Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

12/9/2010

42nd Birthday of the Mouse

Filed under: Deep Thoughts,Fun,Fun Work,Geek Work,Life, the Universe, and Everything,News and Current Events,Ooo, shiny... — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:29 am for you boring, normal people.
The moon is a Full Moon

It’s not quite the “birthday” of the mouse, but…

Today is the 42nd anniversary of the first time a mouse made its commercial debut, though the patent was actually granted just a few weeks earlier on November 17th. That’s right, the mouse, that marvel of modern technology that most of us use daily is just a little older than I am. Invented by Douglas C. Engelbart and the group of 17 researchers working with him in the Augmentation Research Center at Stanford Research Institute in Menlo Park, CA, the original mouse was little more than a square, wooden box, but the little device would change the world. Engelbart showed how the mouse could let a user jump from text on one part of the screen randomly to another section without having to scroll through the text inbetween. Doesn’t sound too revolutionary to us today, does it? But, think about how you navigated to this page to read this little blurb, then try to imagine doing it without a mouse. Or, imagine trying to use Photoshop or any other graphic design program for that matter without the point-click-and-drag of a computer mouse. Yeah, pretty much everything cool you can do on a computer these days involves a mouse or similar pointer. Now, of course, to me, that’s the real genius of an invention like the mouse; it seems so obvious that we wonder why we didn’t think of it sooner!

So, happy demo day, little guy. Thanks for giving me a job and us a way to waste time at work.

12/3/2010

Hacker Game

Filed under: Fun,Fun Work,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:29 am for you boring, normal people.
The moon is a Full Moon

No, not the old “Net Hack” game you remember.

No, this game is from Hack-A-Day’s site and a very custom job.  Seems like this hardware hacker guy got an old, toy electronic combination vault and made it a little more interesting.  He added a USB interface to it and a multi-level security “game”.  You have to attach a terminal to the USB interface and get root access to each level of the simulated computer environment to unlock the vault and get the goods.  Pretty cool, if you ask me!  Hollywood should go get this guy to make their interfaces more realistic!

Seriously, go check out “Playing hacker with a toy vault” on Hack-A-Day.  You’ll like it!

11/12/2010

IKEA Cad

Filed under: Art,Fun,Fun Work,GUI Center,The Network Geek at Home — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:30 am for you boring, normal people.
The moon is a Full Moon

No, not a cad program by the flat-pack king.

Rather cad files of 21 of IKEA’s designs.  Yep, now you can suck those ubiquitous IKEA designs right into your high-end architect’s cad program and use them to design your house.  ‘Cause, you know, after paying for an architect in this economy, how much money are you going to have left over for fancy furniture?

No, seriously, I just thought it was fun that someone had made cad drawings of IKEA stuff in 3D so you can use it to lay out your house or apartment.  The files are actually in Google Sketchup format, for guys like me who are always trying to do more with less, especially less expensive software!

11/5/2010

Gigabytes For Less

Filed under: Fun,Fun Work,Geek Work,The Network Geek at Home — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:14 am for you boring, normal people.
The moon is a Full Moon

I was going to share this right before Halloween, but something better came up, so consider this a “Halloween Chaser” to clear your palate.

If you’re like me, you have a lot of computer systems floating around and the one thing they all have in common is that they could use some more drive space.  So, again, if you’re like me, that means you end up buying all kinds of storage space, in one form or another, to meet that need.  Now, you can do it as economically as possible thanks to Gigs4Less.  No matter what kind of storage you need, from compact flash to hard drives, they list everything they can find on the web and sort it by price, price per megabyte, and any other way you can think of sorting it.
So stop wasting money and hit this site to find the biggest drive you can afford, for less!

And be safe out there trick or treating, okay, kids?

9/26/2010

Windows Password Recovery Tools

Filed under: Fun,Fun Work,Geek Work,GUI Center,MicroSoft,The Dark Side,The Network Geek at Home — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 1:44 pm for you boring, normal people.
The moon is a Full Moon

Remember, these are “administrator utilities” not “hacker tools”.

In my business, it pays to make the distinction.
When people call me for help outside the office, the calls usually fall into a couple categories; a virus, a slow computer, a lost password and “how do I do X?”  Sadly, I’ve been doing a lot of virus and spyware removal, but, also, lately, I’ve had a couple of “lost password” calls.  I actually love getting those, for a couple reasons.
First, lost passwords are surprisingly easy to recover if you have physical access to the machine.  It’s funny to me how few people get that.
Secondly, I find recovering passwords fun.  In a way, it was one of the first things that drew me into the business.  I was one of those guys who got hooked by the security bug not by War Games, but by Sneakers.  Yeah, I know, most guys my age especially will tell you it was War Games that really got them hooked.  What can I tell you?  I’ve always been kind of a late bloomer.  And, my dirty, little secret is that after seeing Sneakers, I wanted to be Marty Bishop.  Seriously.

Anyway, my recent experience with Windows password recovery requests gave me an opportunity to refresh my tools.  After Googling a bit, I found a handy About.com page titled “Top 6 Free Windows Password Recovery Tools“.  I downloaded several, most of which were based on bootable CDs of one kind or another.  I like those kinds of toolkits because they don’t require even limited access to operating system, just the ability to reboot the machine from the CD toolkit.
In the end, I tried two; 0phcrack and the Offline NT Password & Registry Editor.

Now, I’m not positive, but I’m pretty sure that 0phcrack is the free, opensource fork of l0phtcrack.  Now, for an old-timer like me, l0phtcrack was THE password cracker to have, back in the day.  Created by a group of well-known hackers, some of whom famously testified before Congress, it was not free.  At least, theoretically.  If you knew where to look, you could get copies.  And, yes, I  them.  But, this version IS free and seems like it had some improvements.
For one thing, the old version had a slightly clumsy text-based interface.  This version has a much nicer interface that seems to use X-Windows.  It’s also far more intuitive to use.  It ran pretty fast, really, though, sadly, didn’t seem to be able to crack the non-dictionary word used as a password on the Windows 7 box I was using it against.

On the other hand, the Offline NT Password & Registry Editor has been around for several years, and had several updates, though it retains the text-based interface.  I don’t remember when I used this the first time, but, so far, it hasn’t let me down in a pinch.  This time was no different.  So, yes, even though it has “NT” in the name, I’ve used it on everything from Windows 2000 through Windows 7 without a hitch.  Of course, your results may vary.  The bonus of this product is also it’s most potentially dangerous drawback; it directly edits the registry and password files.  This is dangerous, in a way, because if something goes wrong, this could, theoretically, lock you out of your machine permanently.  In practice, this has never actually happened to me.
One advantage of this utility is that you can change or simply remove the password for any active user on the system.  Also, you can use it to promote an active user to being an administrator equivalent.  Now, by “active user” what the developers mean is any account that is not disabled.  Though, I think there may be the option to activate a deactivated account.  I’m not positive, though, because I’ve never had to look for it or try to use it.  And, yes, this worked like a charm to simply blank the password on the Windows 7 machine that had apparently forgotten its own password.

So, there you have it.  Two tools to recover lost Windows passwords.
Oh, and, just a quick disclaimer here.  I’m not responsible for any damage you might accidentally do to your machines with these utilities.  Nor am I advocating using them to break into your ex-spouse’s computer to read their adulterous e-mail to their lover.
I’m just sayin’….

9/3/2010

Lifehacker iPhone App Pack

Filed under: Apple,Fun Work,Geek Work,Ooo, shiny... — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:09 am for you boring, normal people.
The moon is a Full Moon

Lifehacker loves iPhone apps almost as much as I do!

No, seriously, I use this thing for everything.  Not too long ago, I showed you a ToDo app that makes life easier for you when trying to keep track of all the things you need to do.  I’ve talked about other apps before, and, of course, earlier this week, I mentioned that people are using their iPhone as a security testing tool.  Really, there’s no end to what you can do with today’s smart phones, though I happen to prefer the iPhone, obviously.

In any case, Lifehacker has put together a list of apps that they recommend, most of which are free.  And, the few that aren’t are only a couple of dollars a piece.  If  you’re a heavy iPhone user, it’s worth it to go take a look at their selection of “must have” iPhone apps: Lifehacker Pack for iPhone.

7/30/2010

Cyber Cafe in a Shipping Container

Filed under: Fun,Fun Work,Geek Work,Life Goals,News and Current Events — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:59 am for you boring, normal people.
The moon is a Full Moon

I always come up with these ideas just before someone else announces their version to the media.

No, seriously, I was just thinking about finding the time to research what kind of power requirements a small network would have and figuring out what sort of solar setup would meet those needs.  I was thinking about it for disaster recovery, like after a hurricane or an earthquake, but, still the principal is the same as the Computer Aid Cyber Cafe in a Shipping Container.

I may still write up my ideas, one day, but, I think not during this particular hurricane season.

6/4/2010

Fancy Jewelboxes

Filed under: Art,Fun Work,Ooo, shiny...,Red Herrings — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:48 am for you boring, normal people.
The moon is a Full Moon

Tired of boring CD cases for your self-produced work?

Try Jewelboxes.
They’re easy to assemble and fully customizable.  Not quite on par with the big-budget commercial printing runs that someone like Microsoft or Sony or someone like that would do, but a whole lot better than a Post-It and a Sharpie!
Seriously, they’re pretty cool, so check them out.

5/21/2010

Keep Theives From Preying On Your Laptop

Filed under: Apple,Fun Work,Linux,MicroSoft,The Dark Side — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:42 am for you boring, normal people.
The moon is a Full Moon

Pardon the pun, but I hope it got your attention.

If you’re like most people who read this blog, you probably have at least one laptop.  Now, it may run Windows or Mac or even Linux, but, you likely have one and you wonder what might happen if it gets stolen.  Wonder no more.

Now, there’s free, Open Source software called Prey, hence the pun, that will track your stolen laptop.

5/14/2010

Power Twitter

Filed under: Fun Work,Linux,Red Herrings — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:07 am for you boring, normal people.
The moon is a Full Moon

I have a power problem.

Well, to be more precise, my office has a power problem.
Though, maybe it’s more accurate to call it a “power inconvenience” than anything else.  We make great, big, huge cranes.  These cranes take a lot of power, so when we’re testing them, our building suffers from huge power fluctuations.

So, what to do?  Well, possibly, setup a script on my Linux monitoring server to Twitter the power status of the big UPS in my office.  How?  Well with this tutorial on YourWarrantyIsVoid.com, that’s how.
(Okay, confession time…  This has been sitting in my queue so long that not only have I scrapped the Linux monitoring server, to be rebuilt at a future date, and the actual power problem has been resolved, too.  But, it was a good idea, so I’m going to share it anyway.  Enjoy!)

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.