Imageshack became to slow / problematic. I will try moving away from it.

Hi all.

I have been using Imageshack for over 2 years now. I have stored over a 1000 images with them. I was using them because they were good. Really good.

Recently however I have noticed few major problems with them:

A) Lastpass incompatibility.
B) Several PCLinuxOS forum users have reported “frogs” instead of a picture.
C) You can no longer store .gif images when using free or even registered account. Only premium users can do so.
D) Loading speed of the image is getting worse every single day.
E) Imageshack Firefox addon is incompatible with Firefox 4… Plus it’s designed for Windows and Mac only.
F) You do not get access to the direct link of the image unless You register…
G) Deleting image takes an hour (it’s being queued for deletion…)
H) Account access is next to impossible when their servers are congested which lately means all the time.
I) I will add more of them once I can recall them ;).

Those are the main reasons why from now on I will no longer use Imageshack services to store my images. I have a beautiful domain AndrzejL.Cyryl.Net that I got from my buddy Cyryl. Blog images have been moved there already. However I can’t delete my IS account just like that. There is over 950 images on the imageshack used somewhere on the PCLinuxOS Forum and other places allover the internet. I will have to delete some of the useless images first. Then save the images that I want to keep to the hdd and then send them to the AndrzejL.Cyryl.Net. After that – I will have to redo all my posts and change links to the images… That’s the plan. Will I actually do it? Time will tell. One thing is for sure. From now on – none of my images goes to Imageshack.

Thanks Imageshack. Farewell old Friend. We had a good run You and I.

Regards.

Andy

Back to the roots – Diablo – Final fight [Video]

Hi all.

I got bored few days ago and I have decided to fire up one of the first games that ever bought. Diablo I.

To make it playable I used the Crossover software that I got for free 2 or 3 years ago (or maybe even 4 – can’t remember) during the Christmas time.

Beginning was rough ;). It needs a little hack to start working. When I was installing the game ages ago I have downloaded modified ddraw.dll from Wine 1.1.0 described here to fix the black screen problem. I am glad I have downloaded the file then coz the download site is not available anymore… I have pasted the modified ddraw.dll file to the game bottle into the c:windowssystem32 folder and I have replaced the file that existed in the bottle. It works perfect with the version Crossover Professional 7.1.0 (thanks CodeWeavers for a great app). Can’t wait till they will start giving away their app again for free ;). Would like to have newer version of it ;).

According to license I can share this file. Read the license below if You doubt that.

Modified ddraw.dll from Wine 1.1.0
Copyright (C) 1993-2010 the Wine project authors (see the Wine source to find out who they are)

This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.

This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.

You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA

This archive contains a modified version of the ddraw.dll.so file that is a normal part of the Wine project, renamed ddraw.dll. It works around the blank screen problem affecting Worms Armageddon and some other programs with similar menus.

This particular copy of ddraw.dll was created by extracting the wine-1.1.0 source (which you can get from http://winehq.org/), and applying ddraw-1.1.0.diff by typing “patch -p0 < ddraw-1.1.0.diff" at the root of wine's source. I then built ALL of wine (but didn't install), and copied the resulting ddraw.dll.so from the dlls/ddraw directory in the source.

I also stripped the file using "strip –strip-unneeded" command, but that was only to keep the size down. You probably shouldn't bother with that if you're building it yourself.

While this file might work on versions other than 1.1.0, Wine sometimes changes and breaks older versions of ddraw.dll. To really be safe, you should use a ddraw.dll built for the version of wine you're using.

If you have problems using the patch, please try running your program without using a modified ddraw.dll. If nothing changes, it's a bug in Wine and you should file a bug with them. If it works but you can't see the menus, it's probably my fault, and you post a comment on Wine's application database (http://appdb.winehq.org).

the files in this archive were built against ubuntu hardy and as such may not work on other distributions – if i get enough requests to make a build for another distribution then i may release more varients of the binary

if you build it yourself for another distribution please send me a copy – email address below – i will need to know the version of gcc it was built with, the version of wine it was built for and the host distribution

The patch works around one of the problems that affect Worms Armageddon and other programs in wine 1.x:

WA's menu is not drawn (http://bugs.winehq.org/show_bug.cgi?id=2082). This seems to be because the window WA wants to use has a child window that obscures it completely. The patch works around that by drawing to the desktop window instead of the window WA asks it to use.

to enable the hack use the file "hack.reg" to enable it with the command "regedit hack.reg"

Jasmine Iwanek
jasmine (at) iwanek.co.uk

Original Version By:
Vincent Povirk (madewokherd)
madewokherd (at) gmail.com

I am glad I could get this game running so easily with PCLinuxOS.

I had a great time :D! << VIDEO! Click me.

Andy

"I hate mac adds" by Robert Winchester

“I hate mac adds” by Robert Winchester << Click me!

Made me chuckle ;)!

File seems clean BTW… just in case You are paranoid like me ;).

URL Analysis tool Result
Avira Clean site
BitDefender Unrated site
Dr.Web Clean site
Firefox Clean site
G-Data Clean site
Google Safebrowsing Clean site
Malc0de Database Clean site
MalwareDomainList Clean site
Opera Clean site
ParetoLogic Clean site
Phishtank Clean site
TrendMicro Unrated site
Websense ThreatSeeker Unrated site
Wepawet Unrated site
Additional information
Normalized URL: http://www.bobert-rob.com/animation/Standalone/MACads1.swf
URL MD5: 0c1782b0d26acd5b8980b4529786e7fa

Andy

Goodbye Dropbox. I am not going to need Your services anymore.

Hi all.

I am slightly pissed off and disappointed. Why? For some of You that may not know:

Dropbox is changing / changed their policy and usage terms. To comply with U.S. law they are now obliged to provide unencrypted access to Your private dropbox account content to any of the 3 letter agencies if they provide court order.

This is not my biggest concern. I don’t touch anything that’s illegal so I don’t store anything illegal in my dropbox. What I have realized is far more worse then that. If they can show decrypted content of the folder to the FBI or other authorities it means that they could take a sneak peak at Your files whenever they felt like it in the past even tho they were stating that all they can see is a sudo-random blob of encrypted data which they will not be able to decrypt and have a look at. This – due to my motto “Trust No1” is unacceptable. One bad apple in their crew basket… and all my files are viewable to him. I don’t keep any financial records / passwords / ~ folder content / other valuable data in the dropbox… but that’s because I would never place them somewhere where they can be accessed by a 3rd party…

Second thing is that if someone gains access to Your hard drive and copies 1 little file… gains access to Your dropbox account. No password needed. If You change password attacker still can connect.

But hey – don’t trust me. Listen to the episode 297 of SecurityNow where Steve Gibson – security guru explains it much better then I did.

I am thinking about getting rid of my dropbox accounts. Seriously… Security fail. Privacy fail. Trust fail.

Edit: Strike three… You’re out!

I have removed all my dropbox accounts… and cleaned up my hdd from any leftovers.

[root@wishmasbell andrzejl]# updatedb
[root@wishmasbell andrzejl]# locate dropbox
[root@wishmasbell andrzejl]#

There… I am dropbox free.

Thanks for reading.

Andy

Edit: For all those who don’t want to download 50 MB MP3 file just to search / listen for the dropbox comments:

Here is the transcript that can be found here:

LEO: Now, I wanted to ask you about this next topic because I use, as you know, I use Dropbox. And Miguel de Icaza, who is a great developer and a really important guy in the open source community, said, “What the hell?” Because apparently Dropbox has been assuring everybody that they use strong encryption that they can’t decrypt.

STEVE: Well, yeah. And there’s two things. There’s two issues. One is that Dropbox recently updated their terms of service to say explicitly what was always apparently implicit. Quoting from their new terms of service, they say: “As set forth in our privacy policy, and in compliance with United States law, Dropbox cooperates with United States law enforcement when it receives valid legal process, which may require Dropbox to provide the contents of your private Dropbox. In these cases, Dropbox will remove Dropbox’s encryption from the files before providing them to law enforcement.”

Now, this sums up more perfectly than I ever could why I chose Jungle Disk for my own remote cloud-based backup. And that is, I did a full security analysis of Jungle Disk and verified that all that is ever being put up to Amazon’s S3 cloud stuff is pre-encrypted data. That is, my Jungle Disk client has the key and everything it sends. So all Amazon gets is opaque pseudorandom noise that they have no ability to decrypt. I mean, it’s full TNO, Trust No One, as my acronym for this, which is the only way I would ever store something in the cloud. So here Dropbox has formally acknowledged that they have the ability to decrypt the contents of all of their users’ data, and that they will do so when ordered to by a court order from the United States.

LEO: So as Miguel points out, well, if they can do it by court order, then they’ve had that capability all along. So they essentially misrepresented the encryption capabilities.

STEVE: Well, and see..

LEO: And he says this is a larger issue, not so much government, but that means employees could do it. And even with a company that has very strong data policies like Google we see these things happen.

STEVE: Very, very good point. It means that keys could get compromised; keys could get lost. Or, as you say, you could have a bad apple employee who realizes, hey, we’re hosting a celebrity. I wonder what he’s storing in his Dropbox?

LEO: So I make sure I don’t put anything of a private nature in my Dropbox. But I’m going to make sure I don’t. And you’re right. I think if you’re going to do it, if you want to store something like financial records, use Jungle Disk.

STEVE: Well, and here’s another – well, or, and this works, too…

LEO: Pre-encrypt.

STEVE: Exactly. Only store stuff that you have encrypted up there, where you’re pre-encrypting that data. And this is why, when I see someone saying “industry standard AES 256-bit encryption,” it’s like, that means nothing. I mean, unfortunately it catches out people who don’t listen to this podcast, who assume that, if you’re using state-of-the-art encryption, then you must be safe. No. I mean, I would imagine that means that the link is encrypted. And it does sound like they’re storing it in an encrypted fashion. But they’re storing it with a key that they have. So that doesn’t really help.

LEO: Yeah. That’s the question, who has the key?

STEVE: Right. And the best solution is for no one but you to have the key. And the only way to do that is to pre-encrypt and only store encrypted stuff in the cloud. Now, the other issue that came up was a question of their authentication. Someone named Derek Newton, who is a security researcher, was poking around in Dropbox-like applications, and he just decided he would take a look and see what they left behind, what was left behind after they installed. What he found was that, specifically in the case of Dropbox, there is a single file called config.db, which is an SQLite database file, which contains the email address, the dropbox_path, that is, where the Dropbox folder is on your system, which is being synchronized to the Dropbox in the cloud, and the host_id. Any SQLite DB-compatible client is able to open this file and look at it.

And what he determined by experimentation is that the only thing that identifies you to Dropbox is the host_id. There is no other lockage of that file to a given system. And so what he posted – and again, I learned about this from people saying in Twitter, hey, Steve, what do you think about this? And this has been a constant flow for the last couple weeks. And I mentioned last week that I hadn’t had a chance to dig into this, but I would, to look into it and verify it. So I did want to follow up for everyone who’s been wondering.

So what this means is that, if you weren’t protecting this file, or if anything got onto your system which was able to grab this file through social engineering attack or spyware or malware, whatever, if you lost control of that file such that it was in any way exfiltrated from your control, then that file can be installed on any other system. And that provides the sole authentication of you, the instance of you, to Dropbox such that, with no other information, no username, password, no logon, anything, that authenticates that new system. And there is – it doesn’t appear as a new machine in the set of machines that you have authorized to use. It’s merely a clone of that first one, which then has full access, unencrypted access, to your Dropbox contents. Which to me says these guys aren’t really looking at security.

I mean, on one hand we know now that they can decrypt the contents of our Dropboxes. And this could clearly have been done in a way that was more secure. Even if you change, if the user changes his username and password, that doesn’t invalidate the host_id. It still functions. And so if somebody had it, their connectivity survives across a user changing his username and password. So it’s just they really could have easily done a much better job of hashing username and password into this, tying it in some fashion, for example, to the serial numbers of the hard drives on the system. I mean, just anything to make it more difficult than simply one file which you can put on any machine anywhere, and suddenly it’s authenticated just as solidly as the system it came from.

LEO: Yeah, that’s not good.

STEVE: So not good news over on the Dropbox side.

LEO: You know, there are alternatives. LaCie has a similar service to Dropbox that’s Java based. I don’t know if it’s more secure. But I think maybe it’s time to look and see what the other alter- I love Dropbox. And I hope they respond to this by making it more secure. That would make everybody happy.

STEVE: I think they can. I mean, one would imagine they will because it’s so trivial. I mean, all they have to do is listen to this podcast for a while.

LEO: Right, and add some encryption features. The other one to look at, I’ll take a look at, is from LaCie, it’s called Wuala. Randal Schwartz told me about it. It’s Wuala.com. Very similar to Dropbox. I’ll look and see if they say, when they say all files get encrypted – see, that’s the thing, is “get encrypted.” Well, what does that mean? Where, is the question.

STEVE: Yeah, exactly. And that’s just it. Unless there is a full security analysis available of how it works and what it does, you just can’t trust it.

LEO: Here’s what Wuala says. It says all files are directly encrypted on your desktop. Your password never leaves your computer. Not even we as a provider can access your files or your password.

STEVE: Well, that’s all good sounding.

LEO: That’s what you want – validated, of course.

STEVE: Yeah.

LEO: I’m going to take a look at them. Randal Schwartz recommended them. He likes them a lot, so I’m going to take a look at them as an alternative to Dropbox.

Copied the ~/.mozilla from one computer to another…

Hi Folks.

I have few machines here and I want to keep the settings and all other stuff (addons, plugins) synced between them. I am using LastPass for passwords and XMarks for bookmarks so this is not an issue. They are always synced. However the addons and settings… I didn’t wanted to redo them all. Wanted to have them cloned. Easiest way for me is to copy the ~/.mozilla folder from one computer to another… This time I ran into bit of a trouble. Settings came from a machine running KDE4. Black fonts over a grayish background. They were copied into the Gnome machine where the theme looks slightly different. Its a black textured background with a whiteish text on it.

When I copied the settings I got all the menu bar items messed up. Black font / black background. Not visible. I managed to fix it. I have opened Nautilus and I have maneuvered to the ~/.mozilla/firefox/123QWE89.default/chrome/ folder and I removed all the files from there.

Reopened the Firefox and it got adjusted to work with the Gnome theme. Fonts got whitish color and I could read “File“, “Edit” and other menus again.

Hope this helps somebody someday.

Andy

Enhancing GPU performance in Dell Latitude C610 lappy.

Hi all.

Was messing around with my oldish machine and noticed that adding few (embolden on purpose) options to the /etc/X11/xorg.conf (as root) greatly improves the performance.

Here is my xorg.conf file:

# File generated by XFdrake (rev )

# **********************************************************************
# Refer to the xorg.conf man page for details about the format of
# this file.
# **********************************************************************

Section “ServerFlags”
Option “DontZap” “False” # disable (server abort)
AllowMouseOpenFail # allows the server to start up even if the mouse does not work
#DontZoom # disable / (resolution switching)
EndSection

Section “Module”
Load “dbe” # Double-Buffering Extension
Load “v4l” # Video for Linux
Load “extmod”
Load “glx” # 3D layer
Load “dri” # direct rendering
EndSection

Section “Monitor”
Identifier “monitor1”
VendorName “Generic”
ModelName “Flat Panel 1024×768”
HorizSync 31.5-48.0
VertRefresh 56.0-65.0

# TV fullscreen mode or DVD fullscreen output.
# 768×576 @ 79 Hz, 50 kHz hsync
ModeLine “768×576” 50.00 768 832 846 1000 576 590 595 630

# 768×576 @ 100 Hz, 61.6 kHz hsync
ModeLine “768×576” 63.07 768 800 960 1024 576 578 590 616
EndSection

Section “Device”
Identifier “device1”
VendorName “ATI Technologies Inc”
BoardName “ATI Radeon X1950 and earlier”
Driver “ati”
Option “DPMS”
Option “AccelMethod” “exa”
Option “AGPMode” “4”
Option “FBTexPercent” “80”
Option “ScalerWidth” “2048”
Option “EXAOptimizeMigration” “true”
Option “DRI” “on”
Option “DynamicClocks” “on”
Option “MigrationHeuristic” “greedy”
Option “AccelDFS” “true”
Option “BackingStore” “true”
Option “ColorTiling” “on”
Option “ExaNoComposite” “false”
Option “BusType” “AGP”
Option “EnableDepthMoves” “on”

EndSection

Section “Screen”
Identifier “screen1”
Device “device1”
Monitor “monitor1”
DefaultColorDepth 24

Subsection “Display”
Depth 8
Modes “1024×768” “832×624” “800×600” “640×480” “480×360” “320×240”
EndSubsection

Subsection “Display”
Depth 15
Modes “1024×768” “832×624” “800×600” “640×480” “480×360” “320×240”
EndSubsection

Subsection “Display”
Depth 16
Modes “1024×768” “832×624” “800×600” “640×480” “480×360” “320×240”
EndSubsection

Subsection “Display”
Depth 24
Modes “1024×768” “832×624” “800×600” “640×480” “480×360” “320×240”
EndSubsection
EndSection

Section “ServerLayout”
Identifier “layout1”
Screen “screen1”
EndSection

Have fun!

Andy

Getting rid of the desktop icons in Gnome 2.x.x

Hi all.

Another thing I have learned. “Computer“, “Home” and “Trash” won’t go away from the Desktop unless You do this:

Open gnome-terminal and issue this command:

dbus-launch gconf-editor

Now click on the arrow on the left hand side of the Apps, it will expand it. Now find and click on the arrow on the left hand side of the Nautilus to expand it, now find and click on desktop. In the right pane of the gconf-editor window You will see few entries with the ticks.

Check out what happens if You untick them – so it looks like this:

Getting rid of the Gnome 2.x.x Desktop icons.

Have fun.

Andy

Adding and running Irssi perl scripts. [Nicklist.pl]

Hi all.

I am big SSH / screen / irssi fan. I really do love the way they work together. SSH to the remote machine, takeover the screen session with irssi running inside… You can do that from just about everywhere… – including mobile phone…

Nokia N73 - Putty - SSH - Screen - IRSSI

What would make it even better? Well… and what made Firefox even better? Addons. Perl script addons… BUT there are always BUTs… The scripts were not working for me. Each time I was trying to fire up the script I was getting this error:

Irssi: Unknown command: script

Irssi: Unknown command: script

After a long while of Googling I have realized I need to load perl when irssi starts. How would one accomplish that? I will show You using nicklist.pl as example.

Close irssi. Run these commands:

su -c "apt-get install irssi-perl"

followed by:

root's password

and then:

echo 'load perl' >> ~/.irssi/startup

Creating perl autoloading entry...

and start irssi…

Success! Perl modules perl/core and perl/fe are being loaded.

Success! Perl modules perl/core and perl/fe are being loaded.

Now close irssi and run this (You can copy and paste it) command:

mkdir -p ~/.irssi/scripts/autorun && cd ~/.irssi/scripts/ && wget -c http://scripts.irssi.org/scripts/nicklist.pl && cd ~/.irssi/scripts/autorun/ && ln -s ../nicklist.pl

Create directories, download script, create symlinks...

and start irssi again…

Now run this command (it’s a nicklist.pl specific command – find out more by reading the script itself) in irssi:

/set nicklist_automode SCREEN

Create automode procedure for the script

Create automode procedure for the script part 2

Final step: Close irssi. Start screen session. And re-run irssi. Join any channel of Your choice :).

Well done. Perl loaded. Script loaded. Screen mode of the script auto-loaded. Triple w00t!

See that pretty nick list on the right hand side? HA! πŸ˜€ I do :D.

You can use screen on a local (not necessarily remote) machine. And it makes sense for many reasons :).

Andy