Tuesday, June 12, 2012
Sunday, May 20, 2012
Sunday, April 15, 2012
Content migration
The content that was formerly hosted on www.tempusfugit.ca is being migrated to the Technology Muse blog.
To locate specific information that you may have found in Google cache please search the Technology Muse Blog ***
*** The search is made using the Blogger internal search, the box in the task bar above. This does not mean looking at the cached pages in the Google Cache.
For example:
If you are looking for information about "Twitter" type "Twitter" in the box at the top left of the Blogger screen (the one with the magnifying glass).
This will give you the current page, if it exists, not the one that Google indexed the last time it spidered the blog. If the search results in nothing found then it probably means that I have either deleted the page or I have not yet migrated the content.
I am not going to migrate all of the content that was on the TempusFugit Website.
If pages are deleted from these blogs then they are no longer available for public access. To remove the content from Google's cache will require my co-operation.
To locate specific information that you may have found in Google cache please search the Technology Muse Blog ***
*** The search is made using the Blogger internal search, the box in the task bar above. This does not mean looking at the cached pages in the Google Cache.
For example:
If you are looking for information about "Twitter" type "Twitter" in the box at the top left of the Blogger screen (the one with the magnifying glass).
This will give you the current page, if it exists, not the one that Google indexed the last time it spidered the blog. If the search results in nothing found then it probably means that I have either deleted the page or I have not yet migrated the content.
I am not going to migrate all of the content that was on the TempusFugit Website.
If pages are deleted from these blogs then they are no longer available for public access. To remove the content from Google's cache will require my co-operation.
Tuesday, April 3, 2012
Hacker Ethos
It has been an interest of mine for some while what the motivation for the desire to hack into systems just for the sake of it.
Whereas there are reasons that can be attributed to the quest, access of strategic information from governments and the perpetuation of many forms of organized crime.
Whereas there are reasons that can be attributed to the quest, access of strategic information from governments and the perpetuation of many forms of organized crime.
Monday, April 2, 2012
No Respect
The lack of respect is the use of something like a pillar from a Phoenician temple by the Ottomans as the base of a pillar in a water cistern.
|
Medusa column base, Yerebatan Sarayi, Instanbul, Turkey. |
Deleting pages from Google cache
Using Google Webmaster Tools to submit a URL removal request you have to make sure that you get the url correct.
I copied and pasted some and the text was in "unicode" not in actual text - the consequence was that the request expired:
This was evident by the observation that it the "expired" removal was re-copied from the "removed" list (above) the unicode was shown in the new request.
Another new request was made copying from the SERP and checking that the message when the request was entered was in plain text not unicode characters.
I left the request above in the list - showing that it was "pending" to see if it expired again. The other expired requests were re-submitted.
I copied and pasted some and the text was in "unicode" not in actual text - the consequence was that the request expired:
A clip from Webmaster Tools |
Another new request was made copying from the SERP and checking that the message when the request was entered was in plain text not unicode characters.
The request should have been for http://www.tempusfugit.ca/techwatch.ca/internal.html |
Monday, March 26, 2012
Running aircrack on a Windows 7 computer
The various techniques to configure the popular WiFi penetration tool on a Windows computer.
The configuration of aircrack-ng in a VM.
The configuration of aircrack-ng in a VM.
AACS
The encryption scheme used on BD.
Page and topic to be expanded and information from website added.
aacskeys database
Page and topic to be expanded and information from website added.
aacskeys database
Sunday, March 25, 2012
Unlocking the hidden menus in Insyde H2O BIOS
This is a topic that I fully described on my website. These topics are now expanded on pages and posts on my blog "The Technology Muse".
- How to unlock Insyde H2O BIOS to enable custom and advanced menu options.
- Insyde (Incycle) H2O CD - where to download and how to use the 3rd party BIOS replicator.
- How to mod insyde h2o bios to enable ahci
- desbloquear bios insydeh20
- The business of BIOS mods - website owners know that you are searching for ways.
Sunday, January 1, 2012
Reposted pages
Please check back for pages that were featured on www.tempusfugit.ca
Subscribe to:
Posts (Atom)