Not long ago I dropped my old trusty tablet hybrid on the floor and the monitor went blank. I had to quickly purchase a new laptop, which itself was fixed only days ago. I will discuss here how I got a new one and what others can do when their laptop is almost dead to retrieve their data.
There was a time when having a “media center” involved building an HTPC, which was a difficult project to undertake, wrought with frustrations and hardware/software incompatibilities. OTA HDTV came along and many felt left behind just when they had gotten things working. Some experimented with Popcorn while others played with NZBs/NNTP/Usenet downloads. After all these years, one media interface has emerged dominant: XBMC / Boxi / Kodi.
I have recently responded to a rental ad on Craigslist and got a reply from a scammer. He hides behind the identity of a TV personality.
Having recently upgraded my smartphone for the nth time, I found myself needing to automate a few tasks. Unlike my previous foray into Tasker automation however, my new phone is not rooted, nor do I plan to root it anytime soon.
I have 2 older tablet hybrids running an older version of Kali (1.x if I remember correctly) in dual boot with Windows. I recently decided to upgrade them and in the process, write a quick guide on what can be done with it.
Each operating system has different special characters to mark the end of line (EOL) or end of file (EOF) in simple text files. If transferring by FTP, the file conversion may be done automatically by your client based on the file extension or you could force it using the ascii command before the transfer; if not, you may have to employ the methods we discuss below.
A problem with my (micro) SD card unmounting itself (the famous “unexpectedly removed” error) pushed me to finally backup, root and fully move my apps to the SD card.
Prompted by the latest Kali update (the rolling Sana), I looked through all my USB stick and decided to update them all. One such stick has Tails, the privacy and anonymity minded OS on a stick with Tor and i2P, used by privacy advocates all over the world (including Edward Snowden).