Skip to content

Jean's Blog

I don’t get it why people are trying to reset this blogs password.  Get yourself a  And I am not selling you this blog either.  Thank you for visiting.

Windows 8 developer interface is best for touch screens. They made it too much of a touch screen, that having the mouse makes you feel back to kindergarten.  Take a look at the above pic its more of games, and social networking, what was Microsoft thinking.


Download Windows 8 Beta-Developer Preview:

Windows 8 32 bit Developers preview Size 2.8 GB

Windows 8 64 bit Developers preview Size 3.6 GB

Windows 8 64 bit Developers preview with Developers tools (SDK) for Metro style apps Size 4.8 GB


The below screens are if you navigate with the windows vista / 7 booted and double click the setup.exe file.

The next set of images shows the installation at boot time.

I had Windows Vista installed, therefore it the boot option.  Below screens are post installation.

Requesting you for a PC Name

Opting for the customizing

After installation, first screen right below. You will notice there is more of games, and mesmerizing stuffs, that does not mesmerize much. Anyway the vote is yours











Tags: , ,

Banned twitter password obtained directly from their source code, I wonder if it is normal to use javascript to do something of this kind.


(function() {
var r = [“000000″,”111111″,”11111111″,”112233″,”121212″,”123123″,”123456″,”1234567″,”12345678″,”123456789″,”131313″,”232323″























Tags: ,

Entered in the browser url and got this message, I wonder what this might be.

HTTP Host:
Generated: July 15th 2010 10:35:18 AM PDT
Locale: nu_ll
Path: css/34xs4zq8yiasksoo.pkg.css

.ego_page #fb_menubar_logo .fb_logo_link{padding-left:0}
.ego_page #fb_menubar{width:980px}
.ego_page #universal_search{padding-right:0}
.ego_page .UIWashFrame_MainContent{padding-left:0;width:980px}
.ego_page .UIWashFrame_MainContent{padding-left:0;width:980px}
.ego_page .UIWashFrame_Content{width:720px}
.ego_page .UIWashFrame_SidebarAds{width:auto}
.ego_page .footer .info{width:490px}
.ego_page .UIStandardFrame_Container{padding-left:0;width:980px}
.ego_page .UIStandardFrame_Content{width:720px}
.ego_page .UIStandardFrame_SidebarAds{width:auto}
.ego_page .photo_metadata .left_metadata{width:490px}
div.ego_header{margin:0 0 5px 0}
.ego_unit .UIImageBlock_Content{padding-top:0}
.ego_x{display:block;float:right;height:13px;margin:1px 2px 0 7px;width:11px;background:transparent url(/rsrc.php/z3O30/hash/3wq3vjh4.png) no-repeat -869px -65px;text-indent:-5000px}
a:hover.ego_x{background-color:#3b5998;background-position:-857px -65px;text-decoration:none}
.ego_spo .ego_image img{max-height:80px;max-width:100px;-ms-interpolation-mode:bicubic;_clear:expression(
style.height = this.offsetHeight > 80 ? "80px":"auto",
style.width = this.offsetWidth > 100 ? "100px":"auto",
style.clear = "none", 0
.ego_spo .click_text{color:#777}
.ego_spo .click_text:hover{text-decoration:none}
.ego_spo .ego_title{margin-bottom:4px;margin-right:20px}
.ego_spo .ego_social_context{margin-top:2px}
.ego_spo .UIEMUASSocialContext{padding-bottom:0}
.ego_medium .ego_image img{max-width:80px;-ms-interpolation-mode:bicubic;_clear:expression(
style.width = this.offsetWidth > 80 ? "80px":"auto",
style.clear = "none", 0
.ego_medium a.ego_fb_photo{border:1px solid #ccc;padding:2px}
.ego_medium a.ego_fb_photo img{max-height:100px;max-width:74px;-ms-interpolation-mode:bicubic;_clear:expression(
style.height = this.offsetHeight > 100 ? "100px":"auto",
style.width = this.offsetWidth > 74 ? "74px":"auto",
style.clear = "none", 0

#bootloader_css_34xs4zq8yiasksoo_pkg_css { height: 42px; }

Tags: ,

Hacker Evolution Duality, new hacking simulation and strategy game developed by Exosyphen studios will be available for Linux and you can pre-order the game now for $19.95.

About the Game
The game features a world populated by other hackers (AI). You will be able to play against them, or join them. Your choices of playing the game, will be virtually unlimited. Each hacker will be controlled by a neural network based Artificial Intelligence.
I tested Alpha build on my system and it is running quite nice though it seems not all game features are included in this build.
Every level in the game have certain objectives to complete within a pre-defined time limit. To complete the objectives, you will have to go through various servers and hack them using various tools like EMP and DOS attacks. However, each server have different strengths determined by firewall power, CPU power and integrity.
Most of the time, you will not be able to hack a server in just one EMP or DOS attack. So you will have to attempt multiple attacks on the server to the point that it gets really weak, ready to be hacked. But each decisions you make costs you time and you cannot use two successive EMP or DOS attacks as there is a certain recharge time before you can use them again.
Also, you cannot just attack a server and go. The server will retaliate as soon as you start a hacking attempt and a timer will start. Once the timer goes off, it will start tracing you and you may have to quickly move away from the server, even if your hacking attempt is not finished. Say if a level have ten servers and in attempt to hack them all you get fully traced before completing your objectives, the level fails. Though the only level in this build is easy and there is really low chance that you will get traced.
So, everything is about choices you make. Though the game looks straight forward, its actually quite addictive. The game animations, music and sound effects are really good. Wish I could test more features, levels and game modes in higher difficulty settings.
Installation Instructions
  • Grab the Alpha build from here
  • Extract the archive, install the dependency libglut3
  • Run 32bit or 64bit executable from the game folder


Tags: ,

Microsoft chief Steve Ballmer on Monday confirmed that Windows 8, the next iteration of the software giant’s operating system, will be available in 2012.

Speaking at a Microsoft Developer Forum in Tokyo today, Ballmer said Microsoft is “obviously hard at work on the next version of Windows.”

“As we look forward to the next generation of Windows systems, which will come out next year, there’s a whole lot more coming,” he continued. “As we progress through the year, you ought to expect to hear a lot about Windows 8. Windows 8 slates, tablets, PCs, a variety of different form factors.”

variety of rumors regarding Windows 8 have popped up on the Internet in recent months, but Microsoft has yet to confirm any particular features it will add to the OS. While Ballmer didn’t go into detail about what Windows 8 users will see, he did outline several areas into which Microsoft is committed to investing.

One of those areas is the natural user interface, or “the notion that we really want to speak, wave and gesture, touch and mark on our computing devices,” Ballmer said. Microsoft wants your device to recognize you and your actions, like Kinect does for gaming (and your Netflix and Hulu queues).

To that end, Microsoft is also focusing on natural language. “Today on a PC, it’s file open, blah, blah, blah, respond, reply, forward. I can’t just say to my device, get me ready for my trip to Tokyo,” Ballmer said. ” We ought to make it so that the search engines, and the user interface of the device can take actions on our behalf.”


Tags: ,

You probably are a frequent Windows or Linux user, used to one key delete.  On the Mac there is no direct delete button for a file, but Apple Key(CMD)+BACKSPACE should do the trick.

Tags: , ,

The vast majority of devices running Google’s Android operating system are vulnerable to attacks that allow adversaries to steal the digital credentials used to access calendars, contacts, and other sensitive data stored on the search giant’s servers, university researchers have warned.

The weakness stems from the improper implementation of an authentication protocol known as ClientLogin in Android versions 2.3.3 and earlier, the researchers from Germany’s University of Ulm said. After a user submits valid credentials for Google Calendar, Twitter, Facebook, or several other accounts, the programming interface retrieves an authentication token that is sent in cleartext. Because the authToken can be used for up to 14 days in any subsequent requests on the service, attackers can exploit them to gain unauthorized access to accounts.

“We wanted to know if it is really possible to launch an impersonation attack against Google services and started our own analysis,” the researchers in the university’s Institute of Media Informatics wrote on Friday. “The short answer is: Yes, it is possible, and it is quite easy to do so.”

The findings build off previous findings of Rice University professor Dan Wallach, who in February uncovered the Android privacy shortcomings during a simple exercise for his undergraduate security class. The attacks can only be carried out when the devices are using unsecured networks, such as those offered at Wi-Fi hotspots.

Google patched the security hole earlier this month with the release of Android 2.3.4, although that version, and possibly Android 3, still cause devices synchronizing with Picasa web albums to transmit sensitive data through unencrypted channels, the researchers said. Based on Google’s own statistics, this means more than 99 percent of Android-based handsets are vulnerable to the attacks, which are similar in difficulty and effect to so-calledsidejacking exploits that steal authentication cookies.

A Google spokesman said the company’s Android team is aware of the Picasa deficiencies and is working on a fix.

Researchers Bastian Könings, Jens Nickels, and Florian Schaub warned that the weaknesses could be used against people who use their Android devices on networks under the control of an attacker.

“To collect such authTokens on a large scale an adversary could setup a wifi access point with a common SSID (evil twin) of an unencrypted wireless network, e.g., T-Mobile, attwifi, starbucks,” they wrote. “With default settings, Android phones automatically connect to a previously known network and many apps will attempt syncing immediately. While syncing would fail (unless the adversary forwards the requests), the adversary would capture authTokens for each service that attempted syncing.”

Apps that use ClientLogin should immediately start doing so over encrypted, https channels, the researchers said. A more robust authentication protocol known as oAuth will also close the authToken capture vulnerability, although https should still be used to prevent synced data from being intercepted.

The researchers also suggested Google improve its security by shortening the length of time authTokens are valid and rejecting ClientLogin requests from insecure http connections.

With more than 99 percent of carriers offering their users Android versions with known security weaknesses, the report demonstrates how little success Google has had in getting its partners to upgrade to the latest versions. Many Verizon Wireless customers, for instance, remain stuck with Android 2.2.2, despite containing vulnerabilities that have been known about for months.

Last week, Google said it planned to work more closely with wireless carriers in an attempt to help them offer Android updates more quickly. The company has yet to offer details.



The best part of waking up…is a smartphone in your hand? According to an Ericsson survey, that’s true for over one third of Android and iPhone owners.

A new survey from telecom equipment maker Ericsson (PDF) finds that some smartphone users are very, very attached to their devices, finding that fully 35 percent of iPhone and Android users in the United States admit to using non-voice applications before they even get out of bed in the morning. Some 18 percent of those users say they log in to social networking apps before they get up—and Facebook is the most popular. However, social networking from bed only tied with late afternoon and early evening as the most common “situations” for tapping into social networking services. Smartphone users said they were more likely to use social networking apps in the late evening (34 percent), at lunch (26 percent), or in the morning (22 percent) after they got up.

Our research found apps are appealing to people at an emotional level,” said Ericsson ConsumerLab heard of research Michael Björn, in a statement. “Consumers become attached to a certain set of apps that makes them feel more in control of their lives, and turns everyday chores into positive experiences. Apps even give consumers a new sense of freedom; if a new situation arises, there’s probably an app out there that could help them.”


With Ubuntu 11.10 requiring a slick, ‘consumer orientated’ login experience that better matches the rest of Ubuntu, the decision to switch to ‘LightDM’ proved the ideal solution.

LightDM is promoted as fast, small, well documented, is easily themable and has ‘great accessibility’. A 3D-based interface will greet those with capable hardware, with a 2D version being used fallback where not supported.

The advantages of using LightDM instead GDM are according to launchpad blueprint:

  • – Faster – the greeter doesn’t require an entire GNOME session to run
  • – More flexible – multiple greeters are supported through a well defined interface. This allows Ubuntu derivatives to use the same display manager (e.g. Kubuntu, Lubuntu etc).
  • – Simpler codebase – similar feature set in ~5,000 lines of code compared to 50,000 in GDM
  • – Supports more usecases – first class support for XDMCP and multihead.

Note: this blueprint is marked with a “low priority” tag on launchpad so it may not end up landing in 11.04.

Source is in Launchpad (bzr clone lp:lightdm) and tarball releases.

If you are using Ubuntu (Lucid or Maverick) you can install it from a PPA:
$ sudo add-apt-repository ppa:robert-ancell/lightdm
$ sudo apt-get update
$ sudo apt-get install lightdm lightdm-theme-webkit lightdm-theme-gnome

You can test lightdm by running it in a window:
$ sudo apt-get install xserver-xephyr
Create the file lightdm.conf:
$ lightdm --test-mode -c lightdm.conf


It had not worked for me though, I wonder why.  It might not work for those who have graphic card issues with GNOME 3.