Free Linux Server Backup Using Dropbox

Free Linux Server Backup Using Dropbox

I don’t need to tell you how important data backups are.  These days, several online backup services based on cloud computing are available for either free with some limited storage to a affordable monthly fee for unlimited storage.  Carbonite, Mozy, Blackblaze, and Dropbox are a few excellent examples.  There are advantages and disadvantages of these various services.  I use 3 out of the 4 mentioned, depending on the type of data, frequency of changes, , and how often I need…

Read More Read More

Acer TM8210 Running Windows 7

Acer TM8210 Running Windows 7

Purchased in Oct 2006, my Acer TM8210-6880 came with Windows XP SP2. I tried installing Vista 64-bit and 32 bit on it, but the performance just wasn’t as good as it was on XP with ATI (now AMD)’s MobilityRadeon X1600 driver. Now that Windows 7 is officially out, I decided to give it another try. Since I wasn’t able to find a 64-bit optimized graphics driver, I decided to installed Windows 7 Ultimate 32-bit.  I gotta say that after additional…

Read More Read More

Micro-controller Projects

Micro-controller Projects

I don’t have a lot of time these days to play around with little sensor/micro-controller projects these day, but thought I would start putting together a reference for when I do have the time.  One of the projects I did was a curtain controller which closes and opens a curtain on command through a USB cable connected to a spare laptop.  I didn’t use a wireless module because at the time I couldn’t find a solution that was cheap enough,…

Read More Read More

UCLA CS113, Introduction to Distributed Embeded Systems

UCLA CS113, Introduction to Distributed Embeded Systems

This course will introduce basic concepts needed to understand, design, and implement wireless distributed embedded systems. Topics include: a) design implications of energy, and otherwise resource-constrained nodes; b) network self-configuration and adaptation; c) data routing and transport; c) applications; and e) software design issues. The course will be heavily project based. Working knowledge of C programming in the UNIX environment (particularly GNU/Linux) is assumed.

TLS Vulnerability to MITM Attack

TLS Vulnerability to MITM Attack

TLS is the underlying technology used by modern browsers and web servers to encrypt data communicated between them.  (Since TLS is a transport layer facility, it can be used in any other application layer protocols like SMTP, POP, etc, in addition to HTTP.)  While the encryption itself has been regarded as “secure enough” by online banking services (encryption relying on 4096-bit public key as of 2009), among others, there is another type of attack which is independent of the strength…

Read More Read More

Tether Sprint Mogul with Windows 7

Tether Sprint Mogul with Windows 7

*Updated Nov 4, 2009 Forgot to mention that you may need change your Mogul’s registry setting in order for tethering to be allowed by WinMo 6.1.  Please see my earlier post on that. Yeah, it was only a matter of time before I tried to tether my slightly beat-up Mogul with recently-upgraded Windows 7. Since I am an 1L these days with much diminished leisure time tinkering around with pet projects, I’ll have to make this post very brief, at…

Read More Read More