Howto: Get The Burning Crusade for Free

Written by rob on March 9, 2008 – 2:50 pm -

I previously wrote an article on how to get the WOW client for free and then use that to play on the free private servers available on the Internet. The one thing missing from that whole scenario was The Burning Crusade expansion pack which adds new races, classes, and locations, among other exciting things. The Blood Elves, especially, are very cool. I started playing with a Human Rogue on my own private server, but I’m probably going to start a Blood Elf Paladin soon now that I have the expansion pack.

Before continuing, this assumes that you have followed my previous guide to already get the World of Warcraft original game client.

Now, to get Burning Crusade click here, thanks to Like before, this small file is only a downloader that will fetch the 1.15GB installer. Also like before, you should run the downloader as Administrator in Vista in order to ensure everything goes smoothly. Once it is done installing, you have Burning Crusade! If only it were that easy… there’s a few more things you have to do.

The update unfortunately resets your game to version 2.0.0, so you are going to have to reapply the patches. If you are like me and deleted them already, then you’ll have to download them again. In case you lost the link, click here to go to Blizzard’s official US Patch site. Get the 2.3.0 full patch, the 2.3.0 to 2.3.2 patch, and the 2.3.2 to 2.3.3 patch. Apply them all in order, running as Administrator for Vista.

Also, if you are using your own private server, there are other steps necessary to make the server BC-compatible. You are going to have to redo all your vmaps, DBC, and maps extracting. This process is detailed in Reaper-X’s Maps, VMaps, DBC Extraction Guide.. Just overwrite any duplicate files in your C:/wow/data folder with the ones newly generated by those steps. This time you won’t get an error for Expansion.MpQ file, since now you have the expansion.

There is one final step. You have to edit the mangosd.conf file. Search for “Expansion = 0” and change it to “Expansion = 1”, then save the file. Now start up mangosd.exe and wait for it to parse all the new maps. When it is ready, do “setbc [username] 1” where [username] is the username you use to login to WOW on your private server.

Posted in Gaming, Howto's | Comments Off on Howto: Get The Burning Crusade for Free

Howto: Play World of Warcraft for Free

Written by rob on March 7, 2008 – 10:42 pm -

The following guide tells you how to acquire the World of Warcraft client for free (legally, of course!), setup your own private server, and then connect to a private server. It also examines some of the cool things you can do within your server. Please note that this is free because you are not going to be using Blizzard’s servers. That means you won’t be able to play with your friends who play on the Blizzard servers. However, you could invite your friends to play on the same private server as you. For all intents and purposes, this free method isn’t a great replacement for the real thing. There’s bugs, lag, and many other problems, but when it comes down to it… you are in fact playing WOW for free.

Step One: Getting, Installing, and Updating the World of Warcraft Client

Getting the World of Warcraft client is the easiest part of this tutorial, but it may also be the longest depending on your internet connection speed. I have Comcast that goes at roughly 8mbps, and the download still took me over three hours (granted, I wasn’t maxing out my connection — Blizzard’s web servers aren’t the fastest). The download is 3.15GB. To get the client, click here. What you download as a result from that link probably only took a second, but then when you double-click that file it will begin the true downloading process. I chose to save everything to a desktop folder called WOW.

Note: The WOW Client is the full game of World of Warcraft. It contains all the information the CDs contain when you buy the game in the store. Blizzard allows people to get this client for two reasons: 1) You can use it up to 10 days to connect to the Blizzard servers for free, so it acts as a trial version. 2) You may be downloading the client for Mac OSX or for Linux, and then using that to login to your existing account that is activated with a Windows access key (which comes with the retail version of the game). In our case, we aren’t getting it for either of these reasons, but keep in mind this is 100% legal. This is NOT a pirated copy of the game.

The next steps, however, can be considering illegal. It goes against the Terms of Service for the game, so if you are morally invested or otherwise opposed to breaking such agreements, please close your browser now and forget this ever happened. All instructions are provided for educational purposes only and I do not condone illegal activity in any way.

NOW that that’s taken care of, shall we get to the fun part?

With the client downloaded, open up whatever folder you chose to save it to. You will see a file called “installer.exe”. Double-click on that to begin the installation. In the splash screen that comes up, press “Install World of Warcraft”. They then force you to scroll to the bottom of the service agreement before pressing Accept. (Keep in mind, this is the service agreement you are breaking by using a private server). Finally, press OK to accept the default values for installation directory and to begin the process. The installer will copy all the files and tell you when it’s finished. This process took 7 minutes for me. VERY IMPORTANT! When it says the Installation is Complete, DO NOT press “Play World of Warcraft” or “Create a New Account”. This will attempt to connect you with the Blizzard servers, which, for the purpose of playing WOW for free, you NEVER want to do. Instead, press the X in the top right corner of the installer to quit the program.

The next step is to update the client to version 2.3.3. This is the latest version as of writing, and it is supported by the latest version of Reaper-X’s WOW Private Server, which is used in the next step to host your own private server. Keep in mind that if you intend to connect to a private server on the Internet, then you will need to have the right version for that specific server. Therefore, make sure you only upgrade to that version and NO FURTHER. However, most of the best ones nowadays support 2.3.3, so that is what we’ll do.

Click here to go to Blizzard’s official US Patch site. Download the following patches: Version 2.0.x to 2.3.0 Full Patch, Version 2.3.0 to 2.3.2 Upgrade Patch, and Version 2.3.2 to 2.3.3 Upgrade Patch. The Full Patch there is 692MB so that may also take some time on a slower Internet connection. The total download time for all three was 15 minutes for me. I recommend using FileShack. Even though you have to click through more than FileFront, they are super fast… it maxed out my connection.

Once they are all downloaded, run them in sequential order. Nothing special to note here, except that if you are using Vista you should run these updates as an Administrator. Once you have the WOW client 2.3.3, then you are ready to continue by either hosting your own private server or connecting to an existing one on the Internet.

Step Two: Running your own Private Server

Private servers are servers that emulate the Blizzard servers. They do not equal the Blizzard servers in reliability or functionality, but they come pretty close. They are a necessity to bypass the monthly fee of WOW. Most private servers available to the public are rather buggy and laggy, but again, you get what you (don’t) pay for.

Click here for a rather detailed comparison between private servers and official (Blizzard, monthly-payment) servers. I try to explain it in my own way below.

You may want to run your own private server. This server will have almost zero lag, since you are communicating with your own computer instead of over the Internet. The biggest drawback to this is obvious: you will essentially be playing by yourself. If you just want to play WOW for the questing and the role-playing experience, this isn’t necessarily a problem. However, keep in mind that half of a MMORPG is the MMO part — the part where you interact in an online world full of other people. With your own private server, that element will be nonexistent, so you will certainly be missing out on a lot of the experience. The best reason to run your own server, besides the no lag factor, is that you can modify the world to your liking. This means making a Level 70 character in an instant, creating hacked items that make you unstoppable, instantly kill the biggest bosses, etc. Or you can do things that aren’t such outright cheating, such as creating custom bosses or vendors. Think of your private server as a sandbox, where you can experience the world of WOW however you want. If you’re the type of person that can have fun alone in a sandbox, then that’s what this method is for.

If you don’t like the idea of hosting your own private server, then you can join one of the private servers available online. Most of these are still free, meaning there’s no monthly fee. However, there are other people on there. There are usually only a hundred or so people on at any one time, though, which can never give you the same experience as the Blizzard servers where there’s thousands on at a time. If you would prefer to join an existing server because you don’t want to go through the work to host your own or you want the benefit of having others to interact with, you can skip this step and proceed to Step 3.

Those of you still reading this section are here because you want to learn how to host your own private server. In order to do this, we will take advantage of Reaper-X’s hard work. Normally, you would have to acquire the Mangos MMORPG Server and then do a lot of difficult things in order to make it WOW-compatible. Reaper-X has created a package that makes all of this much easier, essentially taking all the hard work out while still giving you full control of the server. He has also made my job easier by providing a very good tutorial on how to install his private server. Instead of reinventing the wheel, I will simply link to his guide. You can follow his guide word for word. Step 6 of his guide is the same thing I will cover below in Step Three, so you can skip that for now if you don’t understand how he explains it.

Just a few notes to supplement Reaper-X’s own guide. For Vista users, MySQL’s configuration wizard may not start cleanly. You will get an error complaining about a “side-by-side configuration”. The solution is steps 4-10 at this forum post.

Another ugly Vista note… all of the BAT (batch) files that are used to extract the maps, vmaps, and dbc content from the WOW data folder need to be run as Administrator. Unfortunately, simply right-clicking them and choosing “Run as Administrator” doesn’t do it. You instead have to do it from an Administrative Command Prompt. To do this, press the Start button, and then type “cmd” in the search box. Instead of pressing Enter to simply launch the program, press SHIFT+CTRL+ENTER. This will launch it with admin prefs. Of course, you have to “Allow” that action. Once you have that up, type “cd C:\” to get to the root of the C directory. Then type “cd Pro” and press TAB… it will automatically fill in “Program Files”. Now you can press Enter. Then type “cd World” and press TAB… it will fill in “World of Warcraft”, so press Enter. Once there, now you can type “extract-map.bat”, “makevmaps_SIMPLE.bat”, or “extract.bat” depending on what you are extracting. Also, you will get an error during the extract maps step about expansion.MPQ, since we don’t have the expansion pack, but you can safely ignore that.

During the Reaper Mangos configuration step, make sure you set the Expansion variable to 0 if you followed the first part of this guide, since the client you got does not include The Burning Crusade.

Step Three: Connecting to a Private Server

Whether you have created your own private server in Step 2 or want to connect to a Private Server on the Internet, the process is simple. You have to edit the file called “”, which is located in the directory C:/Program Files/World of Warcraft/. (If you installed WOW to another folder, it will be there instead. If you have trouble finding it goto Start->Search and type in “” and make sure it is searching All Files and Folders in Local Hard Drives.) Right-click the file and select Open With. Choose to open it in Notepad. There will be lines for the official Blizzard servers. Delete those.

Now you can put your new entry. If you have created your own private server, you would put a line with “set realmlist”. If you are using an Internet public server, you will use their URL instead. For example, a popular one is ToxicWow, which you would set to “set realmlist”. Speaking of ToxicWow, they have a great picture tutorial of this process in case you are lost. Just click the “Change your realmlist” link and there will be a nice tutorial.

Keep in mind you can only use one at a time. If you want to use both ToxicWow’s server and your own private server, you will have to edit the file before you open the game to contain only the one you need at that moment. I am thinking about creating a program that will make switching this very easy, but right now it’s not a priority. I’m going to be too busy enjoying my private server.

If you have followed all the steps so far, you should be ready. Start up World of Warcraft, agree to the service agreements (which you have broken by using a private server), and then login using the GM account you setup. You can then create your new character and start playing WOW (by yourself or with the few people on the private Internet server). All for free !

Posted in Gaming, Howto's | 1 Comment »

Howto: GBA Emulation on iPhone

Written by rob on January 29, 2008 – 7:01 pm -

I’m not going to reinvent the wheel here by making my own tutorial. Great ones already exist.

Check out this site for a nice tutorial on GBA emulation on the iPhone (thanks to the gpsPhone program):

This tutorial has some spots where it says to upload files via SSH. You can learn how to do that by following this tutorial on the same site:

Overall, that entire site is great for iPhone/iPod Touch beginners.

Posted in Howto's | Comments Off on Howto: GBA Emulation on iPhone

Howto: Jailbreak an iPod Touch

Written by rob on January 11, 2008 – 4:28 pm -

Jailbreaking an iPod Touch is the process used to allow third-party apps to install on your iPod. Along with many other things, this process allows you to turn your iPod Touch into an iPhone in every aspect except the phone… that means getting the Mail, Google Maps, etc. apps. Some 3rd party apps that are available are Tap Tap Revolution (think DDR, but with screen tapping instead of dancing) and Apollo (AIM/MSN/ICQ IM client). There are hundreds of others with many different uses.

NOTE: I may say iPhone in this tutorial, but I really mean iPod Touch. Once they are jailbroken, they’re essentially the same thing, except you can’t call people with an iPod Touch.

The process of jailbreaking is fairly easy. I could explain it all here, but there are much better tutorials out there, so I will merely link to them.

Warning: Continuing and following the steps in the linked tutorials will involve Restoring your iPod. This means all songs/videos/etc. will be deleted from it. This shouldn’t be a problem if you have them on your computer as well, but it may be a slight inconvenience to re-sync multiple GBs of music. Just realize that you will lose all songs/etc. during the procedure (specifically the downgrading portion, which IS necessary).

Before you can jailbreak, your iPod Touch needs to be in version 1.1.1. Most new iPod Touchs (since December) come with 1.1.2 pre-installed. This means you can’t jailbreak. HOWEVER, it is possible to jailbreak simply by downgrading to 1.1.1. The process to do this is described here. This is a great tutorial, but it is geared toward Mac users. For Windows users, you would follow everything exactly the same except instead of holding the OPTION key down while pressing Restore in iTunes, you would instead hold SHIFT. That is all there is to it. You will now have version 1.1.1, and now you can finally jailbreak.

To jailbreak, follow this tutorial from the same blog. I am going to summarize the steps just to make it clear what is going on.

Step 1. Install AppSnapp. In this step you are essentially pointing the iPod Touch’s browser to “” and pressing “Install AppSnapp” at the bottom of it. If you have a strong internet connection with a good signal, you should have no problem getting the progress indicator discussed/pictured in the tutorial. Once that occurs, an “Installer” button will be part of the iPod’s main menu.

Step 2. Preparing for 1.1.2 upgrade. In this step you use the “Installer” app that you now have to install the OktoPrep application. The installation of this app prepares your iPod for the 1.1.2 update. Remember I said that 1.1.2 doesn’t support Jailbreak? Well, it doesn’t UNLESS you first goto 1.1.1 and run OktoPrep, which is what this tutorial makes you do.

Step 3. Update to 1.1.2. Now you use iTunes to update to 1.1.2, now that your iPod has been prepared to allow jailbreaking in that version.

Step 4. Performing the 1.1.2 jailbreak. This step is a little tricky because it requires you to download and run a Java application. The article is geared towards Mac, but in Windows this step is completely different. It requires that you have Java. Mac users have Java installed by default, and so they don’t have to do anything. However, most Windows computers don’t have Java. You will need to get it from Sun Microsystem’s website here. Install it and then RESTART your computer. After that is finished, download the application referenced in the tutorial. It is a zip file, so unzip it normally. In the folder that results, there will be a file called “windows.bat”. Running that will launch the application, in which case you can proceed as described in the tutorial… pressing the “Jailbreak!” button. It pays to be patient at this point as your iPod will restart multiple times and iTunes on your computer may have a few errors… just ignore it, as soon everything will be good. Once your iPod fully boots up without restarting, and you get to the point where you can use the menus, then you are DONE!!!

Step 5. Install Apps. At this point, your iPod Touch is jailbroken. You have gotten past the hard part. Now you just have to use the Installer app to install more programs. I recommend getting SummerBoard, which makes it easier to manage the main menu when it gets huge from all your new apps. Another must-have is Apollo if you use IM a lot and Tap Tap Revolution is a great game. iBlackjack is another favorite, which is a well-done blackjack port for iPhone.

To get the iPhone Apps (Google Maps, etc.) on your jailbroken iPod Touch, go here.

Any questions.. ask in the comments. I did this successfully on my first try, so it’s not hard at all with the above tutorials.

Posted in Howto's | Comments Off on Howto: Jailbreak an iPod Touch

Using Virtualization to Protect from Internet Malware: Part II

Written by rob on April 1, 2007 – 1:54 pm -

The following screenshots were taken under Vista with the new beta version of VMware. The guest system, however, is still Windows XP. This shows one strength of virtualization: it doesn’t matter what version of Windows you have… you can still install any other version virtually.

The first step, after acquiring VMware in one way or another, is to create a new virtual machine. After opening VMware, you do this by File -> New -> Virtual Machine, or simply by pressing CTRL+N. Press Next, and then Next again. Now ensure that Microsoft Windows is selected in the Guest Operating System combo box. Under the Version drop-down box, select the version of Windows you intend to install (I chose Windows XP Professional).

Press Next. For the Virtual Machine name, call it “Internet Browser”. The name doesn’t matter, but it will make things more clear later on if you keep to the same naming scheme as me. The location will default to the My Virtual Machines folder under My Documents (or the Virtual Machines folder under Documents in Vista). I left the default. Press Next. Then press Next again to accept Bridged Networking.

This next screen allows you to choose the size of the virtual system’s hard drive. This value isn’t as important as it looks because you can change it later. Also, the virtual hard drive file on your host computer is only going to be the size of the used disk space. Therefore, if you simply install Windows and Firefox, yet have a 100GB virtual hard drive, the virtual hard drive file will still only be 1.5GB or so because that is all that is taken up on the drive. I’ll just stick with the default 8.0GB, but if you plan on putting a variety of applications on the virtual machine to facilitate your browsing experience, then you could increase it. Remember, you can always change this later on if you need to. Just make sure you don’t have the “allocate all disk space now” box checked, as it will needlessly waste space on your host system. Press Finish when you’re done. (You may receive a hint after pressing Finish. Just press OK to get out of it.)

You will notice that the virtual machine you just created has been added to the Favorite list on the side of VMware’s window. It is also currently selected and ready to use.

The last thing we want to do before starting the virtual machine is edit the RAM that the virtual machine has access to. You can do this by pressing the “Edit Virtual Machine Settings” button. The entire right side of the window that comes up is dedicated to controlling the RAM. Right now the RAM is probably set somewhere near the Green arrow, which is the recommended value. I personally prefer to set it higher; remember that more RAM will make the virtual machine work faster (not unlike with a real computer). If you have 512MB of RAM or less, you probably only want to use the recommended. But if you have over 512MB, then you should give it more. As a general rule of thumb, set the RAM to 50% of your host system’s RAM. That said, I wouldn’t give it over 640MB because XP really doesn’t ever need that much unless you do serious gaming (which you cannot do under VMware). I have 2GB, so I set my virtual system’s RAM to 640MB and it moves as speedy as I need it to. If for whatever reason what you set here is causing problems for you, you can come back and change it later. You can also edit the hard drive space in this same dialog box. Finally, if you have a dual-core processor, you can allow the guest system to use two processors here. Close out of that dialog box and then we are ready to begin the fun part.

Now you can insert your Windows installation disk into your CD drive. The virtual machine uses the same CD drive as the main system. Now press “Start this Virtual Machine” (or you can use the green Play button on the toolbar). As soon as you see the VMware logo, click inside the virtual machine’s area so the keyboard and mouse are captured. Then press ESC. After the system briefly loads, you will be shown the Boot Menu. Use the arrow keys to move to CD-ROM drive and press Enter. Your install CD will then begin to boot (if it is Windows XP or Vista, you may need to press any key to start the disc, as prompted). From here, you should be right at home, as it will look the same as any Windows installation.

If you have not installed Windows before and are unsure of what to do, click here to get to a pretty good (off-site) guide to installing Windows XP. In that guide, you can skip to step 2 of the step-by-step instructions, as we already covered everything else. If you want it to look exactly like what you are used to, press the Full Screen button. Remember that in order to release your mouse/keyboard and to exit full screen mode you need to press CTRL+ALT. One scary part is when you have to format a partition for Windows to install on. Remember that the virtual hard drive is in NO WAY connected to your real hard drive, and reformatting it will NOT delete any of your host computer’s files.

Once you have Windows installed, you should be at the desktop of the user you setup during installation. You may now remove the Windows installation CD from your CD drive. We need to take care of something right away called VMware Tools. Installing this allows you to drag and drop files between virtual machine and your regular computer. This will be a must, as you may need to transfer e-mail attachments to your main system or something like that. Installing the tools is simple. While the virtual system is running, press CTRL+ALT to release the mouse, and then go to the VM menu in VMware, and choose “Install VMware Tools”. Press Install in the box that comes up. After a few seconds, the installer will start inside your virtual machine. Click inside it to capture the mouse and then go through the install wizard. You may get a few unsafe driver prompts (one such window is pictured below); just press “Continue Anyway”. After it is done, the installer will automatically restart the system.

After the system reboots, VMware Tools has been successfully installed. The reason we installed this is because it enables you to drag and drop files between your host computer and your guest computer (and vice versa). Try it! Simply create a new file in Notepad or something from inside the guest machine. Then drag it toward the outside of the guest window… it will let you continue dragging onto your desktop or into a folder of your host computer. You can also drag files from your host computer to the guest using the reverse approach. This obviously won’t work if the gust computer is in full screen or guest mode, but it allows you to very easily copy files between your systems.

This can be useful if you need an e-mail attachment or something from the Internet to be transferred to your host system. An even better example is music files downloaded from Limewire; once they are finished downloading in the safe environment of the virtual system, copy them into a folder on your host system and put them into iTunes.

It is, however, important to note that this dragging and dropping of files between the virtual and host system is the single security risk involved with this approach. It is for this reason that I HIGHLY recommend that you do not copy any executable files from your guest to your host, until you test them out on the guest computer for a few days. The wonder of virtualization is that you now have a place to test programs for spyware without risk; make sure you use the guest computer to its full potential, and never copy any untrusted files between systems. Doing so will compromise the very idea of using the virtual machine for Internet use.

You now have everything setup that you need for the basic functionality of the virtual system. From here, I installed Firefox and also the Macromedia Flash plug-in for Firefox. I also installed Microsoft Office, as I often use Word to prepare blog entries and other online posts before posting them online. You can install whatever you want at this point, though I highly recommend installing Firefox, if only to preserve the life of your virtual machine. Also to preserve its life, I installed Avast Anti-Virus (a free anti-virus program that works just as well if not better than Norton and others).

Only install what you will need to use the Internet (unless you want to test an untrusted program before copying it to your host machine) or to perform other temporary services. After all, you will only use this virtual machine for the Internet, and nothing more. Installing too many things won’t necessarily be a problem, but it will tend to make you use the virtual machine for more than Internet. We don’t want that. The whole point of this project is that you want to have a virtual machine to use for Internet access, and that’s all. Due to the fact that you may have to completely restore the virtual machine if you get infected with spyware, you don’t want anything important on the virtual system.

Once you have all of your programs installed, it is time to make the snapshot. A snapshot remembers all of the files, settings, etc. that were on the virtual machine at a particular time. Right now, we know the system doesn’t have spyware, and we want to create a snapshot so that we can come back to this point in the future if necessary. This is the part of the tutorial that will differ majorly from those using Virtual PC — you will have to find some other way to restore your system if it gets infested.

Even though you don’t have to be, I recommend you shut down the guest computer. When it is turned off, you will be returned to the main screen of VMware. Go to VM->Snapshot->Snapshot Manager. “You are here” will be selected; press the “Take Snapshot…” button. I called this particular snapshot BASE so I would not confuse it with further snapshots, and gave it a good description (I recommend you give all your future snapshots good descriptions so you know what each one includes).

Press OK when done naming it, and then press Close in the Snapshot Manager window. That’s all there is to taking a snapshot. We will now test it by having fun and destroying the virtual system.

Start up the virtual machine. When it is completely booted, disable any anti-virus or anti-spyware programs. Now you can trash your computer in any way you wish. Either download obvious virus files from Limewire, or simply delete random files from C:/Windows/system. Another choice may be to download and install obvious spyware like Bonzi Buddy, Kazaa or Gator. You should be in pop-up hell in no time. If you are unsure of what to do and simply want to test the effects of the snapshot restoral without killing the virtual machine, just make a new file on the desktop. When we restore the snapshot, that file should be nonexistent. I used the command prompt to delete everything from the C: drive, which removed everything except certain system files and running programs.

The result when I restarted my computer:

When you are content that the system was destroyed or otherwise changed from the snapshot, shut it down (if you kill it bad enough and it can’t shut down, use the red square stop button in the toolbar to force a power off). Now it is time to restore a snapshot. Go to VM->Snapshot->Snapshot Manager. This time, you will see the BASE snapshot but it won’t be selected. Go ahead and select it. At the bottom of the window, near the Close button, is a button called Go To. It will ask you to confirm. Press “Yes”. In only a second, the virtual machine will be restored to the snapshot we made earlier.

Boot up the system to confirm the restoration. My system was no longer destroyed! You should now realize how powerful virtual machines are. By creating a snapshot every time you make a major change to your system, you allow yourself to revert back to that at any time.

Now that you understand how to create the virtual machine and utilize snapshots, I want to give a general overview of how a general day would go by utilizing the virtual machine in conjunction with the host. You will obviously develop your own formula eventually, but this should get you started. The biggest thing is to make sure that you NEVER run the Internet on the host machine; this will prevent it from being infected by spyware and other nasty malware.

Let’s say you just came home from school or work. You would turn on your real computer. Maybe you have a report to type. You would open Microsoft Word as normal, and start typing away. Now let’s say that you need to research something on the Internet. In order to prevent yourself from accidentally using the internet on the host machine, I recommend uninstalling Firefox and removing any icons to Internet Explorer or other browsers. It is now time to start up your virtual machine, so open VMware and start your virtual machine. Once it boots, you can start Firefox and start researching. You can switch back and forth between the virtual machine and your host computer, typing the various things in Word that you researched.

Now what if you need to include a picture from the internet? It’s very simple. You can just drag it from the Firefox window in the guest machine to the Word window, just as we did with files earlier. Try it! What if you need to cite the URL for the picture? Simply copy the URL in the guest machine and paste it in the host machine. The wonder of VMware tools is that it lets you drag and drop files between systems, and also lets you copy and paste between them.

Now you are done researching on the internet. There is no sense in keeping the virtual machine running, as it will take up a lot of RAM (half of it if you listened to my recommendation when delegating RAM to the machine). You don’t, however, have to shut it down. If you constantly had to start up and shut down the system, it would rid you of productivity. Instead, you can Suspend the system. What this does is save all of the things you were doing and places it in a temporary snapshot. The next time you start the system, you will be right back where you left it. Press the yellow pause button on the toolbar to test it (or press CTRL+Z). It takes only a second or two to save the state, and only about 30 seconds to restore the state (likely less on a faster computer). Therefore, you can suspend the system any time you aren’t using it to save RAM. Given today’s Internet-focused society, I expect most of you will keep the system up at all times. Remember, though, that suspending it works even if you turn off your host computer.

You use the above method for a week or two. Then, while browsing the Internet, you want to make a new avatar for yourself on a forum, but you forgot to install Photoshop. You can install Photoshop, but then what if we need to restore a snapshot? Photoshop will be gone. The answer is to create another snapshot after you install Photoshop. I recommend that you call it “With Photoshop (maybe unsafe)”, and in the description make sure you state that it may be unsafe. However, after using your virtual system for another week or so without any spyware problems, you may go back and change the name and description to “Known to be Safe”. Then, if you do in fact get any spyware, you may revert to the “With Photoshop” snapshot instead of the BASE snapshot. By following the renaming policy, you will ensure you always know if a snapshot is safe or not. Either way, you always know that the BASE snapshot is spyware-free, if worse comes to worse.

The above procedures give you an idea of how to include virtualization in your computer life. It will vastly improve the security of your host computer, making it physically impossible to get infected with spyware ever again (as long as you follow the rules of only using the Internet on the virtual system).

One last thing I would like to mention is using a virtual machine as your main system. This way, you could use Word, Photoshop, iTunes, etc. all on a virtual machine. The only things that wouldn’t work well are very graphically-intensive applications such as games; those would require the host machine. However, by creating a series of rolling snapshots you could effectively backup everything on your virtual system so that reverting to a snapshot in the case of spyware infection wouldn’t result in a major loss. What I mean by rolling snapshots is this. You would create one snapshot every week. When creating one for the current week, you would label the previous week’s snapshot as safe. At the end of a month, you could delete all of the safe snapshots except for the latest. This lets you save on hard drive space (because each snapshot takes up a decent amount of space, so you wouldn’t want over 20 of them), while still keeping a good amount of snapshots (at least 4) in reserve in case spyware is found later on. Once every three months, another BASE snapshot could be made. I recommend that you NEVER delete the original BASE, but you can use the rolling method to only keep one or two known-safe BASEs at any one time.

Whether or not you choose to convert your entire computer workflow into a virtual system is up to you. I highly recommend, however, that you at least give the Internet Browser concept a try. It will save you a lot of reformatting and almost completely remove the hassle of spyware. If you have any questions about virtualization in general, or if you have any problems implementing this method, don’t hesitate to ask in the comments.

Posted in Howto's, Tech | 4 Comments »

Using Virtualization to Protect from Internet Malware: Part I

Written by rob on April 1, 2007 – 10:30 am -

Spyware is a huge threat for modern Windows PCs (see my separate article on spyware here). Sometimes, even when using Firefox, you can still be infected with spyware. This usually happens when some program you install (that includes some form of basic spyware) launches Internet Explorer in the background, thus allowing spyware back into the system. There is no fool-proof method to eradicate spyware once and for all, unless you carefully screen all of your downloads and never run any untrusted programs. Few computer users want to be bothered with the task of researching and confirming the safety of every single program they run on their computer, so that means the vast majority of people will be potential targets of spyware. Using Firefox consistently is the single most effective prevention method for spyware, but it is not by any means 100% guaranteed to stop all of these pesky threats from invading your system.

Introduce PC virtualization. Essentially, virtualizing a PC is the act of using software to simulate hardware. The products that allow you to “virtualize” have been around since the conception of computers themselves. Put in simple terms, if you have the correct software, you can simulate another computer that will run on top of your current system. Even if you have one computer, you can simulate dozens of computers (assuming you have enough hard drive space and RAM to harbor all of them) with virtualization. You still may be confused as to what I mean, so I am going to introduce virtualization using a series of screenshots and descriptions. The software that I use to accomplish virtualization is called VMware, but an alternative is VirtualPC. Both work fundamentally the same and their only differences are irrelevant to most normal computer users. The reason I use VMware is because of the snapshot feature that makes this particular anti-spyware method easier to implement.

Before I get started, I just want to introduce two popular vocabulary words. A “host system” is the system that runs the virtual computers inside it; in other words, it is your “real” computer. The “guest system”, on the other hand, is the virtual system itself (the “fake” computer). I will use the host/guest words to refer to the different systems from now on, instead of real/fake.

Beginning the VMware program works the same as any program. I simply click the icon on my host computer’s desktop (this was setup when I installed VMware).

When the program is opened, it looks like follows:

I chose to open a virtual machine. If I wanted to, I could have previously put the desired virtual machine in the favorites panel you can see in the screenshot above. I didn’t because I wanted to show you that this virtual machine is simply a file on my host computer.

The following screenshot shows the main screen you get after opening any virtual machine file. If I were to close the program at this point and reopen it, it would bring me right to this screen. VMware remembers your last virtual machine and will show you the main screen for that machine whenever you start the program.

Because I want to simply demonstrate what a virtual machine is, I just pressed “Start this virtual machine”. I won’t bother with the other buttons for now, and you will rarely have to worry about them at all. What then occurs is the VMWare program displays its logo as it is starting up the Virtual machine. This is the same as Dell or HP displays its logo when you power on your actual computer.

After the VMware logo is displayed, the virtual machine then proceeds to boot, just like any computer would boot. Because this virtual machine has Windows XP Pro on it, the screen shows the Windows logo that all of you XP users will be familiar with.

From here, the computer finishes booting. I have automatic logon enabled on the guest system, so I don’t get the Windows XP logon screen that some of you probably are familiar with. Instead, it goes straight to my desktop. This is a pretty fresh Windows install so it still has the green pastures as the desktop, and I have yet to turn off the automatic updates notifier. The only thing I did was install Firefox (something anyone who cares about spyware prevention should do).

Now, to actually use the guest system, I have to click anywhere inside the area that it is being displayed. This causes VMware to “capture” the keyboard and mouse of my computer. Now if I press the Windows key (which brings up the start menu), it will do so inside the virtual machine and not on my actual computer. Anything I type will appear inside that window. Also, my mouse cursor will be restricted to that small area and cannot leave the virtual area. The way you release your mouse and keyboard so you can use your underlying (host) system again is by pressing CTRL+ALT. That instructs VMware that you want your keyboard and mouse back in your real system.

Working inside that little box is no fun. It is even worse if you have the same screen resolution on your virtual machine as you do with your main system, as then the box that displays the virtual machine will have scrollbars and some of the screen will not be showing. To combat this, VMWare has a full screen mode. By pressing the button that is highlighted in the below screenshot, the virtual machine expands to the entire screen. When you are in full screen mode, you can fool anyone, as the virtual machine will look exactly like a real computer. You can escape full screen mode by using the same CTRL+ALT key combination.

Going to the start menu and pressing shut down within the virtual machine will proceed to shut the system down. When it is finished, you will be back to the main screen of VMWare shown a few screenshots up.

That’s all there is to using a virtual machine. You should now have a more clear idea as to what a virtual machine is. Just think of it as a fake computer that is inside your main computer and you will rarely get confused. The biggest thing to keep in mind is that it is a completely separate computer. As far as the local area network goes, it will appear to be a separate machine. Also, it shares no files or settings with your actual underlying system. That is an important concept to grasp before we move on.

All of this talk of virtualization may have you confused. What does it have anything to do with spyware? Virtualization can be used for many things. For example, IT professionals use it to test software before using it on production machines. Help desk personnel use virtualization to have various versions of Windows a mouse click away so they can give exact instructions over the phone without having more than one computer. Virtualizing servers is also becoming popular nowadays because it is more secure and easier to recover from a disaster. After all, if your virtual computer is taken over, it doesn’t do any harm to your main system. With proper firewall rules, virtual servers can be completely contained from a network. The same idea can be applied to home users, except instead of hosting a server all we will be virtualizing is an Internet computer.

That is, we can setup a virtual computer that has nothing but Windows XP and the Internet on it. Then, we can browse the Internet to our heart’s content. Even if some spyware slips between the cracks, it will never affect our underlying system with all of our files and important data. Far too many times are people required to reformat their hard drives and reinstall Windows because they caught a bad case of spyware or were infected by some nasty virus. If the same thing happened in a virtual machine, it would require you to do the same thing… except virtually. That means that reinstalling Windows in your virtual machine will have no effect on your files on your main system.

VMware also has a new feature called snapshots that rids the need of reformatting even the virtual system. Simply put, if your virtual computer gets all kinds of spyware or viruses, you can simply revert to the latest snapshot (before all the spyware showed up). It works sort of like Windows Restore should work, but I think we all know that Windows Restore doesn’t help the spyware problem. In the next post I am going to give step-by-step instructions to implement this snapshot system with VMware.

Posted in Howto's, Tech | Comments Off on Using Virtualization to Protect from Internet Malware: Part I

Howto: Dual-Boot Windows Vista and XP

Written by rob on December 23, 2006 – 11:50 am -

From what I’ve heard, the easiest way to dual-boot Vista and XP is to let Windows XP remain on its partition (assuming you already have XP installed and want to keep that installation), and then install Vista on another partition. Vista automatically creates the boot menu for you, and it works perfectly.

Unfortunately, I installed Vista when none of my other hard drives were connected (to try to prevent data loss). I also didn’t have any XP installs on the other hard drives that were worth booting. This left me with no automagically-working boot menu. So, I installed XP on a second hard drive, and then restored the Vista boot record by using the Vista install disc (so the computer wouldn’t just boot to XP). This got me back into Vista, but still no boot menu. What is a guy to do? Hit up Google.

I went through some of Google’s top entries. Most of them were complex procedures dealing with a utility called “bcdedit” that is run from the command line under Vista. Despite the complexity, I still tried it, but to no avail. Some more searching led me to a utility called VistaBootPRO, which promised to take the bcdedit procedure and make it easier. While it did make it as easy as a drop-down menu and the click of a button, it still failed to create a working boot entry. I also was led to a Microsoft Knowledge Base article that is dedicated to this particular topic (click here). It, however, did not help. It seems that few people actually understand the voodoo behind the new BCD that Vista uses instead of boot.ini. After browsing more forum posts and trying a combination of everything, I seem to have found the working formula. Below is the step-by-step guide to getting Vista and XP to dual-boot if you installed XP after Vista like so many of us did (especially when we realized that Vista can not sync with iPod).

  1. When you turn your computer on, does it boot into XP or Vista? If Vista, you can skip to step 7. If XP, then continued with step 2. (Note that even if it does boot Vista, no harm will be done by following the below steps, and you might as well do them if you want to make sure this procedure works. I haven’t tried doing the procedure without steps 2-6.)
  2. Insert your Windows Vista DVD into the computer. When prompted to press any key to boot from CD/DVD, do so. A Vista boot menu will come up asking you to select either the x86 or x64 installation; choose the one that pertains to your Vista install. From there, the setup will load, until you are finally presented with a box asking for language information. Confirm your language, then press OK. A new box will come up with the option to Install Vista Now. Do not choose that; instead, select Repair Installation at the bottom. It will search for Windows installs. It may or may not recognize the XP install, and it may or may not tell you that the install needs to repair. Cancel any box asking you to “repair and restart”, and simply choose your Windows Vista install in the box. Press OK, and then select “Command line” from the dialog box to open up the command line.
  3. In the command line, you should be in a directory on the CD. For example, I was in some directory like H:/sources/vista/x86 (or something along those lines). The important thing to note is that your drive letter may be completely different. (One way to make sure you are indeed in the Vista drive is to use the “dir” command. If you hear the CD drive spinning, then you are in the right drive. If not, you can change to it by typing “H:” or whatever your drive letter is and pressing enter.) To go up a directory from the command line, you must use the command “cd ..”. Type in that command and press enter. Continue to type the command until your current directory is only the drive letter. In my case, the prompt would look like “H:\>”, but again, your letter may vary. We now want to change to the “boot” directory, so type the command “cd boot”.
  4. Now we are in the boot directory of the Windows install DVD. This is where the fun begins. We first need to restore the MBR. This is the part of the hard drive that tells the computer what OS to boot. When you installed XP, XP overwrote the MBR and this caused the computer to ignore Vista completely. We can fix that with one simple command. Type in “bootrec /FixMbr” and press enter. It should tell you that the operating completed successfully. Also, issue the command “bootrec /FixBoot”. With those two commands, Vista should be ready to boot when you restart the computer.
  5. Before we restart, there are a few more things we can do to ensure the success of the next few steps. The reason we went into the “boot” directory of the CD is to access a utility called “bootsect”. This restores the boot code. I don’t think this is extremely necessary, but Microsoft includes it in the knowledge base article I linked to from above, so it must have some use. To use the tool, just type the command “bootsect /NT60 all”. It should say operating successfully completed for each of your partitions. I also like to use “bootsect /NT60 C: /force” just for good measure, so use that as well.
  6. Now we are ready to start the real magic. Type “exit” and press enter. In the dialog box that you are brought back to, press Restart. Either remove the DVD from the drive or just don’t press any key when prompted to on the restart. Let it boot from the hard drive. You should now be able to get into Vista.
  7. Here is where the fun begins. Instead of following Microsoft’s procedure of using bcdedit, we will use a program that makes everything easier. I initially used VistaBootPRO, but I recommend EasyBCD… it just seems more user-friendly. Download and install that.
  8. With EasyBCD started up (Windows UAP will require you to Allow it), select “Add/Remove Entries” on the side bar. This brings up a few options. The only one we need to concern ourselves with is the “Add an Entry” menu at the bottom of the screen. Windows is already selected, so that doesn’t need to be changed. Select “Windows NT/2k/Xp/2k3” as the version. For the drive letter, type the drive letter of your Windows XP install followed by a colon and a backslash. My XP install was D, so I typed in “D:\”. Name it whatever you want; I used “Windows XP Pro” as the name. Finally, press Add Entry.
  9. What we now have is a boot menu that let’s you choose either Vista or XP Pro. However, if you try to restart now and select XP, you will get an error. The same thing would happen if you followed Microsoft’s knowledge base article. The part that everyone seems to omit is that you must copy three files from your Windows Vista drive to your Windows XP drive. I give credit to “Computer Guru” (the creator of EasyBCD), because he directed someone to copy these files on the NeoSmart forums.
  10. Before the files can be copied, you must be able to see them. Unfortunately, they are hidden since they are important OS-related files. To view them, open up Control Panel within Vista and go to Folder Options. In the view tab, there is a list of options with checkbox. Uncheck the box next to “Hide protected operating system files”. A dialog box will confirm, so press Yes. Now you can press Apply and close the window.
  11. Now open up Computer from the start-menu. Double-click your Vista system drive. Now go back to the Computer window and double-click your XP system drive. With both open, you are ready to drag-and-drop the files. The three files we need are: “boot.ini”, “ntldr”, and “NTDETECT.COM”. Select the first one in the Vista drive window, hold down the control key, and then select the other two. When all three are selected, make sure you have both the Vista and XP drive windows visible so you can drag and drop the files from the Vista drive to the XP drive. Windows UAP will require you to confirm the operation, so do so. Vista will then copy those files to the XP drive.
  12. Now, after all that, you should have a working boot menu. Restart your computer and test booting into both XP and Vista. It should work like a charm!

Note: If you have the desire to keep some file synchronized between your XP and Vista installed (like, say, your iTunes folder), it seems that Microsoft has an incredible fast and powerful tool for just that called SyncToy. Give it a shot!

Posted in Howto's, Tech | 7 Comments »

Howto: Secure a Web Browser over WiFi

Written by rob on May 22, 2006 – 11:12 pm -

The following link points to a simple and easy-to-follow guide on how to secure your web browsing experience over WiFi, using SSH encrypted tunnels. Keep in mind that whenever you use your laptop computer to connect to a WiFi network that you don’t own (Starbucks, McDonald’s, random unprotected access point, etc.), there is a possibility that someone on the network is running a network sniffer. Doing something as simple as opening your e-mail client can give them access to your passwords (POP3 has always been notorious for sending plain text passwords over a network).

While you may be thinking your e-mail password isn’t that important, think of how many private e-mails you receive, or how many times you type your credit card number online. While it is a bad idea to be shopping online via an untrusted Wireless hotspot in any situation, the following guide makes it a LOT safer, to the point where the most skilled network crackers won’t be able to get your data.

Click here to read the full guide. The guide is geared towards Windows users running Firefox and GAIM. The technique used will also work for Internet Explorer and regular AOL Instant Messenger. In the comments section, someone describes how to do the same thing on Mac OSX or Linux.

Do yourself a favor and keep this guide in mind any time you have to make a last-minute online purchase while using an untrusted access point (when I’m down the shore, I use an unprotected hotspot to trade stocks. While E*Trade has the standard web RC4 encryption which has never actually been broken, cracking into my e-mail would pretty much lead an attacker to discover the answers to my Forgotten password question, and then let them reset my password and retrieve it since they have access to the e-mail. I will be using this from now on!)

Posted in Howto's, Tech | Comments Off on Howto: Secure a Web Browser over WiFi

Howto: Burn an AVI file to DVD

Written by rob on April 15, 2006 – 10:54 am -

The first thing most people notice when they get a new DVD burner and go to burn that nice file they get from the Internet onto DVD is that it isn’t particularly simple. Burning a CD is something anyone can do: just drag and drop a few things in Winamp, Windows Media Player, Nero, iTunes, or countless other programs, and you have a beautiful audio or data CD. Windows even has an integrated way to burn Data CDs, right from within the Explorer interface. Piece of cake.

DVDs, however, enter a realm of codecs, framerates, and other things that generally don’t need to be worried about for CDs. Most songs that exist digitally are either mp3s, wmas, or aacs, with a few exceptions. Most programs can easily handle all of these. Furthermore, it is easy to tell between formats because they all have different file extensions. That is, you instantly know song.mp3 is an mp3 file. With video files, that is not how it works. Nearly every digital video file downloaded from the internet is in the AVI format. However, AVI is simply a container format, and actually is not a video compression format. Inside those AVI files could be Microsoft MPEG-4 type video, which Windows Media Player can easily handle, or maybe some Cinepak codec video. However, the most popular formats nowadays are DivX and Xvid, both of which cause Windows Media Player to choke (without the proper help). Regardless, these video formats all come in AVI, so it is difficult to tell which is which. A useful tool called GSpot (interesting name, I know) can give you tons of info on AVI files, including framerate and codec, and helps demystify these common issues.

The other thing I mentioned is framerates, which is measured in frames per second (fps). You either have 25 fps (PAL), 23.976 fps (NTSC Film), or 29.97 (NTSC) framerate. The former is used in Europe, while the latter two are used in America. NTSC Film is used on Hollywood DVDs (i.e. DVDs you buy from a store), while plain old NTSC is the American format for digital video. I’m sure each one has plenty of other uses, but that is the ways I remember them as. You can get any one of these three in an AVI file. Having a PAL usually means it was recorded in Europe or Canada, while NTSC Film means it was ripped from a DVD (see this article on how to rip DVDs). But it doesn’t really matter why a certain framerate is there… all you need to know is that you must have it at 29.97 to burn it to a DVD that will work on American DVD players. And don’t you know that 29.97 is the least common framerate for Internet-downloaded videos?

The reason for the above description is just to introduce to you how daunting burning AVI files can be. If you understood everything said above 100%, you can most likely handle burning DVDs the way I do. However, if you don’t, you may want to look at the many tutorials on, the amount of which are available can also be a bit daunting, because the one I wrote is not exactly detailed.

The last thing I wanted to say is that there are programs available that (allegedly) automate everything for you and make it nearly as simple as burning a CD. Included with Nero Ultra Edition is Nero Vision Express (renamed to Nero Vision in version 7), which I will say works very well in most cases. I personally use Nero Vision to burn quick movies, like on Video CDs for example, if I just want them to be watched once. However, it doesn’t really give you the ability to get maximum quality if that is what you want. But the biggest problem with Nero Vision is the fact that you need to separately purchase various codec files, like AAC and Mpeg-4, to open most video files. Moreover, it still doesn’t handle certain files for no disclosed reason. When trying to quickly burn Chronicles of Narnia to DVD, Nero looked like it read it fine when making the chapters and during the preview stage, but when you get to burning it it errors out within five seconds, and the log has no details of why. It is for that reason that Nero Vision isn’t the tool for EVERY situation. While I know there are many others (Sony DVD Architect, DVD Santa, Pinnacle Studio, to name a few) I have had problems with almost all of them.

On a small side note, I’ve never had any issues with DVD Santa, and it is really easy to use. If you don’t want to learn about video files, etc., I recommend it highly. The only reason I don’t use it a lot is because it is TOO simple. It doesn’t give you enough control of the files. But again, it is great for beginners and those of you who don’t care to learn the small details and make absolutely perfect DVDs.

But, if you feel like you have what it takes to tackle burning DVDs the long way, you will be very impressed by the final result. In many cases, DVDs I make turn out better than the source material because I can apply various filters to fix up dark or bright (or grainy, etc.) videos, and resize them with barely any loss of quality. The howto that I am going to link to is simple a Word document (that I converted to HTML for sharing purposes) that I made for myself, as a sort of personal TODO list while burning AVIs to DVD. It is by no means step-by-step in terms of covering every single little detail, but if you understood everything above and don’t mind experimenting a little bit, I am sure you can take a lot out of my guide below.

Aside from the great quality, the other huge reason that I burn DVDs with this method is that it preserves audio/video sync. My biggest problem with Nero and Sony DVD Architect was that they produced un-synced DVDs, which gets ugly real quick. I had a Bourne Supremacy DVD that had about a six second delay by the end… not pretty at al, which was burned with Sony DVDA. The same video file burned with the below method not only looked better, but stayed in sync the entire time. (Note: most of the times when things get out of sync it is because the source is a PAL video and you are converting to NTSC, adding video frames but not taking care of the audio. That is why in my method we separate the audio and video streams in the beginning).

But enough talk. Without further ado, click here to access the “howto”. I will attempt to support people that have questions, but a lot of it really depends on the source video. If you give me a screenshot of GSpot output, I could probably help you the best.

Posted in Howto's, Tech | Comments Off on Howto: Burn an AVI file to DVD

Howto: Maximize your iPod Battery Life

Written by rob on March 8, 2006 – 9:39 pm -

Charging your iPod is a rather simple process. Just plug it in the wall or into your computer. But is it really as easy as everyone thinks? The answer is No, or at least not if you want to keep your battery in good health. Plugging the iPod in to charge it is just the means to charge. Much care must be taken when charging the iPod’s battery to make sure you don’t overcharge it.

The iPod (all versions, except maybe the Shuffle) use a Lithium Ion battery. All that needs to mean to you is “some kind of rechargeable battery”, but it is actually a rather fascinating technology. Lithium Ion batteries are in many consumer electronics, such as some digital cameras, cell phones, and MP3 players like iPods. They are used mainly because of their light weight compared to other battery standards. Many laptop computers also use Lithiums, though they have larger ones than normal electronics. Regardless, they are also sort of sensitive. Anyone can charge it and be relatively safe, but charging it in a way to keep your battery going for many years is the tricky part. That is what I hope to demystify.

The first thing you want to keep in mind is overcharging. That is, you don’t want to charge the battery too much. Lithium Ions are designed in a way where they can actually be harmed by being charged too much. So, for example, charging a battery over night is a bad idea. Once or twice won’t hurt anything, but don’t make it a regular practice. Moreover, the batteries like to be worked a little bit. Think of it as a battery that likes to exercise. If you plug in your fully-charged iPod while listening to music, it will not be utilitizing the battery at all, which will slowly but surely harm the life of the battery. Instead, you should keep it unplugged as much as possible. By letting your battery be used on a daily basis is a lot better than just keeping it plugged in all the time. Fully using up the battery on a daily basis is not the ideal situation, but it should not harm it as badly as overcharge or not exercising the battery at all.

On the note of fully using up the battery, fully discharging the battery is recommended approximately once a month. So, ideally, if you use up about half your battery each day, and then charge it fully every night (taking care not to overcharge) you will never completely dissipate the energy. A full discharge is, however, a good thing in moderation. It “cleans the system”, so to speak, getting rid of any electrical abnormalities. Naturally, your battery will be fully depleted some days with a lot of use. It is not a big deal if it is fully depleted more than once a month, but try to keep it to a minimum.

Another major concern is temperature. Keeping your iPod (and its battery) in your hot car is a really, really bad idea… perhaps worse than overcharging. The ideal temperature for Lithium Ion batteries is about 60° F, but can operate safely anywhere between -4 and 95° F. So, realistically speaking, you should be fine unless you leave it in a trunk of a car in the middle of July or if you put it in the oven.

Also, if you plan on not using your iPod for an extended period of time, such as going on a month-long vacation or something like that, you should fully charge it before you go, and as soon as you come home. Lithium batteries, as mentioned above, like/need to be used, so letting them sit for extended periods of time can harm them.

One final note is that of the battery indicator. Apple’s site has an article that describes the fact that the battery indicator in pretty much every iPod is inaccurate. In fact, they are inaccurate in almost all devices, as it is impossible to measure it perfectly. So, don’t worry when your iPod seems to be running out of battery according to the indicator. Just listen to it as long as you want. If it does in fact run out, then you can charge it then. Otherwise, charge it when you are finished. Charging while you are listening should only be done after the battery is substantially depleted already.

I keep my iPod in the dock nearly all the time, but keep the dock connector that actually connects the dock to the wall unplugged most of the time. I don’t usually charge it until the indicator shows only a sliver remaining. When I do charge, I only do so for four hours (or until it is fully charged), not overnight.

When you get the hang of it, it isn’t really that difficult. However, care should be taken if you don’t want to be shelling out $65.95 every six months. For the record, my original 15GB iPod got around 6 hours of battery life after one year of use. Considering it didn’t get much more than 6 hours when I first bought it, I think this method words pretty good. My new Video gets some ridiculous amount of music play time. I’ve never actually timed it, but it’s at least ten hours. If you have an iPod, try to follow the above instructions. You will be glad you did when your iPod can playfor years to come.

Posted in Howto's, Tech | 2 Comments »