Over the last couple of months I have been doing a lot of work with Cordova and the Ionic Framework creating my field guide of NSW Marine Life for the Android platform. When I started out working with Android my work flow was pretty simple: Make the required changes to the application code Test in a browser using the simple web server provided with Python package Use Cordova build command to build an apk package for testing on an actual Android device Push the compiled package to the test device using adb to install the package on a device with developer model enable Over time as my familiarity with the Android tool chain progressed. I found the Android Debug Bridge ( adb ) tool that makes up part of the Android SDK has a lot more to offer. Below are some of handy tips I have found with adb that can make a developers life a little bit easier. Continue reading “Android Debug Bridge Tricks” »
Anyone that has run a server for any length of time quickly learns that the Internet is full of spammers, bots and other characters you would prefer didn’t exist. A firewall is key to keeping these guys out and Linux comes with a Kernel level firewall called iptables that can be employed for this purpose. The only downside of iptables is that people who don’t deal with it on a regular basis tend to find its syntax a little bit daunting. In this post I am going to run you through the process of setting up a basic firewall IP blacklist. Using a bash script to read an blacklist of IP addresses and feeding these to iptables so they can no longer access your server. First up create decide where you would like the script to live. for this example I am just going to put it in /root/scripts. i.e mkdir /root/scripts nano firewall.sh Continue reading “Simple Iptables Blacklist” »
An SSH tunnel is used to route unencrypted traffic through an encrypted SSH channel. Its comes in handy for routing traffic over untrusted or hostile networks as the data is encrypted to maintain privacy and prevent eavesdropping. It is also very handy in for bypassing firewall restrictions where the usage of certain services are restricted. [...]
VocusPR has a dubious reputation their main line of work is aggregating the contact details of journalists and bloggers and then selling access to that database so companies can contact them. Press releases from Vocus customers come with the required "unsubscribe" link down the bottom but the catch is clicking it will only stops the [...]
Time to start getting excited the next release of Ubuntu is almost here!
A major problem with developing AJAX applications is trying to follow data flowing back and forth between the server and client and the changes being made to the DOM.
If you have ever done any freelancing or run your own business you have no doubt come across clients like this. For some reason they won't pay full fare but want full service and will hound you relentlessly for not allowing them to screw you over if you try and walk away!
I have had my ipod touch (2.2.1 firmware) now for almost two months and i have found it to be a great little gadget. Although i have continually been annoyed Apple's efforts to cripple the applications available through the itunes app store eg no last.fm scrobbling, having to sync to itunes to retrieved episodes of subscribed podcasts.
The Pirate Party in Sweden seems to be making waves after four men where found guilly of helping run the infamous bit torrent tracker site known as The Pirate bay.