Recently I bought myself an iPod Touch 8Gb and off course a couple of (usefull) applications/games.

Wifitrak (0,79 euro)

WifiTrak helps you find FREE and open WiFi hotspots and public access points quickly and easily.

WifiTrak scans for all available WiFi devices and networks in the area and tests each network it finds for usability. It shows a list of the networks sorted from most useable (open, not redirected, strongest signal) to least useable (secured or hidden, weak signal). It can automatically notify and launch mail or a browser when it finds a suitable network 

Notemaster Lite (Free)

Notemaster (Lite) let you easily create  notes containing text, images, and headers.  These notes can be organized with categories and be password-protected for privacy.

Facebook (Free)

Not much introduction needed 🙂 – Facebook for iPhone makes it easy to stay connected and share information with friends. Use your iPhone to start a conversation with Facebook Chat, check your friends’ latest photos and status updates, look up a phone number, or upload your own mobile photos to Facebook while on the go.

iDroid Mini (Free)

iDroid Mini Browser is an innovative browser designed specifically for the iPhone/iPod. Inspired by iPhone’s Safari,Android browser and Opera mini including full screen, tabs, smart url, etc.

For me a nice replacement until Opera comes out with their version for the ipod 😉

FileApp (Free)

FileApp browser displays files by folders, alphabetically, by date of copy or by file type.
You can view almost every file with the build-in viewer; such as:

PDF Viewer, Microsoft Office (Word, Excel and PowerPoint), Images (JPG, PNG, GIF, TIFF and others), iWork (Pages, Numbers and Keynotes), Open Office (OpenDocument) (Text, Spreadsheet, Presentation), Plain Text and RTF (Rich Text Format),  Audio (MP3 VBR, AAC, Audible, Apple Lossless, AIFF, WAV, CAF), Video (standard iPhone formats : H.264, MPEG-4), Web Archives,  HTML files, ZIP Archives, Comic Books, etc… 

iDownload (1,59 euro)

iDownload allows you to download files directly to your iPhone or iPod touch and share them to any browser enabled device (pc, mac, linux, iphone, ipod touch, mobile devices, etc). You can use iDownload like a normal browser and when u click a download link i should pop up an alert asking u if u want to download or save the link.

After downloading you can share your files to any computer or mobile device as long as it is connected to same wifi network.

Part 2 will follow soon.


File In Use or Folder In Use

The operation can’t be completed because the file/folder is open in another program.
Close the file/folder and try again

One of the most annoying experience when using Windows is the message above. When a file is in use or accessed by a running program, or a folder that contains a file that’s been accessed, opened, written or used by other user or program, Windows will fail to delete or remove the file or folder with this error message.

One way to resolve this is by:
– Open a CMD window
– Close the explorer.exe process
– Navigate to the file/folder location and delete it

However, this doesn’t always work, because another program could be responsible for the “file-lock”.

Another and perhaps easier way is by the use of LockHunter.
It is a free tool to delete or/and unlock files blocked by something you do not know, by simply right-clicking on the desired item.

We can choose to unlock it, or delete it. Other options are “Close locking processes” and “Delete locking processes from disk

Key Features

  1. Shows processes locking a file or folder
  2. Allows to unlock, delete, copy or rename a locked file
  3. Allows to kill locking process
  4. Allows to remove locking processes from hard drive
  5. Integrates in to Explorer menu
  6. It deletes files into the recycle bin, so you may restore them if deleted by mistake
  7. Supports both 32 and 64bit Windows

According to the brilliant guys at,

“Winter-een-mas, in it’s essence, is a holiday for gamers. It is a celebration of games and the gamers who play them. Video games allow us to do things, go places, see stuff that we couldn’t do in real life. They can be an escape from reality, a release after a long day, a fun activity with friends, or just an enjoyable way to pass time. They give us a lot of entertainment. So why shouldn’t  they be celebrated?

And in the same spirit, gamers themselves are extraordinary people. There are millions of people world-wide that enjoy video games. Some are hardcore fanatics, some are casual gamers. But we are all part of the same community, and it’s a community to be proud of.

The Winter-een-mas season lasts all of January, with the actual holiday lasting seven days, January 25-31.”
Happy Winter-een-mas!


Whoozy Search Engine

Whoozy is a search engine for people. It searches the web for information about a particular person and uses search engines, social networks and picture/video/audio sites to gather relevant info.

Also a number of tools which help to use Whoozy even better are developed. You can add Whoozy for example to your favorite startpage (like iGoogle) or use it as a search plugin in your favorite browser.

What goes on the net, stays on the net 🙂


When adobe CS4 master collection is installed and you use Exact Audio Copy on windows 7 (or Vista), the application EAC can suddenly close via the standard open file dialog:

For some unknown reason EAC has started crashing in Vista x64 when opening any file via standard Windows open file dialog — the dialog opens, shows the folder tree panel and then… EAC is gone without a trace, no error messages, no processes left in device manager, nothing. This happens if you try to set default folder in Directories tab, split a wav file by cue, provide a path to external compressor in Compression options, etc.

I can confirm that Adobe Drive CS4 is the problem. I had the same problem you stated plus I am also using Vista Business 64-bit as well as Adobe Master Collection CS4.

2 solutions:
– Remove Adobo Drive CS4
Easier said than done. Adobe Drive CS4 x64 is installed as a dependency of Photoshop CS4 x64. It cannot be uninstalled without removing Photoshop; at least, not using the Adobe installer anyway.

Not to be deterred, I uninstalled Adobe Drive manually. First I unregistered the DLLs by running (as administrator)

regsvr32 /u “%CommonProgramFiles%\Adobe\Adobe Drive CS4\ADFSMenu.dll
regsvr32 /u “%CommonProgramFiles%\Adobe\Adobe Drive CS4\AdobeDriveCS4_NP.dll

Then I ripped all references to “Adobe Drive” out of the registry using regedit, and finally I deleted the C:\Program Files\Common Files\Adobe\Adobe Drive CS4 folder.

And now EAC works again, and Photoshop seems to get by just fine without Adobe Drive!

– Change Compatibility setting
check “disable visual themes” under EAC, Properties, Compatibility tab


yeah, this blog still has some issues with IE8, but works fine under:
– Opera >9
– Firefox
– Chrome
– Safari

Work work.


The internet is full of pages who made you laugh, make you go O M G, do a facepalm or worse. A snippet of the finest links available:

  1. Lolcats ‘n’ Funny Pictures of Cats – I Can Has Cheezburger?
  2. Needles to say: pictures of cats in all sort of funny events.

  3. FAIL Blog: Epic Fail Pictures and Videos of Owned, Pwnd and Fail
  4. Collection of  “fails”

  5. FML: Your everyday life stories
  6. Today, I was outside, peeing on a cactus. Then all of a sudden my dog jumped on my back, knocking me into the cactus. FML is a weird and wonderful addition to the web. It’s a collection of everyday anecdotes and stories likely to happen to anyone and everyone, sent to us exclusively by our users, which we then publish on the site. This is a space where you can let it all out and unwind by sharing the little things that screw with your day, and maybe realize that you are not alone in experiencing day to day crap. Posts start with ‘Today’ and end with ‘FML’. The site is meant to be fun to read and can be enjoyed on a daily basis.

  7. People of Wallmart
  8. A collection of all the creatures that grace us with their presence at Walmart, America’s favorite store.

  9. There I Fixed it
  10. There are as many sources for the word Kludge as there are jury-rigged mailboxes in the mobile home parks of America. Whether the source of the word is Gaelic, German, or Naval Acronym, we know them when we see them, and on this web site, we celebrate these iconic images of mankind’s eternal struggle to hammer square pegs into round holes (with duct tape.)


A handy site to calculate which subnet mask your ip has.


Quote from

Subnet mask: A subnet mask is a mechanism used to split a network into subnetworks; it can be used to reduce the traffic on each subnetwork by confining traffic to only the subnetwork(s) for which it is intended, thereby eliminating issues of associated congestion on other subnetwork(s) and reducing congestion in the network as a whole. Each subnet functions as though it were independent, keeping traffic local and forwarding traffic to another subnetwork only if the address of the data is external to the subnetwork.

Subnetting Concept

Subnetting an IP network allows for the flow of network traffic to be segregated based on a network configuration. It essentially organizes the hosts into logical groups, and provides for improving network security and performance. The most common reason for subnetting IP networks is to control network traffic. Traditionally, in an Ethernet network, it is very common for all nodes on a segment to see all the packets transmitted by all the other nodes on that segment, which introduces collisions, and the resulting retransmissions under heavy traffic loads. For additional information on subnetting, see RFC 1817, and RFC 1812.

Class Address Ranges

Class A – to
Class B – to
Class C – to

Class D* – to
Class E* – to

Class A, Class B, and Class C are the three classes of addresses used on IP networks in common practice. Class D addresses are reserved for multicast. Class E addresses are simply reserved, meaning they should not be used on IP networks (used on a limited basis by some research organizations for experimental purposes).

Reserved Address Ranges

Address ranges below are reserved by IANA for private intranets, and not routable to the Internet. For additional information, see RFC 1918. – (10/8 prefix) – (172.16/12 prefix) – (192.168/16 prefix)

Other reserved addresses: is reserved for loopback and IPC on the localhost. – is reserved for multicast addresses. is the limited broadcast address (limited to all other nodes on the LAN)

Subnet Calculator Explanation(Example)

This calculator will calculate the subnet mask to use, given a TCP/IP network address and the number of subnets or nodes per subnet required.

To create the subnet mask, first remember that the purpose of the subnet mask is to separate the (32 bit) ip address into the network prefix and the host number. If a bit in the subnet mask is 1, the corresponding bit in the IP address is part of the network address; if the bit in the subnet mask is 0, the corresponding bit in the IP address is part of the host address.

First depict the ip address in binary. Take and convert to binary:

ip address: 00111101.11110110.00010011.00010010
First we determine what class of address it is:

If the first bit is 0 it is a Class A address If the first two bits are 10 it is a Class B address If the first three bits are 110 it is a Class C address If the first four bits are 1110 it is a Class D multicast address If the first four bits are 1111 it is a Class E experimental address

Your example is a Class A address. The default subnet mask for a Class A address is:

subnet mask: 11111111.00000000.00000000.00000000
The formula for figuring out the number of ‘host’ bits in a subnet mask is
2^n=(number of nodes ) (2^n means ‘2’ to the power of ‘n’)
Since you know the number of nodes, you need to find ‘n’.

Because you want 64 node(s), you want to leave 6 – ‘0’ bits in the subnet mask since 64 = 2 ^ 6.
This will give you the following subnet mask:

subnet mask: 11111111.11111111.11111111.11000000
Which is referred to as /26 or in dotted decimal notation as


Communication, a snippet from Wikipedia:

Communication is a process of transferring information from one entity to another. Communication processes are sign-mediated interactions between at least two agents which share a repertoire of signs and semiotic rules. Communication is commonly defined as “the imparting or interchange of thoughts, opinions, or information by speech, writing, or signs”. Although there is such a thing as one-way communication, communication can be perceived better as a two-way process in which there is an exchange and progression of thoughts, feelings or ideas (energy) towards a mutually accepted goal or direction (information).

During our 5th edition of the Storm lanparty, one of our sponsors,, decided not to communicate anymore after an agreement was made for the sponsoring of game-servers. (Sorry, the following is in Dutch only).

Verwijderd op aanvraag, hoewel de waarheid !=laster
Uit wikipedia:
Laster is het zwartmaken van een ander door deze in het openbaar van feiten te beschuldigen waarvan men weet dat deze niet waar zijn. Het doel is het ruïneren van de reputatie van het slachtoffer.

Waarheid is een fundamenteel begrip dat min of meer synoniem is met echtheid, geldigheid, juistheid. Als iemand met opzet onwaarheid spreekt liegt hij.

What goes on the internet, stays on the internet.

Nov 042009

Since I began running this blog, I always wanted to use extjs in conjunction with wordpress.  From the beginning I used extjswordpress, but recently the author, W.Regenczuk, has made major changes.

Quote from ExtizeMe

ExtizeMe, is a WordPress theme written mostly in JavaScript. Layout, behavior and look&feel are made with Ext Js Library ( What makes ExtizeMe there different from other themes is:

  • Accordion sidebar;
  • Tab browsing;
  • Post zooming;
  • Live search;
  • Picture preview;
  • ExtJs skins;

At the moment I’m trying to adjust ExtizeMe to fit my needs. E.g: same layout with sidepanels, tabs, etc. So don’t be surprised if you happen to see some funky things 🙂

© 2012 Ceekes boarderline Suffusion theme by Sayontan Sinha