So, you downloaded a torrent expecting a nice AVI- or MPG-file for instant-action AV entertainment, and all you got was a big .bin file and a funny little .cue file? Here's the Linux-way of how to extract the content from them:
Yet another bespoke file format that unsuccessfully attempts to futher the agenda of vendor lock-in: If you are running Windows, you need to purchase PowerISO from poweriso.com , if you are running X86-based Linux flavour, the same people offer a free program to read and write .daa files. Go figure...
A well-meaning person gives you a .nrg file and you will not invest in a piece of expensive bespoke software to read it. After all, you run free, open-source software and never have and never will pay for software. What to do with this stupid .nrg file?
These utilities are particularly useful for installing Perl on your Windows PC. Download Perl for Windows from http://www.activeperl.com.
How to generate a Base36 quick code sequence using the SHA2 hash
On a 'slowish' 2GHz machine it can generate 20,000 quickcodes per minute. The spread of the resulting quickcodes is near-perfectly even, which means that substrings of the quickcode can be used to construct a hashed directory tree for holding, for example, the huge amount of product image files associated with a product catalog. Using a hashed directory tree is a quick and efficient method to host millions of separate files for quick, random access, as most file systems only perform optimally with less than 1,000 contained in a directory
This deterministic techique uses a hash of the sequential Integer Id of an item to generate a typical product quickcode for it, as found in many shopping catalogues. Example of how a quickcode is generated from its primary key integer Id:
- 1 => 8M9LFLN2
- 2 => HZ40H3K0
- 3 => 02LUJYQ2
You can download the Base36 Quickcode Generator test script, which demonstrates an implementation in Perl and MySQL.
It is possible to call O/S commands or third-party programs from within SQL or PL/SQL with external procedures. This guide describes how to build, install and use such an ExtProc and shows an exploit on how to grant yourself Oracle sysdba rights. Think of an ExtProc as an Oracle root kit.
Page 2 of 2