All about computer, communications and consumer electronics (3C)

Archive for the ‘Experiments’ Category

Transferring huge files across LAN

Posted by Suntrekker on April 6, 2008

It usually takes about 3 hours to copy a single file. So I was out trying to find a quicker way of moving the files. It is my weekly task copying huge files from one location to another network.

To ease my burden of waiting how the file transfer will end, I search at the internet and tried several utilities that claimed to make faster copy times but it seems the same and improvements were just nominal.

Then I stumbled onto an article at ASKPERF and it is all about issues on slow large copy.

The article author suggested using the ESEUTIL (Exchange Sever Database Utilities) to move the large files.

I tried it and improvements were drastic  that it would only take 1 1/2 hours from previous 3 hours to copy.

If you are thinking that it is difficult to use then you are wrong, =) It’s very easy, just follow the direction on the article and copied the following 2 files from the exchange directory over to the non-exchange server.

1) Eseutil.exe
2) Ese.dll

Since I didn’t want to mess with windows path by adding new paths , I justs put the two files under put them in the windows/system32 directory so they would be in my path.

Then to use the utility, from the command prompt, use the following syntax:
C:\esutil /y /d

It’s that simple.

Another plus to this utility is it also gives you a Copy Progress % complete and a progress bar, lets you know it’s working…

I am a big fan of batch files and since this utility works from the command line, I updated my existing batch file to call this utility to move the files once a week. =)


Posted in Experiments | Tagged: , | 1 Comment »

Free web filtering site

Posted by Suntrekker on March 4, 2008

When I think of web filtering, its all about expenses, budget, tasking configurations.

Since I found this one, that perception  changes because it is free! – OpenDNS

Web filtering–the process of blocking user access to high risk sites as well as sites that are inappropriate for the office. There are several solutions available for large and medium businesses. WebSense is probably the most well known. However, the cost of these services is often prohibitive for small businesses. What small businesses–and many home users–need is an easy to use and inexpensive solution. OpenDNS easily meets these requirements. 

All you do is sign up, configure your systems to point to the OpenDNS servers, and you’re ready to configure access constraints to protect your employees and your and your network. Unless you choose to automate dynamic IP  updates, there is no software to load on the client PCs.

The OpenDNS site provides setup instructions for just about any SOHO router. Once the router is configured, OpenDNS instructs you to reboot your systems. This is to renew the DHCP settings supplied by the router, setting the PC’s DNS IP addresses to the OpenDNS servers. A simple ipconfig /renew will also do the trick. Once your system is using the new IP addresses, you’re up and running on OpenDNS. There are claims that this is a faster way to resolve domain names, but that topic is outside the scope of this post.

 I suggest you try it out for yourself. 


Posted in Experiments | Tagged: , | Leave a Comment »

Hiding files inside .jpg format

Posted by Suntrekker on January 27, 2008

This is what I tested, I don’t know if it’ll work with you.  You just need to have a little knowledge about Command Prompt and have WinRAR installed.  Grin

Ok, lets begin…  Wink

1. Gather all the files that you wish to hide in a folder anywhere in your PC (make it in C:\hidden – RECOMMENDED).
2. Now, add those files in a RAR archive (e.g. secret.rar). This file should also be in the same directory (C:\hidden).
3. Now, look for a simple JPEG picture file (e.g. logo.jpg). Copy/Paste that file also in C:\hidden.
4. Now, open Command Prompt (Go to Run and type ‘cmd‘). Make your working directory C:\hidden.
5. Now type: “COPY /b logo.jpg + secret.rar output.jpg” (without quotes) – Now, logo.jpg is the picture you want to show, secret.rar is the file to be hidden, and output.jpg is the file which contains both. Cheesy
6. Now, after you have done this, you will see a file output.jpg in C:\hidden.

Open it (double-click) and it will show the picture you wanted to show. Now try opening the same file with WinRAR, it will show the hidden archive .

Update me if it work with you. {evil grin}  I don’t know if you already knew this but its great.

Posted in Experiments | Leave a Comment »

Caring for Finger print sensor

Posted by Suntrekker on November 24, 2007

We are using finger print sensors in my workplace main door, server room, etc… and since it is always been touched for almost a thousand times and all the troubleshooting, adding/deleting of fingerprint accounts as well as the software and hardware maintenance was turned over to me… I devotedly scheduled a cleaning time for this little device and I want to share to you some basic steps in cleaning of silicon-based fingerprint sensor if you have one at your home.. hehehe. (yes, there are fingerprint sensors that can be bought that are running on Alkaline 3AA Size batteries and can last for 1 year and a half – the battery). It feels like having one is futuristic and hi-tech.

Sensors are rugged solid-state devices designed to provide years of trouble-free service. In fact, they have been laboratory-tested with over 2 million touches and no measurable wear – as what I read in its old manual. Although maintenance and handling requirements are few in number, observance of a few basics in caring for the sensors will help to ensure a high level of performance over the life of the product.

In a real-world environment, the sensors can become soiled due to repeated contact with users’ fingers or other sources of contamination. Unless this contamination on the surface of the sensor is extremely thick, it will not have any effect on the ability of the sensor to capture fingerprints. However, users may want to clean the surface of the sensor occasionally for aesthetic reasons. It is important to clean the sensor in a way that does not damage the surface or result in discoloration of the finger ring. This specification describes how the sensor surface may be cleaned without causing damage to the sensor.


To clean the sensor surface, perform the following steps:

1. Remove the electrical power from the fingerprint sensor by disconnecting it from power source.

2. Use any type of household kitchen or window cleaner.

Do NOT use chlorine-based cleaners, such as Clorox
bleach,non-chlorine bleach, or chlorine-based bathroom or mildew cleaners. Chlorine ba
sed cleaners will not necessarily affect the functionality of the fingerprint sensor, but they will discolor the finger drive ring and could damage the surrounding enclosure and peripheral components to the sensor.

Do NOT use any solvents, such as acetone, MEK, TCE, paint thinner, turpentine, etc. Solvents will not adversely affect the sensor, but they might damage the surrounding enclosure and peripheral components to the sensor.

3.Wet one end of a cotton swab (not soaking or dripping wet) with one of the
above-mentioned cleaners. Gently rub the sensor surface and finger drive ring with the wet cotton swab, slowly rotating the swab so a new, clean surface of the swab is constantly expose
d to the sensor surface. Do not allow cleaner to drip or run down into the electronics around the sensor.

Do NOT use nylon brushes, scouring pads, or steel wool. These items can cause damage to the sensor.

4. After cleaning with the wet swab, gently rub the surfaces again with a dry cotton swab. Use a clean swab each time the sensor is cleaned. (If a dirty swab is used, it may make the sensor dirty again).

fingerprint touch
The sensor with my officemates’ finger.

Posted in Experiments | Tagged: , | 2 Comments »

Gearing up for war driving

Posted by Suntrekker on November 22, 2007

I already posted a topic regarding about the largest wifi hotspot here in Davao at my other blog site. This is a more detail about war driving.

Imagine yourself driving late at night here at Davao metropolis. You have a full tank of gas, it’s dark, and a faint electronic glow illuminates the right side of your face. As each house or building passes by, your laptop blips out another group of unusual words like tsunami, default, dog house, taffy, 101, spock, or who knows? Or picture yourself driving home from work, taking the scenic route— through the commercial district. Just to see what pops up. A blip pops up on your laptop. Hmm… a new access point. This one reveals the presence of a Wi-Fi network. You’ve started to experience the allure of war driving. Invisible waves pop up on your computer screen revealing the unknown and unseen.

One of the interesting aspects of war driving is that you will find wireless access points where you least expect it.

The original term war driving has also spawned a host of derivatives applying to many situations in which people scan while not actually driving—for example, war walking, war strolling, war boating, and war flying. They all mean one thing: looking for wireless networks, usually while moving. We prefer to scan while driving.

Some people have promoted the idea that the war in war driving is actually an acronym for “Wireless Access Reconnaissance.” This is really an after-the-fact case of creating an acronym for a simple word. But it sure sounds less ominous than war.

I used NetStumbler software since this is by far easiest program to use to get started and produces great results! I Will not mention any discovered wireless network I stumbled upon… ahihihi

Screenshot of NetStumbler taken earlier.

Plugging it all in

Everything is ready. It’s time to get on the road. Start small at first.Drive up and down your street to see how far away your home network is visible. Then start driving around the neighborhood.

Everything is ready to go
Everything is ready to go!

You will be tempted to watch the screen while driving. This habit is very dangerous and definitely not recommended. To avoid distraction, have someone with you to monitor the signals. Make sure the power management option is set up for Always On operation so the laptop doesn’t go to sleep.

Discover the Invincible

You will be surprised where wireless networks appear. And you will be even more surprised when the names people have chosen for their network SSID comes across your screen. Be prepared for the humorous, laughable, obscene, and bizarre.

A remarkable number of access points are using the default configuration. Many people buy an AP and just plug it in. Since most APs are designed to work out of the box, people just leave them at the minimum configuration.


A huge number of networks are “wide open,” meaning you could jump onto the network and surf the Web, check e-mail, or access computers on that WLAN. This tactic is ill-advised and probably illegal. Even if the “door is open,” personally, it may still be considered a crime to use a network without permission.


Posted in Experiments | Tagged: , , | Leave a Comment »