ประกาศงานแข่งขันพัฒนา innovative IoT ด้วย RICOH THETA (อัพเดท 19-Jul-2016)

Update 19/7/2016:
มีอัพเดทเอกสารเพิ่มเติมมาจากทาง RICOH ครับ เหลือเวลาอีกไม่มากจะปิดรับผลงานแล้ว วิ่งเลยครับ 🙂

Seminar Video(First time)
http://contest.theta360.com/seminar-e.html

Seminar Document(First time)
http://contest.theta360.com/2016062102-e.html

Seminar Document(Second time)
http://contest.theta360.com/20160706-e.html

——————————————-

ขออนุญาตแชร์ข่าวประกาศงานแข่งขันพัฒนา innovative IoT product/service ระดับนานาชาติ ด้วยการประยุกต์ใช้ RICOH THETA กล้อง 360องศา ที่สามารถถ่ายรูปและวีดีโอได้รอบตัวเราภายในช็อตเดียว โดยไม่มีการจำกัดไอเดียการออกแบบว่าจะเป็น software หรือ hardware หรือผสมผสานทั้งสองอย่างก็ได้ เงื่อนไขเดียวคือการประยุกต์ใช้เจ้า THETA เพื่อสร้าง IoT Innovation มีเงินรางวัลรวมกว่า 5 ล้านเยน developer / maker จากประเทศไทยใครมีฝีมือและไอเดียช่วยไปสร้างชื่อให้ชาติเราหน่อยครับ

รายละเอียดตามเวบด้านล่างของ RICOH ครับ ไทยแลนด์สู้ๆ!

http://contest.theta360.com/index-en.html

New fonts don’t show up in Word for Mac 2011?

Problem:
Newly installed fonts aren’t available for use in Ms Word for Mac 2011.

Solution:

1) In “Font Book” app, make sure to install fonts system wide (for “Computer” not just “User”) , remove & re-install as needed.

2) Clear font cache. There is an app called Font Nuke that does this. Be warned: save all your works & close all apps before you use this app, it’ll force restart.

3) After reboot, you should see it in font list of Ms Word. Restart Ms Word after first open does help me too in this step.

If all above doesn’t work, check out the following links:

https://support.microsoft.com/en-us/kb/295062

https://discussions.apple.com/thread/5979870

font photo
Photo by FontShop

StarWars Hologram is Becoming Real in Japan!

hologram photo
Photo by m_hweldon

If you haven’t seen this before let me briefly tell you that it’s a research from one of Japan’s national laboratory that beam a laser pulses to create laser plasma in mid-air.

The researchers published their work quite many years ago (around 2006) in an ACM SIG conference. Now they returned with a slickier, miniaturized version!

See to believe right? Just follow the link or see the clip below:

http://mashable.com/2015/07/02/holograms-you-can-touch/

Toward Technocratic Utopia Society — Part 1

If money is a mechanism to drive society to create value, why can’t there be alternatives?

How many times we hear people say they want to give back to the community where they living. Someone actually did it through mean of donation, some volunteer.

But everything seems to go too slow from the fact that they still have to make a living. Most of us are not millionaires who has financial freedom. We can only give so much of our money and time. When the economic turmoil come, lesser money will flow in the system, the bottom of capitalism pyramid will be the first to suffer.

See? The economic system that relying on federal money printing has its own limitation. And for smaller country, it’s also subjected to manipulation. Then why can’t we have a system that can sustain such evil influences?

I will continue the explanation in other post. However, I will leave keywords here for my own note, as well as to give you some glimpse of the idea.

– platform for social collaboration
– social contribution point

Allow SFTP but limiting SSH access an account on Ubuntu 14.04

I want to control user access on server to just a specific directory via SFTP and nothing else, not even ssh. Here is my take after searching info on the net:

First, edit ssh config file.

 sudo nano  /etc/ssh/sshd_config  

Change Subsystem property (or add one if not already there)

Subsystem sftp internal-sftp

Add the following lines to the bottom of config file.

Match group sftponly

ChrootDirectory %h

# Force the connection to use SFTP and chroot to the required directory.

ForceCommand internal-sftp

# Disable network tunneling

PermitTunnel no

# Disable authentication agent forwarding.

AllowAgentForwarding no

# Disable TCP connection forwarding.

AllowTcpForwarding no

# Disable X11 remote desktop forwarding.

X11Forwarding no

From config it says, we only allow a user group name ‘sftponly’ to use ssh solely for sftp and not any other purpose including some forwarding functions.

This means we will have to create this system group (it can be named something else). Exit and save the config file by pressing Ctrl + X and Enter then issue this command in shell:

sudo addgroup sftponly

Then add user that you want to limit ssh access to this group. In this example, we assume that this is new user and we will create them first.

sudo adduser testuser

Then add to the group.

sudo usermod testuser -g sftponly

Next, change home directory of this user to where you want to confine access to.

sudo usermod testuser -d /path/to/newhome

Now, restart the ssh service for the change to take effect.

sudo service ssh restart

Finally, change path to the new user’s home and change the ownership and permission to allow access.

cd /path/to/newhome
sudo chown testuser:sftponly -R *
sudo chmod 755 -R *

Refs:
https://bensmann.no/restrict-sftp-users-to-home-folder/
http://passingcuriosity.com/2014/openssh-restrict-to-sftp-chroot/
https://www.linode.com/docs/tools-reference/tools/limiting-access-with-sftp-jails-on-debian-and-ubuntu

MAC Address Spoofing and its’ Countermeasures

Well, it’s all begin from Apple decision to randomize MAC Address sending out in background looking for Access Point, so that its’ users can’t be tracked by marketer or NSA. I should be grateful for this bold move except that my aim is also to use Mac Address as a passive identification method for surveillance, a good cause!! (Well NSA would have say the same anyway)

Now getting on the same boat as NSA guys, (not sure they count me in or not lol), it take me to think what are other method that we can identify unique individual (of course, not to the level of personal identity, no not as much as Facebook) so that I can provide ample monitoring for their abnormal activities.

So I dig into MAC Address spoofing world and its’ counter measure efforts and found all these resources and good read that still give a hope to a guy like me.

http://www.giac.org/paper/gsec/3199/mac-spoofing-an-introduction/105315

https://infoexpress.com/content/practical/142

http://link.springer.com/chapter/10.1007%2F978-3-540-88653-2_15

http://www.networkworld.com/article/2296641/network-security/hunting-down-wireless-devices-doing-mac-spoofing.html

http://en.wikipedia.org/wiki/Promiscuous_mode

As a footnote, sensor data fusion is the key, as long as we can track individual walking along a hallway, MAC Address spoofing will eventually be just an inconvenient.

Good luck!