background preloader

Future proof » Tim’s laptop service manuals

Future proof » Tim’s laptop service manuals
Have you come to this webpage looking for Toshiba laptop service manuals? Please read this. Introduction In the same vein as in my driver guide, I’ve started finding laptop service manuals and hosting them on my site. They generally detail the exact list of parts in each model of laptop – often down to individual screws, if you happen to have lost some and need to know the exact size for a replacement – and describe the procedure for disassembling and reassembling the entire machine, including panels, RAM, wireless cards, keyboards and touchpads and LCD screens, all the way down to the motherboard itself. They’re difficult to find – you have to know where to look in their support site, or come up with the right Google search string, or beg and steal from someone you know in the industry. This page, and indeed my whole site, has no ads. Practical stuff Firstly, I do not claim ownership, authority or copyright of anything here on this page. Organisation Some of these files are quite large. Related:  PC Tips

Visual Cryptography What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images. One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. In the table on the right we can see that a pixel, divided into four parts, can have six different states.If a pixel on layer 1 has a given state, the pixel on layer 2 may have one of two states: identical or inverted to the pixel of layer 1. We can now create the two layers. Additional information

Win 7 DoS by RA Packets Added 9-15-2011: Win 8 Developer Preview is also vulnerable Added 5-30-2011: RA Guard Evasion Added 5-29-2011: FreeBSD is also vulnerable! Executive Summary This is extremely dangerous! A student recorded this video, which makes it easier for people to quickly see the importance of the Windows IPv6 Router Advertisement vulnerability, without bothering with the technical details. Imagine the effect of a single attacker on a small business, Internet coffeehouse, or any other LAN. Suppose someone writes this into a malicious Web attack, so everyone who views a malicious Web page instantly kills all the machines on their LAN! As far as I know, this attack will not traverse routers, so it "only" affects your local broadcast domain. Responsible Disclosure I regarded this as too dangerous to discuss on the Internet, and sent it to Microsoft privately. Excellent advisory from Marc Heuse* with complete disclosure timeline CVE-2010-4669 - Router Advertisements Cause DoS in Windows Mitigation The Attack

Inside my laptop The making of an action hero body - Entertainment - Movies When I was hired to train an actor for an action film, the studio executives would express how important it was to transform their body so they looked like an action hero. That's why I made the decision to utilize the same method of dieting and training I used to win many of my champion body building competitions. Matt Damon and Kevin Spacey were extremely excited to work with me, which made my job a lot easier than it had been with some of my other celebrity clients. I have the actors do weight training in the morning and cardio at night. The purpose of separating the weight training and cardiovascular training for 6 to 9 hours is because weight training causes the body to secrete anabolic hormones (muscle building) and cardiovascular exercises cause the body to secrete catabolic hormones (fat burning). This way my client got the most effective results from their workouts and fast results. WEIGHT TRAINING SESSION(* — increase weight each set) Wednesday – Rest Day

New cool list of Linux must-have programs Update: A new, up-to-date collection is available. Please take a look! It's been approximately two years since I've written the first article, A (cool) list of Linux tools. Since, a lot has changed. Changes from the last time Like the last time, the programs will be sorted by categories. Games I will not be listing games here. Users' recommendations Likewise, there's a users' recommendation sub-section, so you can send me your suggestions and ideas. Table of Contents: Backup software File backup software Unison Unison is a simple, lightweight backup program. TimeVault TimeVault is a snapshot software, which, when activated will create copies of all files and folders that change, retained a detailed archive of all revisions. Imaging software CloneZilla CloneZilla is a fast, light imaging software that runs from a CD. Mondo & Mindi Mondo is a text-driven system backup & restore utility. PartImage PartImage is another powerful imaging software. Remastersys remaster-on-the-fly Browsers Firefox IEs4Linux

30 Fantastic Geeky Tricks to Get The Most From Your Mac If you’re one of those Mac users that loves to dig in and play with hidden features and settings, this post is for you. Below you’ll find 30 tips and tricks to help both seasoned and beginner Mac users to get the most out of their OS X experience. We’ll cover everything from obscure Terminal commands to keyboard shortcuts that every Mac user should know and use. Dock Tricks Recent Items Stack Stacks are quite the handy addition to your Mac’s dock and the good people at Mac OS X Hints figured out a way to make them even more useful by creating a stack that automatically contains your most recent applications. These can of course be found under the Apple menu as well but it’s much more convenient to have them right in the dock. Recent Items Stack To accomplish this feat, simply copy and paste the line below into Terminal. defaults write com.apple.dock persistent-others -array-add '{ "tile-data" = { "list-type" = 1; }; "tile-type" = "recents-tile"; }' Stacks List View Stacks List View Stationery

Jesses Entraide The Complexity of the Creative Personality | The Creative Mind - StumbleUpon Researcher Mihaly Csikszentmihalyi includes in his books and other writings descriptions of the diversity and multiple characteristics of creative people. In a post of hers, Juliet Bruce, Ph.D. notes that Mihaly Csikszentmihalyi (pronounced me-high chick-sent-me-high-ee) wrote, “If there is one word that makes creative people different from others, it is the word complexity. Instead of being an individual, they are a multitude.” “Like the color white that includes all colors, they tend to bring together the entire range of human possibilities within themselves. Here are a few qualities he lists, as Bruce summarizes: A great deal of physical energy alternating with a great need for quiet and rest.Highly sexual, yet often celibate, especially when working.Smart and naïve at the same time. Do you relate to any of these qualities? One of these intriguing areas is androgyny. The photo is actor Tilda Swinton, at the 2008 Oscars, where she won for her role in “Michael Clayton.”

Related: