Skip to main content

Posts

Showing posts from May 31, 2015

Why do the losers have all the good generals?

Montgomery, AL -  It is often stated in academia that the winners write the history. Perhaps that is true. The history of the world is something we see from the standpoint not of the Egyptians in Exodus, but of the Jews. Not of the barbarians from the north, but from the Romans. Not from the Trojans, but from the ones who built the great horse, the Spartans. But while all that is true, and while it is true that after you lose a war you suddenly become the most evil people in history while those who beat you are the righteous ones; and who were wrongly attacked, it is also true that we all love a good loser, especially if that good loser is a general. A look at the great pantheon of generals throughout history shows that many of the greatly loved were, in the end, losers. For instance Hannibal, leader of the Carthaginians against the Romans in the Punic wars, (I like him so much I named my dog after him), but for all the adoration he has received from historians throughout the years, he

Rick Perry: If at first you don't succeed

Atlanta, GA- When a party starts, the host is able to gush over the first person that arrives. If they are a particularly excitable and energetic host, they just might gush over the first few. But at some point, the ability to gush simply ends, and we get to the phase of just waving hi to Joe as he walks in. I don’t know when it happened, but the Republican Party of candidates for 2016 has become so crowded that we’ve gone beyond even having the energy to wave as a new candidate hits the door. We already have lots of far right wing conservatives running. We already have former governors running, and we even already have a Texan running. But that’s not stopping Rick Perry, Texas’ longest serving governor, the man who was the follow up act to George Bush Jr., and the man who managed the state into a fortress of conservative political ideals of God, Gravy, and Guns, from announcing that he will be running a second time for the presidency. Rick Perry, at least to me, comes across as a like

Smart Launcher for Android: Is It Really That Smart??? Download Free

Smart Launcher for Android The Basics Smart Launcher  is available on Google Play Store as a  free  and  paid  ($3.92) application that requires  Android  2 . 1 or newer. Once it’s installed and running, you’ll be greeted by a welcome screen and a quick setup wizard. The next step is getting acquainted with Smart Launcher’s Home screen. The main elements of the interface are: the clock and date, which can be customized, hidden or replaced by a widget the “flower” or “bubbles” which are your app shortcuts arranged in a circle, but can be moved, resized and organized differently the drawer, which contains all your apps sorted in several categories, and you access it either by swiping left or by tapping the icon in the bottom left corner The Pro version of Smart Launcher allows you to add widgets to your screen, create as many custom categories in the drawer as you want, and have up to nine screens. (Yes, this means that the free version currently supports just one screen). It’s easy to s

Commands That Every Windows User Should Know 2015

Commands That Every Windows User Should Know 2015 1. services.msc When you enter “services.msc” and press the Enter button, it will open up the Windows Services app where you can easily start, stop and configure other settings for each and every service individually. It’s quite helpful when you want to toggle a service. 2. mstsc Entering “mstsc” into the Run dialog box opens the Remote Desktop Connection app which allows you to connect to another Windows computer over the local network or through the Internet. This helps you to use the host computer as if your own. 3. msinfo32 If you want to quickly get your system information, then the “msinfo32″ command is the way to go. At a glance, it will display all the system details including the hardware resources and software environment. 4. sdclt This command opens the Backup and Restore window which allows you to quickly set a backup schedule or restore any of your previous backups. 5. compmgmt.msc The Computer Management app is where you c

10 ways to improve your Wi-Fi Performance 2015

10 ways to improve your Wi-Fi Performance 2015 Wireless networking can be more temperamental than the average British summer. A number of factors can reduce your wireless network's speed, which impedes streaming, online gaming, download times and web browsing. 10 ways to improve your Wi-Fi Performance 2015 But unlike the weather, there's more that you can do than merely moan about your network performance - in fact, there are many ways you can look at improving it. Here are ten suggestions for how you can get a faster wireless network, from tweaking your existing setup to looking at hardware upgrades. It sounds obvious that a more up-to-date router will be faster, but you may be unaware of how old and over-the-hill your existing networking kit is. A really old ISP-supplied router might be stuck on the ancient and painfully slow 802.11g standard, with a single antenna, and not enough processing capability to handle multiple devices at once. All ISPs provide you with a router or

How to Hack a Computer Using Just An Image 2015

Next time when someone sends you a photo of a cute cat or a hot chick than be careful before you click on the image to view — it might hack your machine. Yes, the normal looking images could hack your computers — thanks to a technique discovered by security researcher  Saumil Shah  from India. Dubbed " Stegosploit ," the technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims. Just look at the image and you are HACKED! Shah demonstrated the technique during a talk titled, " Stegosploit: Hacking With Pictures, " he gave on Thursday at the Amsterdam hacking conference Hack In The Box. According to Shah, "a good exploit is one that is delivered in style." Keeping this in mind, Shah discovered a way to hide malicious code directly into an image, rather than hiding it in email attachments, PDFs or other types of files that are typically used to deliver and spread malicious exploi

Microsoft Plans to Add Secure Shell (SSH) to Windows

Until now Unix and Linux system administrators have to download a third-party SSH client software like Putty on their Windows machines to securely manage their machines and servers remotely through  Secure Shell protocol or Shell Session  (better known as  SSH ). This might have always been an awkward feature of Windows platform, as it lacks both – a native SSH client software for connecting to Linux machines, and an SSH server to support inbound connections from Linux machines. But… Believe it or not: You don't need to deal with any third-party SSH client now, as  Microsoft is working on supporting OpenSSH. Yes, Microsoft has finally decided to bring OpenSSH client and server to Windows. The PowerShell team at Microsoft has announced that the company is going to support and contribute to OpenSSH community in an effort to deliver  better SSH support in the PowerShell and Windows SSH  software solutions. So, the upcoming version of  Windows PowerShell  – the command-line shell and s