10.6.4 and printing to RIP, without a printserver

coming soon, after I clean up my notes.

Posted in Macintosh | 1 Comment

Installing a GUI for Ubuntu Server

If you need to have, or wish to install a GUI for the Ubuntu server here are the packages required for a visual desktop.

  • xorg – X window system
  • gnome-core – GNOME Desktop environment
  • gdm – is the GNOME Display Manager, a graphical login program.
  • gnome-applets – is a collection of many applets for your GNOME panel.
  • gnome-system-tools – is a set of configuration programs for Linux and other Unix-like operating systems
  • gnome-utils – GNOME Utilities for the GNOME Desktop contains the following http://live.gnome.org/GnomeUtils
  • ubuntu-artwork – This package contains merely the Distributor Logo and pulls in all the
    other components via Depends.
  • compiz-gnome – OpenGL window and compositing manager – GNOME window decorator
  • sysv-rc-conf – gives an easy to use interface for managing /etc/rc{runlevel}.d/ symlinks.
  • fast-user-switch-applet

– sudo apt-get install xorg gnome-core gdm gnome-applets gnome-system-tools gnome-utils ubuntu-artwork compiz-gnome firefox sysv-rc-conf

– sudo apt-get install fast-user-switch-applet

The gdm (desktop) will start automatically when the server starts. For an even leaner setup, to start the gdm, open a terminal and run:

– sudo sysv-rc-conf

Look for “gdm” in the list and then uncheck (using the space bar) the X under column (runlevels) 2 and 3. Now the GUI will only start if you run:

– startx

Have fun.

Posted in Linux | 1 Comment

Creating an Encrypted Disk Image in Snow Leopard

To encrypt and securely store data, you can create a read/write image or a sparse image:

  • read/write image consumes the space that was defined when the image was created. For example, if the maximum size of a read/write image is set to 10 GB, the image consumes 10 GB of space even if it contains only 2 GB of data.
  • A sparse image consumes only the amount of space the data needs. For example, if the maximum size of a sparse image is 10 GB and the data is only 2 GB, the image consumes only 2 GB of space.

If an unauthorized administrator might access your computer, creating an encrypted blank disk image is preferred to creating an encrypted disk image from existing data.

Creating an encrypted image from existing data copies the data from an unprotected area to the encrypted image. If the data is sensitive, create the image before creating the documents. This creates the working copies, backups, or caches of files in encrypted storage from the start.

Note: To prevent errors when a file system inside a sparse image has more free space than the volume holding the sparse image, HFS volumes inside sparse images report an amount of free space slightly less than the amount of free space on the volume the image resides on.

To create an encrypted disk image:

1 Open Disk Utility.

2 Choose File > New > Blank Disk Image.

3 Enter a name for the image, and choose where to store it.

4 In the Name field, enter the name you want to appear when the image is mounted.

5 Choose the size of the image from the Size pop-up menu.

Make sure the size of the image is large enough for your needs. You cannot increase the size of an image after creating it.

6 Choose a format from the Format pop-up menu.

7 Choose an encryption method from the Encryption pop-up menu. AES-128 or AES-256 is a strong encryption format.

8 Choose a partition type from the Partitions pop-up menu. The default is Single partition – Apple Partition Map.

9 Choose a format from the Image Format pop-up menu.

Although there is some overhead, the sparse format allows the image to maintain a size proportional to its contents (up to its maximum size), which can save disk space.

10 Click Create.

11 Enter a password and verify it. You can access Password Assistant from this window.

12 Deselect “Remember password (add to Keychain)” and click OK.

Creating an Encrypted Disk Image from Existing Data

If you must maintain data confidentiality when transferring files from your computer but you don’t need to encrypt files on your computer, create a disk image from existing data.

Such situations include unavoidable plain-text file transfers across a network, such as mail attachments or FTP, or copying to removable media, such as a CD or floppy disk.

If you plan to add files to this image instead of creating an image from existing data, create an encrypted disk image and add your existing data to it.

To create an encrypted disk image from existing data:

1 Open Disk Utility.

2 Choose File > New > Disk Image from Folder.

3 Select a folder and click Image.

4 Enter a name for the image and choose where to store it.

5 Choose a format from the Image Format pop-up menu.

The compressed disk image format can help you save hard disk space by reducing your disk image size.

6 Choose an encryption method from the Encryption pop-up menu. AES-128 or AES-256 provide strong encryption.

7 Click Save.

8 Enter a password and verify it. You can easily access Password Assistant from this window.

9 Deselect “Remember password (add to Keychain)” and click OK.

Posted in business, Macintosh, Security | 6 Comments

Creating Encrypted PDFs in OS X 10.6

You can quickly create password-protected, read-only PDF documents of confidential or personal data. To open these files, you must know the password for them. Also, using an encryped disk image is more secure than using an encrypted PDF.

Some applications do not support printing to PDF. In this case, create an encrypted disc image.

To create an encrypted PDF, read-only document:

1 Open the document.
2 Choose File > Print.

Some applications don’t allow you to print from the File menu. These applications might allow you to print from other menus.

3 Click PDF and choose Save as PDF.
4 Click Security Options and select one or more of the following options:

  • Require password to open document
  • Require password to copy text images and other content
  • Require password to print document

When you require a password for the PDF, it becomes encrypted.

5 Enter a password, verify it, and click OK.
6 Enter a name for the document, choose a location, and click Save.
7 Test your document by opening it.

You must enter the password before you can view the contents of your document.

Posted in business, Macintosh, Security | Leave a comment

Enable Personal File Sharing in Ubuntu 10.04

With the new Ubuntu 10.04, if you want to use or have used personal file sharing with previous versions of Ubuntu and have found that you cannot enable this in the new version… There are a couple of packages that need to be installed in order to enable this in the new version. There is a bug report already filed for this issue Bug #536766, and hopefully there will be a fix for this soon.

The files that you will have to install are:

  • apache2.2-bin
    Apache HTTP Server common binary files

    The Apache Software Foundation’s goal is to build a secure, efficient and
    extensible HTTP server as standards-compliant open source software. The
    result has long been the number one web server on the Internet.

  • libapache2-mod-dnssd
    Zeroconf support for Apache 2 via avahi

    mod_dnssd is an Apache HTTPD module which adds Zeroconf support
    via DNS-SD using Avahi. This allows Apache to advertise itself and the
    websites available to clients compatible with the protocol.

Install both from the synaptic package manager, and reboot after you have installed. Once you have rebooted the computer, you will be able to enable the personal file sharing for Ubuntu 10.04

Posted in Linux | Tagged , , | 30 Comments

Ubuntu Hardy Heron v8.04 LTS + OSCAR v9.06 VMware image

Ubuntu Hardy Heron v8.04 Server & OSCAR McMaster Clinical Management System (CMS) RELEASE 9_06

What is OSCAR McMaster Clinical Management System (CMS)?

OSCAR is a Suite of Applications which serve to enhance the health and social service community’s ability to provide the highest level of care. All OSCAR applications are built in free open source software, which means you are free to download the program, use the program, or modify it. OSCAR Electronic Medical Record (EMR) has full billing capabilities, chronic disease management tools, prescription module, scheduling and many other features. OSCAR can run locally in an office or be accessed over the internet.


You can access either through Firefox in the vmware image, or through your host operating system by inserting the ip address of the vm server  ( )

This build is for demonstration, if you would like to use the build for production….

  • set the mysql password to something of your own
  • set the postgesql password to something of your own
  • a ssl certificate needs to be configured for you server, to that tomcat uses the https port and not the http port
  • the backup cron needs to be setup for you environment

and that is about it.

Posted in Linux, Open source, Open Source Medical, Oscar Medical | Tagged , | 1 Comment

VMware Server 2.0 + Ubuntu Hardy Heron v8.04 LTS + OSCAR v9.06

Coming soon…

How to get VMware Server 2.0, Ubuntu Hardy Heron v8.04 LTS & OSCAR v9.06 to play together nicely.

oh and yes we do have a working VMware image of Oscar EMR


Posted in business, Linux, Open source, Open Source Medical, Oscar Medical, Windows | Tagged , , , , | 4 Comments

Community fundraising event for the Campbell River food bank. A live, 24 hour a day marathon radio broadcast from within a 53 foot trailer.

WHO :      99-7 The River” in Campbell River

WHAT :    Community fund-raising event for the Campbell River food bank. A live, 24 hour a day marathon radio broadcast from within a 53 foot trailer.

WHEN :    Starting 7am, Tuesday December 1st, 2009

WHERE : Merecroft Village Shopping Centre, corner of Merecroft and South Dogwood Street, Campbell River.

WHY :      To fill the trailer with food for the Campbell River Food Bank.

You can joke about being on a “K-D diet” … Lots of us lived on pasta and ketchupduring our young and carefree days, when we had more important things to do with our lives than eat fancy meals. Can you imagine living a life where having a box of pasta could be your only meal that day? Unfortunately that is a reality for some families here in Campbell River. 99-7 THE RIVER morning show host DAVE REYNOLDS has announced a major community initiative for Campbell River… “THE RIVER RELIEF TRUCK”. It’s a 53 foot trailer that will be parked at Mercroft Village and it starts empty, except for Dave and the River morning flow team.

Dave will be living in the trailer, around the clock, 24 hours a day, until the trailer is filled with food for the Campbell River food bank. keep listening to THE RIVER for details as, once again, Campbell Rivers folks help Campbell River families in need.

CONTACT : Dave Reynolds, morning show host and Programme Director 99-7FM “The River” , Campbell River.

Phone         250 287-7106

E-Mail           dave@997theriver.ca

Address        470-13th Ave – Campbell River B.C. V9W 7J4

Posted in Uncategorized | Leave a comment

Budget 2009 provides Canada Health Infoway with $500 million to support the goal of having 50 per cent of Canadians with an electronic health record by 2010.

Canada Health Infoway


An efficient and effective health care system continues to be a top priority for Canadians.
The implementation of health information systems in Canada, often referred to as electronic health records, is a critical element to achieving this goal by enhancing the safety, quality and efficiency of the health care system. Such systems will not only contribute to reducing waste and duplication within the health system, they will also contribute to preventing adverse drug events, improving the management of chronic disease, improving access to care and boosting productivity.

For the last several years, Canada Health Infoway has been working toward the goal of having electronic health records in place across Canada. Infoway’s actions are already translating into real benefits for patients throughout Canada. For example, in Nova Scotia, the shared diagnostic imaging program provides the delivery of digital images of X-rays, MRIs, CT scans and ultrasounds to authorized health practitioners where and when they are needed. Nationally, Infoway estimates that investments in digital diagnostic imaging technology have already increased productivity to a level equivalent to adding more than 500 radiologists to Canada’s health care system.

Patients in remote northern communities are now connected with health care professionals in urban centres through telehealth—improving their access to care.
Budget 2009 provides Canada Health Infoway with $500 million to support the goal of having 50 per cent of Canadians with an electronic health record by 2010. In addition, this funding will be used to speed up the implementation of electronic medical record systems for physicians and integrated points of service for hospitals, pharmacies, community care facilities and patients. An electronic medical record system allows doctors and other health care providers to chart patient health information using a  computer, thereby avoiding duplication of testing and helping to ensure patient safety and effective treatment.
This $500-million investment will not only enhance the safety, quality and efficiency of the health care system, but will also result in a significant positive contribution to Canada’s economy, including the creation of thousands of sustainable, knowledge-based jobs throughout Canada.

Posted in News, Open Source Medical | Tagged , , , , | Leave a comment

ikee worm & how to change your root ssh password for your Jailbroke iPhone

Though the ikee worm and other recent incidents have highlighted security risks facing users of jailbroken iPhones, the question remains: If you are using a jailbroken iPhone, just how insecure is it and what can you do about it?

The first known worm for the Apple iPhone is sweeping across Australia, and it is taking advantage of default SSH passwords on jail-broken phones.

What’s clear is that if you have jailbroken your iPhone or iPod Touch, and installed SSH, then you must always change your root user password to something different than the default, “alpine”. In fact, it would be a good idea if you didn’t use a dictionary word at all.

Presently it appears that the worm does nothing more malicious than spread and change the infected user’s lock screen wallpaper. However, that doesn’t mean that attacks like this can be considered harmless.

It looks like the only fix, since the worm disables ssh on the phone, is to reformat the phone. The files aren’t too terribly hidden, but how do you remove them if you can’t get into your phone? Reformat looks like the only way how.

If you would like to hear all about the worm from the creator itself you can get it from the Risky Business Podcast #131 from Apple’s itunes. or http://risky.biz/RB131

This looks like the start of things to come for mobile devices, Intego claims iPhone/Privacy.A a new worm is far more dangerous than the Ikee worm, takes advantage of the same vulnerability in the iPhone as the Ikee worm, allowing hackers to connect to any jailbroken iPhone whose owners have not changed the root password.

The tool reportedly allows a hacker to silently copy user data from a compromised iPhone including email, contacts, SMSs, calendars, photos, music files, videos, as well as any data recorded by any iPhone application insists Intego. This new hacker also tool gives no indication that it has invaded an iPhone.

Change Root Password of Your iPhone

Open the Cydia and go to Search Tab. Search for MobileTerminal.

Tap the MobileTerminal from the search results.
Tap the Install button at the top-right

Now tap the confirm button at the top-right.
Once you’re done with the installation, press the big Return to Cydia button.

Now press the Home button to close the Cydia and open the MobileTerminal from your iPhone SpringBoard.

type su and press return key at the bottom-right.
Now input alpine as your password and press return key.

Once the password is entered correctly, you’ll be logged in as root user.
Now input passwd and press return key

You will be prompted to input a new password for root. Input your desired new password and press return.

you’ll be asked to retype your new password again and hit return key.

Congratulations you’ve secured your iPhone by changing root password from unauthorized access.

Posted in Security | Tagged , , | 1 Comment