Exporting Windows Drivers

I find myself burning down my primary Windows machine every semester, or every time it gets a bug. Windows 7 does have great support for my motherboard but not for things like my video card, my wifi adaptor, and other devices. Re-blasting Windows can take an hour and even longer to find drivers on the fly so im going to talk for a little bit about exporting your drivers before you burn everything down, and then import them back once all is done.

Driverbackup is a nice GUI application that combs your Windows system and looks for installed drivers for your hardware and offers to back them up to a location of your choosing (if you’re getting ready to burn the hard drive down then I hope it’s an external drive).


This application is idiot proof, and being as such, has served me well. I will link it to the download page later. This is something people should consider also if they are employed in a business environment where hardware is not standardized and different computers have like seven different drivers. A huge time saver.

Posted in | Leave a comment

Fixing Broken Packages in Ubuntu Linux

Ubuntu is by far my ideal choice for an operating system. It is light, runs, and works. I can tool the interface to meet my desire and install darn near anything I want in the way of tools and junk to get my work done. It is also very secure compaired to a Windows system going as far as to not allow you to install or remove any applications if their are broken dependencies in the already installed packets.

A broken package means that a packet is missing a file, or required program needed to function properly. In order to fix this;

From the Symantec Package Manager, Click Edit -> Fix Broken Packages. Choose Apply Marked Changes and then press Ctrl+P. Finally click Apply.

Posted in , | Leave a comment

Bypassing Restrictive Content Filters

Throughout the day I travel between many different wireless networks and depending on who is running that network, I might have a problem researching something vital , (or as the case often is I confess) totally trivial and just peeks my curiosity. In this post I will show you my two favorite ways to bypass these annoying restrictions and help you to get the information you need (or simply get on facebook)

Method # 1 Proxy Site

Sites like Proxify and Sitegetter are some of my favorites. Unless they themselves are restricted then you should simply need to open them in your browser, and enter the url of the site you wish to visit, or simple go to google and search what you want without restrictions.

As I said, this works if these sites have not been firewalled themselves, if that’s the case you need to either find another proxy site, or try method number 2.

Method # 2 Tor Onion Browser

The Tor project has been out for a long time now and gaining popularity for its ease of use and effectiveness. In the day you used to have to download the backend tunneling client, configure your browser every time you wanted to use and away you went.

Today however, you can download the Tor Browser (which is a slimmed down firefox install with a one click button for surfing anonymously) that effectively streamlines the process greatly.

Final Though

Also. I like to add that while both of these methods will get you around a restricted site list, they are not always the most secure connections. While using these methods I would make sure that when you enter personal information on any website that it is encrypted (check the address bar for HTTPS or SSL).

Also, this is not effective for downloading or streaming media as while you are effectively putting another website (possibly a country) between you and your current service provider it can make the transfer of data slow. On a news site or social network site you might not notice this but if you go to youtube while on a Tor circuit then you will quickly notice what im talking about. It’s like going back to dialup.

Those points made I leave you to your business, thanks for stopping into read.

Posted in , | Leave a comment

The Cisco “Do” Command

During my second semester as a CIT major one of the things we had to get used to doing was learning the different debug and show commands available to us in different privilege modes on the routers. One thing that made all that a little bit easier was the do command.

The command can be used in privilege mode to force the router to do some commands otherwise restricted to EXEC mode.


ROUTER1(config)$sh run                 
                  ^
% Invalid input detected at ‘^’ marker.

ROUTER1(config)do sh run

Building configuration. . .

So as you can see no hoping back and forth between config modes. The only limit my research yields to do command to is using it to change the current config mode itself (it cannot be used to initiate the config t command.)

Posted in , , | Leave a comment