Steve's random ramblings and technical notes

Wednesday, May 18, 2005

The Geekest Link

The Geekest Link
This is the place to learn about Robert Hayden's Geek Code, lately up to version 3.12.
Specifically, you have the following avenues to explore...

The Geek Generator
Fill in a form and get your code. Written by Dylan Northrup.
The Geek Decoder (preferred layout) -or- here (preferred translation)
This form accepts a Geek Code and then interprets it for you. Recognizes Geek Code v1.x, v2.x, and v3.x!
The Geek Linker
Enter your Geek Code, and this form will generate the necessary HTML to link your code to the Geek Decoder. Following the link will automatically decipher your code!
The Geek Zone
The official home of the Geek Code, which has now degenerated into just an HTML copy of the Code.
GAT/IT d-(+) s+(): a C+++$ ULC+++>$ P++>++++ L++$>++++ !E W++>$ N+ !o !K w+()@ !O !M- !V PS-(--)@>--- PE+ Y-- PGP>++ t+ !5(-) X+ !R- tv-(+)? b+ DI++++ D++>$ G e+>++ h----(-) r+++ y++++

Enable/Disable Ultra DMA in XP

Enable/disable UDMA (Ultra Direct Memory Access)
To enable/disable UDMA (Ultra Direct Memory Access) for your IDE-devices attached to the onboard controller go here :

Control Panel -> System Properties -> Device Manager -> IDE ATA/ATAPI Controllers

There select properties for your Primary- and Secondary- Channel and go to Advanced Settings where you can try to select "DMA if available" for your DVD, CDROM and HDD and use. The "PIO Only" means Programmed Input/Output where the CPU is used for data transfer which can be choppy and slow.

Note that if DMA is enabled for a device which doesn't support it then this can cause data corruption.

Note that some ATAPI devices like CD-ROM, Tape-Drive, MO-Drive is set to PIO by default, so one manually has to enable DMA as described in the beginning.

Note in WinXP if a DMA device (HDD/CD-ROM) makes more than 6 transfer timeouts then it is degraded to PIO mode (Independent of lifetime). The only way to reenable DMA is to remove the device or controller in the Device Manager (It will redetect the device automaticly).

Note Win2k/Xp without a service pack applied will only use UDMA33 on Intel onboard standard IDE-Controller. This can be upgraded to UDMA66 by adding/updating this DWORD value:

- EnableUDMA66=1

Monday, May 16, 2005

Supper Last Night | a.k.a. The Ted Nugent Essence of Life Gonzo Recipe Life | The Ted Nugent Essence of Life Gonzo Recipe is linked from a good interview of / article about Ted Nugent.
Oddly enough, (starting at step 3) this is pretty much what my family, friends and I did for supper last night - before seeing the Whackmaster's Recipe... (Did steps 1 and 2 last November)

Ted Nugent Essence of Life Gonzo Recipe
  1. Go hunting, breathe deep, feel the air, take the Spirit inside, and kill a critter.
  2. Remove the hair. Immediately clean and cool the carcass. Butcher flesh into family-size portions.
  3. Start fire. Heat good fresh vegetable oil to boiling point in an iron skillet.
  4. Fill zipbag with flour, salt and pepper, and good seasoning mixture. Add small, manageable chunks of meat; shake and slide coated pieces into hot oil to sizzle.
  5. As brown crust forms on edges, remove onto paper towel. Salivate. Surround yourself with family and friends. Put on plates next to smashed potatoes with skins on. Cut, eat, grin, sip Vernor's Ginger Ale, burp, enjoy.

Friday, May 13, 2005

Gspy - a gnome security camera application

Gspy - a gnome security camera application
"Gspy retrieves images from a video4linux device and processes these into a daily mpeg movie on the disk drive. Each image is recorded with a time stamp to insure accurate real world correlation. Special motion detection algorithms are used to reduce the size of the daily movies by eliminating pictures with similar content as well as the normal compression obtained via the mpeg process. The result is a time lapse video per day with nonlinear time compression using only the images of interest. This program will only run on Linux machines which support a video4linux-device in 640x480 capture size. This software has been tested with the 2.4.0-test1 kernel, 2.4.0-test4 and the 2.2.16 kernel with the usb backport patch. You should have the Berkeley MPEG Tools installed if you wish to generate the MPEG files. Gspy can be used without the MPEG tools, as it will fill a directory with jpg images that can be processed or viewed at a later time. Versions from 0.1.6 include a user defined command that is executed on each alarm. This command string can include a token(s) '%f%' that will get replaced with the alarm picture filename. Typical uses would be to copy the alarm picture to a remote site using ftp or scp, email the picture to someone, play a sound annoucement... 'Step away from the keyboard!', turn on lights using a parallel port or X10 interface, or ???. Have FUN"

Hmmmm.... This could be fun to try out on the USD Access Grid Node - just to make sure no one messes with the machines when I'm not around.

"How Lightsabers Work" from

Howstuffworks "How Lightsabers Work"

"Chances are that you have seen a lightsaber at one time or another, whether on the evening news or down at the local cantina. Therefore you know that a lightsaber is an amazing and versatile device that is able to cut through nearly anything in a matter of milliseconds."

My favorite? Gotta be this one...

Parks Sabers - Double-Helix™

Sunday, May 08, 2005

PHLAK Security Document System

PHLAK Security Document SystemThis is the documenation that's included on the PHLAK (Professional Hacker's Linux Assault Kit) Live CD.
It's got a lot of good information on networking and hacking theory (as well as practice).

This page is powered by Blogger. Isn't yours?