Wednesday , 15 May 2024
Home 4 John Black (page 33)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

Manage iPod From A Linux Desktop With Amarok

This article shows how you can use an iPod on a Linux desktop with Amarok. It covers how you can upload MP3 files from your desktop to your iPod, download MP3 files from your iPod to your desktop, and how you can delete files on the iPod. Normally, Apple’s iTunes software is needed to manage an iPod, but iTunes is not available for Linux. Fortunately, there are Linux alternatives such as Amarok that can handle the task. I do not issue any guarantee that this will work for you! Preliminary Note I have tested this with an iPod nano on a PCLinuxOS 2007 desktop where Amarok is installed by default. If Amarok isn’t installed on your desktop, install it using your distribution’s package manager. The usage of Amarok is the same, regardless of the distribution. Plug In Your iPod First plug in your iPod into your desktop system using the …

Read More »

Now Here, No Where

Membandingkan pandangan orang yang pesimis dan yang optimis. Yang pesimis mengatakan OPPORTUNITY IS NO WHERE, tidak ada peluang di mana pun. Sedang orang optimis selalu mengatakan OPPORTUNITY IS NOW HERE, peluang itu saat ini ada di sini. No where(tidak ada di mana pun) dan now here (sekarang ada di sini) jumlah dan urutan hurufnya sama persis. Hanya saja letak huruf “w” yang menyatu dengan kata yang di depan atau yang menyatu dengan kata yang di belakanglah yang membedakan artinya. Itu jelas berarti bahwa sudut pandang seseorang lah yang memastikan bahwa peluang, atau kesempatan, itu tidak ada di mana-mana, atau memang ada di sini. Toh bentuk peluangnya sama, tempat dan situasi yang dihadapi juga sama – hanya yang cukup jeli dan punya pengharapan (= optimis) dapat mengenalinya sebagai peluang yang harus ditangkap dan digarap, sedang yang lain tidak melihatnya sama sekali. Begitu peluang sudah berada di dalam dekapan kita, kita tetap …

Read More »

The reasons to fight spam on Yahoo! Messenger

I came across a disturbing story on Yahoo! News last week called “Confessions of a former spammer”. It detailed the practices of a former email spammer named “Ed” who earned a as much as $15,000 per week sending emails that promoted pills, porn and casinos. Like any good opportunist, Ed has written a book about his exploits. But just a read of the news story will give you a feel for what it’s like to work in this seedy sector of the internet. Read the full story Once my nausea subsided, reading the article got me to thinking about our own spam challenges. While we have powerful anti-spam protections in place on the Yahoo! network and in Messenger specifically, the ultimate spam protection comes from our millions of users who take the time to report unwanted messages. It’s vital that when you encounter spam on Yahoo! Messenger, you take the …

Read More »

Who you gonna call

Microsoft offers no-charge phone support for virus and spyware problems, and for other security-related questions for consumers. Before you call, make sure to take these four steps to help protect your computer: 1. Keep your firewall turned on. 2. Keep your operating system up-to-date. 3. Useantivirus software. 4. Use antispyware software. If you’re unsure if your antivirus software or anti-spyware software is up to date, you can get a free scan of your computer at the Windows Live OneCare Safety Center at http://onecare.live.com/scan, if you’re still having trouble, you can call: 1-866-PCSafety or 1-866-727-2338 Support engineers are available 24 hours a day for the U.S. and Canada. For phone numbers outside of the U.S. and Canada, select your region Note: Do not call with the same phone line that you use to connect to the Internet. You might have to connect to the Internet while you’re on the phone with …

Read More »

Safari exploit gives hackers full control over iPhones

Researchers just unveiled a pretty serious security vulnerability in the iPhone. More specifically, it’s Apple’s Safari web browser which exhibits the vulnerability. Researchers at Independent Security Evaluators have used the vulnerability to take malicious control of the iPhone from rogue websites loaded with the exploit. Once in, researchers have full administrative access over the phone allowing them to listen in on room audio or snatch the SMS log, address book, call history, email passwords and more — we’re talking full access to your phone. Researchers note that the only way to stay safe is to check those URLs and only visit sites that you trust (which isn’t very reassuring) and “may or may not be exploitable” from Mac and PC versions of Safari — the same vulnerability exists only they haven’t written the proof-of-concept exploit to test it yet. Apple has been notified of the vulnerability and a proposed fix …

Read More »

Blogger’s Choice Awards

The Blogger’s Choice Awards! which blogs are currently making an impact in the blogosphere. The blogs you see are all nominated and voted on by users like yourself! Not only can you nominate your favorite blogs within a slew of unique categories but you can also vote and comment on others that have already been submitted. In turn, others can also vote and comment on the blogs you’ve nominated. Votes will be displayed on the site in real-time, so you can see who’s leading within each category at any moment! The voting for Blogger’s Choice Awards 2007 will end at 11:55pm on October 19. Winners in each respective category will be recognized at a one-of-a-kind awards ceremony on November 10, 2007, at PostieCon in Las Vegas, NV. After the ceremony, the results will be posted here at BloggersChoiceAwards.com. You may nominate and vote for as many blogs as you want, as long …

Read More »

iPhone Independence Day

Jon Lech Johansen’s found a way to activate a brand new unactivated iPhone without giving any of your money or personal information to NSA AT&T. The iPhone does not have phone capability, but the iPod and WiFi work. Stay tuned! Update: Magic iTunes 7.3.0.54 numbers: Offset 2048912: 33C0C3 Offset 257074: 28 Offset 257013: 33C9B1 Add “127.0.0.1 albert.apple.com” to c:\windows\system32\drivers\etc\hosts Download Phone Activation Server v1.0 to activate your iPhone for iPod+WiFi use. Note that this application will not do anything unless you understand the magic numbers as well as add the hosts entry. Phone Activation Server (PAS) requires that you have the MS .NET Framework 2.0 installed. Download PAS v1.0 Source Code. by Jon Lech Johansen’s

Read More »

Wi-Fi trouble with the iPhone

Network World is reporting that Duke University’s Wi-Fi network is suffering from what appear to be rogue iPhones. Duke’s Kevin Miller told Network World that the iPhone’s Wi-Fi chips are flooding the university’s Cisco access points with requests for MAC (Media Access Control) addresses. This is apparently knocking out dozens of access points as the 150 iPhones on campus wander around between different hotspots. It seems a bit weird to me. No other reports of trouble with iPhones and Wi-Fi networks have surfaced, though of course it’s very early in the iPhone’s tenure on the planet and this may prompt others to come forward. Duke IT employees seem to think it’s a problem with the iPhone, as opposed to a problem with Cisco’s equipment or their network configuration. My colleague and resident networking expert Maggie Reardon contacted Cisco, but a company representative said Cisco couldn’t comment at this time. An …

Read More »