Agents of the Revolution
  • Content count

  • Joined

  • Last visited

Everything posted by Dr^ZigMan

  1. From my days as a level 3 support admin... Hope that helps. -Dr^ZigMan
  2. If only things worked that way <sighs> In order to take advantage of a distributed system your programs must be written to function in such an environment. Even in todays super cool quad core processors, if the game is not written to work with multiple threads it doesn't matter how many cores you have you won't be able to use them efficiently. If I were you I'd save your pennies and keep your eye on newegg/tiger direct and look for a sale! Your needs don't lend themselves to clustered computing. -Dr^ZigMan
  3. It really depends on what it is you are trying to do with the cluster. My distrubuted applications make use of MPI or the Message Passing Interface and a version of this does exist for windows... http://www-unix.mcs.anl.gov/mpi/ (I know the URL says unix, trust me on this, click on the download page) MPI works by linking all the members of the cluster together in a ring. You have to code and compile programs to work with this architecture but all super computers (Well just about all) will support MPI so your code will be highly portable should you be given access to a true supercomputer. I hope that helps. Perhaps I could provide you with more specific information regarding distributed computing if you told me your intended application? In the mean time, a phrase for you to google with is "beowulf cluster." -Dr^ZigMan
  4. I think the major problem here is going to be that we don't know what the wiring diagram of the "Charge Port" on the controller is. I've googled around but I can't seem to find a schematic, you might have to open the bad boy up and probe around! Now here's the problem with building this yourself instead of buying the ready made one. First off, the time it's going to take you to figure this out. Personally I would ignore that since it's cool messing around with stuff so that's a write off! The really big thing though is that you'll probably end up having to permanently solider into the charge port to make it work properly, while the store bought version will plug in and unplug. Granted you could just do a small usb tail and plug in and out of that but it won't be as pretty. If I were you, I would buy the darn charger thingy and take it part. Then you can post a guide for everyone else on how it's done and you could even modify the one you have to have a longer/shorter USB cable. Maybe even a retractable one! Bottom line, break out the probe, and take some pictures. Let us know what you find! -Dr^ZigMan
  5. Greetings! I took some time to figure out a nice rtorrent.rc file that I thought someone else may find useful. It's commented so it should be pretty easy to change whatever it is you may feel the need to change to suit your needs. #Set a good number of peers min_peers = 50 max_peers = 100 #These are the ports to use port_range = 8700-8800 port_random = yes #Upload and Download capping in KB/s upload_rate = 250 #Sets default download directory directory = ./downloads/ #Sets default directory to look for .torrents # Checks every 5 seconds in the directory for a *.torrent schedule = watch_directory,5,5,load_start=./torrents/*.torrent #Ignores torrents of completed files schedule = untied_directory,5,5,stop_untied= #This handles if rtorrent has been left open by limiting total uploaded # schedule = name,interval in seconds, when to start, action # action: stop_on_ratio=percentage shared (so 2.0 ratio is 200%), min size of file, percentage to share # for files smaller then min size schedule = ratio,60,60,stop_on_ratio=200,200M,2000 The only tough part is the schedule bit. I hope I was clear on how that works, if not please let me know and I'll provide a few more examples. -Dr^ZigMan
  6. I believe THIS is the thread he is referring to. -Dr^ZigMan
  7. I'm not sure what you mean by uplink the router but I would do this using iptables. That way the centos box is acting as a hardware firewall and routes packets to the router (or from the router to the internet) by forwarding from one nic to the other. This is what you are trying to do right? -Dr^ZigMan
  8. Tor button? Is this something like the Tor plugin for firefox that makes it easy to turn it on and off? Please try to be a bit more specific. If you enter a Proxy IP address into your browser configuration you will use that proxy. By entering some other IP instead of localhost and privoxy's port your traffic is not being routed through tor, rather through the indicated proxy. I hope that answers your question, if I misunderstood what you were asking my apologies. -Dr^ZigMan
  9. I feel compelled to mention that this IS what emerge --world does in gentoo. Just a thought as to a future operating system for you if this is something you really would like to do. Many of the programs you mentioned automatically check for updates every time they are launched. If this is the case then this might just be a matter of creating a macro that launches every program, waits 30 seconds for updates, then closes it. Granted that's over simplified but I'm certain you get the idea. Now for the real question, Why? Is there a particular reason you want to force all your software to update at a particular time? I'm curious as it just makes more sense to me to update as often as possible, i.e. whenever a new update comes out. Perhaps the answer to this question can help us guide you in a more useful direction. -Dr^ZigMan
  10. So I had to grade a bunch of programs for <expletive deleted> students at school (Don't ask!) but it involved cutting and pasting id numbers etc etc. Well, the standard cmd.exe is a real bitch to copy and paste from so I hit the internet hard and found this... Windows Power Shell It's cool in that it does copy and paste similar to the way putty does (Highlight and click type stuff), which made my life a million times easier! I was reading about it and PowerShell also has built in scripting support, works on all xp and later versions of windows, gives verbose messaging (current run directory and the like), and a whole slew of other features. Anyone else ever play with it? Oh by the way, it's free if you're genuine. -Dr^ZigMan
  11. Quite true! Although I'm not sure that any active internet session would be interrupted... We could add a command to flush the arp cache forcing new discovery but it might create problems in that you need to renew a DHCP lease on an IP. Only one way to find out though, give it a shot! -Dr^ZigMan EDIT: Grammer, <3 Strom
  12. I wasn't sure if you had said that you were running linux on the router but if you are I whipped up this script that will change your mac to a new random value every x seconds... #!/bin/bash macElems=( 0 1 2 3 4 5 6 7 8 9 A B C D E F ) while true do for ((i=0;i<12;i+=1)) do rand=$RANDOM index=$(($rand % 16)) newMacArr[$i]=${macElems[$index]} done newMac=${newMacArr[0]}${newMacArr[1]}":"${newMacArr[2]}${newMacArr[3]}":"${newMacArr[4]}${newMacArr[5]}":"${newMacArr[6]}${newMacArr[7]}":"${newMacArr[8]}${newMacArr[9]}":"${newMacArr[10]}${newMacArr[11]} `ifconfig $1 hw ether $newMac` sleep $2 done Invoke it with bash somescript.sh <interface to spoof> <seconds till change> & The trailing & will cause this process to run in the background. Hope that's what you are looking for! -Dr^ZigMan
  13. My best advice would be to turn to the maker of your raid controller. My raid controller is made by Promise and it actually runs a self check on start up, a check of the array health. Perhaps your controller is capable of the same diagnostic tests? -Dr^ZigMan
  14. It looks to me like that hostname is an rDNS or Reverse DNS record. However that specific one doesn't resolve back to an IP for me... sp2382b ~ # host 831ef56.25a4ad7.dsl.bell.ca Host 831ef56.25a4ad7.dsl.bell.ca not found: 3(NXDOMAIN) Anyone else have any thoughts? -Dr^ZigMan
  15. And therein lies the rub! Upon further investigation, I've found out that the admins at school have actually installed it on many of the lab computers. It seems they use it for automation of installs and remote administration! Apparently it's a lot more popular then I thought. -Dr^ZigMan
  16. At the risk of starting a distro war... It sounds like you are trying to turn a Debian box into a Gentoo box. If you want gentoo, just install gentoo Gentoo offers you emerge and unmerge which would be the package manager and "uninstaller" that you were looking for. Also if you start with a stage 1 gentoo install you can get all that low level compilation of everything that you yearn for. As for compilation showing increases in performance, I don't really have a good answer for you on that. Sure tons of people have done tests and bench marks and whatever but I've never personally run any of those experiments. I will say though, that in order to derive benefits you must be very particular in your compilations, i.e. you have to use a series of flags and switches that are tailored to your processor. Nevertheless, if you have recent hardware performance really shouldn't be much of an issue. My personal opinion? Try them both, heck why not also try BSD, Slackware, Suse, OS2 Warp (Does that even exist anymore?), <insert name of distro anyone likes here>, and Solaris. At best you'll fall in love with something you didn't even know existed, at worst you'll gain some valuable experience tinkering with so many OS's. You could even leave them all on there and just have multiple partitions! -Dr^ZigMan
  17. Depending on how deep you want to go Unix Network Programming is a fan-frickin-tastic book that can show you just about everything you need to know about sockets as well as how to code them up. Also included are more then just the TCP/IP Protocol, such as ICMP, UDP etc etc. I bought it about three years ago and then it ended up being the textbook for a grad class! It's a little pricey but such is life. Also, as for tor, you can preface commands with torify <command> and it will automagically handle the tor networking for most things. -Dr^ZigMan
  18. I'm with droops on this one. You'll find it a lot easier for everyone else to give you a hand if we know a bit more specifically what it is you are trying to do. As for some general resources, when I first started out with asterisk This Book was my bible. Also, while I havn't read it, I've heard only good things about BlackRatchet's (et all) Book Hope that helps! -Dr^ZigMan
  19. An April 30th, 2007 article in PCMagazine lists these 10 passwords as the most commonly used ones. A little dated but I'm sure still relevant. Whatever happened to the good old days of love, sex, secret, and god? Anyone else have a few toppers their like to throw in? I tend to think that the username or username123 are very common as well. -Dr^ZigMan
  20. Are you talking about cloaked SSID's? Those are pretty easy to get around, kismet can get the SSID in seconds if there is traffic on the network. Good to know though! Many cloaked ssid's are usually just the company name or something equally creative. -Dr^ZigMan
  21. My first guess would be an extender. Does the "new" dial tone respond to DTMF? Have you tried dialing the numbers around the odd number to see if it's perhaps part of a business's consecutive numbering system? You should research who the number belongs to and what type of equipment its behind. That might give a hint as to it's purpose. -Dr^ZigMan
  22. This site has a step by step guide on the theory behind dns cache poisoning, it also talks about how DNS works if you need a refresher. Make sure you understand the theory before moving on to an actual implementation. Once you have the theory down cold, how to accomplish such a goal should become abundantly clear. Good luck! -Dr^ZigMan
  23. I have to totally disagree with this statement. Take this example from 68K ASM, by far one of the easiest forms of ASM. This is just to implement bubble sort... I think (I hope) he was being sarcastic. I was not. I still believe that learning ASM as a first language is a mistake. I'm sure there are others who will disagree with me and everyone is entitled to their opinion but that's how I feel about the matter. I think going back and learning assembly after learning a higher level language will make you a better programmer though. I only say that because I feel it has made me a better programmer, in the sense that I try to take a less abstracted view of what my code is actually doing now. Again, I don't want to hijack this thread so if you'd like to continue this in a new thread I would be more then willing to contribute. Otherwise, good luck to Demonic_angel and have fun coding! -Dr^ZigMan
  24. I have to totally disagree with this statement. Take this example from 68K ASM, by far one of the easiest forms of ASM. This is just to implement bubble sort... SORT MOVEA.L A1, A0 ;Move the start of the array into A1 SUBI.B #1, D1 ;Adjust count for looping DOPASS MOVE.B D1, D4 ;Initilize the loop counter MOVEA.L A1, A0 ;Initilize the index CHECK MOVE.B (A0), D2 ;Get the first element MOVE.B 1(A0), D3 ;Get the second element CMP.B D2, D3 ;Compare the elements BGT NOSWAP ;No swap if D3 > D2 MOVE.B D2, 1(A0) ;swap the elements, place D2 in the higher spot MOVE.B D3, (A0) ;Place d3 in the lower spot NOSWAP ADDA.L #1, A0 ;Point to next pair SUBI.B #1, D4 ;Decriment Loop Counter BNE CHECK SUBI.B #1, D1 ;Decriment pass counter BNE DOPASS RTS ;All done! Return from subroutine DONE Compare that to a similiar implementation in C++... //This will be an implementation of bubble sort vector<int> *firstsort(vector<int> &unsortedVector) { //Since we can not change the orignal vector, create a sorted vector vector<int> *sortedVector = new vector<int>; //We need a temporary place to hold the value we are swapping int temp; bool swapFlag = false; //Since = is overloaded for the vector class invoke it to copy the unsortedVector to the sortedVector (*sortedVector) = unsortedVector; //Work our way through the vector starting with the first element //This for loop accounts for a worst case possiblity //We'll break out sooner if the case is better then worst case for(unsigned int i = 0; i < (*sortedVector).size() - 1; i++) { //Compare it down the other elements, allowing it to "bubble" its way through for(unsigned int j = 0; j < (*sortedVector).size() - 1; j++) { //Check to see if we need to swap the elements if((*sortedVector)[j] >= (*sortedVector)[j + 1]) { //We do... temp = (*sortedVector)[j]; (*sortedVector)[j] = (*sortedVector)[j + 1]; (*sortedVector)[j + 1] = temp; //Set the fact that we swapped to true swapFlag = true; } } //Check to see if this is a case better then O(n^2) if(swapFlag == false) break; //Otherwise we have more sorting to do swapFlag = false; } //Return a sorted vector return sortedVector; } The C version is MUCH easier to understand. The whole business about different addressing methods, using registers, etc etc is very very complex for a beginner. I would absolutely recommend a higher level language to start off. -Dr^ZigMan
  25. There are many ways to do this. My favorite would be to use iptables... iptables -a INPUT -s some.ip -j DROP Which would silently drop all of their packets. Hope that helps! -Dr^ZigMan