When setting up sshfs mounts and Linux samba servers, one can make it so that symbolic links are followed (so they aren’t broken). For sshfs, add the
follow_symlinks option. In
/etc/fstab/, the entry would look something like
sshfs#USERNAME@SERVERNAME: /mnt/acer fuse fsname=sshfs#USERNAME@SERVERNAME:,comment=sshfs,noauto,users,exec,uid=1000,gid=1000,allow_other,reconnect,transform_symlinks,follow_symlinks,BatchMode=yes 0 0
For samba, add the following to either the
[global] options or the individual location in
follow symlinks = yes
wide symlinks = yes
unix extensions = no
Make sure samba is restarted and the sshfs mount point is re-mounted.
I just installed Linux Mint on my Asus T101MT. As with all my computers, I prefer to have the caps lock key as a control key. Of these methods, only the
xkb command works. To have the key remapped every session, I followed these instructions and created the file
Comment=Remap caps lock as control.
Exec=setxkbmap -option ctrl:nocaps
I just discovered Voodoo OTA Rootkeeper, which makes a backup copy of root (
su) and could restore root after any OTA update. I guess this is useful for me since I haven’t installed any custom roms on these two devices (yet) and am able to do OTA updates. The app does not work with all devices, but it works on my HTC Evo 3D phone and Asus Transformer Prime tablet.
When it comes to learning, I buy into the “learning by doing” philosophy. This is especially true when learning a computer tool or programming language. I stumbled upon this regex tutorial that makes use of a set of exercises in conjunction with regetron. Time to hone in on my regex skills.
This site lists 52 things that people should know about cryptography, if you want to get into the cryptography world. I was also recommended Bruce Schneier’s book, Applied Cryptography: Protocols, Algorthms, and Source Code in C.
This post does a fantastic job of the Mahalanobis distance. Basically, one can think of it as a multivariate generalization of the z-score. That is, the standardized distance of a vector from the origin (mean vector).
I read this interesting post the other day about how to break those annoying CAPTCHA’s by utilizing cheap labor (like $1 for 1,000 captchas) from less developed countries with services like Antigate. Kind of a cool thought, but that would just mean it’s easier for the spammers to work.
This site allows me to convert what I write to LaTeX or MathML codes. I think it’s conversion or translation is quite accurate after a quick test.
This post educated me on why there are
sbin (superuser) directories in
/opt/. The splits came from historical constraints.
This post discusses how one could use Reaver to make use of a flaw in WPS to recover a WPA password. Tomato and DD-WRT firmwares don’t support WPS so my network is safe. Lesson: buy and use a router that you can flash Tomato or DD-WRT.
On another note, WEP passwords could also be compromised using BackTrack.