RaspBMC + MPEG2 licence = semi-smart 8 year old TV

So as I realized while experimenting with RaspBMC some of my media plus what is served from PlayOn PC is streaming video as MPEG2. I wasn’t going to succeed with replacing my XBOX (classic) running XBMC with the limitation. Fortunately recently there was a posting about support of MPEG2 on the Raspberry Pi if you purchase the license. So I looked into that further and for the $3.25 it was well worth it to continue on. One thing I hadn’t realized was a firmware upgrade was needed but that was quite easy while using RaspBMC though required a reinstall to RC5 thus lost my prior settings. Anyway it’s all working fine now and quality (picture & sound) exceeds the XBOX hack I had been using for years. Plus no more annoying XBOX sound/grind and no more blinking light as the dead DVD drive tries to read the nothingness in the tray.

Next to experiment with using extra USB media for times I’m away from my network. Also to see if there are better Plex add on as the one I tried initially doesn’t like to always work.

#fallfun

SNL iPhone 5 skit – First World Problems

Pretty funny indeed.

http://www.nbc.com/saturday-night-live/video/tech-talk-iphone-5/1420759

 

Remote Wipe Dropbox?

I had started looking to see if there was a remote wipe for DropBox but didn’t see anything promising. I did find the following link though. Seems like this would only work if the machine was on the network though…

http://blog.foreignkid.net/2011/07/your-laptop-nay-your-data-stolen-dropbox-trick/

In case you’re a klutz…

Just in case you’re a klutz like me lately and have a Raspberry Pi this link is for you.

http://www.raspberrypi.org/phpBB3/viewtopic.php?f=26&t=7751

I essentially followed the steps listed on the page this morning and will confirm that the solution indeed works tonight. One side of the SD Card holder on the Pi is a rather thin rail which obviously is quite easy to damage based upon results I get when searching on Google. The end result may not look nice but if it functions that is all I’m concerned about.

I should make a case or perhaps just buy one for the Pi. Of course this is exactly what I was thinking as I watched my Pi fall to the floor. If all else fails there is always using a clothes pin to keep the SD card in place.

Hopefully the next version of the Pi has a more enclosed SD card holder, suppose I could get creative and replace the one with a better one though I don’t feel like dealing with soldering these days.

Update: The solution didn’t quite work for me as it doesn’t create enough pressure on the SD card. I’m going to tweak this approach by sanding down the edges so that the piece of plastic sits lower in the socket.

Update to the update: Dremel to the rescue. Sanding down the thickness of the plastic that you’re adhering to the SD card holder to roughly 50% the original thickness appears to be the right amount of pressure needed for the SD card to seat properly. Looks like a hack but it works and that is all I care about.

Android #Fail

It appears that going to a test URL with a certain iframe using the stock Android browser can perform a factory reset on the phone.

There was a URL posted in the XDA forums pointing to http://ninpo.qap.la/test/index.html to test whether or not the browser would invoke the dialer and present the IMEI. It worked on my Samsung Infuse 4G running stock Gingerbread so I’m guessing that a real exploit may factory reset my phone. Ugh…

Note: The link above could change at anytime to the real exploit, use at your own risk. Here is the content of the test page.

<!DOCTYPE html>
<html>
<frameset>
<frame src=”tel:*%2306%23″>
</frameset>
</html>

The exploit code uses:
<frame src=”tel:*2767*3855%23″ />

Nice huh?

Reports have said it affects mainly Samsung devices but other reports have indicated an old Android bug affecting multiple devices. Should be interesting to see how this turns out…

Update: Confirmed that my Samsung Infuse 4G running Android 2.3.6 (Gingerbread) is vulnerable.

Link for exploit as well as other pertinent information: http://gizmodo.com/5946334/samsung-security-bug-can-wipe-out-your-galaxy-phone-updating

Samsung Infuse 4G Vulnerable to Exploit (YouTube)

 

1:12 – Phone Model / Version
3:56 – link clicked, dialer launched, performs format/reset
4:20 – reset
6:35 – files/folders gone

NoTelURL app to install to prompt user on action to take.

Another app ESET USSD – https://play.google.com/store/apps/details?id=com.eset.securedialer will protect you from this exploit.

AWS Glacier

Someone keeps reminding me of this service. Perhaps something to add to the ultimate backup solution?

I’m all about the CLI so this looks interesting as far as clients go. https://github.com/uskudnik/amazon-glacier-cmd-interface

38 Days

Vg’f orra 38 qnlf fvapr zl ynfg phor zbir. Jr’er ba gur sbhegu phor fvapr Wnahnel 2011. Gur ovt obbx bs znantrzrag zhfg unir puncgref sbe guvatf yvxr guvf. Qb V arrq gb fvg pybfr gb gur erfg bs gur grnz? Qb jr whfg zbir nebhaq gb vaqhpr hapregnvagl? Gur yvtugvat va guvf arj phor gbgnyyl fhpxf (gbb oevtug).

Jul qvq lbh yrnir lbhe ynfg cbfvgvba? V qvfyvxrq zl phor – jvyy gung ubyq hc?

/enag

A Post a Day?

Coincidence or what? It’s been a month since leaving Facebook so perhaps I need to post things somewhere? I dunno. I would post more but a lot of what I want to post probably isn’t too appropriate. Nothing new otherwise, glorified file editor as of recent. (harsh?).

US-CERT Alert TA12-262A – Microsoft Security Advisory for Internet Explorer Exploit

Short summary: Quit using IE? Great job Microsoft.

http://www.kb.cert.org/vuls/id/480095

What is totally sad is companies forcing users to continue to use IE since that is the only “supported” browser for sites/apps. You know who you are companies.

Mosh?

Intriguing but not sure yet..
http://mosh.mit.edu/

more later

Update: proved to be more of a pain to get working on OEL/RH 6.2 than worth. As commented just use screen.