Category: Fun in life


RJ-45自製網路線

測線器,一個發射端,一個接收端,上面8顆燈號

發射端會依序打出信號 1~8號燈,然後看接收器 1~8號燈 有沒有亮。

沒亮 = 線材中間斷蕊

亮的燈號順序不對 = 壓頭蕊線顏色排列錯誤,重壓

rj45

rj45-2

Reference: http://blog.xuite.net/axian/blog/224348022-%E8%87%AA%E5%B7%B1%E5%8B%95%E6%89%8B+DIY+RJ45+%E7%B6%B2%E8%B7%AF%E7%B7%9A%E6%8E%A5%E9%A0%AD%E5%90%A7%EF%BC%81

廣告

一加手機的國際版很難買到,因此買大陸版的(型號A001,預設是ColorOS 1.2)回來再改。其實露天的賣家有提供免費的改機服務,但我就想自己玩玩。

爬了中外各大網站,大家都說很簡單,什麼免PC,直接用手機去CM下載,按住volume下鍵 + 電源鍵,直接用Recovery更新,我的就不work。最後還是用開發者的方法,使用Android SDK,直接flash到CM11s。

準備

  • 一台PC,mac或windows都可 (以下指令語法都是mac的)。
  • 若沒裝過,下載並安裝Android SDK (SDK Tools only)
  • Cyanogen將最新的firmware下載回來。我下的版本是CyanogenMod 11S (4.4), cm-11.0-XNPH33R-bacon-signed-fastboot.zip, 491.7MB。
  • 一加手機,用USB線與電腦連結。

步驟

  1. 手機上,打開開發者選項,allow USB debugging,並與電腦透過USB線連結。
  2. 電腦上,將下載回的CM11S zip檔解壓縮到Android SDK下的platform-tools目錄。
  3. 打開Terminal或Command Prompt, 切換目錄到Android SDK中的platform-tools
  4. 首先我們需將手機解鎖:
    1. 重開機到boot loader
      ./adb reboot bootloader
    2. 下解鎖指令:
      ./fastboot oem unlock

      此時會看到以下,這樣就成功解鎖了。

      ...
      OKAY [  0.002s]
      finished. total time: 0.002s
      
    3. 重啟手機:
      ./fastboot reboot
    4. 手機重開後,再確認一下USB debugging都開着 (網路資料說解鎖後整個都會重設,但我的沒有)。
  5. Flash CM11s
    1. 一樣,再進到boot loader:
      ./adb reboot bootloader
    2. 執行以下flash,一個個重灌
      
      ./fastboot flash boot boot.img
      ./fastboot flash system system.img
      ./fastboot flash recovery recovery.img
      ./fastboot flash cache cache.img
      ./fastboot flash modem NON-HLOS.bin
      ./fastboot flash sbl1 sbl1.mbn
      ./fastboot flash dbi sdi.mbn
      ./fastboot flash about emmc_appsboot.mbn
      ./fastboot flash rpm rpm.mbn
      ./fastboot flash tz tz.mbn
      ./fastboot flash LOGO logo.bin
      ./fastboot flash radio flash-radio.sh
      ./fastboot flash userdata userdata_64G.img
      

      userdate要注意,若妳的手機是16G,就灌userdata.img;64G就灌userdata_64G.img

      其中system.img最久,約花了65秒。其他的檔一瞬間就灌好了。

    3. 搞定,重啟手機:
      ./fastboot reboot
  6. 接下來,一切順利的話,妳就到CM11S的初始開機畫面了。這個版本的Google app都是舊了,全部可透過Google Play更新。

參考資料

  1. How to Install CyanogenMod on the OnePlus One (“bacon")
  2. xda developers
  3. Root OnePlus One and Install TWRP Recovery
  4. Installing CyanogenMod on your OnePlus One: stop by step

手沖 intro and 粉水比

Source:

  1. http://nccucoffeeclub.blogspot.tw/2011/03/20110304.html
  2. http://nccucoffeeclub.blogspot.tw/2011/03/blog-post.html
  3. http://taiwancoffeeing.pixnet.net/blog/post/54276290-%E3%80%90%E6%95%99%E5%AD%B8%E3%80%91%E6%BF%BE%E7%B4%99%E5%BC%8F%E6%89%8B%E6%B2%96%E5%92%96%E5%95%A1%E7%9A%84%E6%8E%A2%E8%A8%8E
  4. http://bear-oj.blogspot.tw/2012/03/blog-post_16.html

基本器材:
手沖壺、濾杯、濾紙、咖啡壺、溫度計、磨豆機、量匙、磅秤、咖啡豆
重點提示:粉跟水比例1:17、溫度攝氏90~95度、穩定的均勻萃取、萃取率18%~22%

  1. 水溫的高低:烘焙越深水溫越低 (80度?)
  2. 水粉比例:一般而言,粉:水=1:17左右,是指整個注水量跟粉的比例,例如10克的粉,注入170cc的熱水,而非下面的咖啡壺有170cc,實際下面咖啡壺應該只剩120~140cc的咖啡液。當然這只是個慨念,比例也可以用1:12…等,且主要希望萃取能盡量做到有效利用咖啡粉,達到不浪費或過度使用,因為咖啡豆約有30%的可溶物質,其中這30%的可溶物質裡,也包含了所有好與不好的味道,因此萃取不足的話會造成風味不平衡,萃取過度會造成苦味雜味Gold Cup這論點,希望萃取率在18%~22%之間,濃度在1.2%~1.5%。當然有時要依照豆子的實際狀況做調整,例如風味較差的豆子,好喝的成份可能不多,這時就要考慮用1:10或1:12去降低萃取率。
  3. 咖啡粉粗細:咖啡粉的粗細也會影響萃取率,咖啡粉越細萃取率就越大、咖啡粉越粗萃取率就越小小飛馬:刻度3.5 – 4
  4. 水柱與注水: 高低: 約4 – 6 cm悶蒸後,分次注水與否的差異:分次注水,濃度高;不分次注水,濃度低。
  5. 繞圈的快慢:太過快的話,則會造成大擾動;太慢的話,萃取時間拖太長,造成後面的苦澀味出來。以中淺焙的豆子為例,一般而言,快一點點,味道會比較明亮;慢一點點,味道會比較柔和。大粉量時 (三、四杯量以上),注水的水柱別太過細小,這樣才不會讓萃取時間拖太長。
  6. 繞圈的大小: 水柱盡量保持離濾杯最少有0.5公分左右的距離。

jazzvideoguy.tv

台中東海【豆子仙草凍】的仙草凍,讚!!

http://viablog.okmall.tw/blogview.php?blogid=112
http://rich671023.spaces.live.com/blog/cns!2BCF1448852473D5!6622.entry
http://www.wretch.cc/blog/a2988984/7667023


WGS84座標數值(X:120.592508,Y:24.181143)
台中縣龍井鄉新興路1巷23號

台中東海【豆子仙草凍】的仙草凍,讚!!

http://viablog.okmall.tw/blogview.php?blogid=112
http://rich671023.spaces.live.com/blog/cns!2BCF1448852473D5!6622.entry
http://www.wretch.cc/blog/a2988984/7667023


WGS84座標數值(X:120.592508,Y:24.181143)
台中縣龍井鄉新興路1巷23號

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft’s Bill Gates and Steve Ballmer. The film attempts to compare the two firm’s operations and differences in the founder’s operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft’s way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI’s Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he’s told that because it’s the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD’S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they’re still being pursued. And it’s just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger – can’t believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles’ traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn’t the payoff, it’s about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she’s only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking – he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one – and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication’s system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the enigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the “Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by “Agents" (computers who take on human form and infiltrate the Matrix), is hailed as “The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo’s recurrent dreams depicting Trinity’s death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it’s all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can’t afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that’s just like the 30’s with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft’s Bill Gates and Steve Ballmer. The film attempts to compare the two firm’s operations and differences in the founder’s operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft’s way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI’s Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he’s told that because it’s the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD’S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they’re still being pursued. And it’s just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger – can’t believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles’ traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn’t the payoff, it’s about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she’s only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking – he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one – and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication’s system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the
e
nigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the “Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by “Agents" (computers who take on human form and infiltrate the Matrix), is hailed as “The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo’s recurrent dreams depicting Trinity’s death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it’s all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can’t afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that’s just like the 30’s with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…

Miss Taiwan? wanna watch live Taiwan TV?

Check out our Open Beta – http://www.dragoniptv.com

DragonIPTV 龍翔網絡電視 給你故鄉的精彩