
    [-a arguments] [-e VAR=VALUE] [-t auto|manual]
    [-u user] [-w passwd]



    Where -a is used to pass command line
    arguments (such as -DFOO defines) to
    httpd.exe, and -e is used to pass
    environment variables. If necessary you may use the
    -t options to set the autostart configuration
    for the service. If you want the new service to run under a
    different userid, you will have to supply the
    -u and -w options.






  • Starting Apache as a Service

    After the new service is installed it can be started
    using the following command:


      $ cygrunsrv -S service_name


    Check your process table and global
    error_log file to ensure Apache has started
    without any major problems.






  • Stopping an Apache Service

    A running Apache service may be stopped using the
    following command:


      $ cygrunsrv -E service_name


    This will stop all running httpd.exe

    processes and shutdown the HTTP service for the
    machine.





  • Removing an Apache Service

    An installed Apache service may be removed from Windows
    NT or Windows 2000 using the following command:


      $ cygrunsrv -R service_name



    This will remove your previously defined and installed
    service from the machine.

  • K2 for WordPress 2.0

    K2 - makes Wordpress easier (now for WP 2.0)

    http://binarybonsai.com/k2/

    Monitor Bandwidth with iptables

    Who knew that linux's firewall implementation has such functionality.

    http://www.linux.com/article.pl?sid=05/12/15/177232

    Monday, December 19, 2005

    torrentflux

    Here's an idea. Throw some php on your web server and manage torrent downloads through it...

    torrentflux

    MySQL Clustering

    MySQL clustering - (three machines required...)

    Background image maker...

    Background image maker

    Reflection like Apple...

    Reflection through javascript?
    Check the source on the demo link...

    What it does...

    image reflect on background canvas...

    Java Compiler

    http://gcc.gnu.org/java/

    Nero Scout - be gone...

    http://www.help2go.com/article260.html - get rid of nero scout

    this little program grabs all your music files and puts them all in a database....

    article for more...

    go to start and click run. Then type copy and paste the following and hit run:

    regsvr32 /u "%COMMONPROGRAMFILES%\Ahead\Lib\MediaLibraryNSE.dll"

    Sunday, December 18, 2005

    IronGeek

    IronGeek - new stuff... nice to do a recap on hacking illustrated...

    Saturday, December 17, 2005

    Another geek site

    If you're into listening to geek talk whilst you browse the web, here's another one for you...

    TWAT radio

    Friday, December 16, 2005

    Ruby on Rails


    Ruby = another web development language
    rails = framework to integrate with a database architecture
    radrails = ruby ide
    four days on rails - a ruby on rails production howto

    I like how the emphasis is not on the setup. Its not long and drawn out. Its easy to dive into the language. Interesting way to develop...

    Hamachi

    http://www.hamachi.cc/ - alternative to vpn

    Remote LAN networking implementation...

    Wednesday, December 14, 2005

    Control iTunes from a web Browswer

    Have an entertainment center with a computer full of digital music??
    Install a web server and Control iTunes via webpage...

    Turn your laptop into the ultimate controller...
    Guide

    Davinci Code Trailer = Awesome...

    Davinci Code Trailer

    (Quicktime Needed)

    Tuesday, December 13, 2005

    iPod mini mod: Storage and Battery Upgrades

    Upgrade Guide - 8gb compact flash hard drive upgrade, and while you're in there, upgrade to double the capacity of the original mini's battery...

    Sunday, December 11, 2005

    Design: Rounded edges

    http://www.tuaw.com/2005/05/03/apple-developer-connection-tiger-articles/

    I like the layout...

    Friday, December 09, 2005

    SSH manual

    SSH Manual - what you didn't know about ssh...

    msconfig used to be...

    SysInternals... yes sysinternals has released a better utility to keep track of all of those startup options to be configured in windows...

    from digg
    "This utility has the most comprehensive knowledge of auto-starting locations of any startup monitor. You'll probably be surprised at how many executables are launched automatically. It shows you what programs are configured to run during system bootup or login, and shows you the entries in the order Windows processes them, and it's by Sysinternals!"

    http://www.sysinternals.com/utilities/autoruns.html

    Windows Passwords revealed faster

    Ophrack 2.1 - Comes with a windows GTK + port and will even run on a linux boot cd...

    http://blog.tech-security.com/?p=15

    WPA wireless cracking tools

    WPA is supposed to be the best of the best. Now, if you have a short wpa passkey, its as easy to crack as WEP...

    http://wifinetnews.com/archives/004428.html

    Sunday, December 04, 2005

    Saturday, November 26, 2005

    The picture guy within

    I forgot how fun it was to play with and manage pictures. Really, I almost forgot what I had a camera. I was reading through some reviews of picture management applications. I must say that I really like what I've seen. There are many programs that offer a lot of features. But Google has done it again. For free, Google offers a program that not only makes it easy to maintain all of those pictures, but also to edit out unwanted red eye, correct darkness, trim, or whatever else your editing desires may entail. Picasa, the name of this great little program, also integrates itself into many other features. You can blog straight from the application or even order prints of your pictures over the internet. Picasa is what other photo-managing applications aim to be, while still maintaining that inexperienced computer users can do everything the IT guru can.

    Picasa - from Google

    Thursday, November 24, 2005

    open source magazine = free

    o3 - a very promising magazine full of useful projects. I had never heard of wifi dog. If you dont know what it is, I suggest you get in on this free pdf distributed over bittorent. (and no, this isn't illegal)

    usb/ip project

    USB/IP - use any usb device over an ip network as though it were directly connected to your local machine...

    Linux on iPod Nano

    Linux on the iPod Nano

    Monday, November 21, 2005

    TV tad

    TVtad.net
    rss + torrent + your fav tv shows = TVtad
    keep up with the episodes...

    bandwidth aggregation

    Combine multiple network connections to get better down speeds through the linux kernel...

    anyone have a neighbor with wifi???

    Friday, November 18, 2005

    mysql on cygwin

    So I am running a windows 2000 server box with cygwin now. I have the latest and greatest running... However, for some reason Cygwin doesnot natively install mysqld in the databases section in the installation. But fear not: there is source out there to compile for your cygwin mysql needs: http://dev.mysql.com/downloads/cygwin.html

    and here are the instructions: http://dev.mysql.com/doc/refman/5.0/en/installing-source-tree.html

    Color MatchMaker...

    Color Matcher - this tool will let you know what colors work with other colors for style...

    Friday, November 11, 2005

    PHP FTP uploads

    PHP FTP uploads (wiki page...)

    Tuesday, November 08, 2005

    ssh on windows

    So there is no port of OpenSSH to windows. There is always Cygwin though. Hopefully it wont be that big a pain in the ass to setup... I used to like digging into all the aspects of something that I was interested in. Now I'm starting to get to the point where I want it to work and be secure. Still like all the details, but take a more objective approach to everyhting now.

    A good tutorial

    Monday, November 07, 2005

    Get money for that Tech Support

    Your own Geek Squad

    A good idea on how you can use Ultra VNC and your own website to start making money for all that tech support that you do...

    Monday, October 24, 2005

    Sign up for free Spam

    http://www.toastedspam.com/freespamlist

    Ok so someone is just really irritating...

    Kill their inbox with almost every spam database ever... (most of them don't even verify, they just start sending out...)

    Monday, October 17, 2005

    AJAX revolution...

    Mixed opinions flood the web about all new technologies. The only difference is that this particular technology is to revolutionalize the web itself. AJAX is to change the way that we view content. Now this language is in serious need of standardization. A lot of pioneering coders have implemented serious logic errors while maintaining that "it looks cool." The main reason AJAX is looked down upon is simply because of the fact that all it offers, all the glamor is capable of rendering, can easily be taken advantage of, and exploited, turning it into the next Flash: All style and no substance.

    I would say with maturation this language posseses what the web needs to keep on top of the game of web fashion, while still providing adequate measures of reliablity to still offer the substance sites provide to date. This provides a lot more bells and whistles, giving web developers the options needed to develop a true unique solution or sense of style.

    "Browsers whose JavaScript Interpreters provide the XMLHttpRequest object can make nonblocking calls back to the server. The server can return peices of HTML to be displayed, JavaScript to be run by the browser, or indeed any data you like."
    -Rick Wayne of Software Development magazine


    Mr. Waynes latest craze is integrating AJAX into his future productions utilizing a dynamic scripting solution called Ruby on Rails. This open source platform integrates easily with database architecture (mostly automating the process for you) and is not hard to pick up. Making that latest idea come to life with the latest technology web programming and design has to offer is only getting better. At least check it out, so you're not left behind.

    For more on Ruby on Rails with AJAX check out O'Reilly

    from the AJAX wiki

    Articles


    Wednesday, October 12, 2005

    Web 2.0 Explained

    Web 2.0 is the future. What is Web 2.0? Well here we go...

    Tech aspects:

    O'Reilly
    Web 2.0 Conference
    Technology Review an online MIT publication

    http://www.oreillynet.com/pub/a/network/2005/10/06/barry-diller-opens-web-20.html
    http://paulmiller.typepad.com/thinking_about_the_future/2005/08/thinking_about_.html
    http://internetalchemy.org/

    examples of the future: bindows.net

    What this means to you:


    No expensive operating systems
    No going back and forth with files to print out or something like that (as long as a computer has an internet connection, you have access to your entire office space...

    This could mean major savings for the corporate computing structure (if a secure solution was implemented in-house) I think this is going places. You dont have to have people off with Laptops equipped with expensive software, all you need is a tunnel to the internet. Just a browser that runs on a locked down operating system. So much for document viruses... We just have to have reliable servers, that experience little to no downtime and this "coming of the future" will be the future...

    Sunday, October 09, 2005

    os x86 anyone???

    So I did the vmWare install, and I like. I stayed up a little to apply a hack to use networking correctly... I like the simplistic approach to things. I think I'm going to try it out. Went through the apple store today, and I must say that I really like the 12in. powerbook. Good times
    Are you ready to join the cult and harness the simplicity of stable computing? I think I'll dive in permanently when the intel chips start making their debut...



    http://www.osx86.theplaceforitall.com/howto/

    Friday, October 07, 2005

    a Linux Firewall Solution


    This is a great application for network security.

    Three nics in an old machine will get you connectivity for:
    1) WAN
    2) LAN
    3) a True DMZ access zone

    so create a true NAT router/Firewall solution

    This comes complete with all the bells and whistles of an html interface. Easy to both install and configure.

    Saturday, October 01, 2005

    a quick word on headphones

    Ok, so I am a Nano fan. The headphones supplied with iPods are all kinds of horrible though. I did however take the plunge and spent the $30 on sony's in ear headphones. Which turned out to be a horrible mistake made twice. Excellent sound quality horrible engineering in terms of product tolerance. Just from being in my pocket, both pairs of the sony MDR-EX71SL/WK white wire covering striped off and then the left earphone stopped playing sound. So after having this happen twice I dove in deeper to regain the quality of sound that the Nano harnesses: I went mac yet again, with their in ear headphones, and I am loving it. The engineering behind the tolerance on these is still to be determined, but I do love the way the headphones fit the ear better.


    stay away from these:
    Sony=Bad

    These rock so go for it...
    Apple=Good

    Wednesday, September 21, 2005

    Opera for free

    Yes, opera has taken the ad banners out of their browser. So go and check it out. Apparently its more secure than Mozilla or IE, has the tabbed browsing capabilities, and shows pages that are meant to render in IE properly. (a problem that Firefox faces with grim approach)

    Check it out:


    Update: Pages that don't render properly in Firefox are mainly becuase the code for the site does not adhere to the standards of the www

    Big companys (ie Microsoft, Yahoo, etc.) hate standardization. Mainly becuase it means that they have to compete on the same ground as the next guy. If you have a huge customer basis already, then why standardize and give people an easy alternative to convert to???

    Tuesday, September 13, 2005

    Ebay Buying Skype?

    Ebay buys skype for an estimated $4.1 billion. The idea being that you can talk to whoever your buying from securely. I like the idea, but where does that leave us? Are we going to have to go back to cell phone rates? Apparently Ebay is only supposed to make $50m in revenues this year, so there's gonna be something good coming of all this.

    Wednesday, September 07, 2005

    iPod Nano



    ... 'nough said.

    Saturday, September 03, 2005

    OS x-86

    Here's your HowTo

    Super Notebook kicks serious ass...

    "Take these guys seriously; their ideas are the future of computing..."
    Image hosted by Photobucket.com
    SPECIFICATION:

    Processor: 6.8GHZ CPU (AtomChip® Quantum® II processor or 4 x Intel® Pentium® M processors 1.7CHz) / System Compliance: Two Operating Systems with Voice Command (Microsoft® Windows® XP Professional and Linux®) / Memory: 1TB Quantum-Optical non-volatile RAM (NvIOpSRAM-SODIMM 200-pin) / Storage: 2TB non-volatile Quantum RAM (NvIOpRAM-ATA IDE) / Optical Drive: DVD Super Multi / LCD Display: 12.1” WXGA (1280 x 800, 16:10) TFT Glare Type LCD display with 1.3 Mega pixel CMOS camera / Video & Graphics: Two Integrated graphic controllers [Intel®855GME internal graphics, support Intel® DVMT (Dynamic Video Memory Technology) and AtomChip® DVM (Dynamic Video Memory)] / Communication: 10/100 Base-T LAN on board, MDC Fax/Modem V.90/V.92 on Board, 802.11a/802.11b/802.11g WLAN, Intel® PRO/Wireless 2100/2200BG/2915ABG network connection, WiFi, Bluetoth, GPRS -with Bluetoth antena, CMOS camera with USB interface, Mega pixel resolution CMOS image / Pointing Device: Synaptics touchpad with 4 way scrolling button / Application Launch Key: E-mail, Internet, Capture, WLAN / LED Status Indicator: Power, Suspend/Resume, Battery Charging Status, Quantum Storage Access, Num Lock mode, Caps Lock mode, Scroll Lock mode, WLAN Lock mode / Keyboard: 3.0mm travel, inverted-T, 88keys with 2 windows key (Internet & Microsoft For Connectivity) / Interface Ports Front Side: One 4-in-1 card reader slot (support SDIO/SD/MS Pro/MS), Audio line out, Stereo Microphone-in / Interface Ports Left Side: LAN port, Modem port, SVGA–out port, One Type II PCMCIA slot (support CardBus), 1394A port (mini jack) / Interface Ports Right Side: USB 2.0 ports x 3 / Interface Port Rear Side: DC-in, Kensington Lock / Audio: Built-in two stereo speakers and Built-in Microphone / AC Adapter (Input: 100-240V AC, 50-60Hz, 1.5A. Output: 20V DC, 2.5A, 50W) / Battery: 6 cell Li-lon battery pack. Battery Charge: 3 hrs charge time to 100% capacity while system off and 4 hrs charge time while system on. Battery Life: Approximately 8 hours for AtomChip® Quantum® II processor and 3 hours for 4 x Intel® Pentium® M processors 1.7CHz / BIOS: AMI, Support PnP, password, Bootable from USB and DVD / Power Management: ACPI 2.0 compliance / Smart Battery System Support / Security: Kensington Lock / Size: 320.0(W) x 242.0(D) x 22.0(H)mm/28.0mm (front/back) / Weight: 1.9kg(when fully equipped with AtomChip® Quantum® II processor) and 2,20kg(when fully equipped with 4 x Intel® Pentium® M processors) / Packing Accessories: Quick Guide, Support CD (Driver, Utility, Manual), AC Adapter, Power Cord, Battery Pack, BOSE Headphone Music System with noise Cancelling.

    Wednesday, August 31, 2005

    USB Car key!?


    I think that its an awesome idea: Mazda's new hatchback is to open your door, start your car, add music to the car's internal hard drive, and provide a means for loading GPS Maps. I think that this will be my next vehicle definetly. Like the guy that wrote this article,"Good thing this is still a production car, and my [truck] is still running good.

    http://www.japancorp.net/Article.Asp?Art_ID=10779

    Monday, August 29, 2005

    Knoppix Arcade Machine

    So another knoppix distro for the kiddies

    Knoppix Mame will turn any machine into a sweet arcade machine. Sounds great for my little brothers and sisters...

    The original package can be found on sourceforge, but I would say its a hell of a lot easier just downloading off of exeem or demonoid. (torrents) If you go with the original package then you still have to add your own roms to the distro and rebuild, whereas if you go do a search for "mame" on a torrent network of some kind, its already there. But hey if you dont have anything better to do then have fun.

    Friday, August 26, 2005

    Chinese Hacking the DoD

    Interesting Article ...kinda long

    Identity Thieves in Action: Video

    Image hosted by Photobucket.com

    http://www.identitytheftsecrets.com/videos/paypalemail3.html\

    Interesting to see how these guys go through this process...

    Detect weak network passwords with Hydra

    Security experts always advise you to use only strong alphanumeric
    passwords for network applications, and change them often, but you know
    that not everyone on your network is security-conscious. Starting to
    worry that weak passwords may be slipping through your defenses? Then
    it's time to unleash Hydra, a network login cracker for more than 30 network services.

    Hydra comes from The Hacker's Choice

    (THC), a group that has written more than 60 open source network
    security tools and research papers. Hydra receives frequent updates and
    is the group's second most downloaded project.



    I ran Hydra against a MySQL server on my local machine. The simplest
    way to run Hydra is to specify a user name and password combination for
    it to try. This is useful only when you know what the username or
    password of the service is likely to be. To get a feel for Hydra, use a
    login and password that you know will succeed. I did so by running:



    hydra localhost mysql -l root -p rootpass


    This runs Hydra against MySQL on the local machine with a login of root
    and a password of rootpass. By default, Hydra spawns 16 concurrent
    processes. Adding more processes with the -t
    option can speed things up a bit at the risk locking yourself out of a
    network service if the administrator restricts the number of connection
    attempts. Here, Hydra reports it succeeded in connecting with this
    combination and outputs:



    [3306][mysql] host: 127.0.0.1 login: root password: rootpass



    To run Hydra against a machine on a network, just substitute localhost with an IP address or hostname.



    Specifying a login and password combination for every attempt is not
    very efficient. The login part of the equation is the easy one. Typical
    logins for most network services are words like root or admin. The
    password part is where the difficulty lies. That is what makes Hydra's
    ability to use dictionary files for both logins and passwords so
    useful. A dictionary file contains a list of words (one word per line)
    that Hydra can cycle through for logins or passwords.



    You can specify a dictionary file with the following syntax:



    hydra localhost mysql -L login.txt -P pass.txt

    Hydra does not come with any dictionary files -- you must
    create your own or download one. One option is to use something like an
    English language thesaurus
    from Project Gutenberg. This list contains commas and does not have
    only one word per line. You can clean up this list with the following
    Sed command:



    sed -e 's/,/ /g' -e 's/[ ]/\n/g' mthesaur.txt | sort | uniq > pass.txt



    This removes the commas, places each word on its own line, and removes
    duplicate entries. This gives you a dictionary file with 74,618 words.



    One way to test Hydra with a file this size is to create a small
    login dictionary file with usernames and use a large dictionary file
    for passwords. Next, add a MySQL account with a username and password
    combination from these files. For example, using a login dictionary
    file with 10 entries and pass.txt gives Hydra 746,180 combinations to
    cycle through.



    If you know the service you're testing against has a minimum
    password length -- say, passwords must be at least 10 characters long
    -- then testing passwords with fewer than 10 characters would be a
    waste of time and resources. Hydra comes with pw-inspector, a utility
    that sorts passwords based on criteria you pass to it. You can sort
    pass.txt to words with 10 or more characters, by running:



    cat pass.txt | pw-inspector -m 10 > sortedpass.txt



    This trims the list down to 28,571 words. The final command to run is:



    hydra localhost mysql -L logins.txt -P sortedpass.txt



    This brings down the number of combinations to a slimmer 285,710.



    The amount of time this takes depends on the speed of your machine
    and the placement of the login and password in the files. Hydra updates
    you as the process goes on. My 1.2GHz AMD Duron processor can crunch
    approximately 4,000 combinations per minute with an estimated time of
    one hour 10 minutes to run the whole set. This particular scan took an
    hour. I achieved nearly the same result over a switched 100Mbps network
    in later testing. In that test, Hydra's bandwidth usage averaged
    100Kbps. If you need to quit mid-scan, go ahead. Hydra saves its
    results in a file named hydra.restore. To pick up where you left off,
    use the command hydra -r from within the directory where you initiated the scan.



    There is much more to Hydra then what these simple examples show.
    Hydra can scan entire networks at a time and work through proxy
    servers. A GTK-based graphical interface called xhydra is also
    included.



    With the help of Hydra, you can weed out the weak logins and
    passwords that pose a security threat to your network. It's a good tool
    in your network security arsenal.

    Paul Virijevich is working to eliminate the "Linux consultants cost more" TCO myth. He recently started a consultancy, providing cost-effective open source solutions to small businesses.

    Saturday, August 20, 2005

    DVD Shrink

    For whatever reason, dvd shrink is no more. Apparently the team hasn't worked on it for a little bit now, and they are now closing the site. You can however find the dvd decrypter download off of
    r8.org

    ...and the dvd shrink program here at afterdawn
    DVD Shrink at AfterDawn

    Nessus Vulnerablity Assesment

    So this should turn to be an interesting project...

    For the windows boys...
    Windows Nessus

    Just straight off the Auditor boot cd
    http://new.remote-exploit.org/index.php/Auditor_main

    How to use it:
    Iron Geek on Nessus
    He's got a speech issue but the guy is damn brilliant

    If you're thinking I should have to put the link for a nessus download in linux then maybe you shouldn't be using linux...

    The ultimate hack

    Hacking started out on phones right? I think that would be great to make this work:

    • Go and grab a GSM transciever and rig it up with an asterisk linux based pbx box.
    • Make the pbx talk VOIP (Work your system out with a VOIP carrier...)
    • Have your GSM phone talk to the transciever and send your calls through the PBX via IP
    • Start saving a crapload on calls..


    found somewhere on slashdot

    Wednesday, August 17, 2005

    test your firewall

    Test your firewall (for the new guys...)

    http://www.hackerwatch.org/probe/

    HTTP headers explained

    Ever wonder how people can find out so much about you through the internet? Check into how your computer talks to the internet. Headers have a bunch of information that will allow people to assess how you get to you...

    fun with http headers

    Friday, August 12, 2005

    Coolest CarPC out there


    This is by far the coolest car computer ever. You know you want one, even if you aren't a nerd...

    password recovery

    A list of security firms:

    http://www.passwordportal.net/



    Have you lost or forgotten a password? Do you need help recovering a password? Here you will find links to Commercial Password Recovery resources.

    Newsgroups: Faster downloads

    Torrents are great, but you know you wont be getting those awesome download speeds that the internet is capable of. 800 kb/s sound good???

    Newsgroup download tutorials. They have a movie with some helpful search sites for material. Definitely worth looking into if you are even somewhat interested in awesome download speeds...

    monster telescopes made easy


    These things are huge, and you can build one.
    heres how...

    Build your own Wireless ISP

    IBM Wireless ISP Server page

    Myth (TV)ology

    Myth TV

    This prog plays well on Fedora Core 3

    http://wilsonet.com/mythtv/fcmyth.php

    Although I have found a mythKnopp version. (installs a myth tv system straight off of one distro installation disc...

    KnoppMyth Torrent



    Systm did an episode on a MythBox. All you need is a 2.0ghz machine with 512 mb ram, as much storage as you think you need (80gb is sufficient), and one or two tv tuner cards and you're in shape for some HDTV picture in Picture tivo session whatever.

    Thursday, August 11, 2005

    podcasts galore

    The latest version of iTunes has support for Podcasts, the latest and greatest reasoning behind buying one of those $300+ purchases... So far the best podcasts I have found so far are:


    ...and there is a podcast no matter what your flavor of preference is over at Odeo.com

    Tuesday, August 09, 2005

    WRT54G Firmware and WDS


    WDS- Wireless Distribution System

    By default, the stock firmware on the WRT54G does not support a whole list of features that it is capable of...

    ... and despite Sveasoft charging for their supped up version of the firmware its out under GPL protection circulating. Apparently they have been kicking people off of their subscriptions if they find that you link out to one of the GPL download sites.

    WRT54G Forum
    WDS Tutorial
    WRT54G firmware Download Site Download
    Sveasoft
    Subnetting WDS
    Open WRT Download
    Open WRT Documentation

    SQUID Proxy Server

    A project for the Pike house.

    Goals:

    • Transparent Proxy (no configuration required on browser)

    • A password for access (one generic password)

    • Keyword filter lists (block out all the crap out there)


    The network topology should prove interesting as well. I am going to spread wireless throughout the house. I will have to play with the setup, but it should work something like this: I will have the line running into the house, which will then run into a WRT54G. That one unit will run all http traffic (port 80) to the squid proxy server box. Then the box will be setup to intercept all http traffic, filter it, and cache results and forward pages to client browser. Not sure how to make http traffic go through squid without setting the box as a gateway.


    Links

    Transparent Proxy
    Squid config info
    Squid Home,
    www.squid-cache.org

    Squid
    Documentation Project, squid-docs.sourceforge.net

    Squid Browser Conf Info
    For Proxy
    Authentication,
    home.iae.nl/users/devet/squid/proxy_auth

    Sunday, August 07, 2005

    SNMP Protocol Analyzers

    So its come up often lately... The best way to go about monitoring a network is to have some sort of monitoring system in place to automate the process, thus effectively run a more efficient, cost effective, environment. I caught this SNMP protocol analyzer from Paessler. I must say, I love the visual that this company sends out. Not heard much about them, but their products seem both interesting and promising.


    Image hosted by Photobucket.com

    Friday, August 05, 2005

    Free Tech Support

    Need free Tech Support??? I always have people asking me for free tech support. I like to help, but I have realized that I don't have the time to support everyone. I don't mind helping out, don't get me wrong. But when I help someone and they become tech-needy stalkers, it doesn't make for a good relationship. So here you are people of little money and large problems... Protonic: a system composed of volunteer technicians. Now it is harder to turn down money, but you still run into the same relationship conflicts. I think this subject is large enough for debate: "Where is the line???/When is too much??? Maybe that will turn to be a future post.

    http://www.protonic.com/

    Thursday, August 04, 2005

    Forensics with Linux: White Papers

    This guy is a little crazy with his whole copyright statements. Odd becuase linux is mainly promoted by anti proprietary and freedom of information mindsets. Anyways, he has a good paper on how dd is used in computer forensics to copy erased data from data source evidence.
    http://www.crazytrain.com/papers.html
    http://www.crazytrain.com/dd.html

    Image hosted by Photobucket.com

    knoppix std 0.1 has everything you will need to hack or commit otherwise blackhat acts...
    knoppix STD 0.1 => torrent

    Wednesday, August 03, 2005

    Monitor Servers

    I don't do this often enough to go "all-out". But this does seem interesting. You can monitor any server's variables via snmp through proper configuration with Nagios or Zabbix. They might take some time to configure (the catch 22). These both are very good server monitoring productions.

    ZABBIX

    (they both have excellent reporting capability)

    They both utilize web serving capabilities to shoot out dynamic pages. I do believe that all programs will at least have some form of an interface in this fashion. The internet is due for an addition of another dimension... Flash is a good intro to what I am talking about... (something a little more capable of taking some popularity off of the television)

    Nagios
    Zabbix

    Tuesday, August 02, 2005

    Web Templates

    I've been studying web design (if you couldn't tell) and have found some interesting sites. There is a dynamic posting interface pMachine with a portfolio of featured sites that run on its software. I like the idea of building a site based on review information. So these are the steps toward that future production. I am not so much interested in the back-end side of the code as much as I am with the front-end. ie I dont care what platform I use (they seem to all be able to offer the same output variables) My interest is moreso along the lines of the way it ends up on the page.

    So I've heard of:
    pMachine
    sixapart.com (based more so for web bloggers)

    Moveable Type
    TypePad
    LiveJournal

    (I'm sure there are thousands more)

    So yes, Web Design proves to show interest in my future...

    Web design tutorials blog

    An interesting link worth looking into for design technique

    veerle.duoh.com

    Security Webinars

    Top Security characters live on ZDNet

    ZDNet Security Webinar

    Commenting your code...

    A nicely put reminder on code design readability

    http://particletree.com/features/successful-strategies-for-commenting-your-code
    Tips from MSDN on Commenting Code

    How to size text using ems

    Not familiar with the concept but I do plan on getting familiar with it...

    http://www.clagnut.com/blog/348/

    Monday, August 01, 2005

    Web Design: Absolute Positioning

    In collaboration with CSS there is a method to get things where you want them: Absolute Positioning. (Demonstrated in the following examples):

    http://www.academystudios.com
    http://www.dotfive.com

    Sunday, July 31, 2005

    Port reference info

    Ever wonder what that one port does? What ports are??? Here's a link of interest...

    http://www.iss.net/security_center/advice/Exploits/Ports/default.htm

    Port 113: ident seems of interest (although blocked by default on most firewalls)

    Intriguing Web Design

    Image hosted by Photobucket.com
    I have long since kept up with Kevin Rose and the appeal he brings to new technology. I recently learned of a social bookmarking system that he implemented called digg. Just digging around in there, I learned of a design group by the name of StopDesign, which has a refreshingly clean balance between design and pure data.

    http://stopdesign.com/
    http://www.mikeindustries.com/blog/archive/2005/07/make-your-site-mobile-friendly
    http://microformats.org/
    http://live8.technorati.com/
    http://www.flickr.com/photos/simplebitsdan/sets/663014/

    Graphics and Linux

    http://highend3d.com/

    This has to be one of the coolest looking sites that I have found in quite some time. They promote 3D graphics and animation.

    Something definately worth considering looking into. Slashdot has an article titled Disney, DreamWorks, Pixar Go Linux. Supposedly Linux is the best platform for higher end graphic design, most likely because of the lack of memory issues that windows seems to be plagued with.

    Linux is looking sweeter and sweeter. If you are not a gamer then I suggest looking into Fedora Core 4 with KDE 3.5. Not only is it a cleaner/smoother interface but it will probably make you more productive in the end.

    KDE is very similiar to the windows graphical user interface (GUI). However I prefer Gnome, because of its simplicity. It supports everything that I work with: mainly Firefox, abc torrent client, ssh command shell (for server configurations). Other than that I do have a little Dell Inspiron 700m that does run windows xp. Reason being that most of the clients I work with are on windows environments (making it easier to operate in a Microsoft Shop). I do have VMWare running a fedora core installation, which I do use to test the sites and database applications that I design. I would like to look further into some other distrobutions of linux however: namely Gentoo, Debian, and Solaris.

    America handing the Tech torch away???

    Being an undergraduate of Engineering, I am no doubt upset that the latest economic media frenzy is that the U.S. is losing commercial industry in the field of technology. And for good reason: a general lax attitude about higher education, limited expectations of the youth of this country, no involvement or signs of interest from the majority of the younger citizens of our country, etc... I could go on, but this abstract says a little more.




    Does Globalization of the Scientific/Engineering Workforce Threaten U.S. Economic Leadership?
    This paper develops four propositions that show that changes in the global job market for science and engineering (S&E) workers are eroding US dominance in S&E, which diminishes comparative advantage in high tech production and creates problems for American industry and workers: (1) The U.S. share of the world's science and engineering graduates is declining rapidly as European and Asian universities, particularly from China, have increased S&E degrees while US degree production has stagnated. 2) The job market has worsened for young workers in S&E fields relative to many other high-level occupations, which discourages US students from going on in S&E, but which still has sufficient rewards to attract large immigrant flows, particularly from developing countries. 3) Populous low income countries such as China and India can compete with the US in high tech by having many S&E specialists although those workers are a small proportion of their work forces. This threatens to undo the "North-South" pattern of trade in which advanced countries dominate high tech while developing countries specialize in less skilled manufacturing. 4) Diminished comparative advantage in high-tech will create a long period of adjustment for US workers, of which the off-shoring of IT jobs to India, growth of high-tech production in China, and multinational R&D facilities in developing countries, are harbingers. To ease the adjustment to a less dominant position in science and engineering, the US will have to develop new labor market and R&D policies that build on existing strengths and develop new ways of benefitting from scientific and technological advances in other countries.
    http://www.nber.org/papers/W11457


    Apparently South Korea is the best of the best right now, in terms of higher education. I am actively searching for the other side of this story...

    It has been said that some of the programming jobs that went to India are coming back because of both the difficulties with international relations, and introductory assesment of interfacing with existing code and system operations. This is soothing, that while there is a knowledge of a presense of white collar outside of the U.S. its still not dominant as of yet. There is still a chance of changing the way Americans view the current situation, work to achieve a solution, and learn so as to accomidate what we have been lacking for so long.







    CAN AMERICANS COMPETE?
    Is America the World's 97-lb. Weakling?
    In the relentless, global, tech-driven, cost-cutting struggle for business, America isn’t ready—here’s what to do about it.

    By Geoffrey Colvin
    uncle sam
    (Illustration: R. Sikoryak)

    It’s a crisis of confidence unlike anything America has felt in a generation. Residents of tiny Newton, Iowa, wake up to the distressing news that a Chinese firm—What’s it called? Haier? That’s Chinese?—wants to buy their biggest employer, the famed but foundering Maytag appliance company. Two days later, out of nowhere, a massive, government-owned Chinese oil company muscles into the bidding for America’s Unocal. The very next day a ship in Xinsha, China, loads the first Chinese-made cars bound for the West, where they’ll compete with the products of Detroit’s struggling old giants.

    All in one week. And only two months earlier a Chinese company most Americans had never heard of took over the personal computer business formerly owned—and mismanaged into billions of dollars of losses—by the great IBM.

    "Can America compete?" is the nation’s new No. 1 anxiety, the topic of emotional debate in bars and boardrooms, the title of seminars and speeches offered by the liberal Progressive Policy Institute, the conservative economist Todd Buchholz, and countless schools and Rotary Clubs. The question is almost right, but not quite. We’re wringing our hands over the wrong thing. The problem isn’t Chinese companies threatening U.S. firms. It’s U.S. workers unable to compete with those in China—or India, or South Korea. The real question is, "Can Americans compete?"
    continued

    http://www.fortune.com/fortune/articles/0,15114,1081269,00.html

    Engineering @ OSU

    Image hosted by Photobucket.com

    I am now officially an undergraduate Engineering Major at OSU. I have a really decent schedule with the exception of one CAD engineering teacher. He, supposedly, doesn't communicate very well, and assign's vague tasks that he expects certain aspects centralized upon. Well, bring on the new technology...

    nmap

    It seems that all the hacking books and even halfway tech savvy articles I've read about hackers have included something about footprinting a network using nmap. Footprinting is finding out what a network is composed of ( what routers, computer and os's, and other network nodes exist on the line) I've been checking out nmap (ping on steroids) I found some general information tutorials on nmaps documentation page...


    http://www.insecure.org/nmap/lamont-nmap-guide.txt
    http://members.dodo.net.au/~ps2man/Nmap/nmap.html
    http://moonpie.org/writings/discovery.pdf

    Customize the Right click menu

    Have issues with all those options that pop up for third party software when you right lick in windows?

    http://www.jfitz.com...s/rclick_custom.html

    Encryption on VNC Connection

    I thought that there was encryption on the signal to begin with, but it makes sense that there isn't. All those dial up sites....

    http://home.comcast.net/%7Emsrc4plugin/

    KnoppMyth



    Systm did an episode on a MythBox (tivo without the subscription fees) All you need is a 2.0ghz machine with 512 mb ram, as much storage as you think you need, and one or two tv tuner cards and you're in shape for some HDTV picture in Picture tivo session whatever. So its good times yet again. Fight the bastards that sold you the service to get rid of commercials only to have you watch some as you fastforward through the bs. If you have the box, the software side of it is really easy (pretty much plug-n-play) Make sure you have a blank disk, and then you can go off about the whole enter, next, enter, next etc....

    KnoppMyth Torrent

    ZipIt!



    Image hosted by Photobucket.com

    So this is the gadget of the hour...

    Apparently you can through a better linux distro and load an ssh client... Have the capacity to control servers on a little handheld chatting device...



    LinuxDevices has some good info on everything...

    keyboard screen?


    This keyboard is the latest craze... From a Russian designer team, each key will have its own mini lcd screen that will be programmable...






    Saturday, July 30, 2005

    FireFox insight

    Found this site on Digghttp://www.sitepoint.com/article/firefox-secrets. You only thought you knew everything about firefox...

    Friday, July 29, 2005

    Google Earth

    Google Earth: the best in planetary imagery. I am a firm believer that Google, if not by now, will be the king of information.

    I hope that Google Earth doesn't start linking up with cell phone
    companies to start reporting live gps signals of cell phones... Or
    there will be a lot of little pissed off teenagers and left wing nut
    cases. GPS is still to be argued though. There is no doubt that the
    NSA, not the CIA, (NSA is charged with security and communications)
    tracks everything that they possibly can, including things we probably
    have no clue have any realm of traceability. Just in talking with a
    friend programmer at Boeing. I know that technology offers so much more
    of a broad spectrum of features.

    Oh yeah, the program is free...

    Google Earth Plus

    Twitter Updates

    About Me

    My photo
    I have been working with computers/programming to put myself through college since I graduated high school. I am currently attending Oklahoma State University for bachelors degree in biological sciences. Along with my experience in programming, a degree in biology will allow me to pursue a career in bioinformatics research concerning genetic diseases (i.e. cancer).

    Blog Archive