Archive

Author Archive

RTMP Servers For Your Flash Streaming Needs!

January 27th, 2013 No comments

Flash is by far the most popular streaming format on the Internet today.  The most popular RTMP server is the Adobe Flash Media Server by Adobe but the professional version could end up costing you up to $2,000 USD!

There are open source RTMP servers, cheap RTMP servers or simply free RTMP servers to choose from.   In this article, we have listed bunch of RTMP server alternatives to Adobe’s popular Flash Media Server.

  1. Red5 – Advertised as an Open Source Media Server delivers a powerful video streaming and multi-user solution to the ©Adobe ©Flash Player and other exciting client technologies. Based on Java and some of the most powerful open source frameworks, Red5 stands as a solid solution for business of all sizes including the enterprise.
  2. Wowza Media Server – the high-performance, high-value unified streaming media and video software for any screen. For live or on-demand streaming to computers, mobile devices and IPTV/OTT endpoints, the Wowza® platform delivers superior features, benefits and functionality.
  3. RTMPDUMP – a toolkit for RTMP streams. All forms of RTMP are supported, including rtmp://, rtmpt://, rtmpe://, rtmpte://, and rtmps://.  You can pull existing RTMP streams and store as FLV to stream as VOD.  This tool is AWESOME.
  4. ErlyVideo Streaming Server – a modern video streaming server, written in erlang. You can use Erlyvideo to stream to Flash, iPad, Android, SetTopBox.  Unique features like capturing endless streams, streaming directly from Amazon S3-like storages and connecting to SDI make this server a best choice for building video infrastructure.
  5. RubyIzumi – an open source RTMP Server for Flash Video/Audio Streaming. It is written in (Pure) Ruby and it supports to broadcast MP4(H.264 + AAC). You can watch it on the latest Flash player on your browser.
  6. RTMPD – a high performance streaming server able to stream (live or recorded) in the following technologies: to and from Flash (RTMP, RTMPE, RTMPS, RTMPT, RTMPTE), to and from embedded devices (such as iPhone and Android), from surveillance cameras, and with IP-TV using MPEG-TS and RTSP/RTCP/RTP protocols. Also, crtmpserver can be used as a high performance rendesvous server. For example, it enables you to do audio/video conferencing, online gaming, online collaboration, and simple or complex chat applications. Hardcore RTMP streaming.
  7. Cygnal – the Gnash Project’s Flash Media Server-compatible audio and video server.
  8. RTMPy – RTMP for Python.  A Twisted protocol implementing the Real Time Messaging Protocol (RTMP), used for streaming audio, video and data between the Adobe Flash Player and a server.
  9. RTMPlite – a python implementation of the Flash RTMP server with minimal support needed for real-time streaming and recording using AMF0. It also includes an RTMP client and a SIP-RTMP gateway.
  10. WebStreamer – a Web-based system that allows you to stream local video files to many different devices, either via pseudo RTMP or RTMP.
  11. PHP Rtmp Client – Not really an RTMP server but worth mentioning here.  a simple RTMP client for PHP. It allows you to connect to servers and invoke methods.

 

So next time you have a streaming project in mind, don’t keep cost be the road block for you.  Choose one of the alternatives listed above and enjoy.

Categories: Streaming Tags:

3 Things You Must Know To Get Started With Wireless Internet Service

January 23rd, 2013 No comments

It is one thing to take a decision that you will switch from your conventional home cable connection
and Wi-Fi setup to the more advanced mobile internet connectivity and it’s a complete different thing
to actually get started using this new technology from scratch. This is why it is recommended that you
have a clear idea about the starting blocks of the mobile internet connectivity technology and ensure
that you seek help from your service provider at the sign of any problem.

Here are the top and most important 3 things about starting off using a mobile wireless internet
connectivity that you need to know in order to make your experience of transition a hassle-free one –

1. Getting Connected

When you have subscribed to a plan with the service provider of wireless mobile internet
connectivity of your choice, you will most probably be having the necessary device and
login credentials with you. In case you don’t have it, then you need not worry. Your service
provider will call you up with a convenient time for you to setup the connection once your
order has been processed and approved.

Remember to check with the service provider about any terms of usage that might be there
for the device for the mobile internet connectivity. Also check to see that all necessary
documentations of the device and the driver media are provided with the device. Many
service providers will also provide a wireless Wi-Fi router for your device in order to enable
you to get the internet connection on multiple devices simultaneously.

2. The Devices For The Connection

Once you have the necessary devices you will need to install the same with the computer.
Connect the device and wait for the computer to recognize the same. Once it has recognized
the device, it will ask for the driver media which you will need to insert for installation of the
driver and the service provider’s software. Once done with these, you are all set to go.

There are various ways in which you can pay for your device, both the USB dongle come
antenna for connecting to the internet and the Wi-Fi router that your service provider provides
along with the package. You might need to pay an initial one time refundable security deposit
for these devices or you might be required to purchase the same from the service provider or
buy your own from a shop. Some service providers like clear internet promotions offer the
device free of any additional cost.

3. Range And Security Of The Devices

Remember that any form of wireless or Wi-Fi device, no matter how strong it is comes with
a range beyond which it will be unable to transmit any data and provide internet connectivity.
You will need to ensure that you take care of this aspect of the router when setting it up in
your home. Also ensure that you have a secure password protecting your internet connection
from unauthorized intrusion.

With these 3 aspects of the getting started of wireless mobile internet connectivity taken care of, you
can rest assured of a good time!

Categories: General Tags:

5 Ways You Can Protect Yourself from Online Threats

January 22nd, 2013 1 comment

In a world where everything is connected online, it is very easy to lose the files on your
computer or even your own identity. Protecting yourself from the threats in the virtual world is
one of the primary concerns.

There are scams being hatched to hoodwink people into disclosing their personal details and
account numbers and the security breach is too advanced to control. Do worry too much because
there are experts who can guide you through these problems. Given below are five ways in
which you can protect yourself from these online threats.

1. Install Software For Internet Security

It is no longer sufficient to install only antivirus software in your computer or laptop. Use
software that not only prevents your computer from virus threat but also protects you from
spyware and key loggers. The software should also be able to monitor if your computer is being
accessed by any unauthorized person.

Some softwares, which work as both antivirus and protect your computer, may be a little
expensive. But they are worth it. If you do not want something expensive, you can also find
some free software on the net that you can download.

2. Install A Firewall

A firewall acts like buffer zone between your computer and the whole internet. It is created in
a manner that it allows only that information that you allow to pass through it. This is a great
safety device for your computer, as its programming helps you stop the attack from key loggers,
malicious hackers and worms. You can get lot of internet security software that also has a
firewall.

3. Scan Your Computer Every Week

There are several applications that automatically check the computer for any potential threats. If
your software doesn’t carry out automatic checks then you should scan your computer at least
one every week. It may be a hassle when you are working on the computer, so you may do this
when you are not working. This is important to check that your computer and all the data you
store in it are safe.

4. Update All Your Software Regularly

The hackers and people who are phishing are regularly updating their moves, so it is important
that you keep your internet security software updated as well. You do not have to buy an updated
version from the market, most companies allow you to download the latest version from their website once you have bought the product from them.

5. Keep Back Up For All Your Files

You have your whole life on your computer and when your computer falls prey to a virus or is
hacked, you are completely at loss. To avoid this, you should make a smart move and use any
reputed online backup service for your files and documents. There are various services online,
which are trustworthy and you can make full use of them.

Follow these safety measures and be wary when interacting with unknown people on the
internet.

Categories: Security Tags:

JDK6 on Solaris

January 14th, 2013 No comments

Got this weird error today on Solaris 5.8.  It could happen to other versions as well.  This is when I switched to JDK6 from JDK5…

UTF ERROR [“../../../src/solaris/npt/utf_md.c”:49]: Failed to complete iconv_open() setup

And here is a quick fix…this may or may not indirectly affect the application you run so use at your own risk.

The Fix:

# cd  /usr/lib/iconv/geniconvtbl/binarytables
# cp “ISO8859-1%ISO646.bt” “UTF-8%646.bt”
# cp “ISO646%ISO8859-1.bt” “646%UTF-8.bt”

Categories: Solaris Tags: ,

Super commands for Unix beginners and veterans!

January 8th, 2013 No comments

As a sysadmin of many years, I’m always fascinated by the world of *Unix and the untapped commands and tricks that are still there that I haven’t found out yet.  There are numerous ways to do something quicker, easier and more efficiently if a sysadmin knows where to look.

In this article, we’re listing the top most useful commands that any sysadmin should know and use when troubleshooting or in general working around their way in a Linux or Unix environments in general.

This command allows you to save a file you edited in VI without the needed permission for that file:

$ :w !sudo tee %

An alternative to traceroute or ping command on Linux is to run mtr:

$ mtr yahoo.com

Ever wanted to execute a command without saving it in history?  Here we go:

$ <space>who  (This will run the ‘who’ command without it being recommended in your history file).  Set your PS1=” ” to do it automatically by prepending space.

Ever found your screen or garbled up and you end up closing session and logging back in?  Well dont’ do that! Just type:

$ reset

To capture your activity on Linux desktop just type:

$ ffmpeg -f x11grab -s wxga -r 25 -i :0.0 -sameq /tmp/wow.mpg

Want to reverse tunnel?  Here is how you start a tunnel from some external site’s port 80 to your local server port 8001.  You can then hit that site via http://localhost:8001

$ ssh -N -L2001:localhost:80 blah.com

Just a single job around 8PM, better than a cron:

$ echo “who;ps -eaf” | at 8pm

Now, for one of the most helpful if not the most helpful command that’ll allow you to bind port to a process ID…perhaps better than lsof:

$ netstat -tlnp

Ever wanted to tweet from shell?  Perhaps you want to alert your twitter that your service is down?

$ curl -u user:pass -d status=”I am tweeting nigga!” http://twitter.com/statuses/update.xml

Run your website all in memory, here is how:

$ mount -t tmpfs tmpfs /data/blah.com -o size=10g  (Assuming you have at least 10g on server to spare, you now have a new partition to which you can copy your website to)

How about a secure mount via SSH?  First download SSHFS and then:

$ sshfs user@server:/path/to/mount/from /path/to/mount/point

 

There is more!

Categories: linux Tags: , , ,

The wait is over…iPhone 25 has been released right on time!

January 6th, 2013 No comments

This is the story of Bob Seaskul and his determination and patience to wait for the latest and greatest iPhone ever.  At the Apple Worldwide Developers Conference on June 11, 2035 – the latest and final release of iPhone was revealed.  This of course is no surprise as Apple had already hinted at the discontinuation of the product on WWDC ’30 when they released iPhone 20 along with IOS version 41.

What does this have to do with Bob you might be saying to yourself?  When the first iPhone was released on June 29, 2007, Bob was one of the original people who had stayed on line for 3 days and nights to buy his new gadget.  He loved the product at the time as did everyone else…its futuristic look, touch screen and nicely presented user interface made him and millions of other people fall in love with it.

Not so long after the first release of iPhone, the second release came out and a year later the iPhone 3 and then iPhone 4 and finally iPhone 5.  Bob without much hesitation would stand online for days to lay his hands on a brand new iPhone and never had a second thought on whether he needed to upgrade or not.  As long as Apple released a new version, he would just blindly and happily purchase a new one.

When Bob purchased iPhone 4 on June of 2010, he was excited as ever before despite it’s new shape and look but in the back of his mind he was looking forward to 2011 when he’d lay his hands on the iPhone 5 and the amazing features that would bring!  When June, 2011 came around Bob was jumpy and excited at the WWDC and couldn’t wait to see the new iPhone 5!  However, to his disappointment iPhone 4S was released and not iPhone 5 for which he was so looking forward to for over a year!  At that point on October 14, 2011 he promised himself to not buy another iPhone every year but rather wait until its final release so he could have the latest and greatest of the iPhone family!

Bob saw new iPhones come and go, the iPhone 5 came then 6, then 7 and 14 and so on but Bob stayed true to his promise and reaffirmed his conviction and promise to himself everyday in front of the mirror so that he never betrays himself purchasing another iPhone and then see another one come into the market a few months to a year later!  Bob’s iPhone 4 was almost unusable with new apps coming out that needed large amount of memory and cpu power but he never faltered from his promise and went on with the pain and misery of using his iPhone 4 came with over the years.

Bob was 27 years old in 2007 and when he heard the announcement at WWDC on June of 2030, he had turned 55 years old in March of that year.  He couldn’t believe his eyes and ears when he heard from Apple CEO Alexis Ohanian that iPhone will be discontinued in 5 years and the final release, iPhone 25 will be made available on June of 2035 when Bob is 60.  Bob didn’t care how old he was going to be, besides he only saw age as just numbers…”what matters is the mindset of the person, age is just a stupid number!”, he’d tell himself when he’s reminded of his age.  Bob has been using iPhone4 for over 27 years now and has grown tired and sick and suicidal at times because of it.  The new iPhones looked much different, in fact they were like small chips, it did much more than just a phone.  It could turn into a computer, a car and a large screen 108″ TV and even drove a car but Bob didn’t give a shit what else it could do….he just wanted the latest release of the iPhone and he was finally at peace to hear that the final release will be available in 2035.

By the time the WWDC ’35 came around on June 2035, Bob’s story was the most trended topic on the internet, specially on Earth where Bob resided. The inhabitants of planet Khilmook and Mazar also new of Bob as they had more frequent political, business and social encounters on regular basis.  Some humans migrated to Mazar and others to Khilmook for better life and opportunities and vice versa…overall the future had changed so much than the 2007 era that Earth couldn’t be recognized.  No more did people just live on the surface but rather in freaking balloon shaped thingies with their families and holographic pets.  Out of all the fortune 500 companies, only Apple and Costco had survived.  BJ’s went out of business unfortunately as it carried weird brands and for some reason water was more expensive there than at Costco’s.

So Bob, in front row seat at WWDC ’35 was called to the stage by Alexis to present the iPhone 25 and with sheer joy and excitement, he went to the stage to do so.  To his astonishment, the new iPhone 25 was well… invisible.  It wasn’t a physical device anymore, event that micro dot that was iPhone 24 and previous was now replaced by nothing.  WTF? Bob lost it then and there and took out his old iPhone 4 which he had turned into a small pistol and started shooting at the Apple CEO who just appeared unharmed…it so happens he wasn’t even there but rather his damn hologram.

Bob, disappointed and emotionally unstable at this point gives in to the authorities.  His iPhone 4 that was turned into a pistol was confiscated and returned to Apple who is now displaying it at their manhattan store in South Africa.  You might be asking yourself Manhattan in Africa???  Long story…the geological changes that occurred in the same span of time wasn’t the focus of this article…

Categories: iPhone Tags: ,

Finally, iPhone 5 Release Date Revealed!

May 24th, 2011 No comments

The entire world is eager to know when will iPhone 5 be released?!  In fact, more people are concerned about iPhone 5 release date than the date when the world will come to an end.  There is just no interest in dying i guess!

Anyhow, according to tradition, Apple usually releases it’s latest and greatest products in June.  However, in case of iPhone 5 and in particular because of extensive marketing and somewhat surplus of iPhone 4 products, they’re looking to hold off until later in the year before the debut of iPhone 5.

Originally, July 2011 was the month when Apple’s iPhone 5 would be released to the public but according to MacRumors, iPhoneSheep.com and representatives of T3.com, the new date although not official, has been set to November of this year.

iPhone 5 comes with some slick new additions and improvements.

The iPhone 5 Features  at a closer view:

  • Storage Capacity: Apple is offering 16 GB and 32GB iPhone since 2009, so apple is aware this it would be hard push iPhone 5 without having 64 GB of storage. iPhone 5’s lowest model will come with 32G of space and 64G of memory.
  • Signal Strength: Unlike iPhone 4, iPhone 5 is not having signal issue, as they are offering the strongest signal strength of any iPhone model ever even the best of any Smartphone to ever come tomarket.
  • Face Recognition: The new iPhone 5 will have Face Recognition for Security sake so that you don’t have to worry about other people stealing your phone and trying to use it.
  • Thickness: All three iPhone had thinner bodies than the previous model so the iPhone 5 can be the thinnest yet & much nicer overall body design of the phone.
  • Longer Battery Life: iPhone 5 will have Up to 14 Hours of Talk Time On The 3G and 7 Hours on the 4G.
  • Video Chat: Video Chat on a 4G network instead of a slow 3G one
  • A5 Dual core processor: For Outstanding Video Quality Apple May Introduce A5 Dual Core Process with iPhone 5
  • Screen: Shatter Resistant and Scratch Resistant Screen
  • Built In GPS: You’ll never get lost or have to download one of those stupid GPS apps.
  • Surprise: As the tradition of apple iPhone 5 will also unveil some surprise features.

For more visit our official website on all iPhone related products, reviews and application at iPhoneSheep.com

Categories: General Tags:

Tool of the week: urlShort

January 14th, 2011 No comments

Almost everyone and their Mama is bringing up a URL shortening web site. So we figured why not preview a neat tool that does the exact thing without any manual coding intervention.

urlShort is a URL shortener, complete with a full API, URL previews, simple installation and management, custom names/aliases, and more.

  • Restore reliability and transparency to short URLs by operating your own service specific to your domain.
  • Provide your own short URLs to your content, rather than relying on others.
  • Using PHP & MySQL, urlShort lets you provide short URLs similar to TinyURL, except on your domain.
  • Be smart: Offer users of social networks likeTwitter with reliable, and safe short URLs.
  • If you know PHP and MySQL, you can change it to do anything you want.
  • Feature complete, with a full API, custom names, simple installation and management, preview functionality, statistics and more.
  • Download it here.
Categories: tools Tags:

Tool of the week: Marauroa

January 3rd, 2011 No comments

Interested in running your own dedicated game server on Linux?  Give Marauroa a try.

Marauroa is a multiplayer online game framework server. It uses a multithreaded server architecture with a TCP oriented network protocol, a MySQL based persistence engine, and a flexible game system. The game system is totally expandable and modifiable by game developers and is able to run Python scripts defining the game’s rules. Marauroa is based on a design philosophy called Action/Perception. Marauroa is totally game agnostic and makes very little assumptions about what are you trying to do, allowing a great freedom to create any game type.

  • Download it from here.
Categories: linux Tags:

10 password management tools for Linux

December 16th, 2010 No comments

With so many different accounts and passwords, it’s much harder now to keep all those credentials in our heads.  Luckily there are tons of secure password management tools out there that we can use to keep our accounts safe and encrypted.  In this list, we’ve put together a list of 10.

cpm – a small console tool to manage passwords and other sensitive data and store them in a public-key encrypted file. It also allows you to configure the whole hierarchy yourself, so it’s easily adoptable for many requirements. The encryption is handled through GnuPG, and the data inside is stored as XML.

Strip – a password and account management program for the Palm Computing Platform. Designed to fit the needs of both IT professionals and the average user, it combines ease of use with flexibility and security. 128 bit encryption ensures that even if your Palm Pilot is lost or stolen your important account and password information will remain confidential. Strip has a quick and easy to use interface, with many useful features including the ability to beam shared accounts to other Strip users.

phpPasswordManager – a Web-based password management system. It organizes your different accounts in groups and makes them accessible over a Web interface. Each account can be encrypted with a different master password.

Pwman3 – a console based password management application. It uses SQLite to store information, and can encrypt it with AES, ARC2, ARC4, Blowfish (default), CAST, DES, DES3, IDEA, or RC5.

Open Sesame – a Web application for password management.

Locked Area – a highly sophisticated password protection and membership management system. It has been designed to be as secure as possible while it still runs hands-free with no input from the Webmaster needed. Locked Area uses Apache’s .htaccess and .htpasswd along with DES randomized salt or MD5 encryption of passwords for increased security. It also includes a member database that lets the administrator maintain a mailing list along with the member’s area.

Secret Squirrel – a basic password management application written in Java. It uses Blowfish and SHA-384, performs password generation using the Java secure random object (fully configurable), and supports password groups.

myPMS – a Web-based password management application which will require you to remember only one password, making the management of your passwords simple. It uses simple HTML, PHP, and a MySQL database to store your passwords.

Password Chest – a simple password management application. It reads and writes the Password Safe V3 format and is meant to provide a native Mac OS X user experience.

Web-KeePass – a Web based port of the KeePass project, which is an easy-to-use password manager which helps you to manage your passwords in a secure way. All passwords are unlocked with one master password. It is focused on deep encryption, password secrecy, and ease of use. Web-KeePass is a full-featured, client-server application. It comes bundled with Tomcat 5.5 but is easily configured to any Java Servlet Web server.

Categories: linux, tools Tags: ,