If you want to achieve this on new laptops that were shipped with Windows 10 system please make sure to prior disable UEFI mode in the BIOS otherwise Windows 7 installation will unexpectedly stop at some point.
In Windows please disable one of the HID Devices in Device Manager, if this does not work try USB device listed in the same Device Manager HID container.
In Linux edit the “/usr/share/X11/xorg.conf.d/10-evdev.conf” file.
You edit the touchscreen section in 10-evdev.conf file is the last section.
It will have this identifier in the section – Identifier “evdev touchscreen catchall” – the identifier seems to be the 2nd line in all the sections.
Just add in this line – Option “Ignore” “on” as the last line before “End Section”
With mount –bind, a directory tree exists in two (or more) places in the directory hierarchy. This can cause a number of problems. Backups and other file copies will pick all copies. It becomes difficult to specify that you want to copy a filesystem: you’ll end up copying the bind-mounted files twice. Searches with find, grep -r, locate, etc., will traverse all the copies, and so on.
You will not gain any “increased functionality and compatibility” with bind mounts. They look like any other directory, which most of the time is not desirable behaviour. For example, Samba exposes symbolic links as directories by default; there is nothing to gain with using a bind mount. On the other hand, bind mounts can be useful to expose directory hierarchies over NFS.
You won’t have any performance issues with bind mounts. What you’ll have is administration headaches. Bind mounts have their uses, such as making a directory tree accessible from a chroot, or exposing a directory hidden by a mount point (this is usually a transient use while a directory structure is being remodelled). Don’t use them if you don’t have a need.
Only root can manipulate bind mounts. They can’t be moved by ordinary means; they lock their location and the ancestor directories.
Generally speaking, if you pass a symbolic link to a command, the command acts on the link itself if it operates on files, and on the target of the link if it operates on file contents. This goes for directories too. This is usually the right thing. Some commands have options to treat symbolic links differently, for example ls -L, cp -d, rsync -l. Whatever you’re trying to do, it’s far more likely that symlinks are the right tool, than bind mounts being the right tool.
it’s worth noting that some utilities might consider a bind-mounted directory to be a separate file system. This may have performance or functionality implications if the program can no longer assume that the same inode number refers to the same file (which it doesn’t, if they are on different file systems), a move cannot be optimized as link-at-target-then-unlink-source, etc.
Dirty script to show times in different places in the world
echo -n -e "World Times:\n\tTokyo\t\t"; TZ=":Asia/Tokyo" date | cut -d " " -f4; echo -n -e "\tShanghai\t"; TZ=":Asia/Shanghai" date | cut -d" " -f4;echo -n -e "\tMoscow\t\t"; TZ=":Europe/Moscow" date | cut -d" " -f4;echo -n -e "\tRome\t\t"; TZ=":Europe/Rome" date | cut -d" " -f4;echo -n -e "\tLondon\t\t"; TZ=":Europe/London" date | cut -d" " -f4;echo -n -e "\tNew York\t"; TZ=":America/New_York" date | cut -d" " -f4;echo -n -e "\tLos Angeles\t"; TZ=":America/Los_Angeles" date | cut -d" " -f4
find your preferred places in /usr/share/zoneinfo
then place the script in your .bashrc
Very useful new feature in Firefox to kill processor killing tabs and addons.
about:performance in your browser’s address field.
I was looking into this alternative file system but despite its numerous features for desktop use EXT4 is sufficient.
ln -sf /usr/share/zoneinfo/Europe/London /etc/localtime
and don’t forget to install ntp and start+enable ntpd service
Quick way to setup swap
fallocate -l 4G /swapfile
ls -lh /swapfile
sudo chmod 600 /swapfile
ls -lh /swapfile
At the bottom of the file, you need to add a line that will tell the operating system to automatically use the file you created:
/swapfile none swap sw 0 0
net stop wuauserv
ren %systemroot%\SoftwareDistribution SoftwareDistribution.old
net start wuauserv
rd /s/q %systemroot%\SoftwareDistribution.old
DISM.exe /online /Cleanup-Image /spsuperseded
bear in mind that above command is super-case-sensitive
Unfortunately in Windows 7 you cannot get rid off update packages in WINSXS folder (this can reach 12GB). You can clear it up in Windows 8.1 and later.
Types of national security clearance
There are four main types of Security Clearance – Baseline, Counter Terrorist, Security Check and Developed Vetting. Below is an outline of each type of Security Clearance, along with information on the process, how long it takes, and the types of IT jobs it applies to.
The important thing to remember is that Security Clearance checks are conducted in line with a specific IT job role, and need to be requested by a company not an individual. So while Security Clearance may require some time and paperwork, if successful it will lead to a new IT job – as well as career rewards such as a good salary, role security and plenty of opportunity.
Baseline Security Clearance
There are two types of check in this category: Baseline Personnel Security Standard (BPSS) (Formally Basic Check) and Enhanced Baseline Standard (EBS) (formerly Enhanced Basic Check or Basic Check +). A BPSS or EBS aims to provide an appropriate level of assurance as to the trustworthiness, integrity, and probable reliability of prospective employees.
What is BPSS?
BPSS is an entry level security check, and will take one or two days to complete. Not technically a security clearance, it uses the Police National Computer (PNC) to make sure a candidate has no convictions. The check returns evidence of any current criminal record and un-spent convictions under the Rehabilitation of Offenders Act 1974.
A BPSS acts as a pre-employment check, signaling good recruitment and employment practice in general. The check is carried out by screening identity documents and references. Continue reading Security clearance in UK
For this to happen you have to enable a secondary network adapter that is set as Internal Network (make sure you assign both guests to the same Internal Network, default is “intnet”)
The next step is to enable DHCP server on that network by this command:
VBoxManage dhcpserver add –netname intnet –ip 10.0.0.100 –netmask 255.255.255.0 –lowerip 10.0.0.101 –upperip 10.0.0.150 –enable
Mozilla is rewriting its rendering engine in Servo to make it more secure.
More info HERE
1. To get to the service menu type this code in your dialer:
This way you can check if you can unlock your bootloader, it is 50/50 chance, it depends on the production batch.
If a bootloader is allowed to be unlocked you can install custom ROM, if not you will not be able to proceed any step further
2. find the right device on CM website http://get.cm/
3. download the right build image (stable or nightly) and corresponding recovery image
4. download Open Google Apps from here http://opengapps.org/?api=5.0&variant=nano
As you can see I would go for NANO build which is below 100MB in size
5. unlock bootloader: http://developer.sonymobile.com/unlockbootloader/
6. PLEASE NOTE: you will need ADB and FASTBOOT applications and correct Sony drivers to be able to flash recovery image once the bootloader is unlocked
PLEASE NOTE that ADB and FASTBOOT uses different drivers to access the device
device is accessible using ADB when it is in normal mode
device is accessible using FASTBOOT only from recovery mode
fastboot flash boot boot.img
7. follow the instructions from an email they are going to send you
adb reboot bootloader - this is effective way to get to recovery mode for fastboot
fastboot -i 0x0xxx oem unlock 0xDxxxxxxxxxxxxx
8. flash custom ROM
adb sideload cm-12.1-date-STABLE-devicecodename.zip (from this moment you will not be able to access service menu anymore as it is not included in custom ROM)
9. install Google Apps
adb sideload open_gapps-arm-5.1-nano-2016xxxx.zip
10. go trough initial device setup, sign up to Google Play
11. enable Root access within Developers option -> Root access for Apps and ADB
12. install TWRP ROM manager
13. flash TWRP recovery image
You definitely want to read this: https://twrp.me/devices/sonyxperiaz3tabetcompact.html as you will be presented with a question that your have to check prior flashing recovery image, you risk bricking the device so double check.
14. once custom TWRP image is flashed you can boot to it and perform a first backup
Use this ready tool that you can run from an USB stick – Boot Repair CD
or run this command from any live or not GNU/Linux that has syslinux in place.
sudo dd if=/usr/lib/syslinux/mbr.bin of=/dev/sda
When you get an message saying that you “user is already logged into another computer” when you attempt to login to Sage Payroll please use Sage Payroll DB Utilities to Clear Locks.
Once you see “Locks Cleared Successfully” message please try to login to Sage again.
This is good explanation why not to use thin provisioning especially in small business where we cannot afford any vm redundancy.
expected survival rate after one year:
Windows 2008 system installed on certified hardware: 98%
same system on thick provisioned eagerzeroed vmdk running on ESXi: 97%
same system on thin provisioned vmdk running on ESXi: 60%
same as before plus automatic backup by Veeam or similar: 50 %
I dont think those numbers are completely off but I dont have statistics to backup such a claim.
Continue reading Thin or thick provisioning?
We’re excited to introduce Amazon Lumberyard and Amazon GameLift to game developers using AWS.
Amazon Lumberyard is a free, cross-platform, 3D game engine for developers to create the highest-quality games, connect their games to the vast compute and storage of the AWS Cloud, and engage fans on Twitch. This game engine helps developers build beautiful worlds, make realistic characters, and create stunning real-time effects.
Amazon Lumberyard is available for download in beta for PC and console game developers, with mobile and virtual reality (VR) platforms coming soon. Amazon Lumberyard is free to use, including source. There are no seat fees, subscription fees, or requirements to share revenue. Developers pay standard AWS fees for any AWS services they choose to use. Download the game engine here.
AWS is also releasing Amazon GameLift, a new service for deploying, operating, and scaling session-based multiplayer games, reducing the time required to create multiplayer back-ends from thousands of hours to just minutes. Learn more here.
With Amazon GameLift and Amazon Lumberyard, developers can create multiplayer back-ends with less effort, technical risk, and time delays that often cause developers to cut multiplayer features from their games.
So the read/write speeds of SSD comparing to SSHD on SATA II is about 4.5 times faster giving about 460MB/s to previous 110MB/s.
Timing cached reads: 5260 MB in 2.00 seconds = 2633.81 MB/sec
Timing buffered disk reads: 1476 MB in 3.00 seconds = 491.58 MB/sec
4096000000 bytes (4.1 GB) copied, 9.02934 s, 454 MB/s
Eric Schmidt (Google) said:
“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
“In the world of pattern recognition, we talk about “feature extraction”. That’s the process whereby we measure things, so if we were interested in classifying motor vehicles, one of the features we might extract is “number of axles”. Another might be “number of wheels”, and still another might be “number of doors”.
The idea, of course, is to use those features to figure out what kind of vehicle we’ve got. But not all features are equally useful: if we’re trying to tell the difference between a Mercedes sedan and a Toyota sedan, “number of wheels” won’t help.
So the next step is “feature selection”: what’s actually useful? Which features will enable us to make decisions?
And the step after that is “feature weighting”, because even if we’ve decided that there are 22 features useful for decision-making, they’re almost certainly not all equally useful.
There is no doubt that by now extensive theoretical and experimental analysis has been carried out on the Facebook data corpus and that algorithms have been written which perform this process, at scale, and quickly. Facebook themselves have no doubt done this because processing the data in this fashion yields saleable output, and we all know that Facebook sells everything that it can to anyone with cash in hand. And any government in possession of Facebook’s data has undoubtedly done the same thing — with their own purposes in mind.
The combination of this approach with machine learning yields code that cuts right through the “5,000 friends” problem like it isn’t even there.” author: Anonymous
Can you imagine yourself browsing the Internet without being logged into Facebook or Google at the same time?
Feel free to share any non US based alternatives to those technology moguls.
The Best non-US Based Email Providers you can Trust your Privacy on
Free Webmail and Email by
GMX in Germany
La Poste in France
Lycos Mail in South Korea (slow page load)
Mail.com in Germany
Mail.ru in Russia
Sify.com in India
Yandex in Russia
From elevated command prompt:
dism /Online /Cleanup-Image /RestoreHealth
this is also to do with problems downloading upgrade from Windows 7/8 to Windows 10.
First of all make sure that you have no iPhone backups in Library (Finder, Go To Folder -> type ~./Library)
Then go for Dr. Cleaner
Blue – network, PC connections (network cabinet)
Red – IP phones (network cabinet)
Orange – interconnections between switches
Grey – Phone connection (desk)
Black – PC connection (desk)
Green – Tills
Yellow – PDQs
This laptop looks very promising to me however without this Thunderbolt adapter there is no way to connect to HDMI.
I think I have to wait a little bit for the price to go down and also so they can release other relevant peripherals.
Advent of Windows 10 and Microsoft’s more aggressive and sophisticated practices to shove it to their users is a perfect moment to completely switch to GNU+Linux. Haha
Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers. Almost all AMT features are available even if PC power is off, the OS is crashed, the software agent is missing, or hardware (such as a hard drive or memory) has failed.
A Ring -3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not work for the later Q45 chipset as Intel implemented additional protections. The exploit worked by remapping the normally protected memory region (top 16 MB of RAM) reserved for the ME. The ME rootkit could be installed regardless of whether the AMT is present or enabled on the system, as the chipset always contains the ARC ME coprocessor. (The “-3” designation was chosen because the ME coprocessor works even when the system is in the S3 state, thus it was considered a layer below the System Management Mode rootkits.) For the vulnerable Q35 chipset, a keystroke logger ME-based rootkit was demonstrated by Patrick Stewin.
Another security evaluation by Vassilios Ververis showed serious weaknesses in the GM45 chipset implementation. In particular, it criticized AMT for transmitting unencrypted passwords in the SMB (small business) provisioning mode when the IDE redirection and Serial over LAN features are used. It also found that the “zero touch” provisioning mode (ZTC) is still enabled even when the AMT appears to be disabled in BIOS. For about 60 euros, Ververis purchased from Go Daddy a certificate that is accepted by the ME firmware and allows remote “zero touch” provisioning of (possibly unsuspecting) machines, which broadcast their HELLO packets to would-be configuration servers. Source: Wikipedia