Raspberry Pi Wireless Connection Control

Introduction

recently, I found a software to manage wireless connection under Raspberry Pi (i.e Lunix), it called wicd-curese. It is easy to install it by running the following command:

sudo apt-get install wicd-curses

However, it request to install quite a few other packages but those daemon run in the background.

After installed, you can run it with command:

sudo wicd-curses

Then, the following screen will display for your setup control:

wireless-control

  • Right Key “->” to Configure
  • R to refresh the list.
  • D to Disconnect
  • C to Connect
  • F10 to save

You must be capital such as [SHIFT] C to connect. If you get a message saying no networks detected press P  and type in wlan0 in the wireless interface field and press F10 to save.

It is also manages the connection so it will reconnect to any configured wireless access points if it drops out for whatever reason but it will also try to connect to any available networks.

You might have to press C to connect to the access point. If you were wired that will most likely kill the LAN interface and bring up wireless, so, be careful for network connection.

 

Hong Kong Tech Voucher now open for application

SMEs which operate in Hong Kong for at least one year can now apply to the Tech Voucher Programme (TVP). Subsidy up to $200,000 will be provided on a 2:1 matching basis. Funding areas under the voucher programme include: technology consultancy; purchase, rental or subscription of customised equipment or hardware, software and technological services or solutions.

Check out our info kit here and the official guidance note to know more about the TVP. I will closely monitor the implementation of the voucher programme and identify the areas for improvement. You are welcomed to write to me about any issues you see in the TVP.

Policy proposals to the government

The government is soliciting views on the 2017 Policy Address and 2017-2018 Budget and each year I will submit to the government a list of policy and funding proposals to elevate the sector growth and push forward the innovation and technology development in Hong Kong.

I have submitted a proposal comprising 20 key recommendations on 10 areas, including: IT Talents And Employment Support Programme to foster partnership between IT businesses and universities to train more IT specialists; $1-billion InnoTech Studies Fund; establishing Technology and Law Reform Committee, InnoTech & Economic Transformation Working Group; creating Startups Accreditation Programme, Digital Marketplace Trial to help startups and SMEs win projects; overhauling the STEM education; establishing a Smart City Sandbox for innovative developments; increasing land supply for technology development and more. Your views are appreciated.

 

IT人在工廠日記 – 飯店捉老鼠

此照片是我在一間大陸飯店吃午飯時拍下的,當時伙記們很落力地捉老鼠,完全沒有顧慮到在座客人的感受,但是大陸人也很奇怪,這好像是平常事,而我也跟其它客人一樣,留在座位觀看,只求老鼠不要躲過來便算,這就是大陸的生活。如果事情發生在香港,客人會奪門而走,而這飯店肯定要見報被投訴,可是在大陸,這便是一件很平常普通的小事。20161121_130709

URL block List for a China Company

1.  Introduction

To protect company network from malware, worm, virus, spam, etc in suspected malicious web sites, we need to define an URL block list (in next section), and setup to restrict those URLs in our network Firewall. This post will list out those suspected URLs, and we will submit this document to management review and approve.

2. URL Block List

2.1 Sports

2.1.1      General Suspected URL:

 

2.1.2 China Suspected URL:

http://sports.sina.com.cn/

http://sports.sohu.com/

http://sports.ifeng.com/

http://sports.163.com/

http://sports.qq.com/

http://sports.cntv.cn/

http://sports.pptv.com/

http://sports.youku.com/

http://sports.letv.com/

http://china.nba.com/

http://www.xinhuanet.com/sports/

 

  • Streaming Video:
    • General Suspected URL:

 

  • China Suspected URL:

http://player.baidu.com/yingyin.html

http://www.iqiyi.com/

http://tv.sohu.com/

http://www.tv189.com/

http://www.baofeng.com/

http://www.youku.com/

http://cbox.cntv.cn/

http://www.ku6.com/client_ku6speed/

http://tudouva.softonic.cn/

http://y.qq.com/player/

http://www.fun.tv/

http://www.kugou.com/

http://www.ppxyy.com/

http://www.kankan.com/

http://v.baidu.com/

http://www.uusee.com/

http://www.56.com/

http://www.pptv.com/

http://dl.xunlei.com/

http://v.qq.com/download.html

http://www.p2psearchers.com/

http://www.lmtw.com/

 

  • Social Media
    • General Suspected URL:

 

  • China Suspected URL:

http://wangwang.1688.com/

http://skype.gmw.cn/

http://popo.163.com/

https://messenger.yahoo.com/web/

http://cn.msn.com/

http://www.qq.com/

http://uc.sina.com.cn/

http://feixin.10086.cn/

http://webim.feixin.10086.cn/

http://im.baidu.com/

http://cc.163.com/

http://www.alicall.com/

http://www.gtalk.com.cn/

 

  • Software downloads
    • General Suspected URL:

 

 

  • China Suspected URL:

http://raysource.softonic.cn/

http://www.115.com/

http://xf.qq.com/

http://www.flashget.com/cn/

http://dl.xunlei.com/

 

  • P2P sharing
    • General Suspected URL:

 

  • China Suspected URL:

http://www.emule.org.cn/

http://soft.p2psearcher.org/

http://dl.xunlei.com/

http://www.bttiantang.com/

http://www.poco.cn/

http://www.btchina.net/
http://www.verycd.com/
http://www.btpig.com/
http://www.3e-online.com/
http://www.bbsmovie.com/
http://www.21ou.com/

http://www.jlpzj.com/
http://www.dream2008.cn/
http://www.cnxp.com/
http://www.btbbt.com/

 

 

  • Torrents
    • General Suspected URL:

 

  • China Suspected URL:

http://www.mininova.org/

http://thepiratebay.org/
http://isohunt.com/
http://torrentz.com/
http://btjunkie.org/
http://torrentportal.com/
http://www.gamestorrents.com/
http://www.torrentreactor.net/
http://www.sumotorrent.com/
http://www.seedpeer.com/

 

Reference Sites:

http://urlblacklist.com/?sec=download

http://www.squidguard.org/blacklists.html

http://www.business-in-site.com/webmaster-articles/huge-list-of-156-video-streaming-sites/

http://www.blogsdna.com/923/top-20-best-peer-2-peer-p2p-file-sharing-programs-applications-software.htm

https://torrentfreak.com/top-10-largest-file-sharing-sites-110828/

Introduction of ITIL v3 Framework

WHAT IS ITIL?

ITIL is the most widely adopted approach for IT Service Management in the world. It provides a practical, no-nonsense framework for identifying, planning, delivering and supporting IT services to the business.

ITIL3

ITIL: OVERVIEW AND BENEFITS

ITIL advocates that IT services must be aligned to the needs of the business and underpin the core business processes. It provides guidance to organizations on how to use IT as a tool to facilitate business change, transformation and growth.

The ITIL best practices are currently detailed within five core publications which provide a systematic and professional approach to the management of IT services, enabling organizations to deliver appropriate services and continually ensure they are meeting business goals and delivering benefits.

The five core guides map the entire ITIL Service Lifecycle, beginning with the identification of customer needs and drivers of IT requirements, through to the design and implementation of the service into operation and finally, on to the monitoring and improvement phase of the service.

Adopting ITIL can offer users a huge range of benefits that include:

  • improved IT services
  • reduced costs
  • improved customer satisfaction through a more professional approach to service delivery
  • improved productivity
  • improved use of skills and experience
  • improved delivery of third party service.

ITIL USERS

ITIL has been adopted by thousands of organizations worldwide, such as NASA, the UK National Health Service (NHS), HSBC bank and Disney™. ITIL is also supported by quality services from a wide range of providers including examination institutes, accredited training providers and consultancies, software and tool vendors and well known service providers such as IBM, Telefonica, HP and British telecom (BT).

A comprehensive qualifications scheme offering a variety of training courses and certifications has been developed against the guidance. This scheme can help organizations to effectively implement ITIL, achieving success by ensuring that employees have the relevant knowledge, skills and techniques, but most importantly, ensuring the entire organization is using a common language and are fully invested in the process.

ITIL Best Practices also underpin the foundations of ISO/IEC 20000 (previously BS15000), the International Service Management Standard for organizational certification and compliance. Organizations can therefore implement ITIL to achieve organizational certification.

Open Source IT Configuration Management Tools

Open source configuration management tools make managing servers at scale easier, less time-consuming and more repeatable.

Configuration management tools provide automation, cloud orchestration, and remote management and execution that give IT greater control over its entire infrastructure. Beyond standardizing configuration on servers, the tools can install and maintain packages, upgrade or deploy new servers and manage a cloud infrastructure.

Without configuration management tools, IT administrators would manually deploy each VM needed in an OpenStack, Amazon Web Services, VMware ESXi or other environment. Instead of logging into each server to manually patch it, a systems administrator can remotely patch thousands of servers at the same time. The same goes for removing a user from servers.

“All of your server configuration is going to stay the same and consistent across your environment,” said Nitin Madhok, a systems developer and programmer on the infrastructure code team at Clemson University. “So, if you installed an application on one server, you could install that application on a dev, production, test or whatever environment it is in the same way, following the same steps.”

Companies can immediately fix security vulnerabilities such as Heartbleed on thousands of user-facing servers in under five minutes. LinkedIn manages more than 70,000 servers and can make a change on all of them in under a minute.

Chef, Puppet, Ansible and Salt are four major open source configuration management tools — each with distinct differences. Puppet and Chef are coded in Ruby, a less commonly known programming language among IT professionals. Salt and Ansible use the more common language, Python, and users only have to be familiar with YAML (yet another markup language) to operate them. Salt and Chef also use ZeroMQ protocol, which allows users to create complex communication systems with little effort.

Salt and Puppet use a daemon approach and must be installed on every server. This allows for a master-slave control architecture. Chef and Ansible are daemonless, so no software takes up resources on the VM to manage it. The open source tools do require open Port 22 on each VM, which could leave servers vulnerable to attack. Salt also has a Secure Socket Shell tool, called Salt SSH, which allows the user to configure it similarly to Ansible. Each of these open source configuration management tools also come in supported, purchased enterprise versions that offer additional modules or features.

 

Information Source: http://searchitoperations.techtarget.com/photostory/450299435/Modern-open-source-systems-management/4/Open-source-configuration-management-tools-offer-ease-at-scale

How to protect you against Android phone loss/theft

How to protect you against Android phone loss/theft

(1) At Android smartphone
1. Select “Settings” icon, then “Location and security”
2. Select “Device administration”
3. Enable “Android Device Manager”
(2) At PC
1. Go to https://www.google.com/android/devicemanager
2. Login your Android related Gmail account
3. Now you can LOCATE, RING or LOCK your phone or ERASE your phone’s data in case of theft or loss.

Common Feature of IT Service Management tool

Common Feature of IT Service Management Tool as below:

  • Fully configurable CMDB
  • HelpDesk and Incident Management
  • Service and Contract Management
  • Change Management
  • Configuration Management
  • Automatic SLA management
  • Automatic impact analysis
  • CSV import tool for all data
  • Consistency audit to check data quality
  • Data synchronization (data federation)