All posts by thenumber28

Use Disqus instead of Akismet ?

Moderating Comments on a Freehostia Chocolate Account (Free)

The problem: Freehostia Free Accounts block outside connections.  This means that Akismet can’t access it’s servers and you can’t have spam checking.  So, all of your comments are spam spam spam!

I tried to add a captcha, but they got around that.  I tried to add Disqus using the plugin, but that failed to install because of the account’s limitations.

But, I was able to add moderated comments to my freehostia site by manually installing Disqus.  This is very necessary because otherwise you get hit with a bunch of spammers.

Here is how you manually install Disqus on WordPress.

  1. Create New Disqus Account 
  2. Go to your dashboard
  3. Click on your site
  4. Go to Settings
  5. And then click Install
  6. Select Universal Code
  7. Copy that code
  8. In /wp-content/themes/THEMENAME/single.php Replace:
    <?php comments_template( '', true ); ?>
  9. Save, Upload, then go to one of your posts. You should see Disqus loading at the bottom.
  10. Remember to setup your Disqus the way you want it. It’s a little restrictive out of the box. You can even add Akismet to Disqus in their admin interface.

http://dan.folkes.me/2013/02/13/moderating-comments-on-a-freehostia-chocolate-account-free/

Sub-netting Made Easy

Understanding Sub-netting!

IP subnetting is a fundamental subject that’s critical for any IP network engineer to understand, yet students have traditionally had a difficult time grasping it.

Over the years, I’ve watched students needlessly struggle through school and in practice when dealing with subnetting because it was never explained to them in an easy-to-understand way.

I’ve helped countless individuals learn what subnetting is all about using my own graphical approach and calculator shortcuts, and I’ve put all that experience into this article.

IP addresses and subnets

Although IP stands for Internet Protocol, it’s a communications protocol used from the smallest private network to the massive global Internet. An IP address is a unique identifier given to a single device on an IP network. The IP address consists of a 32-bit number that ranges from 0 to 4294967295. This means that theoretically, the Internet can contain approximately 4.3 billion unique objects. But to make such a large address block easier to handle, it was chopped up into four 8-bit numbers, or “octets,” separated by a period. Instead of 32 binary base-2 digits, which would be too long to read, it’s converted to four base-256 digits. Octets are made up of numbers ranging from 0 to 255. The numbers below show how IP addresses increment.

0.0.0.0
0.0.0.1
…increment 252 hosts…
0.0.0.254
0.0.0.255
0.0.1.0
0.0.1.1
…increment 252 hosts…
0.0.1.254
0.0.1.255
0.0.2.0
0.0.2.1
…increment 4+ billion hosts…
255.255.255.255

The word subnet is short for sub network–a smaller network within a larger one. The smallest subnet that has no more subdivisions within it is considered a single “broadcast domain,” which directly correlates to a single LAN (local area network) segment on an Ethernet switch. The broadcast domain serves an important function because this is where devices on a network communicate directly with each other’s MAC addresses, which don’t route across multiple subnets, let alone the entire Internet. MAC address communications are limited to a smaller network because they rely on ARP broadcasting to find their way around, and broadcasting can be scaled only so much before the amount of broadcast traffic brings down the entire network with sheer broadcast noise. For this reason, the most common smallest subnet is 8 bits, or precisely a single octet, although it can be smaller or slightly larger.

Subnets have a beginning and an ending, and the beginning number is always even and the ending number is always odd. The beginning number is the “Network ID” and the ending number is the “Broadcast ID.” You’re not allowed to use these numbers because they both have special meaning with special purposes. The Network ID is the official designation for a particular subnet, and the ending number is the broadcast address that every device on a subnet listens to. Anytime you want to refer to a subnet, you point to its Network ID and its subnet mask, which defines its size. Anytime you want to send data to everyone on the subnet (such as a multicast), you send it to the Broadcast ID. Later in this article, I’ll show you an easy mathematical and graphical way to determine the Network and Broadcast IDs.

The graphical subnet ruler

 

Over the years, as I watched people struggle with the subject of IP subnetting, I wanted a better way to teach the subject. I soon realized that many students in IT lacked the necessary background in mathematics and had a hard time with the concept of binary numbers. To help close this gap, I came up with the graphical method of illustrating subnets shown in Figure A. In this example, we’re looking at a range of IP addresses from 10.0.0.0 up to 10.0.32.0. Note that the ending IP of 10.0.32.0 itself is actually the beginning of the next subnet. This network range ends at the number right before it, which is 10.0.31.255.

 

Figure A

 

Note that for every bit increase, the size of the subnet doubles in length, along with the number of hosts. The smallest tick mark represents 8 bits, which contains a subnet with 256 hosts–but since you can’t use the first and last IP addresses, there are actually only 254 usable hosts on the network. The easiest way to compute how many usable hosts are in a subnet is to raise 2 to the power of the bit size minus 2. Go up to 9 bits ,and we’re up to 510 usable hosts, because 2 to the 9th is 512, and we don’t count the beginning and ending. Keep on going all the way up to 13 bits, and we’re up to 8,190 usable hosts for the entire ruler shown above.

Learning to properly chop subnets

 

Subnets can be subdivided into smaller subnets and even smaller ones still. The most important thing to know about chopping up a network is that you can’t arbitrarily pick the beginning and ending. The chopping must be along clean binary divisions. The best way to learn this is to look at my subnet ruler and see what’s a valid subnet. In Figure B, green subnets are valid and red subnets are not.

 

Figure B

 

The ruler was constructed like any other ruler, where we mark it down the middle and bisect it. Then, we bisect the remaining sections and with shrinking markers every time we start a new round of bisecting. In the sample above, there were five rounds of bisections. If you look carefully at the edge of any valid (green) subnet blocks, you’ll notice that none of the markers contained within the subnet is higher than the edge’s markers. There is a mathematical reason for this, which we’ll illustrate later, but seeing it graphically will make the math easier to understand.

The role of the subnet mask

 

The subnet mask plays a crucial role in defining the size of a subnet. Take a look at Figure C. Notice the pattern and pay special attention to the numbers in red. Whenever you’re dealing with subnets, it will come in handy to remember eight special numbers that reoccur when dealing with subnet masks. They are 255254252248240224192, and 128. You’ll see these numbers over and over again in IP networking, and memorizing them will make your life much easier.

 

Figure C

 

I’ve included three class sizes. You’ll see the first two classes, with host bit length from 0 to 16, most often. It’s common for DSL and T1 IP blocks to be in the 0- to 8-bit range. Private networks typically work in the 8- to 24-bit range.

Note how the binary mask has all those zeros growing from right to left. The subnet mask in binary form always has all ones to the left and all zeros to the right. The number of zeros is identical to the subnet length. I showed only the portion of the binary subnet in the octet that’s interesting, since all octets to the right consist of zeros and all octets to the left consist of ones. So if we look at the subnet mask where the subnet length is 11 bits long, the full binary subnet mask is 11111111.11111111.11111000.00000000. As you can see under mask octet, the subnet mask transitions from 1 to 0 in the third octet. The particular binary subnet mask translates directly to base-256 form as 255.255.248.0.

The “mask” in subnet mask

 

The subnet mask not only determines the size of a subnet, but it can also help you pinpoint where the end points on the subnet are if you’re given any IP address within that subnet. The reason it’s called a subnet “mask” is that it literally masks out the host bits and leaves only the Network ID that begins the subnet. Once you know the beginning of the subnet and how big it is, you can determine the end of the subnet, which is the Broadcast ID.

To calculate the Network ID, you simply take any IP address within that subnet and run the AND operator on the subnet mask. Let’s take an IP address of 10.20.237.15 and a subnet mask of 255.255.248.0. Note that this can be and often is written in shorthand as 10.20.237.15/21because the subnet mask length is 21. Figure D and Figure E show the Decimal and Binary versions of the AND operation.

 

Figure D

Decimal math

 

Figure E

Binary math

 

The binary version shows how the 0s act as a mask on the IP address on top. Inside the masking box, the 0s convert all numbers on top into zeros, no matter what the number is. When you take the resultant binary Network ID and convert it to decimal, you get 10.20.232.0 as the Network ID.

One thing that’s always bothered me about the way subnetting is taught is that students are not shown a simple trick to bypass the need for binary conversions when doing AND operations. I even see IT people in the field using this slow and cumbersome technique to convert everything to binary, run the AND operation, and then convert back to decimal using the Windows Calculator. But there’s a really simple shortcut using the Windows Calculator, since the AND operator works directly on decimal numbers. Simply punch in 237, hit the AND operator, and then 248 and [Enter] to instantly get 232, as shown in Figure F. I’ll never understand why this isn’t explained to students, because it makes mask calculations a lot easier.

 

Figure F

 

Since there are 11 zeros in the subnet mask, the subnet is 11 bits long. This means there are 2^11, or 2,048, maximum hosts in the subnet and the last IP in this subnet is 10.20.239.255. You could compute this quickly by seeing there are three zeros in the third octet, which means the third octet of the IP address can have a variance of 2^3, or 8. So the next subnet starts at 10.20.232+8.0, which is 10.20.240.0. If we decrease that by 1, we have 10.20.239.255, which is where this subnet ends. To help you visualize this, Figure G shows it on my subnet ruler.

 

Figure G

 

IP classes made simple

 

For an arbitrary classification of IP subnets, the creators of the Internet chose to break the Internet into multiple classes. Note that these aren’t important as far as your subnet calculations are concerned; this is just how the Internet is “laid out.” The Internet is laid out as Class A, B, C, D, and E. Class A uses up the first half of the entire Internet, Class B uses half of the remaining half, Class C uses the remaining half again, Class D (Multicasting) uses up the remaining half again, and whatever is left over is reserved for Class E. I’ve had students tell me that they struggled with the memorization of IP classes for weeks until they saw this simple table shown in Figure H. This is because you don’t actually need to memorize anything, you just learn the technique for constructing the ruler using half of what’s available.

 

Figure H

 

Remember that all subnets start with EVEN numbers and all subnet endings are ODD. Note that 0.0.0.0/8 (0.0.0.0 to 0.255.255.255) isn’t used and 127.0.0.0/8 (127.0.0.0 to 127.255.255.255) is reserved for loopback addresses.

All Class A addresses have their first octet between 1 to 126 because 0 and 127 are reserved. Class A subnets are all 24 bits long, which means the subnet mask is only 8 bits long. For example, we have the entire 3.0.0.0/8 subnet owned by GE, since GE was lucky enough to get in early to be assigned 16.8 million addresses. The U.S. Army owns 6.0.0.0/8. Level 3 Communications owns 8.0.0.0/8. IBM owns 9.0.0.0/8. AT&T owns 12.0.0.0/8. Xerox owns 13.0.0.0/8. HP owns 15.0.0.0/8 and 16.0.0.0/8. Apple owns 17.0.0.0/8.

All Class B addresses have their first octet between 128 and 191. Class B subnets are all 16 bits long, which means the subnet masks are 16 bits long. For example, BBN Communications owns 128.1.0.0/16, which is 128.1.0.0 to 128.1.255.255. Carnegie Mellon University owns 128.2.0.0/16.

All Class C addresses have their first octet between 192 and 223. Class C subnets are all 8 bits long, so the subnet mask is only 24 bits long. Note that ARIN (the organization that assigns Internet addresses) will sell blocks of four Class C addresses only to individual companies and you have to really justify why you need 1,024 Public IP addresses. If you need to run BGP so you can use multiple ISPs for redundancy, you have to have your own block of IP addresses. Also note that this isn’t the old days, where blocks of 16.8 million Class A addresses were handed out for basically nothing. You have to pay an annual fee for your block of 1,024 addresses with a subnet mask of /22, or 255.255.252.0.

The concept of subnet classes can cause harm in actual practice. I’ve actually seen people forget to turn classes off in their old Cisco router and watch large subnet routes get hijacked on a large WAN configured for dynamic routing whenever some routes were added. This is because a Cisco router will assume the subnet mask is the full /8 or /16 or /24 even if you define something in between. All newer Cisco IOS software versions turn off the concept of subnet classes and uses classless routing by default. This is done with the default command “IP Classless.”

Public versus private IP addresses

 

Besides the reserved IP addresses (0.0.0.0/8 and 127.0.0.0/8) mentioned above, there are other addresses not used on the public Internet. These private subnets consist of private IP addresses and are usually behind a firewall or router that performs NAT (network address translation). NAT is needed because private IP addresses are nonroutable on the public Internet, so they must be translated into public IP addresses before they touch the Internet. Private IPs are never routed because no one really owns them. And since anyone can use them, there’s no right place to point a private IP address to on the public Internet. Private IP addresses are used in most LAN and WAN environments, unless you’re lucky enough to own a Class A or at least a Class B block of addresses, in which case you might have enough IPs to assign internal and external IP addresses.

The following blocks of IP addresses are allocated for private networks:

  • 10.0.0.0/8  (10.0.0.0 to 10.255.255.255)
  • 172.16.0.0/12  (172.16.0.0 to 172.31.255.255)
  • 192.168.0.0/16  (192.168.0.0 to 192.168.255.255)
  • 169.254.0.0/16  (169.254.0.0 to 169.254.255.255)*

*Note that 169.254.0.0/16 is a block of private IP addresses used for random self IP assignment where DHCP servers are not available.

10.0.0.0/8 is normally used for larger networks, since there are approximately 16.8 million IP addresses available within that block. They chop it up into lots of smaller groups of subnets for each geographic location, which are then subdivided into even smaller subnets. Smaller companies typically use the 172.16.0.0/12 range, chopped up into smaller subnets, although there’s no reason they can’t use 10.0.0.0/8 if they want to. Home networks typically use a /24 subnet within the 192.168.0.0/16 subnet.

The use of private IP addresses and NAT has prolonged the life of IPv4 for the foreseeable future because it effectively allows a single public IP address to represent thousands of private IP addresses. At the current rate that IPv4 addresses are handed out, we have enough IPv4 addresses for approximately 17 years. ARIN is much more stingy now about handing them out, and small blocks of IP addresses are relatively expensive compared to the old days, when companies like Apple were simply handed a block of 16.8 million addresses. The next version of IP addresses, called IPv6, is 128 bits long–and there are more than 79 thousand trillion trillion times more IP addresses than IPv4. Even if you assigned 4.3 billion people on the planet with 4.3 billion IP addresses each, you would still have more than 18 million trillion IPv6 addresses left!

Source – http://www.techrepublic.com/article/ip-subnetting-made-easy/

How To Flash a Sprint LG Optimus S to Cricket ROM

(1) Install the drivers for your device.
(2) Connect to CDMA workshop and read SPC (LG method), then write to 000000.
(3) Write the PRL of your choice.
(4) Write your MDN and MIN

If everything was done properly you will now have Talk and Text, these settings should stick
without any problem. But if something weird happens just do it again.

For the PRL I suggest trying chrisngrod’s new Cricket/Sprint Hybrid PRL, since reportedly you
may be able to use talk and text in areas where flashed phones normally do not pick up. This
PRL must be written with QPST, as of yet it doesn’t work with CDMA workshop.
2. Obtaining Root and Flashing Custom Recovery
If you know what are you doing, or don’t want to bother with custom ROM’s you can skip this part.
If you decide not to use the Cricket ROM by Error420 you will need to install the Indulge’s MMS.apk,
push telephony.db, and possibly adjust the APNs.

(1) Use wifi to connect to market and download your favourite file explorer
(2) [Only registered and activated users can see links. ]
(3) Install and run gingerbreak, You should now have rooot.

Now we can flash a custom recovery in order to install the [Only registered and activated users can see links. ]

I[Only registered and activated users can see links. ]
You will need to use flash_image in order to flash the custom recovery image, instructions and download are here
Flash image – CyanogenMod Wiki

3. Installing LG Optimus S Cricket Rom
(1) Download the ROM from here Optimus S Cricket Rom
(2) Copy it to your SD Card
(3) Boot into recovery
(4) Wipe data and dalvik cache
(5) Flash rom from SD Card

4. WAP / DATA
(1)Connect to QPST v2.7 build 323. Ignore the fact that it will say “The phone has stopped responding to read/write commands.”
(2) input
UNDER M.IP TAB
* Change Active User – 0
* Change Registration Retries – 1
* Mobile IP Behaviour – Mob + Simp f/back
* Initial Registration Retry Interval – 1750ms

M.IP TAB > EDIT BOTH PROFILES TO MATCH FOLLOWING
* User > [Only registered and activated users can see links. ]
* HA and AAA shared secret > Text String > cricket
* MN-HA-SPI > 12c
* MN-AAA SPI > 2
* DMU Public and DMU Mobile > 0
* Rev Tunnel Preferred > Leave Checked
* Home Address > 0.0.0.0
* Primary HA > 68.28.15.12
* Secondary HA > 68.28.31.12
* Do the same for both profiles, just in case, but uncheck profile enabled on the 2nd

UNDER PPP CONFIG TAB
> Um
* Input [Only registered and activated users can see links. ] in Tethered NAI and User ID
* Password > cricket
>AN
* Input [Only registered and activated users can see links. ] in User ID
* Password > cricket

(3) Write to phone and wait for reboot. You should now have 3G if your phone is
already on a $55 Android Plan. If you don’t you may have missed something.

NOTE: If you go back into QPST it will revert some settings back to Sprint.

5. MMS
If your settings are correct MMS Should work when you flash the Cricket ROM
6. Optional Steps to Improve Your Experience

—————————————————————-
The following is totally optional but will improve your experience on this phone
if you decide not to mess around too much with custom roms.

(1) Install ROOT UNINSTALLER from market, and use it to remove bloatware.
(2) Download GO Launcher EX to get rid of the annoying Sprint ID icon, and have more control.

———————————————————————————-
CREDIT FOR THIS TUTORIAL IS AS FOLLOWS
To many to list, but some are cu.com, Ryan mogul, whitey10tc, rich hathaway.

IF I MISSED ANYONE PLEASE LET ME KNOW!!!

I take no credit for the information provided, I simply compiled modified an easy-to-follow set of instructions.
It should get you going on the cricket Android plan.

http://cdmagurus.com/thread5698.html

Flash Cell to Cricket Instructions

http://forum.xda-developers.com/showthread.php?t=2124527


———————————————————————————————-
Rom Install Instructions::
“Very Important Make A Nandroid ALWAYS”
– Make sure your using latest SmelkusMod Recovery Recomended
– Put ROM & Gapps on SD Card
– Reboot into Recovery
– Wipe Factory Data Reset
– Wipe Superwipe
– Wipe Format All
– Wipe Caches
– Install ROM
– Install Gapps
– Reboot

Cricket Mms Instructions::
– Turn On Bluetooth
– Open App Voice Dialer
– Say “Open Apn’s”
– Click Cricket Apn
– Click Username
– Enter Cell# Were Is Says MDN “555555555@mycricket.com”
– Click Menu Button and Save
– Click the bubble on right side of Cricket To Enable APN FOR Mms
– Disable Bluetooth
– Restart Phone and Send & Receive Mms

Installing A2SD:
– Open Terminal Emulator (app in the app drawer)
– Type “su” without the quotes
– Allow Terminal Emulator super user access
– Type “a2sd install” without the quotes
– Type ‘y’ for cache without the quotes
– Type ‘n’ for data without the quotes
– Type ‘y’ for reboot without the quotes

Rom: Mazwoz-Supersonic-JB-B4 (Cricket Version)
MD5 – 491847e51c066f2edb2152751136bf7c
Gapps: gapps-jb-20121212-signed.zip
MD5 – c4a07a24e11448824b84e314600cd357

Changelog:
Added Replacement Cricket (4.2) MMS.apk
Modified eri.xml To Have Cricket Carrier label
Modified apns-conf.xml W/ Cricket’s Apn

Special Thanks:
Evervolv (Prelude Drew) for the Initial Work
Mazwoz (Rom) XDA Page

 

Two venomous vipers vanish from Swedish zoo

Two venomous vipers vanish from Swedish zoo

Staff at the Djurparken Zoo in Helsingborg think that two missing snakes have been stolen by a snake expert intending to sell the rare species.

“They came here some time between Monday night and Tuesday morning. They took one yellow snake, and one that was striped green,” Mats Hafström, the owner of the zoo, told The Local.

IN PICTURES: Take a closer look at the snakes

The thieves broke down the door and through the terrarium, and even into the private offices of the zoo, in what Hafström believes was an attempt to find more snakes to pinch.

“We had 15 that were born here in July, and we only left two out on show. They must have been looking for the other 13,” he said. “It’s extremely rare that pit vipers are born in captivity.”

Hafström hopes the media attention will mean the thieves have trouble selling the pair of pit vipers. He added that the public has no need for concern, even though the snakes are highly venomous.

“There’s no way they’ll let the snakes loose, they’re too valuable. And even if they did, the snakes wouldn’t survive the cold here. No one has anything to worry about.”

The police have launched an investigation.

The pit viper, also known as the Trimeresurus, is nicknamed the 100 pace snake as those bitten by it are said to only manage 100 steps before dropping dead. It is mostly found in the wild in southern Asia, and eats rodents and birds.

Source: http://www.thelocal.se/50042/20130903/