Rosary Miracle Story

Vienna, Austria, September 12, 1955: After World War II, Austria was divided between four countries: America, France, the United Kingdom, and Russia, which was still communist. The section of Austria controlled by the communists was the richest and included the city of Vienna. The Viennese were subject to all the atrocities and tyrannies of communism.

With all of his country’s problems weighing heavily on his heart, Capuchin Fr. Petrus Pavlicek made a pilgrimage to Mariazell, the principle Marian shrine in Austria. While deep in prayer before the miraculous image of Our Lady above the shrine’s high altar, he was told by an interior voice: “Do as I say and there will be peace.”

To obey this inspiration of Our Lady, Fr. Pavlicek founded the Holy Rosary Crusade of Reparation in 1947. This Crusade consisted of the Viennese faithful coming out of their homes in order to participate in a public Rosary procession in the streets of the city. The intentions of the Rosary were for the end of communism in their country and in the world. Father traveled throughout Austria with a statue of Our Lady of Fatima promoting the Rosary Crusade. At first, the processions were miniscule, but in time they grew to staggering proportions. The Prime Minister and other members of the Austrian government soon joined the ranks, along with all of the nation’s bishops.

In 1955, after eight years spreading the word about the Crusade throughout Austria, the Rosary processions would reach the size of half a million people, about one-tenth of the Austrian population. Finally,m through the help of Our Lady, the Soviet forces pulled out of Austria in October of 1955, leaving the country for good.

Each year on September 12th, the feast of the Holy Name of Mary, thousands gather in Vienna to thank the Mother of God for her intercession in freeing their country from communist domination.

— Canada Needs Our Lady.

The above paragraph is copied from the print of the rosary as a gift from my wife, Vivian.

Classification of files and tips to recover them

There are literally hundreds of computer files and formats that exist. It becomes impossible to understand and remember all of them. Hence, we are going to look at a broad classification of files, understand the major file types and how they are used in computers. Here is a breakdown of the file types.

A broad classification of files and file types

  1. System files

System files are files that are crucial for the functioning of a computer. These usually include hardware drivers, DLL files, configuration files and basically everything that includes the Windows registry.

Altering these files can cause severe damage; hence these files are usually kept hidden and are read-only. Hence it is a rare occurrence for users to accidentally delete or modify these files. Some examples include .bak, .dll, .dmp, .sys and .tmp.

Recovery tip #1: Lost system files could mean dysfunctional operating system. However recovering the system files will not repair the system files. Hence when you have deleted or lost system files the best way to get back your operating system to function normally would be to refresh or reinstall Windows operating system.

  1. Program files

Program files are the folder where all the third party applications are installed by default. For certain applications, it is mandatory that the applications be installed in this directory. But it is not always the case. You may also be given the choice to download applications in a folder of your choice.

Recovery tip #2: The program files directory is designed for an organized and predefined way of having all the required files in one place. The program when operated, folders of program files are accessed for opening the application. Hence reinstalling the program would be the best way to recover program files.

Continue reading “Classification of files and tips to recover them”

Calibre 4.1 Release

It is only four days after the release fo Calibre 4.0.

New features for Calibre 4.1

  • Viewer: Add an option to have a scrollbar (under Scrolling in the viewer preferences)
    Viewer: Allow showing the ‘position in book’, as was displayed in the top left of the viewer in calibre 3, in the header or footer of the viewer.
  • Viewer: Add options to control scrolling using the mouse in paged mode.
  • Viewer: Allow copying images by right clicking on them.
  • Viewer: Add a preference under Miscellaneous to allow only a single instance of the viewer
    Viewer: Add keyboard shortcuts to toggle between paged mode and flow mode and to quit
    Content server: Make the book size useable in custom book list templates.
  • Edit metadata: Use a border rather than background color to indicate correct title and author sort values. Works better with dark themes.
  • Kobo driver: Support for new firmware

It is a kinds of rush for this new release. more bug fixes on it.

New in calibre 4.0

Welcome back, calibre users. It has been two years since calibre 3.0. This time has been spent mostly in making the calibre Content server ever more capable as well as migrating calibre itself from Qt WebKit to Qt WebEngine, because the former is no longer maintained.

The Content server has gained the ability to Edit metadata, Add/remove books and even Convert books to and from all the formats calibre itself supports. It is now a full fledged interface to your calibre libraries.

The change to use Qt WebEngine has entailed a complete rewrite of various parts of calibre, including the E-book Viewer, PDF Output, Book details etc. Every attempt has been made to preserve features and functionality in a backwards compatible way, see below for a list of some known incompatibilities.

Wow, Calibre 4.0 is comming. I can not image how different it is from 3.x.

Calibre 3.48

 

I can wait to see it. Now download it 115MB. Install it. Then launch it.

Calibre 4.0

5 Essential Graphic Design Skills You Should Master

Maybe you’re a contract graphic designer doing small, one-off projects for local businesses. Or, an in-house professional responsible for overseeing all graphic creation in a large corporation. Regardless, you can always be improving your craft. 

Read on as we go over a few more advanced graphic design skills that will substantially improve your ability to communicate your message in the medium.

1. User Interface Design

At first glance, you might think this doesn’t apply to you. Perhaps your work focuses on something where ‘user interfaces’ seem worlds away from your final product. 

Consider this; regardless of what your final product is, the odds of it ending up within a user interface are virtually guaranteed. If you make a graphic for an article header for a local newspaper, for example, that graphic will likely end up in the online version of the publication.

And like it or not, that makes it a part of the user interface of the website. 

Knowing how to design with that type of presentation in mind already makes this a useful skill. Designing user interfaces directly, meanwhile, makes it substantially more worthwhile since the available pool of work for those who can do both is much larger.

Further, user interface creation is one of the more lucrative ways to apply the skills of a graphic designer. Per Indeed.com, user interface designers make, on average, more than double the income of a traditional graphic designer.

Continue reading “5 Essential Graphic Design Skills You Should Master”

How to Protect Your Smartphone from Online Threats

Every day, hundreds of people have their smartphone hacked, exposing important data like contacts and even credit card details to criminals that prey upon poorly protected phones.

Whenever your phone connects to the internet, it is at risk from hacking by data thieves that target phones in particular, as they contain nearly all of our important information such as passwords, emails and even the login details to online banking apps.

Fortunately, there are a few steps anyone can take to protect their phones from harm and recover their data if their smartphone is damaged or locked my malicious software.

Use a Virtual Private Network App When Connected to Public Wi-Fi

When you are using public Wi-Fi, such as when you are at a hotel or café, your phone is at risk of being hacked by someone else using that network. Some data thieves are known to connect to these networks regularly in order to steal credit card information from shoppers and tourists.

Virtual Private Networks encrypt and conceal your web traffic, even when using a public Wi-Fi network. These services can also be used from home to protect your online shopping and browsing there, giving you extra peace of mind.

Use an App to Securely Back Up All of Your Smartphone’s Data

Sometimes when a phone is hacked, it can suddenly become corrupted and unusable, trapping your files like your phone numbers and personal photographs on the device. There are apps available that can back up data to an online cloud service, but sometimes they can be missing important and more recent files.

If you have data on a damaged or corrupted smartphone, there are services like mobile data recovery by Secure Data Recovery that can recover data from your device, sometimes even if it has been deleted by a hacking program.

Use a Password Manager to Encrypt and Generate Your Passwords

Our passwords are gatekeepers to a lot of our sensitive information such as emails and bank accounts. Too many people rely on using the same password, or maybe two or three, in order to log in to all their different accounts.

Password managers use encryption algorithms to generate complex passwords for you, and store them in a ‘digital safe’ in an app on your phone and online on a secure server. The password manager will auto-complete passwords on all your accounts, or they can be copy-and-pasted from the app to the login form. This means you have only one password to remember, the one that logs you into your password manager, and you can let it safely and securely do the rest.

We keep a large amount of sensitive data on our phones, and not just banking details and contact information. Your phone probably has hundreds of photos of friends and family, as well as pictures from social media accounts. This information needs to be protected, not just from theft, but also from accidents and problems with a smartphone’s components. With a few apps and the help of professionals, anyone can protect the data on their phone, and recover it if the worst happens.

Failed to Read the contents of XML Resource: IDD_SSH_KEY_CHANGE_DIALOG

Dreamweaver 2019 does not connect to SFTP server and you see the “Failed to Read the contents of XML Resource: IDD_SSH_KEY_CHANGE_DIALOG” error.

1) Close the Dreamweaver application.

2) Go to the following location:

Windows: C:\Users\[user name]\AppData\Roaming\Adobe\Dreamweaver CC xxxx\en_US\Configuration
macOS: ~/Library/Application Support/Adobe/Dreamweaver CC xxxx/en_US/Configuration

Here, xxxx is the version of Dreamweaver. For example, if you are using Dreamweaver 2017 running on Windows, then your folder location reads:

C:\Users\[user name]\AppData\Roaming\Adobe\Dreamweaver CC 2017\en_US\Configuration

3) Right-click the ssh_hosts file, and rename this file. For example, ssh_hosts_old.

4) Relaunch Dreamweaver and connect to your SFTP server.

USB Front Panel for PC

My PC case has a front panel. Including two USB 2.0 ports, one MIC port, and one earphone port. It is not enough. It is not fast enough.
The motherboard Gigabyte B450M DS3H has F_USB30 and F_USB1 and F_USB2.

I can get a USB front panel and connect it to the motherboard. Then I can use the USB 3.0 and 2.0 together front the front easily.
Let’s have a look at some pictures.

B450M DS3H top view

 

Hard to find the ports. Look at the manual below.

Motherboard USB

 

Continue reading “USB Front Panel for PC”

XiaoMi MiBox 3 Enhanced

I bought this set-top-box three years ago. It is Mi Box 3, enhanced edition.

It cost me RMB399. Free shipping to my Chinese address.

White color looks nice. Moden design. Not black anymore.

Here is the specification.

  • Rom: 8GB eMMC 5.0
  • Ram: 2GB LPDDR3
  • CPU: MT8693
  • Output resolution: 4K(3840×2160)
  • GPU: Power VR GX6250
  • OS: Android 5.1
  • Video format support: FLV, MOV, AVI, MKV, TS, M2TS, MP4, 3GP, MPEG, OGM
  • Audio format support: MP3, APE, FLAC, AAC, OGG
  • Photo format support: BMP, GIF, JPG, PNG
  • Decoder format: HD MPEG1/2/4, H.264, H.265, Xvid/Divx4/5/6
  • Wifi: 2.4GHz/5GHz, 802.11a/b/g/n/ac
  • Blue-tooth: Bluetoothn 4.1+EDR(enhanced data rate)
  • Interface: HDMI 2.0, USB 2.0

 

 

Continue reading “XiaoMi MiBox 3 Enhanced”

  • Archives