8009
Confessions of a Disk Cracker: the secrets of 4am.
I host the write-ups and deprotected software (as disk images) on archive.org. They fully comply with DMCA takedown notices. They’ve never received one for anything in the 4am collection. In fact, just the opposite – I’ve had several authors find their own software and thank me for preserving it. One author even apologized for the copy protection. He understood it was a “necessary evil” at the time, but he was so glad that someone had finally bothered to cut through it. He said it was so exciting to be able to experience his own work again, for the first time in decades.

apple  apple2 
3 days ago
Sonoff S20 remote powerplugs with timer - Projects made with Blynk - Blynk
o get the S20 in flash mode, hold the red switch button down while powering it on with the programmer.

Use these arduino flash settings:

Generic ESP8266 module
Flash Mode: DOUT
Flash Frequency: 40MHz
CPU Frequency: 80MHz
Flash Size: 1M (512K SPIFFS)
Debug Port: Disabled
Debug Level: None
Reset Method: ck
Upload Speed: 115200
4 weeks ago
One Way Lighting Loop In
lue wire going to the lampholder (Neutral)
5 weeks ago
connecting former Basic volume as external drive - Synology Forum
For SHR volumes:
- before plugging the disk, open a SSH/telnet session to the NAS and login as root
- type "lvm sgscan" and take note of how many volume group are found (the messages are like "Found volume group "vg1" using metadata type lvm2")
- plug the disk via USB
- check that the disk has been detected by DSM, in the UI it should have three 'unsupported' partitions
- check e.g. with "cat /proc/mdstat" that there is no md9 listed as we'll use it to mount the external disk
- type "mdadm -A -R /dev/md9 /dev/sdq5"
- the command should return the message "mdadm: /dev/md9 has been started with 1 drive."
- SHR uses LVM so we need to discover and open the logical volume. Type "lvm vgscan" and notice that there sould be one more "Found volume group xxxx" than the first time. Take note of that volume group name, I'll suppose here it's named vg1000.
- Type "vgchange -a y vg1000". The system should answer "1 logical volume(s) in volume group "vg1000" now active"
- Now we are ready to mount the filesystem. If you want to use FileStation create a share (let's call it /volume1/from_USB ) or if you are ok with commandline, just do a "mkdir "/volume1/from_USB" )
- Type "mount /dev/vg1000/lv /volume1/from_USB"
- Done! Remember to unmount the partition before stopping the NAS or removing the USB disk
shr  synology  nas 
7 weeks ago
The Pesky PWDIS Feature In Newer SATA Specs
To sum up, for products supporting the optional SATA 3.3 power disable (PWDIS) function, the third pin (P3) of the SATA connector is now assigned as the Power Disable Control pin. If P3 is driven HIGH (2.1V-3.6V), the power to the drive circuitry will be cut. All drives with this optional feature will not power up if a legacy SATA connector is used. This is because P3 driven HIGH will prevent the drive from powering up. The easy, and not so elegant, solution is to use a 4-pin Molex to SATA connector or a power supply equipped with SATA connectors that follow the SATA 3.3 specification.

7 weeks ago
Inception Framework: Alive and Well, and Hiding Behind Proxies | Symantec Blogs
Inception is continuing to use chains of infected routers to act as proxies and mask communications between the attackers and the cloud service providers they use. Certain router manufacturers have UPnP listening on WAN as a default configuration. Akamai research has found that there are 765,000 devices vulnerable to this attack. These routers are hijacked by Inception and configured to forward traffic from one port to another host on the internet. Abuse of this service requires no custom malware to be injected on the routers and can be used at scale very easily. Inception strings chains of these routers together to create multiple proxies to hide behind.

9 weeks ago
The Rules
The fastest way you can import a table into MySQL without using raw files is the LOAD DATA syntax. Use parallelization for InnoDB for better results, and remember to tune basic parameters like your transaction log size and buffer pool. Careful programming and importing can make a >2-hour problem became a 2-minute process. You can disable temporarily some security features for extra performance
10 weeks ago
Solved: QC35 How to downgrade - Bose Community
‘a’ ‘d’ ‘v’ ‘<up arrow>’ ‘<down arrow>’.

10 weeks ago
The Computer Believes It’s God: Stephen Hawking’s Great ‘Last Week Tonight with John Oliver’ Interview
Hawking told him the story of the first question scientists asked an intelligent computer they had built: “Is there a God?” The computer replied, “There is now,” then a bolt of lightning struck the plug so it couldn’t be turned off.
11 weeks ago
Register
Device manufacturers work with Google to certify that Android devices with Google apps installed are secure and will run apps correctly. To be certified, a device must pass Android compatibility tests. If you are unable to add a Google Account on your Android device, your Android device software might not have passed Android compatibility tests, or the device manufacturer has not submitted the results to Google to seek approval. As a result, your device is uncertified. This means that your device might not be secure.

If you are a User wanting to use custom ROMs on your device, please register your device by submitting your Android ID (max. 100 devices per user):
android  rom 
12 weeks ago
REMOVING ADS FROM THE AMAZON KINDLE FIRE LOCK SCREEN (WITHOUT ROOT)
adb shell

pm clear com.amazon.kindle.kso

pm hide com.amazon.kindle.kso

exit

adb reboot
kindle 
12 weeks ago
Removing lockscreen Ads from Kindle fire HD … - Pg. 2 | Amazon Fire HD 8 and HD 10
1. Enable ADB on device & install ADB on computer
2. Connect and verify on computer that device is connected with "adb devices"
3. adb shell
4. pm clear --user 0 com.amazon.kindle.kso
5. Restart the device
12 weeks ago
PCP finance: everything you need to know about equity and why it's important | Parkers
PCP contracts don’t always leave you with equity, however. It is possible to end up with negative equity – even at the end of the contract. If you have £9,000 left to pay but the car is only worth £8,000, that would leave you with £1,000 of negative equity, so even if you gave the car back, you'd still owe £1,000.

12 weeks ago
Negative equity and why it's a problem | Car finance | The Car Expert
What people are often inclined to do is add their negative equity debt onto their new finance agreement. Some finance companies will simply not allow this, and in the aftermath of the financial crash of 2008 there was a bit of a crackdown with finance companies refusing to allow buyers to transfer negative equity from their old car to their new one.

12 weeks ago
Interchange fee - Wikipedia
For one example of how interchange functions, imagine a consumer making a $100 purchase with a credit card. For that $100 item, the retailer would get approximately $98. The remaining $2, known as the merchant discount[13] and fees, gets divided up. About $1.75 would go to the card issuing bank (defined as interchange), $0.18 would go to Visa or MasterCard association (defined as assessments), and the remaining $0.07 would go to the retailer's merchant account provider.
march 2018
IOTA Signatures, Private Keys and Address Reuse?
Based on this, any time a transaction was made with a starting value of 13, an attacker could have forged her own signature and send out a competing transaction within seconds. The value 13 is much more likely to appear than the expected chance of 1 in 27 due to the normalization.
march 2018
Tech Gone Bad - Doomworld /idgames database frontend
After exiting the Computer Station you knew the worst was up ahead. You still hadn't reached the place where the demons were coming from. The steel door shuts behind you as you realize you're there; you're at the Phobos Anomaly. Cracks from hell are all over the place as seepage from the portal invades the entire installation. Now it's time to find the portal and stop the demons from coming through. You know UAC had hundreds of scientists working at a high-tech lab somewhere in this area, and the portal must be connected to it somehow. Time to lock and load.
march 2018
« earlier      
agile amazon analysis analytics android angular apache api app apple apps archive art article articles asmr assembly automation awesome aws bdd behat berlin bestpractices bitcoin blog book books business centos cheatsheet chrome cloud code coding color comic comics computer crypto cryptography css css3 culture data database ddd debian debugging deployment design dev development devops diy dns docker doctrine documentation ebooks ec2 editor education electronics email emulation encryption engineering facebook fitness fonts food framework free game games gaming git go golang google gpg graphics hack hacking hardware health hiking history hosting howto html html5 http humor ifttt images infosec inspiration internet ios iphone java javascript jenkins jquery js json kernel kindle law learning library life linux logging mac management mapping maps minecraft mobile monitoring music mysql network networking news nginx nsa oop openbsd opensource osx patterns performance pgp philosophy photo photography php plugin politics privacy productivity programming proxy psychology puppet python rails random raspberrypi reading refactoring reference rest ruby running scalability science search security selinux server service shell soa social software ssl storage symfony sysadmin tdd tech technology testing thinkpad tips todo tool tools tor travel tutorial twitter ubuntu ui uk unix urbex vagrant varnish via:popular video videogames vim visualization walking watches web webdesign webdev wikileaks windows wordpress work zfs

Copy this bookmark:



description:


tags: