I just found a problem with IE9 in how it handles the load event for img tags. With IE8 and earlier if I wanted to perform some JS function after an image loaded I could do something like this:
Category: Uncategorized
Eshop Authorize.net AIM Integration
Eshop is a nice ecommerce plugin for WordPress but it does not support taking credit card information directly on the site but redirects the customer to Authorize.net site or Paypal or some other online payment processing. I had a need to accept cards without redirecting the customer to a external site so I wrote a patch for Eshop. Download patch here
UPDATE: Eshop Plugin has been discontinued. I recommend WooCommerce Instead.
Install Adobe Flash Player 10.1
Flash Player 10.1 beta is out and it makes huge performance improvements over 10. Windows users get the use of graphics acceleration which drastically reduces CPU usage when watching videos and playing games. Linux and Mac version also have a speed increase. In one benchmark on my Linux system my score doubled over 10. For the most part it’s pretty stable so if you’re tired of slow flash performance I’d recommend you update. You can download it from Adobe Labs.
The Wizard Vs the Basty
This is a little video my sister made. It is pretty weird but pretty funny. She was complaining it was not getting enough views so I put it here for her.
What to do with a cursed computer
What to do with a cursed computer
There’s all kinds of fun things broken computers are good for, after you’ve tried everything to fix it and the computer proves to be of no good use. Below is what I would consider the top 10:
- Throw the computer off of a high point. At least 3 or 4 stories high would be good. I’ve done this before and it tends to be anti-climatic. If you choose on doing this be sure you’re the one throwing it, it’s more fun that way.
- Sell you computer on ebay. If you have a recent computer this might be viable option. There are several people that sell their computers “as-is” and make a small amount of change.
- Plug your computer’s power connector in backwards and let the sparks fly. This is much easier to do with older computers like 386’s than the new models. With old atx style motherboards you can switch the two power connectors on the motherboard and let the system fry itself. Some 486’s even let you plug the CPU in incorrectly which made a fun amount of smoke. With new computer’s one can try overclocking them to extreme levels and then removing the heatsink to provide a similar effect.
- Burn it’s body, throw the bones through a wood chipper, mix it with cement and throw it in the ocean or a nearby lake.
- Leave it in your unlocked car and hope someone takes it. Better yet, find someone else’s unlocked car and leave it there.
- Do your civic duty and take it to a computer recycling center. Really, they do exist try looking in the phone book.
- Decorate your apartment with it’s dead parts or better yet use them for body piercings.
- Just take it out back and shoot it. Or go lethal on it Office Space style.
- Donate it to a charity. You’ll have a better chance of them accepting it if you just leave it at their doorstep. Don’t even think about taking it off your taxes.
- Have a white elephant party.
- Keep it on your desk and use it as a perpetual excuse why you can’t do things like, your homework, the dishes and paying bills.
Virtual Box
Virtual box – fast emulation for Linux
Having tried qemu, vmware and virtual box I have found virtual box to be the easiest virtual machine for Ubuntu to use without sacrificing any performance.
Introduction To Linux
Introduction to Linux
I first started using Linux back in the days when Red Hat 7 was the latest and greatest. I started using it because I wanted to be able to tweak my operating system more than windows would let me do. I wanted to be proficient using regedit but there was like no documentation at all about the windows registry. Compared to Linux windows is like a book with two pretty covers but all the pages are white with the contents of the book written in white ink. You can’t do anything with the stuff inside of windows.
Yahoo! Webcam in Linux
Webcam support for Yahoo Chat in Linux
I searched for countless hours to find a way to connect to Yahoo webcams reliably from Linux. Finally I found GyachEi. Which stands for Gyach Enhanced Improved. Gyach was originally created as a yahoo only chat client. It was rather incomplete until someone came along and created Gyach Enhanced adding webcam support including broadcasting and viewing as well as voice chat. At first I tried GyachE but found it to be rather unstable and continued my search for a full featured Yahoo! client. I found GyachE Improved which was created by the GyachE community after the developer of GyachE stopped work on it.
GyachEi which can be found at the GyachEi website is a Yahoo! client that supports most of the features of the official client. It was created with the philosophy that multi-protocol clients were slower to develop and implement new features because they had to insure compatibility with all the protocols. As far as I know it is the only client that supports voice chat and webcam broadcasting in Linux.
Linux on Dell Latitude 100L
Linux on the Dell Latitude 100L
I’ve had my Latitude for about 6 months and I’ve been pretty happy with
it. The hard drive has only been replaced once 4 months after I got it.
The motherboard lasted a good 5 months so it’s not too bad, as long as
you have a 4 year warranty. If I didn’t have a warranty I would have
hated it. It runs Linux pretty good. Only a few things have given me
trouble, and I have given my solutions to them below. Hopefully they
will be useful to you too.
Spyware Prevention
Spyware Prevention
Let me first start by defining spyware as any program that does undesirable things to your computer. Spyware is also known as adware, malware, badware etc. I use the term spyware simply because it is used the most and most people understand it. Back in the early days of computer and the windows operating system the only thing you had to worry about was viruses. Now viruses are almost forgotten with the rampantness of spyware. It used to be all you needed was a good anti-virus software and you were protected, now you need a firewall, an anti-spyware program, an anti-virus program, a spam filter, and a pop-up blocker.