Category: Computerwise

The Mobile Phone

The Mobile Phone

My mobile phone or cell phone is now a part of my everyday life.  I don’t know how I ever mananged without it.

Mine you, I am not a very techie person.  I use my mobile phone to make a phone call and occassionally to send a text.  If push, I would also use it to browse website, especially globalgranary.life. 😉

Anyway, I do not use my iPhone much but the battery drains so fast, it is unbelievable and charging it takes time.  It takes ages and I can be a very impatient person.

I heard that if you charge the phone using the airplane setting, the charging will be faster!  The only drawback is that you won’t be able to receive call.

How to migrate blog posts from Weebly to XML – THE EASY WAY

I have a client running on Weebly that wanted to migrate all blog posts to WordPress. Simple enough I thought..

Wrong.

So a quick Google search brought me to a site that explained how to do it via RSS by appending ?n=5000 to the end of the feed URL (for example www.site.com/1/feed?n=5000) to make the feed list 5000 (or all) items. Great!

However this no longer works! So we’re stuck with a feed that shows only the latest 10 – 25 posts. Not good if you have 100+ posts on your site.

The only way that I could think to do this was to export the feed, delete some posts, export again, delete, export, delete, export – something that would take hours basically.

So I looked through the Weebly settings and realized that the amount of items on the feed reflects the amount of blog posts that are displayed on your blog page.

Hmmmmm

1

So I thought, maybe if I edited the variables in the drop down box via Firebug/Chrome developer tools, then saved my settings it might just work.. YES.

End result, I now have a feed with ALL of my posts, ready to export to .xml to go straight into WordPress.

So here’s what to do.

Go to Blog Settings

1

Right click on the drop down box and go to inspect element (this only works on Chrome and FireFox as far as I know).

1

Now it will bring up the developer tools – essentially the HTML output of the page. Assuming you right clicked on the drop down, it should already be on the SELECT element.

1

Each of the “options” is, well, one of the options for the drop down box . We will need to change one of the option values. I’ll be changing the first one. Double click on the “2” and it will allow you to edit that option. Put in a number that is equal to, or greater than the number of posts you have. The click outside of the box to save the changes.

1

Thats it! Now whatever option you modified, select that on the drop down box. Hit SAVE and your feed (and blog page) will display the amount of posts that you entered.

Now to find your feed, visit one of your post pages and make note of the link.

www.example.com/7/postname.html.

Where I have highlighted the 7 above, that may be a different number. Note it down!

Now go to example.com/7/feed and hey presto, it will bring it to your XML feed page. You can either press CTL+S to save the XML, or find the save option in your browsers menu.

Easy.

 

Who is Siri – New iPhone’s Vocal Interactive PA

I still have an iPhone 4s and due to renew April next year.  So my Siri is a man, whom I adore for his calm and patient feedbacks.  But sometimes he leaves me chortling on my iPhone because he could be so literal.

Actually he can cheer me up. 😉  I often ask Siri “iPhone, iPhone in my hand, who is the beauty  that before you does stand?” 😉

iPhone replies “I don’t know, Dave.”

Who the bloody hell is Dave?  See, he keeps me grounded! 🙂

JXXX

………………………..

Georgia Woman Revealed as Voice of Siri

Chloe AlbanesiusBy Chloe Albanesius
October 4, 2013 10:10am EST

Voice of Siri

The voice of Apple’s voice assistant Siri has been revealed as Georgia-based voiceover actress Susan Bennett.

Bennett made the revelation to CNN, eight years after lending her voice to a 2005 project for ScanSoft, which eventually acquired Nuance, the company that powers Siri. As a result, Bennett did not know she would one day be the voice behind a pop culture icon. When Siri was released on theiPhone 4S in 2011, it was friends who recognized her voice and filled her in.

Nuance and Apple declined to comment on Bennett’s revelation to CNN, but the cable channel hired an audio forensics expert to compare her voice to the voice answering queries on iPads and iPhones around the globe. “They are identical – a 100 percent match,” the expert told CNN.

Bennett kept quiet about the fact that she was Siri until a September feature from The Verge led some to believe that voiceover actress Allison Dufty was Siri, something Dufty denied.

Amidst the confusion, Bennett decided to reveal that she was actually the voice of Siri. She’d spoken with CNN’s Jessica Ravitz a few months ago for a separate story on the voices that power announcements at airports, at which time Ravitz had quite by accident asked if Bennett was the voice of Siri. Bennett was coy at the time, but recently came back to Ravitz to reveal her secret.

With iOS 7, users now have the option to select a male version of Siri, so Bennett’s voice might not be as omnipresent as it once was. Her voice does not power Siri around the globe; in Nov. 2011, the voice of Siri in the U.K. was revealed, while the Australian Siristepped forward earlier this year.

Check out Bennett’s voice for yourself in the video below.

 

iPhone Just Got Better!!! ;)

There is a spoof ad going round claiming that the new iOS7 app makes iPhone waterproof.

Unfortunately some university students took the ad as gospel and had been busy testing the app.  Presumably there will be increase in insurance claims for  water-damaged iPhones?!!!

Just to recap, IT IS NOT TRUE, IPHONES ARE NOT QUITE WATERPROOFED!

 

Jean 😉

……………

Spoof ad claims Apple’s new iOS 7 makes iPhones waterproof

Tuesday, September 24, 2013 · 11:09 am · 8 Comments

 

Under the highly-questionable headline, “iOS 7: users destroy iPhones after fake waterproof advert,” Ben Riley-Smith reports for The Telegraph, “A spoof advert suggesting Apple’s new iOS 7 operating system made handsets waterproof appears to have fooled some users into destroying their iPhone 

MacDailyNews Take: “Appears.” Not necessarily actually happened.

“The fake commercial appeared almost identical to Apple’s real poster advertising with images of the iPhone on a white background accompanied by neat text.
‘Update to iOS 7 and become waterproof,’ the poster read,” Riley-Smith reports. “‘In an emergency, a smart-switch will shut off the phone’s power supply and corresponding components to prevent any damage to your iPhone’s delicate circuitry,’ it explained.”

MacDailyNews Notee: As an aside, Apple would never use the word “delicate” to describe “iPhone’s circuitry.”

 

Spoof ad claiming Apple's new iOS 7 makes iPhones waterproof

Spoof ad claiming Apple’s new iOS 7 makes iPhones waterproof

“After being shared on social media sites by users encouraging people to try the new feature soon angry complaints appeared from those fooled by the joke,” Riley-Smith reports. “‘Whoever said ios7 was waterproof **** you,’ wrote one user on Twitter. ‘Wtf iOS7 isn’t waterproof!! Now my phone’s at the bottom of the river,’ another said.” 

MacDailyNews Take: Again, “appeared.”

Those tweets could easily be – and probably better – interpreted as humorous replies from people who get the joke. Obviously, even if you believed the ridiculous spoof ad, throwing your iPhone into a river for it to settle on the bottom as a test of the spoofed feature would introduce further issues beyond simply dunking it into a glass of water.

Riley-Smith reports, “The prank is understood to have been started by controversial forum 4Chan which has a chequered history of hosting faked material.”

Full article here.

MacDailyNews Take: If concocting “news” from random tweets is the best you can do, perhaps you should try another line of work.

[Thanks to MacDailyNews Reader “Fred Mertz” for the heads up.]

Read more at http://macdailynews.com/2013/09/24/spoof-ad-claims-apples-new-ios-7-makes-iphones-waterproof/#VfhpJ1VDX5t8uFrr.99

Lily Collins – Virus Alert

Lily Collins most dangerous star search

Actress daughter of Phil Collins has ousted Emma Watson.

Press AssociationPress Association – 5 hours ago

FILE - In this Aug. 22, 2013 file photo, English actress Lily Collins attends the premiere of the film "Cazadores de Sombras, Ciudad de Huesos" ("The Mortal Instruments, City of Bones") at Callao cinema in Madrid, Spain. If youre curious about Lily Collins and head to the Internet to find out, beware, McAfee has ranked the actress as the most dangerous celeb to search for online. (AP Photo/Abraham Caro Marin, File)

Associated Press Photos – FILE – In this Aug. 22, 2013 file photo, English actress Lily Collins attends the premiere of the film “Cazadores de Sombras, Ciudad de Huesos”

Lily Collins has been named the most “dangerous” celebrity to search for online.

The actress daughter of Phil Collins has ousted Emma Watson who previously held the title awarded by security company McAfee.

Online searches for her name along with the words “free app download” or “nude pictures” result in more links to “risky” websites than any other celebrity, the firm said.

The Mortal Instruments star Lily tops a string of figures whose names are most likely to link to a website that has tested positive for threats such as spyware and viruses.

Second on that list is singer Avril Lavigne who is followed by actress Sandra Bullock.

Women apparently generate more risky links than men. American actor Jon Hamm was the only male celebrity in the top 10, according to the study.

Other risky stars to search for on the internet included Hollywood star Zoe Saldana, pop divas Katy Perry, Britney Spears and Rita Ora, supermodel Adriana Lima and US talk show host Kathy Griffin.

“We have got used to accessing the latest gossip and pictures of our favourite celebrities on demand,” McAfee’s Raj Samani said.

“But we need to remember that cybercriminals take advantage of the latest cultural trends, new movies and hit TV shows to target unsuspecting consumers seeking more information.

“These criminals want to lure us to unsafe sites that can severely infect computers and devices and even steal personal data.”

How to easily install iOS 7 beta without an Apple Developer Account (and for free!)

Cannot wait for iOS 7 to drop later in the year? Don’t want to pay $99 for an Apple Developer Account just to try out the beta? These were the questions floating in my head when I heard about the beta previews of iOS 7 being released.

I’ve been using iOS7 beta for a few months now, and wow, it is a huge improvement on iOS 6. The UI, the transitions, the dynamic wallpapers and the slide up Control Center (and a whole lot of other tweaks/additions) are to me, a justification to update to the beta.

Now as it is a beta, there will be bugs, both in apps and with the generally user interface – although the majority have been resolved as of iOS7 beta 3 (and hopefully beta 4 irons out the rest.. maybe?)

With that said, most apps (43 / 50 I have installed) work nicely without any problems, however some either have graphical bugs (such as missing button text labels on Tapatalk), or just crash instantly when opening (such as all PopCap games – bejeweled, Plants Vs Zombies, Peggle etc).

There are also the issues of reported battery drain (my iPhone 5 does seem to eat battery juice ever so slightly more than on iOS6), the phone does randomly reboot – I have experienced this many times, the wallpaper does disappear and replace with a plain black background, and most annoyingly, sometimes when you make a call, you do not hear the other person. That could be a totally different issue as my partners iPhone 4s is pretty much crap (its a refurb from apple) with signal loss etc.

Despite these problems, I still find that this is a must upgrade in my opinion, however if you want an issue free experience, please do wait for the official release.

Anyway, warnings aside, lets get to it.

Pre-requisites 

iOS 7 beta 1 .ipsw file for your chosen device. Needs to be beta 1, not 2 or 3. You can update later to the latest as explained below. I won’t provide links for these, however a quick google search or checking your favourite torrent trackers will bring up links.

Latest version of iTunes  – Download from http://www.apple.com/itunes/

Do a full backup of your phone – to iCloud or to your machine via iTunes. Don’t skip this, DO IT!

Your full attention. Yes, you need to read the steps carefully and follow exactly as written or it wont work.

Step 1

Connect your iPhone to your machine. Duh.

Step 2

Open iTunes (if it hasn’t already opened up automatically)

Step 3

Navigate to your phone in iTunes

1

Step 4

Now on your keyboard, hold Shift (windows users) or Option (osx users) and while still holding the button, click on “Check for Update”. A box will now appear prompting you to search for the update file.

2

Step 5

Select your update file, open and let the update process commence.

Step 6

Once updated, you will be brought to the iOS 7 welcome screen. Connect to Wifi. Restore iCloud backup. Done.

Happy days – though if you’re not happy, then you can downgrade back to iOS 6 – but you will need to put your device into DFU mode and click restore in iTunes.

 

How to have unlimited concurrent RDP (Remote Desktop) sessions on Windows XP / Vista / 7 and Server 2003 & 2008 without being logged off

At work, we have XP all-in-one machines that use RDP to connect to a server (running either XP, 7, Server 2003 or Server 2008 to run our bespoke applications. and one of the problems when attempting remote support is that we always ended up logging the XP all-in-one machines out of the remote desktop session. Very frustrating for users who are either new and don’t know the login credentials or are not computer literate.

An article popped up on one of my usual tech sites with a new application, developed by the guys at deepxw.blogspot.com, that can supposedly bypass this by removing the limit on concurrent connected users on Remote Desktop.

Enough of the introduction, lets get straight to the point.

Direct Download link: Click Here

Supported Operating Systems: Windows XP SP2/SP3, Vista SP1/SP2, Windows 7, Windows Server 2003 and Windows Server 2008 32bit (x86) & 64bit

UniversalTermsrvPatch_v1.0_en

Usage

  1. Download and extract the contents of the zip file to your hard drive.
  2. Run either the x86 or x64 version of the application – it all depends if you are running on Windows 32bit (x86) or Windows 64bit (x64).
  3. Click the Patch button, and wait until it notifies you that it is done.
  4. Close the application and reboot the machine.
  5. Test the patch! Try logging in to your machine via RDP from multiple machines at the same time.

Please Note: Do not run this application if other users are currently logged in, or trying to log in as this will temporarily break remote desktop functionality. You will need to reboot the machine after following the above steps for this to work correctly.  I did this myself by accident, but a reboot did indeed solve this.

 

How to use SQLMap on Windows for finding SQL Injection flaws on your website

As a (sort-of-mediocre) web developer, I find security of the site as #1 priority. However with limited knowledge on the subject, it was near-impossible to look for any sort of  security flaw without scrolling through forums for days.

After hours of googling, I discovered an excellent tool to automatically uncover SQL injection exploits in my website without the requirement of intricate SQL knowledge.

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections

SQLMap is coded in Python programming language and runs natively in Linux operating system, however it should run as nice on Windows machines , however we first need to download and install the Python libraries to the machine for it to run.

Anyway, back to your site, one thing you will need to find are URL’s like this http://yoursite.com/users/user.php?id=3 or http://yoursite.com/gallery/albums.php?aid=532

These parameters (in red) query the database, and if not coded/sanitized correctly, can be vulnerable to sql injection. Users can basically access your database and do things such as access passwords, emails, names etc.

So you’ve found your URL on your site as shown above? Lets see if it is vulnerable to sql injections…..

Step 1 – Download & Install Python 2.7.5

Python 2.7 installed on your Windows machine.

Ensure that version 2.7.5 is installed which can be downloaded from here – http://www.python.org/download/

Choose either the normal Windows installer, or the Windows x86-64 installer.

Run through the install accepting the defaults. If all went well, then all of the Python files should be installed to C:\Python27\

Step 2 – Download SQLMap

SQLMap downloaded on your Windows machine

The latest and greatest version is available on the SQLMap home page – click here – https://github.com/sqlmapproject/sqlmap/zipball/master or here http://sqlmap.org/ (and click download .zip on the left!)

Unzip the .zip and put the folder into the C:\ drive (just for ease of access). The folder may be named something like “sqlmapproject-sqlmap-dbb0d7f” so rename this to something like “sqlmap“. For the purpose of this guide, I will be renaming this folder to “sqlmap“.

Step 3 – Run Command Prompt as Administrator

You can do this multiple ways, but just to explain in a way that everyone can easily do, go to Start > All Programs > Accessories and you will see the Command Prompt icon. BUT WAIT! Don’t just click it!

Ensure that you right-click on the Command Prompt icon and Run As Administrator. Normally, command prompt is set with restrictions meaning certain system tools will not run, so running as administrator enables command prompt to have full access to the system.

Step 4 – Run SQLMap

With the above prerequisites completed, we can now start.

– In the command prompt window, CD into the directory where SQLMap is contained

1

– Type in the following: python sqlmap.py -u “http://yoursite.com/users/users.php?id=3 (replace the red with what you have!)

2

– Hit enter and it will start scanning. If you find that you encounter something like this (in grey) then your site IS vulnerable to SQL injections. Uh-oh!

4

– Let SQLMap run through and at the end it will dump all the necessary information into a files (readable in notepad) in the directory where it resides (for example C:\sqlmap\output\yoursite\).

Below are what I got from the above test:

sqlmap identified the following injection points with a total of 63 HTTP(s) requests:

Place: GET
Parameter: id
Type: boolean-based blind
Title: AND boolean-based blind – WHERE or HAVING clause
Payload: id=8 AND 6220=6220

Type: UNION query
Title: MySQL UNION query (NULL) – 17 columns
Payload: id=-6714 UNION ALL SELECT NULL,NULL,CONCAT(0x7178667171,0x73486f79746764616f74,0x717a666671),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#

web application technology: PHP 5.3.19, Apache 2.2.23
back-end DBMS: MySQL >= 5.0.0

Now, if you’re using a wordpress plugin, disable it and remove it immediately as your site can be easily found using google dorks. Notify the author / developer asap!.

If like me you use WordPress, then it’s best to search your plugins in exploit-db.com to see if there are already exposed vulnerabilites!

 

**Note that this is a basic guide. If you’re looking for advanced usage, then I suggest starting at SQLMap.org

Charging iPhone – A Warning

This article is the second one I have seen and read in a week. Is there a real concern for us iPhone users? I have to admit I am one of those who uses mobile phones whilst they are charging.
I have to rethink this now and should you!!!

JXXX
……………………………………………….

Apple to probe death of Chinese woman who used iPhone when it was charging

ReutersReuters – 18 hours ago

An Apple logo is seen at the Apple Worldwide Developers Conference (WWDC) 2013 in San Francisco, California June 10, 2013. REUTERS/Stephen Lam

Reuters/Reuters – An Apple logo is seen at the Apple Worldwide Developers Conference (WWDC) 2013 in San Francisco, California June 10, 2013. REUTERS/Stephen Lam

SINGAPORE (Reuters) – Apple Inc is investigating an accident in which a Chinese woman was killed by an electric shock when answering a call on her iPhone 5 while it was charging, the U.S. technology company said on Monday.

Last Thursday, Ma Ailun, a 23-year-old woman from China’s western Xinjiang region and a flight attendant with China Southern Airlines, was electrocuted when she took a call on the charging mobile telephone, the official Xinhua news agency quoted police as saying on Sunday.

“We are deeply saddened to learn of this tragic incident and offer our condolences to the Ma family. We will fully investigate and cooperate with authorities in this matter,” Apple said in an e-mail.

Apple declined to comment on details, such as whether this was an isolated case.

Ma’s sister tweeted on Sina’s microblog saying that Ma collapsed and died after using her charging iPhone 5 and urged users to be careful, a message that went viral on the site.

In April, Apple apologised to Chinese consumers and altered iPhone warranty policies in its second-biggest market after its after-sales service suffered more more than two weeks of condemnation by the state-run media.

(Reporting by Lee Chyen Yee; Editing by Clarence Fernandez)

WARNING TO FACEBOOKERS

Being a Facebooker myself (who isn’t?), it concerns me that anyone can see or get my information; I don’t want anyone, who is not one my “friends”, to see and know what I am up to, what I “like”. I definitely do not appreciate people I do not know seeing photos of my family, my friends, and of myself.

Although Facebook provides a very useful service of allowing users to be in instant contact with families and friends from around the world, Facebook has been very naughty by not making more of an issue of this new development of Graph Search. They should have let us know in no uncertain manner its uses and how can it can potentially be detrimental to our personal information.

Below is some tips to somehow safeguard your information in Facebood.

JXXX
………………………………

How to stop Facebook’s new Graph Search revealing your old photos

Facebook quietly issued a warning this week to its UK users – reminding people to check privacy settings before its powerful new “Graph Search” function arrives

Yahoo! NewsBy Rob Waugh | Yahoo! News – 20 hours ago

Facebook's new Graph Search can reveal old photos

Facebook quietly issued a warning this week to its UK users – reminding people to check privacy settings before its powerful new “Graph Search” function arrives.

Graph Search will be here in days – but Facebook’s warning does little to explain the power of its new tool, which makes it easy for people to find old photographs, even ones hidden from your Timeline.

Privacy group Electronic Frontier Foundation has described the new search function as “creepy”.

Users in the UK will be able to use it within days – to use the powerful search tool, people simply have to change their settings to “U.S. English”.

       
People are already using Graph Search – so tidy up your profile now

Graph Search makes it far easier to search through old photographs – and people who have signed up for early tests are using it already. If you’re worried about something you may have “Liked” or a photo you might be tagged in, act now. People in the U.S. and the UK are already using Graph Search and millions more will start using it within weeks.

For a quick fix, visit your profile

Graph Search will not show off any photos that are set to be private – ie ones that can be seen by “Only Me” or “Friends”. It won’t change privacy settings for any image – it’s just easier to find images, especially old ones, which used to require scrolling back through Timeline. You can adjust settings for photos on Activity Log (found on your profile page). If you’re worried, this is a great first step.

Be wary of “tagging” 

Photos which friends have “tagged” you in can be found far more easily using Graph Search – even ones that don’t appear on your Timeline. If you’re worried, visit Facebook’s Activity Log (on your profile) and manually review photos that might be visible to others, hiding ones you don’t like. Graph Search will not show off private photos. You can also set Facebook’s Privacy settings so that you have the option to “Review” images where someone has tagged you before that tag appears on Facebook.

Understand how Graph Search works

The new tool makes Facebook searchable like much of the internet (it’s actually powered by Microsoft’s  Bing). People can search for, say, a name and “Photographs”, and will see every image that person has been tagged in, or search for “London” and see images and “Likes” tagged in that location. It means a lot of Facebook content that users might have forgotten about is now easily available.

Don’t trust your Timeline

Posts that are hidden from your Timeline can be found by Graph Search – for instance by someone searching your name and “Photographs”. The only thing that counts is that photograph’s privacy settings, which determine whether it is visible to people in Graph Search.

Don’t assume that everyone sees the same thing

Graph Searches are personalised to each user – much in the same way as Facebook’s main News Feed is personalised to you. That means that people will tend to see results focused on their own friends. It also means, though, that you can’t be sure of what someone searching your name will see – it’s different for everyone. Lock down your privacy settings to be sure.

Learn how to use it

The best way to understand Graph Search’s power is to use it. Facebook suggests that you can use it to find “personalised” recommendations by searching, say,  “Hotels in Madrid that my friends like” or “Friends of friends who live in Manchester”. For a career boost, the social network giant suggests searches such as “friends of friends who work at King.com”.

Watch what you’ve “Liked”

If you hit the “Like” button a lot, watch out. People can search for what you’ve “Liked” using Graph Search – humour sites on the web have already used the search to highlight lists of people who use dating apps and who are also listed as “married”. Visit your profile, go to Activity Log, then remove any “Like” you wouldn’t want others seeing.

Don’t hand out extra information

Information that was previously only visible by going to your profile page – such as where you’re from – can now be searched via Graph Search. Consider making your Profile information private so that you don’t show up in searches for a particular location – otherwise you may show up in searches by people you don’t know. The same also applies to any location-based apps such as Foursquare.

Watch out for “Friends of Friends”

Graph Search makes it much easier to find information about you – so you should seriously consider raising privacy settings so that “Only Friends” can see your photos. If your privacy is set to “Friends of Friends” or “Public”, people you don’t know will be able to see your photographs, posts and Likes. This could mean that private information is available to employers or even cybercriminals.

%d bloggers like this: