Monday, December 9, 2013

Windows Phone: Navigate Easier and Save Battery Life By Closing Persistent Screens

If you own a Windows Phone, it's likely that you understand how to properly close applications. Unfortunately, this method won't close persistent screens in the same instance of an app, as shown below.

Two screens from the app Music+Videos

Convenient, yes but at times this can be a nuisance. To make the most of your screen real estate, and save your battery you can safely backspace out of any unwanted persistent screens. Doing so will place you in the next open area of your app, while removing the previous instance. Repeat as needed for a much cleaner experience.

Friday, December 6, 2013

Oh Microsoft..



Ah, the age old conundrum: point fingers or let innovation speak for itself. In Microsoft's eyes, the former option is the better choice of action because clearly, finger pointing is mature and bolsters public trust. This concept works for politicians, so why not tech giants?

Of course, like most finger pointing the above commercial makes the assumption that ordinary people are blithering idiots. Take the tone as an example. It's smug in an "if my intelligence could be quantified in bricks, it'd be the Great Wall of China" way, with a dab of condescension. But for a company with confidence, they're very eager to talk up the viewpoint that Chromebook, in fact, has obvious as day flaws. If this product is beneath you, why go through the trouble? This commercial is the opposite of effective. In fact, it's even erroneous. A deeper look shows that Chromebook has offline apps, as well as access to Office. And just as an aside, ITunes (like all other proprietary PC to device sharing apps) sucks, with a capital S in red, size 72 font.

Finally there's this pot of gold: "Google tracks what you do so they can sell ads". As if this were more sleazy than forcing Internet Explorer, a privacy accident waiting to happen, on the public while claiming it's for our benefit. Or implementing Secure Boot. Microsoft is making money just the same, except Google's methods are public knowledge and noticeably less insidious. And in a world where transparency is scarce, who wouldn't take honesty over manipulation?

It's time Microsoft stopped approaching technology like a smear campaign and more like a showcase of creativity and talent. AMD/ATI & Intel do this. So does Android. What do these entities have in common? They revolutionised how we view CPU architecture, as well as how  eCommerce works, respectively. Microsoft can only hope to achieve goals like these. They took years to realise how insufferably broken IE was (3 links), and it'll take them years to realise business doesn't always have to be 'business'. If you must tell somebody to like your product, chances are your creation isn't worthy.

Friday, October 4, 2013

Taking Screenshots in Skyrim

Every wonder how people take those mesmerising shots within Skyrim? I did, which is why I poked around Skyrim's .ini files, which led me to these steps:

  1. Navigate to your documents folder, then my games. You should see a Skyrim folder - click it.
  2. Here, you're looking for Skyrim.ini.
  3. Within this file, you'll see a slew of categories ranging from display to water and general. We're looking for display. Insert a line break after your SD3DDevice and input bAllowScreenshot=1. In this case, 1 is a boolean where 1 signifies on and 0 signifies off. This line will allow in game screenshots through use of the print screen button. Save this document and load up Skyrim.
 You may also want to remove the HUD. To accomplish this, hit the tilde key '~' and type: tm and press enter. Hit the tilde key again to resume gameplay. When finished, hit the tilde key again but note that the console menu won't display. This is because we've disabled ALL menus. Type tm again to restore the original display.

**All screenshots will save in Skyrim's root directory (usually C:\Program Files (x86)\Steam\SteamApps\common\skyrim), i.e. the folder with SkyrimLauncher and TESV.

 Have fun!

Tuesday, October 1, 2013

Pinning Q-Dir States to the Windows Taskbar

Let's face it. Windows Explorer and productivity shouldn't be allowed in the same sentence. No, in the same paragraph. Tabbed browsing? Changing file and folder colours to better suit you? Saved tab states? Forget about it, you're with Microsoft now baby. But what we can offer is a larger memory footprint for less functionality!

Thankfully, an end to the dinosaur level features exists with programs like Q-Dir. With this program you can achieve all of the above and more. Even better, it comes in a portable version so an install is non-essential. But still, one program can't tackle all issues. One issue I've found with Q-Dir is its lack of automatic state saving. Meaning when you close the instance, you'll have to re-load all of the folders you previously had open.

But hey, I'm not going to complain any more because Q-Dir is damn good at what it does. So here's how to remedy this situation:

In Q-Dir, select file, then 'save current state at desktop item'. I'd recommend naming the file Q-Dir because who the hell remembers events done on a computer by date?
Once finished, close ALL instances of Q-Dir. Make sure it's not still lingering in your taskbar.
Next, right click on your Q-Dir taskbar icon, right click on the small shortcut for it and select properties:


 Here, you're looking for the target box. Replace the text with C:\Users\(user)\Desktop\Whatever you named file.qdr.

Now, whenever you open Q-Dir you'll be at your chosen state.

You can move this shortcut to clear up desktop space if you so wish. I used the desktop purely as an example.

Thursday, June 13, 2013

Windows Activation Error: 0x80000048

Despite being user friendly, Windows can sometimes feel like a mystery wrapped in a mystery. This is especially true for Windows activation and services. Case in point, if you've ever experienced Windows Activation Error: 0x80000048, check this out:

Even though it's not explicitly mentioned, accessing Windows' toll-free activation numbers requires two services. These services are routing and remote access and remote access connection manage. Why these two are needed to access numbers I'm not sure. But if you enable both, you'll be able to proceed with activation normally.

Wednesday, June 5, 2013

Madden '08 Custom Soundtracks

Customisable games thrive even years after their release date for good reason: gamers can make the game their own rather than buy expansions. It's literally the difference between being how to enjoy the game and enjoying the game on your own terms. And who likes to be told? I for one, don't. In that spirit, I'd like to share a simple method for editing Madden '08 (PC only) soundtracks.

  1. First, navigate to your Madden 08 settings folder. You can find this located in My Documents/Madden 2008. Once here, you'll need to locate your madden.ini file. This is a settings file that contains various graphical and general in game options.
  2. Search for MP3. This search will return multiple results but the important one is MP3 Path string. Make sure it is set to C:\Users\Username\Documents\Madden NFL 08\Music.
  3. Grab any mp3 files and place them in the above directory. Make sure the files aren't blocked by pressing ctrl + a -> properties. If any files are locked, 'unblock' will be listed at the bottom of this screen.
  4. You're not home free just yet. The final step involves ensuring each track is using id3v1/id3v2 tags. To ensure only these tags are in use, I recommend downloading Foobar 2k. Foobar is a media player but to my knowledge, it's the only program with a tagging system that actually works. Besides, you may thank me later.
    Anyway, with your desired files in Foobar you'll want to select all tracks (ctrl + a), right click and select mp3 tag types. Make sure check boxes are either in id3v1 or id3v2. A coloured box indicates that only some files use these systems. You can also edit track data by selecting properties from the context menu.
  5.  Before opening your game, copy your music directory location. Once in Madden, click menu (bottom right hand corner) -> settings -> system settings. Delete the provided audio directory and press ctrl + v. Now you can enjoy Madden alongside your favourite music. :)

Thursday, May 30, 2013

Just showing off


Hot off the press. I just received my first certificate of accomplishment for an online course. :) Will this statement of accomplishment alone land me an IT job? Probably not but as any good techie knows, knowledge is crucial. This just goes to show that if you want the experience without breaking the bank, it can be found.
I had a lot of fun taking this course and I would recommend this professor (Charles Severance if the text is difficult to read) to anybody with time and an interest in computers.

Sunday, May 19, 2013

What kind of graphics card do I need?

Removing an HDD - Dell Optiplex

If  you ask any budget PC buyer about the most difficult aspect of PC shopping, they'll tell you  that searching for good deals ranks near the top. Many sites have bare bone kits, combo deals where one can get a processor and an SSD; motherboard and an HDD. The list is endless. Unfortunately for me, I'm stuck dealing with this because the LCD screen on my laptop busted. Buying an LCD replacement may be the more viable short term option but not so viable when you consider the shelf life of frequently used laptops.

In any case, because of my budget I'm forced to improvise a little. Then it hit me: I don't have to fork over money for an HDD or even an optical drive. Great idea. It's amazing how valuable those old, dust collecting computers can be. So I dug out the old Optiplex computer. Unfortunately for me, Dell isn't a manufacturer I'm familiar with so I was unsure how to remove the HDD. After 10 minutes of good ol' elbow grease and hard thinking I found that the solution was easy as pie (man do I feel dumb). Here is how to accomplish this:

First, disconnect the PC and remove the power outlet. Just because your pc is off, doesn't mean it isn't drawing some power. Lastly, pull the flip-out security lever on the back of the case to eject the left side.

Now the nitty gritty begins. (I recommend disconnecting all SATA and power connectors to your drives). You should see a blue tab on top of the drive bays. Pull it up, then push the optical and floppy drives back (just poke your fingers through the slots).

Once those drives are out of the case, you now have access to your HDD. The last step is simply to push in on the wings on your HDD's side and push it toward the PSU.

Walla. Your HDD is now free. Just be sure to put it in an anti-static bag if you plan to use it again.

Friday, April 5, 2013

Firefox 20: What's new? (or not new)

With the release of Firefox 20, there are a few noticeable physical changes. Of the few, there's the Safari like download manager and per window private browsing. (See below)


Download manager
 


Per window private browsing


Users will also be happy to know that Firefox now allows troublesome plugins to be closed, without the browser hanging. This essentially eliminates the need to open multiple processes for each tab (Chrome).

So there you have it: Firefoxes' changelog (for the average user) in a nutshell. But something strikes me as unsettling and it's a trend I've noticed since Firefox botched its 'don't warn on multiple tab closings' option. And that trend is blockheadedness. Private browsing has been a mainstay in Firefox but it has yet to implement per tab private and normal browsing a la Opera.

Ponder this for a moment: You're unusually busy, clicking away at multiple tabs when you realise your spouses' birth is nearing. You want to buy him/her something special, and preferably online. The trouble is you share the same computer. So in your haste, you drop your work and open a new private window. But because you have so many tabs open, this private window takes a country minute to open. But you don't want to minimise it since you're swamped and may forget. Not to mention it's slightly inconvenient to restore your other window since you have to minimise your private browsing session. You wish there were another, less painful way..

Situations like this happen all the time. And even if its not so dramatic, the point remains the same: organisation is crucial. It can be the difference between time saving and time wasting. Per window private browsing takes an extremely archaic route to this. In fact, I think I can hear users of Mosaic laughing at this. The only real difference is Firefox no longer has to record your current session, then close it before opening a private session.

This is a much needed improvement but still, get it together Firefox..

Saturday, March 23, 2013

4 Easy Ways to Conceal Your Personal Identity Online

This morning, I booted up my email client and received an email from Yahoo services. So I open up the email and something caught my eye: "We detected a login attempt with a valid password to your Yahoo." Wow, sounds legitimate. I didn't authorise this! But in my panic, I missed a small yet painfully obvious detail. The email was addressed to Mark. This got me thinking: how much information does the average person put out on the internet? Probably a metric ton.

But its when you examine the internet's many issues like session key hijacking, the infamous and amazingly complex Flame worm and seemingly legitimate but malicious emails, better known as phishing when you realise looking at the web with rose colored glasses is dangerous. With a click of a button, a data miner could have the information he/she needs to assume your identity; all because one of your accounts included some telling information.

This just begs a recurring question: what can I do? The answer is simple: don't treat the 'net like a private conversation with a close friend. For instance, it's probably not good practice to detail to Rachel (who could be Steve, a guy with latent stalker issues) from Uptown Lobby chat on Yahoo your amazing home and surroundings in Shreveport, Louisiana. Now, you may think it silly that I mention this but think about it. You can't know what's out there or even what makes people tick.

Now, I'm not suggesting tin foil hats. Let's not assume evil lurkers are watching over your every email like a lion eyeing its dinner. Well, that is unless you enjoy being Alex Jones. Just be sure to tone down the end of world conspiracies; we've heard all of them before and they were far more interesting. If this doesn't sound enjoyable, read on:

  1. Create email accounts for business and leisure. Don't intermix the two and don't hand out your business email to sites like snagajob or monster or your next door neighbor. Why not snagajob? Because it's an unfortunate fact that sometimes, scammers get ahold of email addresses and pester people.
  2. Although I may get e-slapped by many email service workers, you should lie about details on your leisure email address(es). Browse Google maps for an address hundreds of miles away and use it along with its time zone; make up a name but nothing so silly. Hint: Ronald McDonald is funny and possibly a good deterrent for that reason but what about somebody who hates Ronald with a fiery passion? Now you're screwed.
  3. Use screen names names that lack a connection to your personal life. A screen name can say a lot about an individual. After all, screen names need to be remembered and what better way to do that than by filling it with things you enjoy? Interests and names can easily be searched for and linked to social websites you may have signed up for.
  4. If you do have a social networking account, disable email searching. This will prevent the public from finding you with an email address. In Facebook this can be found by clicking the gear in the top right hand corner and selecting privacy settings.
     

Wednesday, March 13, 2013

Laconic, But Not Clear

Language seems to be a lost art in the world of computing, as evidenced by my earlier Firefox post. Maybe issues like these can be chalked up to laziness, or even a lack of understanding. Whatever the case, the technology culture has its downright ditzy moments.

One such case exists in PAVU. That stands for Pulse Audio Volume Control. Essentially, PAVU is a tool for managing devices on the Pulse Audio Server. Not exactly something many can afford to screw with, since sound in Linux still is shaky at best. That is unless you enjoy spending hours fiddling with your system just to have basic functionality. I for one, don't. But just yesterday, I joined the crowd.

My situation started like this: I plugged in a secondary webcam with a built-in microphone, which I planned to use over my laptop's on-board microphone. But I soon noticed that muting one device forced the other to mute as well. What's the deal, I thought. Up until that point, I hadn't experienced this problem. Twenty frustration filled minutes later, I was still without an answer. As it turns out, PAVU has a poorly worded option within input devices. You must and I repeat must set your preferred device as the fallback (green arrow, see below). One would assume it'd mean a back-up device. But in my case it wasn't. Fallback had to be switched on for my external mic.


Notice the partially grey button next to the HP Webcam? This tells you that the device is set as the fallback.  If ever you experience a similar issue, now you know the culprit.

Lesson: Concise clearness is crucial in programs.

Use Microsoft Themes In Linux

If you've ever visited the themes section of Microsoft.com, you may have noticed that all themes use the .themepack format. Although this format was designed with Windows in mind, you can easily work with them in Linux.

To do this, you'll need an archive manager. Personally, I recommend 7zip but you can use *nixes' built in decompressor (file roller on Ubuntu) if you don't want a hands on experience.  (*see 7zip installation instructions below if new to Linux, then continue from this line) Once that's squared away, download any theme. Finally, depending on your choice of decompression:

For File Roller or any other archive manager:

Simply right click your theme and choose extract here.

7zip:

Enter 7z x AfricanWildlife.themepack in a terminal.

Once extracted, navigate to the newly created folder then click DesktopBackground. All images within your theme will be located here.



Installing 7zip
If you're stuck on the installation procedure, there are two ways to install (assuming you use a debian based distro like Ubuntu, or Debian.) One is to install the .deb package linked above. This .deb package allows programs to be installed just like they would be on Windows. Cool, huh?

The other way is more hands on, but not at all difficult. I'll outline the procedure:

  1. Download the 7zip source code. This is the meat and potatoes behind any program: the code! Save this to a directory you have full access to, such as the Downloads folder.
  2. Now, open up a terminal either by pressing ctrl, alt, t on your keyboard or searching your Unity Dash or menu. If looking in a menu, check under Administrator.
  3. Navigate to the directory containing your source with: cd Downloads
  4. Now comes the fun. Since we're working with a .bz2 file, we want to extract it with this syntax using built in functionality: tar xvjf p7zip_9.20.1_x86_linux_bin.tar.bz2. For .gz, you'd switch xvjf with xvzf.

    Here is a cheat sheet for the seemingly random letters:
    x  = extract file
    v = verbose output, tells you which files are extracted
    j = switch for bzip files
    z = switch for gzip files
    f = read from file

    Other than the j, z and f switches you can use any other option, but I recommended the previous letters just to be safe. Once entered, you'll notice text scrolling at blinding speed. This is the extraction process. Now..
  5. Navigate to the extracted directory: cd p7zip_9.20.1. Once here type ./configure. This command will scan for app and system specific dependencies and create a makefile. This makefile is used for creating our installer (our binary). If this process exits without error (displayed with multiple asterisks. You can't miss them.) you're free to move on to the next step.
  6. To create our binary, we simply type make. Once this process is complete, type make install.
You've just compiled your first program from source. Not so intimidating, is it?

Further information: Extracting gz and bz files with 7zip
With 7zip we actually need to input two commands (using the 7zip source as our file): 7z x p7zip_9.20.1_x86_linux_bin.tar.bz2 and 7z x p7zip_9.20.1_x86_linux_bin.tar, respectively. The difference here is the extensions, bz2 and tar. First, 7zip will uncompress the files, dealing only with the first layer, .bz2. The second command will then extract the files to a directory. This differs from the built in tar command in that Linux will automatically (and conveniently) run the extraction after reading the files. 7zip is slightly less elegant but certainly not obnoxious to work with.

Tuesday, March 12, 2013

Quick Share: Disable Global Menu In Unity

So you've just installed Ubuntu, and you notice quirks like this:

Global Menu, i.e. Menu in Taskbar


Rather than the usual..

 Without Global Menu

But getting around is a nuisance, so you want to man the harpoons at once. How do you accomplish this? If you prefer menus to display on apps (pictured below), check here.

Yet another slightly hidden, but managable setting.

Saturday, March 2, 2013

Getting Your Feet Wet With Python



Many programmers parrot the phrase, "the best way to learn a computer language is by diving in". But it wasn't until recently that I fully understood the importance of this. You see, unlike spoken languages there is no real starting point. With a spoken language you can learn an alphabet and maybe some fancy words to impress your friends with. But chances are, using these methods as a starting point will confuse the average person when they take syntax and language logic into account (oddities of the English language, anyone?). With programming you can watch tutorials, examine code and experiment before you even learn to print "Hello world!" to a console window.  Not only does this allow one to pick up on concepts, it also enhances understanding of the logic within languages and computers in general. All without the tediousness of learning spoken languages. How cool is that?

Today I want to detail a concept within Python: that of Date time. But first, let's examine how to use this functionality. Otherwise you'll be cursing at me for not explaining it.
To use datetime, we simply use:

We're importing module datetime from a class called datetime. Easy enough, right? Now we can work with it..

So we've assigned the variable todaysDate to datetime.now(). We could run this program as is but let's assume for a minute you're picky. You want the standard m/d/yyyy format. How do you accomplish this? Enter concatenation. Concate-what, you say? Concatenation is just a fancy word for combining two strings --> ("I'd give my " + 'left arm to be ambidextrous').

Quick tip: Note the usage of ' and ". If ever your shell returns a syntax error because you've used an apostrophe in a string, use double quotes around the string. Or you can insert half quotes around the character. Either way is correct, but double quotes allow for easier reading.

Ok, great. So we've discovered concatenation. Hey, this is easy! Mission accomplished! Not so fast. Because concatenation only works with strings, we need to do what's called explicit type conversion. Explicit type conversion means what it says. In this case: we convert our integers to a string in order to concatenate them. Accomplishing this is relatively simple. We just use the str(x) syntax, where x is our method.

Now we know about combining two strings and we know about type conversation. How do we piece the two together? We just take each individual piece of our date (month/day/year) and write them within our string conversion:

Notice that we're adding the variable todaysDate to our method and that we're concatenating our /'s separately. If we don't do these separately, our IDE throws a syntax error. Another important point to remember is that only our /'s are commented out. This is because it's seen as a division operator otherwise. We want a literal, so we use quotations (or half quotes).

End result:

Now you have a feel for not only how to invoke classes but also how to call them, convert input to a string and format them using concatenation.

We can even expand on this by subtracting dates:

If the above sounds confusing (and it can be), let's demystify this puppy:

  • We open with str(), which explicitly converts any input within to a string.
  • Our next set of parenthesis (date closes after date.today(). The parenthesis on date.today allow it to be called on. Without it Python tells us, "Well hold on just a minute there, sucka. I don't know what you're talking about". (Okay, not really)
  • .days takes the sum of birthday - date.today() and displays it strictly in days. Then our  str() function closes.
 Walla! You now have a simple program that can subtract two dates and display the remainder.

Final note: The order in which statements are executed depends on their placement. Try running this program without tabbing either of the print lines.
Think of the print statements in this scenario as being hidden. The only way they can be accessed is if the conditions above them are met. This allows for better readability (and who wouldn't want that?).

Tuesday, February 26, 2013

When Language Fails

How offended would you be if you pointed out a flaw in someone's program, only to be ignored? I imagine most would be irked. And why not? Every user has concerns, both big and small. An apathetic attitude towards improvement only breeds distrust.

Recently, I started following a particular bug on Mozilla's very on bugzilla.com. Bugzilla is a site that allows Firefoxes' userbase to report and track bugs. It's a great way to get the community involved and learn something new. Anyway, the bug I was tracking was one dealing with warnings  being displayed when closing multiple tabs:



One would assume that when unselected, users won't be warned when attempting to close multiple tabs. Not in Firefoxes' world. After several complaints and crystal clear explanations, a member of Firefoxes' team closed the bug as fixed. Whoa, whoa, whoa. Apparently Firefox team members live on some planet where every word means the opposite (haha, great joke guys... Wait, that was a joke, right?). Whatever. Here was his/her reasoning:


....






To make matters worse, the general consensus is that an option to disable the warnings should be implemented into the 'warning dialog'. Memory seems to have eluded some people, because for 17 versions this preference worked just you'd assume it would. Besides, what's so difficult about saving those precious tabs by selecting the option? Seems clear to me. No end user should have to resort to back end fixes here. I should also mention that this bug has been known since mid-2012. But rather than complain any more, there is a (lesser known) but stable fix that I want to share (well, it's listed in the above screenshot but I'll tell you how to do it).

What we're going to do is create a boolean. A boolean is just a fancy way of saying a true or false statement.
  • First, enter about:config in your URL bar.
  • Right click anywhere in about:config and select new --> boolean. (you may want to open up a notepad somewhere away from Firefox before hand)
  • In the text box, type these one by one and set their values to false:
    browser.tabs.warnOnCloseOtherTabs
    browser.tabs.warnOnClose
Give it a try! This should hold you over until Firefox decides to get their act together.

Wednesday, February 20, 2013

Securing Sudo: Take Advice With A Grain of Salt



Adopting new security procedures in Linux based on online advice can be like conversing with a bipolar person; you never know what you're going to get and sometimes you'll do something that you'll spend hours trying to figure out (no disrespect to those affected by bipolar disorder).

For instance, I was doing my daily browse through Google and I came across an interesting concept on Ubuntu's forums. The concept was that of securing "sudo". If you're new to Linux, sudo is a command that allows users to access files with the permissions of other users. The most obvious use for this is editing root files (like u ncomplicated f irewall w all settings). So being the curious person that I am, I delved deeper and found this:

“sudo” allows you to run a single command as a different users, usually root. If , for example, you take a glance at the Ubuntu community forums, you’ll see the place crowded with commands like “sudo aptitude install kubuntu-desktop”. “sudo” then prompts you for a password. Unforunately this password is the password or your current user! So if your account gets compromised, so does every other account on that computer. The only other security measure is the file “/etc/sudoers” (on Mac “/private/etc/sudoers”) which contains a list of every user allowed to use “sudo” and a list of options.
While “sudo” prompts you for your own password “su” will asl for the password of the user you want to become (the default is again root). This of course is much more secure. The drawback is, that by using the “su” command, you will become that user for as long as you wish which is again rather unsafe.
The trick
But it wouldn’t be Unix of you couldn’t change that! So here is whate we are going to do:
“visudo”
Look for a line beginning with “Defaults”, like “Defaults    env_reset”
Below that line add “Defaults    targetpw”
Save and quit
From now on “sudo” will ask you for the password of the target user by that combining the strengths of both “sudo” and “su”!
 source

Ok, sounds good. This person is telling me how to add a layer to my security. What's the issue? Well, you could start with the fact that he/she makes the assumption that the reader knows that this process will enable the root account (disabled by default in distro's like Ubuntu). There's also the awful assumption that the user has set a root password. Not setting a root password means 0 root access when logged in. Zip, zilch, nada. What can the reader do? Probably, most will complain. After all, screwing up the sudoers file can break a number of processes, including updates and daemons like the aforementioned ufw (what happens if firewall rules are breaking your connection?). This should have been noted. Not just to make it easier, but because it's common practice. But don't panic because the fix is relatively simple.

Keep in mind the theory behind disabling the root account: Disabling the root account = one less account to worry about. It's simple. Plus, if an attacker is smart they'll find a way to compromise your root account anyway. On the contrary, setting a password MAY buy you extra time in order to combat the problem. So the argument has two sides. If you feel comfortable enabling root, read on.

First, in order to change the root password we want to attain root level privileges. So open a terminal and type "sudo su".

Next, we want to set our root password. The theory remains the same: If our default password (i.e. the one you set on YOUR account) is compromised, an attacker can pwn us into oblivion. So we want to type:


Type your password twice and you're good to go. But please, and I can't stress this enough. Make sure your password is easy to remember and do not write it down!
If you encounter any authentication token errors, type this:


So now we have a root password, which was the whole battle. Using the above article, we can finally reference the password. But let's assume for a moment you followed the article (shame on you :[). What would happen? You wouldn't have root privileges. It's as simple as that. But luckily for us, there's another fix:

If you have root privileges in a terminal, don't exit! You can skip the optional step below.

(optional) Via your GRUB or Lilo menu, select recovery mode. Usually, the option will be prefaced with your kernel version, with (recovery mode) at the end. Once in recovery mood, select drop to root shell. (aha, root privileges)

Regardless of the above step, we want a backup of our current sudoers file:

Now that our backup is created, we can simply type:


 4.) Remove the line Defaults targetpw, hit ctrl x, y and enter. We can now follow the above article. And perhaps more importantly, you won't have to reinstall. :)

The takeaway: Don't trust all procedures, especially when they have the potential to break other (core) procedures. Know what you're doing and why. If answering any of these is impossible, it's best to research what you can't answer.

    Saturday, February 16, 2013

    The digital world.. Simplified

    It is my ambition to say in ten sentences what others say in a whole book.
    ― Friedrich Nietzsche

    If the situation presented itself, how would you explain a topic like buffer overflows to your Grandmother? You could wing it but chances are she'd shoot you a perplexed look and ask if you've been smoking the whacky tobacky. Touché. You may say in your head, "Ah, to hell with it. If people can't understand, it's because they're too stupid." Not so fast. It's an inescapable fact that everyone learns differently. And do I need to mention that the attention span has major flaws? Not even presidents are immune to them.

    In this blog, I will be documenting and writing about any and all things technology, from troubleshooting computers to phone updates, with the occasional blurb about your humble author. But in doing so, I will write as clearly and concisely as possible. Lasting knowledge begins with simplified explanations and small steps, not leaps. Besides, I think we can all agree that 3 page articles littered with obscure jargon are about as exciting as filling in your name on OpScan sheets.