Just in-case the files disappear – method worked fine on Windows 7 – June 2013
Just in-case the files disappear – method worked fine on Windows 7 – June 2013
cd $HOME/PyBitmessage/src/ && nohup python ./bitmessagemain.py
If you want to start Bitmessage automatically when you login, make a new file into your ~/.config/autostart/ directory:
$ gedit $HOME/.config/autostart/bitmessage.desktop
[Desktop Entry] Type=Application Exec=nohup python /home/youruserfoler/PyBitmessage/src/bitmessagemain.py Hidden=false NoDisplay=false X-GNOME-Autostart-enabled=true Name=Bitmessage gedit $HOME/Desktop/bitmessage.desktop Then you should click on the new icon with the right mouse button, select "Properties", click on "Permissions" and mark "[x] Allow executing file as program".
I have discovered by adding the Bitchirp Bitmessage address to the subcriptions I can read the Chirps sent to Bitchirp.org without actually visiting the site. As such it occurs to me that it’s very easy to create new “rooms” for topics we like by chirping an address and “subscribing” via bitmessage. Thanks Bitchirp for being a great place to start. I’m going to suggest a topic that makes the world go round –#PornÂ s…
There was this posting on coindesk.com the other day:
Bitcoin exchanges operating in the UK do not have to register with HM Revenue & Customs (HMRC) under money laundering regulations, the government department has revealed. 8th July 2013.
Then this posting yesterday 11th July announcing the Bitcoin.de exchange being able to work with a German Clearing Bank (Fidor Bank AG), which will then be able to fully comply with any KYC/AML requirements . This looks like it near enough caused Bitcoin to jump 10% overnight.
However it should be bourne in-mind that I believe the most single important investment money or otherwise in the Bitcoin arena is Google’s recent investment in Ripple.com or OpenCoin (the company), this is an allied trading platform with a Bitcoin API – those network if secure enough could be a competitor to all merchant services clearing, like VISA and Mastercard – hence Google’s investment.
Note that Google have invested – small change, but it’s still VERY telling.
Ripple, billed asÂ â€œthe worldâ€™s first open payment networkâ€, may lack the rebel allure of Bitcoin itself, but its distributed model could patch one of Bitcoinâ€™s chief weaknesses, namely its reliance on a few sometimes less-than-transparent exchanges. Of course, Ripple will be usable for the exchange of other currencies, too, and it arguably sits alongside other new financial technology startups such asÂ Transferwise.
RIPPLE now allows you to pay anybody in Bitcoin as of 2nd July 2013 in a way that might promote Bitcoin to be used for FOREX. Note that the first bitcoin exchange – bitstamp.net is a British company, yet unable to find a British bank to sort out payments yet… Although bitstamp.net do require all the KYC documents to open an account with them, so the exchange is already in a prime position to completely challenge mt.goxÂ – Americans, you’ve just got to love’em.
Disclosure: The author has accounts with most of the bitcoin exchanges with KYC requirements or otherwise.
Slashdot.org reported today onÂ UK Police Launch Campaign To Shut Down Torrent Sites
What does this mean to me? Â The politicians are yet again being lobbied about a subject they nothing about and it will actual make the prospect of investigating organised crime actually more difficult in future if FACT and the BPI continue to gain sway.
OK – so here are the FACTSÂ according to Mark
If you are forty something, you were at school of the time of “ghetto blasters”, which commonly had a tape to tape facility were owned by half the classroom. In fact Amstrad was taken to court, and neither the shops nor Amstrad were held responsible for the crime that MIGHT be committed by that device. In exactly the same way that a torrent index site might be used to access copyrighted materials.
The fact of the matter was the tape to tape devices at the time were actually aimed, marketed and priced at people to perform illegal acts. What has changed? NOTHING.
Now going back a paragraph do you remember having a whole load of pirated albums from you mates on tape? Remember the Sony C90 cassettes? (Blue and Green) Still got them – doubt it. Why – because this generation I am describing went out and bought them all on CD? Remember Love over Gold being one of the first AAD issued CD’s?
Back to today, the generation that is torrenting movies now will have purchased their favourite DVDs orÂ a real digital download license by the time they are forty. Why – even if they know how to obtain a copy of a compression quality ratio that is stunning, they’ll just opt to pay the Â£9.99 out of shear convenience, just like my peers bought CDs. Remember the tape example. Where are the tapes? Video killed the radio star but did home taping really kill music?Â RUBBISH.
Now lets turn our attention to the organised crime debate, if people are downloading movies and turning them back into DVDs to be sold on street markets in third world countries or Western High Streets. FACT and the BPIÂ will never stop either. If they somehow managed to kill torrent indexes, it just means that people will obtain one legal copy and copy it – just like tape to tape recorders. However that will never happen, the current public torrent indexes will just move over to TOR or Freenet.
OK I’ll be honest here I’ve been keeping you hoodwinked all along.
This torrent malarkeyÂ has little to do with piracy as I have narrated above, it’s more about freedom of speech / free will.Â As Internet bandwidth flourishes from 7 mbps in the UK to say 10 -14 mbps then distributed TV using torrent starts to become a very interesting prospect.Â Brands will start to finance independent sitcoms/soaps/CSI/BGT/BigBrother and news exaggeration will change from the established media to independents.
Agencies don’t care about Murdock, in fact they are sick of being dictated prices to, hence the extended payment terms negotiated last week across the world. Agencies only care about their clients (brands), and wake up people, it’s all about the brand. Nothing else matters in a consumer society where a 3D printer will make anything you want. Or certainly change product manufacture dramatically over the next 10 years.
What do 3D printers need? Data files anonymously sourced? Hold on, you can make a gun with a 3D printer.
So you really want to drive this torrent “thing” underground and really make it untraceable? Yer right. 48 carat stupidity.
Now if I was cynical I’d say that this move to drive the torrent index engines underground to darknets would be an excellent way for QCHQ and the NSA to obtain more budget…
It’s ineviatble that the conversion value of the Bitcoin currency will drop towards the end of 2012 with Fiat currencies.
Why, BTCFGPA and Butterfly Labs are bringing to market specialised ASIC computers just to mine Bitcoins. You connect the boxes to your standard PC, they mine quicker and consume less electricity. My “guess” is at least a quarter on Butterly’s 832MH unit – 80W. (Compared to a standard PC rig and high end video card).
Lower power consumption to mine bitcoins = lower fiat money conversion value.
Bitcoin backed by
People including so called “Bitcoin experts” write that Bitcoin is not backed by anything. This is absolute tosh. Gold and silver are backed by oil in today’s world, and Bitcoin is backed by electricity. Gold and silver has to be mined, and miners and the processes involved are paid in Fiat money which is underwritten by oil in some way. But the beauty of Bitcoin is that it is directly backed by the market price of electricity – until the 21 million coins have been produced…
I propose by my bi-polar nerve endings that the price curve for Bitcoin will be a bathtub curve over time.
Bitcoin v Fiat
The value of Bitcoin isn’t in a day to day spot price v a Fiat currency. The value of Bitcoin lies with what it will do to society, because of what you can do with it.
1. Run the following command in a terminal:
sudo apt-get install network-manager-pptp
2. Click on the network manager icon in the task bar and select VPN Connections and then Configure VPN. In the VPN configuration window, click Add then click Next and the second page, under Connect To, select PPTP Tunnel and then click Next.
In the Connection Tab:
a. Under Connection Name enter ItsHidden
b. Under Gateway enter vpn.itshidden.com
c. Under username and password, enter the username and pass you enter when creating a ItsHidden account
3. On the Advanced options, check the option “Use Point-to-Point Encryption (MPPE)” and select 128 bit type encryption.
4. Apply the changes and go to the network manager in the notification area and right click it, click on “VPN Connections” and choose the newly created “ItsHidden” connection -> you should now be connected to the VPN. If you have successfully connected, a small ‘lock’ icon will be displayed next to the connection icon in your notification area like in the image below:
A new wire protocol enabling applications to connect directly in a real-time and fully distributed manner, freeing them from relying on centralized datacenters
telehash == probably the most important internet protocol yet to be created
Huawei E173 on Ubuntu
added by Jakub Fedyczak on Monday, May 21st 2012, 21:15
I’ve been trying to get my Huawei E173 modem working on Ubuntu. I’m no Ubuntu expert and it took me half a day to get it working, so here’s what I eventually did:
Use HyperTerminal on Windows to switch device into modem mode (factory default is to make it a CD-ROM and a microSD card reader). Install all the drivers and connect to correct COM port. In my case it was COM3, but it was just my case. I’ve been trying to issued AT on all COM ports and finally I saw OK. Then I issued AT^U2DIAG=0 which also resulted in OK. If you don’t want to do this, you can try using usb_modeswitch.
On Ubuntu I’ve inserted the device, and issued lsusb:
Bus 001 Device 003: ID 12d1:1c05 Huawei Technologies Co., Ltd.
I’ve edited /etc/modules and added a line:
usbserial vendor=0x12d1 product=0x1c05
Configure your mobile broadband connection using gnome network manager.
Use at your own risk (especially the Windows part).
Screen 0: minimum 320 x 200, current 1920 x 1080, maximum 8192 x 8192
VGA-0 connected 1920×1080+0+0 (normal left inverted right x axis y axis) 0mm x 0mm
800×600 60.3 56.2
DIN disconnected (normal left inverted right x axis y axis)
DVI-0 disconnected (normal left inverted right x axis y axis)
Had to manually define 1920 x 1080 @ 60 Hz
cvt 1920 1020 60
xrandr --newmode "1920x1080_60.00" 173.00 1920 2048 2248 2576 1080 1083 1088 1120 -hsync +vsync
xrandr --addmode VGA-0 "1920x1080_60.00"
xrandr --output VGA-0 --mode "1920x1080_60.00"
Toshiba Software Installer for Windows 7 – both 32bit & 64bit installer in one.
Re:The answer is still keepass (Score:4, Interesting)
by omglolbah (731566) Alter Relationship on Saturday December 31, @01:56AM (#38544890)
1. Buy domain.
2. Set up *@domain to forward to your real email account, optionally apply a label (I do this with gmail labels)
3. Register with sitename@domain as email address.
4. Check real email and verify account.
Unique email for each site. No need to guess.
A bonus is that if you start getting spam you can see where it originated by what email it starts coming in on.
I noticed a year or so ago that curse got hacked as I started getting wow phising emails to the email I registered for curse with 😉
Just redirect to /dev/nul when it happens :p
Updates in XP – just plain FUCK OFF in XP Pro. If you run Microsoft Windows, your machine has high degree of being hit by a Zero Day Exploit, so why loose 15% of your boot up time to all the patches, that alledgely make it more secure? TLD4 – BBC Newest Adobe zero-day PDF exploit ‘scary,’ says researcher
Re: How to burn HP Recovery Disc without using Recovery Manager?
you can restore the MBR, the procedure is given below and then use the
F11 key to restore your system completely. After that you can burn your recovery discs.
This procedure will perform a destructive restore ( delete all data on the hard drive). So make sure you backup your data before starting out.
The recovery partition is visible as
after a clean install. It may be another drive letter on your system so make sure you change it to D: . Explore this recovery partition, the files may be hidden so you may need to go to
Tools > Folder Options > View >
show hidden files and folders
, and uncheck
Hide Extensions for known File types
Hide protected operating system files ( Recommended )
. Then you must be able to view a folder named
and inside this folder
Make sure you have two files inside the D:\miniNT\System32 folder, the first one
and the second one
now go to
Start > RUN >
D:\miniNT\System32\MBRInst.exe /ini D:\miniNT\System32\MBR.ini /r /q
and hit enter.
restart your system, your system will boot into recovery mode & resotre your system completely, after which you can create your recovery disks.
hope this helps
Last edited by cluelessME : 08-29-2007 at 04:16 AM.
This jem is copied in case the original site goes tits up.
When booting off yoru USB stick it will hang at:
press the TAB key and type â€œliveâ€
wait a long time
User = â€œeeeâ€ password is blank
hit the “install v4” icon when you see it 🙂
When Leeenux starts, it may ask you for keyring password. Enter "2", and then do the following:
1. Open up your Home Folder
2. Press CTRL-H (or click View>Show Hidden Files)
3. Find a folder called .gnome2 (it has a period at the beginning of the name) and open it by double clicking on it
4. In side of the .gnome2 folder, there is another folder called keyrings. Open it up.
5. Delete any files you find within the keyrings folder
6. Restart the computer
Do above or you will have to keep entering your keyring to get remembered WiFi to work
There’s been a lot of talk about this renogade OEM Gigabyte mobo – maybe too much talk.
mobo GA-8SIMLNF R2
Ordinarily the Audio_Realtek_188.8.131.5228_XPx86_A.zip driver crashes out with this dialogue box:
Get hold of the R111.zip from I cannot remember through the madness of it all!
Which essentially the same stuff
Google “sis drivers windows xp 7012”
Go to the XP directory
And edit the SIS7012.inf file
At the end of the [SIS] section
add to end:
The Hardware ID key was missing so the mobo motherboard sound chip is screwy.
Job sussed – DONe
sudo apt-get install git
git clone http://github.com/thekindofme/gmail_attachment_downloader
sudo apt-get install ruby
sudo apt-get install rubygems1.8
sudo gem install tmail
sudo apt-get install vim
# Don’t path the rename directly – as the path may contain uppercase letters!
rename ‘y/A-Z/a-z/’ *
# shopt -s nullglob
# Took the above out on my Ubuntu – I got an error saying it was missing YMMV
for f in $FILES
echo “Processing $f file…”
# Delete stray attachments which weren’t PDF files, but got downloaded anyway
#Make shutdown executable by any user for cron to be able to handle
sudo chmod u+s /sbin/shutdown
wizard@printer:~/gmail_attachment_downloader$ crontab -e
*/3 * * * * ruby ./gmail_attachment_downloader/gmail_attachment_downloader.rb 2>&1 > /dev/null # JOB_ID_1
01 19 * * * /sbin/shutdown -h now 2&1 > /dev/null # JOB_ID_2
If you can read this – it worked!
Page 1 of 9, Reprint (13/9/05). This is This is information retrieval. If we’re going to have an ID card, let’s have a 21st century ID card. David G.W. Birch. Director …
And in case it disappears from the ether, you can find it
This is information retrieval – by David Birch 2005-09-13 05idreprint
Speculating About Gmail
Posted by michael on Monday April 05, @04:05AM
from the talk-is-cheap dept.
To start the program, type screen. Screen then creates a single window with a shell in it. You now have the ability to detach and reattach, turn output logging on, etc. But mostly screen stays out of your way. You work as you normally would.
-a is the default key used to send a command to the screen window manager. To create a new window, type -a, and then c. Now you have two windows.
To switch from window to window you can type -a n, to go to the next window, -a p, to go to the previous window, or -a and the window number. For example, -a 7 would switch you to screen number 7. How do you detach? -a d, to detach. If you’re viewing screen number 7 when you detach, screen number 7 will reappear when you reattach. To reattach the next time you log in, start screen with the -r flag
Create new screen:
screen -d -R -S test
Kill the current window:
screen -d -R -S test
-d -R Reattach a session and if necessary detach or even create it first
-4 Resolve hostnames only to IPv4 addresses.
-6 Resolve hostnames only to IPv6 addresses.
-a Force all capabilities into each window’s termcap.
-A -[r|R] Adapt all windows to the new display width & height.
-c file Read configuration file instead of ‘.screenrc’.
-d (-r) Detach the elsewhere running screen (and reattach here).
-dmS name Start as daemon: Screen session in detached mode.
-D (-r) Detach and logout remote (and reattach here).
-D -RR Do whatever is needed to get a screen session.
-e xy Change command characters.
-f Flow control on, -fn = off, -fa = auto.
-h lines Set the size of the scrollback history buffer.
-i Interrupt output sooner when flow control is on.
-l Login mode on (update /var/run/utmp), -ln = off.
-ls [match] or -list. Do nothing, just list our SockDir [on possible matches].
-L Turn on output logging.
-m ignore $STY variable, do create a new screen session.
-O Choose optimal output rather than exact vt100 emulation.
-p window Preselect the named window if it exists.
-q Quiet startup. Exits with non-zero return code if unsuccessful.
-r [session] Reattach to a detached screen process.
-R Reattach if possible, otherwise start a new session.
-s shell Shell to execute rather than $SHELL.
-S sockname Name this session <pid>.sockname instead of <pid>.<tty>.<host>.
-t title Set title. (window’s name).
-T term Use term as $TERM for windows, rather than “screen”.
-U Tell screen to use UTF-8 encoding.
-v Print “Screen version 4.01.00devel (GNU) 2-May-06”.
-wipe [match] Do nothing, just clean up SockDir [on possible matches].
-x Attach to a not detached screen. (Multi display mode).
-X Execute <cmd> as a screen command in the specified session.
screenÂ command begins withÂ
||Create new window (shell)|
||Kill the current window|
||List all windows (the current window is marked with “*”)|
||Go to a window numbered 0-9|
||Go to the next window|
||Toggle between the current and previous window|
||Start copy mode|
||Paste copied text|
||Help (display a list of commands)|
||Power detach and logout|
||Detach but keep shell window open|