Monday, October 5, 2009

Opera Mini on your PC/Laptop Part 2...

Sucessfully done! I have tested this on my desktop and laptop. I also have the instructions and requirements below. For more details, you can find it here on this blogsite JAVA in the Field

I use this with Suncellular network over socket proxy for free net browsing.



Requirements:
Get the Java SE Development Kit (JDK) from here.
Get the Sun Java Wireless Toolkit 2.5.2 for CLDC from here.
Get the "OperaMiniLargeDevice" for Sun Java Wireless Toolkit from here.

Get Opera Mini Browser 4.2 from here. Be sure to download both the JAD and the JAR to the same directory. The generic advanced version is recommended.
Internet access on the PC
Installation (done for Win XP):
Install the JDK.
Install the Wireless Toolkit.
Unzip your downloaded version of "OperaMiniLargeDevice" (simply extract it, a directory will be created automatically). Copy this directory to Path-to-WTk\wtklib\devices\ . The complete path to OMLD on my machine looks as follows: "C:\WTK2.5.2\wtklib\devices\OperaMiniLargeDevice1024x705".
Then choose "OperaMiniLargeDevice" as the default device, e.g. via "Start->All Programs->Sun WTK->Default Device Selection".
Then use "Start->All Programs->Sun WTK->Run MIDP Application" to start Opera Mini via its JAD file.
The start screen should appear and you should now be able to launch Opera Mini by pressing F2.

Remark:

It might be that you receive the following error on starting Opera Mini:

OTA server emulation started ...
HTTPS server emulation started ...
Error: Reason = 36

The most obvious reason for this error is that the "MIDlet-Jar-URL" in the JAD does not point to the right JAR file. Try to open the JAD with a text editor, locate the property "MIDlet-Jar-URL" and make sure that ONLY the filename of the JAR is left in this entry, e.g. MIDlet-Jar-URL: opera-mini-4.2.13918-advanced-de.jar . You must not use a complete URL to the JAR in the web. And do not forget to put the JAD and the JAR in the same directory.

Navigation:

You can set the link focus and scroll through a site with ARROW keys. The ENTER key selects an action, e.g. a text field. Texts can be entered with the normal keyboard keys. You can copy from and paste text into text fields by pressing STRG+c and STRG+v. The keys F1 and F2 control the menu actions of Opera Mini and the emulator, e.g. security questions for internet access. Since version 0.5 you can use your mouse to control Opera Mini and to click on links.

Hope you find this solution helpful. Any tips to improve this solution are welcome.

Greetings Makube

PS.:

Update to version 0.6 (see this post):
Shortcuts in Opera Mini usable
Speed dial in Opera Mini usable
Special version for netbooks and UMPCs like the Asus EEE or the HTC Shift available
Update to version 0.5 (Major update):
Screensize enlarged to 1200 x 705 from 1024x705
Mouse can be used to control Opera Mini and to click on links
Escape-key does not accidentially close the emulator anymore
Update to version 0.2:

I updated "OperaMiniLargeDevice" to version 0.2 because the first version triggered annoying keyRepeatEvents on some websites, resulting in not being able to focus links. Therefore the property keyRepeatEvents is now set to false. Happy browsing!

Sunday, October 4, 2009

Opera Mini on your PC/Laptop

I've been browsing frequent on my mobile smartphone using Opera Mini browser. I use it mainly for checking my emails, facebook, twitter, browsing stuff and blogging.
For suncellular network, I could browse free using socket proxy connection. I have thought if I could run this browser on my PC, I could be able to connect using that proxy to gain free internet connection.

Ok, google up... and then I find this microemulator running MIDP runtime for Win32. There several apps emulator/simulators just google it up. After having the emulator, I run the JAR/JAD file from opera download site. Then I have it able to run th browser on my PC.

I'll try to update this one. I have this link also from different technique (this is much better) http://java4me.blogspot.com/2008/02/run-opera-mini-on-pc-version-06-also.html

This blog post is done using the microemulator-2.0.3 and operamini 4.2 using socket proxy connection on suncellular network with 4pesos prepaid load. And take note that my 4pesos regular load is not debited. (Testing in progress....)

cyb3rc0n=>10/2009

Tuesday, September 1, 2009

Fun IT Pics

Firewall Security?

There are many creative ways that unscrupulous people use to access or abuse unprotected computers:

Remote login - When someone is able to connect to your computer and control it in some form. This can range from being able to view or access your files to actually running programs on your computer.

Application backdoors - Some programs have special features that allow for remote access. Others contain bugs that provide a backdoor, or hidden access, that provides some level of control of the program.

SMTP session hijacking - SMTP is the most common method of sending e-mail over the Internet. By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail (spam) to thousands of users. This is done quite often by redirecting the e-mail through the SMTP server of an unsuspecting host, making the actual sender of the spam difficult to trace.

Operating system bugs - Like applications, some operating systems have backdoors. Others provide remote access with insufficient security controls or have bugs that an experienced hacker can take advantage of.

Denial of service - You have probably heard this phrase used in news reports on the attacks on major Web sites. This type of attack is nearly impossible to counter. What happens is that the hacker sends a request to the server to connect to it. When the server responds with an acknowledgement and tries to establish a session, it cannot find the system that made the request. By inundating a server with these unanswerable session requests, a hacker causes the server to slow to a crawl or eventually crash.

E-mail bombs - An e-mail bomb is usually a personal attack. Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages.

Macros - To simplify complicated procedures, many applications allow you to create a script of commands that the application can run. This script is known as a macro. Hackers have taken advantage of this to create their own macros that, depending on the application, can destroy your data or crash your computer.

Viruses - Probably the most well-known threat is computer viruses. A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing all of your data.

Spam - Typically harmless but always annoying, spam is the electronic equivalent of junk mail. Spam can be dangerous though. Quite often it contains links to Web sites. Be careful of clicking on these because you may accidentally accept a cookie that provides a backdoor to your computer.

Redirect bombs - Hackers can use ICMP to change (redirect) the path information takes by sending it to a different router. This is one of the ways that a denial of service attack is set up.

Source routing - In most cases, the path a packet travels over the Internet (or any other network) is determined by the routers along that path. But the source providing the packet can arbitrarily specify the route that the packet should travel. Hackers sometimes take advantage of this to make information appear to come from a trusted source or even from inside the network! Most firewall products disable source routing by default.

Some of the items in the list above are hard, if not impossible, to filter using a firewall. While some firewalls offer virus protection, it is worth the investment to install anti-virus software on each computer. And, even though it is annoying, some spam is going to get through your firewall as long as you accept e-mail.



The level of security you establish will determine how many of these threats can be stopped by your firewall. The highest level of security would be to simply block everything. Obviously that defeats the purpose of having an Internet connection. But a common rule of thumb is to block everything, then begin to select what types of traffic you will allow. You can also restrict traffic that travels through the firewall so that only certain types of information, such as e-mail, can get through. This is a good rule for businesses that have an experienced network administrator that understands what the needs are and knows exactly what traffic to allow through. For most of us, it is probably better to work with the defaults provided by the firewall developer unless there is a specific reason to change it.

One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network. While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.

How Firewalls Work

If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall."

If you have a fast Internet connection into your home (either a DSL connection or a cable modem), you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.


Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. As you read through this article, you will learn more about firewalls, how they work and what kinds of threats they can protect you from.

Building a Wireless Network

If you already have several computers networked in your home, you can create a wireless network with a wireless access point. If you have several computers that are not networked, or if you want to replace your Ethernet network, you'll need a wireless router. This is a single unit that contains:

A port to connect to your cable or DSL modem
A router
An Ethernet hub
A firewall
A wireless access point
A wireless router allows you to use wireless signals or Ethernet cables to connect your computers to one another, to a printer and to the Internet. Most routers provide coverage for about 100 feet (30.5 meters) in all directions, although walls and doors can block the signal. If your home is very large, you can buy inexpensive range extenders or repeaters to increase your router's range.



A wireless router uses an antenna to send signals to wireless devices and a wire to send signals to the Internet.
As with wireless adapters, many routers can use more than one 802.11 standard. 802.11b routers are slightly less expensive, but because the standard is older, they're slower than 802.11a, 802.11g and 802.11n routers. Most people select the 802.11g option for its speed and reliability.

Once you plug in your router, it should start working at its default settings. Most routers let you use a Web interface to change your settings. You can select:

The name of the network, known as its service set identifier (SSID) -- The default setting is usually the manufacturer's name.
The channel that the router uses -- Most routers use channel 6 by default. If you live in an apartment and your neighbors are also using channel 6, you may experience interference. Switching to a different channel should eliminate the problem.
Your router's security options -- Many routers use a standard, publicly available sign-on, so it's a good idea to set your own username and password.
Security is an important part of a home wireless network, as well as public WiFi hotspots. If you set your router to create an open hotspot, anyone who has a wireless card will be able to use your signal. Most people would rather keep strangers out of their network, though. Doing so requires you to take a few security precautions.

It's also important to make sure your security precautions are current. The Wired Equivalency Privacy (WEP) security measure was once the standard for WAN security. The idea behind WEP was to create a wireless security platform that would make any wireless network as secure as a traditional wired network. But hackers discovered vulnerabilities in the WEP approach, and today it's easy to find applications and programs that can compromise a WAN running WEP security.

To keep your network private, you can use one of the following methods:

WiFi Protected Access (WPA) is a step up from WEP and is now part of the 802.11i wireless network security protocol. It uses temporal key integrity protocol (TKIP) encryption. As with WEP, WPA security involves signing on with a password. Most public hotspots are either open or use WPA or 128-bit WEP technology, though some still use the vulnerable WEP approach.

Media Access Control (MAC) address filtering is a little different from WEP or WPA. It doesn't use a password to authenticate users -- it uses a computer's physical hardware. Each computer has its own unique MAC address. MAC address filtering allows only machines with specific MAC addresses to access the network. You must specify which addresses are allowed when you set up your router. This method is very secure, but if you buy a new computer or if visitors to your home want to use your network, you'll need to add the new machines' MAC addresses to the list of approved addresses. The system isn't foolproof. A clever hacker can spoof a MAC address -- that is, copy a known MAC address to fool the network that the computer he or she is using belongs on the network.


Wireless networks are easy and inexpensive to set up, and most routers' Web interfaces are virtually self-explanatory. (source:HowStuffWorks)

Tuesday, August 25, 2009

Celluon LaserKey CL850 Bluetooth Laser Keyboard



Now compatible with BlackBerry OS 4.1 or above, Symbian, Palm OS, Windows Mobile 5 & 6 and Windows XP or higher.

This revolutionary mobile input device can be used as a mouse as well as a keyboard with its Bluetooth or USB interface. With a full-sized (19mm) standard QWERTY keyboard layout projected on any flat surface, you can use LaserKey CL850 anywhere you go, any time you want.

Projection Keyboard Specification

Interface: - USB v.1.1 (for PC) and Bluetooth (Microsoft Bluetooth Stack and Widcomm Bluetooth Stack)
Keyboard layout: - 19mm sized. Shortcuts: Internet Explorer, incoming e-mails, contacts, note, menu, pop up, mouse function depending on operating system
Detection rate: - Up to 400 characters per minute with automatic key repeat
Projection size: - Approx. 304 x 105 mm
Projection surface - Non-reflective, opaque flat surface
Ambient light: - 1000 – 5000Lux (day light according to DIN 5034-6) on an opaque flat surface
Keystroke Sound - Built in buzzer(Mute on/off the sound)
Power source: - Changeable lithium ion rechargeable battery or USB adaptor
Battery capacity: - Approximately 220min. Continuous use 450min. on standby mode
Dimensions: - Approx. 93 x 39 x 37 mm
Software compatibility: - Windows Mobile 5 & 6, BlackBerry OS 4.1 or above, Symbian or Windows XP or higher

Wednesday, August 19, 2009

GPRS / MMS Setting in Philippines (Globe, Sun,Smart and Red Mobile)






- for GLOBE
Connection Name: myGlobe Inet
APN: http.globe.com.ph
IP:203.177.91.131
Port: 80
Connection Name: myGlobe Connect
APN: http://www.globe.com.ph/
IP: 203.177.042.214
Port: 8080
Connection Name: myGlobe MMS
APN: mms.globe.com.ph
IP: 192.040.100.020
Port: 8080







- for SMART
Connection Name: SmartInternet
Access Point Name(APN):internet
Proxy Server Address(also referred as IP): 10.102.61.46
Proxy Port Number(Port in short): 8080

Connection Name: SmartGPRS
APN: smart1
IP: 10.102.61.46
Port: 8080

Connection Name: SmartMMS
APN: mms
IP: 10.102.61.46
Port: 8080










- for SUN
Connection Name: Sun INTERNET
APN: minternetIP:
nonePort: 0

Connection Name: Sun GPRS
APN: wap
IP: 202.138.159.78
Port: 8080

Connection Name: Sun MMS
APN: mms
IP: 202.138.159.78
Port: 8080












- for RED MOBILE
Connection Name: Redinternet
APN: redinternet
IP: nonePort: 0

Connection Name: Redmms
APN: redmms
IP: 10.138.3.35
Port: 8080

Friday, August 14, 2009

International Submarine Cable Systems

Laying a new cable system can often be a multi-year effort. From business opportunity recognition, to requirements definition, to landing zones, to contract, to cable construction, to implementation, to testing.....you get the idea. It can take a while.

A few companies specialize in undersea cable deployments. Alcatel-Lucent is one. Alcatel-Lucent provides a wide array of hardware, software, facilities, and services to carriers. Alcatel even maintains its own fleet of ships to maintain cable systems for customers. Surprising to think that a telecom company like Alcatel has a fleet of ships.

Companies such as Alcatel can be contracted with to deploy new undersea cable systems. Once the fiber is ready, Alcatel uses its ships to deploy the cable in essentially 6 steps:

Float the cable from the deployment ship to the shore to be connected to the landing station.
Disconnect the cable from the floating buoys and allow it to fall to the ocean floor, typically the continental shelf.
Use a Remote Operated Vehicle (ROV) - essentially an unmanned submarine - to bury the fiber optic cable under the ocean floor. This keeps the sharks, fishing boats, rock slides, and currents from affecting the cable. It also makes it harder for spy agencies - like the CIA, NSA, KGB and other agencies with TLAs - to find the cables and tap into them.
Continue across the ocean, adding repeaters where necessary. The ROV continues to bury the cable.
On the other side of the ocean, repeat step #1 - float the cable from the deployment ship to the shore to be connected to the landing station.
You now have an undersea fiber optic cable deployed. Alcatel has a very nice flash demo which shows this process.


Unfortunately, events often occur that cut undersea fiber optic cables. This can lead to massive outages, particularly in countries with limited and/or restricted Internet access. Carriers have gotten much better in the past few years dealing with undersea cable faults. Service restoration prioritization - for example, private MPLS services over general Internet - is done automatically now by optical mesh clouds based on standards such as GMPLS. Verizon often touts its optical mesh technology for undersea cable systems.

However, when a cable cut occurs, it has to be fixed. Fixing a cable cut is done with the same ships that laid the cable in the first place.