Smartphone maintence

Some things are really glamorous.

  • New Shiny smart phones
  • New Computers
  • Fancy New Development methodologies

Heck, just about anything that is not only new to you but brand new on the market is pretty cool.

However, there can be things that you can do that will make your old stuff new – well newish.

It was only a few days ago that I was busy cussing out my smartphone.  I didn’t think that it was that old. Perhaps the manufacturer used cheap parts.  Perhaps that phone was really not so good to begin with!  I was really getting upset when by accident I happened across a Youtube video about cleaning the USB charging port.

The idea is pretty solid.  How much lint has accumulated in the USB charging port each time you take your phone out of your pocket.  Is it the reason my USB cable seems to fall out without hardly any movement while charging on my desk.

That particular Youtube video was suggesting I get a small metal pin and file it down.  I watched some other videos and eventually I did find a more rational approach.  Instead of a metal which may really damage the port or channel some static directl into the device I found a video about using some thin plastic packaging that is also fairly strong.

Using this homemade tool you can very carefully pull out the tiniest pieces of lint.  If you are careful, thorough and keep at this you would be surprised at how much can be pulled out.

This is more fluff that you could expect to find anywhere other than your dryer.

Indeed once I finished with this small cleaning/maintenance job the USB cable still worked but now it would stay in unless you pull it out.  This was quite the difference from falls out if you look at the phone cable too long.

I am unhappy that I could not find that original video but I did find a similar one.  I would recommend you are careful. It does make sense that a bit of maintenance will extend the life of any of your devices.

Posted in Soapbox | Leave a comment

Excessive tracking and yet probably ineffective

I was reading an article on Arstechnica about tracking inbound cars in without a warrent or individualized suspicion.[1]

To me this seems a bit ridiculous and overbearing.  I am rather curious what you need to be doing that both looks really suspicious but yet not suspicious enough to either be searched, checked, and cross referenced at the border.  It isn’t unlimited tracking it is only for the first 48 hours.

I rather curious how exactly these devices would be retrieved.

officer            (knock knock)

person           Uh, hello.

officer            Well about two days ago we thought you looked suspicious
enough to track your car.  It didn’t pan out, so now we will
be removing that device from your car.

person           What!!!

I guess this is an interesting method of surveillance if the people in question are actually really dumb or are not taking any security precautions.  If you were a group of really organized bad guys, you might have your comrades cross the boarder and meet you at the first McDonalds.  You can all jump into a different car.  The border crossing car will eventually be towed away by McDonalds.  Quite obviously this could be any fast food restaurant, truck stop, gas station or hotel.

Not only that this pretty much implies that this is the only way that a bad person could make his way from place to place other than the “tracked” car.  Other methods of transport that are available might include any of the following.

  • rental car
  • bike
  • public bus
  • public subway
  • taxi cab
  • hitchhike
  • uber

Presumably the fine department of homeland security would have some sort of way of identifying whoever was driving the car.  Perhaps a photo or video or even passport information.

These are all great pieces of evidence in a court case after some fairly hideous act has taken place but it is somehow less helpful in a land that is about 3.5 million square miles (9.8 million square kilometers)  The only way having this photo information would be useful in preventing anything would be to increase security on the general population to an extreme degree.

You would need surveillance camera’s in every city on every streetlamp but also in every shop big, restaurant or other establishment big or small.  This couldn’t be limited to the big cities but would also need to include small towns.  In order for this to really function you would also need apartment buildings, bed and breakfasts and all hotels to also check or register people’s identification.

Perhaps this idea was thought out by the same people who thought that adding a backdoor to encrypted communications would be a good idea.


Posted in Soapbox | Tagged | Leave a comment

Roses are red, forests are green …

Creative commons

“I was with the president of Finland and he said: ‘We have, much different, we are a forest nation.’ He called it a forest nation. And they spend a lot of time on raking and cleaning and doing things, and they don’t have any problem.”

The internet mocks Trump for saying ‘raking’ forest floors would prevent California wildfires

Posted in allegedly, Covfefe | Leave a comment

more fun with datatables

I actually don’t get a chance to do much GUI development but I did get a short stint on a project that used datatables.  It is actually fascinating just how much of a facelift this does give your standard HTML.  I did a small example of this in my blog entry software development the easy way.

Between normal javascript and datatables it is possible to actually make web applications that have a feel of your standard windows heavy client application.

The only example I have to share today is the ability to do a bit more with datatables.  In this case the need was to add totals of the contents of the table as a summary line.  This isn’t so difficult if you already know what the total is but if you do not there is a small bit of code that will do the calculation for you.

         function intVal ( i ) {
		return typeof i === 'string' ?
		i.replace(/[\$,]/g, '')*1 :
		typeof i === 'number' ?
         		i : 0;

	$(document).ready(function() {
	   $('#example').DataTable( {
           "footerCallback": function ( row, data, start, end, display ) {
            var api = this.api(), data;

            var ageTotal = api
         	.column( 3 )
       		.reduce( function (a, b) {
             return intVal(a) + intVal(b);
             }, 0 );
             ageTotal = Number(ageTotal).toFixed(2);
             ageTotal = ageTotal.toLocaleString();
             $( api.column( 3 ).footer() ).html(Number(ageTotal).toLocaleString());

If you add this code, actually not much different than many other examples on the internet to your web site then all of a sudden you will see your footer change with the new value(s).

The code is not all that difficult to follow.  You can use this particular function to put any values that you wish into the table footer.  In my case it was a simple sum, but if you needed some fancy algorithm then this would be the place to put it.

Download source for this example

Download files


Posted in programming | Comments Off on more fun with datatables

Internet of things

Now is a truly amazing time to be involved with computers and computing in general. With the networking moving from computers to smart phones to everything else we might finally see some pretty smart houses of the future today.

So far I haven’t done very much of my own to create any of my own IoT devices.  In the past I have taken a small step in this direction.  I created a small light fixture that can be controlled from my computer.

Home lighting solution

Fun with LEDS

I have actually created my own device that will play streaming audio from the internet. The sum of the parts (raspberry pi, Linux, open source software) is much greater than the individual parts.

Not only have I managed to create my own device but I have also managed to get it published in the Linux Magazine issue #203.  You can download that particular article from Linux Magazine at the following link.

Bedtime Music

Even better than that go and purchase the entire magazine.

Posted in programming | Comments Off on Internet of things

safe computing – passwords

Have you ever done something despite the knowledge that it isn’t really safe?  This generic sentence could be anything from jaywalking to unprotected sex.

In my case, the situation is perhaps a both more mundane and a 21st century problem.  I do have quite a few email accounts that are used for different purposes.  One of the ones that I used to catch spam should know better when it comes to security.

This login dialog looks very similar to many other login dialogs.  The only interesting part is the checkbox “Angemeldet bleiben” which simply means that your user will stay logged in.  This is not an unsurprising feature for personal email accounts.  If this value is stored on the computer or with the account it would make perfect sense.

The insecure thing is that every time you go to this site this value is set to true.  By default, your credentials will be stored on the computer, not a problem if this is your computer at home but an extremely poor policy if the computer is public used.

A proper solution

It is not a good solution to store the password or some token in a cookie on your computer.  A much better solution would be to have the password memorized and use it each time.  It is possible to keep a few passwords in your head but after a while, the number starts to exceed the memory of even the best person.

Of course, it is possible to scribble your password on a sticky note or write it down in your notepad but if security is truly a requirement then storing the password list in an encrypted file is the best solution.


There are a lot of password managers that are available – it must be true as when I googled “password manager” it returned 480,000,000.  There may not be that many but there are easily dozens of free and commercial versions in the Google Play store alone.

Basically a password manager, sometimes referred to as a password safe is just a small application that collects passwords not too dissimilar to an address book for email addresses.

The real trick is not finding a password manager that runs on your phone but one that fits how you best operate. In my case that was a password manager that is truly multi-platform.  The usability of my password manager, Keepassx, is just fine on my smartphone.

Multiplatform does not have to be a requirement.  The only time I really wanted a multiplatform was when I had too many passwords and wanted to restructure how they were grouped.

The reason that I ended up deciding on keepassx was it was possible to install the app on my smartphone but also to install the application on my Linux Mint installation.

It is possible to create a folder structure separate different aspects of your passwords.  It is also possible to store any other important number.

It is possible to create entries to store the simple user and password.

Keepassx has been made flexible enough to allow adding other values as attributes.

Finally, it is possible to assign cute little icons to your entries and folders.  This is not just a fun feature but makes it possible to visually see which types of entries contain what types of data.

I cannot recommend this software enough.  it is easy to use on your phone but it also possible to copy the keepassx database to your computer and edit it without any difficulties.


Posted in security | Tagged | Comments Off on safe computing – passwords

A binary converter

I’m a hobbyist programmer and I program mainly in python, but am learning Ruby,which is similar to python. In this post I’m going to show you a simple python program:

#program loop
while True:
    userinput = int(input('Which decimal integer would you like converted to binary?'))
    if userinput == 0:
        binary = ''
        while int(userinput) > 0:
            digit = str(userinput % 2)
            userinput = userinput / 2
            binary = digit + binary

Can you guess what this does? If you guessed that it converts decimal numbers to binary numbers, you’re correct. I’ll be explaining how it does that now. If you want to try this program yourself you have to use python 3. I will be breaking the code up into little pieces and explain what they do.


First lets start with the part marked as input. All it really does is ask you the question: “Which decimal integer would you like converted to binary?” and sets the variable “userinput” to the response of the user to that question.


1. It checks if the value “userinput” is equal to zero.    if userinput == 0:

1a.The program prints 0.  print(‘0’)

1b.The program skips to the next loop.    continue

2. It does the following steps if “userinput” wasn’t equal to zero.    else:

2a. It prepares following steps by creating a variable called “binary” and setting it’s value to a blank string.    binary = ‘ ‘

2b. It will loop these statements as long as “userinput” is positive.                             while int(userinput) > 0:

~this statement sets the variable “digit” to the mod (the remainder) but as a string.    digit = str(userinput % 2)

~this step divides “userinput” by 2.    userinput = userinput / 2

~the last step of the loop puts the variable “digit” in front of binary.                            binary = digit + binary


The output step doesn’t do much. It just prints the “binary” value.


variable: an interchangeable value

algorithm: a sequence of commands

function: a kind of command


#something –> This is a comment. It will not be read by python. You can obviously put in anything for “something”

while a == b: –>This is a loop it will loop through the algorithm that come after it as long as the statement after the while is true.

examplevariable = 1 –>This command sets a value to a variable.

Posted in programming, Python | Tagged | Comments Off on A binary converter

WoW = World of Warcraft Part 2

Hi last time we talked about the classes. This time we will talk about races in the alliance and horde. As races the alliance has :

  • Void Elf
  • Lightforged Dranei
  • Dark Iron Dwarf
  • Kul Tiran Humans

As races the horde :

  • Nightborne
  • Highmountain Tauren
  • Zandalari Troll
  • Mag´har Orc
Posted in Gaming | Comments Off on WoW = World of Warcraft Part 2

WoW = World of warcraft part 1

hi now i would like to talk about World of Warcraft.I personally also play world of Warcraft i am a Hunter. He´s a dps = damage per second there are also tanks. If you´re in a dungeon always stay behind the tank. And there are healers. Always stay in front of the healer. I personally love hunters and warlocks. There are also:

  • monks
  • death knights
  • mages
  • paladins
  • demon hunters
  • warriors
  • druids
  • rogues
  • shamans

Which character do you like? And do you like World of Worcraft?

Posted in Gaming, programming | 3 Comments

Chasing the little green lock

I wanted for the longest time to both convert this blog from http to https. Computers are ever more powerful and my site is pretty simple – it should not have been a big deal.  Not only that but with the rise of the firm Let’s Encrypt whose mission is to make encrypted connections to the World Wide Web ubiquitous.

Yet, I was not certain how to configure my site to use the certificate from Let’s Encrypt – because of that I procrastinated again and again.  I may have never done it except for Google’s desire to see this happen.  I did write about that not that long ago in ‘The carrot and the stick‘.

I was lucky that my ISP actually had done the work and by doing a bit of configuration using their GUI my web server now supported secure http.   The process was a bit of trial and error so I didn’t write about it.

It was only recently, well like today, that I realized my journey is not yet done.  I have a certificate but my website is not exactly trusted by Firefox or Google Chrome.

Firefox suggests that the problem is that the connection will only be partially encrypted.  This was also clarified as perhaps the images were the culprit. I have spent some time changing my image references from http to https but have not yet had much luck.

I will be continuing to try and get perfect security on this site and will keep you all informed of my progress as it occurs.

Posted in programming, security | Tagged , , | Comments Off on Chasing the little green lock