Ad Muncher #
Great story from developer Murray Hurps: Ad Muncher's 15 Year History. Here are a few excerpts:
After 15 years as shareware, Murray is generously releasing Ad Muncher for free.
/windows | Oct 19, 2014
Remove metadata from JPGs with jhead #
Strip potentially revealing EXIF data (camera model, GPS coordinates, etc) with jhead (mentioned recently):
jhead -purejpg file.jpg
Batch processing works to:
jhead -purejpg /path/to/pics/*.jpg
EXIF metadata can be displayed by simply pointing jhead to a file or folder, e.g.,
/nix | Oct 19, 2014
Microsoft Virtual Machine Converter adds P2V support #
Microsoft® Virtual Machine Converter (MVMC) 3.0 is a Microsoft-supported, stand-alone solution for the information technology (IT) pro or solution provider who wants to convert virtual machines and disks from VMware hosts to Hyper-V® hosts and Windows Azure™ or alternatively convert a physical computer running Windows Server 2008 or above server operating systems or Windows Vista or above client operating systems to a virtual machine running on Hyper-V host.
(via The Deployment Bunny)
/windows | Oct 15, 2014
Test your web browser for the SSL3 POODLE vulnerability #
POODLE Test checks your web browser for the SSL3 POODLE vulnerability. A poodle picture will appear if the vulnerability is found, otherwise a photo of a terrier will be displayed. A quick sampling under OS X 10.9.5 found Safari 7.1 (9522.214.171.124.1) and Chrome 37.0.2062.124 to be vulnerable, while Firefox 33.0 and Opera 12.16 were reportedly safe.
(via The Safe Mac)
/misc | Oct 15, 2014
Blocking BadUSB #
USB KEYBOARD GUARD from G DATA attempts to block BadUSB attacks by requiring users to approve newly-detected USB keyboards.
(via Robert Penz, who also points to Christian Vogel's Linux instructions for blocking BadUSB)
UPDATE: Claus Valca has more information on BadUSB and USB KEYBOARD GUARD.
/windows | Oct 12, 2014
The shortcut to serenity #
"If it is not right do not do it; if it is not true do not say it." -- Marcus Aurelius
/misc | Oct 08, 2014
offers a number of free utilities, including:
- PartCopy - Copy any number of bytes from one file into a new one. Enter the start position and length in decimal or hexadecimal values. Contains a hex viewer.
- SendSMTP - Send email via command line or GUI. Supports TLS, SSL, and SASL authentication via Anonymous, PLAIN, S/KEY, CRAM-MD5, CRAM-SHA1, and OTP. Password is encrypted using 128-bit Rijndael (AES).
- Remove - Command line utility similar to del (erase), but skips over in-use files.
/windows | Oct 05, 2014
Windows 10 Technical Preview #
Windows 10 Technical Preview ISOs are out. A few thoughts (billg: I carp because I care):
- Setup screens during install are the same as those from Windows 8
- Same annoying "Sign in to your Microsoft account" after install with no apparent way to bypass. As before, disconnecting from the network, clicking the back arrow, then clicking next allows creation of a local account instead. Microsoft: Please fix this - give users an obvious way to avoid having to setup or sign in to yet another online account (as OS X does).
- Strange popup (for feedback, I suppose): "How hard was it to use Start?" Dear Microsoft, How hard was it to add Start?
- The power button ("Power Options") is now at the top of the Start menu - please put it back at the bottom where it belongs.
- Put all of the "Windows Store apps" in a folder instead of having to scroll endlessly through them. And while you're at it, please re-add the ability to easily create, delete, and rename folders on the Start menu (the only options from the context menu are "Expand" or "Collapse").
So far, as near as I can tell, Windows 10 is basically Windows 8.1 with a garish Start menu; calling it 8.2 or even 8.1.1 would seem closer to the truth.
- Happily, the Windows Store app icons on the Start menu can be removed by right clicking and selecting "Unpin from Start". The result is close to the original Start menu.)
- Microsoft shows off new multiple desktop tool called Task View in Windows 10. Virtual desktop apps for Windows have been around for a long time, like Robin Keir's BossKey from the last century: "BossKey is a simple virtual desktop program. Create hot-keys to switch between the desktops and have one set of windows/applications on one and a different set of windows/applications on another and flip between them instantly with a single key press. Up to 10 virtual desktops can be defined and windows can be designated always visible." Relatedly, despite being incorporated into OS X since 10.5, I have yet to see a single customer actually using virtual desktops under OS X (or any OS for that matter).
/windows | Oct 01, 2014
Portable TrueCrypt for Windows and OS X #
- Windows: Tools > Traveler Disk Setup... > Save to desired location (4 files will be copied there: TrueCrypt Format.exe, TrueCrypt.exe, truecrypt-x64.sys, and truecrypt.sys - these are all you need for basic portable operation)
- OS X: Simply copy /Applications/TrueCrypt.app. However, FUSE for OS X (with the optional but included MacFUSE Compatibility Layer) needs to be installed in order for TrueCrypt to launch.
/misc | Sep 29, 2014
TrueCrypt and Mavericks #
- Build TrueCrypt on OS X 64 bit with hardware acceleration
(requires including a patch from nerdenmeister)
- If you prefer using the official TrueCrypt 7.1a binary, click "Customize" during install and uncheck OSXFUSE Core 2.3.8 and MacFUSE Compatibility Layer (they are outdated versions that cause problems under Mavericks). Afterwards, install the latest FUSE for OS X, checking MacFUSE Compatibility Layer during the process.
- If you have encrypted an entire USB drive, OS X will prompt you to Initialize, Ignore, or Eject it when plugged in (as was explained in a TrueCrypt warning during the initial setup). Be sure to click Ignore and then mount using TrueCrypt.
- If you decide to reformat the mounted container as HFS+, you can extract and install a read-support driver for Windows from the Boot Camp installer (BootCamp.msi > BootCamp64.cab > AppleHFS.sys and AppleMNT.sys).
- To format an encrypted device or partition container as HFS+ (or rather, JHFS+ "Mac OS Extended (Journaled)"):
- Connect the device to your Mac
- In TrueCrypt, click "Select Device..."
- Double click the encrypted disk or partition
- Click Mount > Options > "Do not mount" > enter your password/keyfile
- Run diskutil list to find the disk identifier (e.g., /dev/disk5)
- Format it (any existing data will be deleted): diskutil eraseDisk JHFS+ <new_disk_name> </dev/disk#>
- The container should mount automatically after formatting is complete. When you are finished, unmount it from within TrueCrypt.
/mac | Sep 29, 2014
RSS | Twitter | Archives