As I write this I am sitting on a plane at 32,000 feet, about 5 hours into my 13 hour flight from Brisbane Australia to Los Angeles, USA.
Unknown to many I am actually terrified of flying. From the moment I know we are boarding, to the taxi, instructional video, take-off and then subsequent ascent into the skies I am having a panic attack each time (sometimes worse than others).
Recently I encountered a dreaded issue whilst trying to install Laravel on my Mac OSX machine.
The message I was getting was:
Allowed memory size of 536870912 bytes exhausted (tried to allocate 72 bytes) in phar:///usr/local/Cellar/composer/1.0.0-alpha8/libexec/composer.phar/src/Composer/DependencyResolver/RuleSetGenerator.php on line 123
The issue was perplexing according to PHP I had allocated 128mb of memory for PHP, but apparently this wasn’t enough. It appears as though dependencies are managed within memory and all of the components that make up Laravel (mostly Symfony) take up more than 128mb of memory.
After recently deciding to switch to Navicat on my MacBook Pro from Sequel Pro, I encountered an issue where Navicat couldn’t connect to my MySQL server using either localhost or the local IP of 127.0.0.1. This is because MAMP will start the MySQL server using a socket. This just means you need to tell Navicat where your socket server is.
When creating a new connection you should see tabs; General, Advanced, SSL, SSH and HTTP. We want to specify the socket in the advanced tab.
A little unknown ability in Filezilla FTP client is the fact you can use private keys to connect to remote servers without a password. While in the site manager where you add and remove sites to connect to there is no option to provide a private key, it is actually somewhere else.
Go to the menu bar along the top: Click edit and then settings. A settings popup box should appear now with a whole heap of different options to select, but we are going to be clicking “SFTP” – you should now see some text mentioning public key authentication. This is where we will load our key.
After not long posting about the weaknesses in the iPhone 6 and iPhone 6 plus screen glass, reports of iPhone 6 Plus phones bending after being in your pockets have been emerging.
The weakness appears to be due to the fact the cut-outs for the volume buttons weaken the aluminium enclosure when pressure is applied.
A Youtube tech blogger Lewis Hilsenteger bent the iPhone 6 Plus on camera and while he did need to apply pressure, the phone did indeed bend.
By default Mac OS (Mavericks for me) doesn’t ship with pre-configured support for reading and writing to NTFS drives. You can read them, but you can’t write to them.
As I previously wrote in a post, you can enable NTFS write support in Mac OS Mavericks and up, but it involves a few steps and is more of a hack. This is where Paragon NTFS for Mac comes into the fold.
Apple’s much touted new feature in iOS 8 is the inability for lawful law enforcement requests to unlock their phone without the passcode.
In previous versions of iOS, law enforcement officials could obtain a phone and send it to Apple to get it unlocked, because of a change in how phones are encrypted, Apple can no longer do this.
But there is another way for law enforcement and attackers to still get in: guessing the passcode. To contrary belief, most passcodes are easily guessable for law enforcement or an attacker as people generally only use a small subset of criteria for their passcodes.
In this day and age you can never be too careful, this is why ensuring that any interaction you have with your remote servers is done using public and private keys via ssh. I have seen countless times people administering their servers using the root login with a weak password instead of public/private keys.
Important note
Your private key file should be kept safe. Under no circumstance should you ever give it out. The private key is the equivalent of the lock and the public key is the equivalent of a key to open that lock. Your generated keys should also be protected by a strong passphrase.
I am a big fan of Udemy and I have purchased about 13 courses off of the site (and counting) but sometimes I don’t have access to the internet on my laptop and watching videos (especially programming videos) on my Android phone which have been synced offline and being able to follow along isn’t easy or ideal.
I have found a clever and simple Python script that allows you to download your paid Udemy course videos so you can watch them on your Mac or PC offline without needing any kind of internet connection (except for the initial download).
Most instructions around on the web for decompiling and compiling Android APK files are for Windows PC users, but what about Mac users who have a native command line yo?
The steps are pretty much the same, except you need to do one more thing.
Requirements
– A Mac
– An internet connection
– Java SDK and JRE
– Android SDK
– Apktool
Step 1 – Install Java SDK and JRE You can download Java from this link. The Apktool will mostly use the SDK libraries, but JRE will be required for some tasks, so we install both just in case.