|Navigate Spew||Show Archives|
|Day to Day (232)||[RSS]|
|Squirrel Thursday (61)||[RSS]|
My education is in Computer Network Technologies. I use my free thought, when any thoughts are present, to write and produce content in a wide spectrum format flow. One day I may explain a method for accomplishing a task on a BSD operating system, or spewing about my latest Sandalwood acquisition, and other times I will keep my thoughts I put to the screen more personal and opinionated with my current gush of text in relation to my tempered mood.
BLOGS & Friends Pages
Nothing To Do With Arbroath
Nature's Gift Blog
Team FreeBSD Home
Team FreeBSD Contributors Page
Team FreeBSD Statistics
My Cache Stats
Links Visited Daily
Hack a Day
My Content and Media
Freshly Published RSS
My BOINC Statistics
Geeky, Funny & Strange
I went back in time with the help of Archive.org and took a look at one of my first, and possibly the very first, public accessible website I created, proudtux.com. The snapshot shown here from 2004-08-26 I believe is using a simple CMS I put together along with a custom forum application and a nostalgic guest book application written in PHP.
I soon after grew a distaste for the domain name and went on a journey of preponderance that ultimately led me to the domain name myspew.com in which to host content and media related to my interests and my opinions throughout these many years after and to this current day and time.
The real treasure for this morning's blast from the past is the archive of five Blog post entries linked from the proudtux.com home page. I will in short time insert these posts into the current CMS so I may look back on to it occasionally when I would like a smile.
If you have used an Android device to browse amazon.com and do not have an Amazon device linked to your account, the company is offering a $10 credit to purchase apps from the Amazon Appstore.
This offer came in the form of an e-mail from Amazon after they had tracked my use on the amazon.com website while using an Android device with Google Play Services running the show.
You will have a few weeks to use the credit given to you. Haven't received this offer though use amazon.com in a web browser on a Android device? I am sure if you send them a quick message they may be able to accommodate you. No promises from me however.
Take note that you will need to sideload Amazon's Appstore onto your Android device. They give a link to the APK along with instructions which include allowing applications from untrusted or unknown sources to be installed which may be enabled in the security section of your device's settings.
A year ago I was writing...WD TV Live (Western Digital Media Device) Specifications
This is the process for enabling the ATI Remote Wonder remote control for use with Kodi (formerly XBMC) on OpenELEC. Thank you Chris for the installation process and the key-bindings.
To load the ATI Remote Wonder keytable at startup automatically, create and edit the file autostart.sh in the configuration directory using this command: nano /storage/.config/autostart.sh Copy and paste the following, then press control-x, then y, and finally press the enter key to save the file.
ir-keytable -w /storage/.config/ati_x10
You will need to make autostart.sh executable with the command: chmod +x /storage/.config/autostart.sh For changing or tweaking the remote control codes, use the ATI Remote Wonder Codes along with the available Kodi Remote Control Codes as references. As a last note, in some instances the ATI Remote Wonder mouse actions may crash the system if used before the keytable is loaded.
A year ago I was writing...The Zend, The XCache, and The eAccelerator OPCODE Caching PHP Shared Privy
A serious vulnerability in wpa_supplicant was announced on the OSS mailing list April 22nd that involves an improper overflow check of an SSID payload during peer to peer (P2P) negotiations. It is possible to overflow up to 223 bytes with 150 bytes writable beyond the heap. Data beyond 32 octets of valid SSID information is where the overflow is sourced. Responses sent out to SSID probe requests unrelated to P2P network negotiations could also be susceptible to attack.
The threat is that an unfriendly AP may be able to both read and write to memory of a vulnerable wpa_supplicant software release. The heap overflow is able to write to two variables and a then released pointer. Minimally this could cause wpa_supplicant to crash along wtih its dependent or related processes. Code execution is also a possibility.
'Wi-Fi peer-to-peer (P2P) allows Android 4.0 (API level 14) or later devices with the appropriate hardware to connect directly to each other via Wi-Fi without an intermediate access point (Android's Wi-Fi P2P framework complies with the Wi-Fi Alliance's Wi-Fi Direct™ certification program). Using these APIs, you can discover and connect to other devices when each device supports Wi-Fi P2P, then communicate over a speedy connection across distances much longer than a Bluetooth connection. This is useful for applications that share data among users, such as a multiplayer game or a photo sharing application.' - Wi-Fi Peer-to-Peer
The open source software security [oss-security] wpa_supplicant vulnerability announcement is found in text here.
You don't need to rush out and buy a case for your new Raspberry Pi. As long as the circuitry can't be shorted by metal, just plug it in and go. If you don't care to spring for a case right away like myself, you can make a cover with the box the Pi came in to mask the clutter of wires or USB devices and also block the Pi's blinking and distracting status lights.
This is the design and cut out of the Pi's box to be used as a cover:
Here is a Raspberry Pi with connected USB devices and an ethernet cable:
Wala! Here is the zero cost Raspberry Pi cover:
A year ago I was writing...Advancing With E-CIGS