The better solution to get 7-zip *command line* (7za) on an OS X installation
is to grab the p7zip (http://p7zip.sourceforge.net/) sources and compile them on a Mac (maybe Xcode is needed but not sure):
# working directory where p7zip sources are in is ./sources
tar xbfj p7zip_9.20_x86_linux_bin.tar.bz2
If all went fine in p7zip_9.20.1/bin there will what we need: the executable 7za.
p7zip is a port of 7za.exe for POSIX systems like Unix (Linux, Solaris, OpenBSD, FreeBSD, Cygwin, AIX, …), MacOS X and also for BeOS and Amiga.
7za.exe is the command line version of 7-zip, see http://www.7-zip.org/.
* source code got from http://sourceforge.net/projects/p7zip/
* executable built on OS X 10.8.5 (with both Xcode 4.5.1 and XCode 5.0 installed but – again – not sure whether Xcode is need)
Problem: get my father’s Panasonic Full HD TX-L32G10 television play videos from Secure Digital card.
I have a Panasonic Full HD camcorder.
My mother does videos with her Canon -a model- photo camera.
My fathers television (see above) can read only either avchd or mpeg videos from a sd card.
Moreover – do not know wheter this is true for mpeg – avchd can be read only if sd structure is a valid avchd strucutre.
After lots of tries I find out this avchd authoring video tool that does the work.
Only to remember when tool outcome is transferred to the sd it must be put under PRIVATE folder otherwise that f*****g tv refuses to read videos.
If you want to get in sync your Mozilla Thunderbird contats with Google Contacts then you have to try this Google Contacts Thunderbird extension.
User’s password in a *nix system (like Debian 6 GNU / Linux) are not stored in clear but they are hased.
i.e. if you password is qwerty then it is stored as 123.Qaz/9Xyz. Likely (mathematically) no strings other than qwerty will be hased as 123.Qaz/9Xyz. So when you login the password you enter (qwerty) is hased and the hased version (123.Qaz/9Xyz) is check against the stored one. If you enter Qwerty than you will not login as hash of Qwerty differs from qwerty hash.
Maybe you already know that. But do you know how to generate the has version of a password in the same fashion it is sotred in either the passwd or the shadow file?
Well I do not know whether this is an universl answer, but I think it is valid for most of modern GNU / Linux systems.
For sure it works with Debian 6:
mkpasswd -m <method> –salt <salt> <password>
<method> : Debian 6 as method uses sha-512.
<salt> : It is variable, choose by system when hashing the password
<password> : Your password
<method> and <salt> are stored in either passwd or shadow files toghether with hashed password (shadow file can be read only by root): read more.
The format is $id$salt$hashed-password and, if method is sha-512 then $id$ is $6$.
mkpasswd -m sha512 –salt poiuytre qwerty
that is what you would see in either passwd or shadow files if a user will set qwerty password and system chooses poiuytre salt.