Why might you wanna do this? Well, for starters, Google Instant does not work everywhere in the world right now. So you can force it to the US-based Google webpage and start using Google Instant. Either temporarily or permanently.
September 22, 2010 at 12:00 am (IT Security, Useful information)
Tags: attacker, browser, channel, chrome, chromium, communication, default, encrypted, google, network, referer, results, search, security, ssl, website
You know what Google SSL Search is right?
By using SSL, your search results would be encrypted on the communication channel between Google and your computer. So an attacker on the same network you are on will not be able see what you are searching for.
NOTE: Google can, of course, still see what you are searching for =) So beware, they might be watching you :P
Thanks to Gunthers at serverfault, I was able to create a USB and start the Startup Repair tool from there to repair my Windows 7 boot.
Probably the only thing you need to know is how to make the USB bootable as I assume you know that you need an NTFS partition on the USB including the installation files (copied over from a DVD or a backup ISO file).
Well, after all that pretty regular stuff, you need to grab ms-sys from here and install it to be able to write Microsoft compatible boot records. (It could also exist in your repositories, so do a check first if you want with your favorite package management tool. (e.g. apt-get, aptitude, yum etc.)
To write a Windows 7 MBR onto the USB device; just do a
Open a command line and write this: “godmode on”. Ah, ok, not that easy.
First things first, what is this “god mode”? Well, it is basically a handy way to access all Windows settings without opening up folders or options in Control Panel.
April 11, 2010 at 1:34 pm (Linux, Linux Distros)
Tags: /dev/disk/by-uuid, alert, backup, bcdedit, boot, boot.ini, configuration, distro, does not exist, Linux, manager, mbr, partition, problem, restore, root, ubuntu, uuid, wubi, wubildr
About a week ago, I decided to format the whole harddisk and start anew.
Of course, this meant losing the triple-boot configuration and Wubi along with it. I was fine with losing the windows, but didn’t want to lose the Wubi Ubuntu installation.
Well, yeah, there are many applications for this which give you this information in a much better way, but assuming you don’t want to find them, or just maybe don’t have any internet connection; the easiest thing to do would be to export this registry key below:
Well, why would you want to do this? Basically, you can use Firefox instances that are of different versions or maybe even with different profiles.
Recently, about a week ago, I wrote a philosophical essay incorporating ideas from Postmodernism for the fulfillment of a mandatory course that I had, Philosophy of Science. It is pretty interesting as a thought experiment.
The title of my essay was “An attempt at understanding the postmodern discourse on “reality”, the meaning of life, death, dreams and love”
Well, noticed that I haven’t been blogging for some time. So here is a quick post about something that should be obvious, but still goes unnoticed by some people. I will talk about password strength in this post.
The key space of a password is more important than the length of it from a brute-force attack point of view. What is a brute-force attack? It is an attack against the user password by trying all possible passwords in a particular key space.