Mac Tips
UserpicHow to Reset Mac Printing Service
Posted by Moxietype

If you get the server error message such as:

  • (Mac OS X 10.2) "An error occurred while trying to add the selected printers. Error 1282"
  • (Mac OS X 10.3, 10.4) "server-error-service-unavailable."

You might need to reset the system. Follow these easy steps:

Read the rest of this story »


Tech Buzz
UserpicReverse Image Search With TinEye
Posted by Moxietype

TinEye is an image search engine. You give TinEye an image and it'll find it on the web for you. TinEye analyzes image attributes and compares fingerprints of every single image in the TinEye Search Index. However, keep in mind that TinEye is a new Web search engine and they didn't have the time to index all the images on the Web yet. I found over 500 sites containing variations of the image.

TinEye is the first image search engine on the web to use image identification technology. Given an image to search for, TinEye tells you where and how that image appears all over the web — even if it has been modified.

Just as you are familiar with entering text in a regular search engine such as Google to find web pages that contain that text, TinEye lets you submit an image to find web pages that contain that image.

Every day TinEye's spiders crawl the web for additional images. Using sophisticated pattern recognition algorithms, TinEye creates a unique and compact digital signature or 'fingerprint' for each one and adds it to the index.


Ever wanted to get rid of your Web Hosting Company? Good news! You can set up UNIX server right at your home or in your office if you have static IP address and high speed internet connection. Below are steps and links to the original instructions. I can't vouch for them as I am still looking for an old PC to pull it off.

Read the rest of this story »


Security, Social Web
UserpicPower.com is blocked from accessing Facebook
Posted by Moxietype

It appears that it is much easier to rely on the content generated by the other sites than create their own. In this case I will agree with the Facebook.

Power.com asks users to provide their user names and passwords for social networks. It then accesses those outside sites as if it were the user, and allows the user to view the other site’s pages without actually visiting it.

Facebook blocked access to its site from Power.com, which “deliberately circumvented Facebook’s technological security measures in order to continue its unlawful practice of accessing Facebook’s computer systems without authorization,” the complaint stated.

Read the article on NYT.


Tech Buzz
UserpicPassive Houses Actively Save Energy
Posted by Moxietype

Passive House
Photo: prefabricated WeberHaus

There are now about 15,000 passive houses built around the world, with the majority in German-speaking countries and Scandinavia. It costs only about 5 to 7 percent more to build than conventional houses. Passive Houses get all the heat and hot water they need from the amount of energy that would be needed to run a hair dryer.

Decades ago, attempts at creating sealed solar-heated homes failed, because of stagnant air and mold. But new passive houses use an ingenious central ventilation system. The warm air going out passes side by side with clean, cold air coming in, exchanging heat with 90 percent efficiency.

Read No Furnaces but Heat Aplenty in ‘Passive Houses’

Related  WeberHaus

1 comment 1 comment ( 1125 views )

The Google Metadata Web Authoring Statistics might be a bit outdated in a sense that Google pays more attention today to meta description element than it did when the article was written and totally disregards meta keywords element but it is still worth reading about the common mistakes.

The http-equiv values pragma and expires are attempts at bypassing caches without having to set the HTTP headers correctly. These are probably unnecessary uses; any scenario where there is a legitimate reason to limit caching, the author is going to have enough control over the server to send the appropriate headers. In addition, the meta tags can't be considered reliable (e.g. proxies and transparent caches aren't going to honour them).

The distribution value is supposedly used to control who can access the document. Search engine "optimisers" tell people to set it to "global" to ensure that search engines index their pages.


Google Tech Talks June 21, 2007

How to extent media wiki environment with semantic aspects and how to provide natural language interfaces for varying knowledge bases.


From what I can tell it is not a real bug but a regression that's part of a new feature RichResults. The browsing history does not erase RichResults anymore. If you don't want RichResults keep track of where you went, in Firefox you need to enter

about:config
and then scroll down to:
browser.urlbar.maxRichResults
and change the default.
The default setting is 12 and if you want nothing, you enter 0.

Refusal of the "RichResults" to obey the "Clear Private Data" command presents a significant privacy issue in Firefox 3. Read a message board on Ubuntu dedicated to this issue.


Did you ever wonder why WordPress out-of-the-box is not Search Engine Optimized and All in One Search Engine Optimization Plug-in is inadequate? Below is the explanation that WordPress provides:

Read the rest of this story »


Advertising, Tech Buzz
UserpicApple ditches Macworld Expo
Posted by Moxietype

This January will be Apple's last presentation at the Macworld and CEO Steve Jobs will not appear. Industry events like Macworld Expo have been losing their luster inside Apple for some time.

Read the rest of this story »


Chair with different size legs

"There's one leg shorter than the other ones; you can fix it with a few packets of sugar."

A Chair for a Talking Head

"It's very, very low so there's only your head at the table."

These are a couple of my favorites. Check out the rest of the catalog of chairs from the Secrets of Efficient Meeting Collection.

3 comments 3 comments ( 1274 views )

Gibson Research Corporation writes on Ultra High Security Password Generator:

Since there is no "output from the previous encryption" to be used during the encryption of the first block, the switch shown in the diagram above is used to supply a 128-bit "Initialization Vector" (which is just 128-bits of secret random data) for the XOR-mixing of the first counter value. Thus, the first encryption is performed on a mixture of the 128-bit counter and the "Initialization Vector" value, and subsequent encryptions are performed on the mixture of the incrementing counter and the previous encrypted result.

 The result of the combination of the 256-bit Rijndael/AES secret key, the unknowable (therefore secret) present value of the 128-bit monotonically incrementing counter, and the 128-bit secret Initialization Vector (IV) is 512-bits of secret data providing extremely high security for the generation of this page's "perfect passwords". No one is going to figure out what passwords you have just received.

Make sure to write the generated password down. Cool


Tech Buzz
UserpicMathematica 7 from Wolfram Research
Posted by Moxietype

Cross-site scripting (XSS) is a security vulnerability of dynamic Web pages generated from information supplied to the web server and replayed as part of the response to the browser. In an XSS attack, a malicious user can create a specially crafted link to inject unwanted executable script or code (usually JavaScript) into a Web site. When an unsuspecting victim clicks the link, the malicious piece of JavaScript can then send the victims’ cookie away to a CGI script.

A full security review usually involves more than just seeking out XSS vulnerabilities; it also involves overall threat modeling, testing for overflows, information disclosure, error handling, SQL injection, authentication, and authorization bugs.

Read the rest of this story »


In order to change the administrator, known in Unix as "root", password you will need a copy of Mac OS X Install disk. If you don't have the original disk, buy another one or call Apple (1-800-SOS-APPL) and ask for a replacement boot disk.

Once you have an install disk, double click on the Install Mac OS icon and you'll get a window with a restart button. Click on it, and your Mac will restart and go to the installation process.

You don't need to install the OS again! Click through windows until you get the regular set of choices on the menu bar. One of those menus is Utilities and one of the choices on that menu is Reset Password.

Change your password and choose Quit from the Installer.

Next time you start your computer you know your admin password.

Note: your admin password is only of limited security because anyone with an OS install disk can restart and reset your root password without knowing your existing password.

pw.gifHow to reset Mac OS X Admin Root password by using sudo command


Privacy
UserpicSurf the Web via Proxy on Mac OS
Posted by Moxietype

About Proxify Anonymous Surfing

A web-based anonymous proxy service which allows anyone to surf the web privately and securely. The Proxify widget provides easy access to the Proxify service, directly from your Dashboard.

Proxify hides your IP address and our encrypted connection prevents monitoring of your network traffic. Once using Proxify, you can surf normally and forget that it is there, protecting you.

System Requirements: Mac OS X 10.4 or later


Social Web
UserpicBroken Windows Theory of Social Behavior
Posted by Moxietype

The Economist reports that Dr Kelling's controversial "broken windows theory" of social behavior is correct.

A PLACE that is covered in graffiti and festooned with rubbish makes people feel uneasy. And with good reason, according to a group of researchers in the Netherlands. Kees Keizer and his colleagues at the University of Groningen deliberately created such settings as a part of a series of experiments designed to discover if signs of vandalism, litter and low-level lawbreaking could change the way people behave. They found that they could, by a lot: doubling the number who are prepared to litter and steal.

Read more on how Broken Windows theory applies to social behavior online.


In this video interview, long-time online community expert Randy Farmer talks about the broken windows theory and its application to online spaces. He talks about building an online community culture, moderation, quality of service and trolls.


Forgetting the root password on Mac can feel like a disaster but you can easily recover it using a sudo command if you have the password to an administrator's account on the system.

Open a terminal window and type:

sudo passwd root

You will be prompted for your password (the password to the administrator's account). After that you will be prompted for the new root password twice.

The sudo command is a great tool to control who can do what on a system. In this scenario the sudo command allows you after authentication with the user password to run a command as if you were root. The command passwd root is the command to change the password for the root user.

Update 01/16/08 How to reset lost root password by switching to single-user mode (Command-S) known as command line interface in Unix. (Suggested in user comments.)

Reed more on how to change your lost root password with an Install Disk.

3 comments 3 comments ( 1510 views )

The latest update* to Moxietype Content Management System is the custom Meta Description field for every entry. Meta Description will not be posted on your page but included as Meta Description tag on the Source Page for every individual URL of your content.

If the meta description is place, and the term(s) searched are within the description, then the meta description will appear in the snippet. If there is no meta description tags, then the text around the terms within the body of the content will be displayed in the snippet.

Read the rest of this story »

1 comment 1 comment ( 1222 views )