Thursday, December 11, 2008

Linux Gateway automated Script by MAC addresses

Note: this script was tested in a pod environment and works in CentOS 5.2 - so this means it is likely to work on most red hat distributions (fedora, RHEL, CentOS) but has not been tested on fedora or RHEL.

First create a scripts directory in /
$ mkdir scripts

Now inside it create these files (works best by copying and pasting, I use vi so the command is:
$ vi /scripts/MAClist

(edit the MAC addresses as needed)
#POD 1
#export P1W0= # Router's External Interface
#export P1W1=
#export P1W2=
#export P1W3=
#export P1W4=

#POD 2
export P2W0=00:16:76:35:81:38 # Router's External Interface
export P2W1=00:02:B3:1C:AE:CF # Internal - dhcp
export P2W2=00:16:76:35:83:3A # nfs
export P2W3=00:16:76:35:80:20 # dns
export P2W4=00:16:76:35:7E:66 # nis

#POD 3
#export P3W0= # Router's External Interface
#export P3W1=
#export P3W2=
#export P3W3=
#export P3W4=

Next is the function file:
$ vi /scripts/functions
Located HERE with indentations

getMAC() {
# this function will output all MAC addresses on the system
ifconfig -a | grep HWaddr | awk '{print $5}'

getInterface() {
# output all interface names (i.e. eth0, eth1) on seprate lines
iface=$(ifconfig -a | grep $thisMAC | awk '{print $1}')

isMAC() {
# this function can only handle system with 1 NIC correctly
REQ=`echo $1 | tr '[a-z]' '[A-Z]'`
if [ "$REQ" = "${thisMAC}" ]
return 0
return 1

existMAC() {
allMAC=`getMAC` # get all MAC in this system
# this function can handle system with more than one MAC address
iMAC=`echo $1 | tr '[a-z]' '[A-Z]'` # look for this MAC address
if [ "$iMAC" != "" ]
rMAC=`echo "$allMAC" | grep "$iMAC"`
if [ "$rMAC" = "$iMAC" ]
return 0 # do exist
return 1 # do not exist
return 1 # non-exist MAC

getDevName() {
MAC=$1 # to find out what device name is assign to this MAC
if [ "$MAC" = "" ]
: # OR echo need a MAC address
DevName=$(/sbin/ifconfig -a | grep HWaddr | grep $MAC | awk '{print $1}')
if [ "$DevName" = "" ]
: # OR echo No such MAC address
echo $DevName

And finally the main script:
$ vi /script/network.bash
Located HERE with indentations

[ -f /scripts/functions ] && . /scripts/network/functions
#load getMAC(), isMAC(), existMAC(), and getDevName() functions

[ -f /scripts/MAClist ] && . /scripts/network/MAClist
# the file MAClist contains list of MAC addresses and which system they belong
# e.g. P1W0=00:16:2A:03:AB:1F:34 - external NIC interface in router on POD 1
# e.g. P1W1=00:39:00:32:23:FD:09 - internal NIC interface in router on POD 1
# e.g. P1W2=00:39:00:11:32:CC:10 - internal NIC interface in host 2 on POD 1

for thisMAC in $allMAC
for POD in 1 2 3 4 5 6 7 8 9 10
for WS in 0 1 2 3 4
B=$(eval echo \$$A)

# find interfaces on machine
iface=$(ifconfig -a | grep $thisMAC | awk '{print $1}')

# set nis domain name
domainname nis.pod$

if [ "$thisMAC" = "$B" ]
if [ ${WS} -eq 0 ]
# WS 0 -> external interface
# get IP from Lab's DHCP server for the external interface

# setup NAT for the external interface
iptables -t nat -A POSTROUTING -o $iface -j MASQUERADE

# setup IP fowarding
echo 1 > /proc/sys/net/ipv4/ip_forward

echo This is WS 0 \(Router\)

elif [ ${WS} -eq 1 ]
ifconfig $iface 172.16.$POD.$WS netmask broadcast 172.16.$POD.255 up
echo This is WS 1
# WS 1,2,3,4 -> internal interface
# network 172.16.P.1 - 172.16.P.254 for POD P
ifconfig $iface 172.16.$POD.$WS netmask broadcast 172.16.$POD.255 up

# assign default gateway for system with only 1 NIC
route add default gw 172.16.$POD.1

# set whatever you need for this NIC with thisMAC
echo This is WS 2-4

echo "NIC on POD $POD WS $WS matched this MAC - $thisMAC" on interface $iface


Test your scripts by running the final script:
$ . /scripts/network.bash

May need to set permissions:
$ chmod 755 /scripts/*

If you find anything interesting or missing something from this tutorial feel free to leave a comment.

Tuesday, December 2, 2008

security tools exploration with live bootable ubuntu DVD

For this Assignment I have re-mastered a Linux distribution called Ubuntu which is based off of Debain Linux. The main purpose of the assignment is to implement security tools from different categories and perspectives on a custom live bootable DVD. The tools I choose to include in this DVD are: nmap, zenmap, tripwire, snort, ettercap, wireshark, kismet and john along with default packages which are pre-installed on Ubuntu. Detailing the general purpose, use of the tools, where they are and how to run them in my distributable live Linux DVD will be described.

Nmap is a tool created by Fyodor and hundreds of other contributors whom helped develop the open source security audit tool. This security tool is one of the more popular ones; it provides port scanning of remote hosts among other features to customize the scan of network host or even subnets exploration. Nmap uses raw IP packets in different ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and versions) they are running, what type of packet filters/firewalls are in use, and the list goes on. This tool was successfully installed and tested on my live Linux by opening a terminal window and running command nmap the output shows that has ports 80 and 443 open. The path to the tool in the live Linux is /usr/bin/nmap.

Zenmap is a graphical user interface version of nmap which acts as a front-end and results viewer. It aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. The many options and switches that nmap provides are made easier when using zenmap because of the easy-to-use graphical user interface with menus as well as saving host scans and results to be viewd later. For more information visit the online guides. The tool was tested successfully on my live Linux by openening a terminal and typing zenmap which will then pop up a warning that some features should be run as root, clicking “ok” will still open the tool as user. If you would like to open the tool as root or super user then type sudo zenmap in the terminal. The path location of zenmap is /usr/bin/zenmap.

Tripwire is a data integrity tool, used for monitoring and alerting when specific file changes on a system occur. It functions as a host based intrusion detection system. There are many options to configure which files you would like to monitor the configuration files are located in the default locations in /etc/tripwire/ directory includes the twcfg.txt and twpol.txt files. To iniatilize the databse of tripwire I ran tripwire --init. The path for the tripwire command is /usr/sbin/tripwire.

Snort is an open source network intrusion detection and prevention system. It is capable of performing real time packet logging and traffic analysis on a desired network. To test snort I opened a terminal in the live boot, and typed snort in the command prompt, the various options were displayed on screen. To test various options of snort I ran snort -I to set the interface on which snort should listen on. The snort program is located at /usr/sbin/snort.

Ettercap is a suite for man-in-the-middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. To test if ettercap is working on my live Linux; I opened a terminal and typed ettercap - the options display on the screen, next I can use bridged or unified sniffing if I had two targets on the LAN for example ettercap first and second IP being target one and two respectively to be able to run the attack on them. The ettercap program is located at /usr/sbin/ettercap.

Wireshark is a GUI packet sniffer, created by Gerald Combs among hundreds of contributers. The program uses pcap to capture packets, there are many filtering options as well as highlighting of different protocols, and logical descriptions within the program display. For example when ARP is received the description shows “who is tell” which makes this a great learning tool for ACK and other packets and protocols in general. Wireshark can be run by typing wireshark in the terminal or by clicking the shortcut which is under “Application” > ”Internet” > ”Wireshark”. The wireshark program is located at /usr/bin/wireshark.

Kismet is a packet sniffer that can be put into permissive mode to sniff wireless network traffic and analyze or audit your wireless networks security. Also features intrusion detection, and will work on any wireless card that supports raw monitoring (rfmon). To test it on my live distro I opened the terminal and typed sudo kismet – the options show up on the screen, to further test this program I would need to have a wireless NIC which I currently don’t own, but will be very useful once I get a chance to boot this live DVD in a laptop. The path to kismet is /usr/bin/kismet.

John is the password cracking tool I choose. The full name of the program is john the ripper. Written by Solar Designer, it is one of the most popular password testing/breaking programs; it combines many password crackers inside it, the great thing is it auto-detects password hash types which include; DES, MD5, Blowfish, Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others. To see if the program is functioning I can unshadow a user and the hasked password, then cracked it with john pass.txt command in the terminal where pass.txt is the file with the hash inside it. The location for john in the distribution is /usr/sbin/john.

This was a very interesting challenge from both tool discovery and Linux distribution creation. I have imagined that making a live bootable DVD would be more time consuming then this project ended up taking. With the help of a neat open source program called remastersys which is fairly easy to install on Ubuntu it can then run to create a distributable Linux with the chosen packages, tools and some settings which get transferred on the a new image file which can then be burned to DVD or boot from a virtual machine software within the operating system for testing purposes. This DVD will come very handy in situations where a bootable system is required, with the packages that Ubuntu doesn’t normally come with. I enjoyed making the distribution as well as discovering new tools with many interesting and powerful features.

Friday, November 28, 2008

how to print double sided in library (seneca@york)

Lexmark Ink Cartridges

First make sure you press "print current page" so only one page comes out not both(remeber the printJobName).

Second go to the printer and put a small pen mark on the top side of the paper in the tray and let the printer print the job.

Third once recieved the page go back and print the second side (remeber the printJobName).

Finally go to the same printer and place the page with the marked side down if the printed page was down (meaning the printer prints on bottom side = the pen mark will remain unprinted on)

Now you have a two sided print job in 4 easy steps!!!

Friday, November 21, 2008

sample dns linux setup

In a small test environment using two CentOS 5.2 default installs, I was able to get dns to work between the two (one client, one server).

On the Server:
First make sure the following is installed (rpm -qa | grep "bind"):
  • caching-nameserver
  • bind
  • bind-utils
  • bind-chroot
  • bind-libs
Just use yum -y install bind if necessary....

edit or create the following files (keep in mind the IPs and domains are tested and can be changed to your preferred):

- /etc/named.caching-nameserver.conf -> /var/named/chroot/etc/named.caching-nameserver.conf
Located HERE with indentations
options {
listen-on port 53 { any; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";

// Those options should be used carefully because they disable port
// randomization
query-source port 53;
// query-source-v6 port 53;

allow-query { any; };
logging {
channel default_debug {
file "data/";
severity dynamic;
#view localhost_resolver {
# match-clients { localhost; };
# match-destinations { localhost; };
# recursion yes;
# include "/etc/named.rfc1912.zones";

include "/etc/named.rfc1912.zones";

zone "" IN {
type master;
file "";
allow-update { none; };

zone "" IN {
type master;
file "";
allow-update { none; };

Your Ad Here

- /var/named/ -> /var/named/chroot/var/named/
Located HERE with indentations
$TTL 86400
@ IN SOA (
42 ; serial
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum
host IN A
host2 IN A

- /var/named/ -> /var/named/chroot/var/named/
Located HERE with indentations
$TTL 86400
@ IN SOA (
42 ; serial
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum

- /etc/resolv.conf

On the Client:

- /etc/resolv.conf

To test your configuration:

Enter the command "nslookup -sil" and press ENTER. At the ">" prompt, type "server" and press ENTER. If you edited the file "/etc/resolv.conf" properly, you should get the following output:
Default server:
you may need to modify your firewall settings and don't forget to start the services
service bind start

Tuesday, November 18, 2008

can windows predict the future?

found an interesting thing in my windows xp recently...

notice the "Last Used on:" seems to say it's tomorrows date ... weird eh

Wednesday, November 5, 2008

How to setup forwarding of email

Since there are many different web mail providers and different configurations, I will discuss just learn accounts for now.

In after signing in go to "Options">"Settings" > there you will see "Mail Forwarding", there check off the box "Enable forwarding" and enter the email you wish to forward TO in the box (you may enter more then one).

Click "Save Changes" and you are done.

Now when you recieve email to your learn email it will be forwarded, and no one sending email's to learn will know it gets forwarded (unless you reply from the wrong email of course)


Sunday, October 26, 2008

Landmark education criticism review

I have heard much about the no-so-popular Landmark education program.

If you don't know what it is - basically a company that gives 3 day seminars; the seminars start at 9 in the morning and end at about 10 at night, for three days straight; Friday, Saturday and Sunday as well as Thursday evening to finish up. They occur once per month and the company spread to many major cities (if you want more info just google them).

What I found hard to understand is how such a general idea can draw on for so long, but even worse is why someone would take it (surprising at how many people show up) - would you like guidance to know what is wrong with your life?

if so I totally think you should take it, otherwise this program is NOT for you. (in my opinion)

I mean it's not a specific program to teach about a specific thing - if you want to know how to do something it will usually be specific.

For example if one would like to know how to drive a car, they would take a driving lesson or go to a driving school and NOT learn how the engine functions or the engineering aspects of the gasoline engine, transmission, etc. If you want to make more money do what you love and think how to monetize it. Granted not always an easy task but it's better than taking a seminar which would be spending more money in the wrong direction, instead maybe invest this money in something else, get a loan etc.

I could not stand the first two hours, had to tell them I'm out and got a refund.

Let me know what you think!

A little different this time

I know that usually this blog is about technological and technical solutions or tutorials, etc. but I realized the name of the blog is EduBoris AKA Educational Blog by Boris!

Since education can cover all topics as long as there is education of some kind :)

Well the mental part of education seems very interesting to me; it is almost never discussed or studies in any secondary or earlier education.

I, of course, am not in the psychological field but still find it very fascinating - looking at priority change in life and it makes me think; why is it we have priorities at some point in our life then change to completely different ones?

Let me know what are your thoughts!

Thursday, October 23, 2008

how to set gmail to allways secure connection!

If you're like me, using gmail for important things over wireless technology... specially knowing how easy it is to see everything being passed over LAN/WLAN connections.

Then you will love this new feature of gmail:

All you have to do is go to your gmail settings ( and scroll to the bottom, there you will see "Always use https" click that and click Save.

Done, now whenever and where ever you may log into your gmail, it will always use HyperText Transfer Protocol Secure (HTTPS) instead of the other option (http).

This isn't new - in fact I've been using the secure option for years, what is new is the option to set it for default in the settings.

I just had to manualy type in or saved the bookmark to keep me safe when checking my email :)

Try it and let me know how it goes!

Sunday, October 5, 2008

how to change your DNS (and why)

If your ISP (like mine) is redirecting your searches to their own websites (with their sponsors) the problem is that your DNS is given by the ISP.

This is very easy to change, all you have to do is figure out if you are you using a router.

If the answer is yes, then you will need the router's password and username. Once obtained open a browser and type into the address bar, this should prompt for username and password; enter your credentials and go to "Basic settings" or such and look for "Domain Name Server (DNS) Address", Enter in the primary DNS box and save the settings.

You now have a general purpose DNS (easy to remember IP) and will not redirect to unwanted web sites.

If on the other hand you are connected directly to the internet using your PC, and you are using Windows then do the following:

"Start">"Control Panel">"Network Connections"> find the active interface and right-click "Properties"> double-click on "Internet Protocol(TCP/IP)" then go click on "Use the following DNS address" enter into the "Prefered DNS server" box click OK to accept all the settings.

Otherwise you may be using Linux or Mac; in this case the configuration will be different:

Get to a shell prompt (command line interface) and edit the file /etc/resolve.conf remove the contents and add the following line:

Tuesday, September 9, 2008

how to tunnel ssh connection

First step is getting an ssh client.

I prefer Putty, now to configure it;

1. Set the host to what you are tunneling to (ssh host)
2. Then under connection>SSH>Tunnels set the source port to 1080 (or anything over 1024) and check off dynamic, and open the connection.
3. Log in, when you have a connection you can proceed.

Second step is to set the browser.

I prefer firefox; under tools>options>advanced>network>settings choose Manual Proxy configuration and add localhost to SOCKS and type the port you used (1080) next to it.

click OK, and to test you have a good connection use and see if you have a different IP then yours by switching the proxy off and testing further.

Friday, September 5, 2008

New way of saving password in firefox 3

for new firefox 3 users that maybe unfamiliar with how to save your password, here is a pic that I hope will help:

Monday, September 1, 2008

how to set "what I'm listening to"

1. click the down arrow near the "personalized message" and then click "Show what I'm Listening to".

2. If this does not work then go to windows media player: View > Plug-ins > Other > Windows live messenger


Wednesday, August 20, 2008

Steal This Footage

Steal This Film II has released archive footage under the creative commons license.

The archive can now also be found here for all to view, remix, reuse, share, enjoy!

I have uploaded most of the videos on youtube and Google video as well as rapidshare downloads with rar or zip... it's all organized HERE

Wednesday, August 13, 2008

How to Download Torrents

Overview on how to download using torrents:

1. Download and install a torrent application program like UTorrent
2. Search and download the torrent files from websites like isohunt or thepiratebay or indexes like Torrentz)
3. Open the torrent files which then will start download the desired files
4. Play/Install/Burn - watch, listen or run the completed files from torrents and enjoy!

1. In order to download files using torrents, first you will need a torrent client program, this will allow you to download the actual files you want. There are many different types with different names sizes and shapes - but they all do essentially the same thing, I prefer UTorrent because it’s fast, customizable and light. UPDATE: there is a download for mac as well found HERE.

2. Once you download and install the program on your computer, you may need to configure the program and set setting; such as directories for completed downloads and port numbers that your router uses.

Since I use utorrent the download directory defaults to "My Documents" >"Downloads" in windows XP systems. Port numbers are random and you may need to forward them in your router but my configuration works without this so I generally don't have to do anything except reduce the amount of active downloads in the Options>Preferences>Queueing. And you may like the program not to start when windows starts - this is done in the general options>preferences.

Now you can start downloading torrent files - normally having an extension of .torrent at the end of the filename (i.e. filename.torrent).

For our example "StealThisFilm.torrent" (can be found here) would be the filename, this will be a very small binary file; meaning it doesn't contain anything except special information for the torrent client program itself. That will open with your torrent program automatically (if it isn't already open) and will start download the desired file (i.e. movie or video clip, song or album, software or CD/DVD image etc.)

To find more of these torrents you can search various sites, such as isohunt, thepiratebay or indexing sites such as Torrentz, also you can get them from specific sites of products; like StealThisFilm which is a documentary or CentOS which is a Linux operating system distribution.

After the torrent file has been opened the torrent application will start downloading the file, the time will vary depending on file popularity, size and of course your connection/computer speed. When complete the file will be saved where you choose to or in a default directory under My Documents>Downloads (C:\Documents and Settings\Username\My Documents\Downloads).

Let's review on how to download using torrents:

1. Download and install a torrent program (like UTorrent)
2. Search and download the torrent files from websites (like isohunt or thepiratebay)
3. Open the torrent files which then will start download the desired file
4. Play/Install/Burn completed torrents and enjoy!

Sunday, July 13, 2008

A new look and...

Just a quick note, we've got a new look with bigger font and stretching wider to fit more educational information in one page.

And... we got approved by Adbrite's advertisements to help pay those bills.
So subscribe if you haven't already and check out our sponsors if you see anything you like.

Thanks for helping make us the number one educational blog in the world!
(lol maybe one day...)

P.S. post comments or email us about the topics or specific questions you would like us to answer or explore with you.

Saturday, July 5, 2008

How to increase performance on a windows xp operating system

A very simple yet powerful way to increase performance on virtually any computer hardware configuration that will have or already has a windows xp operating system is the following:

Get to System Properties (WindowsKey+Pause\Break) > go to the Advanced tab > under Performance click on Settings > select "Adjust for best performance" and click OK or Apply to save the settings.

The skin is the ugly Win2K type but the performance is increased by about 5%. RAM use is decreased by about 10MB. (These are vague approximations of course, but please comment if you figured out the correct amounts)

So if your like me where visuals don't matter as much as Vista does then you will appretiate this neat trick to increase the power of a slim Windows XP professional operating system (now with Service Pack 3), enjoy.

Thursday, May 15, 2008

Not-so-common easy windows xp shortcuts

For those of you not farmilar with Microsoft windows shortcuts, those are a combination of keys pressed together or separately to achieve tasks (usually achievable with few or several mouse clicks also).

Here are a few common and not-so-common but easy to use and useful keyboard windows xp shortcuts:

Close current window (if no window then open shutdown prompt): Alt+F4
Refresh View/Window (or reload web page if on a browser): F5
Open System Properties: WindowsKey+Pause/Break
Open Task Manager: Ctrl+Shift+Esc
Open Task Manager Or if in classic login then open Windows Security Prompt: Ctrl+Alt+Delete
Minimize all open windows or bring them back up: WindowsKey+D

To Pause the BIOS process press: Pause/Break key and press it again to continue.

If you have more then comment or email me and I will be sure to add them in.

Steal This Film Part II free rapidshare download

Copy paste the link into your browser

for more info click on

Or click the links

Sheepumentary documentary free rapidshare download

to download using rapidshare go to these links:

for more info click on

or click:

Monday, May 12, 2008

The corporation - documentary Rapidshare

Corporations are like individuals, they have rights and social responsibilities.

NEW: the song Bad Apple by David Wilcox - get lyrics HERE

Having problems? read the download instructions.

(copy and past the URL into your browser if the links don't work)

How to download

There are many download types; rapidshare, torrents, and more.

Here is the basic way to download from rapidshare:
  1. Download all the related links; if it's a split archive then download part1.rar, part2.rar etc. all into the same folder.
  2. Unzip or unrar (which means to uncompress/decompress the information inside the compressed archives.) using winrar or winzip (direct winrar download).
  3. Make sure the correct codecs are installed on the computer to be able to view/play the file. For example; to view xvid, divx, avi, flv etc. I prefer VLC
For any questions or comments use this form.

Saturday, April 26, 2008

ISP DHCP research

I have looked into the way Internet Service provider's Dynamic Host Configuration Protocol works as far as I know about such technology, and from my research I concluded: the IP given by your ISP's DHCP will remain to the Media Access Control device.

For example: you have a router connected to the cable modem - this router has a single MAC address therefore you will always have the same external IP, as soon as you change the router (or plug the modem directly to your PC's Network Interface Card) you will get a different external IP. This IP remain the same as long as the NIC's MAC is the same.

Note: these tests were performed on a cable internet service by Rogers Communications Inc. in Canada, and do not apply to DSL internet service providers who seem to change external IP often unlike cable internet service providers

Wednesday, April 9, 2008

Set up gateway on a Linux system

on the pc that will be the gateway:

iptables -F --to flush(drop) the firewall

ifconfig eth1(external interface) ip) netmask up

ifconfig eth4(internal interface) ip) netmask up

echo 1 > /proc/sys/net/ipv4/ip_forward

iptables -t nat -A POSTROUTING -o inetrnal interface -j MASQUERADE

An automated script was written a tutorial is posted HERE.

Saturday, April 5, 2008

System information

how to get system information(specifications) from a Linux mechine


curretnly looking for how to find out make, model, motherboard manufacturer, CPU type, RAM from a Linux system.

Thursday, March 27, 2008

How to set up a wireless(shared) printer - Windows XP

Lexmark Ink Cartridges

Printer Configuration

To configure the printer you must determine what kind of printer it is - if it has a Network Interface Card (NIC) then you may connect it right to your router and be able to print on the LAN (Local Area Network) i.e. any computer connecting to the same router.

If the printer is USB or serial on the other hand - then you will need another computer to connect to it. This will act as the "print server" and will work with windows XP; first, install the print drivers to the computer and make sure it works when printing to the connected printer.

Second, you must share the printer, to do that go to "Start" > "Printers and Faxes" > right click on your printer and click "Properties" > under the "Sharing" click "Share this printer" and you may name it or leave the default, but make note of the name in either case.

Finally, follow the 3 easy steps below on any other computers on your network (connecting to the router -wireless or wired alike) that you wish to print from.

Step 1 - Install
a. On the computer you want to print FROM (i.e. your laptop - not directly connected to the printer)

b. Go to "Start" > "My Network Places" > "View Workgroup Computer's" > "ComputerName"
Or using any other path to get to the workgroup your computer is on (normally called workgroup) - where "ComputerName" is the computer name of the computer with the printer attached.

c. Inside the computer you should see a shared printer called what you named it earlier in my example: "HPlaserJWireless" > double click it.
Now wait until it installs the drivers.

Step 2 - Configure
a. Go to "Start" > "Printers and Faxes" > find the appropriate shared printer: "HP laser 3100" (or something like that)

b. Make note of the printer name it might be different then the "share" name (HPlaserJWireless).

c. Right click the printer and choose "Make this printer Default".
You should now see a check mark next to that selected printer - indicating the default status (first printer from the printing menus of any program).

Step 3 - Print
To test the printer open a new word document (blank) or a webpage. Press "File" > "Print"
Now you should see the printer, if it isn't correct check with the steps above.

Feel free to comment with any questions or corrections

Sunday, March 23, 2008

Another Great blog

in fact this blog was inspired by that blog.

lots of great info and a good friend.

how to get system information

computer/server systems information:
windows - run>cmd>systeminfo
and for direct x info cmd>dxdiag
linux - uptime or show system


"Imagine a world in which every single human being can freely share in the sum of all knowledge"




I Initialize Control Variable

T Test Control Variable for Entry/Exit

E Execute Body of Loop

M Modify Control Variable

L Loop Back to Test

OPS435 Notes

perl 2

perl is fairly similar to bash. main differences include syntax and characters. for example in perl

    other action

as opposed to bash

  other action

Perl intro

this line should always be in the first column of the first line:
for more options include -w (adds a warning) -T (taint) or -wT (both)

Steal this film

'Steal this film' is a documentary that looks at copyrights throughout the past few years as well as throughout history of about 5,000 years. Copying books was forbidden, books were chained and only the printers would own them. The authors are the actual owners just as we see today where the publishing company and the distribution companies make most of the profits as well as own legal copyrights.

EduBoris - intro

Introducing the new and improved eduboris, an educational blog for the world to learn.
Here anyone across the world and universe can find the knowledge and expertise that I will provide. Including weblinks to other educational websites and videos, audios, downloads to educational materials, as well as text of lectures, summaries or notes for a free learning environment (unless you are a commerce).