Showing posts with label IT. Show all posts
Showing posts with label IT. Show all posts

Saturday, October 19, 2013

unlock network blocked dongles to use any sim card from any operator using linux

Do you have any dongle bought from any operator who blocked the dongle to the particular operator/network?

sinhala translation is available at ලිනක්ස් මගින් ඩොංගල් අන්ලොක් කරමු.

if you are in a hurry and don't like to read the whole article, simply go to the bottom of the article to know how the dongle could be unlocked.

Reasons to network/operator block the dongle from using the SIM cards from other operators.
  • To stop using a sim card from another operator who is a competitor of the operator
  • to keep the customer with one operator. it will help to earn more money while keeping the customer with the particular operator. 
  • customer can't switch to another operator with the network blocked dongle because the dongle doesn't accept the sim card from any new operator than the network blocked operator.

Reasons to unlock the dongle
  • to switch to a new operator because the new operator would provide more efficient and economical packages to the customer
  • coverage/signal problems to some places of the country. 
  • customer service of the operator is unsatisfactory
Be careful
  • most of the dongles comes with a warranty for some period of time. that warranty would be avoid if the dongle is unlocked.
  • if the dongle is provided at low cost or on an agreement with the operator, it would be violating the agreement with the operator. sometimes some operators provide the dongles with the packages with the agreements. so, unlocking or using another sim card or package form another operator could be illegal. 
  • user will have to pay for the dongle if canceling the agreement.
After all you would need to switch to another operator due to any reason and if you had to buy another dongle to be used with the new operator, never buy an another dongle, try to use the old dongle while buying a suitable broadband or 3g plan from the new operator. don't throw out the old network blocked dongle because it would cost your hard earn money and would pollute the environment.

I'm using a linux (openSuse) operating system in my Laptop and I encourage other to use Linux on their computers. My dongle had cost me a sum of LKR 7829.99 on December 2009 (with one year warranty) without any plan or agreement but it has blocked to a mobile network operator from using another sim from other operators. Still I'm satisfied with the network but I needed to unlock the dongle for a fun because I needed to know is it could be done by my own.



Now I would explain how to unlock the network blocked dongle to be used with another operator.

First of all you need to know the IMEI number of your dongle. then you could find the unlock code using a web site in the internet. I used a web site on this url to get the unlock code for my dongle. ( http://www.mapmyplace.com/calc/ )

then I installed "minicom" to unlock the dongle using my laptop.
simply the linux package manager helps to install the "minicom" using the graphical way. but there's the text mode as well.

on ubuntu or debian based systems open the terminal and type
sudo apt-get install minicom

on redhat or fedora based systems (yum installer) open the terminal and type
su yum install minicom

on redhat or fedora based systems (yum installer) open the terminal and type
su zypper install minicom

then we need to find the place which the dongle is mounted. most of the cases ttyUSB0 will be the place which identifies the dongle.
use 
  • "tail -f /var/log/syslog" on debian based systems or 
  • "tail -f /var/log/messages" on rpm based systems 
as superuser/su to check whether the ttyUSB0 is the port which dongle attached. unplug and plug the dongle after running the command to find the port easily.

open the "terminal"
log in as root/super user using "sudo" (debian/ubuntu) or "su" (rpm) in terminal

type
minicom -s

will open a window like




then select "serial port setup"


type "A" in front of the "Change which setting?" to change the port attached the dongle
change /dev/ttyS1 to the port which your dongle is attached. /dev/ttyUSB0 is for mine



type "E" in front of the "Change which setting?" to change the Bps/Par/Bits

type "C" in front of "Choice, or <enter> to exit. it will select 9600 for current speed.
press "enter" to exit from the menu

then it will show a window like



Press "esc" to go to previous/main menu

select "modem and dialing"

it will initialize the modem. don't worry any message didn't come. then select exit from main menu





then the window will go off and will show command line to unlock the dongle
then type the command to unlock the dongle.



AT^CARDLOCK="12345678"

command should be in capital/uppercase letters and the 12345678 should be replaced with the code you got for the IMEI  of your dongle. unlock code should be within double quotes " and ". then press enter to continue.
it should show a message like "OK" or something if you done properly.

AT^CARDLOCK="12345678"     
OK                                              


you've done.

then insert SIM card (from previously blocked operator) in to the dongle and use it.


thank you Girobiro's blog for the article about "Unlock 3G USB Dongles in Linux" helping me to get an idea how to unlock my dongle.






Thursday, February 25, 2010

effectiveness & efficiency and the use of them

1. Discuss the difference between effectiveness & efficiency with suitable examples.

In management terms, efficiency is "doing things right" and effectiveness is doing the right things"

Effectiveness relates the input or the output to the final objectives to be achieved (the outcome)

  • efficiency=quality/Input quantity
  • Effectiveness=objectives/Input Quantity

In management, effectiveness relates to getting the right things done. Peter Drucker reminds us that effectiveness is an important discipline which “can be learned and must be earned.”

The effectiveness is more difficult to assess than efficiency, since the outcome is influenced political choice. The effectiveness shows the success of the resources used in achieving the objectives set.

Example:
When deploying a transport service, efficiency and effectiveness both comes together to complete the task successfully. In this scenario, effectiveness could be identified by "buying/hiring" vehicles. It means the management should understand the use of the vehicles before buy/hire them. If the management buy wrong type of vehicles to use them for transport service, will lead to bankrupt because some vehicles will not meet the requirements well and will not provide the service which has expected. Some vehicles will not enough for passengers and will make to hire more vehicles. Then it will lead to increase the staff and will make more expenses (vehicle expenses/ salaries to the staff)
Then shall we talk about the efficiency. If the transport service provide the services at unneeded times that less number of passengers using the service, the service will not make profits. So, using a timetable is a must when thinking about the efficiency. It means "doing things right".


2. Which is more important for performance? and Can managers improve both simultaneously?

Efficiency and effectiveness both comes together because both of them are connected to each other. We can't think about the effectiveness without efficiency and we can't think about the efficiency without effectiveness.

Efficiency alone will put the company on the fast track to bankrupt .

Effectiveness (efficacy) alone *may * allow the company to survive. How ever the company will not reach it's maximum potential if it is inefficient.

  • Low Efficiency / High Effectiveness
    • there is a right goal, but less/poor usage of resources. (leads to expansive result)
  • High Efficiency / Low Effectiveness
    • Inappropriate goals but right usage of resources. (leads to deliver unwanted products at lower price)
  • Low Efficiency / Low Effectiveness
    • Works on a wrong target and less/poor usage of resources. (leads to deliver expensive, unwanted products)

  • High Efficiency /High Effectiveness
    • Works on a Right goal using right resources in a right way. (delivers good/useful products at affordable price)

So, effectiveness & efficiency relates to each other by connecting inputs, outputs and outcomes.

Programming best practices

good programming practices 
using best practices when developing a program/project will help to make successful product without bugs. here are some best practices which needs to follow when developing a project.


Omit needless codes

Needless codes will make the codes unreadable and hard to understand. It will make hard to find the errors when any error has occur. Needless codes will add “lines of code” to the project and will support to earn more money to the developer. But when he/she needs to troubleshoot, needless codes will make hard to find the errors. Sometimes the needless codes will make some critical/hard to identify errors.

Identify duplicate codes
Identifying duplicate codes will helps to remove unnecessary “lines of codes” and will ease the debugging process. Editing the same code at several places will waste some time and delays the deployment of the project. So, it's better if the developer could identify duplicate codes and use that particular code at one place and linking that code to everyplace that needed. It will ease the editing/debugging process because developer no need to find everyplace to edit/debug and editing/debugging a single place will affects to the everyplace which the code is linked.

Using less number of “lines of codes”
When lines of code increased , the project will become large/heavy in size and hard to troubleshoot. So,the developer should use less number of “lines of codes”. Then the project will be smaller in size and will ease the troubleshooting process.

Commenting the codes
When developing a project, it's better if the developer could “comment” the every part of the program. It will helps to identify the usage of that particular “lines of code” and will ease the management/troubleshooting/update process of the program at later time.

Plan Development Process/Life-cycle
Planning the development process/life-cycle helps to determine every part of the development according to a structured plan. Then developer will not forget to do something important on his/her development process.

Plan the time line
Planning the time line will help to identify every work which have to do according to the time and developer could identify what should do in particular day and he/she could predict the development process according to the time.

Gathering Requirements.
Gathering requirements helps to develop the exact program which needs to built. If not programmer will end up with missing some requirements and will be unsuccessful. If the programmer didn't develop the program to fulfill the needs/requirements then developing the program will be useless.

Design
Selecting a suitable design will ease to use program by the user.

Coding separate parts and integrate them in to the main program.
It will ease troubleshoot and testing process as well as the coding process.

Testing
Without testing the developer can't identify the errors. If the developer didn't test his/her codes till the end of the development process, when he/she find any error will make him to edit/code many “lines of code” and it will make many errors. Editing many “lines of code” at the last time will make the programmer unsuccessful.

Performance testing
programmer should develop the program to give the actual performance to the user. So, performance testing will help to identify the missing parts and several errors which leads to minimize the performance.

Deployment
This is the last stage of the development process. This is the stage that user gets the project. Sometimes it will be failed due to some reasons and if it failed , user can't use the project as expected. Before deployment, developer should check a “deployment checklist” to ensure that user could use the product as expected.

System operations and support
There should be a method to identify errors when running the program. So, if there is a method to collect/identify the errors/bugs when running the program will be ease the work of “debugging”

Data migration
It's better if the program could support to the files/data which used in older/other programs. It will help to save the time to enter data into the new program because if there is an older program, user could use the data which associated with that old program inside the new program.

Project Management
Project management is the main part of the development process and it ensures that the existence programming best practices and follows the best practices.


Measuring success
checking the final project meets the industry standards.


Source:
Best practices for software development projects
http://www.ibm.com/developerworks/websphere/library/techarticles/0306_perks/perks2.html
Accessed on 02/24/2010 07:16 AM

Wednesday, February 10, 2010

Pros and Cons of the HTML

this is an another post of mine for our LMS-forum...

HTML stands for "Hyper Text Markup Language" and it's widely spread all around the web.

there are many advantages of HTML and I think there aren't too many disadvantages.

Advantages

  • We can use HTML mixed with scripting languages like JavaScript.
  • HTML is easier to learn (for me)
  • HTML could be read using many programs like email clients, web browsers and many.
  • Runs on the client side. So, we could view the source using a web-browser.
  • Universal, versatile and free to use.
  • Supports to multiple platforms. ( doesn't matter if that HTML page was created using a Windows PC or a MAC, that page runs well on Linux as well.)
  • Could be read using even a text mode web-browser.
  • Easy to read by the Search Engines.
  • Many scripting languages like php needed to use HTML. (when creating forms using php we couldn't do it using just php and HTML helps to the scene to make easier the creation of the form)
  • No need to install anything in to the client PC although it runs in the client side.
  • Lightweight. (html pages are consists from texts and because of that reason the pages are very small in size)so it's easy to upload and download. (in to the server and from the server)
Disadvantages ( I think there aren't too many disadvantages of HTML)
  • HTML is far behind than other languages because it's "Static" language.
  • Couldn't used for Database connectivity.
  • Couldn't create Dynamic pages using just HTML only. need to mix some other scripting languages with it to create dynamic pages.
  • Lack of security. But it doesn't matter because other scripting languages help it and never used (HTML only) for any secure web pages.
  • need to create several pages when distributing. It means there will be several/many files. (we could distribute as one file for everything when using a programming language)

Wednesday, January 27, 2010

The future computer in 10 years of time

Here is a article which I have written for a discussion forum of our BIT website.

Question:
 

Imagine that you need to order a computer in 10 years time for your personal use. What type of a computer would you expect to have by then. If you see it different from the current PCs, just indicate why you foresee such a change.


Answer:


I think the computers in 10 years of time will be very different than now. People will think about the protection of their data and availability of data. So, people will prefer to use “on line storage” than storing the files on a Hard disk drive. So, no need to use hard disks with high memory capacity. So, manufacturers will make computers without a hard disk. Most of the time, computer will be having only a “web browser” and all the softwares will be installed in the Internet. (currently google tries to do so and “Chrome-OS” will be play more role on it) Then no need to pay for the operating system and softwares because a flat rate of subscription will provide every software needs. What it means is the Internet will be essential to day to day life. So, ever computer will be having inbuilt “High speed data devices” to access to the Internet.

As a result of people live in a very busy, and communication world, people will use “Laptop” computers than now. It will help them to live their mobile life very easily. Manufacturers will make more powerful laptop computers with low weight to easily carry everywhere. “Nuclear cell” batteries will be provide more accurate electricity/current for a long time.

Now, it's not a fiction a computer without a keyboard because Apple Inc has announced a model of a computer without a keyboard. User could type using an “on-screen keyboard” from the movement of his/her eyes. Then no need to type by hand. Then the computer will only be a Screen. By 10 years time, the computer monitor will be a thin paper which could keep inside the pocket.

Artificial intelligence is the main idea of the 5th generation computers. By 10 years of time people will be able to use computer by Voice. Then no need to type anymore and people who blind could use a computer without any difficulties. People could spend their time by talking with the computer when they are lonely. Computer will be provide advices to the user when needed.

Sunday, November 1, 2009

who is “hacker” and who is “cracker” ?

Sinhala unicode version of this article also available.


hacker is a famous word in the computer field. Cracker also a famous word but not as famous as the word hacker.

Before we see about hacker, we'll see about the cracker. Cracker is a well knowledgeable programmer who develops programs to computers. Every time he is a good person and there isn't any harm to a computer from him. But many people misidentify him as a hacker. The truth is Cracker isn't a hacker and he never hack a computer.

Now it's time to see about hacker.

There are three types of hackers “White hat hacker” , “Black hat hacker” and “Grey hat hacker”.

White hat hacker” is the person who cares about the “security of the computer system”. He always try to find errors in the system and solve the problems to prove the security. Most companies hire them to check the security vulnerabilities in their networks and computer systems. They never do any illegal work which harmful to the system , to data or people.

Black hat hacker” is the worst person who enters tries to steal something from any computer or network. He is a bads person. He is a threat to data, privacy and computer systems. They use the data which they got by hacking to earn money. They know which they do is illegal. Because of their illegal work, they always caught to the “law” and “be in the jail” for many times.

Grey hat hacker” also a person who is very knowledgeable and try to improve the security of the system. But when he thought or got the chance he do what “Black hat hacker” does. So, “Grey hat hacker” is the person who is in between “White hat hacker” and “Black hat hacker”. Because of their illegal work, they also caught to the “law” and “be in the jail” for many times.


We are in a Global village, which connected by communication. So, data is valuable to every one. Many people like to learn how to hack because it helps them to secure them from hackers. So, they think to become a “White hat hacker” and learns how to hack. After learning some techniques, they forget about their aim which was to become a “White hat hacker” and try to hack and to be a threat to computers and networks. Sometimes they do it for Fun and sometimes to earn money. But these days, the law is strict for Cyber-crimes. So, think twice before hack.

Tuesday, September 8, 2009

Group of Microsoft Rivals Nears Patent Deal in Bid to Protect Linux

Microsoft Corp. has suggested in recent years that companies using the Linux computer-operating system might be violating Microsoft patents. Now, in an effort to avert any legal threat that might discourage the adoption of Linux, a group of Microsoft rivals is about to acquire a set of patents formerly owned by the software giant.

Linux is a free open-source operating system that has gained ground against Microsoft's Windows software among business users, especially in servers, the big back-office computers inside companies. Linux's fans say the free software is more secure than Windows and, because its blueprint is open to users, can be more easily customized.

The group, which includes major corporate supporters of such open-source software -- including International Business Machines Corp., Red Hat Inc. and Sony Corp. -- said it is nearing an agreement to acquire 22 patents that Microsoft sold to another organization earlier this year. Though the issue hasn't been tested in court, the patents may relate to Linux.

The group, the Open Invention Network, argues that its acquisition will protect users of Linux software from expensive lawsuits that could result if the patents fell into the hands of "patent trolls," groups that don't typically make products and exist primarily to earn money from lawsuits and settlements in patent cases.

The group said it is close to signing a deal to acquire the patents from Allied Security Trust. AST buys patents to protect its members from patent litigation, provides them with licenses to the technology, and then resells the patents on the open market. OIN and AST, whose members include Verizon Communications Inc., Cisco Systems Inc. and Hewlett-Packard Co., could announce an agreement as early as this week.

AST won control of the patents in a private auction held by Microsoft. OIN and AST said their cooperation ensures that the Microsoft patents won't end up with patent trolls, leaving some big boosters of Linux potentially exposed. "We have averted a scenario where these patents can be used for negative purposes," said Keith Bergelt, chief executive officer of OIN, which holds on to its patents and broadly licenses them.

Financial terms of the deals aren't being disclosed.

Mr. Bergelt said Microsoft presented the patents to potential bidders in its auction as relating to Linux. A Microsoft executive declined to say how the company described the patents to bidders.

Microsoft's sale of the patents is a new twist in its approach to Linux. Microsoft executives have previously said that the company holds more than 200 patents, out of the company's total portfolio of more than 50,000 patents, that they believe are violated by Linux software. In recent years, Microsoft has entered into patent-licensing pacts with dozens of companies that distribute or use open-source software in their products.

Earlier this year, Microsoft went a step further and filed a lawsuit in federal court in Seattle against the Dutch GPS device maker TomTom NV for allegedly violating Microsoft patents related to Linux, which were used in TomTom navigation products.

That suit, Microsoft's first Linux-related action and its first-ever alleging infringement of a software patent -- caused a stir among open-source advocates who feared Microsoft might be mounting a major legal offensive against Linux users. Microsoft and TomTom subsequently settled the suit for undisclosed terms.

Dave Kaefer, general manager for intellectual-property licensing at Microsoft, disputed allegations by some open-source advocates that the company intended to disrupt the market for Linux products with the sale of the patents, arguing that it wouldn't have sold the patents to AST, a firm whose members also include Linux boosters, if its goal had been disruption.

Mr. Kaefer said the patents, acquired from Silicon Graphics, were sold because they weren't strategic to the company. "They weren't important to our business going forward," he said.

Source:
By NICK WINGFIELD
http://online.wsj.com/article/SB125236988735891147.html?mod=googlenews_wsj
[ accessed on 08th Sep, 2009 ] by K.W.Roshan Herath

Tuesday, September 1, 2009

How to mount an .iso image on Linux

How to mount an .iso image on Linux

When we use CD/DVD images to burn into a CD/DVD, normally we can't see the files which included inside the CD/DVD without burning them into a CD/DVD. IF you use Linux
Operating System, you never need to burn the .iso file into a CD/DVD to see the files inside the .iso image file.

At first you must have the root user. You can simply do it by typing su on basic linux terminal window ( if you use *buntu system you can type sudo instead of su ) and providing the correct password. Then the prompt will change to the root user.
Then make a directory in /media folder to mount iso files. ( in most linux distros /media is the place which mount CD/DVD. )

Syntax : mkdir /media/folder_name
folder_name should be the name of the folder which used to mount iso files.

Then mount the CD/DVD iso images into the folder which we created before.

Syntax : mount image_file path_to_the_folder -t iso9660 -o loop

image_file is the name of the iso file with the path and .iso extention
path_to_the_folder is the place of the folder which we created
before.

Now you can open the the .iso file as a normal CD/DVD inside the Drive.
To unmount the image file from the location use

umount /media/folder_name



posted by K.W.Roshan Herath [ roshanherath ]

Tuesday, July 7, 2009

ISODisk

An application which allows you to mount and create ISO disk images

ISODisk is an easy-to-use ISO disk image file tool which helps you create virtual CD/DVD driver up to 20 drivers, mount an .ISO disk image and access the files on it as if it were burned to CD or DVD. This free program can quickly create ISO image file from CD/DVD-ROM, with ISODisk, you don't need install any other virtual drive software. Once you map the archive to a virtual drive, you can be able to view the contents in Windows Explorer

Here are some key features of "ISODisk":

· Quickly Mount ISO files with internal virtual drive
· Easy to create ISO file from CD/DVD-ROM

Developer: ISODisk.com

License / Price: Freeware / FREE

Size / OS: 526 KB / Windows All

Last Updated:November 10th, 2008, 15:28 GMT

Category:C: \ CD/DVD Tools \ Virtual CD/DVD-Rom


here is the link

Wednesday, July 1, 2009

LKR 150/= DVD+RW

I have a habbit to back-UP my data in to disks regularly. Sometimes when I backup my data in to DVD-R s there is more than 2.5 GB free space because I backup my PC monthly. So, I thought to use a DVD+RW to backup data and keep it till I get enough DATA to burn in to a DVD-R. By this I could reduce my cost for DVD-Rs and could use full space on DVD-Rs to burn.
So , I went to Kandy town to buy a DVD+RW. When I ask from one shop , the sales person told me it cost LKR 350/= but they haven't any DVD+RW at that time. So I asked from another shop. The sales person told it cost only LKR 150/= and they have stocks. I'm very happy when I heared that DVD+RW is cost LKR 150/= only. So I bought it to back-up my data in to it.
When I came home I started to burn my backups in to it. But after 3 or 4 successful burns, K3b andBrasero complained some errors on DVD+RW. But it's a DVD+RW and I tried to format it. Again the errors.
After that I used Nero6 on WindowsXP to burn the disk. It's the same as k3b and brasero. Now I have to stick it on the wall and forget about the LKR 150/= that I paid to buy it.
Although I have many experiences about low quality/low price DVD-R s , but I forgot the price of any DVD +RW is depend on the quality and the supported writing speed of the disk, when I buy that DVD+RW.
posted by Roshan Herath ( roshanherath )

Wednesday, December 10, 2008

From Windows/Dos to Linux

You want to switch from the DOS/Windows world to Linux?

Good idea: Linux is technically superior to DOS, Windows 9x and even Windows NT.
But beware: it might not be useful for you. These are the main differences between DOS/Windows and Linux:

• Windows runs Microsoft Office and lots of games; is perceived to be easy to install and configure; is notoriously unstable; performs poorly; crashes are frequent.
• Linux runs StarOffice, scores of technical software and fewer games; can be tricky to install and
configure; is rock solid; performs impeccably; crashes are extremely rare.

It's up to you to decide what you need. Furthermore, Linux gives you power, but it takes some time to learn how to harness it. Thus, if mostly need commercial sw, or if you don't feel like learning new commands and
concepts, you had better look elsewhere. Be aware that many newcomers give up because of initial difficulties.

Work is underway to make Linux simpler to use, but don't expect to be proficient with it unless you read a lot
of documentation and use it at least for a few months. Linux won't give you instant results. In spite of these warnings, I'm 100% confident that if you are the right user type you'll find in Linux your computer Nirvana. By the way, Linux + DOS/Win can coexist happily on the same machine.

You installed Linux and the programs you needed on the PC. You gave yourself an account (if not, type adduser yournamenow!) and Linux is running. You've just entered your name and password, and now you are looking at the screen thinking: ``Well, now what?'' Now, don't despair. You're almost ready to do the same things you used to do with DOS/Win, and many more.
If you were running DOS/Win instead of Linux, you would be doing some of the following tasks:
• running programs and creating, copying, viewing, deleting, printing, renaming files;
• CD'ing, MD'ing, RD'ing, and DIR'ring your directories;
• formatting floppies and copying files from/to them;
• tailoring the system;
• surfing the Internet;
• writing .BAT files and programs in your favourite language;
• the remaining 1%.

You'll be glad to know that these tasks can be accomplished under Linux in a fashion similar to DOS. Under DOS, the average user uses very few of the 100+ commands available: the same, up to a point, applies to
Linux. Introductory Concepts The best way to learn something new is to get your feet wet.

You are strongly encouraged to experiment and play with Linux:
unless you login as ``root'', you can't damage the system that way.

A few points:
• first of all, how to quit Linux safely. If you see a text mode screen, press , wait for the system to reboot, then switch off the PC. If you are working under X Window System, press first, then . Never switch off or reset the PC directly: this could damage the file system;
• unlike DOS or Windows, Linux has built−in security mechanisms. Files and directories have permissions associated to them; as a result, some cannot be accessed by the normal user. DOS and Windows, on the contrary, will let you wipe out the entire contents of your hard disk;
• there's a special user called ``root'': the system administrator, with full power of life and death on the machine. If you work on your own PC, you'll be root as well. Working as root is dangerous: any mistake can seriously damage or destroy the system just like with DOS/Windows. Don't work as root unless absolutely necessary;
• much of the complexity of Linux comes from its extreme configurability: virtually every feature and every application can be tailored through one or more configuration files. Complexity is the price to pay for power;
• redirection and piping are a side DOS feature, a very inportant one and much more powerful under Linux. Simple commands can be strung together to accomplish complex tasks. I strongly suggest that you learn how to use them.