How to create an install TGZ (*.tar.gz) for a compiled (eg. via autoconf) application

Let's assume you have an application/project that you've already compiled and would like to pack it into a TGZ (or TAR.GZ) archive with proper permissions ... which most probably involve the root user as well. If you use autoconf, you most probably applied some sort of --prefix. If not, the default --prefix=/usr/local was used. Anyway your Makefile most probably contains some sort of installation target that would copy all the necessary files into their proper destinations. The problem is that you don't want to install locally in the first place and you don't have root access either. How are you going to package the application into a TAR.GZ with proper pathes and owners/permissions?

How to prevent pasting of images (with a "data:image" URI scheme) into TinyMCE text fields

Let's first take a look at what I'm talking about. Smile Firefox (starting with version 4) supports copy+paste of images into HTML textfields using the data URI scheme. This is nice for embedding small images into your HTML document.

How to decode an encoded email header with a Python one-liner

Let's take this encoded email subject as an example:
=?UTF-8?B?U3plbcOpbHllcyBZb3VUdWJlLcOpcnRlc8OtdMWRIC0gMjAxMS4xMi4yOC4==?=
Feed it into this one-liner:
python -c "from email.header import decode_header; import sys; subject, encoding = decode_header(sys.stdin.readline())[0]; print subject if encoding == None else subject.decode(encoding)"
It'll read a single line from it's standard input (you can pipe in the encoded line or enter or copy&paste manually) and print the decoded form. In this example it'll print Személyes YouTube-értesítő - 2011.12.28..

OpenStack - a massively scalable cloud operating system

"OpenStack is a global collaboration of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. The project aims to deliver solutions for all types of clouds by being simple to implement, massively scalable, and feature rich. The technology consists of a series of interrelated projects delivering various components for a cloud infrastructure solution."

How to list package and application name of a couple of APK files

First download and install apktool. Then enter the directory with the APK files and execute something like this:
aapt_bin="$(which aapt)"
[ -n "$aapt_bin" -a -x "$aapt_bin" ] && find . -type f -iname '*.apk' -print0 | while IFS="" read -r -d "" j; do IFS="$(printf '\nX')"; IFS="${IFS%X}"; echo "${j}: $("$aapt_bin" dump badging "$j" 2> /dev/null | egrep '^(application|package):' | sort | sed -r "s/.*((name|label)='[^']*').*/\1/" | tr '\n' ' ')"; done

android-apktool - tool for reverse engineering APK files

"It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc."

ThinkFree Office in Nexus phones

As it happens, the Document Viewer app in Google Galaxy Nexus phones is a read-only version of ThinkFree Office Mobile. Since this is a pre-packaged app, you cannot reinstall it from the Play Store once you uninstalled it. For that you've to back it up first. On a rooted phone you'll find the app in /system/app/Thinkfree.apk and to back it up you simply have to make a copy of the apk.

How to do a "thorough" fsck (with a progress bar) like the one that is done during boot

Since this is invoked by one of the startup scripts of your OS, the exact behaviour might be a bit different depending on the implementation of your OS (and the specific OS version, eg. Ubuntu had this feature in /etc/init.d/checkfs.sh for quite a long time, then moved it somewhere else). The point is that at some step of your boot process the fsck tool is started with a set of commandline parameters. Eg. Ubuntu Hardy executes something like this:
fsck -C -V -R -A -a -f

pvdisplay, pvresize and the "not usable" area

Let's assume you've an LVM2 physical volume on the /dev/sdb1 partition. The PE size is the usual 4MB (4194304 bytes) and the PV size displayed by pvdisplay is: 465.76 GiB / not usable 544.50 KiB. You take a look at how this space is distributed by running pvdisplay -m --units b /dev/sdb1 and get ...

How to turn your Android phone into a security analysis toolbox (via installing BackTrack)

Well, I should have known. Smile Once people start putting Ubuntu and whatever on their Android phones, there's no turning back. Wink A guy called Zachary Powell started making Android apps that help you install Ubuntu, Debian or BackTrack on your phone. I think the latter needs not too much of an introduction ... it's got pretty much most of the "security" tools that you might need to do a vulnerability scan of a LAN. Running BackTrack on your phone you can become a "secret agent", walking into a place and just "hack" (as in "run apps that do it for you") through your way to the target by pressing a button titled "upload virus" (note the movie reference Smile ). Of course as a possible side-effect you might find yourself pretty soon in jail. Wink So treat this idea as seriously as it was meant. Smile

Syndicate content