Git Daily Usage and Branching Model

What is Git Git is a distributed revision control system with an emphasis on speed. Git was initially designed and developed by Linus Torvalds for Linux kernel development. Every Git working directory is a full-fledged repository with complete history and full revision tracking capabilities, not dependent on network access or a central server. The central repository holds two main branches and a number of feature branches: master: The main branch where the source code of HEAD always reflects a state with the latest delivered development changes for the next release....

July 8, 2010

Garmin Map Updates And Linux

I have tried to update my Garmin nüvi 760 GPS Navigator, however Garmin’s updater mechanism, Garmin Map Updates doesn’t work on Linux. However after some research on the net, I found two other ways to the maps on my device: Buy & Download Download MapSource from Garmin and then create a map-file named GMAPPROM.IMG containing the maps needed. Download or buy an unlocked map IMG. Upload to GPS Device After creating or buying the map update, then the following procedure can be used to transfer the maps to the device...

July 4, 2010

Garmin Nuvi: Hidden Information on Speed, Location, Elevation and Satellite Signals

On most Garmin devices (the nüvi series) you are able to press the satellite strength bars (top left corner) for about 2 seconds in order to view the Satellite Screen. Satellite Screen: Information on Speed, Location, Elevation and Satalite Signals.

July 4, 2010

How to Update Firmware On Most Garmin Devices

Updating your Garmin nüvi GPS unit software just got easier. Use WebUpdater to automatically keep your operating software current. The Garmin WebUpdater can be downloaded from Garmin. If you need to update your software / firmware from Linux, you can actually extract the downloaded exe and upload the unit software / firmware update file (e.g. called GUPDATE.GCD) manually to the device. The Garmin Firmware downloads are available from Garmin.

July 4, 2010

View The Contents Of A Certificate Signing Request (CSR)

OpenSSL is a very powerful cryptography utility, perhaps a little too powerful for the average user. With all the different command line options, it can be a daunting task figuring out how to do exactly what you want to do. Reading the contents of a certificate signing request (CSR) is one of the common tasks that OpenSSL is useful for. What is a Certificate Signing Requests (CSR) Certificate Signing Requests (CSR) are sent to a Certificate Authority (CA) to be signed....

July 4, 2010

How to: Crack Password Encrypted Zip Files

fcrackzip is a zip-file encryption cracker, which can handle (recover / crack / hack) any password encrypted zipfile. Inside it uses a number of methods to accomplish the crack, but this happens nicely behind the scenes. Install and fcrackzip on Ubuntu by typing: cc@zeus:~$ sudo aptitude install fcrackzip Use the fcrackzip for password cracking on Ubuntu by typing: cc@zeus:~/Desktop$ fcrackzip -v -b -p aaaa -u cuda_dxtc.pdf.zip found file 'cuda_dxtc.pdf', (size cp/uc 244965/294438, flags 9, chk a5d3) checking pw rUt~ PASSWORD FOUND!...

April 17, 2010

Crack Password Protected PDF With pdfcrack

PDFCrack is a GNU/Linux application (or any other POSIX-compatible system) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. PDFCrack is released under GPL. Install and pdfcrack on Ubuntu by typing: cc@zeus:~$ sudo aptitude install pdfcrack Run a quick cracking power benchmark: cc@zeus:~/Desktop$ pdfcrack -b Benchmark: Average Speed (calls / second): MD5: 1728972.6 MD5_50 (fast): 97879.3 MD5_50 (slow): 69167.0 RC4 (40, static): 606555....

April 17, 2010

MySQL: Identify The Worst Performing Indexes

This script shows the Top 10 worst performing indexes (in terms of selectivity %) on the whole MySQL server instance. Selectivity is the percentage of distinct values in an indexed field compared to the number of records in the table. When constructing indexes, you want to create indexes on columns that have a good chance of “high selectivity”. This requires some understanding of the data in the column, which you may or may not have depending on your knowledge of the domain and the availability of sample data....

April 16, 2010

How to Hack a Wireless Network

WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other, but from outsiders), hence the name WEP. Despite the intention, several serious weaknesses were identified by cryptanalysts over the last years. The severity of the weaknesses means that any WEP protected network can be cracked using the right software within two minutes or less. WEP was superseded by Wi-Fi Protected Access (also known as WPA) in 2003, and then by the full IEEE 802....

April 3, 2010