I’ll start with a small DSL linux image. It’s only 50 meg, but it’s a pretty useful little distribution.
===ls -lh dsl-4.4.10.iso===
-rw-r–r– 1 ninja ninja 50M 2009-08-28 13:11 dsl-4.4.10.iso
Mount the original iso image you want to modify
===mount -t iso9660 dsl-4.4.10.iso /mnt/original -o loop===
Copy the everything that you just mounted to another temporary place.
===rsync -av /mnt/original /mnt/source===
sending incremental file list
Now add whatever files you want under /mnt/source. Once you’re done, you’re ready to make an iso image from that.
If you just want to make an iso image, and it’s not going to be bootable, this first option will work just fine. If you want it bootable, use the 2nd option below:
===mkisofs -r -o /home/dsl-plus-my-stuff.iso /mnt/source===
I: -input-charset not specified, using utf-8 (detected in locale settings)
0.95% done, estimate finish Fri Aug 28 13:21:27 2009
1.90% done, estimate finish Fri Aug 28 13:21:27 2009
2.85% done, estimate finish Fri Aug 28 13:21:27 2009
97.91% done, estimate finish Fri Aug 28 13:22:08 2009
98.86% done, estimate finish Fri Aug 28 13:22:08 2009
99.81% done, estimate finish Fri Aug 28 13:22:08 2009
Total translation table size: 0
Total rockridge attributes bytes: 2071
Total directory bytes: 8192
Path table size(bytes): 70
Max brk space used 23000
526012 extents written … Read More »
He might have fallen victim to the inverse ninja rule, which states that up to three ninjas are badass, but as the number of ninjas increases they eventually become nothing more than cannon fodder. lies… 4 ninjas is the perfect number of ninjas. proof: ninjas of the teenage mutant turtle varietal. Only because they’re always fighting hoards of ninjas from the foot clan. BUT by the time they get to Shredder, he’s the only one left standing and he kicks their ass, until Master Splinter gets involved.
Doesn’t this just sound like the typical and naturally expected increase in complexity and efficiency found in all areas (non technical) of organized gang activity that is used in response to increases in efficiency and complexity within the legal and law enforcement community? I wonder if the tactics that actually work against criminals and criminal organizations in general share any similarities to those that work in the cyber warfare arena? What the right response is, I don’t think we’ve figured out yet, because the problems only appear to grow as time progresses. I guess that all depends on what you use as your measuring stick, but one thing is for sure, cyber warfare is no where near under control today.
This is so handy, I can’t believe i’ve never used or even heard of this until today! You can easily run your bash shell scripts in debug mode to watch what they’re doing behind the scenes in real time. You get to see the levels of nesting when you’re inside loops and variables get replaced with their actual contents at the time of execution.
This might come in handy if you have multiple levels of nesting in ‘for’ and ‘while’ loops or a few if/then/else statements and you want to see just what is getting passed in the comparisons.
There’s only two handfuls of assembly instructions you really need to know. The others aren’t used as often. Many of the instructions are made up of three characters with an operand, a comma, then another operand. Some others have four chars instead. To call a BIOS function that does some pre determined stuff such as printing something, you use INT. Most functions have multiple methods you can call so you’ll need to figure out which routine you want and put that number into the ah register first:
Moving lets you transfer an attachment from one topic to another. The soft delete moves an attachment to the special TrashAttachment topic in the Trash web, where it’s hidden but can be “undeleted” with system administrator access. Click on action on the file in the FileAttachment table, then in the Update attachment screen choose [Move attachment], and make your changes to that screen. But what if you really want it gone. You may have data retention issues to deal with and then you have to get rid of things completely. Keeping stuff in the Trash can indefinitely just cut it.
Hey bob, what’s up? … uh huh, yeah … Wait, what do you mean you can’t delete things from the TrashAttachments page bob, you’re an admin, just go to the Trash page and delete it from there.
====Oops, that’s not going to work.====
There’s one simple reason why it’s dumb to not allow administrators to permanently delete things from the TrashAttachments area. You can’t replace those attachments on real content area pages because they already exist on this one special page called “TrashAttachments”.
Okay fine, you don’t want people to empty the trash. How about creating another area called ReallyDeleted or something else that’s … Read More »
The small size of the eeePC makes it a handy little machine to take with you anywhere you go. There’s plenty of smart phones out there that are just as expensive or more and lack 90% of the features of a netbook. Sporting a freshly installed eeeBuntu, the netbook does the job of browsing and word processing with an Atom N280 chip, 1024×600 back-lit LCD, two gigs of memory, Ethernet, wifi, three USB ports and a VGA port. The latest version of eeeBuntu Linux was installed from a USB live image.