Archive for the ‘Muggle Tech’ Category

Where has customer service gone…?

Friday, August 29th, 2008

…It’s alive and well in the home appliances world.

On the heels of my wonderfull experience with KitchenAid I had to return one of my Henckels knives because a crack appeared in the blade. I wrote to them to see what the cost of repair was. They told me to ship them back the knife. I did that and promptly forgot about it for four weeks. Today my brand new knife arrived for free!

I am so glad that companies still stand behind their products. Too bad it’s a German company and not an American company.

Oh Mighty Isis

Monday, August 25th, 2008

So at the ball game today I decided to see how good the iPhone app is that recognized songs and allows you to purchase them. Between each inning they play music and I have wonder what some of the songs are. So, I started up Shazam! and well… Shazam! it recognized every song!

This app rocks!

Yubico’s Yubikey

Saturday, August 23rd, 2008

I received my two yubikey’s today. I quickly found the wordpress plugin and it JUST works after adding the plugin and setting up my account. Now I want to see if I can use this for my unix login and all other forms of authentication.

I am not who you think I am.

Wednesday, August 20th, 2008

Digging through my old email archives I found this:

Ok, I learned something really cool today from Sun.
How can you tell if a process is chroot’d or not? ps gives you no clue, nor does the kmem.
Here is a neat trick to figure this out.  You have to love those kernal hackers!!!

% ps -aef | egrep nscd
root  1022     1  0 09:21:20 ?        0:00 /bb/bin/nscd
% crash -d /dev/mem -n /dev/ksyms
dumpfile = /dev/mem, namelist = /dev/ksyms, outfile = stdout
> p #1022
PROC TABLE SIZE = 30000
SLOT ST  PID  PPID  PGID   SID   UID PRI   NAME        FLAGS
47 s  1022     1  1022  1022     0  50 nscd           load
> user 47
PER PROCESS USER AREA FOR PROCESS 47
PROCESS MISC:
command: nscd, psargs: /bb/bin/nscd
start: Thu Oct 24 09:21:20 2002
mem: 1fd, type: fork
vnode of current directory: 300041d98e8, vnode of root directory: 300041d98e8,
[rest of output deleted]

Run crash, then “p #pid”, then “user SLOT”

The fact that it lists “vnode of root directory” means it is chroot’d.

pretty cool 😉

Apple remote desktop through NAT

Wednesday, August 20th, 2008

For those of you wanting to know how to use ARD through a firewall or NAT bridge:

If you wish to use the Remote Desktop application from behind a NAT router, you will need to set UDP port forwarding for port #3283 to your administration computer. If you wish to access a client computer that is behind a NAT router, you will need to set the router to forward UDP port #3283 to the client computer you wish to access. Note: You will be able to access only that client computer.