I was intrigued by the simple brilliance of the human element captured by Sorry Everybody after the election. People take pictures of themselves holding hand-written messages and submit them to the website. Visitors to the site get to browse through the photos. Some are very clever. So, I wanted to do something similar, albeit with a more positive message. I wanted people to submit photos of themselves asking Al Gore to jump into the race for I was running out of time because I knew the Nobel Peace Prize announcement was coming up and I wanted to have the site live by then.
I've been swamped with work and other free-lance website projects lately and just never got a break to do it. But then in the last week I got to a stopping point on a project. Then the question was could I pull it off in a week? Build a site from scratch with uploads, tagging, moderator accounts, image manipulation? In my spare time outside of my 40 hour work week? What the hell - I went for it. I think I've said this before but it's worth saying again.
Ruby on Rails rocks. I coded in PHP for a while and I could never have knocked this project out in anywhere close the amount of time I did it in Rails. But, much of the credit goes to those who create and maintain some of the great Rails plugins. So, I met my goal. With the help of my wife with testing and content, we went live with the site Thursday night, just in time for the Nobel announcement.
In all honesty I don't know that the timing made any difference since I'm still struggling to get people to the site, but it was a good challenge, and I'm happy with it. Check it out. Post a picture asking Al Gore to run for President in the election. I've been working on converting an old php application to Ruby on Rails. Several months ago during the development process, I wrote some scripts to take the data from the old database and insert it into the new one, performing any necessary adjustments to the data that was needed.
I ran into a problem when I needed to do it again recently in preparation for the move into production because I couldn't remember how I did it the first time. I've re-written an old php application in Ruby on Rails. In anticipation of flipping the switch from the old site to the new one, it would be nice to re-route requests for the old php pages to their new home.
I didn't find a way to do it using routes. I found all kinds of information about doing the opposite - i. I had to sift through all that to find what I needed.
Posted by harold at 1 comment:. I've been using a Sony Ericsson wi Walkman phone since Cingular first offered it. Mostly, my Visor was used for the address book, memo pad notes, and calendar. It was getting old, and since I converted from Windows to Mac and bought a Powerbook I ran into the problem of not having compatible Sync software that would recognize the Visor and work with OS X. Ideally, I could replace the Visor with a phone and only carry one device. But, I also didn't want to spend all the money on a smartphone or Treo.
Lots of phones have decent address books. But I also wanted a decent calendar, and really important was the ability to copy text notes between my Mac and the phone. Adequate memory was also a concern, so the ideal phone would have expandable memory. I wasn't sure the wi would meet the text note requirement, but I gambled on it and bought it.
After purchasing a third party phone plugin for iSync, it worked flawlessly. I bought a MB memory card for it, and it really is a great phone. The organizer tools are excellent - the address book and calendar are perfect for what I need. And using bluetooth or the data cable, I can transfer files between the phone and Mac as needed. It has a built-in web browser that is used to open text files.
It also has the other neat features like the Walkman, and even an FM radio, but I have to admit I haven't really used those.
The built-in camera isn't great, and the video captures are pretty low quality. But, that's okay - it does what I need. It's a good looking phone, too. Now, if only Cingular didn't disable other cool features, I'd be totally happy. Greed gets the best of these big companies and they just have to try to squeeze every last penny out of you at the expense of customer satisfaction. But, I'll save that for another post Cisco's vpnclient on Fedora.
After breaking Cisco's vpnclient AGAIN by upgrading to Fedora Core 6, and starting to go through the headache of trying to get it to compile, I poked around a bit to look for alternatives. I found vpnc , installed it, and had it up and running in no time. Of course I'm just using the default configuration for now until I have time to try out some advanced configuration and scripting , and maybe the GUI.
Anyhow, good riddance to the terrible Cisco client for Linux. Sometimes the mirrors aren't in alignment. Last night was one of those nights for me, and when I can't get something to work the way I want it to I tend to dig in my heels and keep pushing.
Sometimes that just makes things worse. I'm working on my first time using Capistrano to deploy a rails app. This problem could indicate that the communication between the two devices is not working properly network connection between computer and DVR. Double check if you selected telnet and entering the correct IP in the software.
Sometimes the DVR you are using doesn't have the telnet service available and won't respond to telnet commands on port Try other reset methods Due to the fact that there are many DVRs in the market, sometimes you have to try a different way to reset your device to recover from a lost password.
Please take a look at the other articles I have in the blog, they could be helpful. If you can't recover the password for your DVR, I suggest you call the Zosi Technical support team and they will probably be able to assist you. Ultimate Security Camera Guide Version 1. Ultimate Security Camera Guide Version 2. Ultimate Security Camera Guide Version 3. I hope this article was helpful for you, please share with your friends He has been traveling around 17 different countries to teach people how to design, and install CCTV systems.
Search for: Search. OK, a quick overview of the process Zosi DVR password reset via telnet. To reset the Zosi H. Download the telnet software. The picture below shows the first screen you see.
You are halfway. Just continue Login into the DVR. Most common problems. Sometimes the DVR might not respond to the telnet command.
See the links below on how to reset DVRs:. Eventually, hopefully, Dahua will disclose all the devices impacted. This backdoor allows remote unauthorized admin access via the web and is therefore extremely severe.
Dahua's statement [link no longer available] does not acknowledge this at all. Moreover, our testing shows the exploit is simple to execute. Dahua says this was an error 'coding issue' and was not done intentionally.
While only Dahua can know their intentions, such an error in production for so long and so widely would be an extreme engineering failure. Moreover, the researcher expresses skepticism of the error claim, examined further below. IPVM is the 1 authority in video surveillance news, in-depth tests, and training courses.
Get emails, once a day, Monday to Friday. DHS issued an advisory on this backdoor in May A proof of concept script has been developed by the researcher. It was then removed after Dahua spoke with the researcher. The researcher plans to re-release it on April 5th. However, prudence dictates not waiting to upgrade given the severity and simplicity of conducting it.
UPDATE: The researcher has decided not to re-release it due to the large number of devices at risk and that third parties have already validated it. Thanks and credit should be given to the anonymous researcher Bashis who discovered this vulnerability. This is the 3rd one impacting video surveillance in the past year. He also discovered the Axis critical security vulnerability and QNAP critical security vulnerability. He has done it to improve his own skills, he says, but he has surely helped the industry overall by forcing major manufacturers to take cyber security seriously.
Inside we share test results of the script, demonstrating how it works and the impact on Dahua and the industry.
The affected Dahua devices allow a configuration file containing usernames and passwords among other info to be downloaded without authentication. The URL is not published and not easily determined from the standard web interface, making it effectively hidden.
However, once known, it is simple for anyone to do. This file is the "Backdoor", given that it contains a hashed value of the admin account password, which can be used to login to the device via a script or program.
This scenario is common to embedded devices, and a simple text file is often used to store this information. Other methods, such as a database, could be used to store these values, however, simply using a more complex storage mechanism does not inherently make the data more secure if other parts of the software allow this information to be exposed.
0コメント