I am writing this blog on my experiment and for reference purpose. On Apple and Third party supportive Technology integration.
Monday, January 14, 2008
Reliance MG880 Modem Script
After a week-long nightmare while I waited for Reliance to activate the connection (supposedly, activating a NetConnect card should only take 24 hours), I called a contact at Reliance Infocomm in Coimbatore to complain and made a passing mention of reconsidering a 2MB leased line contract that we'd recently negotiated. The connection was activated in an hour and I was up and running, but only in Windows on VMWare.
I set up Internet Connection Sharing for the NetConnect interface in Windows, set the default route on Leopard to point to the vmnet interface connecting to the host-only network that I had with the guest, and fired up a browser window in Leopard. This was when I realized that Mac OS treats resolv.conf strangely - /etc/resolv.conf is a symlink to /var/run/resolv.conf, which in turn is created by pppd and other magical elves that set up the Mac's DNS. And, perhaps because the vmware interfaces aren't *really* interfaces that can be managed through System Preferences, creating /var/run/resolv.conf and pointing it to Reliance's name servers didn't have any effect. nslookup, which apparently honors resolv.conf, worked, but any other application that used OS X's lookup mechanism didn't have any effect.
For a day or two, I managed with an entry in /etc/hosts so I could fetch my work email, but it got tiring to fire up Windows every time I wanted to connect to the Internet. Besides, because the device wasn't being managed by Leopard, the MacBook would freeze every time I put it to sleep, with an error from the USB drivers. Every time I shut the lid I'd first have to shut down Windows and pull out the CDMA adapter.
Googling a little, I realized then that the Linux usbserial module worked with the MG880, when it was passed the vendor and product IDs. I tried this with Damn Small Linux running in VMWare, and it worked fine. So I started looking for a similar, generic USB-serial kext for Mac OS X.
It appears that the most common USB-serial chipset - used in the USB cables for most phones - is the Prolific Technology PL2303. I wondered if the MG880 also used the same chipset, and got lucky - yes, it did!
There is an open-source Mac OS driver for this chipset here:
http://osx-pl2303.sourceforge.net/
Download the zip archive and install. You'll be asked to restart; do so.
Open the file /System/Library/Extensions/osx-pl2303.kext/Contents/Info.plist in a text editor.
Beneath the lines:
<key>IOKitPersonalities</key>
<dict>
Add the following entry:
<key>19d2_fffd</key>
<dict>
<key>CFBundleIdentifier</key>
<string>nl.bjaelectronics.driver.PL2303</string>
<key>IOClass</key>
<string>nl_bjaelectronics_driver_PL2303</string>
<key>IOKitDebug</key>
<integer>0</integer>
<key>IOMatchCategory</key>
<string>ProfilicSerialUSB</string>
<key>IOProviderClass</key>
<string>IOUSBDevice</string>
<key>IOResourceMatch</key>
<string>IOKit</string>
<key>bConfigurationValue</key>
<integer>1</integer>
<key>bInterfaceNumber</key>
<integer>0</integer>
<key>idProduct</key>
<integer>65533</integer>
<key>idVendor</key>
<integer>6610</integer>
</dict>
This tells the PL2303 driver to watch for USB devices with the Vendor ID 0x19d2 and the Product ID 0xfffd; these are the vendor and product IDs for the MG880.
Now, type the following command into a terminal window:
sudo kextload -v /System/Library/Extensions/osx-pl2303.kext
You should see a bunch of messages, like this:
bash-3.2# sudo kextload -v /System/Library/Extensions/osx-pl2303.kext
kextload: extension /System/Library/Extensions/osx-pl2303.kext appears to be loadable
kextload: loading extension /System/Library/Extensions/osx-pl2303.kext
kextload: /System/Library/Extensions/osx-pl2303.kext loaded successfully
kextload: sending personalities to kernel:
kextload: from extension /System/Library/Extensions/IOSerialFamily.kext:
kextload: IOSerialBSDClientSync
kextload: IOSerialBSDClient
kextload: from extension /System/Library/Extensions/osx-pl2303.kext:
kextload: 0745_0001
kextload: 056e_5003
kextload: 056e_5004
kextload: 2303_1659
kextload: 0731_0528
kextload: 04e8_8001
kextload: 2478_2008
kextload: 067b_aaa2
kextload: 0547_2008
kextload: 19d2_fffd
kextload: 04bb_0a03
kextload: 0df7_0620
kextload: 067b_04bb
kextload: 0584_b000
kextload: 067b_aaa0
kextload: 6189_2068
kextload: 11f5_0003
kextload: 078b_1234
kextload: 0557_2008
kextload: 067b_2303
kextload: 1453_4026
kextload: 11f7_02df
kextload: 0eba_1080
kextload: sending 25 personalities to the kernel
kextload: matching started for /System/Library/Extensions/osx-pl2303.kext
At this point, you should unplug the MG 880 if already plugged in, and plug it back in. Mac OS will now recognize the vendor and product IDs of the device and map it to the PL2303 driver.
Go to System Preferences and select Network. Click on the + sign beneath the list of interfaces (Bluetooth, Ethernet, Firewire, etc.) to create a new connection. A dialog will pop up asking for the interface to use for the connection, and the service name. In the list of interfaces, you should see "ZTE CDMA Tech". Choose that as the interface to use, and call the service "Reliance" - you can call it whatever you like; I chose Reliance. Click the "Create" button in the dialog. The "Reliance" connection will now be added to the list of interfaces in the left pane.
In the text field for Telephone Number, type #777. Type your phone number into the "Account Name" and "Password" text fields. Now, click the "Advanced..." button.
In the pane that displays, select "Generic" from the Vendor list box and "Dialup Device" from the "Model" list box. Make sure that the "Enable error correction and compression in modem" check box is checked. Hit Ok, and hit Apply when you are returned to the Connection Settings pane. You should now be able to hit Connect and connect to the Internet!
I hope this helps people who have the MG880 but can't use it on OS X. Many thanks to the people who created the PL2303 driver and open-sourced it, without which this wouldn't be possible.
Got details from : http://hari.selvarajan.googlepages.com/gettingaztemg880toworkwithleopard2
Saturday, January 12, 2008
NTFS for Mac® OS X
Natively read and write your data to any Windows NTFS partition.
Easily transfer data between Windows and Mac(R) computers using external
or thumb drives with NTFS partitions.
Paragon NTFS for Mac(R) OS X beats down the barriers between Windows and
Mac(R) OS!
Effectively solves the communication problems between the Mac(R) system
and NTFS. Providing full read&write access to Windows NTFS partitions
under Mac(R) OS X.
Excellent solution for end users, SOHO and the Enterprise.
Access NTFS partitions without having any complex translation
applications or file services like AFP or Samba protocols.
"...using it for a few minutes but seems to work just as it should.
being able to write files to NTFS partition is a big improvement as it
eliminates a lot of problems I experienced using FAT 32 system on my
external hdd's like most annoying problem of not being able to work
with files larger than 4GB or when using NTFS partition - not being
able to write to it in Os X".
NTFS for Mac(R) OS X BetaTester,
www.mac-forums.com
Features & Benefits
Full read/write access to NTFS volumes NTFS for Mac(R) OS X provides
full access (read/write, format) to NTFS partitions.
All NTFS versions support Supports all NTFS versions - from Windows NT
3.1 to Windows Vista (NTFS versions 1.2, 3.0 and 3.1).
Exceptional ease of use Mount the NTFS partitions as native ones -
just install the driver and use your NTFS partitions as you wish.
High performance Get high performance and minimal system overhead.
Stability The driver provides transparent access to NTFS partitions as
Mac(R) OS X-native, thus achieving an unprecedented high level of
stability.
Purchase or Download Trial From Here:
http://www.paragon-software.com/home/ntfs-mac/
Regards,
Rahul Mehta
rahulgmehta.blogspot.com
Thursday, January 10, 2008
How Computer Viruses Work!!!!!!
Strange as it may sound, the computer virus is something of an Information Age marvel. On one hand, viruses show us how vulnerable we are -- a properly engineered virus can have a devastating effect, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become.
For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses - An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software [source: Johnson].
Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
In this article, we will discuss viruses -- both "traditional" viruses and e-mail viruses -- so that you can learn how they work and understand how to protect yourself.
Virus Origins
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
Unlike a cell, a virus has no way to reproduce by itself. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to launch. Once it is running, it can infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
People write computer viruses. A person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. Why do they do it?
There are at least three reasons. The first is the same psychology that drives vandals and arsonists. Why would someone want to break a window on someone's car, paint signs on buildings or burn down a beautiful forest? For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses.
The second reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. When you were growing up, there might have been a kid in your neighborhood who learned how to make gunpowder. And that kid probably built bigger and bigger bombs until he either got bored or did some serious damage to himself. Creating a virus is a little like that -- it creates a bomb inside a computer, and the more computers that get infected the more "fun" the explosion.
The third reason involves bragging rights, or the thrill of doing it. Sort of like Mount Everest -- the mountain is there, so someone is compelled to climb it. If you are a certain type of programmer who sees a security hole that could be exploited, you might simply be compelled to exploit the hole yourself before someone else beats you to it.
Of course, most virus creators seem to miss the point that they cause real damage to real people with their creations. Destroying everything on a person's hard disk is real damage. Forcing a large company to waste thousands of hours cleaning up after a virus is real damage. Even a silly message is real damage because someone has to waste time getting rid of it. For this reason, the legal system is getting much harsher in punishing the people who create viruses.
Patch TuesdayOn the second Tuesday of every month, Microsoft releases a list of known vulnerabilities in the Windows operating system. The company issues patches for those security holes at the same time, which is why the day is known as "Patch Tuesday." Viruses written and launched on Patch Tuesday to hit unpatched systems are known as "zero-day" attacks. Thankfully, the major anti-virus vendors work with Microsoft to identify holes ahead of time, so if you keep your software up to date and patch your system promptly, you shouldn't have to worry about zero-day problems.
For more information I highly recommend that you go see this page at HowStuffWorks. It's called How Computer Viruses Work.
See: http://computer.howstuffworks.com/virus.htm.
_________________________________________________________________
Post free property ads on Yello Classifieds now! www.yello.in
http://ss1.richmedia.in/recurl.asp?pid=219
Wednesday, January 9, 2008
मकोस क्ष मोडेम script
http://www.imug.in/iMug/Blog/Entries/2007/3/3_USB_Card_to_connect_to_the_Internet.html - Reliance
http://www.imug.in/iMug/Blog/Entries/2007/12/4_SAMBA_Slim_GPRS.html - SAMBA Slim
Monday, January 7, 2008
मके यौर डॉक स्त्लेइश !!!!!!!!!!!
We'd like to introduce our new software for OS X Leopard , DockDR the application!
Ever wish you could have a rainbow dock? or perhaps you'd like to park your dock on some grass, Well with DockDR the choice is all yours! Our new software allows you to not only toggle between 2D and 3D docks but also allows you to change the look of your 3d dock in just a few clicks!
System Requirements
Mac OS X 10.5 Leopard or later.
Administrator Account.
Docks Folder MUST reside in /Applications/DockDoctor/
Safari style tabs for Firefox OS X
After reading two articles by Jon Hicks (1) “Safari style tabs for Firefox OS X” and (2) “Native (looking) Firefox OSX widgets”, I decided to take his ideas to the next level and create a theme for Firefox OSX to make it look like a native OSX application.
The problem was to change the form elements to make them look native OSX. After days of tring to add the form elements widjets to the theme—I gave up and used Kevin Gerich’s solution.
To install the theme, just click here (you may need to tell Firefox to allow themes to be installed from this website). Then, restart your browser and you’re done.
PC USERS – BEWARE! – THIS THEME WORK ONLY WITH MAC OS-X!
If you’d like to have a go at implementing the form elements widjets as well, you can download all the images and css here.
Instructions:
Close Firefox.
Right-click on your Firefox application, choose “Show Package Contents”, then open the Contents > MacOS > res folder.
Make a backup copy of your platform-forms.css file.
Copy the files included in the ZIP archive into the res folder.
Part2
As a CSS designer, I’m really enjoying the ‘customisablity’ of Firefox with a language that I understand. I can’t program, but I can do CSS, which it uses to define the look of its interface.
Here’s another little mod for OS X* Firefox users. It emulates an aqua version of Safari’s upside down tabs. I personally love this style, and prefer the more compact size of them compared to Firefox’s default tabs (which are designed to emulate the window title bar).
All you need to is quit Firefox, download these files, and pop them into your Firefox profile’s chrome folder. (*Please note, this is designed to use the default pinstripe theme as its basis – it won’t work on windows – sorry!). If you’ve already made changes to your userChrome.css file, you’ll need to add the enclosed css rules in your file. Please let me know if you have any problems using this mod (there have been some issues for people using the Sage mods posted earlier).
Thanks to Kevin Gerich, who helped me solve the last hurdle in creating these – changing the text size. I’d never used the CSS property font: icon, before.
Tuesday, January 1, 2008
RGM का Picasa वेब एल्बम - NewYear देखने के लिए आमंत्रण
आप RGM का फोटो एल्बम देखने के लिए आमंत्रित हैं: NewYear
RGM से संदेश: NewYear यदि आपको यह ई-मेल देखने में परेशानी हो रही है, तो निम्नलिखित को प्रतिलिपि करके अपने ब्राउज़र में चिपका दें: http://picasaweb.google.co.in/rahulgmehta1984/NewYear तस्वीरें साझा करने या अपने मित्रों द्वारा तस्वीरें साझा करने पर अधिसूचना प्राप्त करने के लिए, अपना खुद का Picasa Web Albums खाता प्राप्त करें. |
-
In today's digital age, the workforce is increasingly mobile, with employees relying on smartphones and tablets to carry out their daily...
-
In today's mobile-driven world, organisations need efficient and secure ways to manage employee devices. Apple's Account-Driven En...
-
An inability to log out or shut down is almost always the result of an application or process that refuses to quit. If you’re unable to log ...