Showing posts with label guide. Show all posts
Showing posts with label guide. Show all posts

Feb 4, 2015

Guide: Two easy ways to root Moto G XT1033 XT1032 (Lollipop)

If you’ve been searching for how to root Moto G using latest Lollipop, you’re the luckiest Moto G user as your search stops here. In this tutorial, I will be guiding you to perform all major operations on your Moto G.

Through this guide, I will be explaining the following to perform on your Moto G. This tutorial is applicable for both single SIM and Dual SIM variants.
So let’s begin with the process. To root moto g you must follow them in respective order. Before that, I recommend you to check the pre-requisites section and disclaimer part.

Requirements

  • Make sure that you have the device Moto G XT1033/XT1032.
  • Install necessary fastboot and USB debugging drivers on your Windows PC. In case if you don’t have those, download ADB drivers [link],combined adb and fast boot driver package [here] and Motorola USB drivers [here].
  • For safety Backup all important files including personal contacts, call logs, messages and data in the phone memory.
  • Enable USB debugging under developer options. If the developer option is hidden under settings, go to Setting->About Phone and tap on Build Number many times until developer option is enabled.





Disclaimer

Komputal.blogspot.com will not be held responsible for any damage that may cause to your Moto G device by following this tutorial. However, by rooting Moto G , your warranty is now void. You will no longer receive OTA/official software updates of support. Do it at your own risk.

I'll show you two easy way to root moto g. (Make sure your moto g bootloader is already unlock if not click here to unlock.)

First:

How to Root Moto G on Windows using Superboot (Use this if your android version in 4.4.4 or below)

  • Download and extract Moto G root package [link] to a folder in your desktop.
  • Enter your device into bootloader mode (Turn off the phone then turn on with the ‘volume down’ button pressed) and connect to the computer.
  • Now open the root package folder on your computer and run “superboot-windows.bat” as administrator.
  • Done. You have unlocked Moto G bootloader and rooted so far.

Second:

How to Root Moto G on Windows using RootKit by ChainFire (Use this if your android version in 4.4.4 or above)

Proceed with this step only if everything stated in the above steps has come out correctly.
  • Download and extract Moto G root package [link] to a folder in your desktop
  • Unzip the ' CF-Auto-Root-xxx-xxx-xxx.zip ' file to a separate folder on your computer.
  • Run the " root-windows.bat " file & press the space bar.
  • Wait for a while for the process to finish & your device will reboot.

Voila! you have successfully rooted your device. Check for " Super SU " app in your app drawer.



Proof:


    Mar 30, 2008

    Windows Xp folder Settings Malfunction

    If for any reason your Win Xp Folder View does Not Stay To You're Setting.
    Grab your registry editor and join in

    Why Doesn't Windows Remember My Folder View Settings?

    If you've changed the view settings for a folder, but Windows "forgets" the settings when you open the folder again, or if Windows doesn't seem to remember the size or position of your folder window when you reopen it, this could be caused by the default limitation on storing view settings data in the registry; by default Windows only remembers settings for a total of 200 local folders and 200 network folders.

    To work around this problem, create a BagMRU Size DWORD value in both of the following registry keys, and then set the value data for both values to the number of folders that you want Windows to remember the settings for. For example, for Windows to remember the settings for 5000 local folders and 5000 network folders, set both values to 5000.

    Here is how:

    Follow these steps, and then quit Registry Editor:

    1. Click Start, click Run, type regedit, and then click OK.

    2. Locate and then click the following key in the registry:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell

    3. On the Edit menu, point to New, and then click DWORD Value.

    4. Type BagMRU Size, and then press ENTER.

    5. On the Edit menu, click Modify.

    6. Type 5000, and then click OK.

    AND:

    1. Locate and then click the following key in the registry:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam

    2. On the Edit menu, point to New, and then click DWORD Value.

    3. Type BagMRU Size, and then press ENTER.

    4. On the Edit menu, click Modify.

    5. Type 5000, and then click OK.

    Note:

    When you use roaming user profiles, registry information is copied to a server when you log off and copied to your local computer when you log on. Therefore, you may have performance issues if you increase the BagMRU Size values for roaming user profiles.

    Mar 14, 2008

    How to make the Best Compressing using WinRAR

    FIRST What were going to do is to set up your options correctly.

    Open WinRAR

    OPTIONS | SETTINGS | COMPRESSSION | CREATE DEFAULT

    GENERAL | (ok now that we're there, here's what U do next)

    But 1st -> realize that everything U set on the default profile will occur everytime U rar files. So if U only need a password occasionally, or other special settings, then create another profile for those purposes. U can change which profile U need to use when WinRar is open. The Default profile is used otherwise, such as when using WinRar from the context menus in explorer.

    General tab:

    Archive format RAR

    Compression method BEST

    size (enter in BYTES the size you want as the max single Rar file). I use 51,200,000 (50,000 KB x 1024). But chose yer max size as U wish.

    Update method ADD AND REPLACE FILES

    Archiving options: check > PUT RECOVERY RECORD

    Archiving options: check > TEST ARCHIVED FILES.

    Archiving options: check > DELETE FILES AFTER ARCHIVING ( unless U want yer HDD to fill up with the rars & the original files for some reason)

    Archiving options: do NOT check > Put authenticy verification, as this can be a source of Error Messages being generated upon extraction.

    Archiving options: check > Create SFX ONLY if U don't expect the person getting the filez to have WinRar. Otherwise leave it UNCHECKED.

    Archiving options: do NOT check > Create Solid Archive. This can cause problems in certain cases.

    Archiving options: do NOT check > Lock Arhive. This has NOTHING to do with a password.

    Advanced tab:


    Recovery Record -> U can leave it at 1%. Only set it higher if U expect the rar files to have a high risk of corruption. (very bad internet connections, or use on floppy disks, etc)

    All else can be left alone. Don't bother with the Compression button.

    Files Tab

    File Paths -> STORE RELATIVE PATHS. (unless U have a specific folder U want the files to be extracted to. Such as c:\program files\No Name Appz\link catcher).

    The rest leave alone

    Backup Tab

    No need to change anything.

    Time Tab

    Files to Process -> OF ANY TIME

    Comment Tab

    Whatever comment U enter there will be shown on the right hand pane when WinRar opens yer Rar files. Think of something fun, catchy,interesting. I always mention that the files have recovery record set, so if they are corrupted in transfer, the person knows to use REPAIR function.

    Click OK, U have now created yer default profile.





    CREATING a PASSWORD PROFILE, which will NOT be the default:

    Open WinRar

    Click the ADD Icon

    ADVANCED | Push the SET PASSWORD Button

    Check the SHOW PASSWORD box, so U can see what U typed and also copy/paste it to wherever U need it, such as on yer post. Now only one box will be open to enter the password. COPY/PASTE it to a txt file. I call mine WinRAR_Password.txt. Do this IMMEDIATELY afer entering it, before closing that window, or U may be very sorry later.

    Enter the password. It is CASE SENSITIVE. If the password is 8 or more alpha-numeric characters, no one will be able to hack it. Unless they own a super-computer. Avoid using words that are found in dictionaries.

    Check the encrypt file names box. That way, even if some nasty person obtains yer Rar file, they won't know what is in it, especially if the name U give the rar file is "Grandma_pix.rar" or whatever.

    Back to GENERAL tab | PROFILES button | Save Current Settings to a New Profile

    Enter the name of this profile. For example if the passwd is ht*p://www.superforum.com, U might name the profile Superforum. Only U will see this profile name. It does not go into the rar files made from it.

    Do NOTHING more, do NOT set this as default profile.

    Click OK | Click OK again.

    Now U have a Passworded Profile.

    HOW TO USE the PASSWORD PROFILE

    Note -> Everything U set on the default profile will occur everytime U rar files. So when U need the password profile, follow these instructions. The Default profile is used otherwise, such as when using WinRar from the contest menus in explorer.

    Open WinRar

    Browse to the filez/folderz U want to Rar with Password.

    Highlight all filez/folderz to be included.

    Press the ADD button.

    GENERAL tab | PROFILES button

    Scoll down to the profile whcih has the password set. In my example Superforum

    Click OK

    The file are Rar'd. U can check if U did all correctly by opening the rar filez, and seeing if a password is required.

    Until U change back to DEFAULT profile in this same method, or close WinRar, all Rar'z U create after this will have a password.

    REPAIRING A CORRUPTED RAR FILE:

    With Win Explorer create a sub folder REPAIRED

    Open WinRar, browse to the folder with the damaged Rar file(z). U can find which one is bad by selecting the 1st RAR file and using TEST button.

    Select the damaged file, press REPAIR button.

    In dialogue box, enter the path to the REPAIR subfolder, or browse to it.

    As long as there is a RECOVERY record in that Rar, it will be repaired.

    Copy all the NON-DAMAGED rars to your repair folder and rename the REPAIRED file back to it's original name.

    Proceed with extraction in the REPAIR folder as normal.

    MISC TIPS:

    If U select a folder to Rar, later when U extract it inside that folder, U end up with nested folders of same name. (We've all seen this often when extracting rars.

    So Instead, go inside the folder, select all the filez & sub-folderz. Now U have a rar inside just one folder.

    Mar 5, 2008

    How to Securely Configure a FTP Server(BulletProof)

    I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

    After reading the excellent tutorial on "Creating an FTP" that Norway posted…

    (I would suggest reading and following his tutorial first, then following up with this one)

    I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…

    This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

    I'm assuming you have it installed.

    Basics
    1. Start the program.
    2. Click on Setup > Main > General from the pull-down menu.
    3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
    4. Click on the 'options' tab of that same panel (on the side)
    5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.
    6. Also put a check in the 'Blocked Banned IP (instead of notifying client). VERY IMPORTANT! If somebody decides to 'Hammer' (attempt to login numerous times VERY quickly) your server/computer may CRASH if you don't enable this.
    7. Click on the 'advanced' tab
    8. At the bottom again look at the 'hammering area'
    9. Enable 'anti-hammer' and 'do not reply to people hammering' Set it for the following: Block IP 120 min if 5 connections in 60 sec. You can set this at whatever you want to but that is pretty much a standard Click 'OK'

    Adding Users
    11. Setup > User accounts form pull-down.
    12. Right click in the empty 'User Accounts' area on the right: choose 'Add'
    13. Enter account name. (ie: logon name)
    14. In the 'Access rights' box right click: choose ‘Add’.
    15. Browse until you find the directory (folder) you want to share. In the right column you will see a bunch of checkboxes. Put a check in the following ones: Read, Write, Append, Make, List, and +Subdirs. Press 'select'.
    16. Enter a password for your new FTP account.
    17. Click on 'Miscellaneous' in the left column. Make sure 'Enable Account' is selected. Enable 'Max Number of Users' set it at a number other than zero. 1 for a personal account and more that one for a group account. Enable 'Max. no. of connects per IP' set it at 1



    18. Under 'Files' enable 'show relative path' this is a security issue. A FTP client will now not be able to see the ENTIRE path of the FTP. It will only see the path from the main directory. Hide hidden flies as well.
    Put a tick in both of these.

    Advanced:
    You don't need to do any of this stuff, but It will help tweak your server and help you maintain order on it. All of the following will be broken down into small little areas that will tell you how to do one thing at a time.

    Changing the Port
    The default port is always 21, but you can change this. Many ISPs will routinely do a scan of its own users to find a ftp server, also when people scan for pubs they may scan your IP, thus finding your ftp server. If you do decide to change it many suggest that you make the port over 10,000.
    1. Setup > Main > General
    2. In the 'Connection' Area is a setting labeled 'Listen on Port Number:'
    3. Make it any number you want. That will be your port number.
    4. Click 'OK'

    Making an 'Upload Only' or 'Download Only' ftp server.
    This is for the entire SERVER, not just a user.
    1. Setup > Main > Advanced
    2. In the advanced window you will have the following options: uploads and downloads, downloads only, and uploads only. By default upload and download will be checked. Change it to whatever you want.
    3. Click 'OK’


    While you are running your server, usually you will end up spending more time at your computer than you normally do. Don't be afraid to ban IP's. Remember, on your FTP you do as you want.

    When you are online you must also select the open server button next to the on-line button which is the on-line Button

    You also have to use the actual Numbered ip Address ie: 66.250.216.67

    Or even Better yet, get a no-ip.com address

    Mar 2, 2008

    How to Repair Winsock 2

    These guide will show you how to repair Winsock 2. Well as you might or might not know the symptoms when Winsock2 is damaged show when you try to release and renew the IP address using IPCONFIG...

    And you get the following error message:

    An error occurred while renewing interface 'Internet': An operation was attempted on something that is not a socket.

    Also Internet Explorer may give the following error message:
    The page cannot be displayed Additionally, you may have no IP address or no Automatic Private IP Addressing (APIPA) address, and you may be receiving IP packets but not sending them.

    There are two easy ways to determine if Winsock2 is damaged:

    From the XP source files, go to the Support / Tools directory

    Winsock Test Method 1
    Run netdiag /test:winsock

    The end should say Winsock test ..... passed

    Winsock Test Method 2


    Run Msinfo32
    Click on the + by Components
    Click on the by Network
    Click on Protocol
    There should be 10 sections if the Winsock2 key is ok
    MSAFD Tcpip [TCP/IP]
    MSAFD Tcpip [UDP/IP]
    RSVP UDP Service Provider
    RSVP TCP Service Provider
    MSAFD NetBIOS [\Device\NetBT_Tcpip...
    MSAFD NetBIOS [\Device\NetBT_Tcpip...
    MSAFD NetBIOS [\Device\NetBT_Tcpip...
    MSAFD NetBIOS [\Device\NetBT_Tcpip...
    MSAFD NetBIOS [\Device\NetBT_Tcpip...
    MSAFD NetBIOS [\Device\NetBT_Tcpip...

    If the names are anything different from those in this list, then likely Winsock2 is corrupted and needs to be repaired.
    If you have any 3rd party software installed, the name MSAFD may be changed.
    There should be no fewer than 10 sections.

    To repair Winsock2

    Run Regedit
    Delete the following two registry keys:
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock
    HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Winsock2

    Restart the computer
    Go to Network Connections
    Right click and select Properties
    Click on the Install button
    Select Protocol
    Click on the Add button
    Click on the Have Disk button
    Browse to the \Windows\inf directory
    Click on the Open button
    Click on the OK button
    Highlight Internet Protocol (TCP/IP)
    Click on the OK button
    Reboot (Don't forget)

    Do contact me if you have any Problem.

    Feb 28, 2008

    BIOS Update Guide/Procedure

    All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace an EPROM component. Once downloaded, the upgrade utility fits on a floppy disc allowing the user to save, verify and update the system BIOS. A hard drive or a network drive can also be used to run the newer upgrade utilities. However, memory managers can not be installed while upgrading.

    Most pre-Pentium motherboards do not have a Flash BIOS. The following instructions therefore do not apply to these boards. If your motherboard does not have a Flash BIOS (EEPROM) you will need to use an EPROM programmer to re-program the BIOS chip. See your dealer for more information about this.

    Please read the following instructions in full before starting a Flash BIOS upgrade:
    A. Create a Bootable Floppy (in DOS)

    •With a non-formatted disk, type the following:

    format a:/s

    •If using a formatted disk, type:

    sys a:

    This procedure will ensure a clean boot when you are flashing the new BIOS.

    B. Download the BIOS file

    •Download the correct BIOS file by clicking on the file name of the BIOS file you wish to download.

    •Save the BIOS file and the Flash Utility file in the boot disk you have created. Unzip the BIOS file and the flash utility file. If you don't have an "unzip" utility, download the WinZip for Windows 95 shareware/ evaluation copy for that one time use from _www.winzip.com or _www.pkware.com. Most CD ROMs found in computer magazines, have a shareware version of WinZip on them.

    •You should have extracted two files:

    Flash BIOS utility eg: flash7265.exe (for example)
    BIOS eg: 6152J900.bin (example)

    Use the latest flash utility available unless otherwise specified (either on the BIOS update page or in the archive file). This information is usually provided.

    C. Upgrade the System BIOS


    During boot up, write down the old BIOS version because you will need to use it for the BIOS backup file name.

    Place the bootable floppy disk containing the BIOS file and the Flash Utility in drive a, and reboot the system in MS-DOS, preferably Version 6.22

    •At the A:> prompt, type the corresponding Flash BIOS utility and the BIOS file with its extension.

    For example:

    flash625 615j900.bin

    •From the Flash Memory Writer menu, select "Y" to "Do you want to save BIOS?" if you want to save (back up) your current BIOS (strongly recommended), then type the name of your current BIOS and its extension after FILE NAME TO SAVE: eg: a:\613J900.bin

    Alternatively select "N" if you don't want to save your current BIOS. Beware, though, that you won't be able to recover from a possible failure.

    •Select "Y" to "Are you sure to program?"

    •Wait until it displays "Message: Power Off or Reset the system"

    Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system. If you write to BIOS but cannot complete the procedure, do not switch off, because the computer will not be able to boo, and you will not be given another chance to flash. In this case leave your system on until you resolve the problem (flashing BIOS with old file is a possible solution, provided you've made a backup before)

    Make sure the new BIOS version has been loaded properly by taking note of the BIOS identifier as the system is rebooting.

    For AMI BIOS
    Once the BIOS has been successfully loaded, remove the floppy disk and reboot the system holding the "END" key prior to power on until you enter CMOS setup. If you do not do this the first time booting up after upgrading the BIOS, the system will hang.

    BIOS Update Tips
    note:
    1.Make sure never to turn off or reset your computer during the flash process. This will corrupt the BIOS data. We also recommend that you make a copy of your current BIOS on the bootable floppy so you can reflash it if you need to. (This option is not available when flashing an AMI BIOS).

    2. If you have problems installing your new BIOS please check the following:

    Have you done a clean boot?

    In other words, did you follow the above procedure for making a bootable floppy? This ensures that when booting from "A" there are no device drivers on the diskette. Failing to do a clean boot is the most common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS.

    If you have not used a bootable floppy, insure a clean boot either by

    a) pressing F5 during bootup

    b) by removing all device drivers on the CONFIG.SYS including the HIMEM.SYS. Do this by using the EDIT command.

    Have you booted up under DOS?
    Booting in Windows is another common cause for getting a "Memory Insufficient" error message when attempting to flash a BIOS. Make sure to boot up to DOS with a minimum set of drivers. Important: Booting in DOS does not mean selecting "Restart computer in MS-DOS Mode" from Windows98/95 shutdown menu or going to Prompt mode in WindowsNT, but rather following the above procedure (format a: /s and rebooting from a:\).

    Have you entered the full file name of the flash utility and the BIOS plus its extension?
    Do not forget that often you will need to add a drive letter (a:\) before flashing the BIOS. Example: when asked for file name of new BIOS file which is on your floppy disk, in case you're working from c:\ your will need to type a:\615j900.bin, rather than 615j900.bin only.

    Feb 22, 2008

    Partitioning Your Harddisk With Fdisk

    Partitioning involves creating logical units on your hard drive that are then addressed as different drive letters. Not only does it help to organize your data (program files on one drive, games on another, documents on another) but also to speed up your PC. This is so because the drive head has to move a lesser distance for accessing data within one partition. You can also have different filesystems and OSs on the same hard drive.

    Partitioning can be done using ‘fdisk’ in DOS/Windows 9x or ‘disk management’ in Windows 2000/ NT/XP. We will describe the procedure for fdisk, since disk management is GUI driven and the basics otherwise remain the same. While several other commercial packages like Partition Magic are available, these utilities (fdisk, computer management) are bundled with their respective OSs. You need a bootable floppy with fdisk.exe, format.com, and sys. com utilities. Before starting, decide how many partitions you want to create and their sizes. You can create one primary and one extended partition using the DOS fdisk. The extended partition can then have multiple logical partitions. Boot your machine using the bootable disk, and do the following.

    Run fdisk. The utility will show you a numbered menu from where you can create, view, or delete partitions
    The utility first asks you whether you want to enable large disk support. Type Y (for yes) and press enter if your hard-drive capacity is more than 4 GB. Large disk support creates a FAT32 partition, which can be greater than 2 GB.

    Select the first option from fdisk menu to create a primary partition. Specify the partition size in megabytes or percentage size when prompted for it

    Similarly, create an extended partition. Extended partitions by themselves do not appear as drive letters. Instead, logical partitions must be created in them, which are then assigned drive letters

    Exit fdisk and reboot the computer

    Fdisk automatically assigns drive letters to all the partitions. You’ll need to format each partition in order to use it. Use format.com for the same

    Your hard drive is now ready for taking an OS.

    Feb 21, 2008

    Keyboard, Run, IE, Windows Explorer Shortcut Command

    Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system.

    I use the following keyboard shortcuts every day:

    Windows key + R = Run menu

    This is usually followed by:
    cmd = Command Prompt
    iexplore + "web address" = Internet Explorer
    compmgmt.msc = Computer Management
    dhcpmgmt.msc = DHCP Management
    dnsmgmt.msc = DNS Management
    services.msc = Services
    eventvwr = Event Viewer
    dsa.msc = Active Directory Users and Computers
    dssite.msc = Active Directory Sites and Services
    Windows key + E = Explorer

    ALT + Tab = Switch between windows

    ALT, Space, X = Maximize window

    CTRL + Shift + Esc = Task Manager

    Windows key + Break = System properties

    Windows key + F = Search

    Windows key + D = Hide/Display all windows

    CTRL + C = copy

    CTRL + X = cut

    CTRL + V = paste

    Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


    Keyboard Shortcuts

    [Alt] and [Esc] Switch between running applications

    [Alt] and letter Select menu item by underlined letter

    [Ctrl] and [Esc] Open Program Menu

    [Ctrl] and [F4] Close active document or group windows (does not work with some applications)

    [Alt] and [F4] Quit active application or close current window

    [Alt] and [-] Open Control menu for active document

    Ctrl] Lft., Rt. arrow Move cursor forward or back one word

    Ctrl] Up, Down arrow Move cursor forward or back one paragraph

    [F1] Open Help for active application

    Windows+M Minimize all open windows

    Shift+Windows+M Undo minimize all open windows

    Windows+F1 Open Windows Help

    Windows+Tab Cycle through the Taskbar buttons

    Windows+Break Open the System Properties dialog box




    Accessibility Shortcuts

    Right SHIFT for eight seconds........ Switch FilterKeys on and off.

    Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

    Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

    SHIFT....... five times Switch StickyKeys on and off.

    NUM LOCK...... for five seconds Switch ToggleKeys on and off.


    Explorer Shortcuts

    END....... Display the bottom of the active window.

    HOME....... Display the top of the active window.

    NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

    NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

    NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

    LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

    RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.


    Type the following commands in your Run Box (Windows Key + R) or Start Run

    devmgmt.msc = Device Manager
    msinfo32 = System Information
    cleanmgr = Disk Cleanup
    ntbackup = Backup or Restore Wizard (Windows Backup Utility)
    mmc = Microsoft Management Console
    excel = Microsoft Excel (If Installed)
    msaccess = Microsoft Access (If Installed)
    powerpnt = Microsoft PowerPoint (If Installed)
    winword = Microsoft Word (If Installed)
    frontpg = Microsoft FrontPage (If Installed)
    notepad = Notepad
    wordpad = WordPad
    calc = Calculator
    msmsgs = Windows Messenger
    mspaint = Microsoft Paint
    wmplayer = Windows Media Player
    rstrui = System Restore
    netscp6 = Netscape 6.x
    netscp = Netscape 7.x
    netscape = Netscape 4.x
    waol = America Online
    control = Opens the Control Panel
    control printers = Opens the Printers Dialog


    Internet Browser

    Type in Your address "google", then press
    [CTRL] and [Enter] This will add http://www. and .com to & after the word Google
    [SHIFT] and [Enter] This will add http://www. and .net to & after the word Google (works in firefox, opera etc.)
    [CTRL]+[SHIFT] and [Enter] This will add http://www. and .org to & after the word Google (works in firefox, opera etc.)

    For Windows XP:

    Copy. CTRL+C
    Cut. CTRL+X
    Paste. CTRL+V
    Undo. CTRL+Z
    Delete. DELETE
    Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
    Copy selected item. CTRL while dragging an item
    Create shortcut to selected item. CTRL+SHIFT while dragging an item
    Rename selected item. F2
    Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
    Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
    Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
    Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
    Highlight a block of text. CTRL+SHIFT with any of the arrow keys
    Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
    Select all. CTRL+A
    Search for a file or folder. F3
    View properties for the selected item. ALT+ENTER
    Close the active item, or quit the active program. ALT+F4
    Opens the shortcut menu for the active window. ALT+SPACEBAR
    Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4


    Switch between open items. ALT+TAB
    Cycle through items in the order they were opened. ALT+ESC
    Cycle through screen elements in a window or on the desktop. F6
    Display the Address bar list in My Computer or Windows Explorer. F4
    Display the shortcut menu for the selected item. SHIFT+F10
    Display the System menu for the active window. ALT+SPACEBAR
    Display the Start menu. CTRL+ESC
    Display the corresponding menu. ALT+Underlined letter in a menu name
    Carry out the corresponding command. Underlined letter in a command name on an open menu
    Activate the menu bar in the active program. F10
    Open the next menu to the right, or open a submenu. RIGHT ARROW
    Open the next menu to the left, or close a submenu. LEFT ARROW
    Refresh the active window. F5
    View the folder one level up in My Computer or Windows Explorer. BACKSPACE
    Cancel the current task. ESC
    SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

    Use these keyboard shortcuts for dialog boxes:

    To Press
    Move forward through tabs. CTRL+TAB
    Move backward through tabs. CTRL+SHIFT+TAB
    Move forward through options. TAB
    Move backward through options. SHIFT+TAB
    Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
    Carry out the command for the active option or button. ENTER
    Select or clear the check box if the active option is a check box. SPACEBAR
    Select a button if the active option is a group of option buttons. Arrow keys
    Display Help. F1
    Display the items in the active list. F4
    Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

    If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


    Display or hide the Start menu. WIN Key
    Display the System Properties dialog box. WIN Key+BREAK
    Show the desktop. WIN Key+D
    Minimize all windows. WIN Key+M
    Restores minimized windows. WIN Key+Shift+M
    Open My Computer. WIN Key+E
    Search for a file or folder. WIN Key+F
    Search for computers. CTRL+WIN Key+F
    Display Windows Help. WIN Key+F1
    Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
    Open the Run dialog box. WIN Key+R
    Open Utility Manager. WIN Key+U

    accessibility keyboard shortcuts:

    Switch FilterKeys on and off. Right SHIFT for eight seconds
    Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
    Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
    Switch StickyKeys on and off. SHIFT five times
    Switch ToggleKeys on and off. NUM LOCK for five seconds
    Open Utility Manager. WIN Key+U

    shortcuts you can use with Windows Explorer:


    Display the bottom of the active window. END
    Display the top of the active window. HOME
    Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
    Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
    Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
    Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
    Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW

    Feb 14, 2008

    Guide to avoiding virus infections with wide eyes open

    Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you.


    Types of viruses
    There are many type of viruses. Typical viruses are simply programs or scripts that will do various damage to your computer, such as corrupting files, copying itself into files, slowly deleting all your hard drive etc. This depends on the virus. Most viruses also mail themselves to other people in the address book. This way they spread really fast and appear at others' inboxes as too many people still fall for these. Most viruses will try to convince you to open the attachment, but I have never got one that tricked me. In fact, I found myself emailing people just to make sure they really did send me something. It does not hurt to be safe.


    Worms
    Worms are different type of viruses, but the same idea, but they are usually designed to copy themselves a lot over a network and usually try to eat up as much bandwidth as possible by sending commands to servers to try to get in. The code red worm is a good example of this. This worm breaks in a security hole in Microsoft IIS (Internet Information Server) in which is a badly coded http server that, despite the security risks, a lot of people use it. When the worm successfully gets in, it will try to go into other servers from there. When IceTeks was run on a dedicated server at my house, there was about 10 or so attempts per day, but because we ran Apache, the attempts did not do anything but waste bandwidth and not much as I had it fixed a special way. Some worms such as the SQL slammer will simply send themselves over and over so many times that they will clog up networks, and sometimes all of the internet. Worms usually affect servers more than home users, but again, this depends on what worm it is. It is suspected that most worms are efforts from the RIAA to try to stop piracy, so they try to clog up networks that could contain files. Unfortunately, the RIAA have the authority to do these damages and even if caught, nothing can be done.


    Trojans
    Trojans are another type of virus. They are simply like a server in which enables hackers to get into and control the computer. A trojan such as Subseven can enable a hacker to do various things such as control the mouse, eject the cd-rom drive, delete/download/upload files and much more.


    MBR virues
    Boot sector viruses are another type, they are similar to file viruses, but instead they go in the boot sector and can cause serious damage when the computer is booted, some can easily format your drive simply by booting your computer. These are hard to remove.


    Most viruses have various characteristics. For example, a worm can also be a trojan and also infect the boot sector. It all depends on how the virus is written and what it is designed to do. That's why there are not really strong structured categories, as they can easily mix one in the other.


    Know the potentially dangerous files
    Like any other files, viruses must be opened in order to do something. Most viruses come through e-mail as an attachment. Some will make it look like it's someone you know, and it will try to convince you to open an attachment. Never open attachments at any cost! Some viruses will infect files in programs, so opening a program will actually open the virus, maybe the same one, or another part of it.


    All files have what is called an extension; This is the 3 last letters after the last period. For example, setup.exe has a file extension of .exe.


    Extensions to watch out for are .exe .com .bat .scr .pif .vbs and others, but these are the most seen. .exe .com .bat .pif and .scr are valid extensions for executables. A virus writer will simply rename it to one of these and it will work the same way. .pif is a shortcut to an ms-dos program and will have the ms dos icon, but will still execute whatever code is in it, so an .exe can be renamed to .pif and be run the same way. .bat is a batch file, which can contain instructions to do various file activities, but again, a .exe can be renamed to .bat and it will execute it! .vbs is a visual basic script. For some reason, Microsoft provides this scripting language along with the scripting host to make it more convenient to design and write viruses quickly and easily, I've never seen another use for this scripting language other than for writing viruses. There are programs that are written with that language, but it is compiled into an exe. Exe is the usual extension for programs, you would not have a software CD install a bunch of vbs files all over!


    Bottom line is, if you don't know what a file is just don't open it. Some viruses will sometimes be named a way as to mask the real file extension to make it look like a harmless file such as a image file. This is easily noticed, but can still be missed. Simply don't open unexpected files.


    If you get something that appears like something legit, just ask the person it came from if they sent it. Most viruses use a friend's address to make it look like it comes from them. The virus does this by using the person's address when sending itself to the address book contacts.


    Downloads
    Email is not the only way to get viruses; P2P (file sharing programs such as kazaa, winmx, direct connect etc) is also another way to get viruses.


    When downloading programs, the main thing to watch out for is the file size. If you are downloading a program that you expect to be rather large such as a game, don't grab a file that is 10KB, since it's most likely a virus. However, I've been caught with a virus even with large files, so file size is not the only thing to watch, as an exe is still valid even if junk is added at the end, so a 64KB virus will still function even if it is turned into 650MB.


    Icons are something to look for too, fortunately, virus writers don't take time to put icons. If your download should be a setup file, you should see the icon of a setup file. If it's just the blank icon that typical plain or corrupted exes have, don't open it.


    Another thing to do, which should be obvious, is to scan the file for viruses using updated virus definitions. But don't rely on only your virus scanner, as they are not perfect, and if the virus has not been reported to them yet, they won't know to create a definition for it!


    Changing settings to stay safe
    If you do open a virus, you want to avoid it going to all your friends. The simplest thing to do is to NOT use the windows address book. It is easy for viruses to get through and Microsoft is not doing anything about it. Just don't use it. Put them in spreadsheet or even better write them down somewhere. Don't use the address book.


    Another "feature" to avoid is the auto preview. Some viruses can attempt to open themselves just by opening the email. There are security holes in Microsoft mail programs that allow this. In Microsoft Outlook, click on the view menu and remove auto preview. You need to do this for every folder, but the inbox is most important. In Outlook Express, click on the view menu and go to layout. In the dialog box, you will see a check box for show preview pane. Uncheck it and click ok.


    Another thing you should change, especially if you download a lot, is the option that allows you to view the file extension. In Win98, go in any folder, click on view then folder options and choose the view tab and where it says hide file extension for known types, uncheck it. In win2k, it is the same process, but instead, go in the control panel and open the folder options icon.


    Avoiding server worms
    Some viruses, mostly worms, can exploit through servers and affect other servers from servers that have been infected. A good example is the SQL slammer. This was a worm that affected SQL servers run by Microsoft IIS and Microsoft SQL Server. Once the worm gets in, that particular server starts trying to find more exploitable driving internet connections to a halt in the process. Servers running Apache were unaffected by that, except for the many hits to try to get in. IceTeks received about 100 hits per day when it was run on a dedicated home server. Most hits came from major ISPs and other big websites that had no clue they were still affected.


    The simple solution to avoid these types of viruses is to NOT use Microsoft based server software for your server, especially if it is a public server. The operating system is also crucial, but the actual server software is much more. Apache, which is free, is much more secure than Microsoft based server programs such as IIS. IIS may be easier to understand and administer, but it saves a lot of hassle to learn how to use Apache. IIS has a large number of vulnerabilities, such as the ability to gain access to cmd.exe and basically delete the whole drive by doing a ../ request in the address bar. These don't require viruses, but simply commands, but there are worms written to automatically make these commands. The code red does this.


    Removing a virus
    The best way to do this is to do a clean install. However, depending on how bad the virus is, a simple clean install won't remove it. So to be extra sure, you'll want to do a low level format. This is especially true of you got a boot sector virus, as even repartitioning and formatting won't quite remove it, but sometimes you can get away with an fdisk /mbr, but not all the time. here are various removal tools for viruses, it is good to use them and see if they work, but proceeding with the clean install is recommended. You never know if the virus is completely removed by deleting files you suspect are infected. Some viruses such as the Bugbear will close anti virus programs and other programs to make it hard and annoying to figure out what to do. A clean install is the best way to ensure that it's gone for good.

    Viruses are out there, don't be one of the many infected ones! Stay alert and stay safe! Don't open unexpected files, regularly update your virus definitions and scan downloaded files!

    I hope this article was useful for you!

    Feb 5, 2008

    Virtual Memory Information

    Tutorial Objective

    This tutorial talks about anything about the virtual memory and how much virtual memory you need for your system.

    Tutorial Introduction & Background

    Today application is getting bigger and bigger. Therefore, it requires a bigger system memory in order for the system to hold the application data, instruction, and thread and to load it. The system needs to copy the application data from the HDD into the system memory in order for it to process and execute the data. Once the memory gets filled up with data, the system will stop loading the program. In this case, users need to add more memory onto their system to support that intense application. However, adding more system memory costs the money and the normal user only needs to run the the intense application that requires the memory only for one or two days. Therefore, virtual memory is introduced to solve that type of problem.

    Terminology & Explanation

    There are two types of memory, which are as follows:

    * System Memory is a memory that is used to store the application data and instruction in order for the system to process and execute that application data and instruction. When you install the memory sticks to increase the system RAM, you are adding more system memory. System Memory can be known as either the physical memory or the main memory.

    * Virtual Memory is a memory that uses a portion of HDD space as the memory to store the application data and instruction that the system deemed it doesn't need to process for now. Virtual Memory can be known as the logical memory, and it controls by the Operating System, which is Microsoft Windows. Adding the Virtual Memory can be done in system configuration.


    Tutorial Information & Facts or Implementation

    Virtual Memory is a HDD space that uses some portion of it as the memory. It is used to store application data and instruction that is currently not needed to be process by the system.

    During the program loading process, the system will copy the application data and its instruction from the HDD into the main memory (system memory). Therefore the system can use its resources such as CPU to process and execute it. Once the system memory gets filled up, the system will start moving some of the data and instruction that don't need to process anymore into the Virtual Memory until those data and instruction need to process again. So the system can call the next application data and instruction and copy it into the main memory in order for the system to process the rest and load the program. When the data and instruction that is in the Virtual Memory needs to process again, the system will first check the main memory for its space. If there is space, it will simply swap those into the main memory. If there are not any space left for the main memory, the system will first check the main memory and move any data and instructions that doesn't need to be process into the Virtual Memory. And then swap the data and instruction that need to be process by the system from the Virtual Memory into the main memory.

    Having too low of Virtual Memory size or large Virtual Memory size (meaning the size that is above double of the system memory) is not a good idea. If you set the Virtual Memory too low, then the OS will keep issuing an error message that states either Not enough memory or Virtual too low. This is because some portion of the system memory are used to store the OS Kernel, and it requires to be remain in the main memory all the time. Therefore the system needs to have a space to store the not currently needed process data and instruction when the main memory get filled up. If you set the Virtual Memory size too large to support the intensive application, it is also not a good idea. Because it will create the performance lagging, and even it will take the HDD free space. The system needs to transfer the application data and instruction back and forth between the Virtual Memory and the System Memory. Therefore, that is not a good idea. The ideal size for the Virtual Memory is the default size of Virtual Memory, and it should not be exceed the value of the triple size of system memory.

    To determine how much virtual memory you need, since the user's system contains the different amount of RAM, it is based on the system. By default, the OS will set the appropriate size for Virtual Memory. The default and appropriate size of Virtual Memory is:

    * 1.5 =

    For example, if your system contains 256 MB of RAM, you should set 384 MB for Virtual Memory.

    256 MB of RAM (Main Memory) * 1.5 = 384 MB for Virtual Memory

    If you would like to determine how much the Virtual Memory is for your system and/or would like to configure and add more virtual memory, follow the procedure that is shown below. The following procedure is based on windows XP Professional.

    1-1) Go to right-click My Computer and choose Properties

    1-2) In the System Properties dialog box, go to Advanced tab

    1-3) Click Settings button that is from the Performance frame

    1-4) Once the Performance Options shows up on the screen, go to Advanced tab

    1-5) Under the Advanced tab, click the Change button from the Virtual Memory frame to access to the Virtual Memory setting

    Then the Virtual Memory dialog box appears on the screen. In there, you are able to check how much the Virtual Memory you set. If you would like to modify the size of Virtual Memory, follow the procedure that is shown below.

    2-1) In there, select the drive letter that is used to install the Operating System

    2-2) Choose the option that says, "Custom Size:"

    Once you choose that option, the setting for Initial Size and Maximum Size become available for you to set. Initial Size (MB) means the actual size of Virtual Memory, and Maximum Size (MB) means the maximum size of Virtual Memory that is allowed to use.

    Let's say if your system contains 512 MB of RAM, then the ideal setting for the Virtual Memory is as follows:

    Initial Size (MB): 768
    Maximum Size (MB): 1500

    Once you are happy with that Virtual Memory size, click the Set button from Paging file size for selected drive to apply the setting for the Virtual Memory size. Then click the OK button to apply the setting.

    That's where you can manage and configure for the size of Virtual Memory.

    Additional Information

    * To maintain the good overall system performance, you should be using the default size of actual size for Virtual Memory and the triple the value of the size of the main memory for the maximum size of Virtual Memory. If you find that main memory plus virtual memory is not big enough to load the intensive application, then you will need to add more main memory onto your system.

    Jan 25, 2008

    A step-by-step guide to installing FreeBSD 5

    A step-by-step guide to installing FreeBSD 5. It assumes moderate experience with linux and leaves you with a fully updated FreeBSD system.

    FreeBSD Installation

    A. 5.x vs 4.x
    The first thing to understand about FreeBSD is that there are two lines of development. The -STABLE branch is marked with a 4.x version number and the most recent version is 4.10. It is well tested and very solid, but does not include the most recent technology. The -CURRENT branch, marked with a 5.x version, is the “unstable” branch. However, it is nicely stable at the moment and is coming along quite well. Most users should go with 5.x and these instructions are only valid for that tree.

    NOTE: DragonFlyBSD ( www.dragonflybsd.org ) is a continuation of the 4.x line. It uses lock-less (no mutexes) SMP support and a Light Weight Kernel Threading system. It has a lot of promise and is developing at a breakneck pace, but it should still be thought of as “R/D.”

    B. Getting Media
    I am not going to say much about this. There are links to various ftp mirrors at www.freebsd.org and the directory structure is fairly self-explanatory. There are however several choices for ISO. You should choose the miniinst ISO. It is small and will include everything you need for the base system.

    C. Starting Installation
    After, the CD boots up you will enter the...ahh.....majestic sysinstall. You can safely ignore most of the options and just choose a standard installation. Most of the install process is pretty easy and anyone who has some experience with linux or unix will be able to handle it without much stress. However, creating partitions and dealing with drives will seem very odd to your standard linux user.

    D. Hard Disc Management in FreeBSD
    Ok, the first thing to get used to here is that IDE drives are not hda, hdb...etc. They are ad0, ad1 and so forth. SCSI discs are da0, da1...and so on. There is one other thing that is going to freak some people out. You create slices, not partitions, on the disc and then create partitions within those slices. For example, the first partition in the first slice on the first IDE disc would be ad0s1a. Just accept it.

    E. Partitioning
    Sysinstall will lead you through the partitioning and its fairly easy to understand. The first part will ask you to choose a disc or discs to partition and then will show you a "slice editor." This is where you will create your slice. I advise you to only make one. While multiple slices are easy to deal with, it just adds complication. If this is not your first installation of a BSD type OS, then you can ignore me and why are you reading this again?

    After creating your slice, you will be prompted to choose the drive(s) to install an MBR on. The FreeBSD boot loader is nothing to write home about, but it tends towards working. After this step, you can create partitions. There is not much to say here. At the top of the screen it will show your slice(s) and when one of them is selected you can use the controls to create a partition on it. You will need at least a root and swap partition. On the non-swap partitions it is usually a good idea to enable soft-updates.

    F. Distribution Sets
    This is a simple section, select minimal.

    G. Continue Installation
    The rest of this is pretty simple. Make sure you install from the CD and not the Internet. The bulk of the install is now done. After it copies files to your disc, it will start the configuration process. This is all pretty self-evident, but there are a couple things you should know.

    Network Configuration

    Don't be scared by the names, in *BSD devices are named after their drivers. There is also a short description after the name, so you should be able to choose the right one. The rest of the network config is easy, just follow the prompts.

    System Console Configuration

    You can pretty much ignore this, you may want to look around for your own knowledge and of course you could pick a nice screen saver here, but other then that I would leave it alone for now.

    Time Zone

    All I have to say here is that if you live in the US, after you choose “America – North and South” hit the end key. The US is at the bottom of the list and hitting end is the quickest way there.

    Linux

    Say no, we will do this later and with an updated linux_base.

    Mouse
    OK, welcome to the wonderful and amazing world of moused. Answer the first question truthfully, and then you can tweak the settings in the “Please configure your mouse” dialog. Whatever you do, be sure to enable the daemon. Also, for most users that is all you will have to do. You can safely ignore the other options.

    Package Installation

    At this point, the installer will ask you to install binary packages. Say no. These binaries are out of date and not included on our CD.

    Of users and roots

    This isn't the most thrilling section, add a user when it asks you to and set a root password after that. The only thing I have to say about this process is when the new user dialog comes up leave the “Group:” box unchanged and add “wheel” to the Member groups. You also might want to set your shell to /bin/tcsh. As for setting the root password, if you can't handle that we have bigger problems.

    Rebooting

    Ok, next it will ask if you would like to visit the general config area. Select no and you will be brought back to the main menu. Exit the install, reboot without the CD in and enjoy the boot messages.

    H. The Real Post-Install
    At this point, I am going to assume that you are now looking at a login prompt and thinking “my my...FreeBSD boots quite quickly doesn't it.” Well, our task is not done yet...there is a reason we did a minimal install. We are going to do most of it ourselves. First, lets upgrade to -CURRENT. This isn't a practice I would usually recommend, but 5.x is close to being tagged stable and -CURRENT is rather solid at the moment. First, I need to explain how things are done in the BSD world.

    Sup?

    CVS up; you up; we all CVSUP. Cvsup is a very interesting program that I am not going to explain in detail here. All you really need to know is that it updates source trees. You see, that is the thing. You may be used to /usr/src not doing much. In BSD it has a job, it holds the source for the entire base system. However, we did a minimal install and no source is there. It wouldn't be up2date anyway. So, lets fix that. Login as root and type the following: pkg_add -r cvsup-without-gui

    pkg_add is the binary installer for FreeBSD and the -r argument tells it to fetch binaries from the net. It will also fetch any deps that you might need. Switch to another console while this is happening and login as root. Do the following:

    cd /etc

    cp /usr/share/examples/etc/make.conf /etc/make.conf

    cp /usr/share/examples/cvsup/standard-supfile /usr

    cp /usr/share/examples/cvsup/ports-supfile /usr

    chmod u+w /etc/make.conf /usr/standard-supfile /usr/ports-supfile

    What was that? Well here is the rundown. Make.conf is the file that controls the building of programs from source on FreeBSD and the supfiles tell cvsup where to get the source for the base system and the ports system, also where to put said source. They come out of /usr/share/examples without the write bit set and that gets annoying. So we set that. Now switch back to the first console and type rehash. This tells tcsh to check its path for new programs. Now, edit the standard supfile that is in /usr. You can either use ee or vi. I like vi. Scroll down to the line that looks a bit odd. It will be something like:

    *default host=CHANGE_THIS.FreeBSD.org

    The “CHANGE_THIS” is where you put what cvsup server to use. Choose a number between 1 and 9, like 4, and put cvsup4 where CHANGE_THIS is. So it would end up being:

    *default host=cvsup4.FreeBSD.org

    Now exit your editor and run cvsup /usr/standard-supfile

    If everything goes correctly, you will see a lot of text scrolling on the screen. If it says something about a bad connection, try another number.

    Make.conf

    Now 'tis the time for all good men (and women) to edit their make.conf . This is not difficult, in fact have a look around the file. It may be long, but it is pretty simple. Now, uncomment the CPU setting and the CFLAGS setting. Set the CPU to your CPU (there will be a list in the comments above the setting) and set the CFLAGS to -O2. (NOTE: If the base system fails to build, downgrade your CFLAGS back to -O).

    Build Your World

    When CVSUP finishes (it will be awhile...go get some coffee), cd to /usr/src and run make buildworld. That command will do exactly what it sounds like. It builds your world, or base system. While its doing that, lets get you a kernel. First, cd to /usr/src/sys/i386/conf then cp GENERIC to some file of your choosing. Any name you want. However, be aware that this is going to show up in a uname -a. Now, crack open your new file and take a look at what a FreeBSD kernel config is like. There are many things you can do here that will improve performance and subtract in size. However, lets keep it simple. Near the top of the file will be the name GENERIC. Change that to your new name. You can now look through the file and you will find several sections that are just for debugging. These will indeed add size and slow down the kernel a bit, but I would leave them for now. Go to the end of the file and make a new line. Add the following:

    device pcm

    This will add sound support to the kernel. Be aware that you don't need to do this, you can load binary modules at boot or after boot, but this way is easy and sound is used often. Save the file and exit. Go back to your buildworld console and when its done execute make buildkernel KERNCONF=YOUR_KERNEL_CONFIG_NAME

    NOTE: NOT THE PATH OF THE KERNEL CONFIG..it knows to look in /usr/src/sys/i386/conf

    Installing Your World

    This isn't that difficult. First run make installkernel KERNCONF= your config name. Now here is the interesting part. Run mergemaster -p, this program looks through your etc and updates it to match the new /etc in /usr/src. It will display changed files to you, press q and it will give you options. Something like i (install), m (merge) etc. Pick merge and it will open a nice little screen that shows you one file on the right and one on the left. It will go section by section, showing the areas that have changed. Press r or l to choose which section to keep. Its pretty easy to see which section has new stuff and which does not. After the merge, it will prompt you with options for the newly merged file. One of these will be install and this is the one you want. In the latest current, most of what you will be showed is user and group files. Make sure you do select the sections with the new users and groups. After this is done, it will ask you a couple questions that you can say yes to. Now that your /etc is updated run make installworld then reboot.

    NOTE: You usually don't need to run mergemaster. However, 5.2.1 is a pretty old release and -CURRENT has come a long way.


    I. Ports

    Welcome to running current. The rest is easy. cd back to /usr and edit the ports supfile the same way you did the standard one. Run cvsup on it and wait. After its done, you will have a full ports tree. There is not much left to say. You now have a working system and a fully updated one too. To install software from ports cd to /usr/ports/category/softwarename/ and run make install clean . If you want linux binary support, install the linux_base port. To find where it is cd to /usr/ports and run make search name=linux_base | less . Enable loading the kernel modules for linux binary support by editing /etc/rc.conf. Just add the line linux_enable="YES" to the file and your set. If this is a desktop system, I would recommend installing /usr/ports/x11/xorg and your choice of /usr/ports/x11/gnome2 or kde3. Have fun .

    Get it from:

    http://www.madpenguin.org/cms/?m=show&id=1853

    Jan 21, 2008

    OverBurning - Data Capacity of CDs

    Abstract
    You can fit on a S/VCD without overburning:
    - approx. 735 MB of MPEG data onto a 74min/650MB disc
    - approx. 795 MB of MPEG data onto an 80min/700MB disc

    You can fit on a CD-ROM without overburning:
    - approx. 650 MB of data onto a 74min/650MB disc
    - approx. 703 MB of data onto an 80min/700MB disc

    ----------------------------------------------------------------

    Introduction
    Let us ignore for now the terms of megabyte for CD capacity and try to understand how the data is stored on a CD.

    As well all know, the data is stored digitally as binary data. This means, however the actual information is actually kept on the disc, this information is in the form of "1"s and "0"s. Physically, the information on a CD is as pits on a thin sheet of metal (aluminium).

    An a CD-R disc, the data is physically on an organic dye layer which simulates the metal layer on a real pressed CD.

    ----------------------------------------------------------------

    How is the information structured
    Now, on the CD, the information isn't just organised from beginning to end willy-nilly. Otherwise, it would be really hard to find a useful piece of information on the CD.

    Rather, the information is organised in sectors. Consider a sector as like a page in a book. Just like you are able to quickly find something in a book if you know the page number, you can quickly find something on a CD if you know the sector number.

    Now, remember that the CD was original made to hold audio data. It was decided, that the CD would would 75 sectors per second of audio. Although I cannot guess where this number comes from, it is quite appropriate for the audio CD. It means that you can "seek" an audio CD accurately to 1/75th of a second -- which is more than enough for consumer purposes.

    Now, with this in mind, we can work out the total data capacity of user data for 1 sector.

    ----------------------------------------------------------------

    The total data capacity of user data of 1 sector on a CD
    CD audio uses uncompressed PCM stereo audio, 16-bit resolution sampled at 44.1 kHz.

    Thus 1 second of audio contains:
    16 bits/channel * 2 channels * 44100 samples/second * 1 second
    = 1411200 bits
    = 176400 bytes

    Since there are 75 sectors per second
    1 sector
    = 176400 bytes / 75
    = 2352 bytes

    One sector on a CD contains 2352 bytes max.

    ----------------------------------------------------------------

    The concept of different MODES and FORMS of burning
    Now, audio CD was well and good, but the medium would become much more useful if you could store other data on the disc as well. This became to be know as CD-ROM of course.

    Now, the audio-CD uses the ENTIRE sector for audio data.

    However, for CD-ROMs this caused a problem. Simply, CDs and the CD reading mechanisms were not 100% faultless. That is, errors (indeed frequent errors) could be made during the reading. For audio CDs, this does not matter as much as you could simply interpolate from the adjacent audio samples. This will obviously NOT DO for data CDs. A single bit error could lead to a program being unexecutable or ruin an achive file.

    Thus, for CD-ROMs, part of each sector is devoted to error correction codes and error detection codes. The CD-R FAQ has the details, but in effect, only 2048 bytes out of a total of 2352 bytes in each sector is available for user data on a data CD.

    This burning mode is either MODE1 or MODE2 Form1.

    ----------------------------------------------------------------

    MODE2 Form2 sectors of VCDs and SVCDs
    Now, for VCDs and SVCDs, the video tracks do not necessarily require the robust error correction as normal data on a CD-ROM. However, there is still some overhead per sector that is used for something other than video data (e.g., sync headers).

    S/VCDs video tracks are burnt in what is called MODE2 Form2 sectors. In this mode, only 2324 bytes out of a total of 2352 bytes in each sector is available for user data.

    This is MUCH MORE than for CD-ROMs, but still less per sector than audio CD.

    ----------------------------------------------------------------

    The disc capacities of CD-ROMs, audio-CDs and VCDs
    Now, obviously what ultimately determines the capacity of a disc is the total number of sectors it contains. This is similar to the total number of pages in a blank exercise book (if you recall the book analogy).

    The secondary determinant is the burning mode of the disc.

    For audio CDs, it is as if you could fill each page from top to bottom with audio data as the entire sector is used for audio data.

    For CD-ROMs, it is as if you need to first rule a margin and then leave the bottom part of each page for footnotes (headers + ECC + EDC). The amount of text you can actually write per page is then less due to these other constraints.

    For S/VCDs, we still need to rule a margin on the page, but we don't have to worry about the footnotes (headers). We can fit MORE text than a CD-ROM, but less than an audio-CD.

    Now remember, 1 second on a CD = 75 sectors.

    Thus:
    - 74 min CD = 333,000 sectors
    - 80 min CD = 360,000 sectors


    Data capacity in Mb for an audio-CD
    74 min
    = 333,000 sectors * 2352 bytes / sector
    = 783216000 bytes
    = 746.9 Mb

    80 min
    = 360,000 sectors * 2352 bytes / sector
    = 846720000 bytes
    = 807.5 Mb


    Data capacity in Mb for a CD-ROM
    74 min
    = 333,000 sectors * 2048 bytes / sector
    = 681984000 bytes
    = 650.4 Mb

    80 min
    = 360,000 sectors * 2048 bytes / sector
    = 737280000 bytes
    = 703.1 Mb


    Data capacity in Mb for a S/VCD
    74 min
    = 333,000 sectors * 2324 bytes / sector
    = 773892000 bytes
    = 738.0 Mb

    80 min
    = 360,000 sectors * 2324 bytes / sector
    = 836640000 bytes
    = 797.9 Mb

    ----------------------------------------------------------------

    Conclusions
    As you can see, the often quoted capacities of 650MB and 700MB refer to CD-ROM capacities.

    Due to the fact that S/VCDs use a different burning mode where MORE of each sector is available as user data, the relatively capacities are HIGHER.

    Now, since S/VCDs are not composed of PURELY video tracks and have some unavoidable overheads, the actually total capacity left for video tracks is a few Mb less for each disc (about 735 Mb for 74min discs and 795 Mb for 80min discs). This is where the often quoted capacities of 740MB and 800MB come from. They are quite accurate.

    All these capacities are available BEFORE overburning. Overburning is where you burn MORE sectors than the disc is rated for. If you overburn, you can typically achieve about 1-2 minutes of additional capacity (depending on your drive and media).
    Google