If you love to download music, your iTunes purchase history can get cluttered very quickly. Rather than sifting through hundreds of media titles that you downloaded days, weeks or even months ago, it is simple to delete entries from the “Purchase History” section without affecting your iTunes library.
Instructions:
1. Open iTunes.
2. Locate the “Store” section in the main menu pane on the left side of your screen and select “Purchased.” Your purchase history will populate in the main window.
3. Click “Edit” at top left of your screen and choose “Select All” in the pull-down menu. This will highlight every entry in your purchase history.
4. Right-click any of the highlighted titles in the main menu and select “Delete.”
Tips & Warnings
Choose any individual title you wish to delete by clicking on it once, then right-clicking the title and selecting “Delete.” You can also hold the “Control” key as you select multiple titles, or the “Shift” key to select consecutive blocks of titles.
If this is your first time deleting from your purchase history, iTunes may send you a pop-up message letting you know that the title is still in your library. This is a good thing. Simply click “OK.”
(if the link does not work, use Mozilla’s FTP server)
A 64 bit build is also available in the x86_64 directory of Mozilla’s FTP.
This how-to supposes that the downloaded file is saved in the “Downloads” directory situated in your home directory.
2. Extract
The downloaded file is a compressed .tar.bz2 archive. In case you want to Learn more on these extensions: tar, bzip2.
To extract this juicy archive, open the Downloads directory. Look for a file named firefox-8.0.tar.bz2, right-click on it and select “extract here“.
Alternatively, you can extract the archive from the command line:
cd ~/Downloads/
tar xjf firefox-8.0.tar.bz2
For those interested, here are the tar arguments used in the command: x : eXtract j : deal with bzipped file f : read from a file (rather than a tape device)
Launch the newly installed Firefox by running firefox8 in a terminal, or create shortcuts/icons referring to firefox8.
5. Updates & Final
Firefox 8 will manage its own updates independently of your system’s package manager, an download subsequent releases.
There will be no need to repeat the whole “procedure”… Enjoy Firefox 8!
B. Ubuntu’s case, Linux Mint and Debian
1. Ubuntu: no ubuntu-mozilla-daily ppa!
Many howtos on this subject will tell you to install Firefox pre-versions through Mozilla’s ppaubuntu-mozilla-daily.
Using this ppa will not only install the latest Firefox 10 nightly build, used to be called “minefield” – updated daily! It will also update your current Firefox and Thunderbird to test versions.
These testing versions are not meant to be stable or usable.
? Avoid this ppa unless you know exactly what you’re doing!
2. The Firefox Beta ppa: mozillateam/firefox-next
The firefox-next ppa will replace your current Firefox installation with the current available version in Mozillas Beta channel. Simply run these two commands in a terminal:
Note: you can use only one of these three channels (Aurora, Beta, and Daily) at the same time!
3. Official Ubuntu updates for Firefox (automatic)
Since Ubuntu 11.04 “Natty Narwhal”, Ubuntu will update automatically to the newest stable Firefox version when it is released. (it may take a few days more, though) This is also valid for Ubuntu 11.10 “Oneiric Ocelot” and upcoming releases.
5. Linux Mint 11, and Debian 6 “Squeeze”, …
This howto has been tested with success on the following distributions, with Firefox 6, 7 and 8:
Debian 6 “Squeeze” Linux Mint 10 “Julia” Linux Mint 11 “Katya” Ubuntu 10.04 LTS “Lucid Lynx” (Long Term Support, until April 2013) Ubuntu 10.10 “Maverick Meerkat” (support until April 2012) Ubuntu 11.04 “Natty Narwhal” (support until October 2012) Ubuntu 11.10 “Oneiric Ocelot” (support until April 2013)
this installation procedure is reliable and should work with a wide range of distributions. Please share your experience with OpenSuse and Fedora in the comments.
C. Uninstall/remove Firefox 8 (for non-ppa installations)
Remove the Firefox directory:
sudo rm -r /opt/firefox8
You also should consider changing back or removing symbolic links which pointed to the old Firefox directory. Change back:
sudo mv /usr/bin/firefox-old /usr/bin/firefox
Or remove the firefox8 symlink:
sudo rm /usr/bin/firefox8
D. Run multiple profiles and instances simultaneously
Problem: it is possible to run different Firefox versions with the same profile (profiles are compatible through major versions). However this is not very convenient, as Firefox will check the profiles extensions and plugins every time you start a newer or older version.
Solution: create a profile for each Firefox version. Create new profiles with:
firefox -no-remote -ProfileManager
The -no-remote option starts a new instance of Firefox even if there is already a Firefox instance running. Use the -no-remote option to run Firefox 8 and Firefox 9 instances at the same time.
Let’s say that you’ve created two profiles: ffox8_profile and ffox9-profile. You can start one instance of Firefox 8 and one instance of Firefox 9 with the following commands:
Now you may create desktop shortcuts / icons / launchers (Gnome: Custom Application Launcher) for each of these Firefox versions with their respective profiles.
If you need some svg icons to recognize your different Firefox installations, here they are. (Obviously these are NOT official Mozilla artwork, please use them wisely.)
Facebook is the place that kids hang out after school. Heck, it’s the place many of them hang out during school. It is definitely a platform they are comfortable with communicating on. Why not use student enthusiasm for Facebook to generate learning opportunities in the classroom?
I have seen several classes in the past few weeks work on Facebook projects. Students love them. These projects appeal to students because it is communication at their level. What I like about the project is that creating a fake Facebook profile requires a great deal of higher level thinking. Student have to take information and transform it. This forces students to be very creative. A fake Facebook page is an excellent way to see if student understand the concept behind a book, character, historical figure or even a science concept.
Science might be a little harder, but imagine students pretend that they are a part of a chemical reaction. They could create a profile for a certain compound and tell it’s part in the reaction through the wall posts. This might sound a bit crazy, but I think students would really get into it.
There are several different platforms for doing Facebook projects in the classroom. Here are some I have looked at in the past week:
Fakebook: This online app is the best I have seen. It is web based and easy to use. Students fill in the blanks, upload pictures and write status updates for the different people on the wall. I have not yet used this app with students, but I plan on using it this week. Sometimes, when a bunch of students use an app like this, we see how good it really works. I’ll be sure to let you know.
My Fake Wall: This is a cool template, much like Fakebook. I really like how it is set up. The app is web based and allows students to build as big a page as they like. The one draw back is that it doesn’t seem to work consistently. I have used this with several classes now, and sometimes it works and sometimes it doesn’t which creates quite the headache if this is the plan for class on a particular day. That having been said, it is still worth a try because it is so much fun.
PowerPoint template: This page template opens in PowerPoint, but functions surprisingly as a Facebook page. Adding pictures and status text is quite easy without creating a mess of the page. This is a three page template giving students quite a bit of creative license in a non-web based platform.
MS Word template: This template is a little harder to use and doesn’t look quite as good as the others, but it is another option. It does work in Word which is a plus if that is what students are used to using.
PhotoShop template (PSD): This one represents the most recent design of templates and rubrics for a Facebook project using a template created with Photoshop. This looks like another great option depending on your goals for the project.
If anyone knows of other fake Facebook applications or ideas for using these templates, leave a link in the comments.
The reason we secure a wireless network is to stop people from using the services of our network who don’t have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don’t secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:
1. Strategic antenna placement:
The first thing you have to do is to position the access point’s antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can’t obstruct its signals. Place it in a central location of the building.
2. Use WEP:
WEP stands for Wireless encryption protocol. It’s a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3. Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier. It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it’s attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4. Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5. Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6. Utilize access lists:
For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.
Today tip will help you to play with your iPhone mobile phones using secrets codes. These secret codes will work on most of the Apple mobile handsets. You can display the hidden information of Apple handsets and troubleshoot the routine problems with the help of these codes.
Follow the list of latest Apple codes list:
CodeAction
*#06#
To display the IMEI Number of the mobile
*225#
Use to display the balance detail of postpaid number
*#43#
Use to verify if call waiting is enabled
*#61#
Verify the number for unanswered calls
*#62#
Verify the number for call forwarding if no service is available
*#67#
Verify the number for call forwarding if phone is busy
*#646#
Use to display the minute detail of postpaid number
*777#
Use to display the balance detail of prepaid number
*3001#12345#*
Display the iphone inner settings
*#33#
To verify whether barring is enabled or disabled for outgoing
Give your internet browser instant amnesia with these quick tricks. A lot of these tactics make surfing faster and safer, too.
Cache out
Back in the bad old days of dial-up internet, web browsers tried to be helpful and speed up browsing by downloading and storing a cached copy of the web pages we visited, since calling up that information from our hard drives was a lot faster than downloading it every time we went to one of our favorite sites. Now, with the
widespread availability of fast internet connections, this cache of temporary internet files is more like our browsing software’s appendix than a must-have feature.
Be sure to delete your digital trail
Deleting these files when your browser closes, rather than letting them hang around, is definitely a good idea if you don’t want your computer — and anyone who happens to sit down at it — to know where you’ve been. Internet Explorer lets you do this automatically when the browser exits; Firefox, Safari, and Chrome all require you to delete these files by hand (though there are extensions for bothChrome and Firefox that let you automate the process).
Don’t know much about history
So, we’ve dumped out the temporary files that your computer has downloaded — but that’s only part of the solution. Your browser still remembers what pages you’ve been to (called the browsing history), a convenience that allows your browser to populate the address bar after you’ve only typed a few letters of the web address. However, by clicking the down arrow at the edge of the address bar, anyone can see at a glance a whole bunch of recent web destinations that browser has been to. Not exactly the way to keep a low profile if you’re doing some holiday shopping or job hunting on company time, to say the least.
Deleting your history purges this information from your browser’s memory (since it persists from one browsing session to the next, even if you purge your temp files).
Clearing your history is easy
Cookie monsters
Cookies, those tiny text files that let web pages know you’ve visited them before, are the third part of the equation. Their entire reason for being is to identify you and track your web habits when it comes to being a regular at a website, whether it’s Amazon or Facebook or Gmail. Tossing your cookies will allow you to visit websites as if you’d never been there before. Anyone snooping on your computer after you’ve cleared the cookies away won’t see their telltale leavings, even if the cookies themselves don’t contain anything but site addresses and the dates and times of your last visit.
When convenience gets inconvenient
Finally, there’s the matter of web browsers storing usernames, passwords, and other form data for sites you visit that require a username to log in. This information is a time-saver when you’ve got a million passwords to remember, but it can also be an Achilles’ heel if you’re trying to be stealthy about your web travels.
If someone else sits down at your computer to check email on the same webmail service you use, it’s far too easy for browsers to auto-fill the login fields with your username (and maybe even a password), so this is something you may want to scrub from time to time, too. After all, it’s one thing for somebody to glance at your web history and something else altogether if up comes your email inbox!
Private eyes
All of the current crop of internet browsers include a feature that lets you in effect surf off the record. The programs themselves will empty the cache and delete the browsing history when you finish; they won’t load any add-ons, and they’ll ignore website requests to store cookies.
No matter which of the major browsers you use, visit the Tools menu (or select the gear- or wrench-shaped icon that serves the same purpose) to choose to start a Teflon-coated browsing session, usually in a new window. The upside of explicitly opening a private browsing window is that it doesn’t inconvenience you by deleting your history, cookies, and any stored logins you normally use, while still cloaking what you do in that window from prying eyes.
There are plenty of reasons why you might want to use private, no-traces-left-behind surfing sessions, like planning a surprise getaway for you and your partner or keeping tech-savvy youngsters from knowing where you’ve been shopping for their birthday present.