On the 700p, I can clear the blinking light by holding down the middle button. I don't know how it works on the 650.
Buffistechnology 2: You Made Her So She Growls?
Got a question about technology? Ask it here. Discussion of hardware, software, TiVos, multi-region DVDs, Windows, Macs, LINUX, hand-helds, iPods, anything tech related. Better than any helpdesk!
There's a free utility somewhere called LEDOff, Jessica. Google it or search handango.com or your preferred palm OS software site. I can't live without it.
I saw that program mentioned a couple other places -- I think I'll give it a try.
Fun for geeks:
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.
Displays iptables entry that will redirect all traffic to kittenwar. Or else:
For more fun, we set iptables to forward everything to a transparent squid proxy running on port 80 on the machine.
/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.1
That machine runs squid with a trivial redirector that downloads images, uses mogrify to turn them upside down and serves them out of it's local webserver.
Happy Sysadmins' day! [link]
Gris and Tommyrot - first of all, thank you for posting how to backup an iPod onto a computer. I just did it with both K-Bug's iPod and mine, but now I have over 1000 duplicate songs - and deleting them one by one is a PIA. Is there an easier way?
Yes, if you have a Mac. You can run an AppleScript for iTunes. There's a shitload of them here: [link]
This might be the one:
Script applet traverses your iTunes or iPod library searching for tracks with the same Song Name and Size and copies them to a "Dupes" playlist. Once corralled, you can decide which can stay and which can go. Read Me explains more.
There's a version of this script that uses Perl that is much faster.
OK, kinda funny to send your neighbors to kittenwar, but...dude...if you're not encrypting your wireless, aren't you basically saying "please feel free to use this"???
if you're not encrypting your wireless, aren't you basically saying "please feel free to use this"???
There seems to be some debate on this issue.
Yesterday's story about a creative approach to dealing with uninvited (and unwanted) users on a private wireless network -- by intercepting and modifying the images received downstream -- provoked some thoughtful comments on open wireless networks, and a storm of analogies about networks and property generally. Read on for some of the most interesting comments in the Backslash summary of the conversation.
I think if it were HARD to put a password on it, I might feel sympathy. And if your neighbor were suddenly being a huge bandwidth hog, I'd say...put a freakin' password on it. And if you're so clueless as to not get that you're leaving it open, I feel a little sorry. But if you're net-savvy enough to do stuff like redirecting their traffic? Put a freakin' password on!! It doesn't have to be anything complex or crazy, and you can probably make it so you don't even have to REMEMBER it, so....if you care so much that someone is using your wireless, DO something!