Windows 7 – HowTo change system HDD to SSD (With built in tools only)


  • Current Laptop or PC
  • New SSD
  • External Harddisk (for backup, so it’d better be fast and big)
  • One empty DVD (or the recovery disc)
  • Bunch of screwdrivers


  • Shrink your HDD partition to a size smaller than the SSD (*)
  • Create a recovery disk
  • Create a system image with Windows backup on the external Harddisk
  • Replace your HDD with the shiny new SSD
  • Boot with recovery disk
  • Choose to restore from a system backup

(*) The first part is realy important. I ran in a nasty trap when I changed my disks: I shrunk my system partition to fit on the SSD, but while I recovered, the recovery tool told me there wasn’t enough space on my target disk. The problem was my own lazyness: I created a new partition on the HDD where I moved all the not needed files.

The system backup tool tries to recover your whole system, not only your system partition. So be sure that all partitions on your HDD in sum aren’t bigger than your SSD

HowTo shrink the partitions:

HowTo shrink if there are “unmovable” files:

Setting up Wifi on Ubuntu 12.04 Server via command line (yeah, finally some technical stuff )


Setting up a wireless adapter on Ubuntu server 12.04 LTS via CLI isn’t THAT easy. Plug’n’Play doesn’t simply work. Good thing there is Google. And a lot of helpful sites.


Insert the stick (or boot with it) and connect automaticly to the preferred network

Continue reading Setting up Wifi on Ubuntu 12.04 Server via command line (yeah, finally some technical stuff )

A new project

Whoohaaa a new project from the university. David and I were assigned to the Computer Museum on the university campus. There we (and six other students) will be responsible to install, customize and deploy a tool called CollectiveAccess (Homepage). CA is a open source tool to register items, tag and mark them and then display them on a front end.

There were two teams of the terms before us, who already made some analysis, set up server and even made some sleek videos of some of the items. We’ll have to analyze which of their data is useful for us and which data can be abandoned.

In this project, we will work closely with the museology team of our university, so it’s a interdisciplinary project. We’ll have to see if we can help them with our skills

Oh noez, Hackerz!!!!

Today I detected that one of my sites was hacked. Some punks got access to one of my webservers, added some files and altered some other files. Lucky me, on this webserver is php forbidden and they couldn’t do any harm.

But from the start:

I host the website for one of the local sport clubs. The website is static, showing only some pics, contact and legal stuff. Once a year there I make a short report how the website is doing and what I’ve done. The deadline for the report is next saturday and so I decided to look on the webserver. And what did I found there? A recaptcha.php file:

Screenshot showing a recaptcha.php file in a filebrowser

This is funny, ’cause php isn’t allowed on the server. And hence it won’t work… I downloaded the file and promptly my antivirus software alerted me, that there is a “PHP/Agent.FA” virus in the file. Now I’m curious.

In the file is a decrypted javaScript call to an russian webserver. Good for me, the service provider disabled all *.php files, returning only a message that php is disabled. So the JavaScript couldn’t be executed even once. But if the hacker got access to the server and could already upload files… maybe he altered some too!

He did. In my index file is a new <script>-tag. It’s 100 lines of obfuscated code, very complex and nested. After half’n’hour of starring at this horror, I decided to decode it.

I wrote a small program in java which translates the \x64 characters into more readable chars. After that I only had to follow the functions… Unfortunatly all functions where named “I”,”j”,”l” and so on…

Finaly, eager to know what this function was intended to do, I set up a virtual machine (without network), and executed the script. The function added a new iframe to the site which loaded a new website. I googled the site and got warnings all over… This one should load a virus to my pc…

So in theory some people could have been infected with viruses by my site. Disgusting thoughts… Good for me, the website wasn’t well programmed (not my fault ^^) and had a problem with the frame/noframes tags. This circumstance in combination with the generic nature of the attack saved saved the visitors of the site from viruses.


I was blind to the risks of hackers. The password seemed to be to short/easy or was hacked… I reported the hack to the chairman of my club, uploaded a clean version of the website and altered the Password. Hopefully this is enough.