Pages
12.16.2011
Fixing the media not found error in Subsonic
10.30.2011
Setting Fan speed for AMD GPUs under linux
4.01.2011
Nook Color hacking update: Video
I have been using my Nook Color for over a month now, and I have still not settled on a specific ROM that I like. When I first bought the NC, I went for the simple root which opened up the possibility for me to install Android market apps. The problems that the stock rooted firmware presented, such as the ugly interface, led me to try using custom ROMs. First, I flashed a Froyo (2.2) ROM to an SD card and used that for some time. Later I installed a Honeycomb (3.0) based ROM to my internal memory. I quit using Honeycomb because the interface was too laggy, and apps tended to crash often. At that point I moved to Gingerbread (2.3) based ROM including Cyanogenmod, Ultimate Droid, and Phiremod. All of these had their good and bad points. Unfortunately, none of them could do video playback correctly. YouTube either didn't work at all, or had unwatchable frame rates.
3.20.2011
A smart phone for the cheapskate: LG Optimus V
3.15.2011
User Account Control In Windows 7 and Vista
Answer: Simply stated, User Account Control, or UAC for short, is a "security" feature built into Windows Vista and Windows 7. I use the word security lightly, because I have yet to see it actually protect against anything. The idea behind UAC was to make users verify that they were the ones which initiated a program capable of modifying computer settings and data, and that it was not some rouge process or malicious software trying to install itself.
2.27.2011
Google pushing "Cloud" agenda with Chrome apps
The addition of apps to Chrome comes as no surprise. Google is going full speed ahead with the development of cloud based software, and what better way to accustom people to using cloud software than by adding it to their desktop web browser. Chrome apps is merely a bridge from desktop computing to full cloud computing. Eventually, Google will have a production version of Chrome OS; essentially an operating system which will run nothing but a Chrome browser. Since Chrome OS will not have any software but the browser, apps running in a Chrome browser will be used instead.
If you already use Chrome, open up a new tab and check out the Chrome Web store. If you aren't using Chrome yet, you are probably stuck in 2005, in which case you won't read this article for another six years. Do yourself a favor and check out Chrome apps. Not only will they enhance your web browsing experience, they will also make your life easier.
2.22.2011
A quick rant
Occasionally I have to register as a new user on website in order to use their services. It makes me mad enough that I have to register, because the site is too backward to use a Google or Facebook login. Then they force you to come up with a very secure password in order to proceed. After you type your very secure password twice, then they make you read some text that looks like it came from a page in a book that a cat pissed on. These are called CAPTCHAs. Lastly, you must check your email ink inbox for a verification link. All of that is actually fine by me. What truly enrages me is when the site after all of those security measures sends you a welcome email containing your username and password. This practice is on the same level of horrible security as keyhider rocks and passwords on sticky notes. This is the kind of thing that makes me want smash my face on my keyboard. If you own a website, please do not send people their passwords over email!!
2.20.2011
Android tablets the hackers way: Rooting a Nook Color
We all have those sudden urges to buy some hot new piece of technology. Most of us don't however immediately void the warranty by hacking it. I don't happen to be one of those people. Having contemplated my purchase for a week or so, there was no way that I wasn't going to hack my Nook Color as soon as I had the wrapper off.
I don't feel any need to dive into an unboxing here, so I will save it. After having opened the box and tossing it aside, I went online and downloaded the version of autonooter for my Nook. The ten minutes that it took for autonooter to download was literally all the time that I spent using the stock Nook color. The rooting process is quite simple and took me less than fifteen minutes to do.
2.13.2011
The Future is in the Cloud
2.10.2011
iPad Review
I always thought that I had a phobia to Apple products due to their incompatibility to most enterprise and professional programs on the market. I have especially criticized the iPad for being just a large iPod with no added functionality. But recently, I was looking for a portable system to take with me between my house and college. Someone suggested the iPad, and I laughed at the notion. However, I looked into it and decided I would go ahead and take the plunge. In no time, I had the iPad ordered.
2.08.2011
Power user features made easy: System Imaging
2.05.2011
How to Re-enable Aero Transparency in Windows 7
2.03.2011
Blocking ads in Firefox and Chrome
1.31.2011
Ask and Ye shall receive
1.30.2011
Diagnosing network problems in Windows
1.29.2011
Managing multiple email accounts with Thunderbird
Whether you run Windows, Mac or Linux, Thunderbird will work for you. The newest version of T-Bird makes setting up accounts really easy. You don't have to enter the name of your email servers anymore. When you go to make an account, it will ask for your name, email address, and password. Thunderbird figures out all the rest and finishes setting up you accounts. It also has a feature called unified folders. This lets you view all your in-boxes, sent mail, trash, and archived mail from all your accounts together. Of course you can still view them separately if you prefer. Another handy feature of T-bird is the search feature. Most other email clients have the search buried in some menu, but T-bird puts it right on the main page where it's easy to get to. You also don't need to choose filters anymore before searching. And, just like Firefox, Thunderbird has an extensive library of extensions if the vanilla program doesn't do everything you need it to do. There are lots of extensions which add all sorts of functionality, including calendars, contact management, and news reading. I use the Zindus contact sync extension to synchronize my contacts back and forth between my Gmail accounts. This is useful when I have to log into the Gmail website from another computer, because all of my Thunderbird contacts will show up in Gmail. Of course, these are just a few noteworthy features of Thunderbird, but there are many more.
If you are looking for a better way to read your email, try Thunderbird. It is available here at Mozilla's website.
1.28.2011
Catalyst 11.1 Drivers now available for ATI/AMD video cards
1.26.2011
Strange New Worlds
I had previously rejected Linux as being a viable replacement for an everyday desktop operation system, but now that I have been using it for a while, I realize just how wrong I was. Windows fanboys will claim that the average user won't like Linux because the average user does not want to use a command line. Or because it doesn't run their favorite programs. The thing is, the average user doesn't have to use a command line, and Linux doesn't have to run their favorite programs.
1.25.2011
Wifi Hacking Part 1: Breaking WEP keys
- A compatible wireless adapter. I use the TP-Link TL-WN321G. It's only ten bucks and works out-of-the-box with Linux.
- Aircrack-ng suite-- This comes preinstalled on BackTrack 4, or can be acquired on Ubuntu by typing sudo apt-get install aircrack-ng
- A wireless network to perform these "attacks" on i.e. one that you own or have permission to use.
- GNU Macchanger-- also preinstalled on BT4 or can be aquired on ubuntu by typing sudo apt-get install macchanger
- A computer running some flavor of Linux. Either the aforementioned Backtrack or ubuntu will work just fine. Others will also work, but those are the two I have used.
1.22.2011
The Most Powerful Security Tool
1.20.2011
Hacking to Learn
For the non-criminal geeks, hacking is something to be taken as a challenge to prove one's skills. Knowing how to crack a WEP key for someone's wireless network can be used for both good and bad. Of course you could leech Wi-Fi from your neighbors, but the opposite argument also applies. You could instead use your skills to show your neighbors that they have a security issue, and that you can fix it for them. That is the essence of offensive security. In order to be able to defend a system from penetration, one must know what that system's vulnerabilities are. Consider this. Most people believe that their houses are secure, but if locked out of their own houses, could probably find a way in. The same principle applies to network security.
I have taken it upon myself to learn this other side of security, and have been coming along with it within the last few weeks. I have already learned how to crack WEP using aircrack-ng on Linux and am currently tackling WPA cracking. If you are a geek and have an interest in learning these tools, I encourage you to use them for good. Backtrack 4 is the best way to start, as it contains almost every cracking, hacking, and penetration tool one would ever need. Please don't hack anyone's networks without permission, or sniff passwords at a coffee shop, because both of these could land you some jail time.
I will write follow-up articles, and possibly tutorials on how to use these tools, so please continue to follow my blog if you are interested.