Problem:
Nokia 5800, any firmware =< v40
Shortcuts bar does not show on Homescreen - it seems like just disappeared. Shortcut buttons seems to be invisible/transparent - can be clicked, but nothing happens. Dialer and Contacts buttons are visible, but nothing happens when clicked.
Solution:
Phone must be hacked If it’s not hacked - hard reset is the only solution…
- Start ROMpatcher+
- turn on Open4All_RP+
- use X-plore [file manager]
- Go to: c:\private\10202BE9\persists\
- delete file 10275102.cre
- restart phone
Uz tri odlicna postojeca besplatna online anti-virus scannera (Jotti, VirusTotal, VirScan), pojavio se i komercijalni online virus analyzer - virtest.com. Jest da nekome analiza vrijedi tih novaca, ali ja ne spadam u skupinu onih koji bi bili spremni dati neke pare za analizu smeca za koje sumnjam da bi moglo napraviti sranje na masini.
Odlican tool, online sanbox environemnt i analyzer, posebno pogodan za s neta skinute stvari, kad postoji bojazan da bi se pokretanjem mogao startati kakav dropper… Ne samo da analizira ponasanje softwarea, vec ga provlaci kroz antivirus scannere. Doduse, za report treba pricekati ponesto minuta, ali kazu da je sustav skalabilan…
ThreatExpert is an advanced automated threat analysis system designed to analyze and report the behavior of computer viruses, worms, trojans, adware, spyware, and other security-related risks in a fully automated mode.
In only a few minutes ThreatExpert can process a sample and generate a highly detailed threat report with the level of technical detail that matches or exceeds antivirus industry standards such as those normally found in online virus encyclopedias.
ThreatExpert takes a threat file, places it in a self-contained simulated virtual environment, deliberately executes the threat in this environment and then monitors its behavior. A combination of file, Windows Registry and memory snapshots are recorded, in addition to a series of specific ‘hooks’ that intercept communication routes typically exploited by threat infections. These hooks ‘deceive’ the threat into communicating across a simulated network, whereas the threat’s communication actions are actually being recorded in detail by ThreatExpert. Using this invaluable recorded data, a detailed report is generated, consisting of file and Windows Registry changes, memory dump analyses, and other important system activities caused by the threat.
Obicno su mi pokrenuti i FFox i Chrome [FFox ima neki memory leak negdje (GoogleGears u kombinaciji s nekim pluginom, vjerojatno), pa se memory bloata i nakon par dana uspori i raspadne, stoga zbog tog usporenja sve zahtjevnije JS/Ajax dumine vrtim u Chromeu - Gmail prije svega].
I tako, malo nesto surfenisao u Chromeu i naletio na neki torrent. Klik i nudi mi se file-save dialog… ok, kontam, Chrome mozda nije skuzio da taj file-type treba automatski downloadati i proslijediti uTorrentu. Pogledam malo opcije, kad ono - nema! Chrome nema mogucnost automatskog opena, nakon sto se file skine u tmp dir. Protrljam oci jednom, dvaput, procesem i dupe… Nista! N-e-m-a! Kontam si - nemoguce, tja. to je Google, sigurno to handle-a na neki svoj, N-puta bolji nacin nego sto je uobicajeno… Jos malo cackanja - i dalje kita!
Hmmm, prvo si pomislih - ovo nije dobro, opcija mora negdje postojati, ocito im je flow za postavke radio netko tko se bas ne kuzi u GUI i userXP…
Google ne podrzava otvaranje filea bez biranja download lokacije! - postoji opcija Always open files of this type, ali tek nakon to se u file-save dialog boxu kaze gdje ce ga skinuti. Lame, lame, lame…
Takav bahati stav uz 3-4% trzista… tja, pa tamo se ne ponasa ni ljigavi Apple. Oni se bar prave da im je stalo do korisnika [ovaca]…
Vidim, twitteromanija polako pocela uzimati maha u HR. Iako sam servis postoji vec podosta vremena (toliko da se se pojavilo milijardu kopija, look-a-likea, servisa inspirianih Twitterom [citaj: doradjenih kopija]) kod nas je ted odnedavno poceo pustati korijenje. Kasnjenje viralnog network effecta je kao i u slucaju s Facebookom- preko godinu dana, ali znatno manje nego je to bio slucaj s blog-hypeom [vjerojatno zato jer je blog tada bio potpuno nov koncept, dok funkcionalnost Twittera vec postoji u mnogim postojecim servisima, prije svega vrlo popularnom Facebooku].
Kako bilo, ne predvidjam da ce twitteromanija zivjeti dulje od blogomanije. Jos jedan prolazni hype na kojem ce profitirati valjda samo autori servisa i kojekakvi “analiticari” i lezilebovici koji sebe vole nazivati komentatorima web trendova [citaj: uglavnom oni koji hypeove i stvaraju (ili misle da to cine bas oni) - sto zbog nedostatka/nepoznavanja stvarnih tema, sto zbog nepoznavanja elementarnih trzisnih zakona i potrebe za postojanjem realnih poslovnih modela]. I ova kriza je dobro dosla kao purgativ takvim servisima… nazalost, tu je pao i jedan nebruseni dijamant: Google Notebook, ali to je jedna druga prica…
No, nakon sto se i ovaj “servis” istrese, valjda cemo biti sve blize informacijskom idelu koji rjesava stvarne probleme i to na ucinkovit i jednostavan nacin, a dalje od stvari koje se rade samo zato “jer se to moze napraviti".
Vrlo, vrlo zgodan i inovativan nacin prezentiranja.
PPT su vam premonotoni? Prezentacije u stilu Lawrenca Lessiga ste vec prozvakali i radite ih lijevom rukom, dubeci na glavi u mrklom mraku?
Na red dolazi Prezi - inovativan “slide” koncept za prezentacije…
Iskoristite dok je jos svjeze
http://prezi.com/showcase/
Iako ni ovo online izdanje nije za baciti, vise mi djeluje kao proof-of-concept, a ne alat u koji biste se apsolutno pouzdali kad je u pitanju nesto (vazno) poput prezentacija. Cini mi se da bi se od ovoga mogao razviti odlican offline presentation tool u stolu Powerpointa.
USB autorun je ovih dana glavni vektor za spol… ovaj, racunalno prenosive bolesti Najrizicnija skupina - naravno - studentice i studenti! Il’ si medjusobno kopiraju, il’ nose svoje stickove po kojekakvim kopi-prcvarnicama s najpromiskuitetnijim racunalima u ovoj dimenziji. Vecina tih racunala nema ni osnovnu zastitu zvanu - iskljucen USB autorun. To onda znaci samo jedno, a to su dvije stvari - USB stickovi, virusi, epidemija!
Evo par savjeta kako iskljuciti jedan od najbeskorisnijih i najdebilnijih Win featurea - autoplay/autorun, vjerojatno izvorno skovan na Macu [samo na tom racunalu se takve pizdarije mogu nazvati i hvaliti kao feature].
Difficulty: Easy
Time Required: 2 minutes
Here’s How:
The easiest and most effective means to truly disable autorun can be done via this simple autorun registry hack:
Save the file as something.reg. (You have to be sure to change the “Save File as Type” to “All Files” before saving, or Windows will try to save it as a .txt even if you typed in .reg.
Locate the file you just saved and double-click the file to run it. You will receive a prompt asking if you want to add the data to the registry. Click yes to allow the modification.
The above method nulls any request for autorun.inf and works on XP Home or Pro, as well as Windows Vista. Credit for this tip goes to Nick Brown.
If you opt to disable autorun using any other method, you will first need to install an autorun patch from Microsoft that allegedly resolves issues that cause autorun to run even after it’s been disabled (using methods other than the above recommended method).
XP Pro users who have installed the appropriate Microsoft patch for your system and wish to disable autorun using a method other than described above, follow steps 3 through 8 only. XP Home users begin at step 9.
Windows XP Pro users: Click Start and then click Run. Type gpedit.msc and click OK. The Group Policy window will open. In the left pane, double-click Administrative Templates
In the right pane, double-click System, scroll down the list and double-click Turn Off Autoplay
In the Turn Off Autoplay Properties window, select Enabled. From the dropdown next to Turn Off Autoplay on, select All drives and then click OK. Exit Group Policy by selecting File, then choosing Exit from the menu.
XP Home users will need to make the changes by editing the registry directly. To begin, click Start and then click Run
Type regedit and click OK. The Registry Editor window will open.
In the left pane, navigate to:
HKEY_CURRENT_USER
Software
Microsoft
Windows
CurrentVersion
Policies
Explorer.
With Explorer highlighted, in the right-pane right click the value NoDriveTypeAutoRun and select Modify from the drop down menu. The base value will be set to Hexadecimal. If not, select Hexadecimal.
Type 95 and click OK.
Note that this will stop Autorun on removable/USB drives, but still allow it on CD ROM drives. If you want to disable autorun on both, substitute b5 for the 95. (Thanks to Ian L. of Manitoba for the tip).
Exit Registry Editor by selecting File, then choosing Exit from the menu.
You will now need to reboot your computer for the changes to take effect.
Jasno, ovaj site na kojem ste sada “can’t do any harm” [osim mozda izazvati epilepticki napad ili zelju za gledanjem u bolje dizajnirani blog (koji to ni nije, ali to je jedna druga prica…;-))], ali upravo poruka iz naslova je bila prikeljena za ovaj, ali i sve ostale Google search rezultate danas, od 16:10 do 16:30 31.01.2009. - u cijelom svijetu! Yep… Zbog pada Stopbadware.org - sustava koji Googleu providea relevantne informacije o “badware” (zlocudnim) siteovima - svi Google rezultati su oznaceni kao “badware".
Ovom greskom su bili pogodjeni SVI Google rezultati pretrazivanja, neovisno o tome je li se radilo o Google.com ili lokaliziranoj verziji trazilice.
Bas me zanima kada ce Google napisati sluzbeno objasnjenje i kako ce ono zvucati…
Prvo Google ubije Google Notebook (i neke druge, ne toliko bitne/popularne servise) i zestoko uzdrama povjerenje mnogih u cloud computing, a sada se pojavi ovakva trivijalna (po nastanku) greska koja se vjerojatno mogla zaobici s nekoliko linija koda.
Sam Google je ovaj ispad fantasticno dokumentirao [zivjeti Google alati!] ovaj dogadjaj [ovo je Google Trends za 2009 01 31]:
Update!
Stiglo objasnjenje iz Google-a… hehe, kao sto rekoh - par linija koda!
Cim o tome pise najsocnija (al’ ‘ladna) geek-riba Marissa - znaci da je jebeno vruce u Mountain Viewu…
What happened? Very simply, human error. Google flags search results with the message “This site may harm your computer” if the site is known to install malicious software in the background or otherwise surreptitiously. We do this to protect our users against visiting sites that could harm their computers. We work with a non-profit called StopBadware.org to get our list of URLs. StopBadware carefully researches each consumer complaint to decide fairly whether that URL belongs on the list. Since each case needs to be individually researched, this list is maintained by humans, not algorithms.
We periodically receive updates to that list and received one such update to release on the site this morning. Unfortunately (and here’s the human error), the URL of ‘/’ was mistakenly checked in as a value to the file and ‘/’ expands to all URLs. Fortunately, our on-call site reliability team found the problem quickly and reverted the file. Since we push these updates in a staggered and rolling fashion, the errors began appearing between 6:27 a.m. and 6:40 a.m. and began disappearing between 7:10 and 7:25 a.m., so the duration of the problem for any particular user was approximately 40 minutes.
Posted by Marissa Mayer, VP, Search Products & User Experience
Uz nekoliko postojecih i u Hrvatskoj najkoristenijih: BWM CARNet, SpeedTest.net, DSLreports, pojavio se novi igrac na nebu za mjerenje brzine i troubleshootinga Internet veze -> www.measurementlab.net… Osim standardnih testova brzine, nudi i razne alate za trobleshooting veze… very nice…
Svaki komadic opreme, makar se radilo o celicnoj kugli na dnu mora, kosta N puta skuplje ako ima prefiks “foto". Tako npr. foto-maramice (koje ni po cemu nisu bolje od npr. vlaznih maramica za brisanje naocala, sto se u DM-u mogu naci za 10kn/40kom), foto-gumice za brisanje objektiva, foto-komadi plastike (lens hoods) , foto-vagine i sl. kostaju iracionalno puno novaca. Proizvodjaci foto opreme znaju da su fotografi uvijek znali utopiti svoje radove za masne pare… Tako obican flash extension cord od metar kabela i dva konektora kosta 300-400kn.
Zanimljiva forica za ustediti ponesto novaca na skupim foto-(ne vidim po cemu su posebniji od drugih)-kabelima. Ta-raaaa…
Doduse, pare se moraju pljunuti za konektore, ali bar se kabel moze razvuci do panja… drugi potencijalni minus je naglasavanje onog U u UTP, ali dok netko ne predje s teorije i ne potvrdi da to stvara probleme iz prve ruke - kontat cu da su ovo super DIY dumine…
Trazite drivere?! Nema nista gore od sluzbenog sitea proizvodjaca na kojem link na drivere ili ne postoji, ili je skriven, ili je support za proizvod discontinued.
Kako bilo, od pomoci moze biti nesto ovako…
http://driverpacks.net/DriverPacks/
Windows XP dolazi s hrpom raznih servisa, od kojih se neki automatski pokrecu, iako ih krajnji korisnik nece koristiti. Neki od tih servisa su otvorena vrata i glavni vektori napada trojana, crva i ostale gamadi.
Iako na Netu postoje hrpe stranica s opisima tih servisa, malo je mjesta na kojima je podrobno opisan svaki od Windows XP defaultnih servisa, cemu sluzi, moze li se deaktivirati bez bojazni i sto se gubi njegovom deaktivacijom. Deaktivacijom svih suvisnih sevisa se znatno dizu performanse i sigurnost sustava.
“Freeware Mission Mega Pack“. You can download it from here, 446 MB of outstanding freeware!
(The file host is a Romanian website, - just wait for 5 seconds and then
click on “DESCARCA FISIERUL!")
1. AMP Font Viewer
- Font manager, view, install, uninstall, organize your fonts. an
interesting feature is that you can “test” fonts before deciding to
install them.
2. Ant Movie Catalog
- A very important program for me, as I have more than 2500 movies in
my collection. Although it has no official support anymore it still is
the best movie collection manager, even if it doesn’t look as good as
most competitors. It’s an open source program, maybe someone will take the source code and make it better.bsp;
3. Any Audio Converter
- The name says everything, it converts audio files, WMV, MP4, WAV,
WMA, OGG, AAC, MP3, M4A, MP2, etc. The interesting feature is that it
can extract the audio track from video files such as AVI, MPEG, MP4,
WMV, ASF.
4. Audacity - Open source audio editing and recording program, the best free on you can get. It is very easy to use and works on Mac OSX and Linux too.bsp;
5. Avast!
- The home edition is a free antivirus solution, provides resident real
time protection, basic antispyware protection and doesn’t take to much
memory while running in the background (a lot less than BitDefender,
that’s for sure).
6. CamStudio - Free screen session recorder, can record audio too, records to avi or swf files.
8. CCleaner - Great freeware program, a registry cleaner, disk cleaner and software uninstaller. Can also manage your startup programs.
9. CodecInstaller
- Analyzes your video or audio files, tell you which codecs are needed,
finds codecs, installs or unistalls codecs from your system.
10. Crystal DiskInfo - Real time hard disk monitoring utility, provides awesome in depth information about your hard disk drives.
11. Digsby
- Although it is still in beta it’s a very interesting instant
messenger client. Supports AIM, MSN, Yahoo, ICQ, Google Talk, Jabber,
and Facebook Chat Accounts. But the great feature is that it supports
multiple e-mail accounts, Hotmail, Gmail, Yahoo Mail, AOL/AIM Mail,
IMAP, and POP. It is also a great tool for social networking, it
supports Facebook, Twitter, or MySpace accounts so far, with more of
them coming up.
12. DriveImage XML - Great freeware program, you can backup your hard disk data and then restore the image if needed.
13. DVD Shrink - This one is a classic, everybody knows it, some people even sell copies of it. A great tool for backing up your video DVDs.
14. DVD Styler
- Free DVD authoring tool, supports PAL and NTSC. Very easy to use,
just drag and drop an mpeg file and make your video DVD. You can also
make decent menus with it, even with audio. It also has a Linux version.
15. Exact Audio Copy - Great audio CD ripper, extracts your audio tracks from all kinds of CD and DVD drives
are supported (including USB, Firewire, SATA and SCSI drives). Supports
many output file formats, including flac through external encoders.
16. FeedDemon
- It wasn’t free, now it is! Looks nice, works well and has a bunch of
nice features that will make your RSS feeds reading better.
17. FontNetInstaller
- This one can help you search for fonts over the internet as it has
the best websites indexed and lets you search through them within the
program. Doesn’t require installation, just unpack and run.
18. Format Factory - Universal transcoder, converts almost any video, audio and graphic file formats. Can also extract DVD Video to avi.
19. GIMP - The best freeware alternative to Adobe Photoshop. It’s an open source image editor, very powerful and quite stable. bsp;
20. GOM Player - The best video player in my opinion, supports almost any video file format and subtitles, solid and nice looking.
21. Gparted (Gnome Partition Editor) - Open source partition editor, very powerful, can be used on a bootable CD, USB stick, PXE server and Hard Disk.bsp;
22. IrfanView
- The best free image viewer, already a classic piece of software. Can
open various file formats and also has some basic editing capabilities.
23. JKDefrag GUI
- Awesome disk defragmenter, fast and reliable. Can run scheduled
defragmentation sessions or run as a screensaver, only defragmenting
when your system is idle.
24. MeGUI - Powerful video encoder, supports the best formats and encoders, great tutorials available.
25. MemTest - Tiny freeware program that allows you to test your memory from Windows.
26. Memtest86+ - Open source advanced memory diagnostic tool, runs at boot-time from a bootable CD or other media.bsp;
27. MozBackup
- Great freeware tool, backs up your Firefox ot Thunderbird settings,
bookmarks, etc. If something goes wrong you can restore your precious
settings in only a few seconds.
28. Mozilla Firefox
- The latest release, Firefox 3, comes with nice improvements, although
it seems to use more memory while running. Hopefully that problem will
be fixed soon.
29. Notepad++ - Powerful open source text editor written in C++, supports a wide range of programming languages, great multi-document and multi-view features. bsp;
30. OpenOffice.org - This open source package replaces my ut name="IL_MARKER” type="hidden">Microsoft Office
installation. Is it as good? I think it’s better! You won’t have any
problems with adjusting to it, the basic features are similar to those
in L_MARKER” type="hidden">Microsoft Office.
justify">
31. Orbit Downloader - Great download manager with the unique feature that allows you to grab video and audio files from websites such as YouTube.
32. PCInspector File Recovery - Very good data recovery tool, supports all file systems (FAT and NTFS), finds partitions automatically, even if the boot sector or FAT has been erased or damaged.
33. PDF XChange Viewer
- Very good PDF reader, a lot faster than Adobe Reader. And there’s
even more: you can convert your PDF files to various file formats,
including BMP, JPG, PNG or TIFF. It can be integrated with Firefox or
Internet Explorer.
34. PDFCreator - Very good freeware PDF writer, can create PDF files out of any printable document. It can be installed as standalone or as a server application - install on a single computer and have it available on all the machines in your network.
35. Quintessential Player (QCD) - Great audio player, my favorite, highly customizable with the various plugins that are available.
36. RadarSync
- Finds driver updates for your hardware, downloads and installs them.
Although it’s not flawless it’s still a very useful tool.
37. ReNamer - Very easy to use drag and drop file renamer, it offers all the standard
renaming procedures: prefixes, suffixes, replacements, case changes, as
well as removing contents of brackets, adding number sequences,
changing file extensions.
38. Resize My Pictures - Tiny standalone application that allows you to resize pictures very quickly.
39. Screenshot Captor
- Great screenshot capture program, lots of capture modes - Multimon
(multiple monitors), Desktop, Active Window, Region, Windows Object.
Supports multi-monitor and includes editing features for the
screenshots.
40. SIW (System Information for Windows)
- Great free system information tool, provides info about the
components and software environment in your computer. Also has some
interesting extra features like network bandwidth monitoring and password manager.
41. StarBurn
- I’ve been using Nero before. I don’t need it anymore, StarBurn is
free and pretty good. I’ve burned several DVDs with it (including DVD
video) and it never failed. Supports CD, DVD, HD-DVD and Blu Ray discs.
42. SUMo (Software Update Monitoring)
- Identifies the software that you have installed in your system and
checks the internet for updates. The latest version seems to have
corrected most errors, works pretty fine.
>
://lh6.ggpht.com/okfreeware/SKlvxwxtsNI/AAAAAAAAAxY/EMIm3uaRv_A/s1600-h/SUPERAntispyware6.gif"> 43. SUPERAntiSpyware
- The best antispyware solution that you can get for free. It doesn’t
provide resident protection, but if you just scan your computer with it
once a week or so you should be fine.
44. SweepRAM
- Outstanding tiny freeware memory optimizer with an unique approach.
What you should do is, after you’ve turned your computer on, and
started all applications that will be running all day long (antivirus,
etc) run SweepRAM. That way, all running applications
will reduce their memory use to the required amount, giving you as much
RAM available for your work as possible.
45. SysTrayMeter
- Tiny resource meter that sows you the CPU and memory usage. You can
easily close it by double clicking on the icon in the system tray.
46. TUGZip - Very good free compression utility, works fine with almost any archive file format, fast and reliable.
47. TweakUI
- Free from Microsoft? Well, it’s for real A must have for any
Windows XP user, allows you to tweak the setting you wouldn’t have
access to normally.
48. uTorrent - Best BitTorrent client, lightweight and reliable. The new version brings better functionality and some new features.
49. VirtualDub - Legendary open source editing tool, great for cutting and transcoding your video files for best quality avi output.
50. WordWeb
- Great free dictionary and thesaurus, I’m already in love with it. It
can be used to look up words from almost any program, showing
definitions, synonyms and related words. It includes pronunciations and
usage examples, has spelling and sounds-like links.
51. GigaTribe
- I use this one for sharing files with my fiends and colleagues. It is
easy to configure and perfect for connecting a small group of people.
It includes a chat feature, so you can talk to your friends while they
download your shared files.
ZZEE PHPExe compiles PHP, HTML, Javascript and other web files into Windows GUI exes. You can rapidly develop Windows GUI applications by employing the familiar PHP web paradigm. You can use the same code for online and Windows applications with little or no modification.
http://www.zzee.com/phpexe/
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Probao ga… hm, ima par zgodnih rjesenja, posebno mi se svidja sve ono under-the-hood, bolji memory i process management. Ali, daleko je to od proizvoda koji bi me natjerao da se preko noci odreknem komocije Firefoxa. No, jos je rano. Chome je tek propupao, ovo vise slici alpha verziji, tako da treba pustiti vremenu da kaze svoje.
Zanima me kako ce se Chrome nositi u integraciji s postojecim Google aplikacijama, a vjerujem da bi tu mogao puno toga napraviti - time mozda i pridobiti moju paznju. Chrome cu za sada koristiti kao skladiste tabova “za citanje” (odlican memory i process management ce tu jako dobro doci) i tako si rasteretiti Firefox koji uvijek grca u 80+ otvorenih tabova.
Nakon nekog vremena koristenja, YouTube filmici u Firefoxu se znaju smrzavati nakon prvih par odgledanih sekundi, bez obzira koristio se native Mozilla rendering engine, ili onaj IE-tab. Dakle, problem ocito nije u rendering enginu, nego negdje u ljusturi… kako god, problem je dosadan kao ush i random se javlja kod svih kombinacija Flash playera v 9.0.115.0 (na nizim verzijama se problem ne javlja) i Firefoxa (od verzije 2, do 3.04b - za koju kazu da rjesava problem).
Firefox: 2, 3 < 3.0b4
Flash: 9.0.115.0
Flash have admitted there is a bug which causes this and reverting to a previous version will fix it, while the bug will be resolved in the next flash update.
1. Browse to C:\Documents and Settings\ u s e r n a m e \Application Data\Macromedia\Flash Player\#SharedObjects\GVP00001
2. Delete all the files and folders in this folder
3. Browse to C:\Documents and Settings\ … \Application Data\Macromedia\Flash Player \ macromedia.com \ support \ flashplayer \ sys
4. Delete all the files and folders in the directory
5. Restart Firefox
Once you have your rough draft laid out in CSS, and you need to start adding style, Rounded Cornr can save you a lot of time. Rounded Cornr quickly and easily creates images and CSS code for different box styles in an easy to use interface. It also offers an option to code it using only one image for all four corners, saving a minimal amount of bandwidth.
Amazon S3 down vec nekoliko sati. EU S3, US S3 serveri, Amazon Elastic Compute Cloud (API). Buduci da su mi do sada sluzili samo kao redundantna-podrska u kriticnim peak-situacijama, ovaj outage sam lako zaobisao jednostavnim uklanjanjem redirecta. Ja sam sitna riba i servis mi ne ovisi o S3. Ali, ali… postoje mnogo vece ribe, postoje ribe koje su poslusale Bezosova nagovaranja da svoje servise TEMELJE na pouzdanoj, sigurnoj, scalable, blah-blah tehnologiji. Njih je ovaj outage kostao ne samo zivaca, vec sasvim konkretnih i opipljivih megabucksa!
Amazon S3 je vec bio down par sati u veljaci 2008. Znatno kraci pad i s manjim opsegom nego ovaj.
Prije kojih godinu dana bio sam pogodjen iGoogleovom greskom koja je rezultirala visednevnom nemogucnoscu koristenja servisa odredjenom broju korisnika. Opet me nije previse pogodilo, jer sam onaj najvazniji gadget (GoogleReader) pratio na njegovim izvornim stranicama. Ali opet se postavlja pitanje - sto ako jednog dana rikne Gmail, a bas tih dana mi dodju vrlo vazni mailovi? Sto ako jednog dana rikne Google tutto-completo (nemojte se smijati, ni dot-com-boom nitko nije predvidio) i svi njegovi servisi?!
No, bit ce zanimljivo pratiti kakve ce ovo imati posljedice po SaaS filozofiju i smjer u kojem su se razmisljanja o buducoj infrastrukturi Interneta pocele odvijati… Dobro je sto se ovo dogodilo u trenutku kada cloud-computing ("oblacno racunarstvo"(?)) nije toliko rasirilo i cini samo manji dio online infrastrukture.
Nisu ovdje u igri samo Google i Amazon, koji jos i imaju snage za amortizaciju i sigurno trostruke disaster recovery scenarije. Ovo je pitanje koje se vise tice svih onih koji ce se u ovoj “oblacnoj” atmosferi tek pojaviti, nudeci “sigurne” i “skalabilne” usluge, trzisno se nadmecuci s vise-za-manje (para). Ovo se tice svih onih koji ce takve udice progutati i mozda jednog dana skupa sa svojim domadarom nestati s lica zemlje - kao da nikada nisu ni postojali.
Za CDN (Content Distributed Network) se jos i mogu napraviti redundantna rjesenja, ali sto hostanim aplikacijama, iznajmljenim procesorskim snagama, bazama?!
Predvidjam da ce se u buducnosti sve vise poceti govoriti o CDN failover scenarijima. Predvidjam i standarde za migraciju, replikaciju i redundancy management medju CDN-ovima.
Svidja vam se neka mjuza na necijoj MySpace stranici, ali ne postoji opcija za download pjesmice? Umjesto tuge, jada, cemera i kuknjave predlazem jedan od ova dva nacina…
1. Posjetite: http://file2hd.com/
- upisete URL stranice i pri dnu imate spremne MP3ice za download i to u 96kbps i original_bitrate verzijama
2. Pronadjite na torrentima programcic MySpace mp3 Gopher. Ili klinite na link ispod [ova verzija radi na dan 2008 07 20]: http://www.torrentz.com/f2d3b81d414c16e05368f567f6857f262e07de5e
Lik je patentirao napravu koja projicira fotku iz fotoaparata (s filma) na objekte u koje se usmjeri “fotic". Ali, nije dumina u tome, nego u cinjenici da se slika projicira u trenutku kad okine flashe s tudjeg fotoaparata. Foto-uzurpator!
Npr. lik fotka ribu na ulici, a foto-uzurpator se nalazi u blizini i usmjeri svoju napravu (fulgurator) prema ribi. Lik okine fotku (s flashom) i u tom trenutku se na ribu iz fulguratora projicira golo tijelo npr. Lare Flynn Boyle… ili necije jetrve…
http://www.juliusvonbismarck.com/fulgurator/
Julius von Bismarck’s ‘Image Fulgurator’ projects stealth images into the photographs of strangers, while keeping those images invisible to human eyes. Depending on whom you ask, it’s either a clever hack or an obnoxious intrusion. Naturally, we had to find out more.
Yesterday, von Bismarck’s device made its premature debut on the internet. Today we met him in his hometown, Berlin, to talk about the device, the thinking behind it and the inevitable deluge of e-mails from viral marketers wanting use it to smash their way further into our brains.
But first, about that name: According to von Bismarck, ‘Image Fulgurator’ comes from the Latin for ‘lightning’ (fulgur) and means ‘Flash Thrower’.
First, let us make clear that von Bismarck has applied for a patent for the Fulgurator. He stressed this point. Of course, anyone with the requisite skills can make one of their own, but Julius wants to keep some degree of control over commercial use.
To see why, consider how it works. The device is a modified camera – in this case, an old manual Minolta SLR. A flashgun fires through the camera in reverse, from the back. The flash picks up the image of a slide inside and projects it out through the lens and onto any surface.
The trick is in the triggering. The Fulgurator lies in wait until an unsuspecting photographer takes a picture using a flash. When the device’s sensor sees this flash, it fires its own unit, throwing up an image which is captured by the hapless photographer’s camera while remaining unseen by the naked eye.
Now, imagine for a moment that an ad agency gets hold of this. You couldn’t take a photograph of a tourist attraction ever again without worrying that some marketing crap would be pushed into your camera. As Julius told me, "I see it as a piece of media art. It could be a dangerous attack on media. [But] if people do shit with it, I feel bad."
This is the reason for the patent, and although he doesn’t have an army of lawyers behind him, Julius seems to be on top of the legal side of things. He’s also moving fast. This Fulgurator is the first prototype, and the most primitive. "It works, but it’s not practical," he says. "In a few years time, huge companies will use it for shit," but by then, Julius will be at the next stage. He already has more working models (which I wasn’t allowed to see) which are refinements of this one.
At its simplest, the Fulgurator is a very easy hack. A hole has been cut in the back of the camera and a piece of clear, roughened acrylic put in its place. A rear tube allows the flashgun to slide in. Everything else remains intact. The slides themselves are just rolls of processed film (the pictures are snapped from Julius’ computer monitor) returned to their canisters and then loaded up as if a normal film. Any image on the reel can be selected by turning the rewind crank. When you hold the Fulgurator up, you can see the subject on the acrylic screen and line it with the image on the slide. You can also focus, to ensure the final projection ends up sharp.
But the magic happens inside the flash sensor on the top. Ordinary slave flashes (which fire whenever they detect another flash going off) aren’t reliable enough, so von Bismarck built his own circuitry. The original was based on the Arduino platform but has evolved into a custom-made circuit. The knobs were for tweaking the settings on the prototype, stuff which is all now taken care of by software.
Julius had ripped the guts out of the box for a newer version, so we couldn’t see it in action, but we know what it does. Modern digicams flash for all kinds of reasons, such as red-eye reduction and focus assistance. What Julius’ circuit does is to ignore all of these false strobes and fire only when the photo itself is taken. This is the secret sauce of the Fulgurator.
Clearly, this is a prankster’s dream. But Julius thinks it has a serious side, too, which is why it looks like a gun. "It’s important that people know it’s not just a funny idea," he told me, "it can also do negative stuff."
It seems that the "negative stuff" consists mainly of pissing people off, like the aforementioned marketing uses. We’re looking forward to seeing what the next gen hardware can do, though. Take a look at this picture:
The message is ‘Fulgurated’ onto a black laptop bag. Turning black to white is powerful stuff, but it’s not just slogans that can be fired. Although Julius frames his nerdery in an artistic context (he’s studying a German Diploma called "Digital Class" at UDK, Berlin’s art school) he clearly has a soft spot for tomfoolery. In the image below, you see an image of a naked body which can be projected onto a clothed person.
The possibilities are endless, but Julius is just getting started. When I suggested that he put his own URL on the images, so victims could later check to see just what had happened to their pictures, he seemed surprised (later I learned that he does plan to include it later, to promote his own work). In fact, the whole thing has happened a little too quickly.
Yesterday’s ‘leak’ onto the internet was intended as a place holder for an entry into Ars Electronica’s Cyber Arts exhibition in September. Instead, it catapulted him into internet fame and he has already received high-priced offers for his work. If he manages to keep on top of things, this little hack could make him some big money.
Odlican primjer .htaccess-a koji bi trebao odbiti dobar dio napada se moze naci ovdje: My Webapplication Firewall Tutorial. Najbolja preporuka za ovaj vid zastite lezi u cinjenici da je pravila sastavila osoba kojoj je domena securitya web aplikacija dobro poznata.
ovakav ili slican .htaccess + ModSecurity + dobro definirana pravila na HW/SW firewallu (block all, allow only necessary na ogranicenim IP rangeovima) i server bi mogao biti poprilicno siguran…
Youtube has slowly started to create better quality versions of many videos, adding links that say, “Watch this video in higher quality.” See this High Quality example and compare it to Youtube’s Normal Quality.
Comparison of Normal Youtube vs Youtube High Quality
-
Normal Youtube
High Quality Youtube
Screen Res.
320 x 240
480 x 360
Bitrate
≅ 200 kbps
≅ 900 kbps
Audio
22KHz 64 kbps Mono ABR
44.1KHz 96 kbps Mono CBR
Frame Rate
30
30
Video Codec
Flash Sorenson
Flash Sorenson
Audio Codec
Mp3
Mp3
Getting iPod compatible mp4s!
Adding &fmt=6 to the end of any youtube video’s url will give you Youtube’s new high quality setting. Changing the number from 6 to something else yields different formats though it’s not obvious which numbers work. Format 18 generates an mp4 using h264 with AAC stereo, which is compatible with video iPods. This is way better than using a service like vixy.net, which transcodes the crappy quality youtube vid into an mp4. Using fmt=18, you get a video transcoded from the original clip the user uploaded. The bitrate is lower on the mp4 version, but since the resolution is smaller it compensates. The h.264 codec has better looking videos at lower bitrates anyway. We finally see stereo on youtube with the mp4 version! It has a widescreen 16/9 aspect ratio rather than 4/3.
Correction:
Previously I thought the mp4 screen resolution was 480 x 270, but it’s also 480x360. It could be that both formats have the possibility to be 480x270 if their aspect ratio is close to 16/9 width/height. The mp4 version may add an additional small audio gain and a small sharpening effect.
Video downloaders like keepvid still work. Enter the url, click download, now grab the link and add &fmt=6 or &fmt=18 (for mp4) to the end. The good people at lifehacker created an easy to use firefox extension that will put a download link under each vid. You can also get the download url if you follow my wireshark tutorial but the process is pretty tedious.
You can do it manually too, but it’s annoying. Go to any video on youtube, right click then click view source. Click ctrl+F, which will open a searchbox and type &t=. Next copy the value after the t= but before any “&” characters. Grab that and the video_id and your set. The vid id is the v=something part of the url. Just copy the variables into the url below.
www.youtube.com/get_video?video_id=&t=&fmt=18
Example Vid URL: http://www.youtube.com/watch?v=pVYp2sgA9M0 Output: right click - save as
You may want to pass it to a download manager like wget. If you load it in the browser it will display a bunch of gibberish while it loads the entire video’s ASCII representation into your browser.
Howto Get Videos to Play HQ by Default
This option has not been implemented on many accounts but the howto is already present in the youtube help pages. You need a youtube account to be able to do this.
Go to your Account page.
Under “Manage My Videos” click the “HQ Video Playback Setting” link.
Select the playback setting that makes sense for you.
Click the “Save” button.
Criteria for a Video to Become HQ
The exact settings aren’t know yet for the video to become high quality. We could assume that the exact minimum settings are the same as encoded format listed above, however youtube has changed their “best format to upload high quality” help page to set the video resolution to 640 x 480. Maybe high quality will support different formats and aspect ratios in the future. It’s best to upload as high quality as possible. The new multi video uploader makes it easy on a unreliable connection. Even if your upload times out or you get disconnected it will restart the uploading process exactly where it left off.
Embed High Quality Youtube Clips
Update
This code works fine to embed the mp4 version. The magic query string var is “&ap=%2526fmt%3D18″ specifying format 18. Just replace (VIDEO EMBED URL) with the video ID. Note that there’s a huge disadvantage in that there is no seeking. The fmt=6 embed version is less reliable.
Currently there is no official way to embed the High Quality videos on your website / myspace / blogs. It’s possible, but a big hassle, and it’s impossible to turn off autoplay. Here’s an example you can embed if you want to see it for yourself.
It only works with youtube’s in-site player, player2.swf, rather than the player youtube has for embeds. The problem is youtube’s in-site player does not have a variable to turn autoplay on or off and if you try embedding it to your site flash issues a warning that the script is trying to contact a remote server (youtube.com). Player2.swf seems to have an internal “ap” variable hidden in the actionscript but it seems to just break the vid no matter what options I set. The key flashvar for high quality is “fmt_map=6/0/7/0/0″ and “fmt_map=18/512000/9/0/115″ for mp4s. When enabled, the flv file comes from cache.googlevideo.com/videoplayback?itag=6, without the fmt_map var it comes from cache.googlevideo.com/get_video, with normal quality.
To embed a high quality video you need to go to the video’s page on youtube, view source, and grab the flashvar data. The most important vars are video_id, t, and sk. Just use the above embed code as a template and replace those values. As for the rest: L defines how long the video is in seconds, hl is the home language, plid tries to find any associated playlists, playnext plays the next item on the playlist if there is one.
Making your youtube videos High Quality
Youtube will be automatically creating high quality versions of many videos for those that meet the guidelines. The video quality is bad on youtube, partly because youtube encodes to such a small screen resolution with a low bitrate, but mainly because people post really low quality videos.
The crappy resolution youtube is actually what got it so popular. Google video had originally allowed 640 x 480 with a great bitrate, but they failed miserably to compete against youtube (so they later bought em out). It made online video making / viewing possible even on crappy connections. Take the time to resize your vid and sharpen it a bit before uploading. A little noise reduction and color correction can’t hurt either. Use virtualdub and avisynth. They’re free. Use xvid or x264 and lame acm for the audio. Divx is fine if you can get the pro version. See doom9 for tons of guides on video creation / editing / improvement.
Youtube High Quality Hack
There is also a hack using total video converter where if you make an flv with certain settings you can upload a video of super high quality and have youtube keep the screen resolution and bitrate.
Youtube High Quality Hack Settings Howto
Select what you want to encode into an flv in total video converter with these settings.
Sample Rate: 44100 Hz audio bit rate: 320.000 kbit/s Audio codec: mp3 Custom video bit rate: any Resolution: any
Cons
It messes up the time on the video. A 30 second video can read as 9 minutes. The way it tells how long the video is seems very random but it constantly says the video is much longer than it really is. Having the resolution or bitrate too high causes it to not stream well and get stuck.
Sav se unezvijerim kad mi neka web stranica resizea svoj prozor, sto za posljedicu ima resizeanje kompletnog Firefoxa sa svim tabovima. Ugh %#$%#$@!
Dogadja se to dovoljno rijetko (ali i pogadja dovoljno intenzivno) da u tom trenutku uopce ne razmisljam o tome kako bi takvo ponasanje FFoxa trebalo eliminirati… eto, danas sam bio prisebniji i napokon iskljucio taj debilni defaultni annoyance…
1. Mac/Linux users: Click Edit > Preferences. Windows users: Tools > Options
2. Go to the Content Tab
3. To the right of “Enable Javascript,” hit “Advanced…”
4. Uncheck “Move or resize existing windows”
Velika pomoc za one koji ce zeljeti koristiti Google Appse za svoju domenu:
http://textsnippets.com/posts/show/1062
bind9 google apps zone template (See related posts)
Change 1.2.3.4 for your accelerator’s ip and mydomain.net for your domain name
$TTL 86400
@ IN SOA ns1.mydomain.net. hostmaster.mydomain.net. (
2007052701 ; serial
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum
IN NS ns1.mydomain.net.
IN NS ns1.everydns.net.
IN NS ns2.everydns.net.
IN NS ns3.everydns.net.
IN NS ns4.everydns.net.
@ IN TXT “v=spf1 ip4:1.2.3.4 include:gmail.com~all include:mydomain.joyent.net~all ~all”
@ IN MX 1 aspmx.l.google.com.
@ IN MX 3 alt1.aspmx.l.google.com.
@ IN MX 3 alt2.aspmx.l.google.com.
@ IN MX 5 aspmx2.googlemail.com.
@ IN MX 5 aspmx3.googlemail.com.
@ IN MX 5 aspmx4.googlemail.com.
@ IN MX 5 aspmx5.googlemail.com.
_xmpp-server._tcp IN SRV 5 0 5269 xmpp-server.l.google.com.
_xmpp-server._tcp IN SRV 20 0 5269 xmpp-server1.l.google.com.
_xmpp-server._tcp IN SRV 20 0 5269 xmpp-server2.l.google.com.
_xmpp-server._tcp IN SRV 20 0 5269 xmpp-server3.l.google.com.
_xmpp-server._tcp IN SRV 20 0 5269 xmpp-server4.l.google.com.
_jabber._tcp IN SRV 5 0 5269 xmpp-server.l.google.com.
_jabber._tcp IN SRV 20 0 5269 xmpp-server1.l.google.com.
_jabber._tcp IN SRV 20 0 5269 xmpp-server2.l.google.com.
_jabber._tcp IN SRV 20 0 5269 xmpp-server3.l.google.com.
_jabber._tcp IN SRV 20 0 5269 xmpp-server4.l.google.com.
@ IN A 1.2.3.4
www IN CNAME @
mail IN CNAME ghs.google.com.
start IN CNAME ghs.google.com.
calendar IN CNAME ghs.google.com.
It wasn’t really my intent to go back and revisit all these security post lists. That’s just how it seems to have turned out. That’s OK. Software gets developed and updated. Lists grow. New and better versions get released….
To summarize: “…a rootkit is executable code that attempts to evade detection of running processes, files or system data. There are many ways it can do this, but the end result is that they are very hard to find and can make an infected system look clean and safe even to traditional anti-virus and anti-malware software.” More here: Wikipedia : Rootkit
At the time of my original post, there were just a handful of anti-rootkit tools available to the public. I just offered five.
Now most all major anti-virus/security software vendors have issued anti-rootkit solutions, though some are still in a beta release form.
The Threat
How seriously concerned should the average user be? Well…if you are practicing “safe-surfing” by staying away from “risky” websites, keeping your operating system patched, scanning all files downloaded and sent in email with an up-to-date anti-virus program, you should be mostly ok. I say mostly because it is still possible for a system to become compromised with a rootkit, even if you are playing by the rules.
Certain individuals would like nothing else than to get a home-broadband user’s system infected with a rootkit. Not so much to steal your personal information–though that’s always a potential target–but to install trojan services that would allow them to leverage the system for attacks on other larger systems, spam-mail-bot rental services, or even hosting of their hidden/illegal files on the system. Any of these events could seriously make a home or corporate user’s system a great big pile of steaming cow-dung for the user and those impacted by those services. Bummer!
SANS-ISC recent reported that Europe has been pounded lately by emails which include variants of a virus/trojan loader file: European Storm Video E-Mail. While bad, it doesn’t sound too serious…but!
heiseSecurity in Germany expands the story with more details, much more disconcerting: “Storm worm” sloshes through the internet. What the trojan seems to be doing is download additional files from the internet, and “…according to GDATA, one action it takes is to install the rootkit Win32.agent.dh.” Depending on the anti-virus company, different names may be used.
Rootkit writers aren’t happy about the attention. Just this week, they have worked to get the GMER anti-rootkit mirrors shut down under a massive DDOS attack. As soon as new mirrors for the files went up, they also were attacked. More information: GMER Anti Rootkit & People Power, and Martijnc’s blog post: DDoS attack
The battle for pc security rages on.
The Response
There are a number of ways to look for a rootkit on your system.
The first is to download and run several of these rootkit detection tools on your live system. These rootkit detection tools are specially programmed to check for hidden files and masked running or injected processes. It’s a cat and mouse game, and some tools and methods are more effective than others. Just as hard as the security programmers work to prevent and detect these rootkits, the developers on the other side are working to make them more difficult to be detected.
A second technique is to download and run several of these rootkit detection tools onto a USB drive. Then using a bootable “LiveCD” like BartPE or Linux, run the appropriate rootkit detection tools on the “dead” system’s drive(s). This may be a much more effective approach. Since the infected system isn’t being booted, the drives just contain “static” data files that shouldn’t be executed. They could be, but that’s the point…to not run or launch any files on the potentially compromised system. That way they can be detected and removed while “dormant". Using a Linux “LiveCD” to scan a Windows system disk is even more safe as the likelihood of cross-contamination is almost non-existent.
If a rootkit is found you have two options: 1) Use one of the detection/removal tools to–hopefully!–remove it. Or, 2) recover your critical data files to another drive/media location, then do a full wipe of the infected system, and reinstall it fresh.
Speaking as a half-way competent computer geek, I personally would feel more comfortable going with option two, because otherwise I would always have a shadow of doubt of the system’s integrity. Nor would I have have the patience to pick through a manual removal process if the tools failed to remove it.
Rootkit Detector Tool List
InformationWeek posted an excellent article recently titled Review: Six Rootkit Detectors Protect Your System. I was familiar with some of them, and had come across a few more on my own that didn’t make the author’s cut. But that got me observing the increase in the number to tools now at our disposal. With some more careful searching, I’ve ended up collecting quite a list. Almost all are offered as freeware or trialware.
I have only used a handful of these tools and only keep a few with me on my USB system administrator’s stick. So far, I haven’t found a rootkit on my systems (here or at work) so I can’t speak of their effectiveness in removal. Also, because of the nature of how these tools work and where they look, it is quite possible that removal of a real rootkit or a listed file in error (that wasn’t actually malicious) can cause your Windows system to fail, not boot, or BSOD to the point you will be recovering files off the dead OS drive and then reinstalling your system.
You’ve been warned!.
F-Secure BlackLight - Restrictive wizard interface, but easy to use for the uninitiated.
IceSword 1.20 - Developed in China but nicely translated into English. Busy interface but updated often. Has some advanced tools like the ability to “reboot and monitor” during the boot process.
RKDetector 2.0 - Two tools in one; 1) scans for hidden files on drives, 2) scans for hidden processes and hooks. Takes a bit of work to run the scans, and can’t do a global system scan with both.
Trend Micro RootkitBuster 1.6 - Runs scans in five system areas and exports a nice log file. You can then opt to remove the detected items.
RootkitRevealer 1.71 - From the Sysinternal’s team. Easy to use, but does often turn up documented false-positives. Just identifies suspicious processes…you are on your own to delete them with other methods and applications. Better for system checking and monitoring, rather than protection and removal in-of-itself.
Rootkit Unhooker 3.0A - Russian software team project. Does a self-test to make sure it hasn’t been compromised; that’s a good feature. Provides lots of details and the ability to do focused scans or a global element scan. Also provides multiple methods to address/remove the located processes and files.
McAfee Rootkit Detective Beta - “McAfee Rootkit Detective Beta is a program designed and developed by McAfee Avert Labs to proactively detect and clean rootkits that are running on the system.” Nice interface.
Sophos Anti-Rootkit - “Sophos Anti-Rootkit provides an extra layer of detection, by safely and reliably detecting and removing any rootkit that might already have secreted itself onto your system.” Note: Registration required for download from the vendor’s site. The utility itself is free.
Gmer - The tool that’s got everyone in a fuss! Scans for hidden processes, services, files, registry keys, drivers, and hooks. Also allows some system function monitoring. Highly regarded by the antirootkit professionals. More screenshots (while the site is up).
Advanced Rootkit Detector for Windows (rkdetector) - This command-line based scanner was one of the very first rootkit detectors I became familiar with. I don’t think it has been updated since it’s original release (back in 2004). The website is in Spanish, but the application worked just fine for me. I can’t say it now can handle the newest rootkit methods of attacks, but just for posterity I’m offering it here.
More follow as discovered on Antirootkit.com’s incredible website. They’ve done a bang-up job of finding and detailing all these. Please check out their site for more information as well as some screenshots, reviews and evaluation ratings. These guys (and gals?) are doing great work and deserve full credit for locating these wide selections of tools.
Note: Some products here are beta products and may not be available or will work past a certain date. Others are trialware/crippleware. In these cases I have chosen to still include them so you can keep an eye on possible future development or releases.
Archon Scanner - More of a process, injection, hooking scanner. But has other specialties as well. - current version was beta and has expired…developer’s promise new one sometime.
AVG AntiRootkit - Beta product. Doesn’t seem to be offered anywhere but from Antirootkit.com.
DarkSpy - Chinese developed tool. Supports process, kernel mode, file, registry scan (disabled in test version) and hidden port detection. Screenshot via Antirootkit.com.
Helios - Alpha level program right now. Behavior-based, not signature based detection. Interesting interface and approach. Worth looking at, but remember it is alpha/beta level… Developers offer videos as well of their tool in action.
HiddenFinder - trialware - Shows hidden processes and drivers on a system and then allows for killing of the desired process.
HookExplorer - Tiny little application. Displays import address table (IAT) hijacks and “detour style hooks.” Lots of information in the tiny display!
OS X Rootkit Hunter - Mac OS X 10.4 product. I don’t support Apple systems, but there you are. Screenshot page by developer. (I didn’t think Mac’s got sick like this!)
Panda Anti-Rootkit - beta software. Looks at hidden drivers, processes, modules, files, registry items, hooks. Not a lot of user options…scan, clean, and view results.
RootKitShark - trialware - Command-line scanner. Unmasks located files and prevents from boot-execution. Then can be manually removed by user or using other security tools.
WinShark - trialware - GUI based version that incorporates RootKitShark (above) among other features. Allows process and user monitoring of systems. (Intrusion Detection System). Detection enabled in trial version, but rootkit elimination feature only in the fully-licensed version.
RootKit Uncover - beta - Appears to be a hidden process and file scanner. See Antirootkit.com’s page for overview. Bitdefender doesn’t have any information on their site for it.
SEEM - Multi-purpose system reporting tool that has an interesting interface. Includes a rootkit scanner as part of it’s features. Website (translated from French) has quite a bit of good information on rootkits and as they apply to their program. Download page (kinda hard to find in French). Get the English version unless you know French.
System Virginity Verifier - Tool developed by Joanna Rutkowska to validate system integrity by checking important Windows System components targeted by hidden malware. She also provides links to some related PowerPoint presentations.
Unhackme - trialware - limited to 10 runs until license purchased and entered - In standard, “Roaming” and “Professional” editions. University of Minnesota’s Safe Computing page documents rootkit removal tutorial with Unhackme.
InvisibleThings.org - Website of security guru and brilliant mind Joanna Rutkowska. Presented “Blue Pill” concept. Lots of neat tools and detailed rootkit related information on her website.
Episode #9 of Security Now - Rootkit discussion between Leo Laporte and Steve Gibson. Good foundational information.
Citizendium: This wiki focuses on credibility, using both the general public and credentialed experts. It works just like Wikipedia, but better.
AmericanFactFinder: This database from the US Census Bureau is a great source for information on housing, economics, geography and population.
The Linguist List: The Linguist List is home to a peer-reviewed database of language and language-family information.
Intute: Created by a network of UK universities and partners, this database is full of evaluations from subject specialists.
Classic Encyclopedia: This online encyclopedia is based on the 1911 11th edition of the Encyclopedia Brittannica. Although quite old, it offers an in-depth look on more than 40,000 items, and it’s widely considered to be the best encyclopedias ever written.
Virtual Reference Shelf: This Library of Congress site offers a number of high quality selected web resources.
MedBioWorld: Get professional medical and biotechnology information from this resource for journals, reference tools, databases, and more.
Library Spot: Check out this site for libraries online, a reading room, reference desk, and more.
FactCheck.org: FactCheck.org researches politics and delivers the truth on candidates and more.
iTools: Use iTools’ research tools to find facts and theories on just about any subject.
Browse Topics: Maintained by professional librarians, this site links to Federal websites that offer facts.
WWW Virtual Library: Created by Tim Berners-Lee, who also created HTML and the Web, this library uses experts to compile high quality information.
Open Site: Open Site uses volunteer editors to offer a fair, impartial Internet encyclopedia.
CredoReference: CredoReference aggregates content from some of the best publishers in reference, offering more than 3 million reference entries.
Internet Public Library: In the Internet Public Library, you’ll find references for nearly every subject out there.
Infoplease: Infoplease offers an entire suite of reference materials, including an atlas, dictionary, encyclopedia, and almanacs.
STAT-USA/Internet: This service of the US Department of Commerce offers information on business, economics, trade, and more.
Mathematica: Mathematica, the Wolfram Library Archive, offers research and information on math, science, and more.
Refdesk: Refdesk calls itself the single best resource for facts, and it delivers. Visit this online reference desk to find facts in their tools, facts-at-a-glance, or facts search desk.
AskOxford: This reference tool from Oxford University Press offers facts and tips on the English language and more.
The Old Farmer’s Almanac: Whether you’re searching for weather, food, gardening, or beyond, you’ll find what you need in this online almanac.
eXtension: The information you’ll find on eXtension is objective, research-based, and credible.
FindLaw: This listing of legal resources makes it easy to find cases, codes, references, and much more.
CIA Factbook: The CIA Factbook offers information on world countries and more.
Iako nije bas po mojim mjerilima (koliko vidim, nema fine tuninga filtera za portove, sourceve i destinatione paketa), cini se kao idealan security addon nekom antivirusu na kompu leg(ic)e koji zna nazvati u 8 navecer, moleci da mu/joj se preinstaliraju Windowsi jer su mu/joj “spori i sve se vuce", a Pero 1337 Hax0r (susjed leg(ic)e) je telepatski dijagnosticirao “zarazu trojanom i virusima” kojeg je “vjerojatno negdje pokupio/la".
Em Windowse i sebi reinstaliram jednom u 5 godina (draze mi je ljudima objasniti da postoji slipstreamani ETH0 release), em nikada nisam volio drugima uvaljivati bloatirane verzije kojekakvih all-in-one Internet securitya, zbog kojih bi im sljedecih tjedan dana morao objasnjavati sto sve trebaju ukljuciti/iskljuciti da bi mogli normalno surfati. Stoga radje urucim CD/DVD s potrebnim softwarom, popijem kavu i objasnim kako treba klikati na “next, next, next".
Kao sto znamo, RapidShare nema vlastite trazilice za hostane fileke… ali, zato postoje razni servisi… Evo neki od njih… zasigurno nemaju svi sve indeksirano, ali moze se stosta pronaci…
NirCmd is a small command-line utility that allows you to do some useful tasks without displaying any user interface. By running NirCmd with simple command-line option, you can write and delete values and keys in the Registry, write values into INI file, dial to your internet account or connect to a VPN network, restart windows or shut down the computer, create shortcut to a file, change the created/modified date of a file, change your display settings, turn off your monitor, open the door of your CD-ROM drive, and more…
Executing NirCmd commands on remote computers
Starting from version 1.40, you can execute all NirCmd commands in remote computers. However, you should be aware of the following restrictions and problems:
* This option is only available for Windows NT, Windows 2000 and Windows XP. You cannot use it on Windows 9x machines.
* You must log on to the remote machine as administrator.
* The Schedule service in the remote machine must be started. (By default, the Schedule service is automatically started in all NT/2000/XP machines, so you don’t have to worry too much about this)
* Due to some limitations of the Schedule service, you have to wait up to 60 seconds until the command is actually executed in the remote machine.
* The command in the remote machine is executed under ‘SYSTEM’ account, and thus some commands may not work in the same way as you execute them locally.
There are 2 commands for executing NirCmd in remote machines:
* remote - for executing command on a single remote computer.
* multiremote - for executing command on multiple remote computers.
Kad smo vec kod fontova, postoji jedan mali, mali nifty tool za on demand loadanje fontova koji nam u tom trenutku trebaju, bez restartanja racunala, instalacija, deinstalacija i ostalog nepotrebnog navlacenja tipografske kozice. Dakle, nije bloated gomila sranja s 5 milijardi funkacija koje nikom ne trebaju… vec programcic koji loada fontove on demand. Fontovi mogu biti poslozeni u direktorijima i on to konta kao kategorije/grupe. Phucking tocno ono sto svakom covjeku treba! Tocka kraj. Zakon!
FontLoader… firma koja ga je napravila ga je discontinuala, ali… pametni ljudi cuvaju dobre programcice…
Have you ever seen a landscape or cityscape that looked hyper-realistic, or even fantastical – a shot with amazing detail in the shadows, midtones, and highlights all at the same time?
It may have been perfect shooting conditions in the field, with a graduated neutral density filter or some other filter stacking combo, or maybe it was painstakingly crafted in Photoshop with tons of dodging and burning and layer masking.
Or it may have been a High-Dynamic Range Image (HDR), such as the lead image for this story. Often explained as “seeing more like the human eye,” HDR imaging combines several shots of a given scene to overcome the exposure range limitations of traditional single-shot photography – and the final results have much more detail from shadows to highlights, and everywhere in between.
Uglavnom, procesljavajuci malo informacije na Netu, dodjoh do zakljucka…
General Purpose Settings - up to 6 minutes
A simple way to ensure that the quality is there is to export to MPEG-4 with:
* H.264 video at 2000Kbits/sec (2Mbits/sec or 250KBytes/sec)
* 320x240 video size (deinterlaced or simply use one field)
* Mono audio with AAC at 64 Kbit/sec (or 128 Kbit/sec for stereo)
* Recommended Sample Rate and
* Best Encoding Quality.
* In the Video Options Main Profile should be checked on and Best Quality (Multi-pass) is advised for best quality.
Blip.tv je zaista odlican… jedina mana pred YT-om je daleko manji community, a u nekim situacijama to zna biti presudno (u korist YT-a). Ako vam treba samo kvalitetan hosting video uradaka i ne oslanjate se na slucajne konzumente iz redova community-a, onda Blip.tv sigurno pobjeduje. Hrpa korisnih alata, statistika, daaaleko bolja kvaliteta videa (cak i u Flash formatu), vise formati, direktni downloadi, vise metoda uploada (cak i FTP), instant approval, automatski syndication po kojekakvim servisima… gotovi RSS i Miro kanali… i jos hrpa toga… mljac, mljac…
Evo i jedan clanak iz PCworlda, na tom tragu…
http://www.pcworld.com/article/id,136089/article.html
- Other / System tools :
Manage processes, Opened files, Windows Handles, Events for processes/events/files changes, bandwidth tester (based on iperf), manage windows devices, VBS script editor, WMI browser, Create maps with Graphviz, manage ACL’s.
NetworkView is an ultra compact network discovery and management tool for Windows
Main Features
* Discover TCP/IP nodes and routes using DNS, SNMP, Ports, NetBIOS and WMI
* Get MAC addresses and NIC Manufacturer Names
* Monitor nodes and receive Alerts
* Document with printed Maps and Reports.
* Control and Secure your network with the SNMP MIB Browser, the WMI browser and the Port Scanner.
Iako se dosta alata temelji na Googlevim online aplikacijama, gOS je skracenica od good OS, ne Google OS
Kako bilo, radi se o jednoj od zanimljivijih distribucija Linuxa (temeljenoj na Ubuntu), prilagodjenoj newbie userima i slabijim strojevima. Idealno za ozivljavanje starih masina koje skupljaju prasinu, a mogle bi posluziti kao nekakav network station, ili kao poklon siromasnoj obitelji iz susjedstva. Doduse, ako se nekome zeli pomoci bolje bi bilo pokloniti novi cutting-edge stroj, ali poneka to nije moguce i u tom slucaju je bolje pokloniti ovakav stroj, nego nista.
Nema problema, zato smo mi tu da vam damo nove ideje
Nemojte ih odbaciti zato što niste čuli za njih - one isto kao i USM daju odlične rezultate. Problem je što puno ljudi čita prastare knjige iz Photoshopa. Bacite ih jer mi imamo odličnu novu ideju za izoštravanje!
You may know about the MySQL Cluster, which is a complex architecture to achieve high availability and performance. One of the advantages of MySQL Cluster is that each node is a peer to the others, whereas in a normal replicating system you have a master and many slaves, and applications must be careful to write only to the master.
The main disadvantages of MySQL Cluster are (as of MySQL 5.0):
* The database is in memory only, thus requiring more resources than a normal MySQL database. (MySQL 5.1 introduces table spaces, with the capability of storing nonindexed data on disk.)
* Some normal features are not available, such as full-text searches, referential integrity, and transaction isolation levels higher than READ COMMITTED.
There are some cases where the MySQL Cluster is the perfect solution, but for the vast majority, replication is still the best choice.
Replication, too, has its problems, though:
* There is a fastidious distinction between master and slaves. Your applications must be replication-aware, so that they will write on the master and read from the slaves. It would be so nice to have a replication array where you could use all the nodes in the same way, and every node could be at the same time master and slave.
* There is the fail-over problem. When the master fails, it’s true that you have the slaves ready to replace it, but the process of detecting the failure and acting upon it requires the administrator’s intervention.
Fixing these two misfeatures is exactly the purpose of this article. Using features introduced in MySQL 5.0 and 5.1, it is possible to build a replication system where all nodes act as master and slave at the same time, with a built-in fail-over mechanism.
Miranda, odlican Instant Messaging komad softa. Koliko je dobar, mozda najbolje opisuje podatak da mojih 700+ kontakata (ok, dobar dio mrtvih, lijen sam za ciscenje ) s 5 IM protokola i 20MB history-a vrti s memory footprintom od 12-15MB. Brzo, maleno, u novijim verzijama i poprilicno vizualno gledljivo i dopadljivo.
Kako god, naidjoh na stranicu na kojoj se nalazi popis svih mogucih pluginova (ima stvarno korisnih). Miranda mozda iziskuje podosta drkanja i postelavanja (svaka moguca picaboca se moze konfigurirati), ali zato je jako zahvalna pri handleanju. Tko bi rekao da je zenskog roda?!
VICE magazine (wiki), hmmm… fenomen na kojeg tek nedavno nabasah… shame on me…
Vice is a free glossy magazine founded in Montreal, Quebec, Canada and currently based in New York City that covers contemporary independent arts and youth culture. The magazine’s readership comprises young postcollegiate bohemians, often labelled “hipsters.” Known for its controversial content, it often strikes a sardonic and ironic pose on debauchery, sex, drugs, violence, and social issues involving race and economic class.
Jos od vremena Norton Commandera i DOS Navigatora (origin), navikao sam na efikasnost takvog tipa file managera. Dolaskom Win platforme i ubiganjem DOS-a, uginuo je i DOS Navigator. Njegovo mjesto zauzeo je Total Commander (prvotno zvan Windows Commander). 100tinjak puta ucinkovitije sredstvo za rad s fileovima od Windows Explorera… doduse, postoje ljudi koji se s tim ne bi slozili, ali to su isti oni koji ne zele raditi usporedne testove ucinkovitosti (ideja je da se napravi spisak od 50-100 uobicajenih radnji i jedan to rjesava u WinExp, a drugi u TC-u ).
Total Commander je odlican komad softwarea. Jednostavno prikazane funkcionalnosti koje mnogi smatraju nuznima u svakodnevnom radu i hrpetina pluginova.
Naletih i na svojevrsni megapack, cini mi se pomalo bloated, ali svejedno ga vrijedi pogledati -> Total Commander Ultima Prime.
Simptom koji se meni pojavio je nemogucnost koristenja domenskih ovlasti, odnosno u EventLog su se pojavili errori koji su upucivali na to da moj stroj nije mogao s domenskog servera dohvatiti prava za bilo sto. Dakle, iako sam kao user bop prijavljen na domenu i mogao sam normalno pingati sve zivo na mrezi, ipak mi je sve gdje se koriste bilo kakva domenska prava bilo uskraceno…
Jedan od simptoma koji je vodio ka rjesenju je poruka “Windows could not finish repairing the problem because following action cannot be completed: Clearing NetBT“, koja se pojavljivala pri pokusaju repaira network connectiona (WinXP).
Rjesenje je za ovaj problem je resetiranje WinXP TCP/IP stacka (nakon toga ce se ponovo trebati konfigurirati mrezne postavke za taj connection).
Rjesenje/Solution/Fix:
Start -> Run -> CMD to open a command prompt.
Reset WINSOCK entries to installation defaults: netsh winsock reset catalog
Reset TCP/IP stack to installation defaults: netsh int ip reset c:/resettcp.log
Reboot the machine.
(Make sure “TCP/IP NetBIOS Helper” service is running and that the Startup Type is Automatic [Control Panel - Administrative Tools - Services].)
Skidajuci raznorazne programcice s eMule-a, zna se dogoditi da se skinu i kojekakvi cobanoidni trojani, backdoorovi i sl. Dakle, izgledom i ponasanjem se cini da je sve ok sa skinutim softom, ali je trojan/backdoor obicno bindan u izvorni soft i po pokretanju se dropa i dalje obavlja svoje.
Zacudilo me koliko se cesto pojavljuje jedan od njih, najcesce dobro zapakiran EXE, kojeg ni antivir soft cesto ne kuzi kako bi trebao… setcfg.exe i syscfg.exe su najcesca imena izvrsnih fileova…
Pri pokretanju zarazenog filea (najcesce nekakav programcic koji se normalno izvrsi), u pozadini se dropa ovaj trojan, pokrece proces i stavlja u:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
s nazivom keya “Service host” i putanjom do .exe file-a.
setcfg.exe IS trojan.backdoor, test the file (located in c:/windows/system32/ , with hidden, read only and system attributes - remote them first) at very nice online virus testing site virusscan.jotti.org.
For the last 6 months I had nightmares with computer freezes, reboots, etc. I suspected many applications, (network) drivers, hardware etc. but couldn’t find the right piece of shit to put the blame on. Well, the search is over. The worst possible application and complete and utter bullshit is named: BWMeter (from DeskSoft). This piece of utter bullshit, installed network driver that intercepted all network traffic, which would be fine if that piece of crap had been written by humans. Humans with more than a dozen of braincells.
It took me six months, many suspects, many applications deinstalled as collateral damage… spare yourself time and nerves, and remove that crapy pile of shit… try NetMeter instead… It doesn’t have as much features as BWMeter, but at least it won’t freeze/reboot your computer and won’t kill your nerves nor time…
On the client Side:
- Picasa
- Windows XP Web Publishing Wizzard
On the server side:
- Apache + MySQL + ImageMagick + PHP + Coppermine Photo Gallery
Process:
Let’s assume you have a running Coppermine Gallery on your server under http://www.yourdomainname.com (see coppermine installation instructions). Go to http://www.yourdomainname.com/xp_publish.php. In the middle of the page there’s a link to download a .reg file to install on your Windows XP system. Download it and install it. From now you can publish files from Window Explorer to your gallery in a few clicks. So let’s work on the pictures.
1- Copy your pictures from the camera to a folder on your computer (let’s call it “foo”).
2- Open Picasa, make sure folder “foo” is being watched for changes so that the pictures you just added can be seen from Picasa. You can specify which folders are watched in “Tools>Picture Manager”.
3- in Picasa, browse your pictures, rotate them, get rid of those red eyes… when you find a picture you want to put on your online gallery, just “Hold” it in the Picture Tray.
4- When you’re done browsing/editing your pictures, all the pictures you want to put online should be in the picture tray. Now Press the “Export” button on the right. This will pop up a small window where you can specify the way you want your pictures to be resized. I usually set it to 800*600. When the export is done, Picasa automatically launches Windows Explorer window contaning all the pictures you just exported.
5- In the left pane of the Windows Explorer Window, select “Publish Folder to the Web”. You should be able to select your Coppermine Photo Gallery in the Publishing Wizzard, and Select all the pictures you want to upload. Also the Wizzard lets you pick an existing name for the target album or create a new one in the category of your choice. Since Picasa did a smart resizing of your pictures (taking protrait/landscape into account), you do not need to resize them in the wizzard. When the publishing is done your pictures will be uploaded to your gallery and you can enjoy sharing them.
To stop this service, open [Command Prompt] (Start>Run>cmd>Enter) and type the following command sc stop wuauserv. This will not prevent Automatic Updates from starting at the next boot. So don’t worry, you’ll keep getting Windows updates. Just don’t forget to restart eventually.
ili
Now, to get rid of it:
Start / Run / gpedit.msc / Local Computer Policy / Computer Configuration / Administrative Templates / Windows Components / Windows Update / Re-prompt for restart with scheduled installations
Javascript includanje dijela stranice, ili kompletne stranice… zanimljiv koncept, moze pomoci kod cacheiranja, ali me zanima koliko je to i je li brze od PHP-ovog includea i koliko to stvara overheada na HTTP requeste…
Za oko mi je zapelo jedno Canon staklo, dosta hvaljeno na sve strane. Problem je u tome sto se relativno tesko nabavlja u HR i sto postoji nekoliko verzija (revisiona), a samo je jedna verzija ono pravo.
Ugh… s RAW-om i RAW eksporterima dosla je i prica o color spaceima… Jedni kazu sRGB, drugi kazu Adobe1998. Hm, sudeci prema fotkama i napisanom u ovom i ovom clanku, cini mi se da bi meni visse odgovarao sRGB.
P.S. color profile (sm959nf.icf) koji dolazi uz Samsung959NF je smece. To sam skontao tek u programima koji koriste color profile definiran kao defultni za Windowse (Display prop. -> Color Mng), buduci da su mi po defaultu sve fotke u takvim programima (Photoshop, BibblePro, Lightroom,…) imale magenta “premaz"…. Uglavnom, ovo pisem zbog svih onih koji koriste sm959nf.icf, kako bi znali zasto im RAW exporteri prikazuju fotke s krivim color spaceom, jer je meni je trebalo ponesto vremena da skontam o cemu se radi…
Kvaliteta standardne JPG fotke i JPG fotke iz eksportiranog RAW-a je nebo i zemlja, cak i s defaultnim export vrijednostima. Ni sam u nisam vjerovao da je razlika toliko zamjetna. Sada fotkam iskljucivo u RAW-u. A JPG dobiven iz RAW je onoliko bolji od standardnog JPG-a, koliko je proces eksportiranja kvalitetan, a on ponajvise ovisi o kalibraciji oka i sve opreme ukljucene u igru i RAW export softa…
Lik je testirao RAW exportere (clanak je iz 2006.) i dosta temeljito obradio tematiku…
Izvorni clanak je na spanjolskom, ali google translator prevodi sasvim pristojno: RAW export software - comparison. Uglavnom, testirao je Adobe Camera RAW (ACR) v3.4 sobre CS2, Adobe Lightroom Beta 4.1, Bibble Pro v4.8, CaptureOne (C1) v3.7.4, Nikon Capture v4.4, RawShooter Premium 2006, Raw Developer 1.5.1, Apple Aperture v1.5… tko je pobjednik? Provjerite… klikom -> RAW export software - comparison
Men vs. Women Some subtle (and some not so subtle) differences
Handwriting:
Men: To their credit, men do not decorate their penmanship. They just chicken-scratch.
Women: Women use scented, colored stationery and they dot the “i” with circles or hearts. Women use ridiculously large loops in the “b” and “g". It is a pain to read a note from a woman. Even when she’s dumping you, she will put a smiley face at the end of the note.
Groceries:
Women: A woman makes a list of things she needs, then goes out to the store and buys those things.
Men: A man waits till the only items left in his fridge are half a lime and a beer. Then he goes grocery shopping. He buys everything that looks good. By the time a man reaches the checkout counter, his cart is packed tighter than the Clampett’s car on Beverly Hillbillies. Of course, this will not stop him from going to the express lane.
Relationships:
Women: When a relationship ends, a woman will cry and pour her heart out to her girlfriends, and she will write a poem titled “All Men Are Idiots". Then she will get on with her life.
Men: A man has a little more trouble letting go. Six months after the break-up, at 3:00 a.m. on a Saturday night, he will call and say, “I just wanted to let you know you ruined my life, and I’ll never forgive you, and I hate you, and you’re a total floozy. But I want you to know that there’s always a chance for us.” This is known as the “I Hate You / I Love You” drunken phone call, that 99% of all men have made at least once. There are community colleges that offer courses to help men get over this need.
Sex:
Women: They prefer 30-40 minutes of foreplay.
Men: They prefer 30-40 seconds of foreplay. Men consider driving back to her place part of the foreplay.
Maturity:
Women: They mature much faster than men. Most 17-year old females can function as adults.
Men: Most 17-year old males are still trading baseball cards and giving each other wedgies after gym class. This is why high school romances rarely work out.
Magazines:
Men: Men’s magazines often feature pictures of naked women. Men are turned on at the sight of a naked woman’s body.
Women: Women’s magazines also feature pictures of naked women. This is because the female body is a beautiful work of art, while the male body is lumpy and hairy and should not be seen by the light of day. Most naked men elicit laughter from women.
Bathrooms:
Men: A man has six items in his bathroom – a toothbrush, shaving cream, razor, a bar of Dial soap, and a towel from the Holiday Inn.
Women: The average number of items in the typical woman’s bathroom is 437. A man cannot identify most of these items.
Shoes:
Women: When preparing for work, a woman will put on a wool suit, then slip on Reebok sneakers. She will carry her dress shoes in a plastic bag from Saks. When a woman gets to work, she will put on her dress shoes. Five minutes later, she will kick them off because her feet are under the desk.
Men: A man will wear the same pair of shoes all day. Let’s not talk about how many days he’ll wear the same socks.
Cats:
Women: Women love cats.
Men: Men say they love cats, but when women aren’t looking, men kick cats.
Children:
Women: A woman knows all about her children. She knows about dentist appointments and soccer games and romances and best friends and favorite foods and secret fears and hopes and dreams.
Men: A man is vaguely aware of some short people living in the house.
Dressing Up:
Women: A woman will dress up to: go shopping, water the plants, empty the garbage, answer the phone, read a book, get the mail.
Men: A man will dress up for: weddings, funerals.
Laundry:
Women: Women do laundry every couple of days.
Men: A man will wear every article of clothing he owns, including his surgical pants (the ones that were hip about eight years ago) before he will do his laundry. When he is finally out of clothes, he will wear a dirty sweatshirt inside out, rent a U-Haul and take his mountain of clothes to the Laundromat. Men always expect to meet beautiful women at the Laundromat. This is a myth perpetuated by reruns of old episodes of “Love American Style.”
Eating Out:
Men: When the check comes, each man will each throw in $20 bills, even though it’s only for $22.50. None of them will have anything smaller, and none will actually admit they want change back.
Women: When the girls get their check, out come the pocket calculators.
Mirrors:
Men: Men are vain and will check themselves out in a mirror.
Women: They are ridiculous; they will check out their reflections in any shiny surface: mirrors, spoons, store windows, bald guys’ heads.
Menopause:
Women: When a woman reaches menopause, she goes through a variety of complicated emotional, psychological, and biological changes. The nature and degree of these changes varies with the individual.
Men: Menopause in a man provokes a uniform reaction - he buys aviator glasses, a snazzy French cap and leather driving gloves, and goes shopping for a Porsche.
The Phone:
Men: Men see the telephone as a communication tool. They use the telephone to send short messages to other people.
Women: A woman can visit her girlfriend for two weeks, and upon returning home, she will call the same friend and they will talk for three hours.
Richard Gere:
Women: Women like Richard Gere because he is sexy in a dangerous way.
Men: Men hate Richard Gere because he reminds them of that slick guy who works at the health club and dates only married women.
Madonna:
Same as above, but reversed. Same reason.
Toys:
Women: Little girls love to play with toys. Then when they reach the age of 11 or 12, they lose interest.
Men: Men never grow out of their toy obsession. As they get older, their toys simply become more expensive, silly and impractical. Examples of men’s toys: little miniature TVs. Car phones. Complicated juicers and blenders. Graphic equalizers. Small robots that serve cocktails on command. Video games. Anything that blinks, beeps, and requires at least 6 “D” batteries to operate.
Cameras:
Men: Men take photography very seriously. They’ll shell out $4000 for state of the art equipment, and build dark rooms and take photography classes.
Women: Women purchase Kodak Instamatics. Of course, women always end up taking better pictures.
Locker Rooms:
Men: In the locker room men talk about three things: money, football, and women. They exaggerate about money, they don’t know football nearly as well as they think they do, and they fabricate stories about women.
Women: They talk about one thing in the locker room - sex. And not in abstract terms, either. They are extremely graphic and technical, and they never lie.
Movies:
Women: Every actress in the history of movies has had to do a nude scene. This is because every movie in the history of movies has been produced by a man.
Men: The only actor who has ever appeared nude in the movies is Richard Gere. This is another reason why men hate him.
Jewelry:
Women: Women look nice when they wear jewelry.
Men: A man can get away with wearing one ring and that’s it. Any more than that and he will look like a lounge singer named Vic.
Conversation:
Men: Men need a good disagreement to get talking. For instance, “Wow, great movie.” or “What are you, nuts? No REAL cop would have an Uzi that size.”
Women: Women, not having this problem, try to initiate conversations with men by saying something agreeable: “That garden by the roadside looks lovely.” “Mm hmm.” Pause. “That was a good restaurant last night, wasn’t it?” “Yeah.” Pause. And so on.
Leg Warmers:
Women: Leg warmers are sexy. A woman, even if she’s walking the dog or doing the dishes, is allowed to wear leg warmers. She can wear them any time she wants.
Men: A man can only wear leg warmers if he is auditioning for the “Gimme the Ball” number in “A Chorus Line.”
Friends:
Women: Women on a girls’ night out talk the whole time.
Men: Men on a boy’s night out say about twenty words all night, most of which are “Pass the Doritos” or “got any more beer?”
Restrooms:
Women: Women use restrooms as social lounges. Women who’ve never met will leave a restroom giggling together like old friends. Women also go to the restroom in packs, at least two women at a time excuse themselves to use the restroom.
Men: Men use restrooms for purely biological reasons. Men in a restrooms will never speak a word to each other. And never in the history of the world has a man excused himself from a restaurant table by saying, “Hey, Tom, I was just about to take a leak. Do you want to join me?”
Simpatican file hosting servis se moze naci na adresi Wikifortio.com. Do 100MB po fileu, nema dosadnih reklama i ogranicenja za download + par zgodnih featurea.
The SceneThe scene aka the warez scene is the pretty unknown worldwide network where people trade pirated goods, like dvd’s, movies, games, applications etc. Warez refers primarily to copyrighted material traded in violation of its copyright license. It does not refer to commercial for-profit software counterfeiting. First warez is released by releasegroups, groups which are specialized in publishing warez. They copy a dvd or break the security of game, and will make it available for other people, as a so-called release. When these releasegroups finish a release it will be uploaded to sites. These sites are very fast private ftp-servers, and the first stadium in the distribution of a release. Eventually, at the end of the distribution, the releases are available for everyone on p2p-software. About The Scene… nastavak
There are dozens of flash modifiers on the market. You can build one which is better than nearly all of them in about 30 minutes with about $2 worth of materials.
Lik je nabavio nekoliko 32MB USB stickova i odlucio im dati nekakav smisao. Napravio je natjecaj za popunjavanje 32MB USB sticka s korisnim softom…Soft je podijelio i organizirao u odredjene kategorije…
Recently, I ordered four 32 MB USB drives. It was one of those impulse buys because they were so cheap. Once they arrived, I then thought, “OK. Now what?” So, I thought I would give these drives away in a contest!
The purpose of this contest is to come up with the four best, unique ideas for a small 32 MB USB drive. The four best ideas will have their ideas created by me on one of the USB drives and mailed out to them! The USB drive system will also be named after the creator. Here are the rules:
1. Everything that you want to use for the USB drive must fit into the 32 MB drive.
2. The drive can be used in conjunction with software installed on the computer as long as the software either comes with a default installation of the OS or can be installed from the USB drive.
3. Any software used on the drive must be available as either freeware, open source, or something that I could cook up quickly with AutoIt.
4. You may enter as often as you wish but each time must be with a unique idea.
5. All components required for the USB drive must be described in detail.
6. Only entries submitted in the comments at http://www.dailycupoftech.com/32-mb-usb-drive-contest/ between the dates of December 4 and 8, 2006 will be eligible.
7. Winners will be selected by votes collected between the dates of December 11 to 15, 2006.
8. Winners will be contained via e-mail for the mailing address so that they can receive their prize.
sIFR is meant to replace short passages of plain browser text with text rendered in your typeface of choice, regardless of whether or not your users have that font installed on their systems. It accomplishes this by using a combination of javascript, CSS, and Flash. Here is the entire process:
1. A normal (X)HTML page is loaded into the browser.
2. A javascript function is run which first checks that Flash is installed and then looks for whatever tags, ids, or classes you designate.
3. If Flash isn’t installed (or obviously if javascript is turned off), the (X)HTML page displays as normal and nothing further occurs. If Flash is installed, javascript traverses through the source of your page measuring each element you’ve designated as something you’d like “sIFRed".
4. Once measured, the script creates Flash movies of the same dimensions and overlays them on top of the original elements, pumping the original browser text in as a Flash variable.
5. Actionscript inside of each Flash file then draws that text in your chosen typeface at a 6 point size and scales it up until it fits snugly inside the Flash movie.
This all happens in a split-second, so all of the checking, replacing, and scaling is not visible to the user. It is not uncommon to notice a very short delay as the Flash loads, but to the user, none of the internals of this process are exposed.
We usually want rectangular objects to look like rectangles. If your camera is not perfectly parallel to the subject you will get trapezoids with weird angles instead.
I had my camera pointed up to include the whole building. This made it look like it’s falling over backwards. Complex large-format cameras and exotic perspective control (PC) and tilt-and-shift (TS) lenses used to be needed to correct this.
It’s trivial to correct in Photoshop CS2. It’s a little tougher in earlier versions. It works with any image, digital or film.
Photoshop CS2
In Photoshop CS2 use the Lens Distortion Correction filter by selecting FILTER > DISTORT > LENS CORRECTION. You get a big new window with a preview and control sliders.
In the Transform box (towards the bottom) just move the Vertical Perspective and Horizontal Perspective sliders until your image looks great.
For this image I simply slid the Vertical Perspective slider until it looked right, which was at -54.
Versions before Photoshop CS2:
Use the Crop tool (just press “C") and select most of the image. You will lose some of the sides of the image in this process.
After you’ve clicked, dragged and released the Crop tool you’ll notice a new option to click along the top bar on your screen called Perspective. I overlooked this for years, since it only pops up after you’ve made your crop selection and disappears after you’ve hit “Return” to make the crop.
Check “Perspective” and now move the edges of the crop box to follow the lines you want to have parallel in the final image. Once you’ve done this just hit “Return” and lo and behold, a corrected image! This image here had all the lines angled in towards the top on my film since I had to point the camera up, and after this trick they are all vertical as if I had lugged my view camera to France.
All Versions
You won’t always have enough picture left on one side or top or bottom after the tool stretches and squeezes your image. By stretching the top and squeezing the bottom I had an image that was fatter on the top and skinnier on the bottom. I had to clone some of the bottom back into the blank areas that were createdby the squeeze. An observant eye will notice that there is more fence going off to the right in the corrected image than there is in the original image. I wound up with more sky than I needed and too little dirt at the bottom.
Of course I cropped it neatly in the example you see above.
The picture I’m about to paint is of the ideal, I’m not implying that every perl programmer or 15 year kid who plays WoW all day possesses all these qualities.
1. You’re probably very smart.
2. It’s hip to be geek. Everyone is familiar with the stereotype of thick glasses, a pocket protector, an obsession with star trek, and social skills akin to a sack of potatoes. Times have changed: geeks are often fashionable, hip individuals who are very aligned with the trends of their own generation
3. You geek out on more than just your computer. Ever seen the movie collection of a film geek? Ever had an automotive geek work on your car? Ever seen the body of a fitness geek? The tenacity of someone like us, when applied to hobbies outside computers and the like, can yield impressive results.
4. Geek humor is the best humor. This is perhaps a biased opinion, but I’ve never laughed as hard as I have while reading some of the random, funny things that came out of geek culture.
5. You listen to good music. Geeks have access to tools that allow us to hear music that extends well beyond top 40 radio. Want the entire discography of Aphex Twin by tomorrow afternoon? Ask a geek. Not only do they listen to good music, they can find just about anything you’re looking for in a heartbeat.
6. You make good money. If there’s one stereotype about geeks that usually rings true, it’s that they rarely have trouble earning a decent income.
7. You fix stuff. Everyone loves a handyman, especially one that can fix one of the most frustrating devices ever conceived: a personal computer.
8. You’ve got your own stuff going on. You’ll never meet a geek who runs out of things to do, they’ve got lots of hobbies and interests and are more than happy to dive head first into one of those when they’ve got some spare time. In other words: they won’t rely on you to give them a life.
9. You’re very articulate. Compulsively reading a few hundred RSS feeds a day yields a vocabulary that could put most college English majors to shame.
10. You’re passionate. When a geek becomes interested in something, they tend to immerse themselves in it entirely. They’ll strip a new gadget down to nuts and bolts and re-build it with an xhtml compliant grappling gun. This intense passion can extend to many areas of a geek’s life, not just computers and hobbies.
10 Reasons Why “Tech Speak” Is The Best Language To Learn.
By Andrew Gonsalves “Halx” www.tfproject.org
While knowing how to speak Spanish will secure you a customer service job in Los Angeles, knowing how to speak French will make you sound sexier, and knowing how to speak Japanese will make all of your hentai games more interesting, if you know “Tech Speak,” you’re already 10 times more versatile than all those other bilingual show-offs. By Tech Speak, I don’t mean to imply that there is some secret code that you haven’t heard of before, and I certainly am not referring to any glossary of buzzwords that make you look more of a blow hard for reciting them. Tech Speak is simply the language of technology; the understanding of where the world is going and the tidbits of knowledge needed to stay adrift.
Computer programming is a job that’s heavily dependent on temporary knowledge capital. It’s temporary because the powers that be keep changing the languages and tools that programmers need to do their jobs. In nearly all other professions, knowledge capital increases as you grow older because you keep learning more about your field. But in computer programming, the old knowledge becomes completely obsolete and useless. No one cares if you know how to program in COBOL for example. It’s completely useless knowledge.
1. Open Firefox and go to the Address Bar. Type in about:config and then press Enter.
2. Right Click in the page and select New -> Boolean.
3. In the box that pops up enter config.trim_on_minimize. Press Enter.
4. Now select True and then press Enter.
5. Restart Firefox.
This little fix will move Firefox to your hard drive when you minimize it, and as a result it will take up less than 10MB of memory while minimized. So far, from my experiences with using this today, when you maximize Firefox it will obviously increase the memory usage. However, it does not seem to go back up to the insane amount that it was at before minimizing it. For example, Firefox was at 180MB of memory usage and then I minimized it and after a few seconds I maximized it. After maximizing it and continuing on my routine business it appeared to only have gone up to 60MB. This seems to be a good solution for me right now since I frequently maximize and minimize Firefox anyways.
This project aims to create an archive of user contributed clip art that can be freely used. All graphics submitted to the project should be placed into the Public Domain according to the statement by the Creative Commons.
Eh, covjek je odlicno secirao problem… ovakav clanak moze napisati samo netko tko ima podosta iskustva u IT biznisu i netko tko je radio u vise razlicitih (po tipu i opsegu) okruzenja…
Just to be clear, IT in this context means being in an IT department, not being in the IT industry.
I’ve spent a combined five years in IT departments of two companies — one a large company another a small company. In each case, the experience lacked job satisfaction and only marginally advanced my career. If you find yourself faced with a job opportunity in an IT department, consider the following to be likely experiences:
You will be frustrated because technology is not the core business. And unfortunately for you, this means that you aren’t likely to be the rockstar of your company. You are an enabler of minimal importance in a cost center.
You will deal with technology that is likely to be obsolete or on the verge of obsolescence. In IT, it is not important to those you serve what the technology is, rather its whether the solution provides the desired value.
You will integrate with old technologies or products that have challenging integration scenarios. As you are the tail on the dog, no one will ask you your opinion for the products that are most likely to integrate well with your technology stack. Rather, you will be brought in after such products have been selected.
You may find that the talent around you is watered down. The trend is to cut costs which inevitably leads to outsourcing. In my experience, outsourcing provides less talented, less instinctive colleagues. These will be your teammates.
You may find that cost cuts means there is little investment in the “factory” that you work in. Hardware and software that could make your life easier are not accessible due to budget challenges. Therefore, the factory eventually resembles an old car plant with declining efficiency.
Your managers may care only about your utilization and your costs. Innovation is secondary to these factors, so you may have trouble championing new ideas.
You may find in bigger companies that consensus-building consumes most of your time. Be ready for double-digit emails per day with people copying you on details that are irrelevant to your job.
You may find that the company has organically grown in layers causing you to fight through multiple layers just to get simple tasks done. As such, simple tasks are hard tasks and hard tasks are impossible. If you think that something as simple as opening a firewall port can’t take weeks, think again.
You may find that since the company has cut costs to the bone that you end up wearing more hats than you feel qualified to wear. You will be best prepared to succeed if you can write your own requirements, write code, write markup, develop your own styles, be your own DBA, be your own system administrator, and do your own testing. You will most likely have to build your own infrastructure enablements because those would be too costly to be purchased for you.
You may never understand the business decisions made by those who ultimately create your projects. You may question whether they know how to scorecard, perform cost-benefit analysis, or whether they even know their business. But in the end, you will have no choice but to work on their projects.
You may find that your natural curiosity for new technologies or business strategies is not appreciated or valued. Old school managers may even make fun of you for having your nose in a book reading about those “new-fangled” technologies. Be prepared to have uninspired leadership.
You may find that your colleagues eventually have become zombies. They show up every day and walk the halls, but they seem to be in an unproductive, unchanging funk. And worse, you may recognize yourself making the same transformation.
On Scott Adams’ Dilbert website, there used to be a section where readers could submit their own stories of workplace foibles. One guy wrote in to talk about how he and four of his buddies managed to take at least one day a week off each. They worked for a big company and it was easy to get lost. Besides, they covered for each other.
If it was your day off, you were the “out guy” and you didn’t have to do anything but enjoy the day. But if not, you had a work to do.
The four guys who were working each had a task. One guy would go by the office of the “out guy” two or three times a day and post a note reading “be back in 15.” Another would fill a coffee cup halfway and leave it steaming on his desk. Someone would change the programs on his computer around. The fourth would shuffle papers and what-not around his desk.
The point was, anyone who came by would just assume they’d missed the “out guy” and check back later. The guy on the website claimed they’d pulled this off for years. These guys understood one important fact: It’s more important to look busy than be busy.
Clanak o odlicnom radu koji govori o tome da i non-buying useri imaju svoju vrijednost… zapravo, njihova vrijednost moze biti i veca od buying usera… zanimljivo…
What’s the value of a customer who doesn’t buy anything? If you’re running a hot dog stand, the answer is probably “zero.” But if you’re running a two-sided market - a market, like eBay or Monster.com or AdWords or YouTube or Digg or even Second Life, that needs to attract both buyers and sellers (or content generators and content consumers) - the answer may be “a lot.” EBay, for instance, earns most of its money from its sellers, who pay the company a fee whenever they sell something through the auction site. The buyers don’t have to pay when they make their purchases. But while eBay receives no direct revenue from the buyers, the buyers nevertheless represent a crucial set of customers for the company - without buyers, there’d be no sellers and hence no business.
Nastatvak: Customer value and the network effect
The download of WordPress 2.1.1 was compromised by a cracker that added a backdoor security hole to the blog software. Creator Matt Mullenweg: “This is the kind of thing you pray never happens, but it did and now we’re dealing with it as best we can.”
There are 10 types of people in the world: those who understand binary, and those who don’t.
I’m not anti-social; I’m just not user friendly
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.
I would love to change the world, but they won’t give me the source code
ASP & ASP.Net
CGI & Perl
PHP
Jsp
Database
WebPage
Design
Server
Office
System
Network
Game
Magazine
Exam
Comic
Other
Development
Communication
Society
Business
MultiMedia
CVS, more commonly known as computer eyestrain, is due to over- or misuse of computer monitors, bad lighting and other environmental and ergonomic factors.
Stubborn, persistent, and regular physical discomfort due to one or more of these symptoms cuts your productivity sharply over time.
The National Institute for Occupational Safety and Health (NIOSH) has found that 75% of computer users surveyed “reported occasional aching or burning eyes at work,” while another “39% reported blurred vision.”
MozLab - get into Firefox - dobar dodatak za Firefox… ugh… jos samo da je vremena za poigrati se svim ovim igrackama… ugh, ugh…
MozLab is a suite of tools and libraries that help make your life easier and your time more productive as a developer of AJAX and Mozilla applications. It’s packaged as a Firefox/Thunderbird extension and released as open source. Have a look at the videos for some of the cool things you can do with it…
Aerogel is a low-density solid-state material derived from gel in which the liquid component of the gel has been replaced with gas. The result is an extremely low density solid with several remarkable properties, most notably its effectiveness as an insulator. It is nicknamed frozen smoke, solid smoke or blue smoke due to its semi-transparent nature and the way light scatters in the material; however, it feels like extruded polystyrene to the touch.
Osim u upotrebi kao odlicni toplinski i zvucni izolatori, moci ce posluziti i kao odlicna skladista energije…
Aerogels are solid substances similar to gels but where the internal liquid is replaced with air. Aerogels rank among the world’s lowest density solids. They are very porous and light, and have remarkably high internal surface area. Their microstructure and physical properties can be manipulated at the nanometer scale by selection of raw material and modification of manufacturing conditions. Aerogel products can be engineered to exhibit desired thermal, acoustic, mechanical and/or chemical properties. Aerogel materials can be produced as monoliths, thin-films, powders, or micro-spheres to respond to given application requirements.
The extremely high electrochemical surface area of ACI’s ENERGel™ carbon aerogel enables very high rates of charge and discharge. Capacitances of more than 104 F/g and energy densities of more than 325 kJ/kg have been demonstrated with carbon aerogels ultracapacitors. Additionally, power densities of up to 20 kW/kg have been achieved. This is orders of magnitude higher than what conventional capacitors offer. ACI believes that its ENERGel™ carbon aerogel is a superior option for applications such as specialized electrodes.
Slika i tekst najbolje opisuju svojstva toplinske izolacije silikatnog aerogela… “…silica aerogel can protect the human hand from the heat of a blowtorch at point blank range….“
Hmmmm… koliko god netko misli da ce mu to srezati troskove i kako je to divna stvar, treba znati da je malo rjesenja dovoljno fleksibilno za brze prilagodbe kretanjima trzista ili potrebama optimizacije poslovnih procesa… jako je lose kad top manageri odluke donose ne razmatrajuci sve parametre… jos je losije kad se takve odluke pravdaju losim softwareom - istim onim kojeg su sami izabrali…;-)
Kako god, arhitektima i developerima bi to trebao biti pokazatelj kako razvijati rjesenja, odnosno kako kasnije imati manje glavobolja kad svi prsti i sva krivica budu bili upuceni na njih…;-)
Large companies appear to be jumping en masse onto the software-as-a-service bandwagon, according to a new survey of CIOs by management consultants McKinsey & Company. The survey found that 61% of North American companies with sales over $1 billion plan to adopt one or more SaaS applications over the next year, a dramatic increase from the 38% who were planning to install SaaS apps in 2005.
Gliffy.com - zgodan online flowcharter…. skoro kao Visio… ok, ok… zato i stoji ono “skoro"…
Gliffy is easy, free, and fun!
Diagramming in your web browser without downloading additional software
Desktop application feel in a web-based diagramming solution
Add collaborators to your work and watch it grow
Link to published Gliffy drawings from your blog or wiki
Create many types of diagrams such as Flowcharts, UI wireframes, Floor plans, Network diagrams, UML diagrams, or any other simple drawing or diagram
Par linkova za BitTorrent pomoc i odgovori na najcesce postavljana pitanja…
Here’s a roundup of some of the BitTorrent related tutorials we wrote this year. Twelve tutorials in total, so there will probably be something interesting for everyone.
The Basics 1. How to Make a Torrent
Torrents are great, they are the best way to share large files with your friends, or even with people you don’t know at […]
Here’s a roundup of some of the BitTorrent related tutorials we wrote this year. Twelve tutorials in total, so there will probably be something interesting for everyone.
# The Basics
1. How to Make a Torrent
Torrents are great, they are the best way to share large files with your friends, or even with people you don’t know at all. But surprisingly enough, not many people create torrents when they need to share something.
3. How To Encrypt BitTorrent Traffic
More and more ISP’s are limiting and throttling BitTorrent traffic on their networks. By throttling BitTorrent traffic the speed of BitTorrent downloads decreases, and high speed downloads are out of the question.
# Speed Up Your BitTorrent Downloads
4. How to Optimize Your BitTorrent Download Speed
BitTorrent can be fun, as long as you get decent speeds. Not satisfied with your current speeds? These suggestions might help yo optimize your download pleasure.
6. How to Protect Your Torrent From Failing Trackers
Nothing is more frustrating than your download getting stuck. The fact that a torrent has stopped downloading can have several reasons.
# BitTorrent and RSS
7. How to Use RSS & BitTorrent to Download TV shows
Are you tired of scanning several BitTorrent sites for the latest episodes of your favorite TV show? You should definitely try using RSS feeds then. RSS and BitTorrent are a perfect match.
9. How to Use Gmail to Search Torrents
Gmail is more than a useful email service. In just a few steps you can turn it into your personal torrent search engine. And by using labels and filters you can keep your inbox clean.
# uTorrent Tips and Tricks
10. How to Run uTorrent on a USB Stick
A portable version of uTorrent may come in handy when you’re with friends, at school, or at work. It will fit perfectly on every usb-stick, iPod, mobile phone, or any other device that is recognized a “removable disk”.
11. How to Run uTorrent in Mac OS X
uTorrent is currently only available for Windows. But that doesn’t going to stop us from running it in OS X.
2006 was rich on creative, beautiful and unusual design concepts. We’ve seen a lot of whitespace, many examples of readable and usable text-design, badges, stars, rounded corners, shapes, gradients, mirror and 3D-effects - just name it. Let’s take a close look at some of the most beautiful designs we’ve seen in 2006. Some gorgeous designs are missing? Let us know - comment on this article!
Clanak o tome kako izabrati dobar free web hosting… hm, zar nije to izumrlo?
Free Web Page Hosts with No Banner Ads?
Looking for free web site hosting with no annoying pop-ups, pop-unders, buttons, banners, headers or footers? And as well as this, you’d like 99.8 percent up-time, fast servers, access to the cgi-bin for scripts, FP extensions, PHP and MySQL databases and FTP access?
We went out searching for the best “no ads” totally free site hosting space deals around. The results: disappointing, they are very few and far between. Many have come and gone, or as in the case of Bizland, quite suddenly withdrawn their free service and demanded that all their customers begin paying. We took a look at the promotional information for over 300 free web hosting companies, but then also looked at customer reviews. There was usually a major difference in opinions.
There is still a plethora of free web hosts around, but most require that you carry their advertising or offer you a limited time for the free service, usually a year. On the up side of this, many of these companies do supply quality hosting with many services in exchange for having their banners served up on your pages. We did find that many of the non-banner supported free options were hosted on very slow servers. In a number of cases, the server failed to respond at all! continue ->
We’ll be brief: Hemingway once wrote a story in just six words ("For sale: baby shoes, never worn.") and is said to have called it his best work. So we asked sci-fi, fantasy, and horror writers from the realms of books, TV, movies, and games to take a shot themselves.
Dozens of our favorite auteurs put their words to paper, and five master graphic designers took them to the drawing board. Sure, Arthur C. Clarke refused to trim his ("God said, ‘Cancel Program GENESIS.’ The universe ceased to exist."), but the rest are concise masterpieces.
Many of the developers I know have been programming since they were in junior high. Whether it was building text-based games on an Apple IIe or creating a high school football roster app in Visual Basic, it’s something they did for the challenge, for the love of learning new things and, oh yes, for the ladies. Ladies love a man who can speak BASIC to his Apple.
Code
College graduates face a sad reality when they leave the protective womb of a university and have to get their first real job. Many of my friends found jobs paying around $25k out of school, and were amazed that the starting engineering and computer science salaries were nearly double that. But the majority of the engineers in my class didn’t become engineers for the money; we did it because it touched on a deep inner yearning to tinker and impress their friends. And did I mention the ladies?
Money is a motivating factor for most of us, but assuming comparable pay, what is it that makes some companies attract and retain developers while others churn through them like toilet paper?
M42 is a site dedicated to M42 adaptator lenses. You will find here tests, from argentic to numeric cameras and oldest to newest M42 lenses.
Members described their work and the used lens. Oldies, but goldies!
I was inspired to do this project after seeing the PVC light tent posted on the MAKE blog. This light tent uses a cardboard box, and some white material (Tyvek) and allows you to take reasonable photos of products such as bottles, watches, jewlery, small objects, etc. There is lot’s of room for improvement but for the sake of 15 minutes I hope you will agree it’s pretty good
Abstract:
The traditional view in economics is that individuals respond to incentives, but absent strong incentives to the contrary selfishness prevails. Moreover, this “greed is good” approach is deemed “rational” behavior. Nevertheless, in daily interactions and in numerous laboratory studies, a high degree of cooperative behavior prevails - even among strangers. A possible explanation for the substantial amount of “irrational” behavior observed in markets (and elsewhere) is that humans are a highly social species and to an extent value what other humans think of them. This behavior can be termed trustworthiness - cooperating when someone places trust in us. I also present the cross-country evidence for environments that produce high or low trust. A number of recent experiments from my lab have demonstrated that the neuroactive hormone oxytocin facilitates trust between strangers, and appears to induce trustworthiness. In rodents, oxytocin has been associated with maternal bonding, pro-social behaviors, and in some species long-term pair bonds, but prior to the work reviewed here, the behavioral effects of oxytocin in humans had not been studied. This chapter discusses the neurobiology of positive social behaviors and how these are facilitated by oxytocin. My experiments show that positive social signals cause oxytocin to be released by the brain, producing an unconscious attachment to a stranger. I also discuss recent research that manipulates oxytocin levels, and functional brain imaging research on trust.
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Should you use CSS or (horror of horrors) tables? And what do you do when images are ‘blocked’?
HTML email - you either love it or you hate it. Some love the simplicity of text-only emails, while others praise the flexibility and good looks of HTML. But it doesn’t really matter whether you love it or hate it because sooner or later a client will ask you to design one of those ‘pretty looking email thingies’ for their own customers, and then what do you do?
* Blentwell is an ongoing document of the evolution of blended music.
* A daily link log of all of the hot mixes and beats found online.
* Blentwell’s Links is based on the online linking system Scuttle which in turn is loosely based on the del.icio.us online linking system.
There are two link sections:
1.) Blentwell Links - excellent mix links editorialized by the mysterious Mr. Blentwell.
2.) The People’s Link - get in touch with the mix link zeitgeist through the posting power of the People.
Projax stands for Prototype and Ajax.Projax is a set of Open Source PHP Classes which help you build more interactive Web Application / websites with minimal effort.Projax help you build better applications by providing easy to use API which siplifies tasks involving Ajax , Effects , DOM etc. At its core Projax is a RoR javascript helpers port for PHP. For Ajax and DOM Projax uses Prototype on client side , and for Effects like drag and drop etc it uses Script.aculo.us.
Upload, Manage and Share documents online
Epiware enables organizations to easily share information and effectively collaborate on documents in a browser-based environment.
Bring together people, content, and process
Epiware enables the creation of virtual teams by providing an online workspace for users to collaborate and exchange information in a secure, protected setting. It is intuitive and easy to use, which allows users to concentrate on what they do best rather than on trying to master an application.
With Epiware, costs can be lowered, projects can be expedited, decisions can be made in a more efficient and timely manner, changes can be executed more quickly, and errors due to miscommunications can be reduced or eliminated.
First broadcast television. Then cable television. Now, you can kill your television. Revision3 aims to prove that on-demand, distributed online content is better, faster, more effective, and better targeted to what YOU want to watch.
Tonight, September 26th, Revision3 launches their brand new website with all-new shows, all-new faces, and a few surprises that are sure to turn some heads! And all the familiar Revision3 faces are back with some new episodes, too! You might even find something new from the show that started it all! So raise your drinking glass of malt liquor and share a toast with Revision3 as we push IPTV to the next level.
Godwin’s Law (also Godwin’s Rule of Nazi Analogies) is a mainstay of Internet culture, an adage formulated by Mike Godwin in 1990. It is particularly concerned with logical fallacies such as reductio ad Hitlerum, wherein an idea is unduly dismissed or rejected on ground of it being associated with persons generally considered “evil".
The law states:
Godwin’s Law As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one.
Godwin’s Law does not dispute whether, in a particular instance, a reference or comparison to Hitler or the Nazis might be apt. It is precisely because such a reference or comparison may sometimes be appropriate, Godwin argues in his book, Cyber Rights: Defending Free Speech in the Digital Age, that hyperbolic overuse of the Hitler/Nazi comparison should be avoided, as it robs the valid comparisons of their impact.
Vezani blogovi:
No related posts
Was this article helful to you? If so, please click on the (+) [plus] sign below! It's Croatian digg ;-) Tnx!
Mozak se moze percipirati kao obicna nakupina neupotrebljivih neurona. Takvim ga smatram uvijek kad skontam da sam napisao/napravio/rekao nesto sto, zapravo, nisam i vice versa. A, mislio sam da sam vec spomenuo jedan od najboljih (meni i emotivno najdrazih) dokumentaraca koje sam gledao u zadnjih hmmmm…sto godina. Speechless… dokumentarac opisuje jedan dio mog zivota, vrijeme mog odrastanja i sazrijevanja, vrijeme pionira e-komunikacije, srcane ljubavi prema tehnologiji gdje je vecina s jednakom strascu voljela tu istu tehnologiju… mozda ne na jednak nacin (sto i nije lose), mozda ne iz istog kuta, ali s jednakom srcanoscu… eh… Evo i par slika kako su izgledali BBSovi. Ako netko ima jos kakvih screenshotova, neka salje na mail cacan-at-webart-dot-hr. Sorry, komentari ne rade jerbo mi se ne da cistiti spam.
Osim samog filma, na raspolaganju je (ili ce biti) i kompletna arhiva svih interviewa (oko pola terabajta )
Lista interviewa i extra-footagea (skupa s linkovima za skidanje) se moze naci na archive.org
Uglavnom… ovo je film koji ce tesko biti shvatljiv onima koji nisu dozivjeli BBS eru, a svi BBSeri ce se raspekmeziti od dragosti k’o male pickice… Garantirano…