Sunday, 6 May 2012
How To Fix An Unknown Error Occurred(0xE8008001) While Installing Apps From Itunes
While installing apps on the jailbroken ipod, I got this unknown error with error code 0xE8008001 and the apple's help was not of much use. This was driving me crazy since I could not install few apps from itunes to my jailbroken ipod. However with some googling, I found a fix for it.
All you have to do is install a Cydia app known as AppSync available from hackulo.us. You can either use Cydia from your device or Cyder from your PC.
You will have to add the new source: http://cydia.hackulo.us/ either in Cydia or Cyder and then you will find the AppSync in the list. Download and install it and then reboot the device once.
After installing AppSync, this error will not occur. So enjoy installing plethoras of apps in your jailbroken device.
Read more...
All you have to do is install a Cydia app known as AppSync available from hackulo.us. You can either use Cydia from your device or Cyder from your PC.
You will have to add the new source: http://cydia.hackulo.us/ either in Cydia or Cyder and then you will find the AppSync in the list. Download and install it and then reboot the device once.
After installing AppSync, this error will not occur. So enjoy installing plethoras of apps in your jailbroken device.
Read more...
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Fixing Cyder 2 For Smooth Running
If you have started using Cyder v.2, some of you might find this tool throwing few errors about some DLLs. If so, go through this post to fix the problem and use the Cyder 2 smoothly. This also fixes "No iphone/ipod found" error in Cyder.
Error 1: The procedure entry point sqlite3_wal_checkpoint could not be located in the dynamic link library SQLite3.dll
Fix: Copy SQLite3.dll file from C:\Program Files\Common Files\Apple\Apple Application Support to your cyder2 directory. Replace if prompted.
Error 2: Could not load iTunesMobileDevice.dll, check your iTunes installation.
Fix: Download iTunesMobileDevice.dll and copy it to the cyder2 directory.
Now close any instance of Cyder 2 and restart Cyder 2. The errors will go away and your device will be detected. Alternatively, some users may want to put the above DLL files in the system32 folder but delete the original sqlite3.dll file that came with Cyder 2. I hope this helps. :)
Read more...
Error 1: The procedure entry point sqlite3_wal_checkpoint could not be located in the dynamic link library SQLite3.dll
Fix: Copy SQLite3.dll file from C:\Program Files\Common Files\Apple\Apple Application Support to your cyder2 directory. Replace if prompted.
Error 2: Could not load iTunesMobileDevice.dll, check your iTunes installation.
Fix: Download iTunesMobileDevice.dll and copy it to the cyder2 directory.
Now close any instance of Cyder 2 and restart Cyder 2. The errors will go away and your device will be detected. Alternatively, some users may want to put the above DLL files in the system32 folder but delete the original sqlite3.dll file that came with Cyder 2. I hope this helps. :)
Read more...
Fixing Cyder 2 For Smooth Running
2012-05-06T18:06:00+05:45
Cool Samar
cyder|cydia|iphone|ipod|jailbreak|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Cyder - Cydia For PC
If you have jailbroken your apple device, you are most likely to be using an app called Cydia maintained by Saurik. Cydia is a software application for iOS that enables a user to find and install software packages (including apps, interface customizations, and system extensions) on a jailbroken iPhone, iPod Touch or iPad. But what if you don't have wifi access to install apps using Cydia? Don't fear, there's an application for windows based PCs known as "Cyder".
Cyder is a windows application that allows you to install cydia apps from your PC. Just plugin your apple device and easily install any Cydia app from any Cydia source. Running cyder is very simple.
You can add the sources for Cydia apps and then select among the available packages. You can search through the huge database of apps easily with Cyder and then download them. Installing the apps to your device has been simplified by Cyder 2.
Download Cyder2-0.1-RC2.zip
Below is the result of scan of this application:
File Info
Report date: 2012-05-06 13:39:36 (GMT 1)
File name: cyder2-0-1-rc2-zip
File size: 815098 bytes
MD5 Hash: 2f26fbbae9dd7e12b957bf6ea12abce7
SHA1 Hash: 0c61e89f3cf24baae662eeef52106ad5ff7e2ab0
Detection rate: 0 on 14 (0%)
Status: CLEAN
Detections
Asquared -
Avast -
AVG -
Avira -
BitDefender -
ClamAV -
Comodo -
DrWeb -
Fprot -
IkarusT3 -
Panda -
STOPZilla -
TrendMicro -
VBA32 -
Scan report generated by
NoVirusThanks.org
Read more...
Cyder is a windows application that allows you to install cydia apps from your PC. Just plugin your apple device and easily install any Cydia app from any Cydia source. Running cyder is very simple.
You can add the sources for Cydia apps and then select among the available packages. You can search through the huge database of apps easily with Cyder and then download them. Installing the apps to your device has been simplified by Cyder 2.
Download Cyder2-0.1-RC2.zip
Below is the result of scan of this application:
File Info
Report date: 2012-05-06 13:39:36 (GMT 1)
File name: cyder2-0-1-rc2-zip
File size: 815098 bytes
MD5 Hash: 2f26fbbae9dd7e12b957bf6ea12abce7
SHA1 Hash: 0c61e89f3cf24baae662eeef52106ad5ff7e2ab0
Detection rate: 0 on 14 (0%)
Status: CLEAN
Detections
Asquared -
Avast -
AVG -
Avira -
BitDefender -
ClamAV -
Comodo -
DrWeb -
Fprot -
IkarusT3 -
Panda -
STOPZilla -
TrendMicro -
VBA32 -
Scan report generated by
NoVirusThanks.org
Read more...
Cyder - Cydia For PC
2012-05-06T17:42:00+05:45
Cool Samar
cyder|cydia|iphone|ipod|jailbreak|
Comments
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Friday, 4 May 2012
Decode The Dean Edwards Javascript Packer
Well today I had to unpack some javascript code from Dean Edwards packer and started to check how this tool works. I opened the official packer page and then thought of giving some inputs and analyzing outputs. But, wait!!! there's this "decode" button(in disabled state) and probably I can decode the stuff I was given.
I used the firebug and quickly removed one attribute each of the lower textarea and decode button. You'll have to remove the "readonly" attribute of the lower textarea and "disabled" attribute of the "docode" button. Now you can paste the packed code in the lower textarea and decode the packed code easily. Not the real reversing of the algorithm itself but works perfectly.
And you can beautify the unpacked script using some online beautifiers such as this.
I hope it helps some of you guys ;)
Read more...
I used the firebug and quickly removed one attribute each of the lower textarea and decode button. You'll have to remove the "readonly" attribute of the lower textarea and "disabled" attribute of the "docode" button. Now you can paste the packed code in the lower textarea and decode the packed code easily. Not the real reversing of the algorithm itself but works perfectly.
And you can beautify the unpacked script using some online beautifiers such as this.
I hope it helps some of you guys ;)
Read more...
Decode The Dean Edwards Javascript Packer
2012-05-04T22:00:00+05:45
Cool Samar
javascript|tricks and tips|useful website|
Comments
Labels:
javascript,
tricks and tips,
useful website
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Sunday, 29 April 2012
Answers To Introduction To Algorithms 1.2-2 and 1.2-3
Algorithm is a fun subject and we are starting from the very basics of algorithm. Here is my solution for selected questions from chapter 1 of Introduction To Algorithms by Cormen and others.
1.2-2) Suppose we are comparing implementations of insertion sort and merge sort on the same machine. For inputs of size n, insertion sort runs in 8n2 steps, while merge sort runs in 64nlg n steps. For which values of n does insertion sort beat merge sort?
Here, we need to determine the value of n such that 8n2 = 64nlgn
For the value n = 1, obviously the merge sort beats the insertion sort so we will start from 2 and find the higher limit up to which the insertion sort beats merge sort.
The above equation can be further reduced as n = 8lgn. We can now solve it to determine the value of n. A simple code in C that would do the job for us is as below:
Answer: 2 <= n < 44. 1.2-3) What is the smallest value of n such that an algorithm whose running time is 100n2 runs faster than an algorithm whose running time is 2n on the same machine?
Here, we need to determine the smallest value of n such that 100n2 < 2n. The value of n evaluates to 15. The source code for above problem is as below:
I hope this helps some of the algo beginners out there trying to solve the questions from "Introduction To Algorithms". Btw, they are basic maths however :P
Read more...
1.2-2) Suppose we are comparing implementations of insertion sort and merge sort on the same machine. For inputs of size n, insertion sort runs in 8n2 steps, while merge sort runs in 64nlg n steps. For which values of n does insertion sort beat merge sort?
Here, we need to determine the value of n such that 8n2 = 64nlgn
For the value n = 1, obviously the merge sort beats the insertion sort so we will start from 2 and find the higher limit up to which the insertion sort beats merge sort.
The above equation can be further reduced as n = 8lgn. We can now solve it to determine the value of n. A simple code in C that would do the job for us is as below:
#include <stdio.h> #include <math.h> int main() { int i = 2; while (1) { int merge = 8 * log2(i); if (i > merge) { printf("Value of i: %d\n", i); break; } i++; } return 0; }
Answer: 2 <= n < 44. 1.2-3) What is the smallest value of n such that an algorithm whose running time is 100n2 runs faster than an algorithm whose running time is 2n on the same machine?
Here, we need to determine the smallest value of n such that 100n2 < 2n. The value of n evaluates to 15. The source code for above problem is as below:
#include <stdio.h> #include <math.h> int main() { int i = 2; while (1) { int x = 100 * pow(i, 2); int y = pow(2,i); if (x < y) { printf("Value of i: %d\n", i); break; } i++; } return 0; }
I hope this helps some of the algo beginners out there trying to solve the questions from "Introduction To Algorithms". Btw, they are basic maths however :P
Read more...
Answers To Introduction To Algorithms 1.2-2 and 1.2-3
2012-04-29T20:51:00+05:45
Cool Samar
algorithms|C/C++|programming|
Comments
Labels:
algorithms,
C/C++,
programming
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Torrentz Offers Advanced Search Features[In Case You Didn't Know]
Until recently, I didn't know that my favorite torrent meta-search engine, Torrentz.eu, offered few advanced search features that makes it easier to spot the file we are searching for. After all, who would ever check the help page to read about a torrent meta-search engine but I would consider myself a noob for not thinking that advanced search are implemented in today's torrent meta-search engines.
Anyway, directly taken from the help page, below are the examples that can be used for making better search in Torrentz while searching for the files.
I've been finding these advanced searches useful since I discovered them. I hope you will also find them useful. ;)
Read more...
Anyway, directly taken from the help page, below are the examples that can be used for making better search in Torrentz while searching for the files.
Mozilla Firefox - search for Mozilla and Firefox anywhere in the title
"Mozilla Firefox" - search exactly for "Mozilla Firefox"
Mozilla | Linux - search for Mozilla or Linux
Mozilla Firefox -beta - search for Mozilla AND Firefox but NOT beta
^Mozilla - search for titles starting with Mozilla
movie* - match movie, movies or any other prefix - This is enabled by default on most queries
filename:Fedora iso - deep search inside torrent for file named Fedora iso
filename:Fedora size:3520802816 - deep search inside torrent for file named Fedora iso with size of 3520802816 bytes
Linux added: 7d - search for Linux added within the last 7 days - you can also use h for hours
"Mozilla Firefox" - search exactly for "Mozilla Firefox"
Mozilla | Linux - search for Mozilla or Linux
Mozilla Firefox -beta - search for Mozilla AND Firefox but NOT beta
^Mozilla - search for titles starting with Mozilla
movie* - match movie, movies or any other prefix - This is enabled by default on most queries
filename:Fedora iso - deep search inside torrent for file named Fedora iso
filename:Fedora size:3520802816 - deep search inside torrent for file named Fedora iso with size of 3520802816 bytes
Linux added: 7d - search for Linux added within the last 7 days - you can also use h for hours
I've been finding these advanced searches useful since I discovered them. I hope you will also find them useful. ;)
Read more...
Torrentz Offers Advanced Search Features[In Case You Didn't Know]
2012-04-29T19:53:00+05:45
Cool Samar
torrent|tricks and tips|
Comments
Labels:
torrent,
tricks and tips
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Monday, 9 April 2012
Email Obfuscation Tricks In The Age Of Spammers
Every day thousands of spam emails are propelled to our e-mail addresses and the algorithms used by the spam bots are increasingly getting sophisticated and are able to harvest few kinds of obfuscated e-mail addresses already. While this race between spammers and web users goes on, we can still use several of the obfuscation tricks either to prevent bots from harvesting the emails or to fool bots to pick completely wrong e-mail adresses. Here, I am going to illustrate some useful obfuscation tricks I've come across over.
A very basic way of obfuscating emails is by replacing the characters such as @ and . with at and dot. Following are few samples:
And, below are some examples that would be nearly impossible to harvest :P. Just be more creative with them and no automated spam bot/email harvester out there will be able to get you :D. However, this might possibly create some kind of DoS like scenario for many legitimate users.
The unicode version:
samar@techgaun.com
will properly show as:
samar@techgaun.com
you can specify the following CSS property to use this obfuscation trick.
Edit: I found this link with some good examples so I thought I would rather refer you all to this webpage.
Read more...
The Very Basics
A very basic way of obfuscating emails is by replacing the characters such as @ and . with at and dot. Following are few samples:
samar[at]techgaun[dot]com
samar (at) techgaun (dot) com
samar (at) techgaun (dot) com
And, below are some examples that would be nearly impossible to harvest :P. Just be more creative with them and no automated spam bot/email harvester out there will be able to get you :D. However, this might possibly create some kind of DoS like scenario for many legitimate users.
<myfirstname> (at) techgaun (dot) com
<myfirstname> (at) <lastname> (dot) com
<myfirstname> (at) <lastname> (dot) com
Using Image
Another method is to create a small and appropriate image that will display your e-mail address. Should be more than enough, so just create a PNG/GIF of your e-mail address.Text Encodings
You could perform text encodings and javascript obfuscations, etc. An example of this is using ascii to unicode conversion and applying other level of obfuscations again to it.The unicode version:
samar@techgaun.com
will properly show as:
samar@techgaun.com
Obfuscations using CSS
Reverse Text Direction
CSS allows you to display the text in the reverse direction. For a HTML entity,<div class="email"> moc.nuaghcet@ramas</div>
you can specify the following CSS property to use this obfuscation trick.
.email { unicode-bidi: bidi-override; direction: rtl; float: left; }
Hidden Text Within E-mail address
Another method is to put some hidden html entity between the parts of e-mail address and then set its display style as none. The spam bots while trying to extract the data from such e-mail information are subjected to get wrong information. An example is:samar@tech<span class='display: none;'>nique</span>gaun.com
Edit: I found this link with some good examples so I thought I would rather refer you all to this webpage.
Read more...
Email Obfuscation Tricks In The Age Of Spammers
2012-04-09T20:16:00+05:45
Cool Samar
email|tricks and tips|web|
Comments
Labels:
email,
tricks and tips,
web
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Sunday, 8 April 2012
Turning The Internet Upside Down - A Prank To Play
Probably one of the best modern day april fool prank that should be played by the network admins to their users, I came acrosss this cool little trick to turn the whole internet upside down and thought to share with you guys.
With a linux gateway and some pretty basic linux skills(in fact, everything is well explained in the webpage & hence doesn't require much of skills), you can turn the internet upside down. The official webpage shows how to configure everything to play prank on your wi-fi stealing neighbours.
Ubuntu help also includes a good HowTo.
Read more...
With a linux gateway and some pretty basic linux skills(in fact, everything is well explained in the webpage & hence doesn't require much of skills), you can turn the internet upside down. The official webpage shows how to configure everything to play prank on your wi-fi stealing neighbours.
Ubuntu help also includes a good HowTo.
Read more...
Turning The Internet Upside Down - A Prank To Play
2012-04-08T01:03:00+05:45
Cool Samar
fun|network|tricks and tips|useful website|
Comments
Labels:
fun,
network,
tricks and tips,
useful website
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Subscribe to:
Posts (Atom)