5 Time-Saving Tools for Twitter:
Check out a round-up of apps that will let you do less and benefit more from your social media marketing efforts.
It's safe to assume that anyone who has a substantial number of Twitter followers (say, tens or hundreds of thousands) is not only interesting and entertaining... but is also really good at managing the process.
If you want to be good at managing your own Twitter process the problem is there are hundreds of Twitter tools and apps, including some really good tools you probably aren't using.
So I conducted a totally unscientific survey: I asked some of my Twitter followers who have at least 5-digit followings which tool they use the most for managing Twitter.
The clear winner was Buffer, a tool that lets you schedule tweets so you can avoid joining the tweet-a-minute club and so you connect with followers when they're most likely to be available and active.
If Buffer works for the big boys and girls, it can work for me and you, so I asked Leo Widrich, Buffer co-founder, for ways to streamline your Twitter efforts by leveraging Buffer:
Turn Twitter and Facebook into a social media dashboard.
Install a Buffer browser extension and you can turn your Twitter feed and Facebook stream into a social media dashboard.
Buffer buttons will appear wherever you need them, including the tweet and retweet buttons and the Facebook share button. The extension also reshares an actual image from Facebook photos.
Sharing content is a lot easier if you can share as you go; the extensions also work with Google Reader, Reddit, and HackerNews.
For more, here's Buffer's guide to using browser extensions.
Create Power Tweets.
With Twylah you can create personal brand pages for tweets.
Twylah also allows you to send what they call Power Tweets, making a tweet look like a small blog post. According to Twylah, Power Tweet pages increase clicks and engagement time (time spent with content) by a factor of 40, since Power Tweets are surrounded by short snippets of text and other relevant content on the Power Tweet page.
For more, here's Buffer's guide to Power Tweets.
Become a content curator.
Want to curate content for Twitter followers and Facebook fans? Check out Mr. Reader, an iPad RSS reading app. Mr. Reader lets you pull from your Google Reader feeds and browse using a very slick app. Then you can Buffer directly from Mr. Reader and post to different social networks and accounts.
If you've gotten away from RSS feeds, Mr. Reader might be the reason to go back.
For more, here's Buffer's guide to sharing from Mr. Reader.
Save and share.
Read It Later, now called Pocket, lets you save articles, videos, etc and--you guessed it--read it later.
Now you can also Buffer anything you save in Pocket, allowing you to read later and share from one place.
Create data-driven tweet schedules.
Tweriod is arguably the best Twitter analytic tool, especially where determining the best times to tweet is concerned. Twitter analyzes past tweet performance, when followers are online and engaged... and keeps automation tools from skewing results.
Integrate Buffer into Tweriod and it will suggest optimal Buffer timing and help you create data-driven schedules.
For more, here's Buffer's guide to integrating Tweriod.
Do you have Twitter tools and apps you love? If so, share them in the Comments below.
OS Problems And Solutions
Friday, June 29, 2012
How I Removed Windows XP Malware Blocking Antivirus Websites
How I Removed Windows XP Malware Blocking Antivirus Websites:
I have an old desktop with an AMD Sempron processor that runs Windows XP. It is mostly unused except for times when it is needed for downloading large chunks of data that takes hours or days. My brother had been using it to download themes for his PSP (PlayStation Portable) when I noticed that the trial version of some anti virus that I installed long ago had already expired. Not wanting to spread any unwanted snippets of code to and through our gaming consoles, I opted to download another trial of another AV software. I tried pulling up the usual security websites but all told me that the pages could not be displayed. The odd thing was that all the other websites were loaded just fine. I even tried pulling up the pages on my laptop and it worked without a hitch. The first thing I checked was for proxy servers on the browser itself. There weren’t any. I did ping tests and checked which ports were open and I came up with nothing. I then proceeded to uninstall all the software on it that I was not familiar with, leaving only the basic ones. The results were the same. I hopped over to my laptop and searched for the keywords “virus blocking antivirus websites”. The very first article that came up had the answer I was looking for. I did the first option under malware.
1. Go to Start.
2. Click Run.
3. Type “mrt.exe” and hit enter.
4. Choose “Full Scan”.
5. Restart once done.
The culprit was found and eradicated. After restarting the old box, I immediately tried going to one of the most popular anti virus software websites. Lo and behold, it opened without any issues. I downloaded a free copy of the AV that they were offering, did the updates, scanned and ran the anti rootkit feature. It’s clean for now. My brother still swears that he wasn’t the one who downloaded the nuisance.
Resources:
http://www.antihacksecurity.com/the-news/124-virus-blocking-web-sites-unable-to-download-antivirus
I have an old desktop with an AMD Sempron processor that runs Windows XP. It is mostly unused except for times when it is needed for downloading large chunks of data that takes hours or days. My brother had been using it to download themes for his PSP (PlayStation Portable) when I noticed that the trial version of some anti virus that I installed long ago had already expired. Not wanting to spread any unwanted snippets of code to and through our gaming consoles, I opted to download another trial of another AV software. I tried pulling up the usual security websites but all told me that the pages could not be displayed. The odd thing was that all the other websites were loaded just fine. I even tried pulling up the pages on my laptop and it worked without a hitch. The first thing I checked was for proxy servers on the browser itself. There weren’t any. I did ping tests and checked which ports were open and I came up with nothing. I then proceeded to uninstall all the software on it that I was not familiar with, leaving only the basic ones. The results were the same. I hopped over to my laptop and searched for the keywords “virus blocking antivirus websites”. The very first article that came up had the answer I was looking for. I did the first option under malware.
1. Go to Start.
2. Click Run.
3. Type “mrt.exe” and hit enter.
4. Choose “Full Scan”.
5. Restart once done.
The culprit was found and eradicated. After restarting the old box, I immediately tried going to one of the most popular anti virus software websites. Lo and behold, it opened without any issues. I downloaded a free copy of the AV that they were offering, did the updates, scanned and ran the anti rootkit feature. It’s clean for now. My brother still swears that he wasn’t the one who downloaded the nuisance.
Resources:
http://www.antihacksecurity.com/the-news/124-virus-blocking-web-sites-unable-to-download-antivirus
How I Stopped That Nagging WGA Notification
How I Stopped That Nagging WGA Notification:
I finally got sick of that useless notification on my desktop telling me that my copy is not authentic. Armed with internet, I searched for a way to kill that annoyance. I got to a WikiHow page that provided, in detail, what I needed to do. Long story short, it worked. I no longer have to suffer a black desktop and the occasional reminder that I need to contact Microsoft. Below are the steps that I did:
1. Open Notepad.
2. Paste the code from below, including one empty line in the end to represent the enter key.
3. Copy again.
4. Open the Command Prompt by clicking Start, then Run, typing CMD then hitting the enter key.
5. Right click on the black screen and select the Paste command.
* There should be an extra line when you paste. *
Resources:
http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
I finally got sick of that useless notification on my desktop telling me that my copy is not authentic. Armed with internet, I searched for a way to kill that annoyance. I got to a WikiHow page that provided, in detail, what I needed to do. Long story short, it worked. I no longer have to suffer a black desktop and the occasional reminder that I need to contact Microsoft. Below are the steps that I did:
1. Open Notepad.
2. Paste the code from below, including one empty line in the end to represent the enter key.
3. Copy again.
4. Open the Command Prompt by clicking Start, then Run, typing CMD then hitting the enter key.
5. Right click on the black screen and select the Paste command.
CD %systemroot%\system32
rename wgatray.exe wgatray.exe.bak
rename wgalogon.dll wgalogon.dll.bak
rename LegitCheckControl.dll LegitCheckControl.dll.bak
taskkill /F /T /IM wgatray.exe
del wgatray.exe.bak
del wgalogon.dll.bak
del LegitCheckControl.dll.bak
* There should be an extra line when you paste. *
Resources:
http://www.wikihow.com/Remove-Windows-Genuine-Advantage-Notifications
Problem with hal.dll in win XP
’ve run into this quite a few times especially when I’m cleaning up and uninstalling unused or useless programs in Windows XP. There is only 1 major thing that you need so you’ll be able to fix this – your hard drive connected to a working operating system with internet connection. It doesn’t matter what it is – Windows, Linux, Mac(haven’t tried with this one though). The internet connection is needed for you to copy a hal.dll file from the world wide web. But if the operating system you’re working on is XP, then you’ll just copy the dll file off of the working one.
The file’s location is C:\windows\system32. Paste the working hal.dll file into that folder to replace the corrupted one. Once that’s done, shut down the computer and get it ready to boot up using your hard drive. If there aren’t any hitches, you’ll see a very primitive windows xp desktop. Here is where the internet comes in handy. It will automatically search for drivers online and update them. After that, you’ll be able to customize the desktop settings or any other hardware settings that you had before this problem. Now if you do not have internet, it’s a lot of work. You have to load the drivers using your hardware’s respective CD’s – assuming you kept them.
In my case, I had internet. And I also had a perfectly working Linux Ubuntu 8.04 on another drive and broadband internet. So that after replacing the corrupted hal.dll file, the rest was pretty much automated. Switching and connecting hard drive wasn’t fun especially because I had an old dusty sempron rig. But all in all, it was a valuable learning experience. I very much thank Ubuntu.com for supplying me with the free CD’s to get started in my Linux learning.
http://vness.wordpress.com/2008/05/27/problem-with-haldll-in-win-xp/
The file’s location is C:\windows\system32. Paste the working hal.dll file into that folder to replace the corrupted one. Once that’s done, shut down the computer and get it ready to boot up using your hard drive. If there aren’t any hitches, you’ll see a very primitive windows xp desktop. Here is where the internet comes in handy. It will automatically search for drivers online and update them. After that, you’ll be able to customize the desktop settings or any other hardware settings that you had before this problem. Now if you do not have internet, it’s a lot of work. You have to load the drivers using your hardware’s respective CD’s – assuming you kept them.
In my case, I had internet. And I also had a perfectly working Linux Ubuntu 8.04 on another drive and broadband internet. So that after replacing the corrupted hal.dll file, the rest was pretty much automated. Switching and connecting hard drive wasn’t fun especially because I had an old dusty sempron rig. But all in all, it was a valuable learning experience. I very much thank Ubuntu.com for supplying me with the free CD’s to get started in my Linux learning.
http://vness.wordpress.com/2008/05/27/problem-with-haldll-in-win-xp/
Thursday, June 28, 2012
Bluition
Bluition:
Today we have a cool project coming to us from SparkFun customer Brad Nelson. Brad's daily driver is a bright red Kymco ZX50 scooter - not the most exciting of rides and not much to look at. So, like any good hacker, Brad said, "I can make this better."Here's what he did:
Brad calls his project "Bluition."Bluition is essentially a Bluetooth ignition device that allows him control his scooter ignition, starter, and seat latch from his Android phone using simple gestures, like shaking his phone.
Brad uses a program called Tasker, which communicates using a Python script and Bluetooth. Brad uses the RN-42 Bluetooth Module for wireless communication, a solenoid to pop the seat, MOSFET Control Boards, and some other various bits and bobs. One thing he didn't use - a dev board (no Arduino or otherwise!). Very cool work, Brad! Check out his webpage for more details and information on how to build your own!
Today we have a cool project coming to us from SparkFun customer Brad Nelson. Brad's daily driver is a bright red Kymco ZX50 scooter - not the most exciting of rides and not much to look at. So, like any good hacker, Brad said, "I can make this better."Here's what he did:
Brad calls his project "Bluition."Bluition is essentially a Bluetooth ignition device that allows him control his scooter ignition, starter, and seat latch from his Android phone using simple gestures, like shaking his phone.
Brad uses a program called Tasker, which communicates using a Python script and Bluetooth. Brad uses the RN-42 Bluetooth Module for wireless communication, a solenoid to pop the seat, MOSFET Control Boards, and some other various bits and bobs. One thing he didn't use - a dev board (no Arduino or otherwise!). Very cool work, Brad! Check out his webpage for more details and information on how to build your own!
Welcome '::1:'
Welcome '::1:':
World IPv6 launch day has come and gone, and you may have noticed SparkFun.com still doesn't sport a 'AAAA' record in our DNS.
If you're wondering what IPv6 or an AAAA record is, let me begin by stressing how important IPv6 is, and more so, how critical it is that the entire world transitions to it quickly. IPv6 is the replacement of the addressing system of the internet. Our current version of the internet's addressing system allots approximately 4.29 billion addresses. This is quite a bit fewer than the number of people in the world, and substantially fewer than the rapidly-growing number of internet-connected devices out there. There were over 300 million new Android phones activated in the last year alone, and that's not even scratching the surface (RFC2324 compliant coffee pots are going to push us over the edge).
During the inception of the internet, the initial address space was thought to be more than adequate, as the founders of IPv4 didn't expect the internet to ever expand outside a few university and military labs back in 1981. Even so, the old addressing system was well thought out for just being an experiment that never ended. 4.29 billion addresses is nothing to sneeze at, but the new address space of IPv6 is beyond gargantuan proportions. IPv6 ensures that this time around, we really won't run out by using a 128-bit address space. How many exactly? 340,282,366,920,938,000,000,000,000,000,000,000,000 - That's enough to assign an address to every eukaryotic cell in our galaxy, assuming that there are at least 10 billion other planets out there in the Milky Way just as alive as earth is. With numbers this large, the decision was made that standardizing allocations of address blocks trumps the immense amount of wasted space. Our /48 subnet allocation alone grants SparkFun an address space of 18,446,744,073,709,552,000 IPs. Unfortunately, this makes for some complex addresses, like: 2001:1926:3df:5:5054:ff:fe05:a221/64. Just a bit more difficult to remember than 192.168.5.61/24. On the other hand, IPv6 brings many new features, and negates the need for services such as DHCP, which is primarily used to allocate addresses from a pool to connected devices. This is because everything can be guaranteed a unique address by performing a stateless autoconfiguration, based on a broadcasted prefix to itself using Modified EUI-64, where the MAC address of the device is slightly modified and appended to the prefix. IPv6 is much, much more than just a larger addressing pool, it redefines traffic at one of the lowest layers in networking.
Earlier this month we made the jump to IPv6 internally, but unfortunately our upstream internet provider and datacenter host has yet to commit to supporting it. Luckily, a tunnel broker known as 'SixXS' granted us a /48 subnet in order to satiate our thirst for connectivity to the new internet (Special thanks to 'Jeroen' for making this happen). This, unfortunately, is a dirty workaround and came with a caveat. Both Windows and Linux systems will 'prefer' IPv6 routes over IPv4 by default, which makes for a substantial amount of traffic for our tunnel broker. The solution for this was to turn off the route, and use it only when needed, until our upstream provider starts routing IPv6 packets. Unfortunately, the adoption of IPv6 is still relatively low, but it's starting to climb quickly.
So, what does this transition mean for most end users? With IPv6, the days of NAT traversal are (almost) gone. NAT came around as a band-aid for the quickly-dwindling number of publically assignable addresses, and allowed you to have a single external address that people could contact all of your devices with. Unfortunately, this complicates life, as you need to tell your device doing your NAT translations where to send inbound traffic, and makes life substantially less fun for network administrators. Specifications such as UPnP and TCP/UDP hole punching such as ICE and STUN(T) consequently arose to allow devices and applications to receive unsolicited external connections. Being able to receive data without first initiating a connection is pretty important, as two devices behind a device doing NAT translation, such as a home router, can't talk to each other without a third party. This, however, led to NAT becoming a sort of security “feature” that helped eliminate many early worms and malware that attacked open ports with insecure services, such as the Blaster Worm.
IPv6 also augments mesh networking and the interoperability of personal area networks with existing networks, and specifications such as 6LoWPAN from the IETF have arisen to compete with ZigBee, currently found on most of our 802.15.4 modules (although ZigBee has announced that they are investigating the possibility of adding IPv6 support). Additionally, traffic can be encrypted using a standard known as IPsec, which was developed in conjunction with IPv6. All standards-compliant IPv6 devices are required to support IPsec, which should help to keep eavesdroppers from snooping in on traffic from your Tricorder -- at least until us mere mortals get our hands on quantum computers capable of using Shor’s algorithm.
The specification for IPv6 was finalized in 1996, and repeated deadlines to make the jump were facetiously missed by governments and large ISPs around the world for over a decade. Luckily, with the clock quickly nearing zero-hour, IPv6 is starting to be taken very seriously and is seeing rapid adoption and backing by large ISPs and companies, many of which have their own IPv6 awareness campaigns. A few of these can be found at Google, Comcast, ATT, and Cisco. If you're part of an organization which has yet to start the transition, urge them to start making preparations for the move!
If you're wondering what IPv6 or an AAAA record is, let me begin by stressing how important IPv6 is, and more so, how critical it is that the entire world transitions to it quickly. IPv6 is the replacement of the addressing system of the internet. Our current version of the internet's addressing system allots approximately 4.29 billion addresses. This is quite a bit fewer than the number of people in the world, and substantially fewer than the rapidly-growing number of internet-connected devices out there. There were over 300 million new Android phones activated in the last year alone, and that's not even scratching the surface (RFC2324 compliant coffee pots are going to push us over the edge).
During the inception of the internet, the initial address space was thought to be more than adequate, as the founders of IPv4 didn't expect the internet to ever expand outside a few university and military labs back in 1981. Even so, the old addressing system was well thought out for just being an experiment that never ended. 4.29 billion addresses is nothing to sneeze at, but the new address space of IPv6 is beyond gargantuan proportions. IPv6 ensures that this time around, we really won't run out by using a 128-bit address space. How many exactly? 340,282,366,920,938,000,000,000,000,000,000,000,000 - That's enough to assign an address to every eukaryotic cell in our galaxy, assuming that there are at least 10 billion other planets out there in the Milky Way just as alive as earth is. With numbers this large, the decision was made that standardizing allocations of address blocks trumps the immense amount of wasted space. Our /48 subnet allocation alone grants SparkFun an address space of 18,446,744,073,709,552,000 IPs. Unfortunately, this makes for some complex addresses, like: 2001:1926:3df:5:5054:ff:fe05:a221/64. Just a bit more difficult to remember than 192.168.5.61/24. On the other hand, IPv6 brings many new features, and negates the need for services such as DHCP, which is primarily used to allocate addresses from a pool to connected devices. This is because everything can be guaranteed a unique address by performing a stateless autoconfiguration, based on a broadcasted prefix to itself using Modified EUI-64, where the MAC address of the device is slightly modified and appended to the prefix. IPv6 is much, much more than just a larger addressing pool, it redefines traffic at one of the lowest layers in networking.
So, what does this transition mean for most end users? With IPv6, the days of NAT traversal are (almost) gone. NAT came around as a band-aid for the quickly-dwindling number of publically assignable addresses, and allowed you to have a single external address that people could contact all of your devices with. Unfortunately, this complicates life, as you need to tell your device doing your NAT translations where to send inbound traffic, and makes life substantially less fun for network administrators. Specifications such as UPnP and TCP/UDP hole punching such as ICE and STUN(T) consequently arose to allow devices and applications to receive unsolicited external connections. Being able to receive data without first initiating a connection is pretty important, as two devices behind a device doing NAT translation, such as a home router, can't talk to each other without a third party. This, however, led to NAT becoming a sort of security “feature” that helped eliminate many early worms and malware that attacked open ports with insecure services, such as the Blaster Worm.
IPv6 also augments mesh networking and the interoperability of personal area networks with existing networks, and specifications such as 6LoWPAN from the IETF have arisen to compete with ZigBee, currently found on most of our 802.15.4 modules (although ZigBee has announced that they are investigating the possibility of adding IPv6 support). Additionally, traffic can be encrypted using a standard known as IPsec, which was developed in conjunction with IPv6. All standards-compliant IPv6 devices are required to support IPsec, which should help to keep eavesdroppers from snooping in on traffic from your Tricorder -- at least until us mere mortals get our hands on quantum computers capable of using Shor’s algorithm.
The specification for IPv6 was finalized in 1996, and repeated deadlines to make the jump were facetiously missed by governments and large ISPs around the world for over a decade. Luckily, with the clock quickly nearing zero-hour, IPv6 is starting to be taken very seriously and is seeing rapid adoption and backing by large ISPs and companies, many of which have their own IPv6 awareness campaigns. A few of these can be found at Google, Comcast, ATT, and Cisco. If you're part of an organization which has yet to start the transition, urge them to start making preparations for the move!
Secure Socket Tunneling Protocol - SSTP
Secure Socket Tunneling Protocol - SSTP: Short for Secure Socket Tunneling Protocol, SSTP is a type of VPN tunnel that utilizes an SSL 3.0 channel to send PPP or L2TP traffic. SSL allows for transmission and data encryption, as well as traffic integrity checking. Due to this, SSTP can pass through most firewalls and proxy servers by using the SSL channel over TCP port 443.
SSTP is available to use in a Windows environment (since Windows Vista SP1), in RouterOS and in SEIL (since firmware version 3.50). SSTP can be used with Winlogon or smart card authentication, remote access policies and the Windows VPN client because of being integrated with the RRAS architecture. As with other IP-over-TCP tunneling protocols, SSTP only performs well if there is sufficient bandwidth on the un-tunneled network link. If enough bandwidth is not available, the tunneled TCP timers will possibly expire, causing a large decrease in SSTP performance.
More on Network Definitions: http://www.computerhope.com/jargon/network.htm
SSTP is available to use in a Windows environment (since Windows Vista SP1), in RouterOS and in SEIL (since firmware version 3.50). SSTP can be used with Winlogon or smart card authentication, remote access policies and the Windows VPN client because of being integrated with the RRAS architecture. As with other IP-over-TCP tunneling protocols, SSTP only performs well if there is sufficient bandwidth on the un-tunneled network link. If enough bandwidth is not available, the tunneled TCP timers will possibly expire, causing a large decrease in SSTP performance.
More on Network Definitions: http://www.computerhope.com/jargon/network.htm
Subscribe to:
Posts (Atom)