Clear Cache and Cookies shortcut for Firefox, Internet Explorer and Chrome Browsers

This is how you clear your cache and cookies on all major browsers without navigating through the entire menu and options to find the caching section.

Typically on most Firefox versions the caching & cookies section is under:

Firefox Menu > Options > Options > Privacy Tab > clear your recent history (link) but that’s too many clicks.

In Chrome:

Customize and Control Google Chrome button > Tools > Clear Browsing data.

In Internet Explorer:

Tools > Internet Options > General tab > Browsing history section > Delete

So, here’s the only Windows keyboard shortcut you need: CTRL+SHIFT+DELETE – this brings up the Clear All History window on all browsers.

If you’re running Windows on a mac pc, then the shortcut would be: CTRL+SHIFT+FN+DELETE – same result as above.

The CTRL+SHIFT+DELETE shortcut works on all versions of Firefox, perhaps most Internet Explorers and Google Chrome.

Install MRI 2.1.0 on Ubuntu 13.04

MRI – Matz’s Ruby Interpreter

1. We need curl on a fresh install if it so happens that it is not present:

sudo apt-get update
sudo apt-get install curl

2. Download and run the RVM installation script

2.1 Installing the stable release version:

user$: curl -sSL https://get.rvm.io | bash -s stable

2.2 To get the latest development state:

user$: curl -sSL https://get.rvm.io | bash

3. Reopen terminal and run:

rvm install ruby-2.1.0

or paste this in the current terminal and then install ruby: source ~/.rvm/scripts/rvm

4. If you’re getting the “RVM is not a function” message you need to enable login shell (optional):

With the the terminal window open go to:

Terminal > Edit > Profile Preferences > Title and Command > Run command as a login shell (make sure this check-box is enabled)

Install an experimental fork of Homebrew for Linux

1. Reference: https://github.com/Homebrew/linuxbrew

2. Installation

2.1 Pre-requisites:

2.1.1 Debian or Ubuntu:

sudo apt-get install build-essential curl git ruby libbz2-dev libcurl4-openssl-dev libexpat-dev libncurses-dev

2.1.2 Fedora:

sudo yum groupinstall 'Development Tools' && sudo yum install curl git ruby bzip2-devel curl-devel expat-devel ncurses-devel

3. Homebrew Install:

git clone https://github.com/Homebrew/linuxbrew.git ~/.linuxbrew

4. Edit .bashrc ( sudo nano ~/.bashrc ) or .zshrc and add the following 2 lines at the end of the file:

export PATH="$HOME/.linuxbrew/bin:$PATH"
export LD_LIBRARY_PATH="$HOME/.linuxbrew/lib:$LD_LIBRARY_PATH"

5. and restart the terminal.

6. Usage:

basic package install with brew:

brew install $WHATEVER_YOU_WANT

7. Full example help/usage:

brew [info | home | options ] [FORMULA...]
brew install FORMULA...
brew uninstall FORMULA...
brew search [foo]
brew list [FORMULA...]
brew update
brew upgrade [FORMULA...]
brew pin/unpin [FORMULA...]
Troubleshooting:
brew doctor
brew install -vd FORMULA
brew [--env | --config]
Brewing:
brew create [URL [--no-fetch]]
brew edit [FORMULA...]
open https://github.com/Homebrew/homebrew/wiki/Formula-Cookbook
Further help:
man brew
brew home

8. Available packages to be used with brew:

– you can browse the formula directory on GitHub
– or type brew search for a list (in the terminal window)
– or visit braumeister.org to browse packages online.

Creating a zip archive under linux that is windows compatible

zip -9 -y -r -q file.zip folder/

-9 Indicates the slowest compression speed (optimal compression, ignores the suffix list)
-y Store symbolic links as such in the zip archive, instead of compressing and storing the file referred to by the link
-r Travel the directory structure recursively
-q Quiet mode
folder Refers to the folder to be zipped

zip package needs to firstly be installed:

sudo apt-get install zip

Samsung Galaxy S3 (I9300) one click ROOT with ExynosAbuse Android APK

ExynosAbuse is an android application that uses an exploit to gain root privileges and install SuperSU (v0.99) on your Samsung Galaxy S3 – Exynos4 chip based device.

It doesn’t require anything else, and it will grant the user full root privileges without asking and without using any special permissions.

Even though, this is not something you should take lightly (as the hack could be used by third-party apps with malicious purposes), it is the fastest, simplest way to date, to get root access on a Samsung Exynos4 type device running factory stock roms. (Finally a simple method of using Titanium Backup without flashing custom images, bootloaders, unlocking device, etc.)

samsung_galaxy_s3_i9300_root_access

ExynosAbuse App ScreenShot

The current version of the app is 1.20 and starting with version1.10, it has the options to disable the exploit (disclaimer: this may break your camera), re-enable the exploit (if you need the camera) and to disable the exploit at boot (before any Android app runs). These options do require root (SuperSU or Superuser) to be installed as well. While this will help protect you, these are workarounds, not actual fixes.

All you need to do is download the app from the links provided below (or the original forum threads), install it (make sure you have enabled “installing from unknown sources”), and click the “Root device” button.

Samsung has been informed of this vulnerability, and it is likely that a fix will be available in the near future, but until then, if you were looking for a 1 click ROOT your Galaxy S3 procedure, this is it.

The method has been tested and works on the following devices (check the forum thread below, as it will be updated with new devices):

  • Samsung Galaxy S2 GT-I9100
  • Samsung Galaxy S3 GT-I9300
  • Samsung Galaxy S3 LTE GT-I9305
  • Samsung Galaxy Note GT-N7000
  • Samsung Galaxy Note 2 GT-N7100
  • Samsung Galaxy Note 2 LTE GT-N7105
  • AT&T Galaxy Note 2 SGH-I317
  • Verizon Galaxy Note 2 SCH-I605
  • Samsung Galaxy Tab Plus GT-P6210
  • Samsung Galaxy Note 10.1 GT-N8000, GT-N8010, GT-N8013, GT-N8020

Notes:

  • to check that your device has a Exynos4 CPU, use Antutu Benchmark android app and go to the Info Tab > Device Info and look under Basic Information.
  • take into account, that rooting the phone may also void your warranty, so use carefully.

Download: ExynosAbuse-v1.20.apk

QR Code (scan code to download app):

ExynosAbuse APK v1.20 QR Code scan

ExynosAbuse APK v1.20

Sources – XDA developers forum threads: