techno magic

warning: Creating default object from empty value in /hermes/walnaweb12a/b57/moo.greydragoncom/nodsw/modules/taxonomy/ on line 33.
Leeland's picture

Windows Keyboard Shortcuts

This is just a random list of keyboard shortcuts for use with any version of the Microsoft Windows Operating System. Each keyboard shortcut is designed to increase user productivity by eliminating the need to reach for the mouse. This is done by executing a combination of keys on the keyboard instead of clicking to perform the same function.

GUI task changing: ALT + TAB will bring up a Window with a list of icons representing programs which are currently running on your computer. While holding the ALT key, press and depress the TAB button to cycle between each icon task.

Leeland's picture

Java SecureString Class

Secure string implementation is very hard. A secure string is a means to keep and use confidential data. Essentially the text cannot be stored as plain text and definitely cannot be stored in a Java String object since that is immutable and there is no definable point when it will be removed from the system.

Secure String Implementations should:

  • text is encrypted for privacy when being used
  • deleted from computer memory when no longer needed
  • not be allowed to be paged to swap memory
  • cannot be seen via memory inspection
Leeland's picture

PuTTY SSH + default pointer + rdesktop = where is my mouse?

I work on a beefy Linux box with multiple desktops & monitors. I also have a windows laptop to do office junk and some testing. If my computers are side by side things are pretty sweet and I use Synergyc / Synergy2 ( to make all my monitors flow together.

But, I also have another beefy Linux development box in a shared team space where again I have multiple desktops & monitors. No problem I just use rdesktop ( make one of the monitors turn into my windows screen. All is fine in the world.

Leeland's picture

Blackberry Stuff

'''These are the little hints and steps I have found from various lists on the Internet and from experimenting with my Blackberry. I have a Blackberry 8800 with OS 4.2. So these combinations may not all work for you.'''

== Introduction ==

:ALT key = has half moon on top of it. left side of keyboard below the A.
:CAP key = bottom right key (AKA SHIFT key)

== Stuff On The Web ==

* A great place to go look for hints, tips and help.
* [ HOWTO: BlackBerry As Modem For Laptop]

Leeland's picture

BASH magic

== Table of Contents ==


== My .bashrc.user file right now ==

export SVN_EDITOR=/usr/bin/vim

# make bash autocomplete with up arrow
bind '"\e[A":history-search-backward'
bind '"\e[B":history-search-forward'

# a simple function that will check for headers of HTTP server.
# invoke: headers  []
#                 port number defaults to 80 if not provided.
headers() {
    server=$1; port=${2:-80}
    exec 5<> /dev/tcp/$server/$port
    echo -e "HEAD / HTTP/1.0\nHost: ${server}\n\n" >&5
    cat <5
    exec 5<&-
Leeland's picture

Firefox Tidbits

== Taming the Web ==

=== Meebo IM ===

I like Meebo, it hooks me up to all my IM accounts through one interface that I can get to from any web browser. So when the Meebo team wrote a Firefox extension I was all over it. The basic features are:

* An added "Meebo icon" to the top navigation bar
* The ability to pop out IM messages using the icon in the IM toolbar and they'll float over Firefox while you browse.
* A nice IM sidebar that keeps you update to date on all the recent IM activity (friends logged in, recent chats, etc.).

Leeland's picture

SED Recursive Search and Replace With Multiple Actions

About once every 6 months or so I end up needing to do a recursive search and replace across a whole bunch of files. Every time I need to do this I turn to SED as it is just so good at doing the work. But of course there is the problem of multiple actions.

The secret to this is using the SED file. This works across thousands of files on the local box and even more interestingly can be wrapped in a SSH script to walk hundreds of remote boxes.

Leeland's picture

Password Notes

Computer security is not surprisingly greatly underestimated and very misunderstood. To access a computer normally requires 2 items a login name or ID (identification) and a password. The combination of those to items constitutes a key. Like putting a good strong deadbolt on a house, or locking the doors of a car, the login ID and password lock a computer.

Thread Slivers eBook at Amazon

Syndicate content