triptico.com

Un naufragio personal

Disk partitions and UDF formatting on MS Windows

Partition manager

Open cmd.exe and run

 diskmgmt.msc

Formatting a disk as UDF

 format x: /fs:UDF

Related

Using the UDF filesystem in USB sticks

The best way of using USB sticks for sharing information between Linux and MS Windows systems is to have them formatted with the UDF filesystem. On MS Windows it's fully supported (read-only on XP, though) while on Linux is much better that FAT monstrosities because permissions and owners are preserved.

To format an USB stick, use the mkudffs program:

 mkudffs -b 512 --media-type=hd /dev/{full disk device}

You also probably want to delete all partitions in the stick to avoid it being wrongly detected.

Someone said these UDF-formatted sticks also work correctly on MacOS (didn't try).

Doorway - interesante efecto óptico

Esto lo vi hace muchos años y por fin he vuelto a encontrarlo.

La siguiente imagen logra un efecto sorprendente. No es inmediato, necesitas fijar la vista en la puerta que aparece al fondo durante un rato. No tengo ni idea de cómo lo han conseguido: no parece ser un estereograma ni nada parecido. Desenfocar un poco la vista parece que favorece el efecto.

More...

Filtración 0-day: los números PIN más comunes

Recientemente se ha filtrado la lista de los números PIN más usados. Estos números son cadenas de cuatro dígitos que sirven como contraseña para teléfonos móviles, tarjetas de crédito y otros dispositivos que potencialmente contienen información sensible. Si tu número está en esta lista, se considera vulnerable y deberías cambiarlo inmediatamente.

More...

Cómo ponerle una radio normal a un Jeep KJ / Liberty / Cherokee

Hace falta lo siguiente:

  1. Un adaptador ISO para alimentación y altavoces (10,03 €)
  2. Un adaptador para la antena (7,99 $)
  3. Un adaptador/carcasa para encajar la radio (11,98 $)
  4. Una radio (35,63 €)

La radio vale cualquiera siempre que lleve doble conector ISO. Como yo no quería CDs ni mierdas, compré la más barata, que tuviera radio, tarjeta SD y USB. Ya que los Jeep llevan el reloj en la radio y la vamos a sustituir, también conviene que la radio tenga reloj.

Además de lo mencionado arriba tuve que comprar cuatro tornillos para enganchar la radio a la nueva carcasa. En casa siempre tengo un millón de tornillos pero como era de esperar no me valía ninguno.

Para cambiarla hay que seguir los pasos obvios:

  • Montar la radio en la nueva carcasa.
  • Enchufar el nº 1 y el nº 2 en la radio.
  • Quitar el cenicero de al lado de los cargadores de mechero y sacar el tornillo que hay ahí.
  • Tirar para sacar todo el frontal.
  • Sacar la radio quitando los cuatro tornillos de las esquinas (que nos valdrán luego para poner la nueva carcasa).
  • Quitar el cable de datos y el de antena.
  • Conectar el nº 2 al cable de la antena.
  • Conectar el nº 1 al cable de la radio.
  • Meter con cuidado, atornillar y volver a colocar el frontal.

La única contrapartida es que los mandos del volante ya no sirven, pero puedo sobrevivir sin ellos.

El calendario de la revolución francesa

A contar desde el equinoccio de otoño.

Mes Comienzo
vendimiario 22, 23 ó 24 de septiembre
brumario 22, 23 ó 24 de octubre
frimario 22, 22 ó 23 de noviembre
nivoso 21, 22 ó 23 de diciembre
pluvioso 20, 21 ó 22 de enero
ventoso 19, 20 ó 21 de febrero
germinal 20 ó 21 de marzo
floreal 20 ó 21 de abril
pradeal 20 ó 21 de mayo
mesidor 19 ó 20 de junio
termidor 19 ó 20 de julio
frutidor 18 ó 19 de agosto

http://es.wikipedia.org/wiki/Calendario_republicano_franc%C3%A9s

HOWTO Enter Android Engineer Mode

 *#*#3646633#*#*

BtSync

Es un bittorrent personal, que hace que puedas compartir archivos que se sincronizan en todos tus ordenadores, a la forma de Dropbox o Google Drive. Una de las diferencias es que, al no depender de una «nube» externa, no tienes ninguna limitación de espacio de almacenamiento ni nadie puede mirar lo que guardas.

Está basado en «secretos»; cada vez que se instala el programa en un equipo, pregunta si ya tienes un secreto (proporcionado por instalaciones previas) o si crea uno nuevo. Todos los equipos que compartan un secreto comparten los archivos asociados. Un secreto es sólo una cadena larga de caracteres.

No se limita a un directorio; puedes tener todos los que quieras con sus correspondientes secretos, así que puedes compartir con diferente gente diferentes directorios, incluso con permisos limitados (es decir, por ejemplo, puedes compartir conmigo tu carpeta de MP3 en modo sólo lectura, de forma que yo no pueda borrarte ni añadir nada).

Este es el secreto (sólo lectura) para mi colección de imprescindibles de música clásica, que siempre mantengo por debajo de 1GB y que cambio a menudo:

 R2FWMUHX7AX5CMJ7NZHR5PFP5FN5ICAKR

Para usarlo, instala BtSync, créate una carpeta y dile al BtSync que la añada dándole este secreto.

Existen versiones para MS Windows, Mac y Linux (no es software libre).

http://labs.bittorrent.com/experiments/sync.html

Este equipo no está ejecutando una copia de windows original

Desactivar la actualización de Windows KB971033:

  • Panel de control / programas / Programas y características, ver actualizaciones instaladas
  • Seleccionar KB971033 y desinstalar
  • Ir a Windows Update, buscar actualizaciones
  • Sobre KB971033, botón derecho y ocultar actualización

Related

HOWTO ssh persistence, redux

.ssh/ssh_config:

 Host *
 ControlMaster auto
 ControlPath ~/.ssh/%r@%h:%p
 ControlPersist 1h

Related

HOWTO install Linux from grub with an USB pendrive

I had a fucked up installation where only GRUB2 survived. The machine CD drive is broken and the BIOS is so old that it doesn't allow booting from USB.

  1. Install an ISO onto an USB drive using pendrivelinux.com.
  2. Insert the USB into the fucked linux and switch it on.
  3. On the grub> prompt, use ls (hd[tab] until you find the USB drive (most probably it's (hd1,msdos1)).
  4. Type set root=(hd1,msdos1).
  5. Type chainloader +1.
  6. Type boot.

An algorithm to play random music

Are you playing your huge music library in random mode for hours or days and fed up of listening the same fucking songs all over again, while never hearing others? So do I.

Regardless of what Steve Jobs and other morons think, their music players are fucked up, specially their shuffle functions. Music players running in random mode should keep the last time a song was played into account.

This is the algorithm to select which song to play next:

  1. Sort all songs by the last time they were played, in ascending order (never played ones fall at the beginning of the list, recently played songs fall at the end).
  2. Pick a given set from the beginning of the list (like, say, the 10% of them).
  3. Pick one song from this set at random.
  4. Get the author of this song and test if another song by the same author was played recently (like, say, the 10% of the last played songs). If it is, jump back to previous step.
  5. store current time as its playing time, and play it.

This way, new songs added to the set have the higher chance of being played soon, as they are at the top. Songs played a long time ago will follow. And the song that have just played won't be heard for a long time.

Implement this in your music players, scumbags.

Update: I've improved the algorithm by adding a step that spreads the authors.

HOWTO check passwords without sending them on the clear

There is a simple method to check for a valid secret among two parts without sending it on the clear. This note explains how.

  1. The server accepts a connection from the client and builds a random token (a text string). This string is sent to the client.
  2. The client concatenates the random token to the password and feeds the resulting string to a cryptographically-secure hashing function like, for example, sha1. The client sends the hash to the server.
  3. The server does the same operation (concatenating the random token to the password and hashing it) and compares the resulting hash with the one the client sent.
  4. If they match, the password is accepted and the connection goes on, otherwise is dropped.

This algorithm is related to the "salt" in UNIX passwords and to the Diffie-Hellman algorithm.

Example:

The server will only accept connections from clients that know that the password is seeKriT.

A connection is started. The server creates a random token and sends it to the client:

 OK 42d4df05

The client takes that, concatenates the password and feeds it to the sha1 hash engine:

 sha1("42d4df05seeKriT") = b0f3bd621ba92f5c26261d36a8ffb9cb3b7b399d

That monstrosity is sent to the server:

 b0f3bd621ba92f5c26261d36a8ffb9cb3b7b399d

The server then does the same concatenation + hashing:

 sha1("42d4df05seeKriT") = b0f3bd621ba92f5c26261d36a8ffb9cb3b7b399d

and tests for the result. As they are the same, it assumes the connection is valid and returns

 ACCPTD

or otherwise, if the hashes do not match, returns

 FCKYOU

and closes the connection.

Related

Reformatting / indenting a Cascade Style Sheet file

If you need to compare two CSS files, the freestyle formatting can drive you crazy. You can use this little Perl script to reformat / reindent them. Or if you just want a tidier file.

 #!/usr/bin/perl
 
 # Formats a CSS file from STDIN
 # Angel Ortega <angel@triptico.com>
 # Public domain
 
 my $css = join('', <STDIN>);
 $css =~ s/\s+/ /g;
 
 my $in = 0;
 
 foreach my $c (split(/(\s*\{\s*)|(\s*\}\s*)/, $css)) {
 	if ($c =~ /\{/) {
 		print " {\n";
 		$in = 1;
 	}
 	elsif ($c =~ /\}/) {
 		print "}\n";
 		$in = 0;
 	}
 	else {
 		if ($in) {
 			foreach my $sc (split(/\s*;\s*/, $c)) {
 				print "\t$sc;\n";
 			}
 		}
 		else {
 			print $c;
 		}
 	}
 }

I agree that, if comparing two CSS files is the aim, sorting the entries alphabetically would also be great; I left that as an exercise for the reader.

Distribution rights for Antichthon Universalis

It seems that Pavel has gotten permission from the source to reproduce Antichthon Universalis. He is searching for publishers like crazy, but I'm afraid they won't find the document as interesting as he does (provided that he can find anybody not on holidays these days).

He says he doesn't have the technical knowledge to do it; maybe I'll help him. Who knows, it's not impossible that I even become the editor...

There are still no words from the language teacher on the subject.

On my part, I've finished taking a look at the book itself. I'm almost sure it's a forgery like the Oera Linda, but funny to look at anyway.

Related

More on Antichthon Universalis

Pavel has sent to me some scans of Antichthon Universalis, the recently found encrypted text, and it's a rather curious document. The drawings are certainly strange and hard to understand, but what I find more surprising is the scripting:

All text is equally separated, glyph by glyph, as if it was a Chinese or Japanese text. I'm not sure if it's meant to be read horizontally or vertically.

Pavel is in contact with an old friend of him that is a linguistic scholar and had just sent him the book to have a more experienced opinion on it. It's certainly not a known script; some letters resemble Alchemical symbols, others seem deformations of the Enochian alphabet.

I'm busy these days so I had not time to dive into it yet; as soon as I have more information, I'll publish it here.

Related

New encrypted document found

My friend Pavel Kolsinki has told me about a newly found document, called Antichthon Universalis, written in a strange, unknown language or code, with glyphs similar to those in the Rohonc Codex or other traditional cryptos. It also contains some very bizarre illustrations about plants, animals and what look like very symbolic maps.

For what he tells me, I think it's more like a Codex Seraphinianus than a Voynich manuscript, but let's see. I'm looking forward to seeing some scannings he's about to send me.

Related

Rubbish Rain vs The Incident

The soon to be released, 8bit-like, retro-looking game The Incident looks pretty similar to a game I wrote for the ZX Spectrum back in the 80's, Rubbish Rain (aka Scrollisis). It can be downloaded in Z80 format from my page of ZX Spectrum programs.

It features a character trying to survive and unending cascade of objects falling from the sky. It even includes the player trying to move up/fly by becoming a bubble.

A curious case of prior art (though I'm pretty sure these people do not know my game).

Esta copia de Office no es original

Lo dirás tú. Pero cuando ocurra, hay que

  1. Cerrar el MS Office 2007,
  2. Renombrar C:\WINDOWS\system32\OGAAddin.dll a OGAAddin2.dll.

A partir de ese momento, MS Office 2007 ya es original.

Otra opción es usar OpenOffice.org, pero será como cambiar a Leatherface por Hannibal Lecter.

Related

Listing GCC Preprocessor defines

To see all preprocessor macros defined by GCC, type

 echo | gcc -E -dM -

Related