Wednesday, December 31, 2008

echo "Hello 2009!"

I feel that I'm getting old when I see this pic. I'm starting to miss the old daze =)





What will happen with the boys this 2009?

Tuesday, December 16, 2008

Create a BT3 usb drive

here is the steps to create a backtrack 3 usb pendrive,which I had done it with my 4G usb that i bought from cd-R king. this was taken from http://wirelessdefence.org/Contents/Backtrack3_USB_Howto.htm

Configuring the USB device:

First we need to create two partitions on the USB device:

1. Boot up your Linux machine (this is only required for initial installation a VMware machine will work fine).

2. In the Linux machine run "tail -f /var/log/messages" and insert the USB drive. In my case the following is displayed "[sdb] Attached SCSI removable disk" so we now know the USB device is sdb.

3. fdisk /dev/sdb

4. Command (m for help): p (to see what is on the drive).

5. If there are any existing partitions on the device delete them using d you will then be prompted for the partition number.

6. Command (m for help): n (to create a new partition)

7. Command action e extended, p primary partition (1-4): p (for primary)

8. Partition number (1-4): 1 (for first partition)

9. First cylinder (1-245, default 1): 1 or Enter (to start at the first cylinder)

10. Last cylinder or +size or +sizeM or +sizeK (1-245, default 245): +1024M (to create a 1Gb partition)

11. Command (m for help): t (to set partition type)

12. Hex code (type L to list codes): b

13. Command (m for help): n (to create a new partition)

14. Command action e extended, p primary partition (1-4): p (for primary)

15. Partition number (1-4): 2 (for the second partition)

16. First cylinder (126-245, default 126): Enter (to accept default)

17. Last cylinder or +size or +sizeM or +sizeK (126-245, default 245): Enter (to use the rest of the disk this will create a 1Gb partition if you're using a 1Gb disk)

18. Command (m for help): t (to set partition type)

19. Partition number (1-4): 2

20. Hex code (type L to list codes): 83

21. Command (m for help): p (to make sure there are two partitions of the type and size you are expecting)

22. Command (m for help): w (to write you changed to the disk, without this step nothing is actioned).


Mounting the new partitions in Linux:

1. Create 2 mount points e.g. mkdir /usb and mkdir /usb1

2. mount /dev/sdb1 /usb (mount the FAT partition)

3. mount /dev/sdb2 /usb1 (mount the Linux partition)

Note: If you are having trouble mounting any particular drive do a format on the windows partition or an fsck on the Linux partition prior to performing the mount.


Installing Back Track 3 to USB:

1. Copy the Backtrack 3 .iso image: bt3final_usb.iso to / on you Linux machine.

2. mkdir /bt3_iso (create a mount point to mount the .iso image)

3. mount -o loop -t iso9660 bt3final_usb.iso /bt3_iso (mount the Backtrack 3 .iso image)

4. cp -r /bt3_iso/boot /usb (copy the boot directory to the FAT partition)

5. cp -r /bt3_iso/BT3 /usb (copy the BT3 directory to the FAT partition)

6. mkdir /usb1/changes (manually create a "changes" folder on the Linux partition)

7. /usb/boot/bootinst.sh (execute bootinst.sh on the FAT partition and follow prompts)

8. vi /usb/boot/syslinux/syslinux.cfg (or use another text editor to open the file)

9. At the end of the APPEND line, under the mode you are planning to use e.g. KDE, add the following:

changes=/dev/sdb2

So, for the MENU LABEL BT3 Graphics mode (KDE)

"......rw autoexec=xconf;kdm" becomes "......rw autoexec=xconf;kdm changes=/dev/sdb2"

After you have made the changes save the file.

Saturday, December 13, 2008

Unix Tip: FORGET THE CRONTAB MAN

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

UNIX GURU UNIVERSE
UNIX HOT TIP

Unix Tip 3186 - October 26, 2008

http://www.ugu.com/sui/ugu/show?tip.today

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


FORGET THE CRONTAB MAN

For some reason many admins forget the field order of the
crontab file and alway reference the man pages over-and-over.
Make your life easy. Just put the field definitions in
your crontab file and comment (#) the lines out so the
crontab file ignores it.


#minute (0-59),
# hour (0-23),
# day of the month (1-31),
# month of the year (1-12),
# day of the week (0-6 with 0=Sunday).
# commands
0 2 * * 0,4 /etc/cron.d/logchecker

Thursday, November 27, 2008

How to graph a data if all are string in openoffice calc

Let say you have a data that shows all the reasons why subscribers are being disconnected.



and you want to make a graph out of that data that will show how many subscribers really fall under those reasons.

Heres how you do it in Openoffice.org Spreadsheet (Calc).

use the COUNTIF finction in Openoffice.org Spreadsheet,countif returns the number of cells that meet with certain criteria within a cell range.

=COUNTIF(E19:E32;"cant afford to pay")
=COUNTIF(E19:E32;"Tv Defect")

once you have the data as shown below, it time to graph.

Cant afford to pay 7
Tv Defect 3


Hight light those two data then go to Insert --> Chart (Just follow the wizard), output bellow:

Tuesday, November 25, 2008

Beware of identity theft

INQUIRER.net
First Posted 09:37:00 11/25/2008

Identity theft is using someone’s identity to get money, purchase goods and services, or receive other benefits.

According to Citibank's Use Credit Wisely website, “identity theft happens when someone accesses essential elements of a person’s identifying information in order to commit fraud or theft. This information includes name, address, Tax Identification Number (TIN), Social Security number, date of birth and mother’s maiden name.”

With the Internet, identity theft can happen anywhere, even here in the Philippines. It is fraud that is perpetrated by criminals in many ways to open credit card accounts, obtain loans and even mortgages in someone else’s name. Some even hack e-mail accounts then send a hoax e-mail asking for financial help from friends and relatives using the victim’s own e-mail address and contact list. Or the fraudsters may use someone’s identity to illegally obtain resident status in other countries or commit other crimes.

How to Protect your self from identity theft:

1. Protect your mailbox. This refers to your physical mailbox at your place of residence. Always remove your mail as soon as the mailman makes a delivery. Identity thieves have been known to steal mail and go through them to obtain information that can be valuable to them.

2. Protect your wallet. Some people keep a lot of stuff in their wallet—old receipts, credit card charge slips, ATM receipts, deposit slips, and all IDs, including their SSS and TIN cards. Minimize your risk by keeping items with personal information in a safe place at home. If you don’t need your SSS and TIN cards for the day, for instance, leave them at home. Make it a habit to go through your wallet and shred receipts and other papers if you don’t need them anymore.

3. Protect your credit and debit cards. As soon as you receive your credit card, sign on the back immediately. Never let anyone use your credit card. Don’t write down your ATM PIN or account number. When you change addresses and phone numbers, inform your credit card issuer and bank as soon as possible. Report stolen or lost cards right away.

4. Protect your computer. Use an anti-virus software, as well as a firewall and anti-spyware software. This will help deter criminals’ efforts in stealing your personal information. Also, visit only secure websites (those with “https” in the address and a small padlock icon in the lower right hand corner). Regularly update your browser so new plugs for security holes can be installed. Don’t open mysterious e-mail attachments from people you do not know. These attachments may contain viruses that fish for information and may lead you to dummy sites where you will be led to input financial information.

5. Refrain from accessing your financial accounts through a public computer. If you do online banking, do so in the privacy of your home or office where you have anti-virus, firewall, and anti-spyware programs installed. Always log off after doing online banking.

6. Monitor your accounts. Go over your billing statements and bank accounts regularly. As soon as you spot an irregular transaction, call the bank or credit card company.

VICTIMIZED? WHAT TO DO
If you feel you have been victimized by identity thieves, take action immediately.

1. Contact creditors. These include credit card companies, phone companies, utility companies, banks, and other lenders. Explain what happened. Close accounts that have been tampered with and open new ones with new PINs and strong, hard-to-guess passwords.

2. File a police report. Get a copy and give one to the bank and other creditors.

RECLAIMING YOUR IDENTITY
Take extra steps to make sure identity theft does not happen to you again.

When you have closed tampered accounts, open a new account that would offer more security, such as a password before any inquiry or change can be made.

For stolen checks or checking accounts that have been tampered, issue a stop payment instruction. Cancel your ATM card and request for a new one then have a new PIN.

If your investment account has been hacked, report it immediately to your broker or account officer.

If a new phone service has been subscribed for using your name and you are being billed for it, contact the phone company right away and cancel the account.

Identity theft is a real crime, but as more people become aware of it and observe safeguards, there will be fewer victims around.

Thursday, November 6, 2008

print 'Hello,Trinity!'

Late post again! I have limited internet access in valenzuela since my work is now in bicol, anyway I been busy with a new server her name is trinity born Oct. 28 3:48pm weights 8.4 same place where my other server was born linuscarl at manila docs. Heres some advice before you give birth and admit your wife to the hospital always ask how much is your ob PF(Professional Fee) and ask discount before hand. Below are some pics:






Sunday, October 12, 2008

Openoffice Tips (exponential function)

To make a exponential in openoffice

do

Ctrl-shift-p gives the right result (2²)

to remove it

ctrl-shift-b

Saturday, October 11, 2008

Basic Linux Command (Kill a print job)

I had a problem killing my print job seems that it got stock and the message annoys me,there is no icon for the printer and option to kill the job so here is what I did. There are two option:

Option A:

point your browser to http://localhost:631/jobs

Option B: (this is the option I choose)

run lpq -a from a terminal

it will show the jobs that are trying to run



Then

run lprm "jobid"


Since there are allot of jobids i made a simple script:

$for i in '54 56 58 59 60 61'; do lprm $i; done

Saturday, October 4, 2008

The CentOS Adventure

You should not forget where you came from, I could relate this with my adventure with centos (CentOS is a freely-available operating system that is based on Red Hat Enterprise Linux. ) During my early years with linux I started with RedHat 7.2 till RedHat 9 then my previous company switch to mandrake actually its a customize drake we were installing from a harddisk to our server (I forgot doing that) I been setting up proxys, firewall and samba server with it.Next was debian I fall in-love with apt-get although yum was ok with me during those days but apt-get was an easy breez coz no dependencies was miss out by apt-get. Then Ubuntu came it was a haven OS for me. Now I'm setting up a LTSP out of Centos,why? Audio issue unsloved. So I would like to try it in RedHat environment. I said to my self this is just old times but when I was configuring it I'm using debian commands and paths, although linux commands and paths are universal there are still some would be different like for example network config in ubuntu I go to /etc/network/interfaces to edit my network interface card while in centos its under /etc/sysconfig/network-scripts/ifcfg-eth*. Also if I want to know what release I'm using I typed lsb_release -a, this command wont work with centos. My adventure is not yet over I will still be diving or lets says visiting with my old roots of linux.

Sunday, September 28, 2008

Some useful Network Command

ifconfig - lists IP address (similar to ipconfig in Windows)
iwlist scan - shows wireless networks that are available in the area along with basic encryption information
lshw -C network - Shows interface and driver associated with each networking device
lspci -nn - Shows hardware connected to the pci bus
lsusb - Shows USB connected hardware
lshw -C usb - Additional info on USB related hardware (good for USB dongles)
cat /etc/modprobe.d/blacklist - List modules that will not be loaded by the Operating System at boot time
lsmod - lists currently loaded kernel modules. (Example usage - lsmod | grep ndiswrapper)
route -n - Lists kernel IP routing table -- Good for troubleshooting problems with the gateway (netstat -rn = equivalent command)
sudo route add default gw 192.168.1.1 - Example of how to set the default gateway to 192.168.1.1
sudo route del default gw 192.168.1.1 - Example of how to delete the default gateway setting
sudo modprobe ***** - Loads the kernel module **** . (Example usage - sudo modprobe ndiswrapper, sudo modprobe r818x, sudo modprobe ath_pci)
sudo modprobe -r **** - Unloades the kernel module ****. (Example usage - sudo modprobe -r ndiswrapper)
sudo ifup/ifdown - Brings up/down the interface and clears the routing table for the specified interface
sudo ifconfig up/down - Brings up/down the interface for the specified interface
sudo dhclient - Request IP address from DNS server for specified interface
sudo dhclient -r - Release IP address associated with specified interface
sudo iptables -L - Lists firewall rules
dmesg | more - Lists boot log -- good for troubleshooting problems with modules/drivers not being loaded
uname -r - Displays kernel version
/etc/iftab (Feisty and pre-releases (Edgy, etc)) - /etc/udev/rules.d/70-persistent-net.rules (Gutsy) - File which assigns logical names (eth0, wlan0, etc) to MAC addresses
cat /etc/resolv.conf - Lists DNS servers associated with network connections (Network Manager)
/etc/dhcp3/dhclient.conf - File which sets or modifies dns (domain name servers) settings

Thursday, September 25, 2008

SFD08

Some Pics from SFD08









Wednesday, September 24, 2008

30 Skills Every IT Person Needs

By Richard Casselberry
from cio.com

1. Be able to fix basic PC issues. These can be how to map a printer, back up files, or add a network card. You don't need to be an expert and understand how to overclock a CPU or hack the registry, but if you work in IT, people expect you to be able to do some things.

2. Work the help desk. Everyone, from the CIO to the senior architect, should be able to sit down at the help desk and answer the phones. Not only will you gain a new appreciation for the folks on the phones, but you will also teach them more about your process and avoid escalations in the future.

3. Do public speaking. At least once, you should present a topic to your peers. It can be as simple as a five-minute tutorial on how IM works, but being able to explain something and being comfortable enough to talk in front of a crowd is a skill you need to have. If you are nervous, partner with someone who is good at it, or do a roundtable. This way, if you get flustered, someone is there to cover for you.

4. Train someone. The best way to learn is to teach.

5. Listen more than you speak. I very rarely say something I didn't already know, but I often hear other people say things and think, "Darn, I wish I knew that last week."

6. Know basic networking. Whether you are a network engineer, a help desk technician, a business analyst, or a system administrator, you need to understand how networks work and simple troubleshooting. You should understand DNS and how to check it, as well as how to ping and trace-route machines.

7. Know basic system administration. Understand file permissions, access levels, and why machines talk to the domain controllers. You don't need to be an expert, but knowing the basics will avoid many headaches down the road.

8. Know how to take a network trace. Everyone in IT should be able to fire up wireshark, netmon, snoop, or some basic network capturing tool. You don't need to understand everything in it, but you should be able to capture it to send to a network engineer to examine.

9. Know the difference between latency and bandwidth. Latency is the amount of time to get a packet back and forth; bandwidth is the maximum amount of data a link can carry. They are related, but different. A link with high-bandwidth utilization can cause latency to go higher, but if the link isn't full, adding more bandwidth can't reduce latency.

10. Script. Everyone should be able to throw a script together to get quick results. That doesn't mean you're a programmer. Real programmers put in error messages, look for abnormal behavior, and document. You don't need to do that, but you should be able to put something together to remove lines, send e-mail, or copy files.

11. Back up. Before you do anything, for your own sake, back it up.

12. Test backups. If you haven't tested restoring it, it isn't really there. Trust me.

13. Document. None of the rest of us wants to have to figure out what you did. Write it down and put it in a location everyone can find. Even if it's obvious what you did or why you did it, write it down.

14. Read "The Cuckoo's Egg." I don't get a cut from Cliff Stoll (the author), but this is probably the best security book there is -- not because it is so technical, but because it isn't.

15. Work all night on a team project. No one likes to do this, but it's part of IT. Working through a hell project that requires an all-nighter to resolve stinks, but it builds very useful camaraderie by the time it is done.

16. Run cable. It looks easy, but it isn't. Plus, you will understand why installing a new server doesn't really take five minutes -- unless, of course, you just plug in both ends and let the cable fall all over the place. Don't do that -- do it right. Label all the cables (yes, both ends), and dress them nice and neat. This will save time when there's a problem because you'll be able to see what goes where.

17. You should know some energy rules of thumb. For example: A device consuming 3.5kW of electricity requires a ton of cooling to compensate for the heat. And I really do mean a ton, not merely "a lot." Note that 3.5kW is roughly what 15 to 20 fairly new 1U and 2U servers consume. One ton of cooling requires three 10-inch-round ducts to handle the air; 30 tons of air requires a duct measuring 80 by 20 inches. Thirty tons of air is a considerable amount.

18. Manage at least one project. This way, the next time the project manager asks you for a status, you'll understand why. Ideally, you will have already sent the status report because you knew it would be asked for.

19. Understand operating costs versus capital projects. Operating costs are the costs to run the business. Capital equipment is made of assets that can have their cost spread over a time period -- say, 36 months. Operating costs are sometimes better, sometimes worse. Know which one is better -- it can make a difference between a yes and no.

20. Learn the business processes. Being able to spot improvements in the way the business is run is a great technique for gaining points. You don't need to use fancy tools; just asking a few questions and using common sense will serve you well.

21. Don't be afraid to debate something you know is wrong. But also know when to stop arguing. It's a fine line between having a good idea and being a pain in the ass.

22. If you have to go to your boss with a problem, make sure you have at least one solution.

23. There is no such thing as a dumb question, so ask it ... once. Then write down the answer so that you don't have to ask it again. If you ask the same person the same question more than twice, you're an idiot (in their eyes).

24. Even if it takes you twice as long to figure something out on your own versus asking someone else, take the time to do it yourself. You'll remember it longer. If it takes more than twice as long, ask.

25. Learn how to speak without using acronyms.

26. IT managers: Listen to your people. They know more than you. If not, get rid of them and hire smarter people. If you think you are the smartest one, resign.

27. IT managers: If you know the answer, ask the right questions for someone else to get the solution; don't just give the answer. This is hard when you know what will bring the system back up quickly and everyone in the company is waiting for it, but it will pay off in the long run. After all, you won't always be available.

28. IT managers: The first time someone does something wrong, it's not a mistake -- it's a learning experience. The next time, though, give them hell. And remember: Every day is a chance for an employee to learn something else. Make sure they learn something valuable versus learning there's a better job out there.

29. IT managers: Always give people more work than you think they can handle. People will say you are unrealistic, but everyone needs something to complain about anyway, so make it easy. Plus, there's nothing worse than looking at the clock at 2 p.m. and thinking, "I've got nothing to do, but can't leave." This way, your employees won't have that dilemma.

30. IT managers: Square pegs go in square holes. If someone works well in a team but not so effectively on their own, keep them as part of a team.


Sunday, September 14, 2008

Saturday, September 13, 2008

Linux is not just for boys, its for girls too!

Hello LinuxChix!

LinuxChix is a community for women who like Linux and Free Software, and for women and men who want to support women in computing. The membership ranges from novices to experienced users, and includes professional and amateur programmers, system administrators and technical writers.

there is also a local community.

http://ph.linuxchix.org/

Wednesday, September 10, 2008

Courses offer at my Internet shop

I'll be offering courses in my shop I have just draft the first one, I posted it at http://myturfnet.multiply.com/. This are not for certification or degree but for Continuing Education.

Tuesday, September 9, 2008

Bamboo Invoice for our company

BambooInvoice was built by designer and programmer Derek Allard, I'm just tailoring it for our needs. So far its easy to use and customize there are still some limitation like search features and print invoice by location. The application is written in php, still learning the language and trying to write features for our needs. Below are some screen shots of the application.

Main page of the application


Creating a Invoice



Invoice statement


For more info of the application visit http://www.bambooinvoice.org/.

Wednesday, September 3, 2008

Software Freedom Day 2008

I just signed-up for the upcoming SFD08 to be held on Sept. 20 at the University of Makati, hope that will be in manila by the 18th of sept cause my wife will be giving birth soon with trinity. She scared to give birth here in the province because of the facilities. I cant blame her. Hope to see you foss/oss addicts and share,learn new things with you.Below is the url if you haven't registered yet:

http://www.hubnob.com/join

see you!

Skype on my fujitsu esprimo

Hi, I just want to share to you that skype 2.0 for linux(ubuntu 8.04.1) is working fine especially video. I just talk to my wife from my shop to our home where shes at and it was clear and fun. Just add the following repository in your /etc/apt/sources.list

#Skype repository
deb http://download.skype.com/linux/repos/debian/ stable non-free


then

$sudo apt-get update

$sudo apt-get install skype

Sunday, August 31, 2008

Simple Timer in python to track my customer usage.

I have customized a timer written in python that will suffice my need for my Internet shop, I know allot of good ready apps out like CafeconLeche and Outkafe I'm still fixing my dev box so I have some thing to test on before I deploy it to my ltspsrver. Below is the source code:

#!/usr/bin/python2.5

#####################################
## Author: Christian Wyglendowski ##
## Customize by: AC ##
## Date: 08.31.08 ##
#####################################

import time
import threading
class Timer(threading.Thread):
def __init__(self, seconds):
self.runTime = seconds
threading.Thread.__init__(self)
def run(self):
time.sleep(self.runTime)
print "Buzzzz!! Time's up! workstation ",ws
t = time.strftime("%H:%M:%S")
print t

##Q:How many second in one hour?
##A:1 hour = 3600 seconds
##Q:How many second in thirty minutes?
##A:1 minute = 60 seconds
## 30 minutes = 60 x 30 = 1800 seconds

ws = raw_input("workstaion no.: ")
num = input("In seconds: ")
stTime = time.strftime("%H:%M:%S")
print stTime
t = Timer(num)
t.start()



How to use it just make the code executable (eg. chmod +x timer.py) then run it ./timer.py it will ask which workstation that needs to track the usage then how many second will the client use the computer so remember 30 min equals to 1800 second and 1 hour is equal to 3600 second then let the script do the counting for you. Below is a sample output:

$./timer.py
workstaion no.: 1
In seconds: 1800
15:30:31 ----> start Time
Buzzzz!! Time's up! workstation 1
16:00:31 -----> end time

next time i'll try to put a alam sound or it will blink a red light on the screen if time is up, for now this is ok for me.
note: this is only good for 4 - 10 workstation coz you'll be opening lots of terminal.

Friday, August 29, 2008

Fujitsu ESPRIMO MOBILE U9200

late blog again, but anyway here goes... I bought a Fujitsu ESPRIMO MOBILE U9200 notebook and I would like to share with you my experience using ubuntu 8.04 on it. I'll start with the specs I got the spec details from fujitsu.com/sg because its same specs as mine.

Specifications
Platform Intel® Centrino® Duo processor technology
- Intel® Core™2 Duo Processor T5250
- Intel® PRO/Wireless 4965AGN
- Intel® 965GM
Operating System Ubuntu 8.04.2
(or ships with with Knoppix Linux DVD)
Display 12.1-inch WXGA TFT, 1280 x 800 pixels
Modular Bay Device Dual Layer DVD Super Multi Writer
Memory 1GB DDR2 667MHz
Hard Disk 160GB
Battery Up to 4 hrs1 (6-cell Li-ion 5200mAh)
Weight 1.9kg
Detailed Specifications
Hard Disk Drive SATA-160 (5400rpm)
Graphics Integrated Intel® Graphics Media Accelerator X3100 with Intel® Clear Video Technology5 and DVMT4 4.0 delivers low-power, high-performance 2D/3D graphics with Shader Model 3.0, video and display capabilities at a max. shared memory of 384MB
Audio RealTek ALC262 Sound Chip with stereo speakers
Audio-in: (line-in / microphone)
Audio-out: (line-out / headphone)
3.5G Ready6 Upgrade now to embeded 3.5G(HSDPA) WWAN connectivity of up to 7.2 Mbps7 downlink. - Also Supports EDGE7 and GPRS7
Communication 1.3 Mega Pixel camera, Optional 56K V.92 modem6, built-in 10/100/10002 Mbps Marvell 88E8055, Intel® PRO/Wireless 4965AGN network connection and optional Bluetooth® v2.0
User Interface Keyboard 86-keys, 19mm pitch, 2.5mm key stroke
Touch Pad with two mouse buttons
Card Slots 1 x ExpressCard™ 34mm slot, Memory card slot (SD, MS, xD and MSPRO)
Connector Interface USB 2.0 x 3, VGA (external display), S-Video out (TV-out), Memory Card, RJ45 (LAN), Optional RJ11 (modem)6, Audio-in, Audio-out, Power Adapter DC-in
Security3 User and supervisor BIOS password, Anti-theft Lock Slot
Dimensions 300mm (W) x 223mm (D) x 37mm (H)
Bundled Accessories6
AC Adapter Input AC 100~240V, Output DC 20V/90W Adapter

Now I will discuss the once that did not work out of the box and the hack that I did to work.

*wifi
description: Wireless interface
product: PRO/Wireless 4965 AG or AGN Network Connection
vendor: Intel Corporation

not really a hack but I just update my kernel to 2.6.24-19 and install wifi-radar. try to playing around with the wifi and bluetooth in the bios settings by disabling then enabling it helps detect the driver in boot time.

*headset jack
when you plug the headset jack the sound is still coming out from the speakers, hack for this is edit /etc/modprobe.d/alsa-base add the following line options snd-hda-intel model=hippo

*
gyache-improved + webcam
Im usnig gyache-improved to chat with yahoo acct because this sofar I have tested to view webcam in yahoo. thanks to loell for helping me out here. You need to compile and use http://www.swift-tools.net/Flashcam/

$ tar xvf flashcam-X.Y.tgz
$ cd flashcam-X.Y
$ make
$make install

$ sudo flashcam -L
Scanning devices
------
Found V4L2 Capture device: /dev/video0 (uvcvideo/FO13FF-65-1 PC-CAM)
------
Executing: 'modprobe vloopback pipes=1'

$chmod o+rw /dev/video*

$ flashcam -qD
Forwarding frames from /dev/video0 to /dev/video2

$make uninstall clean

Open now gyache and start your webcam.

*3G phone
I have a nokia E61 that can be a modem for my ubunto. here is my wvdial config.
edit /etc/wvdial.conf

[Dialer Defaults]
Init1 = ATZ
Init2 = ATQ0 V1 E1 S0=0 &C1 &D2 +FCLASS=0
#Init3 = AT+CGDCONT=1,"IP","internet"
Init3 = AT+CGDCONT=1,"IP","http.globe.com.ph" #you could find this in your phone setting
Modem Type = USB Modem
ISDN = 0
Phone = *99#
New PPPD = yes
Modem = /dev/ttyACM0
Username = yourusername
Password = yourpassword
Baud = 460800
Idle Seconds = 3000
Auto DNS = 1
Stupid Mode = 1
Compuserve = 0
Baud = 460800
Dial Command = ATD
Ask Password = 0
FlowControl = NOFLOW

run wvdial and open your favorite browser and your ready to surf the net.

The rest are working out of the box.

note: Try this at you own risk, so far this works for me.


Wednesday, August 27, 2008

myturf Internetshop

Its been so long after I have posted here again. I've been busy setting up an internet shop here in my dads hometown. I just open an internet shop powered by FOSS from WIFI router to workstation. I'm using Ubuntu 8.04.1 ltsp mode in installation to save up hardware expense but there are some drawbacks one example is the webcam. Ltsp5 does not support yet a webcam to its workstation. My work-around for a webcam user is to use my extra laptop that has hardy installed on its harddisk. But so far the rest are working out of the box. For browsing they are using Firefox, Gyach-improved for chatting, Skype if they want to talk to their love ones. For typing and other home work they use OpenOffice. I have also installed GCompris for education. You may visit www.myturfnet.multiply.com (yah I know! Im using multiply because I have no budget yet for my own domain and web hosting and beside this is the fast and cheap solution I could think of) for more info on my shop.