RJ-45自製網路線

測線器,一個發射端,一個接收端,上面8顆燈號

發射端會依序打出信號 1~8號燈,然後看接收器 1~8號燈 有沒有亮。

沒亮 = 線材中間斷蕊

亮的燈號順序不對 = 壓頭蕊線顏色排列錯誤,重壓

rj45

rj45-2

Reference: http://blog.xuite.net/axian/blog/224348022-%E8%87%AA%E5%B7%B1%E5%8B%95%E6%89%8B+DIY+RJ45+%E7%B6%B2%E8%B7%AF%E7%B7%9A%E6%8E%A5%E9%A0%AD%E5%90%A7%EF%BC%81

廣告

一加手機 大陸版改國際版 (ColorOS to CyanogenMod 11s)

一加手機的國際版很難買到,因此買大陸版的(型號A001,預設是ColorOS 1.2)回來再改。其實露天的賣家有提供免費的改機服務,但我就想自己玩玩。

爬了中外各大網站,大家都說很簡單,什麼免PC,直接用手機去CM下載,按住volume下鍵 + 電源鍵,直接用Recovery更新,我的就不work。最後還是用開發者的方法,使用Android SDK,直接flash到CM11s。

準備

  • 一台PC,mac或windows都可 (以下指令語法都是mac的)。
  • 若沒裝過,下載並安裝Android SDK (SDK Tools only)
  • Cyanogen將最新的firmware下載回來。我下的版本是CyanogenMod 11S (4.4), cm-11.0-XNPH33R-bacon-signed-fastboot.zip, 491.7MB。
  • 一加手機,用USB線與電腦連結。

步驟

  1. 手機上,打開開發者選項,allow USB debugging,並與電腦透過USB線連結。
  2. 電腦上,將下載回的CM11S zip檔解壓縮到Android SDK下的platform-tools目錄。
  3. 打開Terminal或Command Prompt, 切換目錄到Android SDK中的platform-tools
  4. 首先我們需將手機解鎖:
    1. 重開機到boot loader
      ./adb reboot bootloader
    2. 下解鎖指令:
      ./fastboot oem unlock

      此時會看到以下,這樣就成功解鎖了。

      ...
      OKAY [  0.002s]
      finished. total time: 0.002s
      
    3. 重啟手機:
      ./fastboot reboot
    4. 手機重開後,再確認一下USB debugging都開着 (網路資料說解鎖後整個都會重設,但我的沒有)。
  5. Flash CM11s
    1. 一樣,再進到boot loader:
      ./adb reboot bootloader
    2. 執行以下flash,一個個重灌
      
      ./fastboot flash boot boot.img
      ./fastboot flash system system.img
      ./fastboot flash recovery recovery.img
      ./fastboot flash cache cache.img
      ./fastboot flash modem NON-HLOS.bin
      ./fastboot flash sbl1 sbl1.mbn
      ./fastboot flash dbi sdi.mbn
      ./fastboot flash about emmc_appsboot.mbn
      ./fastboot flash rpm rpm.mbn
      ./fastboot flash tz tz.mbn
      ./fastboot flash LOGO logo.bin
      ./fastboot flash radio flash-radio.sh
      ./fastboot flash userdata userdata_64G.img
      

      userdate要注意,若妳的手機是16G,就灌userdata.img;64G就灌userdata_64G.img

      其中system.img最久,約花了65秒。其他的檔一瞬間就灌好了。

    3. 搞定,重啟手機:
      ./fastboot reboot
  6. 接下來,一切順利的話,妳就到CM11S的初始開機畫面了。這個版本的Google app都是舊了,全部可透過Google Play更新。

參考資料

  1. How to Install CyanogenMod on the OnePlus One (“bacon")
  2. xda developers
  3. Root OnePlus One and Install TWRP Recovery
  4. Installing CyanogenMod on your OnePlus One: stop by step

Top Movies about Computer & Geeks

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft’s Bill Gates and Steve Ballmer. The film attempts to compare the two firm’s operations and differences in the founder’s operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft’s way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI’s Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he’s told that because it’s the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD’S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they’re still being pursued. And it’s just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger – can’t believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles’ traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn’t the payoff, it’s about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she’s only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking – he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one – and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication’s system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the
e
nigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the “Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by “Agents" (computers who take on human form and infiltrate the Matrix), is hailed as “The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo’s recurrent dreams depicting Trinity’s death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it’s all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can’t afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that’s just like the 30’s with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…