This is a mirror of official site: http://jasper-net.blogspot.com/

How to make a Dummy VGA Dongle

| Thursday, December 29, 2011
side%20done.jpg

I figured id make this guide to help people running more than 1 card. or dual GPU's. As without these niffty devices tri quad or even 6-8 GPU's will not run on the same machine. here is how it is done.


First get yourself a DVI to VGA adapter. Any will do.

Adapter

Next you will need resistors. The other guides on the net say to use between 68-70 ohm ones but any i find will do. The point of the resistor is to well...privide resistence so that Vista is fooled into thinking their is another monitor. Why do this? We are doing this because monitors are detected through current. when you plug a monitor in their is resistence on the line. if we mimic resistence we in essence mimic a monitor.

you can get resistors at your local radioshack or micro center. we will need 3 per dongle so if you plan to make more than one buy accordingly.

Resistor

Now that we have our parts we need a diagram. you in essance will be putting the resistors in the last 3 holes of the first and second line on the right side of the vga (blue) end. Sound difficult? Its not but here is a pic.

ok so now we start. Now some guides will make you take apart the connector etc. However this is unnessisary it fits fine you simply need to wiggle it if it gets caught. let us begin.

First you have a standard VGA adapter.

Read more: Tech PowerUp forum
QR: showthread.php?t=86507

Posted via email from Jasper-net

Runtime Application Telemetry and Analytics... Don't leave your apps without it...

| Wednesday, December 28, 2011
When developers know how their applications are really being used “in the wild,” they will build better software, more efficiently, and with greater confidence. It’s common sense. Historically though, it has been virtually impossible to get this kind of real-world – or runtime – intelligence into the hands of developers and architects when they need it most – when they are deciding what to do next.

The emerging application analytics market offers unprecedented insight into how software is being used in the real world and gives multiple stakeholders – from developers to CIOs to business owners – a reliable way to measure and manage development investments. Like web analytics, application analytics correlates behavior with business results. Unlike web analytics, application analytics extends beyond browser clicks on a web page to include mobile and traditional client experiences as well as the business and back office tiers that tie all of these together.

While software developers may or may not consider web developers to be “real” developers, we can learn quite a bit from them since they focus on, and demand, empirical evidence in support of how their applications are really being used. In fact, even the most remedial “drag and drop” website developers not only expect to gather real-world usage statistics, they also know this information will be a critical factor in future development iterations. They know only a fool would build something with no way to measure both adoption and the business impact of that adoption.

Capturing runtime data is only part of the solution. Runtime intelligence must be converted into action. Software development is often much more complex than a typical website project for two reasons: The diversity of applications makes “one-size-fits-all” reporting impractical and the complexity of the development process itself makes turning runtime data into “intelligent action” much more challenging. In order to be effective, application analytics must overcome both of these obstacles.

Website developers also understand analytics can have direct financial value – but for this to be true, the results must be verifiable and public. Knowing an app is popular makes it even more popular – driving adoption and sales. This holds true for website destinations and mobile apps – but also for office, productivity and even development tools. Users want to benchmark themselves against their peers (usage patterns) and their applications against alternatives (the best tool for the job).

Read more: Greg's Cool [Insert Clever Name] of the Day
Read more: The Rise of Application Analytics: A New Game Demands New Rules
QR: application-analytics

Posted via email from Jasper-net

Building the one Install OS Flash Drive to rule them all...? (Windows 7 x86 & x64 and Live CDs and Rescue disks and...)

|
Super Users often find ourselves installing operating systems. Whether you run your own computer shop, manage an army of thousands of corporate workstations, or are just the tech-savvy friend everyone you know calls for help, you’ve probably had to install various flavors of Windows over and over again. Most of us have also spent a fair amount of time installing different Linux distros, running data recovery disks, and using various live CDs.

The problem that presents itself is managing all of the required disks. There are at least 6 common flavors of Windows 7 alone (Home Premium, Professional, and Ultimate for both x86 and x64, plus Enterprise for you corporate types). Add in various distros of Linux and you start to see why some computer techs carry around whole folders of CDs.

I’ve been aware of Pendrive Linux for a while, which lets you setup a flash drive with multiboot Linux software, and can add a single Windows installation. But what if you wanted to have a single flash drive with all versions of Windows 7, as well as all the standard Linux boot disks? It took some work, but I decided to do this and the final result is impressive.


Read more: Greg's Cool [Insert Clever Name] of the Day
Read more: Making the Ultimate All-In-One Installation Flash Drive
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://blog.superuser.com/2011/12/22/making-the-ultimate-all-in-one-installation-flash-drive/

Posted via email from Jasper-net

Silverlight security overview paper has been updated for Silverlight 5

| Tuesday, December 27, 2011
The main difference from the Silverlight 4 version is I've added a section on trusted in browser apps (which in many ways aren't that different from trusted out of browser apps). I've also folded in a few corrections/improvements from customer feedback that apply equally to previous versions of Silverlight.

Read more: Nick on Silverlight and WPF
QR: silverlight-security-overview-paper-has-been-updated-for-silverlight-5.aspx

Posted via email from Jasper-net

Message Only Window in for .NET Application

|
Overview

.NET is great platform, it speeds up the development process, you deal with your application logic and in most cases you don't need to know that there is whole Windows operating system down there. However sometimes you do need to program against Windows without the .NET assistance. As a Windows developer, you need to keep all your weapons ready, be it .NET, COM or C++ with the native Win32 API. In this article I am going to show how to deal with Windows Message based communication protocol within .NET application.
Windows Messages

In traditional User32.dll based Windows application the Windows Messages mechanism serves as a communication channel among many parties. The Windows Operating System uses this mechanism to ask the Window to draw itself, to inform about environmental change or even to communicate a logoff event. The application itself uses this mechanism to create an event driven design model with a single thread or to communicate between threads. Other applications can use this mechanism with an application defined message (the WM_APP message range) to trigger a logical event, or even to pass memory buffer using the WM_COPYDATA.

Windows In Windows Are Based On An Object Oriented Mechanism

One of the impressive thing about the windows mechanism of Windows, considering its age and the fact that it was implemented with the C language in mind, is that is based on the Object Oriented paradigm. Each window is belong to a Window Class. The class is the factory of a window. The class defines the window's properties as well as the window's behavior. The properties are set using one of the predefined window class member such as the window's menu, or cursor. The behavior is defined by specifying the windows procedure address. The window procedure handles the incoming Windows Messages, which are in fact the methods of the window. Changing the Windows attributes can be made using the SetWindowLong/Ptr. Creating type fields (static) and instance fields can be made by allocating user-defined memory area for each Window class (static) and Window instance (dynamic) using the cbClsExtra and cbWndExtra fields of the WNDCLASS structure. Subclassing a Windows class can be achieved by changing the window procedure address to point to a custom function that handles the Windows Messages before it calls the original window procedure. You can subclass a Window instance or Window class (global subclassing).

Read more: public: class Alon : IArchitect, IAzure, ICPP, ISmartHome, IHomeServer
QR: message-only-window-in-for-net-application.aspx

Posted via email from Jasper-net

How to build a 40TB file server

|
The one most valuable asset at Oyster.com is our photo collection. Take away the intellectual property and what’s left is, essentially, markup (with a bit of backend to snazz it up.) So we need a solid backup solution for the original high-res photos. The old servers were about to run out of capacity and their slightly outdated specs did not make transferring huge datasets any easier or faster. Thinking a few months ahead, we were looking at a 40TB data set. In strict accordance with KISS methodology, we opted against LTO and S3, and decided to build a big BOX. (For starters, 40TB on S3 costs around $60,000 annually. The components to build the Box — about 1/10th of that.)

Coincidentally, a great new product was just about to hit the market, reinforcing our decision with its timely relevance — the dual-core Areca ARC-1882ix RAID Host Bus Adapter, which comes with an on-board DDR3 SDRAM socket with up to 4GB chip support. Since we already opted for RAID Level 6 (striped, distributed parity–error checking, tolerates two disk failures) and dual-core RAID-On-Chip means it processes two streams of parity calculations simultaneously — it seemed ideal.

The first challenge in putting together the big box was getting internal SAS connectors properly seated into the backplane adaptor sockets, the bottom few being especially cumbersome to reach. Thankfully, our hardware technicians’ exceptional manual dexterity rendered having to disassemble the internal fan panel frame unnecessary.

Read more: Oyster.com tech blogs
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=tech.oyster.com/how-to-build-a-40tb-file-server/

Posted via email from Jasper-net

The Android Eye for the .Net Guy... The Android for .NET Developers Series by Dino Esposito

|
android_logo.gif

The Android for .NET Developers Series

    Part 1 Starting with this article, I'll discuss what you need to know to approach Android programming without any aid from your .NET expertise.
    Part 2 In this article, we'll go through an Android application that accepts input from the user and handles user's clicking.
    Part 3 In this article, you will learn how to build the user interface.
    Part 4 In this article, I'll be delving deep into menus and dialog boxes in Android for .NET, and discuss a few very common (and frequently used) types of menus and dialogs.
    Part 5 In this article, Dino Esposito focuses on the options that the Android SDK offers for local storage.
    Part 6 In this article, Dino Esposito shows how to build settings dialog boxes using a built-in feature of Android for .NET.
    Part 7 In this article, I'll dissect the code of a realistic application - a waterpolo score manager - to show how to save and resume the status of a game using both the internal storage and SD card.
    Part 8 In this article, I'll focus on the execution of common tasks from within an Android application. I'll build the skeleton of an application that takes a photo and emails to the specified address. For both tasks I'll use native Android components.
    Part 9 In this article, I'll discuss how to arrange an Android view where the dominant element is the list. I'll start with a plain list of strings and then improve up to populating a listview with downloaded content arranged using a custom layout.


Read more: Greg's Cool [Insert Clever Name] of the Day
Read more: Dino Esposito
QR: DinoEsposito.aspx

Posted via email from Jasper-net

MySQL Stored procedure

|
Stored Procedures

MySQL stored procedures can be applied easily in any place. There are many places that  MySQL stored procedures can be used. Stored procedures are a set of sql commands that are stored in the database. Stored procedures are application and platform related and the task of execution becomes easier; less disorder. It also helps in decreasing the traffic in the networks and reduces the CPU work load. RDMBS supports recursive stored procedure but MySQL does not support it well.

There are many places MySQL stored procedures can be used :

    Where client applications are using various language in different platforms.
    If security is of highest importance, like in financial institutions,then users and applications would have no direct access to the database tables.
    This provides an excellent secured environment.
    The database servers service the client machines,providing efficient performance.    

Now we are describing a example of a simple stored procedure which uses an OUT parameter. It uses the MySQL client delimiter command for changing the statement delimiter from ; to // till the procedure is being defined.

Example :

mysql> CREATE PROCEDURE Happy(OUT p1 INT)
    -> SELECT COUNT(*) INTO p1 from persons;
Query OK, 0 rows affected (0.21 sec)

mysql> CALL Happy(@a);
Query OK, 1 rows affected (0.00 sec)

mysql> select @a;

Read more: C# Corner
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.c-sharpcorner.com/UploadFile/65fc13/mysql-stored-procedure/

Posted via email from Jasper-net

Free and Professional .PSD UI Elements for Your Design

|
ui-kit-1.jpg

A web designer works on the basis of a pre-designed UI Elements which can be later edited accordingly. The web applications are increasing almost every day and for constructing a successful app one should be always ready with a smart idea. A User Interface Kit does the work of beautifying the app to create a better impression and a much easy work experience. These user kits can be downloaded as required by you in your projects.

UI elements kit are a PSD file and have the same user interface for app designs as well as for web. It has check boxes, radio button, search options, message alert to make it an useful UI element. The apple styled UI elements is nice and has detailed icons. The grayness UI kit, light UI PSD, Spring GUI, Blue and white GUI kit, Small UI set, orange interactive elements, Bloom UI kit, Web elements, UI for Japan are some of the other user interface elements.

Read more: DesignModo
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://designmodo.com/free-psd-ui-elements/

Posted via email from Jasper-net

Facebook security bypassed with One single link

| Sunday, December 25, 2011
Affected Application: Facebook.com
Exploit Platform: Remote
Impact: Full Access to Facebook profile
Severity: High
Author: Anand Pandey
Email: anandkpandey1 (at) gmail (dot) com
Video:
____________________________________________________________________

->Description:
• Accessing Facebook account with just one single link and by passing all
security mechanism implemented by Facebook for preventing unauthorised
access and provide secure login to users.
• No way to track the unauthorized access and to know that someone accessed
your account. (Unless the intruder made some changes)
____________________________________________________________________

->What it can do ?
It has the power to by pass all the security machanisms applyied by
Facebook. It will not require the username/password, won’t present you with
Check point, will not track your location (so no geographical location
based restrictions) and no login review for the user, user will not be
presented with any notification that wheather the user or some one else has
accessed his/her account, and most importantly, there will not be any
active sessions created or listed, so you will have full access to those
resources where password is not required (because you don’t have the
password), and there is no way any one can track you, unless you make a
mistake of changing the profile picture or scream loudly ?
____________________________________________________________________

->How this link is generated?
This link is generated by Facebook for those who have registered their cell
phone on Facebook to receive the notification of activity on their accounts
by SMS on phone. Facebook generates this link for the convenience of those
mobile users, and send it via SMS. You will receive a notification from
Facebook stating that XYZ have commented on your photo (with the comment
made) and a direct link to that photo. So you will not have to login every
time to view your photos for comment or for anything using that particular
link.
____________________________________________________________________

->What all notifications contain this link?
• Comment made on your photo.
• Comment on your link.
• Comment made after you on a photo or a link.
• Tagged you in photo.


Read more: Full-disclosure
QR: 084825.html

Posted via email from Jasper-net

USe Facebook as a proxy

|
WHAT YOU CAN DO:

- View HTML page of any website (not internal facebook pages);
- GET requests;
WHAT YOU CAN’T DO:

- Manage cookies;
- POST requests;
RESTRICTIONS:

- You must be logged in;

 

HISTORY:

- 14/12/2011: First contact
- 15/12/2011: No evidence to be a security flaw
- 15/12/2011: Pratical usage examples
- 23/12/2011: No response, published (GMT +1).
- 23/12/2011 (1h after publishing): “We do not consider this a security flaw. Thanks for taking the time to look into this and please send us any additional concerns you encounter in the future.”

Having a facebook account is not so bad if you can have a free and fast proxy!
The affected page is:

    developers.facebook.com/tools/debug/og/echo?q=

“q” parameter must be a valid unescaped URL. Output page will show you the HTML code of the URL and guess what? Request will be made by facebook server, without report your original IP. Also “x-forwarded-for” is not used (thanks to white_sheep for this check)

Read more: IHTeam Security Blog
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://www.ihteam.net/hacking-news/using-facebook-as-a-proxy/

Posted via email from Jasper-net

Linux Unified Key Setup (LUKS)

|
From Wikipedia, the free encyclopedia

In computing, the Linux Unified Key Setup or LUKS is a disk-encryption specification created by Clemens Fruhwirth and originally intended for Linux.

While most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability amongst different programs, but also assures that they all implement password management in a secure and documented manner.[1]

The reference implementation for LUKS operates on Linux and is based on an enhanced version of cryptsetup, using dm-crypt as the disk encryption backend. Under Microsoft Windows, LUKS-encrypted disks can be used with FreeOTFE.

The design of LUKS aimed to conform to the TKS1 secure key setup scheme.[2]

Read more: Wikipedia
QR: Linux_Unified_Key_Setup

Posted via email from Jasper-net

Exploit Pack

|
logoweb2.png

Exploit Pack  is an open source security tool for penetration testers and end users and it comes to fill a need, a framework for exploit writers and security researchers, with a GPL license and Python as engine for its modules. Also it is based on JAVA and SWT to get real cross-platform. GPL license is used for the entire project and thus ensure the code will always be free.

Exploit Pack try to ensures to fill the needs that an exploit developer or security expert has daily. And it will assist you when you have to test the security of your computer or servers.

Do you wanna get involved? Participate in the Community! Help us code!

    Community discussions occurs on mailing lists
    Real-time discussions are held over #exploitpack at irc.freenode.net
    Follow along with Facebook and Twitter
    Social coding at GitHub – We need help on Java and Python: Red Light | Green Light | Refactor!
    Tools for bugs reporting Bug Tracker!, wiki documentation, and more are available!
    Check out our new blog! Click here to go there!


Read more: Exploit Pack
QR: http://chart.googleapis.com/chart?chs=80x80&cht=qr&choe=UTF-8&chl=http://exploitpack.com/

Posted via email from Jasper-net