Custom Search

Thursday, June 30, 2011

MediaCoder 2011 R6 build 5166 Portable


MediaCoder is a free universal batch media transcoder, which nicely integrates most popular audio/video codecs and tools into an all-in-one solution. With a flexible and extendable architecture, new codecs and tools are added in constantly as well as supports for new devices. MediaCoder intends to be the swiss army knife for media transcoding in all time and at this moment, it already has millions of users from 170+ countries all over the planet.

Features In Brief
    * Convert to and from many audio and video compression formats and re-multiplex into various container formats in batches
    * Full control over transcoding parameters, you can learn about audio/video encoding and play with various codecs
    * Strong decoding capability for partial or corrupted contents
    * Simplified UI for popular mobile devices (e.g. PSP, iPhone/iPod)
    * Fully standalone, no dependance on system codecs/splitters
    * Extension (scripting language) infrastructure to expand user interfaces and improve user experience

Typical Applications
    * Improving compression / reducing size for audio/video files
    * Converting for audio/video playback devices (digital audio player, MP4 player, mobile phone, PDA, PSP, VCD/DVD player etc.)
    * Extracting audio tracks from video files
    * Ripping audio/video discs
    * Reparing corrupted or partial downloaded video files

Supported Fomats
    * MP3, Vorbis, AAC, AAC+, AAC+v2, MusePack, Speex, AMR, WMA, RealAudio, mp3PRO*
    * FLAC, WavPack, Monkey's Audio, OptimFrog, AAC Lossless, TTA, WAV/PCM, Waveform
    * H.264, XviD, DivX, MPEG 1/2/4, Theora, Flash Video, Dirac, 3ivx*, RealVideo*, Windows Media Video
    * AVI, MPEG/VOB, Matroska, MP4, PMP, RealMedia*, ASF, Quicktime*, OGM*
    * CD, DVD, VCD, SVCD, CUESheet*, HTTP*, FTP*, RTSP*, UDP*

* supported as input only

Hardware Requirements
    * A modern and decent CPU with SSE instruction set
    * Multi-core processors recommended
    * At least 512MB system memory, 1GB or more recommended for HD encoding

Supported Platforms
    * Windows XP/2003/2000
    * Windows XP/2003 x64 Edition
    * Windows Vista x86/x64
    * Windows 7 x86/x64
    * Linux with Wine (most features work)
    * Mac OS X with Darwine (most features work)

2011-R6 (build 5166) - 6-11-2011
    Add muxing state and progress display
    Fixed MP4Box path bug in x64 version
    Fixed some minor UI issues
    MEncoder r33574
    FFmpeg r30698 

Size: 49.9 MB

DIGEST 0 Comments | Readmore...

Monday, June 27, 2011

What is Yoga ?

Yoga assists one with controlling various aspects of the body and mind. Yoga helps you to take control of your Central Nervous System (CNS) and more. Enjoying yoga on a daily scale will build you up, which you will notice changes (Good changes), such as a boosted self-esteem. Your body will feel stronger also. For more than 5000 years, people have enjoyed yoga. Yoga derived from the India nations, which many believed that the act has helped millions of American citizens take control of their body and mind. Yoga has proven to reduce stress, which promotes the nervous system helping it to stay strong. Yoga when enjoyed on a regularly scale is a great method to help you with many pressures. Yoga combines spirituality, exercise, positive thinking, breathing and so on to help you enjoy healthy aging.

The Pros and Cons in Yoga:
Yoga is a valued practice for many people worldwide. Yoga incorporates fitness, health, gymnastics, and training in a set of rules. Yoga helps you to maintain or loose weight. Yoga is a stress reducing machine. Yoga will train your mind, since it teaches you to control your thoughts through meditation and breathing. Breathing right is essential to yoga’s creators. When you practice yoga, it keeps you in contact with your inner self. You learn to balance your mind and body, which leads to good health. Your emotions are controlled as well, which means fears, doubts, and other negative influences will not take control of your life. Rather you will have control. As you practice yoga, you will feel comfortable with you and the people around you. The world will become yours, since you learn to communicate effectively and stop sweating the small stuff. The cons in yoga, includes that some types of yoga training is not right for everyone. Another con inside yoga is that you sometimes have to modify the workouts to benefit your body type and to withhold the workout suited for your strengths. This is not a con necessarily, but it can be if you have to figure out where beginners start.

How to get started:
The first thing you should do is see your family doctor. Make sure you are able to enjoy the type of yoga you choose. When your doctor approves of your choice of yoga steps start out slowly. Guide your way into mediate exercising. Yoga will put you in connection with your spiritual side, so prepare to find a new you. When you first start yoga, perhaps you would benefit from joining groups that practice yoga. The group sessions may inspire you to continue your journey to healthy aging. Having support is essential for all of us, which yoga groups can become your support team. If you cannot find a group in your area, visit your local library. You can also purchase books that train you how to enjoy yoga. Videos are available as well.
DIGEST 0 Comments | Readmore...

Sunday, June 26, 2011

Tips to create happiness

Are you truly happy?
Do you even know what it means to be happy and what it takes to achieve happiness? These are important questions for anyone who is seeking happiness to ask themselves. I live my life to maintain my own happiness while trying my best to not cause unhappiness to anyone else. If you want to be happy you need to understand that you can be happy and that you should be happy. Many people make the mistake of believing that they don’t deserve happiness and accept their unhappy state as their destiny. The truth of the matter is that happiness, like anything else in life, needs to be nurtured. The following are a few tips that I follow to create happiness in my life.

Understand what it is that will make you happy. Everyone has unique requirements for attaining happiness and what makes one person happy may be very different from what makes someone else happy. Revel in your individuality and do not worry about whether or not your desires are comparable to those of your peers.
Make a plan for attaining goals that you believe will make you happy. Your mood will very likely increase as your pursue your goal because you will feel better about yourself for going after something you value.

Surround yourself with happy people. It is easy to begin to think negatively when you are surrounded by people who think that way. Conversely, if you are around people who are happy their emotional state will be infectious.
When something goes wrong try to figure out a solution instead of wallowing in self pity. Truly happy people don’t allow set backs to affect their mood because they know that with a little thought they can turn the circumstances back to their favor.
Spend a few minutes each day thinking about the things that make you happy. These few minutes will give you the opportunity to focus on the positive things in your life and will lead you to continued happiness.

It’s also important to take some time each day to do something nice for yourself. Whether you treat yourself to lunch, take a long, relaxing bath or simply spend a few extra minutes on your appearance you will be subconsciously putting yourself in a better mood.

Finding the humor in situations can also lead to happiness. While there are times that require you to be serious, when it is appropriate, find a way to make light of a situation that would otherwise make you unhappy.

Maintaining your health is another way to achieve happiness. Being overweight or not eating nutritious foods can have a negative effect on your mood. Additionally, exercise has been known to release endorphins that give you a feeling of happiness.
Finally, it is important to understand that you deserve happiness. Those who believe that they are not worthy of happiness may subconsciously sabotage their efforts to achieve happiness. If necessary, tell yourself each day that you deserve to be happy and remind yourself what steps you will take to achieve the happiness you desire.
Happiness is hard to define but most people are aware of whether they are happy or not. Many people believe that happiness is a form of luck and that some people are destined to be happy while others are destined to be unhappy. I try to incorporate the tips above into my life and have had great success in achieving happiness. The tips in this article are small but meaningful steps that you can take each day to lead you to true happiness.
DIGEST 0 Comments | Readmore...

Wednesday, June 22, 2011

Meditation for parents

Elderly people who practice the Transcendental Meditation technique may drastically reduce their medical costs, according to findings presented by faculty member Robert Herron at the 91st Annual Canadian Public Health Association Conference last month in Ottawa, Canada.

The study found that 163 people from Quebec - aged 65 and over - reduced payments to physicians by a cumulative 70 percent during the five-year period after they learned the Transcendental Meditation technique.

The retrospective study evaluated a sample of 326 Quebec health insurance enrollees - 163 who practiced the Transcendental Meditation technique and 163 who did not. Using statistical analysis, researchers compared the groups' expenses for treatment by physicians, both during the nine-year period before the Transcendental Meditation technique was introduced and for five years afterward. Data for the study was provided by the Regie de l'Assurance-Maladie du Quebec, the province's health insurance provider. Figures were adjusted for inflation using the Canadian government's Consumer Price Index.

The study's findings were dramatic. Researchers found 70 percent cumulative expenditure reduction for the group who practiced the Transcendental Meditation technique for five years. In contrast, the control group's expenses continued to rise. Both groups showed steadily rising payments to physicians during the nine-year period before the meditating group learned the Transcendental Meditation technique.

"These findings suggest that there is a relationship between the Transcendental Meditation technique and improved mental and physical health for senior citizens," said Dr. Herron, lead author of the study. "The proven health benefits of this preventive technique could have significant implications for the reduction of medical costs for people of all ages."

This research is an extension of previous studies of the effect of the Transcendental Meditation technique on aging. One study, for example, showed that a group of individuals who had been practicing the Transcendental Meditation program for more than five years were physiologically 12 years younger than their chronological age, based on a standard measure of "biological age" that evaluates blood pressure, near-point vision, and auditory discrimination.
DIGEST 0 Comments | Readmore...

Tuesday, June 21, 2011

Emotion

Common representation of angry emotion experience: "steamed up" with hot glowing eyes, and uncontrolled appearance. Is it the same across people? Interpersonal aggression in the form of instrumental behaviors produced by skeletal muscles is often a concomitant of anger.

A bright idea can bring a pleasant emotion, or pleasant emotions can foster bright ideas.
The component that seems to be the core of common sense approaches to emotion, the one that most people have in mind when talking about human emotions, is the feeling component, i.e., the passion or sensation of emotion. For example, people generally agree that the state of mind during anger is different from that when one is happy. This component is also one of the most contentious in scientific discussions of emotion, raising many questions such as:

  • what extent are such feelings, especially the claimed differences in quality, based on real physical differences?
  • is the feeling quality of a particular emotion shared among people?
  • what is the nature of the differences in quality among emotions?
  • what underlies or produces these feelings?
  • what importance or function do such feelings have?

Another obvious descriptive component of emotion is the set of behaviors that may be performed and observed in conjunction with an emotion. These behaviors are produced by the striated muscular system and are of two general types:

  • gross behaviors of the body effected by the skeletal muscles and the so-called emotion expressions. These categories shade into each other because any behavior can be interpreted as expressing emotion. 
  • The gross body behaviors may have no apparent adaptive value, e.g., 
  • wringing and rubbing the hands or tapping a foot, or they may be directed towards a goal, e.g., 
  • striking something or running away. 
  • In the field of animal behavior, discovering the adaptive function and organization of behaviors in situations analogous to human emotion, and speculating on the evolutionary patterns of these behaviors is an established endeavor. 
This emphasis has not typically been given to the study of human emotions by psychologists. The facial and bodily behaviors called "emotion expressions" are indicators of emotion, as opposed to effecting some action or achieving some goal. These expressions can differentiate one emotion from another. The most widely discussed and investigated emotion expressions are the emotion faces (see the examples of emotional expressions).

Adrenalin is a secretion that affects many organs and may contribute to the felt quality of emotion.
A less obvious component of emotion is the set of internal bodily changes caused by the smooth muscles and glands. Chemicals secreted by the body's various glands are activated during emotion and spread to other parts of the body, usually by the blood, to act in diverse ways on the nervous system and other organs. Smooth muscles of the digestive system, circulatory system, and other bodily components can shift from their typical level or type of operation during emotion under the effects of chemical and neural action. This component includes some behaviors that can be observed, such as the constriction or dilation of the iris of the eye, possibly piloerection, and sweating, blanching, and flushing of the skin, and other responses that are relatively hidden, such as heart rate, stomach activity, and saliva production.

Computers often elicit frustration and anger Another less observable component in emotion consists of the ideation, imagery, and thoughts that occur during emotion. These aspects of emotion are also cognitive activities, and can both give rise to an emotional event and be affected by it, e.g., thinking about a lost pet may evoke feelings of sadness, which may in turn evoke memories of a romance now finished. Since thoughts and other cognitions, like feelings, cannot be directly observed and are hard to measure, there is less understanding of how they fit into the emotion picture than other components.
The circumstances that give rise to emotions comprise another component, called the "elicitors" of emotion. These elicitors might be internal or external to the organism, e.g., a frightening pain in one's chest or a frightening dog at one's heels. Some events seem to activate similar emotion in people of all cultures, for example, the death of one's own child typically elicits sadness. Other things, such as what foods are relished or rejected with disgust, vary widely according to acculturation.

Finally, the neural processes that underlie much of the preceding activities can be considered a component of the emotion process, especially how the neurons and their emotional concomitants are organized centrally in the brain. Many contemporary research studies, and thus a lot of the research money, is focussed on anatomical and functional aspects of brain activity in regard to emotion
DIGEST 0 Comments | Readmore...

Saturday, June 18, 2011

Public Key Authentication in SSH or Passwords

In this Server-Bits tutorial, I'll show you a real time-saver when it comes to SSH and anything connected to SSH. To put it simply, public key encryption in SSH is where you don't need to log into an SSH account because the public key (stored on the server) matches your private key (stored on the client machine), and it logs you into your account. Because anyone with your private key can appear to be you and gain access to your account, it is extremely important to guard your private key with your life. The public key can float around the internet for all time without any danger to yourself, your accounts, or your private key, as public/private key encryption is very secure.


What this all translates to in layman's terms is that public key encryption allows you to securely log into your server without using a password. If this freaks you out at all, don't worry, you aren't alone. But don't worry, as long as you're creating keys from your user account and not from root, the risk of huge damaging effects is minimized, as you still need a sudo password to do any serious damage (provided that your server is properly configured).
Of course, to take full advantage of Public Key Authentication, you will be using two computers, but all of the key generation and even the copy will be performed client-side (The computer you want to have remote, password-less access).

The first step to generating a public/private key pair is to run this command (which we will break down into detail):
ssh-keygen -b 4096 -t rsa -f ~/.ssh/id_rsa -C "Your Comments"
This is how the command breaks down:
-b: This is the number of bits to be used in the key. This number can be as low as 768, but since we're running a server, lets be overly-paranoid and use 4096.
-t: The type of algorithm we will be using. In this example, we'll be using RSA for our key generation, but you also have the choice of DSA, but in that case, you will need to make your key exactly 1024-bit.
-f: This option specifies the file in which the key will be saved.
-C: This allows you to specify a comment to go at the end of each key. This is important because you will most likely have several keys floating around (we will go into the why this is a good idea later) and if you need to void a key, it is very hard to distinguish which key is which.
You can specify a passphrase for each key if you wish. To log into the server with this key, you will need to type in the passphrase before the key will be unlocked. The downside to this is that by using a key, you are trying to move away from having to use a password, but the upside is that you can leave this key on a less-secure network (your office/school network) with greater ease-of-mind. You do have the ability to use a blank passphrase, but that is only recommended for systems you completely trust (your completely encrypted laptop, for instance).
 
Next, you need to make sure that no one else on the system can read your private key.
chmod -R 700 ~/.ssh/
Now that we have a key on our client machine that is readable by us, we need to pipe it over to our username on the remote server.
cat ~/.ssh/id_rsa.pub | ssh username@server.address.com 'cat >> ~/.ssh/authorized_keys'
This is how the command breaks down:
cat: This command just spits out any data in a file to the terminal. You can redirect the output to other files, however, which is exactly what we are doing here.
The ssh login bit logs us into the remote server under our remote username, then gives a command to the terminal on that end. Our previous text output from the client machine is being redirected through 'cat' server-side, then it is appending the new text to the end of the file located at '~/.ssh/authorized_keys'.
Most of the time, when an SSH login is established, a key is looked for first, before the password. How does the system know who is who when using a key? It looks in the 'authorized_keys' file. Any public key located in that file is a match, and if is corresponds correctly with the matching private key, you are logged in using public key encryption.

For our server system, we don't really need any additional configuration, as most Linux distributions (including Ubuntu) automatically accept private keys through SSH. The really cool part about this is that you can now mount remote directories without having to put in a password, making bash scripts endlessly useful. For instance, you could set up a completely encrypted backup system over SSH (I'll be writing about this later).
To learn more about Public Key Cryptography, head over the Wikipedia page on it. Very wonderfully written article.
DIGEST 0 Comments | Readmore...

Friday, June 17, 2011

The Perfect Middle Ground

I really really like Kubuntu 10.04. Out of curiosity, I loaded up Kubuntu 10.04 onto my external hard drive to give it a spin. Other than loving the fact that I have my own personal encrypted Linux install bootable at all times on just about any computer I happen to be near, I really really like the new KDE. Take the easy-to-use mentality of standard Ubuntu and mix it with the endless-options power-user mentality of KDE and you get Kubuntu. First impressions went something like this:
Oh! Its the ease of Ubuntu! But wait... all of these options.. all of these rolled in configuration options, right up front? This is made for power users! But it is still Ubuntu? I'm confused... and happy...
Kubuntu seems like the perfect middle ground for those not yet happy to jump to Fedora, SuSE, or Debian proper. Kubuntu still contains some helpful Ubuntu-centric additions (read: training wheels) for the Linux newcomers, but maintains the features and customizations that power-users crave. To add to the list of things I really like about Kubuntu, it is absolutely beautiful.
If I were to pick one Linux distribution to deploy to a mass enterprise environment, it would be Kubuntu. Debian backend, Ubuntu ease-of-use, and KDE power and flexibility. It could possibly be one of the best general office use distributions yet. 

The only problems I can see with KDE is operating within a current Microsoft-rich environment (and this is more of a general Linux /OpenSource problem than a KDE/Ubuntu problem) is the total lack of Exchange support. Whether it is with Evolution or Kontact, it just kills me when I find amazing open source applications that don't work with the biggest force in business today. If running a business on open standards and open technologies is interesting to you, consider Kubuntu a powerful choice.
I highly recommend Kubuntu for those who are ready for more Linux power in their hands, while not quite ready to take the full plunge.
DIGEST 0 Comments | Readmore...

Thursday, June 16, 2011

Facebook Added Transparency


Today Facebook has announced two major changes that directly combat issues that power users of the site have  had since the website's inception:
  1. The ability to export your data. 
  2. The ability organize friends into groups.
The most important of these is the ability to export user data. Every comment, picture, post, and status update, rolled into a ZIP file, given directly to the user. This is a game-changer. Facebook can no longer be called a walled garden. With the ability to take your data elsewhere, users don't have to feel "stuck" on Facebook. Want to leave and take your data elsewhere? Go to a social network that will allow you to upload your Facebook ZIP file. Just like that, you've left Facebook for (hopefully) greener pastures. Personally, I'll feel safer using Facebook, now that I know my data isn't forever locked away in the vaults. Facebook was one of the largest bastions of data lock-in, and now that they've changed, they've set an example that will (and should) be followed throughout the tech community.

While not as important as being able to leave, Facebook has also introduced a new Groups feature. Groups isn't just a resurrected "Friend Lists", groups will fundamentally change the way Facebook will operate. What if you want to post a message to your college drinking gang, but leave your family out of it? Before, it was convoluted. Creating the list, managing it, sending a message to the list. Friend lists never really felt like an A-List feature of Facebook. If groups work like they should, this will bring Facebook much closer to allowing users to separate their social networking actions to specific aspects of their lives. Want to create a Thanksgiving Dinner event for just your Family Group without your creepy Facebook-stalker seeing? Go right ahead. Like the title of the GigaOM article: New Facebook Groups Encourage Private Interactions. And it's true.


But what does this mean for startup projects like Diaspora? Hopefully not too much. The difference between Diaspora and Facebook is Diaspora is still an open project (albeit a very young one) and still has a chance of doing these things better than Facebook. Diaspora was created with the ideas of data-export and social-aspects from the very beginning, Facebook was not. What may very well happen, though, is drive much-needed developers away from the project, simply because they don't see the need for it anymore. Only time will tell on this last point.

In the tech world, today's events seem like part of a recent trend: Once super-closed companies are starting to tear down their walls. With Apple allowing a Google Voice and Facebook letting users take their ball and go home, it seems that walled gardens are finally starting to realize that open is not only better, but more profitable as well. At-ease users are happy users.
DIGEST 0 Comments | Readmore...

Wednesday, June 15, 2011

Chrome OS Introduction

Welcome to Cloudbound! My brand new blog category dealing with all things Chrome OS and CR48. As some of you may know already (full disclosure here), I am now part of Google's official beta-tester group for Chrome OS and CR48. Before I get into the specifics, let me go over exactly what Chrome OS and CR48 are, just in case you are new to the game.

Chrome OS is a Linux-based operating system made by Google for cloud computing devices. My, oh my, what a buzz word. Cloud computing. What is it exactly? I can guarantee that most of you do some form of cloud computing each and every day.

Cloud computing is using applications and storage on the internet instead of on your local computer. Ever upload a picture to Facebook, Picasa, or Flickr? You’re using the internet to store those pictures, you are using cloud computing! Ever use Google Docs to type up a paper? That’s another example of cloud computing. Ever listen to music on Pandora, watch a television show on Hulu, or upload a video to YouTube? Those are all great examples of cloud-based media services.
So why make an operating system based entirely off of web services? Plenty of reasons! The biggest boil down to the following points:
  • No need to back up local data (for the most part) - Everything you need is already in the cloud!
  • No need to run cumbersome anti-virus software, as everything you are doing is online, you are only running a web browser (and plugins) on the local machine, nothing else.
  • This does, however, place a higher emphasis on staying safe from phishing sites.
  • Cheaper computers! If the only requirement is the ability to run a web browser, the hardware needed is relatively cheap to manufacture. No need for expensive components and upgrades. All the power you need is on the web.
The next post out will concern the hardware and physical feel of the CR48 notebook and my opinions on the design and build quality. Stay tuned!
DIGEST 0 Comments | Readmore...

Tuesday, June 14, 2011

What is Holistic healing ?

Holistic healing means taking an holistic approach when seeking treatment for imbalances and choosing to live a more balanced lifestyle. What primarily distinguishes holistic healing apart from alternative medicine, complementary medicine, and integrative medicine is that physical health is not necessarily the main focus. Even so, it is often the experience of physical discomfort that will first prompt a person's pursuit of holistic healing.

It is true that our pains and other physical discomforts demand our attention. This is where the saying "sticking out like a sore thumb'" originated from. It is difficult to ignore the obvious when we are physically hurting. Common sense tells us that we should seek help to alleviate our discomforts. Holistic healing is not an "alternative" to conventional medical care. Sometimes going to a medical professional is the best solution to addressing a dis-ease.
Physical illnesses are the symptoms of a greater imbalance that may or may not have a root cause in the physical.

Holistic or "wholistic" healing addresses all parts of the individual, not just the physical aspect of a person where manifested illnesses are most apparent. Holistic healing is not intended to serve as a band-aid or a one time fix. It is an ongoing journey of discovery in search of more answers and ultimately; living better, being healthier, and striving for wholeness.
DIGEST 0 Comments | Readmore...

Monday, June 13, 2011

Server-Bits Subversion

Subversion! One of the best ways to keep track of versions for code, homework, various essays, you name it. If it changes and you want the ability to roll back changes, Subversion is for you. In reality, Subversion is one of many types of versioning software out there, but its the one we are going to cover in this tutorial. If you're really interested in the alternatives, Google around for: Git, Mercurial, among many other smaller projects.

Why would anyone want to set up a software repository? Easy answer if you're a programmer of any sort. I'm a hobbyist programmer, and I constantly break my own code and projects when trying new things. I wanted an easy way to roll back any changes that I had made, while still retaining a history of some sort. I initially did this by copying different versions of the code into different folders, but this proved to be unmanageable in the long run. At the time, I was using 6 different computers to write my code, depending on which location I was in during that day. Manually copying this folder to a USB stick, then re-syncing the changes became a major hassle. Subversion allows you to create a repository in a folder and commit changes to it. Want to update a particular machine with the latest version of the code? Easy, subversion has an update feature that only pulls down the changes of the file since you last synced. Easy stuff, and I'll show you how to build your own subversion repository.


The very first thing you need to do is install subversion.
sudo apt-get install subversion
Yea, that easy.


Second thing, choose a place where your code will live. This shouldn't be your working directory at all, as you don't really directly interact with the subversion repository. I've made a directory inside my home directory called "SVN", and that's where all my projects live. The project I'm working on is called "Hax", so I'll create the Hax repository.
svnadmin create hax
Now I have a directory called 'hax' on my system.  If you browse to that directory and look around, it appears a little strange. That's because subversion creates a database system of sorts to manage, store, and compress your code. Again, you will not be interacting directly with this folder. You will write code elsewhere and commit (upload) the code to the repository.

Next, you need a username and password to be able to checkout (download) and commit code. Navigate to `your repository`/conf. So, in my example, I'd navigate to 'hax/conf/'. Use a text editor to edit the 'passwd' file. The default file should show you how to enter users. I'll go ahead and create my username and password:
sari = password
NOTE: Since this file contains all of the usernames and passwords to access your repository, make sure only you have access. You don't want people commiting code as you.
Now, I have a user, sari, and his password is 'password'.

The next file you have to edit is: `repository`/conf/svnserve.conf
Scroll down until you reach the part of the file that lists:
#anon-access = read
#auth-access = write
You want to change this to say:
anon-acces = none
auth-access = write
One last line to change, find the line:
#passwoord-db = password
And change it to:
password-db = password
The first changes you made told subversion that no one should have anonymous access to your code, and authenticated users should have write access to the repository. The second change you made is to let subversion know that we will indeed be using that password file to store users and passwords.

Now you have successfully configured your subversion repository. The next thing we need to do is get your server publishing your repository so you can access it from anywhere. The command for this is 'svnserve'. You can use 'man svnserve' to see all of the options. The easiest way to get your SVN server up and running is:

svnserve -d -r /home/username/path-to-repo

The -d option sets svnserve into Daemon mode, so it will accept TCP connections automatically.
The -r option sets the path you gave as the root of the SVN server.

If you want, you can make one directory to house all of your projects. This way, you can commit code to server.com/project1 and server.com/project2, all by running one instance of svnserve. Experiment to figure out which works best for you. For myself, I have one directory act as the root for svnserve, then all of my projects are then organized by category.

Now... This is how you use subversion to checkout and commit code:

To checkout your code:
svn co svn://hostname.server.com/project1
To add things to be committed:
svn add filename.txt
To delete a file (and delete it from the commit):
svn rm filename.txt
To commit your code to the repository:
svn commit -m "Comment your changes!!"
Now, a few lessons you need to take away from this:

  1. You must manually add files to be committed. Just committing code won't do anything unless you tell subversion that a file must be included in the commit. You only have to do this once per new file, after that, subversion remembers that this file is to be included in the commit.
  2. Likewise, if you would like to remove a file and have the repository reflect those changes, you must tell subversion that you are removing the file. Just deleting the file will leave it intact in the repository.
  3. When you use the commit function, please use the -m flag. This will allow you to comment your changes, this is important because if you ever want to roll back to a previous version, you can look through the svn log and see exactly when you made a particular change. To view this log, use the command 'svn log' when you are in your repository.
Now you have a basic understanding of subversion and how to set up your server to be a versioning repository. Have fun and happy coding!

If you want to pull your code into Windows to work on it, commit, and other SVN goodies, use the open source TortoiseSVN, it gives you access to all of the SVN power on your right-click menu. Enjoy!

About Server-Bits:

If you've ever wanted to get started building a server, right in your own backyard/kitchen/closet/mother's closet/mother's basement, then this is the read for you. Aimed at the not-so-technical-but-willing-to-learn, this will give you everything you need to build that monster-server you've dreamed of. My goal: To give you a working server, for free, that you can use daily.
DIGEST 0 Comments | Readmore...

Sunday, June 12, 2011

An Academic Waste of Time and Money

"On the top ten list of worthless things I have done with my life, college is quickly nearing the top."

I feel like I really am pissing away time and money and getting nothing in return. I wish there was a 'college' for people like me, where you go to a place, socialize, drink, party, network, but none of the class bullshit. The people I've met in college are fucking great, the networking is brilliant, the experiences I've had outside of the classroom setting have taught me more than any parent ever could. But what I'm actually paying for... what I'm actually buying here... I get nothing out of it. At all. The course material is a joke, the professors are comedians, but at the end of the day, I'm left with an empty wallet and not nearly enough laughs to make my night worth it.

Its like going to a comedy club to drink really good beer. What you're paying for isn't what you're there for. I've been told that this is the college experience, this is exactly what it is designed to be, but I don't really buy that. In my mind, college should be there to expand your mind and get you thinking differently about what is possible and how the world currently works, then should work. I've never had this experience in class. Ever. Instead, I've had these grand experiences in my interactions with others at college. Not in a class, but at a party, hanging out playing games, or standing around in a hallway, just being bored. Why do I need professors, grades, classes, or textbooks when they have done nothing for me? I could have gotten the same experience by just hanging out at a college, without the added burdens of paying an ungodly sum of money for fairly good academics (from what I have been told).

Maybe I'm an outlier. I've always been better at learning on my own and teaching myself things. I've done my own research, processed, then came to my own conclusions. I expand my mind regularly with topics outside my comfort zone, I don't need a person biased in staunch bureaucracy telling me what I should learn and what I should not learn. Academia as a whole is frustrating. From my time at college, I've never learned anything truly useful in a class. When it comes to my career (entrepreneurship and technology), college has taught me nothing useful. To this day, in each job I've held, every contract that I've worked on, I have never used anything I have 'learned' in college. When I walk into a tech or business class, most of the time, I end up teaching the professor. I know how that sounds, everyone knows that guy who fights with the professor about everything, but I don't mean like it like that. I end up bringing up new concepts and ideas that are fairly standard practice in the tech industry, but are brilliant breakthroughs in the world of academia. For a tech guy, walking into a modern college course about technology is like walking into a technology museum.

Academia, for the most part, is in its own little world. Business practices, current research, the very latest and greatest that computers and the internet have to offer aren't being taught in colleges. What's being taught in a high-level management course at my college is this: "Employers who want to maintain a stable working environment and want to posses a good relationship with their employees should avoid yelling at or taking things out on them." Yes... that was an entire chapter.
DIGEST 0 Comments | Readmore...

Cloudbound: The CR48 (Part 2)


The CR48 notebook itself is sleek, simple, and unbranded. Completely unbranded. No logos anywhere. Just a matte black notebook with a rubbery feel. To be honest, reviewing the hardware doesn’t really make much sense. The purpose of this pilot program isn’t to review the laptop that some company made on contract, the point is to review and bugtest the software.
But the readers want to know, just how is the CR48? In a word: Amazing. Like the Nexus One, the CR48 embodies the essence of what Google thinks is possible with a Chrome OS notebook. Simple, from the keyboard to the case, the CR48 is the essence of software driving hardware. Not one logo is shown on the device in any form. Not even an informational sticker or set of warning labels. This is a tool for developers through and through. Honestly, I wish all notebooks were built this cleanly.


A small compliant so far, the battery doesn’t quite fit 100% snug to the bottom of the case on one corner. Not a deal breaker by any means, but this shows that the company Google hired is still working out the kinks in the manufacturing process. Granted, this is alpha-hardware, and never meant to be sold to the general public in this form, so I really have no reason to complain.
All in all, I really love the simplicity, long battery life, and light weight, easy to carry shape of this build. If this is the template for Chrome OS notebooks, its about to be a very good year for Google. The next post I have lined up is a general overview of Chrome OS, then feature highlights and more in-depth views, including bugs. Stay tuned!
DIGEST 0 Comments | Readmore...

Cloudbound: Java?

One of the problems I've run into with Chrome OS is the apparently lack of Java. It kind of perplexes me that I hadn't considered Java to be a core web technology before my addiction, but it also perplexes me that Google didn't consider it a core web technology either.

Missing Plug-in. Java does require local system support for applets to load, and it would make sense for Google to want as few attack vectors as possible for Chrome OS, but it still is a bit annoying. Not that my CR48 would have the power to run Minecraft, anyway. The system only has a 1.6Ghz Atom processor, I'm pretty sure it wouldn't run very well if it did. I could edit the root file system in DEV mode and install Java, but I'd like to keep this system as clean as possible. Just an interesting notion, nothing more. 
DIGEST 0 Comments | Readmore...

Bing: Powered by Google - Stolen Search Results


Breaking tech news today! It has been uncovered that Bing has been poaching Google search results! Here are the cliff notes:

  • Bing will show the spellchecked search results from Google, without fixing the misspelling.
  • Bing results have been suspiciously close to Google results for a long time, Google decided to create a sting operation.
    • Google created non-sense words and results pages for those made-up jumbles of characters.
    • Google tasked engineers to search for these words from home, using Internet Explorer with Suggested Sites enabled and the Bing toolbar installed.
    • Soon after, these non-sense search results (Which had NOTHING to do with the term searched for) started popping up on Bing.
    • 7 out of 9 tests give overwhelming evidence that Bing has been stealing search results from Google.
So what exactly does this mean for Bing? Microsoft is holding a search event later today (which is why Google could be unveiling this now), and Matt Cutts is on a panel with them later today, so I expect we will hear more then.


Check out the very thorough and awesome analysis of the situation by Search Engine Land.

I think search is going to get very interesting over the next couple of weeks...
DIGEST 0 Comments | Readmore...

Saturday, June 11, 2011

Chrome OS Bootable Flash Drive

Well, here it is again! Another build, this one a week later. I've heard some reports that the Chrome Web Apps weren't working quite perfectly on some machines, that's the risk when you're running daily-builds of an operating system. This is freshly built as of yesterday, and I've update the instructions to include how to create a bootable Chrome OS flash drive in both Linux and Mac OSX. As usual, the Windows instructions are still there as always. After the jump, I'll include a copy/paste of the Instructions.txt file for your convenience. Have fun and let me know what you think!



Credits and Utilities:
To unpack this file, you will need the totally awesome and free unzipping utility: 7zip
This pack contains the Image Writer for Microsoft Windows, which is a great, simple way to take or place images onto drives. Give these guys a hand!
Instructions: (These are included in the download, as well)

To create a bootable USB drive:

WARNING!
DANGER!
READ THIS!
======================================
THIS WILL WIPE YOUR ENTIRE FLASH DRIVE
======================================

1. Open the image writer program.
2. Click the blue folder, select the usb_chromiumos_image*version info here*.img
3. Select the USB drive you would like to make bootable.
4. Click the 'Write' Button

To install Chromium OS on your main drive:

WARNING!
DANGER!
READ THIS!
=====================================
THIS WILL WIPE YOUR ENTIRE HARD DRIVE
=====================================

1. Boot from your USB device.
2. CTRL+ALT+F2
3. Login as Username: chronos Password: password
4. Run '/usr/sbin/chromeos-install'

==============================================
How to create a bootable drive using OSX/Linux
==============================================

DISCLAIMER!!
Be very very very careful with the dd command. This is a block device writer, it CAN AND WILL DESTROY ALL OF YOUR DATA IF USED INCORRECTLY.
CHOOSE THE RIGHT DEVICE TO WRITE TO!!!!

1. Open up a terminal
2. Use the command 'df'
3. At the very right of the table that is shown, you will see your mountpoint.
4. Try to recognize where your flash drive is mounted
5. For example, my flash drive is mounted at /media/flashdrive, to the left, I see the device as /dev/sdb1 (or on OSX, something like this: /dev/disk2s1)
6. You can also use the command like this 'df -h', this will show you the space total/used/free in human-readable values (8GB) instead of byte count, you should be able to recognize your drive on space alone.
7. READ THE DISCLAIMER ABOVE THIS SECTION. Be careful. PLEASE! You can and will overwrite your main OS disk (or any other attached device) if you are not 100% sure you have the correct drive. Keep this in mind when using terminal commands.
8. Use the command 'dd' to copy the raw image to your flash drive, here is how the command breaks down: dd if=/users/username/pathtoyour/imagefile.img of=/dev/disk2
9. Remember, you need to write the image to the full device, not just a partition. So if your 'flash drive' is /dev/sdb1, you want to use '/dev/sdb' in the 'dd' command. Likewise on OSX, if your drive is '/dev/disk2s1' you want to use '/dev/disk2' alone, without the partition modifier.
10. Most likely, you will need to use 'sudo' to invoke the dd command, depending on your setup.
11. You may need to unmount your flash drive to avoid a 'Resource Busy' error message.

These are daily builds, they have not been well tested for quality. Be careful and have fun. If you run into bugs, report them to the ChromiumOS bug tracker: http://groups.google.com/group/chromium-os-bugs?pli=1
DIGEST 0 Comments | Readmore...

Web and Computer Security

Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?

Today’s cyberspace is hazardous. None of today’s PC users can claim that they never had a computer virus issue or a PC security breach. Now, if you count today’s number of PC users worldwide, they will soon be 1 billion by 2010 according to analysts. When I see all the computer viruses, infections, trojans, and what not around me, and compare it with the 1 billion innocent computer users around the world, I simply feel sorry not only for those billion users but for myself too. But again, as a common user myself, I must admit it was not all doomsday for the whole industry since 1987 when I started to use computers. So, as a responsible member of this great IT revolution, I must share some of the best tips and tricks that I learned to use to make the minimum room for productivity on my computer.

Please note this is a tutorial for someone who has basic know-how of computer usage. For those who are newbies, I would recommend asking a local expert’s help before trying anything out mentioned in this tutorial. In that case, make room for payment from deep pocket. For your own convenience, print this tutorial for step-by-step instructions.
Whenever my computer is infected, I act on any of the following options;
  1. FORMAT HARD DISK: I back up all of my data on a CD-Writer if it is still accessible. And then format the whole hard disk drive and re-install each and every application.
  2. USE SOFTWARE: I exhaust all anti-virus and other software options. This is usually my first priority as compared to formatting the whole computer hard disk drives.
Now, let me explain both options in detail;
PRE-REQUISITES: Make sure you have a CD-Drive (Writer), empty writable CDs, Windows OS CD (bootable) that contains files such as Format.exe, Scandisk.exe, FDisk.exe, and Attrib.exe files. Microsoft Office CD, Anti-Virus CD, GoldenHawk CD Writing Software in DOS (copy2cd.exe and cdtools.exe), Serial Numbers of your License, Driver CDs of Motherboard, VGA, Network, Sound and Modem devices. Optionally, download that software from any Internet Café when your own computer is inaccessible and save it on a CD so that you can use it anytime for security purposes;
  •  Golden Hawk DOS based CD Writing Software
  • HTech Fireman Windows based CD Writing Software
  • Driver Genius Pro
  • Partition Magic
  • AVG AntiVirus
  • SpywareBlaster & SpywareGuard
  • Spybot Search & Destroy
  • Ad-Aware
  • IE-SpyAd
  • ZoneAlarm
  • HiJackThis & CWShredder
I have intentionally avoided mention of many commercially good and more friendly software’s mention here as I wanted everything to do FREE without any additional costs apart from the usual OS licenses. For your own convenience, you can research Google or Yahoo search engines find further information about such commercial software and their availability / pricing.

1. FORMAT HARD DISK
I know it is painful and surgical type of solution, but sometimes, it is the ONLY solution left after exhausting all of our efforts to revive our computer machine after a virus attack. Follow this procedure;
Booting Up: Try booting your computer normally first and see if you can login easily. If you can’t or your computer hangs up, try holding F8 key when starting Windows and you will get the Safe Mode. Even if you don’t get the Safe Mode, don’t worry.

Power up your computer and press DEL key or F2 key to login your CMOS. In CMOS, go to Boot Preferences and make CD Drive as boot drive as your first boot drive and change the hard disk drive as the second boot drive. If you don’t see your CD Drive in the boot-up options, your CD Drive is not properly installed. Check the connectors or ask your CD Drive provider for instructions to install the CD Drive. Now, when your CD Drive is ready, insert your Windows OS CD in the CD Drive and restart your computer machine. When prompted, select the option “Boot from CD with CD Option”. When you get the prompt, Notice the CD Drive letter that was allocated to your CD Drive when it installed the CD Driver. It is usually D: drive or the last drive letter depending on the number of your partitions. Note it down as it is the actual drive letter where you will have to type a DOS command like.

You should now be able to run all software utilities such as Format, Scandisk, FDisk or Windows Installation Setup.exe files. Right now, simply make sure they exist by typing a DOS command dir at the CD drive letter. If you don’t find it with this simple directory command, use dir/s filename to search the file. For example, to search fdisk.exe file, type dir/s fdisk.exe.

BACKING UP YOUR DATA: Before formatting your hard disk drive, please make sure you have proper back up of your critical data files such as Microsoft Word, Excel, Powerpoint, etc files on a CD or any other media for backup that you have access to. In this tutorial, we assume you have a CD-Writer installed for taking backups on Writeable CDs. Their capacity is usually 700MB or less. Here, you should seriously consider using Zipping software like WinZip or WinRAR.

VIA WINDOWS: If you can luckily login to your Windows OS, you should run the CD-Writer software such as HTech Fireman to back up all of your data on an empty CD. If you don’t know how to do it, read their user manual for detailed instruction set. If you can’t access your Windows OS, read on.

VIA DOS: Some of the files that you wish to make back-up, may be hidden. To un-hide them, use attrib *.* +r +s +h.
Now, use the software from Golden Hawk file named as copy2cd.exe to backup your data files or directories on a writeable CD. Before using this command, make sure you are in an appropriate path on the computer such as E:/ where the actual file copy2cd.exe file resides;
Copy2cd c:data*.* f:

Here we assumed that f: is a CD Writer drive. Now, repeat the same for all of your files to back up. When finished, run cdtools.exe command i.e. cdtools f: to finish by selecting option “Disc Finalization”.

If you can’t back up your data using the above-mentioned procedure, either ask an outside expert’s help personally or via internet. If all fails, forget your data forever and carry on installing a new OS as mentioned in this tutorial.

Backing up Your Drivers: An interesting tool to mentioned here is a software that automatically backs up all of your drivers of CD, modem, sound card, vga, usb, printer or just about anything that is currently installed on your system. But this software works only in an operational windows OS, and not in DOS. It is a good and time-saving practice to keep a backup of all of your drivers on a CD by using such a software. Its name is Driver Genius Pro and it is commercial software, not a freeware.

USING FDISK: You may skip this option and go straight to Formatting Hard Disk option, if you wish to use other useful partitions that may contain your data. Before going ahead with this option, Make sure there is no useful data left on your computer to be backed up. This option will delete all of the computer partitions and create new ones.
  1. Boot up your computer using Windows OS CD.
  2. Run this command : fdisk
  3. Press option 3 to delete all current partitions.
  4. To create a new partition, select option 1 and select Y to answer the maximum size question by the program.
  5. Next, select option 2
  6. Press Esc key to quit and restart your computer to
Now, that you have created the primary partition, you can continue to format the newly created partition. There is a very user-friendly but commercial software called Partition Magic by PowerQuest to manage your partitions easily after installation of Windows.

FORMATTING HARD DISK: Now that you have created new partitions, It is time to format them so that you can start installing Windows. This is how you make your C: drive usable by your Windows OS for installation. Boot up your computer with Windows CD and type format c: command at the prompt. When prompted for maximum size, press, YES. After complete processing you will be presented with the successful report about the formatting of the C: drive. Select your new drive name and press ENTER to finish.

INSTALLING WINDOWS: Microsoft has made it very easy for a newbie to install a completely new OS on a newly formatted partition. It is all wizard based and you simply have to click NEXT each time whenever asked a question. Boot up your computer from the Windows CD and select Start with CD Option. When on DOS prompt, change to the CD Drive that it just created which is usually d: if you have only one partition C. Now type command setup.exe to start the windows installation process.

During installation, make sure you properly name your PC as per your preferences and select your regions and Time zone. When finished, the computer will re-boot and during next re-boot it may ask some drivers of your Sound Card, VGA, Network, or other devices attached. Provide the requisite driver CDs and locate the paths of the appropriate drivers. If you are not sure, leave it like that and press NEXT to ignore. When your windows installation is complete, you can install Microsoft Office, setup internet connection and start using it as normally as you would. Please make sure you install all the security software such as anti-virus, anti-spyware, adware, and other software as mentioned in the next section.

2. USE SOFTWARE
Installing Anti-Virus: Download free AVG Antivirus software and install it. Make sure you get its free key from their website by registering. This software is not auto-updated for critical viruses and for an auto-update version, you will have to pay. If you wish to pay, we would recommend world’s most popular brands Symantec, McAfee and Trend Micros instead. No matter what Anti-Virus software you install, make sure you enable its Auto-Protect feature for automatic protection of your computer’s resources and in-coming or out-going emails from any virus attack. Some software even allow you to setup silent detection and destruction without any disturbance to your work. Further, they are auto-updated via internet at the regular interval that you setup. Hence, you can rest assured that whenever a security threat is spread all over the world, your software will automatically download the requisite updated version and install its defense on your computer.

BROWSER SECURITY: To setup your browser (Internet Explorer on Windows) for maximum security against the usual threats, follow this procedure;
  1. Start up your browser
  2. Go to IE > Tools > Windows Update > Product Updates, and selected Security Updates to be automatically updated. Microsoft releases patches and security patches from time to time to make sure your system's security is up-to-date.
  3. Now, go to Internet Options/Security/Internet, press 'default level', then OK. Now press "Custom Level." In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to 'prompt', and 'Initialize and Script ActiveX controls not marked as safe" to 'disable'. Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed. Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option/security.
If you use another browser such as Firefox or Netscape, see their documentation on how to securely set it up against any such internet threats.
Installing Anti-Spyware: Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today. By simply browsing to a web page, your computer may become a victim. You can install SpywareBlaster and SpywareGuard to effectively guard your computer from such internet threats.

It includes Fast Real-Time Scanning engine for known spyware and heuristic/generic detection capabilities to catch new / mutated spyware and Download Protection along with Browser Hijacking Protection in real-time.
Simply download the software (free) from their website and install it on your system. Make sure you download its latest update too or enable its Auto-Update feature to be updated automatically in the background. Now, when you are ready, run the software to check the spyware on your computer. When spyware are found, it reports accordingly. Press "select all", then press option "kill all checked". Although it won't protect you from 100% spyware, But it is a very important extra layer of protection.

Next, install another software that is called Spybot Search & Destroy. It works exactly like SpywareBlaster, but it never hurts to have a double layer of spyware detection alongwith Spybot R&D.

Installing Anti-Adware: Adware is a common term used to describe potentially dangerous websites and scripts that do data-mining, aggressive advertising, Parasites, Scumware, selected traditional Trojans, Dialers, Malware, Browser hijackers, and tracking components. There is a very good software called Ad-Aware available to scan and remove such nuisances from your system.

To start using it, simply visit Lavasoft USA website and download its free non-commercial version of Ad-Aware Personal Edition. Run its setup program and install it. When prompted, ask it to scan your computer. If there are any adware found, it is detected and removed automatically by Ad-Aware. Run this software on a weekly or daily basis, if possible to keep your system clean.

In addition to the Ad-Aware, Internet Explorer comes with a very handy tool that allows you to block specific sites that may carry well-known advertisers, marketers, crapware pushers to the Restricted sites Zone. If you had to input 50000+ of such sites manually yourself, it would takes years. Luckily, there is a software that does it all automatically and it is called IE-SPYAD. Once you merge this list of sites and domains into the Registry, the web sites for these companies will not be able to use cookies, ActiveX controls, Java applets, or scripting to compromise your privacy or your PC while you surf the Net. Nor will they be able to use your browser to push unwanted pop-ups, cookies, or auto-installing programs on your PC. It is not an ad blocker. It will stop top unwanted crapware from being installed behind your back via "drive-by-downloads"; prevent the hijacking of your home page.

This Restricted sites list is based in part on info from: discussions in the SpywareInfo Forums and other forums that specialize in crapware removal major crapware reference sites: doxdesk, cexx.org, Kephyr.com, PestPatrol and SpywareGuide.

To start using it, simply download it from their website and run its install.bat file. Make sure you run its update as well soon after its installation.

INSTALLING FIREWALL: A firewall software acts as a defense shield against hackers, intruders, and blocks access attempts to your computer. ZoneAlarm is a professional firewall software that works in a stealth mode automatically and makes your computer invisible to anyone on the Internet.

I know there is still a lot left, but as I wanted to keep this tutorial as brief as possible, hence I covered only the critical elements here. I am sure you will have fewer breakdowns (if not ZERO0 and more productive hours on your computer. I would recommend you to setup all the software’s auto update and auto-check options to free your time for more productive things than just playing hide and seek with spywares, adwares or viruses. Happy and safe computing!
DIGEST 0 Comments | Readmore...

Friday, June 10, 2011

Learning the technique of ThetaHealing

It is a technique that teaches how to put to use our natural intuition, relying upon unconditional love of Creator Of All That Is to do the actual “work”. We believe by changing your brain wave cycle to include the “Theta” state, you can actually watch the Creator Of All That Is create instantaneous physical and emotional healing.

Upon learning the technique of ThetaHealing, you will see that everyone has intuitive abilities that can be used to bring about spontaneous physical and emotional healing. Using this personal process, you will help yourself, as well as your friend and family.
ThetaHealing™ is designed by Vianna as a therapeutic self-help guide to develop the ability to change on all levels: physically, mentally, emotionally and spiritually using the Creator of all That Is. ThetaHealing™ is best known for the Belief and Feeling Work on all four levels; Core, Gene, History, and Soul. With growing scientific evidence that toxic emotion can contribute to disease and the awareness that emotions, feelings and the power of thought have a direct bearing upon our physical health, there is increasing interest in changing how the mind influences the body to create optimum health. Belief and Feeling Work empower people with the ability to remove and replace negative emotions, feelings and thoughts with positive, beneficial ones. ThetaHealing can be most easily described as an attainable miracle for your life.

ThetaHealing is also best known for the 7 Planes of Existence; a concept to connect to the Highest Level of Love and Energy of All That Is. Using this concept, the practitioner can achieve the highest clarity and wisdom love.
DIGEST 0 Comments | Readmore...

Thursday, June 9, 2011

Chrome OS Bootable Flash Drive!


I've taken to packaging my own vanilla builds of Chrome OS (Well... Chromium OS), and am going to start releasing them semi-regularly. Comes packed with the great Image Writer for Microsoft Windows (https://launchpad.net/win32-image-writer) and stupid-simple instructions on getting a bootable flash drive made to test drive Chrome OS. Ever since Hexxeh stopped major development (that I've seen, correct me if I'm wrong), I've been listening to people clamor for an easy way to test drive Chrome OS without having to build from the source code up. I want to help those people. Every so often, I will make a build of Chrome OS and post it here to my blog. Enjoy!!

This file is packed with 7-zip! The completely free (and open source) zipping utility! Grab it here: http://www.7-zip.org/
Chrome OS - 032111.7z - ~120MB
DIGEST 0 Comments | Readmore...

Wednesday, June 8, 2011

Natural unconcious communications

Subconscious mind control more than 85% of our behavior, while the rest is owned by the conscious mind.Subconscious mind set all our activities, even when we are sleeping, among others, breathing and heartbeat set. Given the magnitude of the role, let's learn how to effectively control human nature can be unconscious.

Controlling unconscious mind is believed, will make people more effective in controlling behavior.
There are several ways that can be done to be able to communicate with our subconscious mind. The first is to speak on themselves, either with or to visualize how the questions on the self. This is aimed at utilizing the ability of the subconscious mind recording all human activities daily. When will people forget things, forget the fact that subconcious mind.Unconscious mind still recording it in various recording files. To recall things forgotten, people live call back the appropriate file recording. Calling recording files that can be done by visualization or submit questions.

Another way to communicate with the subconscious mind is to guide the mind that can be spared from this negative. Nature is actually unconscious wizard, capable of recording all because of human activities up to 2 million bits per day. However, as a small child, the natural unconscious does not know where the good and the bad.To overcome these shortcomings, the task is conscious mind to show. Maintain the purity of nature unconscious and avoid the negative things, will benefit the human mind.
DIGEST 0 Comments | Readmore...

Sunday, June 5, 2011

The seven features of Vairochana’s posture meditation

When we practise meditation we need to have a comfortable seat and a good posture. The most important feature of the posture is to keep our back straight. To help us do this, if we are sitting on a cushion we make sure that the back of the cushion is slightly higher than the front, inclining our pelvis slightly forward. It is not necessary at first to sit cross-legged, but it is a good idea to become accustomed to sitting in the posture of Buddha Vairochana. If we cannot hold this posture we should sit in one which is as close to this as possible while remaining comfortable.

The seven features of Vairochana’s posture are:
  1. The legs are crossed in the vajra posture. This helps to reduce thoughts and feelings of desirous attachment.
  2. The right hand is placed in the left hand, palms upwards, with the tips of the thumbs slightly raised and gently touching. The hands are held about four fingers’ width below the navel. This helps us to develop good concentration. The right hand symbolizes method and the left hand symbolizes wisdom – the two together symbolize the union of method and wisdom. The two thumbs at the level of the navel symbolize the blazing of inner fire.
  3. The back is straight but not tense. This helps us to develop and maintain a clear mind, and it allows the subtle energy winds to flow freely.
  4. The lips and teeth are held as usual, but the tongue touches against the back of the upper teeth. This prevents excessive salivation while also preventing our mouth from becoming too dry.
  5. The head is tipped a little forward with the chin slightly tucked in so that the eyes are cast down. This helps prevent mental excitement.
  6. The eyes are neither wide open nor completely closed, but remain half open and gaze down along the line of the nose. If the eyes are wide open we are likely to develop mental excitement and if they are closed we are likely to develop mental sinking.
  7. The shoulders are level and the elbows are held slightly away from the sides to let air circulate.


If we want to colour our mind with a virtuous motivation we need to clear away all our negative thoughts and distractions.
A further feature of Vairochana’s posture is the preliminary breathing meditation, which prepares our mind for developing a good motivation. When we sit down to meditate our mind is usually full of disturbing thoughts, and we cannot immediately convert such a state of mind into the virtuous one we need as our motivation. A negative, disturbed state of mind is like pitch-black cloth. We cannot dye pitch-black cloth any other colour unless we first remove all the black dye and make the cloth white again. In the same way, if we want to colour our mind with a virtuous motivation we need to clear away all our negative thoughts and distractions. We can accomplish this temporarily by practising breathing meditation.

Breathing Meditation
When we have settled down comfortably on our meditation seat we begin by becoming aware of the thoughts and distractions that are arising in our mind. Then we gently turn our attention to our breath, letting its rhythm remain normal. As we breathe out we imagine that we are breathing away all disturbing thoughts and distractions in the form of black smoke that vanishes in space. As we breathe in we imagine that we are breathing in all the blessings and inspiration of the holy beings in the form of white light that enters our body and absorbs into our heart. We maintain this visualization single-pointedly with each inhalation and exhalation for twenty-one rounds, or until our mind has become peaceful and alert. If we concentrate on our breathing in this way, negative thoughts and distractions will temporarily disappear because we cannot concentrate on more than one object at a time. At the conclusion of our breathing meditation we should think `Now I have received the blessings and inspiration of all the holy beings.’ At this stage our mind is like a clean white cloth which we can now colour with a virtuous motivation such as compassion or bodhichitta.
DIGEST 0 Comments | Readmore...

Thursday, June 2, 2011

Inception

Hi All,
I recently happen to watch inception .
Its a really interesting movie,
Because few seeds that was spilled out the movie sounded 100 percent reality to me.

Dreams are discontinuous - Very true

When You Dream for 2 mins its like 2 long hours in your dream. You brain activity is really very fast - Very true

He has come up with another concept,
A dream with a dream where 2 mins will 2 days ! its like exponential increase

Now What is Inception ? pretty straight question !
Answer is , little complicated .
Its a seed that is sown in your brain when your in deep Sleep . and when you wake up . that seed will grow up as plant and come out as a decision.
So guys ! if you are in depression or confused .

Think of Inception , Definitely a better option
DIGEST 0 Comments | Readmore...

Wednesday, June 1, 2011

DJ Headphone

DJ has become quite popular since last few years. The people just love the DJ. They just want to enjoy while the music is played. No one can stop themselves from dancing. They all just love dancing. The DJ headphone is one of the most important gadgets in the whole DJ system.
There are many DJ headphones that are available in the market. You will certainly find hundreds of models that are quite easily available in the market. Some of the models are as follows:
1. Technical hi-fi HP2
This is the new approach to the industrial design. The technology is also quite advanced and the construction is quite rugged. There is a long list of features. They provide the audio enjoyment for more and more years. Some of the features of this model are click, fold and flip to take it to any corner. The pinpoint sound reproduction is being provided. The light weight as well as the plush ear pads, definitely provides lots of comfort to your years. You will certainly love this feature. It never looks like an uncomfortable gadget. The sound of the DJ is very heavy but you will not feel the pinch since you will have this gadget in your ears.
2. Technical hi-fi HP 220
This is yet another headphone it is very heavy one and you will certainly find it to be quite great. It is quite comfortable for years. The sound produced is digital and you will not find any problem such as that of sound pollution. You will certainly feel that the technical aspect of this product is also very strong. It has the folding design with universal joints. It can be folded into the small space saving designs. The compact speaker unit is certainly quite great and you will certainly enjoy them. The cushioned housing designs are quite great. The driver unit is 44 mm. the impedance of this headphone is 32 ohm. The sensitivity is also quite accurate and very good.
3. Nady QHM 1000
This is yet another product and let me tell you that it is quite comfortable to the ears. You will also find it to produce the great sound. The sound produced through this process is quite great. It is the digital sound. Like all the other products, this product is too quite flexible and can be folded and taken to any corner.
So next time you meet a DJ then do not forget to check out for the DJ headphones.
If you want to become a professional DJ then it is very essential for you to only purchase DJ Stereo Headphones that would provide you excellent sound quality and clarity. Head towards DJ Headphones to know more about best available headphones.
DIGEST 0 Comments | Readmore...