Thursday, December 6, 2012

Make iPhone ringtone in iTunes 10

  • Launch iTunes 10
  • Find and select the song you want to make a ringtone
  • Right-click on the song name and select Get Info, then click on the Options tab
  • Select the playback period of the song that you want to ringtone to be, make sure it’s 30 seconds
  • Click “OK” and then right click on the song again, select Create AAC version to create a new version of the song with the 30 second interval you specified
  • Locate this newly created 30 second clip in iTunes (at the top of the playlist if you search by ‘date added’ and right click on the file and then select “Show in Finder”
  • In the Finder (or Windows explorer, the process is the same for Windows iTunes 10), rename the file extension from .m4a to .m4r
  • Accept the file extension change to .m4r
  • Now back in iTunes, remove the file from the playlist (do NOT move to Trash, select ‘keep file’) and then re-import the file into iTunes 10 by double clicking the .m4r file within the Finder or Windows
  • The file will now be added back into iTunes as a ringtone
Source

Better instructions

Friday, November 23, 2012

Firefox Personas preview not working

If you find that when you hover your cursor over a persona and find the preview not working, check that you have Java enabled in Plugins under Add-ons Manager. If you have Java enabled but still cannot preview a persona, add this URL https://www.getpersonas.com/en-US/ to the Exceptions list > Tools > Options > Security > click the Exceptions button next to Warn me when sites try to install add-ons. You should be able to preview personas now.

Saturday, August 4, 2012

Configure Firefox plug-ins to load only when clicked

Type about:config in the firefox address bar. When you get the warning prompt, click the I'll be careful, I promise
Scroll down or search plugins.click_to_play preference
Double click on it to turn the Value to True
Now when you visit a website and see the plug-in block, just click on it to play

For more info and explanation why we enable this option here

Wednesday, January 18, 2012

Can't download Android apps from Market?

Tip from Andrew Kameka: if you suddenly can't download any apps from the Android market, it's probably GTalk to blame - the "talk" app on your android phone.

Launch your "talk" app > sign out, then relaunch the app
Go to your market and try to download apps. They should start downloading.

Source

Sunday, September 19, 2010

Fix "line in use" problem in cordless phones

This problem happened to my Panasonic cordless phone set (kx-tga631ct). The display of all handsets showed "line in use" even though no phone was being used (all placed in the charger).

The first step in troubleshooting is to test your phone line with a corded phone to see if you get a dial-tone out of it. If you don't have a corded phone, borrow it from somebody or buy one. It's cheap and good to have. If you get the dial tone out of your corded phone, then your line is OK. Try with the fix for your cordless below.

Note: The fix below might work with other cordless sets.

1. Unplug the power adapters of all of the handsets
2. Take out the batteries in each handset
3. Let them sit for at least 12 hours to allow the internal memory to be completely clear out. (I let mine sit for 15 or 16 hours over night. I have read on the Net, and some people reported that they had tried the fix but it didn't work. That's probably because they did not leave them out long enough to clear the memory.)
4. After 12 hours or more, plug in the power adapter of the main handset, then put its batteries back in. Try with the main handset first, that's what it is.

Once the display comes up, see if you still get "line in use" message. Just place your phone back in the charger. If you do not see "line in use" anymore, all is good. Otherwise, guess it's time to buy a new set :)

Friday, July 30, 2010

Attacking the edges of secure Internet traffic (Associated Press)

Researchers have uncovered new ways that criminals can spy on Internet users even if they're using secure connections to banks, online retailers or other sensitive Web sites.

The attacks demonstrated at the Black Hat conference here show how determined hackers can sniff around the edges of encrypted Internet traffic to pick up clues about what their targets are up to.

It's like tapping a telephone conversation and hearing muffled voices that hint at the tone of the conversation.

The problem lies in the way Web browsers handle Secure Sockets Layer, or SSL, encryption technology, according to Robert Hansen and Josh Sokol, who spoke to a packed room of several hundred security experts.

Encryption forms a kind of tunnel between a browser and a website's servers. It scrambles data so it's indecipherable to prying eyes.

SSL is widely used on sites trafficking in sensitive information, such as credit card numbers, and its presence is shown as a padlock in the browser's address bar.

SSL is a widely attacked technology, but the approach by Mr. Hansen and Mr. Sokol wasn't to break it. They wanted to see instead what they could learn from what are essentially the breadcrumbs from people's secure Internet surfing that browsers leave behind and that skilled hackers can follow.

Their attacks would yield all sorts of information. It could be relatively minor, such as browser settings or the number of Web pages visited. It could be quite substantial, including whether someone is vulnerable to having the “cookies” that store usernames and passwords misappropriated by hackers to log into secure sites.

Mr. Hansen said all major browsers are affected by at least some of the issues.

“This points to a larger problem — we need to reconsider how we do electronic commerce,” he said in an interview before the conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

For the average Internet user, the research reinforces the importance of being careful on public Wi-Fi networks, where an attacker could plant himself in a position to look at your traffic. For the attacks to work, the attacker must first have access to the victim's network.

Mr. Hansen and Mr. Sokol outlined two dozen problems they found. They acknowledged attacks using those weaknesses would be hard to pull off.

The vulnerabilities arise out of the fact people can surf the Internet with multiple tabs open in their browsers at the same time, and that unsecured traffic in one tab can affect secure traffic in another tab, said Hansen, chief executive of consulting firm SecTheory. Mr. Sokol is a security manager at National Instruments Corp.

Their talk isn't the first time researchers have looked at ways to scour secure Internet traffic for clues about what's happening behind the curtain of encryption. It does expand on existing research in key ways, though.

“Nobody's getting hacked with this tomorrow, but it's innovative research,” said Jon Miller, an SSL expert who wasn't involved in the research.

Mr. Miller, director of Accuvant Labs, praised Mr. Hansen and Mr. Sokol for taking a different approach to attacking SSL.

“Everybody's knocking on the front door, and this is, ‘let's take a look at the windows,“’ he said. “I never would have thought about doing something like this in a million years. I would have thought it would be a waste of time. It's neat because it's a little different.”

Another popular talk at Black Hat concerned a new attack affecting potentially millions of home routers. The attack could be used to launch the kinds of attacks described by Hansen and Sokol.

Researcher Craig Heffner examined 30 different types of home routers from companies including Actiontec Electronics Inc. and Cisco Systems Inc.’s Linksys and found that more than half of them were vulnerable to his attack.

He tricked Web browsers that use those routers into letting him access administrative menus that only the routers' owners should be able to see. Heffner said the vulnerability is in the browsers and illustrates a larger security problem involving how browsers determine that the sites they visit are trustworthy.

The caveat is he has to first trick someone into visiting a malicious site, and it helps if the victim hasn't changed the router's default password.

Still: “Once you're on the router, you're invisible — you can do all kinds of things,” such as controlling where the victim goes on the Internet, Heffner said.

-------------------
Jordan Robertson
Las Vegas — The Associated Press
Published on Friday, Jul. 30, 2010 8:47AM EDT

Sunday, July 4, 2010

Fix UNMOUNTABLE_BOOT_VOLUME Blue Screen


If you encounter this BSoD Stop error in Windows XP, and if you have your Windows CD:
1. Boot your pc with the Windows XP CD, and choose Recovery Console.
2. Make sure you know which drive letter (ie: partition) your Windows resides on. Normally it's drive C:
3. Type at the command prompt C:\>chkdsk C: /r to repair bad sector & file system. Wait for check disk to complete the task.
4. Type at the prompt C:\>fixboot . It will ask "Are you sure you want to write a new boot sector?" Type Y then press Enter. Wait for the task to be completed.
5. Type Exit at the C:\> prompt and reboot your pc. It should work now.

You can refer to this article kb297185 if you need more detail.