Showing posts sorted by relevance for query blog. Sort by date Show all posts
Showing posts sorted by relevance for query blog. Sort by date Show all posts

Jun 3, 2013

This Is A Sad Day For Philippine Basic Education

Only 8 members (mostly members of the Makabayan Coalition) of the Philippine House of Representatives voiced their opposition to DepEd's K to 12. With the approval of K to 12 by the House, the bill is now in front of the Senate. Judging from the overwhelming support of Congressmen, it is highly likely that the bill will likewise breeze through the Senate.


This blog shares some of the sentiments of the eight representatives of the Philippine people who opposed K to 12. Their reasons, which range from a lack of prioritization and false promises to a dearth of research evidence, are some of the important points that have been raised in this blog. 

It is therefore clear that the proposed DepEd K to 12 curriculum does not really address problems currently faced by basic education in the Philippines. Since K to 12 does not offer the solutions, this blog will continue to share information, resources and perspectives on how to improve Philippine basic education.

Sep 6, 2013

My First Post After Vacation

To all my avid guests, readers and commentators I would like to ask an apologized to all of you guys for being not able to reply all your comments, request  and inquiry. As of today this is my first post after my twenty-five (25) days vacation outside the country. As I write this post I am still in this NAIA Terminal 3 (Manila) right in this corner of Passenger Holding Area waiting for my flight bound to my hometown tomorrow morning at 5:45 AM.


Luckily I have brought my Huawei Echolife BM622i 4G WiMAX Broadband wireless modem router with me, its from Globe Telco ISP and was able to hooked to the internet with average connection. I didn't depend on the free WiFi here coz' its so slow and opted to intermittent connection. My TP-Link TL-MR3040 portable battery operated pocket wireless router  provides my wireless connectivity to my  Asus X44H lappy and to my Cherry Mobile Magnum HD smartphone. The good thing is that my Rapoo model:1620 wireless invisible optical mouse helps me navigate the web browsing and clicking it even without the mousepad I can moved it comfortably.





Here are few shots taken by my Canon DLSR Rebel T3 were I bought last December at Low Yat Plaza, I have re-sized the photos to 30% using ACDSee photo editor b'coz its too huge 4.7Mb something can take time uploading it.


An additional, there are atleast four to five 4G wireless APs of Globe Telecom here at NAIA Terminal 3 at this corner were I sit now and the RSSI is ranging from 66dBm to 120dBm depending on how your Huawei Echolife BM622i 4G WiMAX wireless broadband router orientation to get the better signal to the APs.

Hopefully guys by tomorrow onwards I can already reply all your request, comments and inquiries on this blog. Thank you for being my avid blog readers. Enjoy!

Feb 14, 2014

Fanbox

Fanbox.com is a free-access social networking website that is operated and privately owned by SMS.ac, Inc. The site offers services where users can chat, find new & old friends, back up files in a virtual desktop and share them with other users, use and create application and games. However, the site has been getting mostly negative reviews from blog sites and the end users, who often complain of receiving too many emails from the site. So fanbox stepped up to the plate and changed the user options. Now the user has control over what emails are sent or received and even have a option to opt-out of fanbox emailing anyone in their existing social network.


According to Quantcast fanbox has a estimated monthy traffic of 3.5 million people per month and 22.8 million visits per month on its site within the US. Their findings show that the site appeals more to a male audience and comes in at 375th in their US site rankings. - wikipedia

Fanbox is social blogging platform where you can earn by sharing picture,blog post and video.In this site you can add friend and fans and also invite friend to join this.This is only platform where you can write copy paste article from others blogs .When others read your post you'll get paid.

When i first join this site i didn't get enough money so i thought i am not a good writer to earn money with fanbox but i saw that there are many other way to earn like sharing photo,categorize and rating other post,launching ads etc.

Now i am earning quite impressively its really a great site for easy income.

Fanbox Legit or Scam ?

From the BBB report:
"Consumer complaints allege charges appearing on their cell phone bills for services that they did not authorize and/or were unaware of. Some consumers state that they receive a text message stating they will be charge $9.95 unless they type "stop" and reply. Some consumers are still charged even if they follow these instructions. Consumers that contact the company directly for refund of services state they have difficulty obtaining any refund. Additionally consumers allege that the company is sending out text messages to individuals in their address book making the text appear to be from them and not a company. The text indicates that the individual has sent you a slide show to view. When recipients attempt to view the slide show they are unaware that they are signing up for a service. Many consumers don't understand what service they are being billed for. The BBB attempted to contact the business regarding the pattern of complaints, but the business did not respond to the BBB's attempts."
About SMS.ac

SMS.ac Inc. is a mobile data and Internet communications company based in San Diego, California. The company (and its spinoff subsidiary FanBox) has been widely criticized for charging unrequested SMS services from consumers and for failing to respond to the complaints of users and for FanBox's e-mail activities. The company provides distribution and billing to people buying and selling digital content (video, music, and applications) through (SMS) mobile services[citation needed] and web-based applications. SMS.ac's website integrates its mobile billing technology with various social networking services like photos, videos, music, and comments. SMS.ac claims over 50 million registered users in more than 180 countries.

Jan 13, 2013

Removing Images borders and box shadow

How to remove the borders and box shadows from images on your Blogger blog.

Most of the default Blogger templates display a white border and box shadow frame around every posted image like the example below:



There are two ways to accomplish this depending on whether you want to completely remove the effects for every image or just on specific images.

Method 1:

If you want to remove the borders from all of the images on your blog, add the following code to your CSS. Design > Template Designer > Advanced > Add CSS:

1
2
3
4
5
6
7
8
9
.post-body img, .post-body .tr-caption-container, .Profile img,
.Image img, .BlogList .item-thumbnail img {
    border: 0px;
    -moz-box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    -webkit-box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    border-radius: 0px 0px 0px 0px;
    background: none;
}

Method 2:

If you want to selectively remove the borders from specific images, add this code to your CSS.

Design > Template Designer > Advanced > Add CSS:

1
2
3
4
5
6
7
8
img.noborder {
    border: 0px;
    -moz-box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    -webkit-box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    box-shadow: 0px 0px 0px rgba(0, 0, 0, .0);
    border-radius: 0px 0px 0px 0px;
    background: none;
}

Then in your post editor HTML tab, edit the img tag(s) for each of the images you want to remove the borders from by assigning them to the "noborder" class like this:

1
<img class="noborder" src="http://YOURIMAGEURL">

Nov 3, 2013

Anonymous hacks Singapore: The Straits Times newspaper (video)

Activist group Anonymous has hacked a Singapore newspaper website over internet freedom in the city-state, where government agencies are now reportedly on alert for wider cyber attacks.

The website of the pro-government Straits Times was hacked early in the day by apparent members of the group, which opposes recently introduced licensing rules for news websites in Singapore on censorship grounds.


The attackers, using the name 'Messiah', took over the blog of a Straits Times journalist, saying she had distorted 'our words and intentions' in a report on the group's threat a day earlier to 'wage war' on the Singapore government.

'We oppose any form of internet censorship among other things,' said a post on the journalist's hacked blog, which is part of the newspaper's website and has been taken offline.

The hackers urged the journalist to apologise within 48 hours 'to the citizens of Singapore for trying to mislead them'.


If she fails to apologise, 'then we expect her resignation', the hacker said in the hacked account, still visible in online caches.

'If those demands are met we will be on our way. But in the event our demands are not met in the next 48 hours, we will place you in our to do' list and next time you wont (sic) be let off this easy.'

Asian media giant Singapore Press Holdings, which publishes the newspaper, said: 'We have made a police report, and the police are investigating.'

The attack on the Straits Times followed a post on YouTube on Thursday in which a person claiming to speak for Anonymous warned the group would cause Singapore to suffer financial losses from 'aggressive cyber intrusion'.

Singapore, which has been governed by the same party for 54 years and strictly regulates the traditional media, is Southeast Asia's financial centre and hosts the regional headquarters of many global companies.

Reacting to the YouTube clip, Singapore's Infocomm Development Authority said: 'We are aware of the video, and the police are investigating into the matter.'

The Straits Times, meanwhile, said it had learned government agencies had been put on alert in Singapore following the initial threat on Thursday.

The new rules opposed by the hackers were imposed on June 1 and require annual licensing for news websites with at least 50,000 unique visitors from within Singapore every month.

Websites granted a licence must remove 'prohibited content' such as articles that undermine 'racial or religious harmony' within 24 hours of being notified by Singapore's media regulator.

Apr 22, 2013

Cheap Domain Names and Services - A Special Guide to Getting Started With Website Creation

Cheap domains are becoming increasingly available - and often come incorporated with free extras! Whether you want to register 1 name, buy many in bulk, purchase an run out domain, etc, you will be able to achieve this without spending very much money. It's important to possess a good web address these days. Even if you merely want to run a blog, you can choose an URL that's easy to remember. People will visit your blog or website more when they can remember the address.

Some registration companies, for example GoDaddy, offer additional services, such as domain move, bulk registration, international domain names, bulk domain exchanges, and a variety of hosting plans. If you're a new comer to web development, then you need to stick along with one, single site for the time being. Cheap domains start at around $5. 99 a year, and increase to around $10. 99, depending on whether you would like a.biz,.com,.net,.info,.org, or an international domain name.

While the registration process is pretty simple, you should take some time to select the name. Name selection is the most difficult facet of registration. Thousands of new websites pop up on the web every day, and the choice of a name plays a huge role in whether your site stands out. Try creating a website name that is easy to remember, relevant to the products or services you are providing, and attention grabbing.

Once the website name is registered, you should have access to tools and services that will help you create and run a website. For this cause, you must choose a registrar that provides all you need for getting started, as well as tools for expanding and upgrading your website as it grows. GoDaddy is a good option, as it provides a guide to getting began, site builder, domain locking, total DNS control, site forwarding, and so forth. Thus, not only are you going to receive cheap domain names, but everything you want to get your website going as well.

Cheap domain names are affordable for everybody. No matter what type of domain name you'll need, or what type of website you run, you will get it up and running with a web address very quickly! GoDaddy provides all the tools and support you will ever need. Check out GoDaddy promotional codes to learn ways to get the best deals possible.

Nov 20, 2013

Dissecting MyBro 4G WiMAX Green Packet DV-235T

I have been wishing to really have on my desk bench the MyBro 4G WiMAX  aka Green Packet DV-235T until then a friend whom I only knew from this blog commenter with the extend of Facebook a guy from Visayas, we chatted rarely and not that much telling about if he has the new SmartBro product whom the Telcos always promoting the "Abot Kaya MyBro" asking him if he has a disconnected device that I wanted to dissect and experiment it. Thankfully few weeks later he offered his disconnected Mybro and donated it to me send via LBC express. Luckily the CPE arrived not long ago that is why I am having it today and posting this screenshots taken by my nephew with his iPhone 5S, I was unfortunate to take the shoots with my Canon Rebel T3 that was included the last September 09 fire crisis here in our beloved City of Flowers.


By the way if you wanted to remove the cover or open up the casing of your MyBro 4G WiMAX wireless modem router Green Packet DV235T, first of all you have to lift the sticker on the left side of it that has named  "my Bro dito na tayo @ home" there are four (4) crossheaded screws for you to be able to see the internal hardware of the CPE worry not because there is no absolutely locks.


On the left photo, here you will see that there is internal antenna for WiFi because of the antenna socket, also equip with bg 802.1 only. The above heatsink that you can see is for the transceiver it has 2Tx 2Rx aka MiMo for thermal dissipation. The MediaTek CPU MT7901 series is protected and covered by metal likewise the wireless LAN section including the system memory. Obviously downside you there is a 12pin header for the console you can also use this for JTAGging the device for special purposes like downloading and uploading the customized firmware by the ISPs.


From the right photo, there are two (2) antenna socket for WiMAX signal its MiMO aka 2Tx 2Rx, the metal covered section is the RF. You can see also the NAND Flash memory of DV235T its 48pin SMD Chips. Next is the power socket it uses 12V 1.5Amp, 1 port of RJ45 for LAN and 1 port of RJ11 for VoIP to be use for analog or traditional telephone aka POTS.


As you can see on the above screenshot its Hynix H27U1G8F2BTR a 1GB NAND Flash memory Chips were the firmware of Mybro DV-235T stored. The IC is a TSOP48 package similar to BM622m and BM623 device made by Huawei only NAND flash memory programmer can read, erase, write or reflashed this SMD Chips. Unfortunately my Minipro TL866CS will not support this type of flash memory although I have TSOP48 IC socket that will fits onto it. Perhaps the Arduino via Linux the firmware can be dump with further research.

Hopefully soon I will be posting the dumpfile of Hynix H27U1G8F2BTR for my guest and blog readers/commenters to be downloaded and examine the possibility to snipped the Administrator account or the root password instead of username and password as "smart" only.

Apr 23, 2013

Flame Hijacks Microsoft Update to Spread Malware Disguised As Legit Code

Wired - It’s a scenario security researchers have long worried about, a man-in-the-middle attack that allows someone to impersonate Microsoft Update to deliver malware – disguised as legitimate Microsoft code – to unsuspecting users.

And that’s exactly what turns out to have occurred with the recent Flame cyberespionage tool that has been infecting machines primarily in the Middle East and is believed to have been crafted by a nation-state.

According to Microsoft, which has been analysing Flame, along with numerous antivirus researchers since it was publicly exposed last Monday, researchers there discovered that a component of Flame was designed to spread from one infected computer to other machines on the same network using a rogue certificate obtained via such a man-in-the-middle attack. When uninfected computers update themselves, Flame intercepts the request to Microsoft Update server and instead delivers a malicious executable to the machine that is signed with a rogue, but technically valid, Microsoft certificate.

“We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft,” Microsoft Security Response Center Senior Director Mike Reavey wrote in a blog post published Sunday.

To generate their fake certificate, the attackers exploited a vulnerability in a cryptography algorithm that Microsoft uses for enterprise customers to set up Remote Desktop service on machines. The Terminal Server Licensing Service provides certificates with the ability to sign code, which is what allowed the rogue code to be signed as if it came from Microsoft.

Microsoft has provided information to explain how the flaw occurred in its system.

Reavey notes that since Flame is a highly targeted piece of malware that is believed to have infected fewer than 1,000 machines, the immediate risk from Flame is not great. But other attackers could have been exploiting the vulnerability as well. And the fact that this vulnerability existed in the first place is what has security experts all aflame. Code that is officially signed by Microsoft is considered safe by millions of machines around the world, something that put them all at risk.

“The discovery of a bug that’s been used to circumvent Microsoft’s secure code certificate hierarchy is a major breach of trust, and it’s a big deal for every Microsoft user,” Andrew Storms, director of security operations for nCircle, told PC World. “It also underscores the delicate and problematic nature of the trust models behind every Internet transaction.”

According to Kaspersky Lab, which discovered the Flame malware about three weeks ago, the certificate is used by a component of Flame called “Gadget” to spread the malware from one infected machine to others on a network. It was the use of this rogue certificate that is believed to have allowed Flame to infect at least one fully patched Windows 7 machine, according to Alexander Gostev, chief security expert at the Lab.

Here’s how it works:

When a machine on a network attempts to connect to Microsoft’s Windows Update service, the connection gets redirected through an infected machine first, which sends a fake, malicious Windows Update to the requesting machine. The fake update claims to be code that will help display gadgets on a user’s desktop.

The fake update looks like this:

“update description=”Allows you to display gadgets on your desktop.”
displayName=”Desktop Gadget Platform” name=”WindowsGadgetPlatform”>

If the ruse works, a malicious file called WuSetupV.exe gets deposited on the machine. Since the file is signed with a fake Microsoft certificate, it appears to the user to be legitimate, and therefore the user’s machine allows the program to run on the machine without issuing a desktop warning.

The Gadget component was compiled by the attackers on Dec. 27, 2010, according to Gostev in a blog post, and was implemented in the malware about two weeks later.
The following is exactly how the process occurs: The infected machine sets up a fake server by the name “MSHOME-F3BE293C”, which hosts a script that serves a full body of the Flame malware to victim machines. This is done by the module called “Munch”.

When a victim updates itself via Windows Update, the query is intercepted and the fake update is pushed. The fake update proceeds to download the main body and infect the computer.

The interception of the query to the official Windows Update (the man-in-the-middle attack) is done by announcing the infected machine as a proxy for the domain. This is done via WPAD. To get infected, the machines do need however to have their System Proxy settings configured to “Auto”.
Microsoft has revoked the certificate and fixed the vulnerability via an update. Hopefully, the update will not be man-in-the-middled. - source

Jan 1, 2014

@Pakitong Paypal Donations, Thank You

A many many thanks to those who came to my Blog and donated for a cup of coffeebean at starbucks, I can not name you all guys or mentioned you one by one you, long live for you.


This just a few of screenshot taken recently, including last month this year 2014.



Again, I salute you all there is no reason for me to stop posting article on this little blog of your not mine. Guest readers you are all my inspiration on keep going. many many thanks!

Feb 16, 2013

SmartBro Pocket WiFi Hands On Snap


When we moved from our condo in Las Pinas to an apartment in Laguna we had our telephone line and internet (PLDT and DSL) transferred as well. We were in a two-year contract with PLDT and it will be costly if we will have it cut and apply for a new line.


For 2 weeks in November, we don't have cable, landline and internet. Local antenna can only get Qtv channel, thus we would only watch TweetBiz. And oh, Jeng loves Tim Yap is an understatement all sarcasm. It's ok not to have cable because we can always watch downloaded movies and tv series. The hardest part is not having internet. Life gets boring without internet.

One day, I got home and are house was once again a wifi zone. Jeng bought a Smart Bro Pocket Wifi!


From the name of the unit itself, you will have an idea that this is a small gadget. It's small like a mobile phone, it can fit in your pocket.

The unit itself costs P3600. During that time, there was promo where you can pay for the unit for 2 years. That will be P150 a month. Not bad! The internet cost P495 for 50 hours/month. That’s like P10/hour. You will be charged P10/30mins on the succeeding use of internet after the 50 hours. All in all, we are billed P645 per month. Internet speed is up to 2MBPS. I actually don't understand what an MBPS is. Hahaha. Jeng said 2 MBPS is already fast. But I think fast is relative. Well, for a non-techie person (Like me), as long as I can open facebook, twitter, log in into this blog and open all the other sites I usually check, that is fast. At the same time, speed varies depending on the smart signal on your location.

The unit comes with a battery similar to that of a mobile phone. Of course a charger is included when you purchase the unit. Battery lasts for about 2 to 3hours of continuous used. It can be use while you are charging it.


Once the landline and DSL was up we limit the use the pocket wifi when we are out. Jeng driving from Laguna to Marikina and vice versa, I’m using it. Dinner and coffee with friends in Tagaytay, we used it. Going to a friend’s party, we let them borrow and use it. Basically if we are not home, we bring and use it. 5 laptop and/or phone can connect all at the same time, according to smart website. Yes, I am walking wifi zone, as the radio commercial says!

We are still maintaining it today because this can be used during emergencies. Like this week, we learned that our DSL was cut off. Jeng did not pay last month's bill because we are asking for an adjustment from PLDT for the two weeks that the phone was installed but we didn't have dial tone and of course no internet. The telephone line was not cut off, it was just the internet. Weird ‘no?

Good thing we kept the pocket wifi.

This article is written by katiyay, posted by my guest blogger.

Feb 5, 2014

MS Windows Link Aggregation with LACP and NIC Teaming

Hi All!, been awhile since I posted an article and I don’t think I have ever posted one on Network Link Aggregation!! Link Aggregation is the physical combining of network links into one logical link. There are two main advantages to this practice. First is the increase throughput that you obtain by combining links, for example combining 2x 1GB links will increase your total bandwidth to 2GB.(Keep in mind this will not change your latency…) Secondly, link aggregation grants the benefits of redundancy. Imagine the setup above. If 1 of the 1GB links fails, you would still have the other 1GB link to fall back on, woot!.


Terminology:
  • Link Aggregation Group (LAG) – is the set of physical ports, connections, etc contained within a logical group.
  • EtherChannel/PortGroup/NIC Teaming – are all vendor specific terms for LAGs. The underlying protocol used is explicitly configured by the administrator.
  • Trunk – I’ve heard LAG called a Trunk before…but I don’t like calling it that. When I say trunk i think of a Trunk VLAN Link or a connection that carries multiple VLANs across it.
Protocols

Two commonly used LAG protocols used are 802.3ad LACP and PAgP .

LACP (Link Aggregation Control Protocol)
  • Negotiation –LACP PDUs are sent down each active link with the objective of finding at the other ned of the link an LACP enabled port. Once each link has negotiated that is capable of LACP, it exchanges keys which are used to prevent other unwanted ports from joining the aggregation. Keeps the ports in a LAG consistent.
  • Advantages – IEEE standard, and vendor agnostic.
PAgP (Port Aggregation Protocol)
  • Negotiation — Similar to LACP.
  • Vendor specific –PAgp is a Cisco proprietary protocol and will only work with Cisco devices. Special NICs are required as well.
  • Advantages – Let me know in the comments please…..
LAG modes
  • On – LAG is forced to form without negotiating
  • Off – No LAG will be formed, no matter what is sent to port.
  • Passive/Auto – Port will not initiate a LAG connection, but will listen for LAG negotiation packets.
  • Active/Desirable – Port will form a LAG and initiate a negotiating to the partner port, LAG will form if and only if parter port is in On or Passive mode.
Configuration

Switch Configuration

The switch I used was a Cisco 3750, you can also use this with any Switch that supports LAG or LACP (check with vendor on what they call it)

1. Console into the Switch
2. Create a Port-Channel itnerface

SW1# configure
SW1(config)# interface port-channel 200
SW1(config-if)# switchport
SW1(config-if)# switchport mode access
SW1(config-if)# exit

3. Configure each physical Link that will be part of the Port-Channel.

SW1(config)# interface GigabitEthernet 0/1
SW1(config-if)# switchport
SW1(config-if)# switchport mode access
SW1(config-if)# channel-group 200 mode active
SW1(config-if)# channel-protocol lacp
SW1(config-if)# exit

SW1(config)# interface GigabitEthernet 0/2
SW1(config-if)# switchport
SW1(config-if)# switchport mode access
SW1(config-if)# channel-group 200 mode active
SW1(config-if)# channel-protocol lacp
SW1(config-if)# exit
SW1(config)# exit

4. Double check the etherchannel for both physical lports.

SW1# show etherchannel 200 port-channel

5. Don’t forget to save!

SW1# wr me

Server Configuration

For my example I was using a HP DL380G6 which had an NIC card of HP Ethernet 1Gb 4-port 331FLR Adapter and running Windows Server 2008 R2 64-bit..

1. Install latest NIC drivers, found here. Remember I am using Windows Server 2008 R2 64-bit.
2. Install HP Network Configuration Utility, found here.


3. Open the HP Network Configuration Utility and select the NIC ports you would like to “Team”, and Click Team.


4. On the Team Properties dialog box, change the Team Type Selection to 802.3ad Dynamic with Fault Tolerance. Also name your Team Name to something appropriate like PChannel-100-toCore…


5. Click OK and OK.
6. This will create a new Network Adater.


7. Edit this new Network Adapter with the IP information that you would like.
8. Double check each Network Adapter associated with the NIC Teaming, you should see a new Protocol Adapter bound to the Network Adapter.


Limitations:
  • Each Physical Link has to be the same link speed, for example you cannot mix a 10GB link with a 1GB link to get 11GB.
  • Each Physical Link has to be connected to the same Switching Device (Can be stacked). Cannot span over separate switches. (Check out vPC!!)
Sources:

Mar 17, 2013

Fantastic Beautiful Photo of Water Drops

A photo taken by water droplets an unidentified photographer that creates the illusion that the image is being shaped woman with a beautiful ballet. It was an exciting moment, the photographer he is very lucky because they get the proper shooting.


This photo from a website I can be someone's an American citizen, because I think this is a unique and beautiful Phy therefore I am posting this blog.

And photo shots of pure high-resolution camera, and not the result of engineering technology image editing program.

To produce images shaped like a ballerina's, I do not know exactly how many times it was dropped into the water that he may get the unique and beautiful work. Because of the sources that I read there was not described in detail. It's just that there is an explanation about the photo is purely from the camera shots. I myself just got amazed to see these photos, how about you?

This article was written by jfs posted by guest blogger you can also post yours contact me!

Feb 14, 2013

Lack Of Education Leads To Compulsive Behavior

As a Nutritional Practitioner, I see a lot of clients who complain about being addicted to food. This addiction, according to them, is likened to what an alcoholic or mild drug user suffers from: compulsive eating behavior, binging, unnatural responses or actions, lying, etc. Most of this is said to be triggered by emotions, negative life events, boredom, or depression.

I agree that there are similarities with food addiction to other addictions; such as obsession with a substance to alter mood or outlook, overt or harmful behaviors, or lack of self-control. But rather than blame the substance, we have to look at what triggers the response to the condition.

Many people are on destructive (restrictive) dietary paths which result in nutrient deficiencies. Indulging in fractionated carbohydrates, junk foods, canned and boxed foods which contain either starches, sugars or simple carbohydrates, only sets up a further strong psychological drive for more of these foods. Why? Because they boost our immediate outlook through higher glucose conversion and temporary energy. But like other destructive substances, the end result is very short lived.

Refined Foods Don’t Lead To Good Health

As a society, we live for instant gratification. Rather than eating foods which give us long term energy, we desire a quick pick-me-up, even though we know the cycle has to be repeated over and over during the day, leaving us exhausted. Part of the problem is what manufacturers tell shoppers. Words such as diet, whole, goodness and so on are meaningless in light of what the food endures during processing.

In Canada, whole wheat is not “whole.” As much as 70% of the nutrients may legally be destroyed through removal of much of the kernel, which reduces shelf life. Whole wheat is not a whole grain – period. It is a product which, through loss of many of the nutrients (wheat germ and wheat germ oil), as well as bran and middlings, is now a fast absorbing energy food which spikes blood sugar. But still, our government says the end product remains good for us. In effect, manufacturers legally (yet immorally) lie to us, desiring profit more than our good health.

Educate Yourself

Much of this can be remedied by education. With the availability of the internet and more authors writing about whole food nutrition, we should be able to find proper information on the subject. However, the excuse I frequently hear is that, “I don’t have enough time.” My answer is always the same: “Do you have the time to get sick?” Because once a person is on their sickbed, they cannot earn money, nor can they enjoy the fruits of their labor. Balanced nutrition is not an option, but a necessity to “keep the ability to be busy.”

Another angle is our relationship to food. Do we understand that restricting nutrients sets us up for psychological cravings? Most diets are about weight loss, rather than good health. Authors care more for immediate results, because this brings in income. Yet most of the poor souls reading these books don’t equate their subsequent weight gain (once off the diet) with the diet itself. Diets are a sham, which is why your 20 pound weight loss ultimately results in a net 40 pound gain. This is a protective mechanism of the body to an unnatural restriction of needed substances – a sure plan for long term failure. It’s an addictive cycle: We desire the short term weight loss rather than thinking about the end result. This is somewhat like the steroid user, or the person taking diet pills. Yes, there may be immediate dramatic results, but in the end, we suffer even more.

Don’t Worry – Make Decisions!

Dietary rules also get us thinking too much about what should be an enjoyable experience. All this weighing and calculating is a drain on a pure pleasure – the enjoyment of wholesome food. We should be able to look at a food and immediately understand if it is good or bad. Has it been refined? Then there is a great chance it is not healthy. I don’t care at all about what we are told to the contrary. I have thousands of clients who have had success with this approach. It does not lead to worry about food, because it merely entails making in immediate decision. We do this daily with our jobs. If you do “fall off the wagon,” get up and try again.

Those who eat to manage compulsive behaviors or emotions need to realize that whole foods also satisfy. Sweet, salty or fatty foods may increase serotonin or stimulate dopamine receptors in the brain, giving a temporary feel good situation. But they always result in a subsequent crash. On the other hand, whole foods do the same, though not as strong in the short run. Wouldn’t you like to feel good in the long term, without getting depressed, run down, sad, or suffer anxiety? Fractionated foods WILL increase these feelings and set the person up for a vicious cycle of weight gain, ill health and and increased emotional disorders.

We Are To Blame

As a society, we are too dependent on psychological help. Everything is the fault of someone else, something or some situation. We don’t look at ourselves, our actions and our outlook on situations. Though some will define this approach as simplistic, it is because they have been taught to feel this way; are in the business of treating people affected by these situations, or profit from them.

You are not addicted to foods, and neither are you powerless over them and have to practice abstinence. We have been given a brain to use, but we don’t do so in many instances. The biggest predictor of weight gain (or ill health), is a level of self restraint. Don’t succumb to eating amnesia (unknowingly putting hand to mouth from a bag, box or plate). This is nothing more than mindless eating. Sit, relax and enjoy, but don’t stop thinking about what you are doing. You wouldn’t do it crossing the street (for fear of getting injured). Why do it through long term self poisoning?

Choose well, don’t diet, and don’t indulge in foods which injure the body. I have hundreds of articles on this blog which go into more detail about what I have written here. Read them and educate yourself about balanced nutrition.

Dec 10, 2014

EtherChannel vs LACP vs PAgP

What is EtherChannel?

EtherChannel links formed when two or more links budled together for the purposes of aggregating available bandwidth and providing a measure of physical redundancy. Without EtherChannel, only one link will be available while the rest of the links will be disabled by STP, to prevent loop.
p/s# Etherchannel is a term normally used by Cisco, other vendors might calling this with a different term such as port trunking, trunking (do not confuse with cisco’s trunk port definition), bonding, teaming, aggregation etc.


What is LACP

Standards-based negotiation protocol, known as IEEE 802.1ax Link Aggregation Control Protocol, is simply a way to dynamically build an EtherChannel. Essentially, the “active” end of the LACP group sends out special frames advertising the ability and desire to form an EtherChannel. It’s possible, and quite common, that both ends are set to an “active” state (versus a passive state). Once these frames are exchanged, and if the ports on both side agree that they support the requirements, LACP will form an EtherChannel.

What is PAgP

Cisco’s proprietary negotiation protocol before LACP is introduced and endorsed by IEEE. EtherChannel technology was invented in the early 1990s. They were later acquired by Cisco Systems in 1994. In 2000 the IEEE passed 802.3ad (LACP) which is an open standard version of EtherChannel.

EtherChannel Negotiation

An EtherChannel can be established using one of three mechanisms:
  • PAgP - Cisco’s proprietary negotiation protocol
  • LACP (IEEE 802.3ad) – Standards-based negotiation protocol
  • Static Persistence (“On”) – No negotiation protocol is used

Any of these three mechanisms will suffice for most scenarios, however the choice does deserve some consideration. PAgP, while perfectly able, should probably be disqualified as a legacy proprietary protocol unless you have a specific need for it (such as ancient hardware). That leaves LACP and “on“, both of which have a specific benefit.

PAgP/LACP Advantages over Static

a) Prevent Network Error

LACP helps protect against switching loops caused by misconfiguration; when enabled, an EtherChannel will only be formed after successful negotiation between its two ends. However, this negotiation introduces an overhead and delay in initialization. Statically configuring an EtherChannel (“on”) imposes no delay yet can cause serious problems if not properly configured at both ends.

b) Hot-Standby Ports

If you add more than the supported number of ports to an LACP port channel, it has the ability to place these extra ports into a hot-standby mode. If a failure occurs on an active port, the hot-standby port can replace it.

c) Failover

If there is a dumb device sitting in between the two end points of an EtherChannel, such as a media converter, and a single link fails, LACP will adapt by no longer sending traffic down this dead link. Static doesn’t monitor this. This is not typically the case for most vSphere environments I’ve seen, but it may be of an advantage in some scenarios.

d) Configuration Confirmation

LACP won’t form if there is an issue with either end or a problem with configuration. This helps ensure things are working properly. Static will form without any verification, so you have to make sure things are good to go.

To configure an EtherChannel using LACP negotiation, each side must be set to either active or passive; only interfaces configured in active mode will attempt to negotiate an EtherChannel. Passive interfaces merely respond to LACP requests. PAgP behaves the same, but its two modes are refered to as desirable and auto.


3750X(config-if)#channel-group 1 mode ?
  active     Enable LACP unconditionally
  auto       Enable PAgP only if a PAgP device is detected
  desirable  Enable PAgP unconditionally
  on         Enable Etherchannel only
  passive    Enable LACP only if a LACP device is detected

Conclusion

Etherchannel/port trunking/link bundling/bonding/teaming is to combine multiple network interface.
PAgP/LACP is just a protocol to form the etherchannel link. You can have etherchannel without protocol, but not advisable.

Sources:

http://en.wikipedia.org/wiki/EtherChannel
http://packetlife.net/blog/2010/jan/18/etherchannel-considerations/
http://wahlnetwork.com/2012/05/09/demystifying-lacp-vs-static-etherchannel-for-vsphere/

Mar 12, 2012

Samsung Tizen OS can run Android Apps


Tizen, the mobile operating system being developed by Samsung and Intel, can support programs written with Samsung’s Bada SDK as well as Android applications, The Handheld Blog reported. The operating system supports a program called Application Compatibility Layer (ACL), which is similar to Research in Motion’s Android player for the BlackBerry PlayBook.

Open Mobile, the company behind ACL, claims Android apps will be able to run on a Tizen-powered device with 100% compatibility and feature the same responsiveness users would expect on a native Android device.


The company hopes that the program will be integrated into smartphones and tablets by vendors and not end users. A video demonstration of Android apps running on a Tizen tablet follows below. - source

Mar 13, 2013

PC Engine ALIX 2D3 pfSense OS

With my fascination with FreeBSD and Information Security, it was only natural for me to get excited about pfSense, a “free, open source customized distribution of FreeBSD tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution.”


After testing it out, I decided to replace the anemic built-in “firewall” on my SoHo Linksys wireless router with pfSense. This would allow me to run pfSense in a production environment (even if it is just my home network) to get more familiar with it, as well as give me a robust firewall, able to do what I need for my up and coming plans to conquer the world from my home network. (More on this in another post)

So, I could run pfSense on a old box I had laying around, but I got to thinking of the electricity cost if I had this box on 24/7/365–There had to be a more efficient way to run it…

Which is when I stumbled across PC Engines, a Swiss-based engineering company that designs and manufactures hardware for embedded computer systems. After doing a bit of research, I settled on the Alix 2d3, which gave me a 500MHz AMD Geode LX800. 256 MB RAM, 2x USB ports, and 3x NICs. I started using this guy’s blog post as a guide to building my embedded PfSense firewall.

To start off with, here was my parts list:(Costs include shippping)

(And yes, I know I could have gotten the serial cable stuff cheaper)

-1x Alix 2d3 Kit (Board + Power Supply + 1GB CF card + Black Case) $201.53
-1x USB-to-serial adapter $19.94
-1x Null modem adapter (female to female) $17.13
-1x IDE to CompactFlash adapter $8.20

Grand Total (with shipping): $246.80

I went ahead and bought the Alix 2d3 kit from Netgate, and the rest of the parts from other sources. Here is a photo of everything:


After downloading the latest embedded image from pfSense.com, I needed to write the image to the CF card. Well, the main OS I run on my laptop is Vista, so I thought I would just do it from there.

Now, I didn’t buy a regular CF Reader, but a CF to PATA converter. I didn’t think this would be an issue, because I would just hook it up to my IDE to USB adapter and to my machine, like so:


Unfortunately, this did not work. The OS never even recognized that I had something plugged into the USB port. I have no idea why. So I went to plan B, and plugged it into an IDE spot on my test machine, and booted it up into FreeBSD.


FreeBSD found the card no problem, and using dd, I was able to successfully write the image to the CF card.

Next, I ran through RockPenguin’s directions of applying power to the board, and getting into the bios. I will quote his directions here, after the photo:


——-Start Quote———

-Connect one end of the null-modem cable to your computer’s serial port and the other end to the serial port on the ALIX.

-Fire up your favorite terminal emulation software such as minicom (or Hyperterminal on Windows) and use the following settings:

Baud rate: 38,400
Data: 8 bit
Parity: None
Stop: 1 bit
Flow control: None
Terminal: ANSI

-Now apply power to the ALIX. If you are connected correctly, you should start to see the ALIX BIOS text.

-While the BIOS is going through the memory test press the “s” key to enter the BIOS setup.

-If have successfully entered the BIOS setup, you should see the text with some different options. Do the following:

Press “9” to set the baud rate at 9600

Press “q” to quit the BIOS setup

Press “y” to save the settings to flash

-If you start seeing gibberish ASCI characters instead of text, then you need to set your terminal emulation software to 9600 baud instead of the 38,400 we set it at earlier.

-Now reboot the ALIX by power cycling the unit (unplug the power, plug it back in).

-With the terminal set to 9600 baud, we should see the boot-up process and if all is well it should look akin to a Free-BSD boot.

——–End Quote——–

Fortunately, my bios was already to the latest version, so I did not have to flash it like he did.

After this, I shutdown the device, and put the board into the case, and screwed everything down.


I then hooked it up to where I wanted it, and got it connected to the right cables.

Finally, I started it up again, and finished the initial pfSense configuration.

Here is the final product, hooked up, and ready to go:


Final Thoughts:

-I actually thought it was going to be alot more difficult–It only took me about 3 hours.
-You want to know what the average wattage for this bad boy is? 5 watts!

So ends my first firewall-building experience.

Dec 12, 2014

FreeNAS : How-To Setup Home File Server For Free

I download a lot of music. My wife takes a lot of digital photos. My kids also like to save music and photos. Between all of us, we have a lot of media that quickly accumulates on our home PCs. The task of sharing this media between us is a challenge. My wife didn't know how to burn data CDs and my kids didn't have a CD burner. What we needed was a home file server: A dedicated computer used storage and sharing of our files. My research found a ton of products available that would do the job. There are several dedicated Network Attached Storage (NAS) devices that I could purchase, but even the cheapest ones are still several hundred US dollars. Then there is the server software to consider. Microsoft has its Windows Storage Server software that is also several hundred US dollars. There is also many different Linux solutions that require a working knowledge of the linux file system and command line.


In the end I settled on a free product called FreeNAS. As the title suggests, FreeNAS is free network attached storage software, but that is not all. It also has numerous features that make it extremely easy to set up, manage and expand. Plus it has features that allow you to use it as a media server for various devices. Since its hardware requirement is very minimal, this seemed like an ideal product for me to use. With FreeNAS, I was able to use my old desktop PC (a Pentium 4 with 256 MB RAM), as my file server.

Installation and setup:

To set up FreeNAS as a home file server, you must make sure you have all the proper hardware first. This means you need a multiple port router, or switch to connect your file server to as well as a network cable for the server. For the actual server, you will need a PC with at least one hard drive (I started with 2) and a CD-ROM drive.

The setup process was very easy. I downloaded the FreeNAS ISO file and created a Live CD which I inserted into my old PC. If I wanted to, I could have started using it as a file server right there (by simply changing the IP address of the server), but I wanted something that I could use in the long term... something that could auto restart with no user intervention in the event of a power failure. This meant installing it to the hard drive. FreeNAS setup made this easy to do. I simply selected which hard drive to install to, and that was it. After a reboot, I had to set up the network interface. FreeNAS auto-detects which network adapter you have, so selecting it was simple. Next I had to assign an IP address. FreeNAS setup has a default address you can use if you want, but it may not work on your home network. Its best to find out your workstation's IP address (typically assigned by your ISP through DHCP) and set up your FreeNAS server on a similar address. Once this is done, you are pretty much done with working directly with that machine and can now access all your other options through the web interface, which I found very easy to use.

Setting up file shares:

This is probably the most challenging part of the entire setup, but it was still relatively easy to do. Setting up the server to share files is done in 4 steps: Adding a drive, formatting the drive, adding a mount point, then setting up the share. At first the task was a bit daunting, but after grasping the basic concept, it was really quite straight forward. When I added 2 more hard drives to my server, it was simple to configure them for file sharing and within 15 minutes, I had easily tripled my file server storage capacity.

Additional Features:

Even though storage is its primary feature, there is much more that really makes this product shine. It has the ability to support multiple network protocols, including AppleTalk, NFS, FTP, Unison, and iSCSI. It also comes bundled with many extra services like the Transmission Bittorent client, a UPnP server, iTunes server and a basic web server. This means that it is capable of more than just storage. It can be used as part of your home entertainment setup, serving your media to your Home Theater PC, PSP, iPod, or other network devices.

Conclusion:

I'm happy to say that FreeNAS does a great job storing and sharing my files. Since my initial installation of the product, I added and updated 3 hard drives on my server and the process was very easy and straight forward. FreeNAS easily recognized my new hard drives and allowed me to add and share them for storage with no problems. I use the Transmission Bittorrent client to download my media, so I am not tying up my workstation with a separate bit torrent client. If I decide later to add a Linux PC to my home network, I can simply enable the appropriate protocol on my server and have instant access to all my files. Ultimately my goal is to build a home theater PC, so when that is ready, I will already have the media server ready to serve up my media.

I heartily recommend FreeNAS if you are looking for a free (or very inexpensive) solution for a file server. You will need to know some basic technical information about your home network, like your IP address setup, and you will need to have a multiple port router or switch on your home network, but beyond that, it is relatively easy to manage and expand.

Resources:

Website: http://www.freenas.org/
Download: http://sourceforge.net/projects/freenas/files/
Installation instructions: http://www.installationwiki.org/Installing_FreeNAS
FreeNAS Blog: http://blog.freenas.org/
FreeNAS Knowledgebase: http://www.freenaskb.info/kb/
FreeNAS Support Forum: http://sourceforge.net/apps/phpbb/freenas/index.php

Sep 12, 2013

Apple iPhone fingerprint scanner will make 'biometrics' a household name

By adding a fingerprint scanner to its newest mobile phone, Apple Inc. is offering a tantalizing glimpse of a future where your favourite gadget might become a biometric pass to the workplace, mobile commerce or real-world shopping and events.


Although Apple’s executives said at Tuesday’s launch that its Touch ID technology embedded into the iPhone 5S’ home button would only provide fingerprint access to the phone and its own online stores, analysts said Apple’s embrace of such technology, called biometrics, would be key to wider adoption.

“It really propels biometrics into the mainstream,” said specialist Alan Goode, the U.K. -based managing director of research consultancy Goode Intelligence.

Jonathan Ive, Apple’s senior vice president of design, hinted of its future in a video presentation at the launch.

“Touch ID defines the next step of how you use your iPhone,” he said, “making something as important as security so effortless and so simple.”

Passwords and personal identification numbers (PINs) have long been the mainstay of access to devices, bank accounts and online services, despite their poor record. Many passwords can easily be guessed, while others can be hacked by brute-force attacks – essentially a computer program running through all possible permutations.

They also involve one too many steps for lots of users: Apple said that half of smartphone users don’t bother to password-protect their devices.

Hence the appeal of biometrics, which take something unique to the individual – a fingerprint, an iris, voice or facial features – as authentication.

Apple’s move may not have an immediate impact beyond improving the way users unlock their devices and interact with Apple services like iTunes and its App Store.

But that is itself a significant step. Apple has more than 500 million iTunes accounts. Anything that increases security and removes steps in the payment process is bound to boost online purchases.

It will also raise the comfort levels of companies supplying the content to a mobile commerce sector expected to reach $40-billion next year in the United States alone, according to Euromonitor estimates.

Users afraid of using their mobile device to make purchases online or in the real world because they fear it will be stolen or their password seen may feel liberated using a fingerprint, said Michael Chasen, CEO of SocialRadar, which is building location-based mobile applications for social networking.


For mobile commerce, he said, that could “be the missing piece.”

Beyond the web, Apple could combine the Touch ID with its existing “Passbook” app that stores coupons, tickets to events and boarding passes on an iPhone and allow event organizers and airline companies to validate those documents, said Sebastien Taveau, chief technology officer at California-based Validity Sensors, which makes sensors for other manufacturers.

“Apple wants to make deals with music and entertainment companies with very strong opinions on digital rights management,” Taveau said. The fingerprint scanner, when used in transactions with these companies, could “reassure all these industries”.

Biometric security should also appeal to enterprises nervous about allowing the personal devices of employees on the office network, analysts and industry insiders said.

“If this has been implemented right, every enterprise that enforces a password or PIN lock on the device will begin using the fingerprint sensor instead,” said Song Chuang, Singapore-based research director at Gartner.

Apple is not the first to try to make biometrics work for the consumer.

Fingerprint scanners have already found their way into laptops, external hard-drives and electronic wallets. Companies like Motorola Mobility Holdings Inc., Fujitsu Ltd. and Pantech Co. Ltd. have incorporated fingerprint scanners into their mobile phones.

But none has really taken off.

Partly, that’s because of cost and partly because there’s been little in the way of an ecosystem to build support for the products.

“Biometrics have been historically viewed as a more expensive ‘nice to have’ component, rather than a ‘must have’,” said Bill Morelli, an analyst at IHS.

Also, fingerprint scanners have tended to make things harder rather than easier for users.

Chuang at Gartner said it could take users up to six swipes for a sensor to “learn” a user’s fingerprint. “This is not a great user experience,” he said.

All things, say some, that Apple was put on this earth to fix. Ben Thompson, a Taipei-based industry observer who writes a blog at stratechery.com, said Apple was focusing on the apparently trivial problem of entering a password – but one that irked users dozens of times a day.

“It’s classic Apple to expend tremendous energy on simplifying a small irritation, even if it’s not a classic feature list item.”

The badly kept secret of Apple’s biometric plans had already given the industry a boost long before Tuesday. The company has been filing patents on biometric security since at least 2009.

“Apple has been working on it for more than two years and they have extremely competent engineers,” said Validity’s Taveau.

Apple reached out two to three years ago to Microlatch, an Australian company, to license and test its peripheral fingerprint sensors. Apple asked it to build a Bluetooth connection to the phone and accompanying software, Microlatch managing director and founder Chris Burke said, so Apple could gauge user reactions and habits, particularly in e-commerce strongholds like China.

“In their roadmap it was clear there would be fingerprint scans, so they’d plot their course, rather than just trying something,” Burke said in a phone interview.

Last year Apple also paid about $350-million for AuthenTec, a key player in fingerprint sensors and until its purchase a supplier to Samsung Electronics Co Ltd, Hewlett-Packard Co, Dell Inc, Lenovo Group Ltd and Fujitsu.

Apple’s moves have reawakened interest in the space.

Swedish biometric component maker Fingerprint Cards AB, for example, has seen its share price rise 1,400 per cent in the past year. The company predicts the industry will ship up to 100 million consumer electronic devices embedded with fingerprint scanners this year, rising to more than 1 billion in 2015 as biometrics finds its way into TV remotes, gaming consoles and cameras.

There are downsides to fingerprint technology. It is not as accurate as companies touting its benefits make it sound, and PINs and passwords can be reset or changed if someone steals them.

“Fingerprint recognition is not perfect,” said Geppy Parziale, biometrics expert and CEO of Invasivecode, a firm that develops applications for Apple’s mobile devices. Then there’s the problem of the fingerprints themselves: acquiring a large enough set of them to test the accuracy of such devices is complicated by privacy and legal issues, Parziale said.

But if anyone can bring this technology into the mainstream, experts say, it’s Apple. It has, for example, embedded the scanner into the iPhone’s home button, while other mobile devices usually have it on the back, making it awkward for the user and increasing the number of failed attempts.

Samsung and fellow South Korean electronics manufacturer LG Electronics Inc. have had problems incorporating the technology into finished products.

LG’s head of domestic marketing, Ma Chang-Min, last month said the company had abandoned efforts to include a fingerprint sensor to the back cover of its flagship G2 smartphone “as we need more work to improve reliability and usability.”

That gives Apple a headstart. It can also build the sensing and security deep into its operating system and the A7 mobile chip which Apple itself designed, putting it ahead of rivals such like Google, which develops the Android mobile OS and licenses it to manufacturers like Samsung, said Taipei-based KGI Securities analyst Ming-Chi Kuo.

But its edge may not last.

Microsoft Corp, for one, is building fingerprint recognition into the latest update of its Windows operating system and, said Taveau of Validity Sensors, “it is fair to assume that the Android community won’t be long to react.” - source