background preloader

Geek to Live: Mastering Wget

Geek to Live: Mastering Wget
Related:  Tech Tips / Learn

grep is a beautiful tool Global Regular Expression Print is a staple of every command-line user’s toolbox. As with find, it derives a lot of power from being combined with other tools and can increase your productivity significantly. Following is a simple tutorial that will help you realize the power of this simple and most useful command. If you are on Windows and haven’t already, download and install Cygwin. Tutorial Suppose we want to search for duplicate functions in all of our JavaScript files. Duplicate HTML IDsCheck how many times a CSS class is usedDuplicate java classesmany, many more… The above command will print the lines containing “function” in all JavaScript files in the current directory (NOT subdirectories). Depending on how you format your JavaScript files, something like this will omit comments, anonymous functions, and also words like “functionality” giving you better results. -o prints only the part that matches the regular expression. There we go! Other Examples Conclusion

Tech Know: Video Series Technology continues to advance day after day to become one of the most important aspects of a person's life. Get tips on tech and learn about choosing better equipment from eHow's Tech Know. Choosing an E-Book Reader A good E-Book reader will allow you to take not just your favorite book but your entire collection with you wherever you go. Get tips on choosing an E-Book reader with help from an expert in this free video clip. Take Better Smart Phone Photos Just because your smart phone has a great camera doesn't mean you can expect every last picture to come out perfect. Selecting a Cell Phone Plan That Meets Your Needs Choosing a cell phone plan that works for you requires careful consideration for both budget and features. What You Need in a Digital Camera Picking the right digital camera for you can be a tricky exercise. Get Online: Wireless Ways to Change Your Life Communications today require constant exchange of information between people at different locations instantaneously.

How a beautiful software system becomes Frankenstein “Ruin in community is not caused by witches with broomstick but it’s something that starts in people’s heads.” – Prof. Preobrazhensky (Michail Bulgakov’s “The heart of a dog”) The newborn software system looks beautiful inside after the few weeks of development. Several talented programmers put their souls together into this amazing software idea. But week after week the system become older and uglier. It could still look exciting for users, but the system rots inside. Three reasons There are hundred objective reasons why it could happen – complex technology, changing customer needs, management pressure, time to market and many more. Degradation of the system starts in the people heads and there are three main reasons: Incomprehension – don’t understand “I am so clever that sometimes I don’t understand a single word of what I am saying.” – Oscar Wilde Every person has limits for understanding: It is hard job to reach good understanding. Inarticulateness – cannot express Further complications

Fetchmail Sacred Cow Dung: All Things Web 2.0 - "THE LIST" « QUOTE OF THE WEEK: "Bad Code is Good Business" | Sacred Cow Dung Home | High-Performance Social Networking - Part II: The Natural Life-Cycle of a Personal Network » March 10, 2006 All Things Web 2.0 - "THE LIST" The most current listings are now available as a continuously updated Open Directory at “All Things Web 2.0 – The Directory” — cgm (08/16/06) Last night I was talking with Bob Stumpel who runs the Web 2.0 Group on OpenBC. Everything Web 2.0 by Bob Stumpel, et al 360yahoo - Blogging. [ The italicized entries are ones which I added or “fixed” — cgm ] Related Links Posted by cmayaud at 02:06 PM | Permalink| Comments (145) Del.icio.us Tagging | Digg This | Posted to COMtent | DIRECTORIES | LISTS | SOFTWARE IT | Web 2.0 Hi, I just wanted to respond to the category that Vyew.com is posted under. In fact, Vyew is a free, web-based collaboration site that provides a feature-rich meeting room with real-time, whiteboard functionality. Thanks, Fred Posted by: Fred Han at March 16, 2006 06:46 PM

Linux 101: Using chmod and chown When you use Linux long enough you are going to use the command line. Although nearly every command line trick can be done from a GUI front end now, there are times when the command line is the only route (headless server for example). When you have to go that route, you will be glad to have the fundamentals of the more important Linux commands under your belt. Installation? Not a bit. Chmod The chmod command allows you to change permissions on a file. chmod PERMISSIONS FILE Where PERMISSIONS is either the numeric or the alpha equivalent of the permissions you want to assign and FILE is the file (or folder) you want to effect. Since the numeric permissions are the easiest to understand (and use) let's look at that method. Remember, file permissions are in the form: OWNER | GROUP | All Others Each of those sections includes: Each permission (read, write, execute) is represented with the binary representation of the initial letter: r - 4w - 2x - 1 chmod 774 FILENAME Chown sudo chown jacob /opt/APP

How To Manage Your Startup Programs Easily, An Easy Way To Increase System Performance The best way to start your computer faster and improve the overall system performance is to reduce the number of programs that load when Windows start. Reducing the number of startup programs can help you in loading the Windows faster, saving RAM, and faster loading performance. Many people will be familiar with the way that requires installing and running Windows Defender, going to Tools > Software Explorer and from category selecting Startup Programs. Many people do not have Windows Defender and many don’t want to install it either. For Windows XP: Click Start and then Run, in the dialog box type msconfig and click OK. For Windows Vista: Click Start and in the search bar type Run and in the dialog box type msconfig and click OK. Now in the System Configuration click on the Startup tab and you will see the list of startup programs as shown below. You can uncheck any program that you feel you don’t need on Startup. After unchecking the programs that you don’t need, click OK.

After it happens, you need to make your plan. | ID-PROTECT.ORG Identity theft happens, now what? It’s time for your plan of attack. And this is not something you can put off until tomorrow. Close the accounts that you know, or think, have been tampered with. Notify your bank(s) in writing. Contact by phone every financial institution with whom you have a credit card and have them cancel those account numbers immediately and give you new ones. Next, contact the three consumer reporting companies: TransUnion, Equifax, and Experian to place a fraud alert on your credit reports, and order a free report from each of them for your review. The Federal Trade Commission should know about your identity theft to help law enforcement throughout the USA track down identity thieves. File a report with the police in the community where the identity theft took place. Last but not least, keep a paper trail!

squid : Optimising Web Delivery I want a Freeware Utility to ... 450+ common problems solved I want a Freeware Utility to ... 450+ common problems solved. Extremely useful free utilities that do specific jobs really well and save time and money. Open Source Software is listed separately. See : Open Source Freeware : 400+ free applications and utilities ; Please subscribe to our rss feed Also : I want Wordpress Plugin to ... 450+ solutions to blogging problems. Categories : Anti-Spyware / Anti-Virus / Anti-Rootkit | Audio / Music / MP3 / Real / Wav | Business / Office / Access / Excel / Word | Communication | Desktop | Editors / Notepad Replacements | Files and Folders | Financial | Graphics / Images / Photographs | Information / Fun / Misc | Internet | Keyboard | Performance / Recovery / System | Productivity | Programming | Uninstaller | Video / DVDs | Windows Explorer Replacements / Shell Extensions | Corrections Anti-Spyware/Anti-Virus/Anti-Rootkit Freeware Utilities : I want to ... Audio/Music/MP3/Real/Wav Freeware Utilities : I want to ... Corrections : I want to ...

Find is a beautiful tool I have blogged before that knowledge of command-line tools is essential to take the next step in programming productivity. I think it would be useful to provide simple tutorials for these powerful tools, starting with find. Tutorial If you’re on Windows, I would recommend installing Cygwin to bring the power of a real shell to your OS. Let us start with a simple example and build upon it: This will recurse all directories and list all CSS files (and directories ending with “.css”) under the current directory (represented by “.”). Now we will only match CSS files (case-sensitively). Here we combine find with grep using the -exec option, allowing us to do some processing on every match. We’re starting to get productive now, so let’s keep going. Gasp! Other Examples Conclusion By itself, find is only as good as say… Google Desktop. These are just some of the basic features of find.

Forty Ways To Free Up Disk Space By Bill Shadish Published in TechRepublic's Windows Support Professional (TechRepublic.com) You've probably heard the Paul Simon song "Fifty Ways to Leave Your Lover," which describes a number of tricks for breaking free from an undesired relationship. This article places a spin on the concepts used in that song. No, I can't guarantee that simply by reading this article you'll meet that special person. But This article will provide 40 ways to solve some common disk-space problems under Windows 9x and Windows NT. A simple lack of disk space is the most common disk-space problem. Figure A: Having no available disk space is a sad situation. On This Page What junk to go after Manually deleting unwanted programs Manually deleting unwanted files Manual file compression Controlling application parameters Disk compression Cleanup Defragmentation Conclusion What junk to go after You have several means of gaining back disk space on a Windows system. (5) *.bak—Backup files Cleanup

CdDvdBurning Writing data to write-able and re-write-able CDs and DVDs and Blu-Ray media is commonly referred to as "burning". This tutorial covers the default burning software provided with Ubuntu as well as command line burning. There are also alternative burning programs to consider such as xcdroast or k3b. For better results try the slowest burn speed reasonably possible. Most Gui tools have a "Properties" button to select speed but with Brasero those sorts of options appear after pressing the 1st "burn" button. Slower speeds ensure greater accuracy. This section covers using a GUI for burning. Burning ISO images For burning ISO images like the Ubuntu LiveCD using a GUI, please refer to the BurningIsoHowto page. Burning Files to CD or DVD Copying Discs and Other Advanced Operations You can copy CDs and DVDs, erase (blank) rewritable media and more with Brasero or GnomeBaker. Click Applications -> Sound and Video -> Brasero Create a new project when prompted. Blu-Ray Burning Creating an ISO image F.e.

Related: