Get Windows Vista fonts in Windows XP!

Here’s a neat tip from the folks over at Lifehacker: if you’re still running Windows XP, but you’d like to get the fronts shipped with Windows Vista, all you need to do is download and install Microsoft’s free PowerPoint 2007 Viewer. This program will not only allow you to view PowerPoint 2007 documents, it’ll also add several of the Vista fonts to your system, which you can then use in Office 2003 programs. Of course, you can also get the fonts by installing Office 2007, which isn’t free, of course, but if you’ve been planning to upgrade, maybe this will be an extra incentive.

Finding a Remote MAC Address

It’s not often that you’ll need to know the MAC address of a networked device. Maybe you want to set up a MAC filter for your wireless network (which is pointless, since MAC addresses are sent in clear text, but I digress). Or maybe you want to set up QoS rules on your router. In any event, you need the MAC address for a device, but you just don’t want to walk all the way across the house to get it… or maybe the device is difficult to get to – perhaps locked away in a server room, and you don’t have a key.

All you need to do to get the remote IP address is to ping the device (Start > Run > CMD > ping [ip address]) and then run the ARP -A command at the command-prompt:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\jcofer>arp -a

Interface: 192.168.1.100 — 0x10003
Internet Address Physical Address Type

192.168.1.3 aa-fb-c8-34-da-7a dynamic

Windows will make a list of all the computers you have connected to recently. As you can see in the example above, my local IP address is 192.168.1.100. The only computer I’ve connected to lately was 192.168.1.3 – which has a MAC address of aa-fb-c8-34-da-7a.

COOL WP PLUG-IN: Sidebar Page Sections

WordPress comes with several interesting and helpful widgets built-in. A WordPress site owner can log in to the admin panel of his or her site and click on Presentation > Widgets and add, remove or reorder several available widgets. If you don’t want the “Categories” widget on your blog’s main page, simply drag it from the sidebar mockup to the “Available Widgets” bank at the bottom of the screen, and it will no longer appear in the sidebar. If you’d prefer to have the “Recent Comments” widget appear above the “Recent Posts” widget, simply drag the Comments post above the Posts widget, and they’ll be reordered the next time you load your home page.

Perhaps the handiest widgets are “text widgets”, which, despite their name, can contain HTML code. You see the pic of Arthur Guinness at the top of the sidebar? That was created with HTML code typed into a text widget. The WIMZI widget? HTML code that was copied from AOL’s site and pasted directly into another text widget. The “I’m listening to:” and “I’m reading:” widgets? Both are single lines of HTML code pasted into text widgets.

There are two problems with text widgets, however. The first is that WordPress doesn’t give you any way to give each widget a meaningful name, so you’re stuck with widget names like “Text 1”, “Text 2” and so on. Is the WIMZI widget “Text 5” or “Text 6”? The only way to know is to actually open the widget and look at the code inside. The other problem is that WordPress, by default, only allows you to have a maximum of 9 text widgets. This may seem like a lot, but once you start playing around with things, you just might find yourself bumping up against the maximum number.

The Sidebar Page Sections plug-in fixes both of these problems, albeit in a clumsy way. You install the plug-in the same way you install any plug-in. Then you click on Presentation > Sidebar Page Sections. You’ll see three text boxes on the page that opens: the first is marked “Title Tag”, the second is “Page Sections” and the last – the one we’re interested in – is called “Named Text Blocks”. Just type in the names you’d like to give each widget (one per line, please) and click “Save Options” when done. Then click the Widgets link, and you’ll see a bunch of new widgets in your “Available Widgets” bank. Unfortunately, there’s no way to automagically copy the text from the widget “Text 5” to your new “WIMZI” widget, so you’ll need to drag the “WIMZI” widget to the sidebar, open “Text 5”, copy the text therein, paste it into “WIMZI”, then drag “Text 5” back to the bank. Oh, and you’ll also need to repeat this for all your other widgets. Like I said, it’s not pretty, but it beats constantly opening “Text 4” to see which widget it is. Oh, and you can have as many “Named Text Blocks” as you’d like with this plug-in; the 9 widget limit does not apply.

The plug-in also has a nifty feature that allows you to gather WordPress pages into “groups” that only appear when certain conditions are met. For example, let’s say you have a “Cars” page on your blog where you talk about how much you love cars. You also have several “sub pages” for each make you like, such as “Chevy”, “Nissan” and “Toyota”. If you don’t want the “make pages” showing up in your main pages list, you can create a “sub group” and tell it to only appear on the “Cars” page. That way, your front page remains clean and the make pages only show up where appropriate. Note that I haven’t tested this functionality at all.

COOL PROGRAM: DriveImage XML

I’ve been using “disk imaging” software for just over 10 years now. Such software allows you to either move everything on your hard drive to a new disk (cloning) or make an image file of the contents, which you can then save as a backup or use to deploy the image to as many computers as you’d like. The advantages in every scenario are obvious. Simply doing a standard “file copy” within Windows can take forever, and if you’re trying to copy a system drive to a new disk, Windows will choke on the “in use” files and refuse to copy them. As a backup, imaging software copies everything on a disk; if you want to reformat your system you could easily copy all of your documents to a flash drive or CD\DVD… but chances are that you’ll forget at least one thing, and having an image of the drive means that you can always go back and retrieve that file later. And of course, imaging software is a must when a company wants to deploy lots of new computers. I once imaged almost 300 computers over a weekend for a client that was moving into a new building and got all new computers for staff. As you can imagine, manually installing Windows on nearly 300 computers would take weeks; installing Windows on one computer (along with Office and all the updates) and then copying the image to all the others took less than 3 days.

The only problem I have with imaging software is that I’ve never found a program that I really liked. I was a huge fan of Ghost when it first came out. It was a single, small executable file that could easily fit on a boot disk or network share. Symantec bought Ghost back in 1998 though, and Ghost kept getting bigger and bigger – until 2003, when Symantec bought PowerQuest, its biggest competitor in the disk imaging market. Symantec then tried hashing Ghost and PowerQuest’s DriveImage product together, and the result was, for a couple of years, a jumbled mess. I simply gave up and started using Acronis TrueImage, which was a somewhat new product at the time. Come to find out, True Image has always let me down when I needed it most. The boot discs froze when I attached a USB hard drive to my system. The boot discs also were very picky (a boot disk made with version 9.0.123 would think that a disk image created with 9.0.456 was “corrupt”, for instance). And TrueImage is as slow as Christmas! I tried using it in the field a couple of times, only to have the program’s progress bar give me “four hours remaining” on both jobs – on modern computers with no more than 12GB of disk space used!

I then decided to take a look at DriveImage XML. This program is free (unlike Ghost and TrueImage) and it stores your data in XML files, which are an open standard that third-parties can use to create plug-ins. And not only is it free and based on an open standard, it also leverages Microsoft’s Volume Shadow Copy service to copy files in use on your computer; rather than re-invent the wheel, the app uses the tools Microsoft builds in to Windows! This not only makes DriveImage small (the current version is less than 2MB to download), the program’s back up is reliable, too! The program is blazing fast too – I used it just a couple of days ago to back up a client’s computer, and it only took around 15 minutes to back up 8.7GB worth of data to a 5400rpm laptop drive in an USB 2.0 enclosure. But the best part – the best part – is that it’s included on the Ultimate Boot Disk for Windows. All you have to do to use DriveImage outside of Windows is attach a USB hard drive to your computer, boot off the Ultimate Boot CD and start the DriveImage plug-in. Compared to Ghost and TrueImage, I find this reliability and ease of use simply stunning.

DriveImage Browse
Browsing the contents of an image file

I’ve only recently started using DriveImage XML. I like it a lot so far – although the interface is a bit rough around the edges, and the program itself is really basic. The program is fully scriptable via Task Scheduler, so the admins out there will probably appreciate that.

I’ll keep you posted on how well it works when I need it!

COOL PROGRAM: Ultimate Boot CD

Windows Preinstallation Environment (WinPE) is a miniature version of Windows XP, Windows Server 2003 or Windows Vista. Originally developed to allow system builders and corporate clients to deploy new computers, it has since been embraced by third-party vendors (Symantec’s Ghost, for example, uses WinPE as its boot disk) and technical support people.

What it is, in a nutshell, is an improved version of the old DOS boot disk. In the old days, if you had some problem that prevented your computer from booting, you could stick a DOS diskette into your floppy drive and boot from that. You’d then be able to access your files, and hopefully fix whatever was wrong with the system. However, as the years have passed, the DOS boot disk developed some severe limitations. To begin with, DOS cannot natively access the NTFS file system, the file system of choice for Windows NT, Windows 2000, Windows XP and Windows Server 2003 installations. DOS cannot access files or partitions over a certain size. DOS does not support USB drives of any kind. Any applications used in DOS have to be recomplied with that operating system in mind. And DOS does not (and will not) support multitasking (running more than one program at once). In short, DOS is an ancient, albeit reliable, beast; someone somewhere had to come up with a better solution.

It turns out that guy was named Bart Lagerweij. Lagerweij was a minor Internet celebrity, making a name for himself by releasing several popular boot disks for DOS and putting them online for anyone to download. DOS supports networking, for example, but making a boot diskette that reliably connects to a network can be a huge pain in the neck. Lagerweij’s popular “Network Bootdisk” made creating boot diskettes with TCP\IP support a painless affair. In 2002, Lagerweij saw WinPE in action and knew the days of the DOS disk were numbered. The only trouble was that Microsoft only licensed the software for system builders and large corporate clients. Lagerweij went to work at deconstructing WinPE, and eventually figured out a way to make his own version using a standard Windows XP installation CD. And thus, BartPE was born.

The only problem with BartPE was that it wasn’t exactly user-friendly. Yours truly downloaded an early version of the “disk builder” program and eventually gave up – it was really difficult and since I had no pressing need for it, I didn’t want to waste my time on it. Wouldn’t it be better, I thought, if someone released a “ready to go” version of a BartPE disk?

Someone did. It’s called the Ultimate Boot CD for Windows. All you need to make your own boot CD is a copy of a Windows XP installation CD (preferably one with SP2 slipstreamed), a CD\DVD burner and a blank disk, and the Ultimate Boot CD application (available here). It’s so easy that every single step you need to take can be easily described (with screen shots!) on this page.

Once you’ve got your CD burned, you can boot directly into a 32-bit Windows environment. The Ultimate Boot CD comes with a galaxy of pre-installed programs – check out the full list here. Several “name brand” antivirus programs are included (such as McAfee Stinger, Kaspersky VRT and AVG Free), as are popular antispyware programs (AdAware, Spybot). Firefox, Irfanview, Notepad++ are included, as are popular disk burning applications like DeepBurner. Also included is my new favorite disk imaging program, DriveImage XML. Honestly, the list of programs included on the disk is huge; while BartPE gives you the ability to add just about any 32-bit Windows application to a boot disk, you need not bother with Ultimate Boot CD – just about anything you could want is already there.

And, unlike DOS boot disks, the Ultimate Boot CD comes with all the “modern conveniences”. As soon as you boot into the Windows-like desktop, you’re asked if you want to enable network support. Click “yes” if you want, and a simple box opens up that asks if you want a DHCP or static address. Choose an option, and since Ultimate Boot CD supports almost every modern network card, you have instant network access. Want to attach a USB device to dump an image? Just attach the drive and go!

Automating System Maintenance

Windows has some nifty built-in system maintenance tools. Disk Cleanup, for example, rids your hard drive of unneeded temporary files. Disk Defragmenter reorganizes your files for optimum system performance. Sadly, though, there’s not an easy “just click here” way to automate those utilities. That doesn’t mean, however, that you can’t automate those tasks:

Automating Disk Cleanup

You can make Disk Cleanup run as often as you’d like. It takes a little bit of work, although once it’s up and running, you don’t have to do anything else:

1) Click Start > Run

2) Type “cleanmgr.exe /sageset:50” (without the quotes) into the “Run:” box. Note that you can use any number between 0 and 65535 with the /sageset switch. I chose the number in my example (50) for simplicity reasons.

3) A window will appear that looks much like the standard Disk Cleanup screen. Choose which options you’d like Disk Cleanup to clean and then click “OK”.

4) Click Start > “Control Panel” > “Scheduled Tasks” > “Add Scheduled Task”.

5) Click “Next” (there will be a considerable delay between this step and the next).

6) You will be presented with an alphabetical list of most of the programs on your system. Scroll down and choose “Disk Cleanup”, then go on to the next step. If you don’t see “Disk Cleanup” listed, click “Browse” and navigate to the Windows\System32 folder and click on “cleanmgr.exe”.

7) Give the task a name and choose how often you’d like the task to run, then click “Next”.

8) Refine your time choices on the following screen, then click “Next”.

9) Enter the user name and password of the account you’d like the task to run under (usually this would be your own user name and password), then click “Next”.

10) Make sure that the “Open advanced properties for this when I click Finish” box is checked, then click “Finish”.

11) In the window that opens, look for the “Run:” box near the top of the screen. Type in “/sagerun:50” at the end of the run command, so that the complete text looks something like this:

C:\WINDOWS\system32\cleanmgr.exe /sagerun:50

12) Click “OK”. You be probably be prompted to enter your user name and password again; do this.

As you might guess, you can run the SAGESET option with different numbers to create multiple “profiles” for Disk Cleanup to use. For example, you might want to have Disk Cleanup clear out your Temporary Internet Files daily, but only do a “deep cleaning” once a week. In this case, you’d run SAGESET with one number (say, 50) and choose only the “Temporary Internet Files” option. You can then run SAGESET again with another number (say, 51) and choose to clean out all options. You’d then schedule one task to run daily with the /sagerun:50 option, and another task to run weekly with the /sagerun:51 option.

Continue reading “Automating System Maintenance”

Creating Files With No Name

It doesn’t happen that often, but there are times when you might need to create a file without a name. One example is an .htaccess file. It’s a plain text file used on web servers to (generally) control access to certain directories. For example, most smaller web sites (like this one) are hosted on “shared servers”, that is, a server that hosts multiple web sites on one machine. To keep other (legitimate) users of the server from accessing my files, my web host uses an .htaccess file to restrict access to my files to anyone with my user name and password. Likewise, I use an .htaccess file in my own site to keep people without a username and password from accessing certain “storage” directories.

The problem with creating or editing such files in Windows is that Windows hates files without a “proper” name. Windows wants a file called “filename.extension” (like notes.txt) and it just chokes when you want to create a file without a name like (.htaccess). So if you need to edit your .htaccess file on a Windows computer (or, for that matter, any “hidden file” on a Unix system, like .config), Windows usually pitches a fit and demands that you give the file a name.

To get around this, simply put the file name in quotes when you go to save it. For instance, in Notepad you’d click File > Save, then choose “All files” and enter “.htaccess” as the name… aaaaannnd presto! One .htaccess file created in Windows, without the hassle!

Geek Basics: RSS

“RSS” stands for “Really Simple Syndication”. RSS is a way for websites to “push” data out to their readers. The idea behind RSS is similar in concept to “email updates” you may choose to get from cnn.com or some other site. However, RSS works very differently under the hood. Whereas email updates can only be sent to a single email address, RSS has lots of nifty tricks that make it much more useful than a “CNN Headlines” email.

To understand how RSS works, you need to know that it all begins with a piece of software called an “RSS reader” or “RSS aggregator” (or just “aggregator” for short). In most cases, you’d need to download an RSS reader and install it on your system. Then you enter the names of the RSS feeds you want to subscribe to into the RSS reader. The software will then begin checking a specially formatted page on the website in question. The reader checks that page at a timed interval (usually 1 hour). Any new entries are then copied into your reader software, where you can read them at your leisure.

To put it in simple terms… Have you ever sat at a web page and constantly reloaded it? Maybe you were at ticketmaster.com waiting for concert tickets to go on sale… Maybe you were at fandango.com waiting for Star Wars tickets to go on sale… Maybe you were waiting for a news item to appear on your local TV station’s website… Whatever the case, you were at a site, refreshing the page every 30 seconds or so, waiting for new entires to appear. That’s exactly what an RSS reader does, only it does it automatically, behind the scenes, once an hour (or sooner, if you set that option). The web page that the RSS reader is loading is specially formatted, and when the reader finds a new entry, it copies it to your computer so that you can read it.

Here’s where RSS gets interesting.

First of all, there are several ways to get feeds. If you’d prefer using a standalone program to read feeds, you can download a free program like RSS Bandit or SharpReader. If you’re a big user of Microsoft Outlook, you can upgrade to Office 2007 (which has an integrated RSS reader), or you can install NewsGator, a free plug-in for Outlook 2000\2003 that integrates feeds into Outlook. If you use lots of different computers during the day, you might want to look in to online RSS readers like Google Reader; instead of downloading new feeds to your desktop computer, Google Reader downloads then to your Google Account, so you can check the feeds from multiple computers – just like web mail.

Continue reading “Geek Basics: RSS”

Be a DJ!

Have you ever wanted to be a DJ? Does the thought of having your own radio station make you feel all warm and fuzzy inside? If so, you’re in luck! There’s this new invention called “the Internet” that allows you to (among other things) broadcast your favorite tunes all day long if you wish! So if you’ve ever felt the jones to be your own broadcaster, check out this article! You’d be amazed at how easy is really is to set up your own Internet radio station.

Here’s what you need to get started:

• The latest version of WinAMP
• The Shoutcast DSP plug-in for WinAMP
• Shoutcast Server
• A stable Windows-based computer
• A broadband Internet connection

The Big Picture

WinAMP was the first MP3 player for the Windows platform. Although it has expanded over the years to include library functions and the ability to play videos, at its core WinAMP is still just a basic MP3 player.

Shoutcast Server was developed by the same people that made WinAMP. Shoutcast is a streaming audio server. It provides audio streams to listeners. Shoutcast server is available for Windows 9x, Windows NT, Windows 2000\2003, Windows XP, Windows Vista, Mac OS X, FreeBSD, Linux and Solaris.

The Shoutcast plug-in for WinAMP connects the output of WinAMP to the input of the Shoutcast server. It takes whatever is playing in WinAMP, converts it to the appropriate bitrate and\or format, then forwards it on to the Shoutcast server. The Shoutcast server then sends this input out to listeners as a stream of data. The Shoutcast plug-in is also where you enter the name of your station or show and any contact information you’d like to add.

Getting It All Set Up

If you’ve never used WinAMP before, download and install it, then spend a couple of days getting familiar with it. You will especially need to be familiar with the playlist functions, as this is how you’re going to get started as a DJ. Basically, an Internet radio station is just a giant playlist of songs. You’ll need to be able to assemble such a playlist on your computer. The playlist can be as long as you want – in fact, it will need to be several days long if you want to have a full-time station, although it can also be just a few hours long if you want to do brief “shows” instead of broadcasting full-time. Also, note how to save your playlists (click LIST OPTS > SAVE LIST in the playlist window). This is important, since you’ll be tweaking several things during the setup process, and there’s the distinct possibility that you might accidentally erase a playlist you’ve spent hours putting together. It’s just better to be safe than sorry, right?

After you’ve gotten acquainted with WinAMP (or if you’re already familiar with WinAMP), you need to do the next step, which is installing the Shoutcast plug-in for WinAMP. Assuming that you’ve already got WinAMP up and running on our system, click here to download the plug-in. Installation should be simple – in most cases, the plug-in installer will detect where WinAMP is installed on your system and it will then install the plug-in in the correct location. So, for most of you, installing the plug-in will means double-clicking on the plug-in installer file, then clicking Next > Next > Finish.

The final step is to install the Shoutcast server. In most cases, you’ll want to install Shoutcast on the same computer that runs WinAMP. However, there may be circumstances where you’d want to install Shoutcast on a different computer. And the reason why you’d want to do that is really important when it comes to broadcasting.

Continue reading “Be a DJ!”

Jim’s Guide to Wireless Security

My Dad has a saying about padlocks: “they only keep the honest people out“. His point, of course, is that honest people will see a padlock and keep walking, while a hardcore thief will simply smash the hasp, take the hinges off the door, or shatter a window to break into your house and steal your stuff. I’m sometimes asked what the best way is to secure a wireless network, and when I think about the subject I often think of Dad’s wisdom. Most of the “security measures” in wireless networking only keep the honest people out. Dedicated hackers can find a way to hack in to your network if they choose. So here’s my complete guide to securing a wireless network:

Pick WPA security, and choose a very complex password for it.

Yep, that’s it. My entire guide to wireless security. But since you might ask about some of the other security features available on wireless routers, here’s a point-by-point rebuttal on each one:

Disabling the SSID: Every wireless router has the ability to broadcast its name, or SSID (Service Set IDentifier). Disabling SSID broadcasting means that your wireless network won’t appear in the list of “Available Wireless Networks” on any nearby computer. Theoretically, this makes your network more secure. Since your neighbors won’t be able to see your network, how could they connect to it? Unfortunately, disabling the SSID does nothing to hide your wireless network from hackers using programs that scan the airwaves for wireless networks. In fact, it makes it look like you’ve got something to hide, much like putting an expensive purchase in the back of a hatchback and covering it with a blanket does. Additionally, disabling SSID broadcasting makes it harder to troubleshoot connection problems, and also makes it difficult for your guests to connect to your wireless network. Using WPA with a complex password means your neighbors can see your network, but they can’t access it. And hackers will find your network one way or the other, so let them find yours easily, try to hack it and fail, and move on to the next network.

Changing the SSID: This is actually a good one to do. Most wireless routers have their manufacturer’s name as the SSID by default. If you’ve ever used a wireless network, you’ve almost certainly seen a wireless network called “linksys” at some point or the other. Changing the SSID to something nondescript tells hackers that you’ve at least thought about security enough to do this step. Much like how the automobile security device The Club worked simply by making car thieves move on to another car, changing your SSID just might be enough to make hackers move on to the “linksys” networks.

Enabling MAC filtering: Every networked device – wireless or not – has a unique serial number called a Media Access Control (MAC) address. Most wireless routers have a feature that allows you to enter the MAC addresses of every device you want to connect to the wireless network. So, in theory, only devices that you explicitly approve can connect to your wireless network. The reality is that any hacker that scans your network can find the MAC address of one (or all) of your devices. He or she can then “spoof” the MAC address on their own computer and get full access to your network. Filtering MAC addresses also means that you’ll have to obtain the 12-digit MAC address from any guest that wants to use your network, then enter it into your router’s configuration page. Which is no fun, especially when there’s almost zero payoff from this “security measure” in the first place. Seriously folks – MAC sniffing and spoofing is so easy to do that it’s almost laughable.

Continue reading “Jim’s Guide to Wireless Security”