Welcome to my online IT notes, which I'm regularly updating and re-organising
(so the only page likely to keep it's exact address will be this one).
Where I've quoted stuff it's done by showing the source close to the quotation(s):
Quotations must be verifiably attributed to a reliable source
All pages are folded by headers, like this is.
Search (in the box top right) these notes like this:
wild* - finds wildmode, wildmenu, but not unwild
(then click <open all> to expand out a page and scroll down to find the yellow-highlighted word)
Use the ever-present Sitemap link - top right - to navigate!
Here (more for my own curiosity) is a little cloud of most used words (not tags), which I'm occasionally filtering:
denotes the tendency for computer users to “imprint” on the first system they learn, then judge other systems by their similarity to that first system
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. This requirement that both parties have access to the secret key is one of the main drawbacks of symmetric key encryption, in comparison to public-key encryption.
words which are filtered out prior to, or after, processing of natural language data (text)
I wanted a starting list to tune the cloud plugin on this here DokuWiki, and found the best to be the
stop-words_english_*.txts from stop-words-collection-2014-02-24.zip. I smooshed them all together, and occasionally update them with words that I don't want to appear in my cloud.
MySQL's list is probably authoratative.
Elasticsearch give this as an example of a valid sentence made entirely from stopwords:
“To be or not to be.”
- and they explain beautifully why stopwords've long been replaced by common terms queries.
Decode from URL encoded format eg
C%C3%A9line > Céline
http://en.wikipedia.org/wiki/Permalink > A permalink (portmanteau of permanent link) is a URL that points to a specific blog or forum entry after it has passed from the front page to the archives. Because a permalink remains unchanged indefinitely, it is less susceptible to link rot. Most modern weblogging and content-syndication software systems support such links. Other types of websites use the term permanent links, but the term permalink is most common within the blogosphere. Permalinks are often simply stated so as to be human-readable.
http://en.wikipedia.org/wiki/Trackback > Trackbacks are used primarily to facilitate communication between blogs; if a blogger writes a new entry commenting on, or referring to, an entry found at another blog, and both blogging tools support the TrackBack protocol, then the commenting blogger can notify the other blog with a “TrackBack ping”; the receiving blog will typically display summaries of, and links to, all the commenting entries below the original entry. This allows for conversations spanning several blogs that readers can easily follow.
Get data, tools and diagnostics for a healthy, Google-friendly site.
Color Pickers (to get the hex code):
*#06# (or look at Google Dashboard > Android) International Mobile Equipment Identity
It extends the core SMS (Short Message Service) capability that allowed exchange of text messages only up to 160 characters in length.
A SIM lock, simlock, network lock or subsidy lock is a capability built into GSM mobile phones by mobile phone manufacturers. Network providers use this capability to restrict the use of these phones to specific countries and network providers. A phone sold without a SIM lock is called a SIM-free or unlocked phone and the purchaser can insert a SIM card of his/her choice.
Typically, a locked handset will display a message if a restricted SIM is used, requesting the unlock code. On recent phone models running Android software, the phone will display a message saying “SIM network unlock PIN” or “Enter Network Lock Control Key” if network locked.
any function that can be used to map data of arbitrary size to data of fixed size, with slight differences in input data producing very big differences in output data
a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. The input data is often called the message, and the hash value is often called the message digest or simply the digest.
An illustration of the potential use of a cryptographic hash is as follows: Alice poses a tough math problem to Bob and claims she has solved it. Bob would like to try it himself, but would yet like to be sure that Alice is not bluffing. Therefore, Alice writes down her solution, computes its hash and tells Bob the hash value (whilst keeping the solution secret). Then, when Bob comes up with the solution himself a few days later, Alice can prove that she had the solution earlier by revealing it and having Bob hash it and check that it matches the hash value given to him before. (This is an example of a simple commitment scheme; in actual practice, Alice and Bob will often be computer programs, and the secret would be something less easily spoofed than a claimed puzzle solution).
A related application is password verification (first invented by Roger Needham). Storing all user passwords as cleartext can result in a massive security breach if the password file is compromised. One way to reduce this danger is to only store the hash digest of each password. To authenticate a user, the password presented by the user is hashed and compared with the stored hash. (Note that this approach prevents the original passwords from being retrieved if forgotten or lost, and they have to be replaced with new ones.) The password is often concatenated with a random, non-secret salt value before the hash function is applied. The salt is stored with the password hash. Because users have different salts, it is not feasible to store tables of precomputed hash values for common passwords.
MD5 a “message-digest algorithm”
a set of cryptographic hash functions (SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256) designed by the U.S. National Security Agency (NSA)
Associate *.dxp *.axp- they're CDBurnerXP file types.
Ditto.dbwhich defaults to be in
Roaming\Ditto, but you can locate it wherever you want.
@key) opens it as a pop-up in which you can begin typing some letters, and it finds matches in your clipboard history, that can be as long as you wish, and includes text formatting, and image. If you want to paste something unformatted, just select it and
Monitoring (tail -f)
Get it. Slysoft's CloneDrive executable might be identical inside to Elby's, but it comes with a more precisely numbered filename. On installation, it offers to associate
*.iso, with option to also associate
*.bin. Installs to
C:\Program Files\Elaborate Bytes\VirtualCloneDrive.
Installs easily, and drops a sample script into
C:\Users\jo\Documents\AutoHotkey.ahk, which is a file that will always run on launching AutoHotkey. (You can adapt it, or remove it.)
An excellent and simple suggestion. Any time I'm in an ambiguous CapsLock state, I can just hit Esc, and I know it's back to lowercase. very helpful for Vim.
You can grab my implementation of this ahk script here.
%APPDATA%\SumatraPDF\SumatraPDF-settings.txtis Deleted, it gets rebuilt
SumatraPDF.exeis in your
Path, you can (from the console)
it consists of one single file with no external dependencies, making it usable from an external USB drive
Now removed note:
Sumatra does not lock the PDF file. Without closing the PDF file, a user can save over the PDF and then press the R key to refresh the PDF document. For example, a PDFTeX user could find this feature useful when, after recompiling the altered TeX source code, he/she could simply press 'R' and view the altered document.
Right-click on the box, or
Win+Alt+P brings up a stay-on-top Settings dialogue that you can Esc out of.
Font> Size >
12- I find more practical than the default of 16.
Show- keeps the scrollbar visible (rather than only appearing after mouse pointer is hovered there).
Solarized- is my preference, and allows a good vim terminal.
Lazy tab switch- I don't get, so prefer to off-tick.
Explorer context menu integration> Register, Save - allows ConEmu to be opened for a folder viewed in Explorer.
Force ConEmu as default console- makes it appear when you call Command Prompt.
Keys & Macro:
Minimize/RestoreI change to
Alt+' (so's not to conflict with Ditto). It's a handy global hotkey, that brings the ConEmu window up (if it's in the taskbar) from wherever you are.
Close active console- is a handy local keybinding.
C:\Program Files\Bulk Rename Utility\BRU_Manual.pdf.
Thumbs.dbfiles scattered around.
sha1sum for MS Windows:
sha1sum files- get a list of SHA-1 checksums.
spacesniffer_1_1_4_0.zipis a bomb, but just run
SpaceSniffer.exeand be impressed!
Configuration > Behaviour > Popup log off-ticked.
a lightweight and minimalistic file searching application for Windows. It can be integrated into the Windows Explorer right-click menu to provide quick and easy access. FileSeek doesn't use background indexing, so when FileSeek is closed the computer's performance won't be affected.
It can search inside odt files (as long as LibreOffice is already installed on your system). You have to set
Options > Process file contents using File Handlers.
Install, or portable, it has hidden files visible by default, which is why I keep it handy. Protected Operating System Files (eg Windows XP's Thumbs.db scattered all over) are also visible independent of Windows 7 Explorer's settings, Findable by pattern and then mass Deletable.
Alt+F7 = Search, then you can specify lists (no space after the semicolon):
F10 toggles between single and dual-pane views.
Not worth using: the Compare, Filter, and Synchronisation features.
is what I use to check directory sizes. I grab Q-Dir_Installer_Unicode.zip, unpack and run the installer. (Inspite appearing to me correctly intalled, sometimes Windows 7 Compatability Assistant suggests it wasn't installed correctly.)
Extras > System > Show hidden files & folders is the global Windows Explorer setting.
To see directory sizes, I set:
Extras > [List > Click sound off Colors > Colors > Use Color-Filter Data Size > Show, then Show Folder Size System > Add to Shell Context]
If you install a newer version, it picks up the older version's settings.
http://en.wikipedia.org/wiki/SyncBack - is an incredibly useful tool. I use the free version to find file structure differences recursively betweeen two directories on different drives. It tells you when there's an update to install over the existing version.
Preferences > Options > Expert
- shows you where the settings are stored, incase you want to back them up.
Run as Administrator.
Image Grid drag and drop images to make a single grid from them.
I use it to quickly annotate jpegs with text and maybe a few lines.
Wgets an easy watermark dialogue
t= Thumbnails view of the current folder, with easy navigation.
p= Properties/Settings, then:
JPG > Auto offto turn off rotation by EXIF orientation tag.
Language > Load Unicode PlugInif you've got accented characters in a filename.
http://www.faststone.org/FSViewerDetail.htm - a super image viewer, that goes straight into Full Screen view. Move the mouse to the screen edges to quickly access a huge functionality range, which is nicely described here.
You can use your version of
C:\Users\jo\AppData\Roaming\FastStone\FSIV\FSSettings.db to replicate your Settings.
Settings > Viewer > * ''Auto-rotate by EXIF orientation tag'' - is on by default, I prefer to turn it off * ''Loop'' - is off by default, I turn it on
right-click > Edit > Red Eye Removal.
IrfanView64, which got allocated
E, so now I just hit
E, and the image is opened in
C:\Program Files\IrfanView\i_view64.exe- very handy to get at the slightly better editing features therein.
Alt+C= Contact Sheet Builder - uses all the files in the current folder by default
Alt+Qquickly resizes to the size on screen
Alt+F4bring up the useful FastStone exploring interface
Ctrl+E= Adjust Colors:
Ctrl+Shft+B= Auto-Adjust Colors - works fairly well for whitening a text background
F3= Tools > Batch Convert works well
Frame Maskfound at left panel is fun
r= left/right Rotate
wopens the file's folder in Windows Explorer, which is very handy
Xbrings image up into full screen ready to Crop!