Jump to content

Wikipedia:Reference desk/Computing: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎nokia: new section
Line 677: Line 677:


how about the zip code?[[User:Boomgaylove|Boomgaylove]] ([[User talk:Boomgaylove|talk]]) 05:35, 20 February 2008 (UTC)
how about the zip code?[[User:Boomgaylove|Boomgaylove]] ([[User talk:Boomgaylove|talk]]) 05:35, 20 February 2008 (UTC)

== nokia ==

this is my imei and i cant generate a new security code that works.its an 1110 nokia.what cud be the problem help?354572018159830

Revision as of 12:48, 20 February 2008

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
  • [[:|{{{1}}}]]
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


February 14

C++

Can Dev-C++ compiler compile ANSI-C++? Zrs 12 (talk) 02:09, 14 February 2008 (UTC)[reply]

Dev-C++ is an IDE that uses the gcc compiler. By passing the -ansi parameter to the compiler, gcc will do that (according to the command line help, -ansi is a synonym for -std=c89 for C or -std=c++98 for C++. Edit the project files and add -ansi or -std=c++98 in the extra compiler options. That should do it. -- ReyBrujo (talk) 02:18, 14 February 2008 (UTC)[reply]
Ok, thanks! Zrs 12 (talk) 02:34, 14 February 2008 (UTC)[reply]

Cannot Format Jump Drive

After I plug it in, it lights up and an E: drive shows up in "My Computer." When I try to click on the drive, I get a message to format it. I get the warning about deleting all my files, but agree anyways. However, it pops up a "Cannot Format" message. Also, when I run the error checking thing under the Properties>Tools menu, the box disappears, but nothing actually happens. Finally, I should note that on that same Properties menu, the disk size shows up as 0.

How can I get it to work? —Preceding unsigned comment added by Kuanche (talkcontribs) 02:45, 14 February 2008 (UTC)[reply]

Think of a train with many cars; each one connected to the car before and after it. You are using a user-level program to get the operating system to get the computer's hardware to talk to the USB system to reach the controller chip in your jump drive in hopes of getting access to the memory chip and then maybe the data in the chip. Whew!
A little thought will tell you pretty much where this train is broken: between the controller chip and the memory chip. The controller chip is willing to talk to your computer, but it is unable to talk to the memory chip. You can double-check this by testing another jump drive; if it works then everything in your computer is good, it's a breakdown inside the jump drive itself. Unless you do microminiature circuit board repair, there aren't a lot of choices here. (Caveat emptor: fixing such devices long enough to get files back is what I do for a living, so my opinion may be biased) -SandyJax (talk) 17:09, 15 February 2008 (UTC)[reply]

Firefox bookmarks backup

Is there anyway I can back up the bookmarks in Firefox in plain links? When I open the bookmark file in notepad or Word it gives me a bunch of junk. I only have to make a copy of some of my bookmarks for a project at school, yet the rest of my folder is huge, and the project folder isn't small either, but I suppose I could copy/paste the addresses manually if I had enough time. 67.188.81.158 (talk) 03:54, 14 February 2008 (UTC)[reply]

If you select Bookmarks/Organise Bookmarks, then File/Export, you can save them as an HTML page, from which it would be easy to extract the ones you want. AndrewWTaylor (talk) 07:57, 14 February 2008 (UTC)[reply]
You could also try Foxmarks http://www.foxmarks.com --Christopher Kraus (talk) 01:06, 18 February 2008 (UTC)[reply]

Repair Office 2003

When I installed MS Office 2003 I had two hard drives - C: and G: and I have subsequently removed the G Drive. Office still works fine, except that updates fail to install (if I plug in the old G drive then they succeed). Problem is I have since wiped and reused the old G Drive, so I doubt this route will help in future. If I try and reinstall,repair or "detect and repair" I just get the error that G:\ cannot be found - unable to proceed. How can I stop it from looking for the old installation so that I can set up a clean installation just on C: ?--196.207.47.60 (talk) 04:02, 14 February 2008 (UTC)[reply]

Did you customize the installation settings in any way? Was it a "default" installation? Kushalt 12:55, 15 February 2008 (UTC)[reply]

Changing the title of an article

How do I change a title of an article? I just realized I labeled it slightly wrong... —Preceding unsigned comment added by Mooney 06 (talkcontribs) 06:07, 14 February 2008 (UTC)[reply]

When you have become an established user (3 days IIRC), you will have an extra button on top of each page labeled "Move", and from there you can move articles, thus renaming them. In the mean time you can put the current title of the article and the title you want to change to, and someone from here will do it for you. --antilivedT | C | G 06:48, 14 February 2008 (UTC)[reply]

Graphics card

which is better onboard graphics or Nimda GeForce Graphics card —Preceding unsigned comment added by Sedai lunga (talkcontribs) 08:47, 14 February 2008 (UTC)[reply]

Generally speaking, any onboard graphics card is inferior to any currently available ATI or Nvidia card. -- Meni Rosenfeld (talk) 09:28, 14 February 2008 (UTC)[reply]
nVidia are currently considered the standard graphics card for gaming... depends on what you want. But, yes, as noted by Meni, onboard graphics card are only for low stress applications etc. For gaming and other high demand programs you'd want a GeForce card :-) ScarianCall me Pat 09:47, 14 February 2008 (UTC)[reply]
Only recently- don't forget ATI, which has been sitting on the back burner lately but is just as good if you don't want the insane $1200 cards :D\=< (talk) 16:22, 15 February 2008 (UTC)[reply]

PDAs and e-books

I'm looking for a PDA, only for reading e-books in it. Any suggestions? --Taraborn (talk) 09:01, 14 February 2008 (UTC)[reply]

List of e-book readers? :-) ScarianCall me Pat 09:45, 14 February 2008 (UTC)[reply]
Unfortunately those devices are expensive, bulky and non-versatile. I think a PDA fits better my needs. --Taraborn (talk) 10:06, 14 February 2008 (UTC)[reply]
Category:PDAs perhaps? ScarianCall me Pat 10:18, 14 February 2008 (UTC)[reply]
Yes, those articles are informative but hardly answer my question, I'd rather hear someone who has some experience with PDAs for this purpose. Thanks for your answer, anyway. --Taraborn (talk) 10:46, 14 February 2008 (UTC)[reply]
Oh, I do apologise... I was just hoping that maybe you could run your own comparison and decide for yourself. Sometimes a PDA that suits someones needs might not be suitable for the next person... Sorry I couldn't be of any more assistance, friend. ScarianCall me Pat 11:10, 14 February 2008 (UTC)[reply]
I guess you didn't understand my last point, but, never mind. Perhaps somebody else has something to add. --Taraborn (talk) 16:27, 14 February 2008 (UTC)[reply]
I believe the Sony CLIÉ PDAs were considered good for that purpose. Since they are no longer in production, you'd have to search for a used one (which should make one fairly inexpensive). --LarryMac | Talk 17:00, 14 February 2008 (UTC)[reply]
PDAs good for ebook reading are ones with black-and-white screens. Unfortunately, I don't think anybody makes one anymore. --Carnildo (talk) 21:33, 14 February 2008 (UTC)[reply]
I would definitely go for one that uses electronic ink if you're going to be reading full-length books on it. --Sean 22:56, 14 February 2008 (UTC)[reply]
I use iPAQ hx2700. I read *a lot* of books on it, and only occasionally do I play any games. I chose this model because it had better battery and was cheaper than similar models. But this was 2 years ago. Dunno if this would still be the best choice. And if I understand electronic ink devices correctly, you cant read them in full dark, when I found my iPAQ excellent for reading in full dark. For example while riding bus or train during night. — Shinhan < talk > 17:40, 15 February 2008 (UTC)[reply]
Thanks! --Taraborn (talk) 19:15, 17 February 2008 (UTC)[reply]

Answer plz

Which system is faster? Please explain in detail why.First A(Processor Celeron Dual Core 2 GHz, Ram 1024 MB,Monitor 17 inch,Printer 3 in 1 lexmark,Modem GPRS 384kbps, HD 120 GB and onboard graphics) or second B(Processor Celeron 3 Ghz,Ram 1024,monitor 21 inch,Printer laser Hewlett,PCI Modem 56kbps,HD 80 GB and Nimda GeForce graphics card —Preceding unsigned comment added by Sedai lunga (talkcontribs) 09:04, 14 February 2008 (UTC)[reply]

This depends entirely on what you want to do with it. I'm not sure the correct question is which is "faster" since there are many measures to the quality of a system other than speed. It will also help if you specify which Nvidia Geforce card system B has. -- Meni Rosenfeld (talk) 09:31, 14 February 2008 (UTC)[reply]

Mozilla password

Does anyone know how to get Mozilla Firefox to automatically fill in a password? I'm on a proxy server and whenever I go on to a new page I have to click OK to the password several times. Is there any way I can get Firefox to fill this in instantly without asking me? I have searched the Internet but found nothing. Thanks in advance, WikiwikiJimBob. Wikiwikijimbob (talk) 11:40, 14 February 2008 (UTC)[reply]

Have you tried: Tools --> Options ---> Security? - There's the password options there. ScarianCall me Pat 11:42, 14 February 2008 (UTC)[reply]
The "remember passwords for sites" button doesn't work in this instance. I can't see any option that would work. Using a master password requires me to put that in and then to OK the proxy server's username and password. I hope that there is a way of doing it because Firefox is so much of a better browser than Explorer (and it's safer too). If you know a way to make it work, please let me know. Thanks again, Wikiwikijimbob (talk) 14:40, 14 February 2008 (UTC)[reply]
The Novell Bordersomething captive portal does some magic to prevent standards-complaint browsers from auto-filling the input boxes. IE just breaks that behavior because it's broken.. but your proxy login might be doing the same thing :D\=< (talk) 17:40, 14 February 2008 (UTC)[reply]
Check to see if autocomplete="off" is present in the form tag in question. -- Consumed Crustacean (talk) 21:05, 14 February 2008 (UTC)[reply]
Where do I find the autocomplete="off" bit? That might help. Thanks for your help so far. By the way, when I use IE I have to put the password in once and then it doesn't require it again. I didn't know if that would help solve the problem at all. Thanks again, Wikiwikijimbob (talk) 09:07, 15 February 2008 (UTC)[reply]
Sounds more like you're not accepting cookies- check your browser settings. The autocomplete though, go to view -> source and hit forward slash to search, then type that in :D\=< (talk) 14:49, 15 February 2008 (UTC)[reply]
I'll try that. Thanks for your help, everyone. I'm not going to be on that server for a week or so, but when I am I'll give those techniques a go. I'll let you know if it works or not. Thanks again, you've all been a great help. Wikiwikijimbob (talk) 19:02, 16 February 2008 (UTC)[reply]

Hard drive noise, and performance with external case

Hi. I'm using a WD1500ADFD, but bothered by its noise. I am considering putting it in an external case and placing that case in a more remote location. Should I expect to see a decrease in performance if the case connects to the computer via USB 2.0? What about if it connects using eSata? Is there any other simple solution to the noise problem? Thanks. -- Meni Rosenfeld (talk) 12:12, 14 February 2008 (UTC)[reply]

something like this perhaps http://www.freepatentsonline.com/7139401.html - couldn't find a product though - or better http://www.acousticpc.com/noise_reduction.html which has real foam products.
Even as an USB acolyte I can't provide any evidence under any conditions that it will be as good (let alone better than eSATA) eg slower List_of_device_bandwidths#Computer_buses_.(external.)87.102.115.36 (talk) 13:10, 14 February 2008 (UTC) .. USB=Slower[reply]
Also found this (try "hard disk noise reduction" search for others) http://www.quietpc.com/gb-en-gbp/products/harddrivesolutions/quietdrive87.102.115.36 (talk) 13:14, 14 February 2008 (UTC)[reply]
Ok, thanks! -- Meni Rosenfeld (talk) 13:57, 14 February 2008 (UTC)[reply]
ADVERT! I use exclusively flash based usb storage - which is fine if like me you think 8GB is a lot of memory. Ignoring any published numbers I've found much faster than any disc based storage and the silence is golden.. you just need a time machine set to +5 years to go buy your 128GB sd card (class 4) for a realistic price.87.102.115.36 (talk) 14:04, 14 February 2008 (UTC)[reply]
Well, I do think that 8GB is a lot of memory, but unfortunately, the people who make software and multimedia seem to disagree. I'm not really into sd cards myself, but I do plan to buy an SSD in a year or two, when hopefully they will be available in native 3.5" form, in a modest size (just for the most important stuff) at a reasonable price. -- Meni Rosenfeld (talk) 14:25, 14 February 2008 (UTC)[reply]
Incredible that we can fit 8 GB on a chip small enough to accidently inhale. Eventually we can probably just store data on nano-sized ships and just pour some goo into our PCs to get more storage. SSD are not a good purchase as of yet, because you pay more per gigabyte than a normal drive. But soon they will be a dime a dozen. I also recommend you mount the hard drive with rubberbands, it works wonders with the noise if you do it right. However, do it wrong and bad things will happen. 206.252.74.48 (talk) 19:35, 14 February 2008 (UTC)[reply]
"...mount the hard drive with rubberbands..." and "....o it wrong and bad things will happen..." Can you be a little more clear? What bad things? How do you do it right or wrong? -SandyJax (talk) 17:14, 15 February 2008 (UTC)[reply]

Laptop network cables

This is what I'm talking about

Do laptops normally have network / ethernet jacks? Can you buy some sort of adapter for a laptop which doesn't have one? Would it connect via PCI cards or usb? Thanx xxx User:Hyper Girl 12:33, 14 February 2008 (UTC)[reply]

Most laptops from the last few years probably have Ethernet jacks. Laptops do not usually have PCI slots. You would probably get either a USB adapter or a PC card adapter. --Spoon! (talk) 12:38, 14 February 2008 (UTC)[reply]
Thanks Spoon, I'm thinking of buying a new laptop so I'll be sure to check. Any links for the USB adapter? xxx User:Hyper Girl 13:43, 14 February 2008 (UTC)[reply]
Try search "usb ethernet adaptor" they are v. easy to get - I'd provide a link but I don't know what country your in.. Amazon sell them, everyone does.87.102.115.36 (talk) 13:50, 14 February 2008 (UTC)[reply]
Belkin sells a USB-to-Ethernet adapter that works and is relatively inexpensive.
Atlant (talk) 13:52, 14 February 2008 (UTC)[reply]
Thanks guys! xxx User:Hyper Girl 13:55, 14 February 2008 (UTC)[reply]
I'm going to toss out an arbitrary number and say that about 95% of modern laptops have a ethernet port. The Macbook Air is one the rare exceptions, but even tiny, inexpensive ones like the ASUS Eee PC have the port. -- Consumed Crustacean (talk) 21:00, 14 February 2008 (UTC)[reply]
Also your laptop probably has at least one Mini PCI slot, though it's for internal things, nothing with jacks. :D\=< (talk) 17:38, 14 February 2008 (UTC)[reply]

HTML (Picture Fading)

Alright. Let's say I was editing a previously made HTML code for a background. Said background has a code on it that makes pictures seem somewhat faded. What exactly should I be looking for in order to delete this thread to make everything vivid and regular?

If you need me to post the code I shall. —Preceding unsigned comment added by EWHS (talkcontribs) 14:54, 14 February 2008 (UTC)[reply]

First, this page is asking questions about Wikipedia. You should ask computer (HTML) questions at WP:RD. Second, HTML does not have the ability to fade images. -- kainaw 14:58, 14 February 2008 (UTC)[reply]
er, dude, this is RD.... —Preceding unsigned comment added by 195.194.74.154 (talk) 15:07, 14 February 2008 (UTC)[reply]
Man - I jumped pages without realizing it. One minute I'm looking through WP:HELP and the next I'm here. I need sleep. -- kainaw 15:09, 14 February 2008 (UTC)[reply]
You should be looking for a script (javascript code) "<script/>" that makes some reference to "fade". Shouldn't be too hard to find. —Preceding unsigned comment added by 195.194.74.154 (talk) 15:10, 14 February 2008 (UTC)[reply]
here is an example [1] —Preceding unsigned comment added by 195.194.74.154 (talk) 15:14, 14 February 2008 (UTC)[reply]
Well, yeah, how is it doing it exactly? Is it using some odd Internet Explorer-only attribute to do it, or CSS, or something weird? It might be helpful to post what you're looking at. -- Consumed Crustacean (talk) 21:08, 14 February 2008 (UTC)[reply]
It's just CSS to get the transparency effect: for another example and CSS code see here. JavaScript is needed for fading in or out: it just gradually changes the opacity. Both IE and Firefox support it, with varied CSS parameters. AndrewWTaylor (talk) 21:22, 14 February 2008 (UTC)[reply]
It should just be CSS, but I recall there being some weird IE-only HTML attribute that does this as well. Hence it may be helpful if the OP posts the section of code in question. -- Consumed Crustacean (talk) 07:55, 15 February 2008 (UTC)[reply]

Microsoft Word question

Is there any character symbol for a check-mark? I can never seem to find it when I scroll through their 8 million other symbols. They have symbols for everything under the sun ... I can't imagine that they don't have such a common symbol as the check-mark. The best I can find is the square root symbol ... but that is not exactly a check-mark. Does anyone know? Thanks. (Joseph A. Spadaro (talk) 17:36, 14 February 2008 (UTC))[reply]

There is one in the Wingdings font set. I was able to put it into a Word doc by using the charmap utility. I don't know how to type it directly. --LarryMac | Talk 18:01, 14 February 2008 (UTC)[reply]
In the Wingdings 2 font, upper-case Q and R give a crossed and ticked checkbox respectively. AndrewWTaylor (talk) 18:54, 14 February 2008 (UTC)[reply]

Microsoft Excel question

Is there any way to "hide" a value --- so that the spreadsheet uses the value in computations, but does not print it out? If so, how do you do that? And also, if so, how does the author know (later on) that there is a hidden value in the spreadsheet ... so that he does not accidentally erase it? Thanks. (Joseph A. Spadaro (talk) 17:36, 14 February 2008 (UTC))[reply]

Perhaps you should explain in a little more detail what it is that you are after. It is possible that what you need is to use a name - you define a formula for the name in the name editor, and can then reference it in cells or other names. You can also hide an entire row or column; so you can put some formula in a cell, hide its row, and then reference it in other cells. Or you can just set the cell's foreground color to white so its value will not be visible. There are probably other tricks as well. -- Meni Rosenfeld (talk) 17:56, 14 February 2008 (UTC)[reply]
Oh, I didn't notice the "so he does not erase it" bit. My first two suggestions should satisfy your need. -- Meni Rosenfeld (talk) 17:58, 14 February 2008 (UTC)[reply]
Yeah, you can either change the font color to white or you could put the reference in a cell that would print on a different page and only print your main page. Useight (talk) 18:46, 14 February 2008 (UTC)[reply]
Meni's first suggestion would probably be my preference for a single value, but if you have more than a couple it might be better to put them on a worksheet that you then hide(Format/Sheet/Hide). This guards against accidental changes but makes it easier to see the values and change them if necessary. If you want to make it more secure you could use a macro to make the worksheet "very hidden", which means it won't show up in the list if you do Format/Sheet/Unhide. However, it's pretty much impossible to guarantee total security in such situations. AndrewWTaylor (talk) 19:00, 14 February 2008 (UTC)[reply]
If you click on cell properties you can hide and lock cells. Fiddling around the with "Protection" options should allow you to make it so that everything is editable except for a select number of cells. --140.247.11.3 (talk) 00:38, 15 February 2008 (UTC)[reply]

Mac OS X kext

Hi all,

does anyone know an small and open-source kext for any wired network chip? I want to port the tigon3 network driver to mac os and need somethin' small to start...any ideas?

88.64.89.40 (talk) 18:18, 14 February 2008 (UTC)[reply]

Not something I've done before but here are a few links that might help: [2], [3], [4]
Good luck, Noah 00:49, 15 February 2008 (UTC)[reply]

A song i found on youtube

i was watching a video that my friend sent me [5] and i was wonder what that song is rite after the guy in the blue shirt breathes fire. when the song that i want to know what its called comes on there is a guy spining in circles and is say 360 vision on the screen. thanks —Preceding unsigned comment added by 76.235.169.189 (talk) 20:40, 14 February 2008 (UTC)[reply]

You Spin Me Round (Like a Record) --tcsetattr (talk / contribs) 21:55, 14 February 2008 (UTC)[reply]
Incidentally, the line "Shut up, will you shut up!" is Graham Chapman as King Arthur addressing Dennis the Peasant in Monty Python and the Holy Grail. Took me a moment to work that out; I thought first of the Travel Agent Skit (in which Mr Bounder says something similar to Mr Smoketoomuch), but Chapman wasn't in that one. —Tamfang (talk) 05:46, 19 February 2008 (UTC)[reply]


February 15

some bastard called ie search has taken over ny system how do i get the bastrds off?Perry-mankster (talk) 00:24, 15 February 2008 (UTC)[reply]

Spybot Search & Destroy. --140.247.11.3 (talk) 00:35, 15 February 2008 (UTC)[reply]
thank you, thank you but is there sumting that does not cost?Perry-mankster (talk) 00:55, 15 February 2008 (UTC)[reply]
Um, Spybot is free. Please try reading what people give you as answers a little more closely!! --98.217.18.109 (talk) 14:54, 16 February 2008 (UTC)[reply]
Yes: your choice among the various Linux distributions. (Ubuntu/Kubuntu/Xubuntu is easy to deal with.) You'll never experience a Windows trojan again, and I'm not aware of any written for Linux. -- Hoary (talk) 01:01, 15 February 2008 (UTC)[reply]
Or one of the BSDs :D\=< (talk) 02:03, 15 February 2008 (UTC)[reply]
Spybot doesn't cost anything. Algebraist 02:00, 15 February 2008 (UTC)[reply]
Right. Nor does Ad-Aware Free, or Microsoft's Windows Defender, both of which seem pretty good at catching things that Spybot misses. -- Consumed Crustacean (talk) 06:34, 15 February 2008 (UTC)[reply]
I am using AVG Anti-Spyware [6]. It is free, too. In a test I saw just recently, AVG Anti-Spyware was the best of the free malware scanners. I earlier used Ad-Aware, but it got the worst score in the test. -- PauliKL (talk) 16:02, 15 February 2008 (UTC)[reply]
Huh. Good to know. -- Consumed Crustacean (talk) 22:03, 15 February 2008 (UTC)[reply]

Photoshop -- Photocopy-like effect?

I have a ton (maybe 3GB worth) of photos I took of documents in an archive with a digital camera. They are all grayscale. I'd like to improve the contrast on them so that they looked a bit more like they would if they were photocopied (both to reduce the file size, and to prepare for converting them all to PDFs and running OCR on them). I need something that can be done in a batched way, say through Photoshops Actions.

My problem is that running "autocontrast" doesn't really cut it (it just balances things out), while more drastic things like Posterize or Bitmap require a LOT of supervision as the gray tones are often a bit different from file to file and something that works on one might render the next one totally white or totally black.

Any suggestions? (Modern) photocopiers almost always seem to get it right. I know this is in part because they have a uniform light source and so that reduces a lot of the variation, but still, they seem to have a somewhat more clever way of reducing the total range considerably while still getting a good, very readable output (and readability is most important here). Any clue as to a good way to think about replicating this? (And no, the "Photocopy" filter in Photoshop doesn't do this, nor does it really try to. I'm not looking for "gritty", I'm looking for "readable.") --140.247.11.3 (talk) 00:34, 15 February 2008 (UTC)[reply]

The "Threshold" function might work, I'm not sure how it will work with batch processing of differently shaded images though. --Canley (talk) 01:20, 15 February 2008 (UTC)[reply]
Try using a reasonably aggressive curve? --antilivedT | C | G 02:58, 15 February 2008 (UTC)[reply]
I don't think increasing contrast would reduce file size (unless large areas of the picture become totally white or black). Increasing contrast may be useful for scanned documents, but I wouldn't use it for photographs, at least not by using batch processing.
You are not likely to get good results with batch processing. You should interactively adjust each image. However, "autocontrast" could perhaps create acceptable results. I don't use Photoshop, but at least on Picture Publisher's autocontrast, you can select how much to sacrifice shades from high and dark end of the histogram, to get higher contrast than the optimal.
PauliKL (talk) 16:30, 15 February 2008 (UTC)[reply]


My copy of PS for mac has a photocopy effect in it already. However, I recommend changing the levels, contrast and possibly adding noise. Radiofred (talk) 12:45, 15 February 2008 (UTC)[reply]

Why not upload an example image somewhere? We can see what you're dealing with 70.65.84.44 (talk) 03:06, 16 February 2008 (UTC)[reply]

Dev-C++ Compiler

I recently downloaded the Dev-C++ compiler. It's working fine except every time I open the program, it has to install and show all the dialog boxes like the first time it's been used. I also have to reconfigure my settings for this reason. Is there any way I can get it to stay installed and not have to go through the installation and setup process every time I open it? Thanks, Zrs 12 (talk) 00:48, 15 February 2008 (UTC)[reply]

You could try Visual Studio 2008 Express Edition.. if you're developing on windows, there is no environment better than Visual Studio :D\=< (talk) 01:09, 15 February 2008 (UTC)[reply]
Not an option. He's looking for a free compiler. In any case, it's actually the GNU compiler, and Dev-C++ is the IDE. And I have had many problems with this product in the past. I would only suggest playing around with the options, or reporting it on their bug noticeboard. The Evil Spartan (talk) 01:13, 15 February 2008 (UTC)[reply]
The express edition is free.. The microsoft compiler is a little screwy, but the IDE is fantastic. :D\=< (talk) 02:01, 15 February 2008 (UTC)[reply]
Oh and let me clarify that by saying that Visual Studio is an entirely worthless pile of complete trash that doesn't even work. Gr. :D\=< (talk) 02:51, 15 February 2008 (UTC)[reply]
Haha. I wish you had said that sooner. I just downloaded it. Zrs 12 (talk) 03:11, 15 February 2008 (UTC)[reply]
It'll probably work fine for you, I'm just one of the people that it mysteriously craps up on so I have to use Anjuta from xubuntu + mingw32 :D\=< (talk) 03:16, 15 February 2008 (UTC)[reply]

So is there any other free C++ compiler anyone would suggest? I'm willing to uninstall this one. It gets really anoying going through the setup process every time I use it. Zrs 12 (talk) 01:58, 15 February 2008 (UTC) OK. Thanks, Zrs 12 (talk) 02:05, 15 February 2008 (UTC)[reply]

Wait. Will it compile ANSI-C++?Zrs 12 (talk) 02:10, 15 February 2008 (UTC)[reply]

It will compile microsoft C++ :) :D\=< (talk) 02:21, 15 February 2008 (UTC)[reply]
That is wrong. I have never had that kind of problems before. Do you have write permissions in the configuration files of the program (I guess so, but you never know). -- ReyBrujo (talk) 02:39, 15 February 2008 (UTC)[reply]
What is wrong and which problems are you talking about?Zrs 12 (talk) 03:11, 15 February 2008 (UTC)[reply]
The original question? :D\=< (talk) 03:17, 15 February 2008 (UTC)[reply]
If you just want a compiler and not an IDE, you could use MinGW, which includes GCC. MinGW is actually what Dev C++ uses for compilation. -- Consumed Crustacean (talk) 22:15, 15 February 2008 (UTC)[reply]

XML schema?

Do you need XML schema if you can generate perfect XML contents by a program?

Why couldn't people just use a simplified computer language to validate XML? If you can use a simplified version of BASIC or C to write the validator, you don't need to learn another set of syntax.

Why are there so many stupid ways to assign a variable? There are only so many types of data and logic operations, why can't they create a unified syntax? Isn't it stupid to have ADD(x, y) or x PLUS y when you can simply write x+y? -- Toytoy (talk) 05:38, 15 February 2008 (UTC)[reply]

It wouldn't surprise me if x+y is just an overloaded operator pointing at an actual function called ADD(x,y) and if something like x PLUS y was retained for backward-compatibility.. there are usually good reasons for this kind of thing :D\=< (talk) 14:45, 15 February 2008 (UTC)[reply]

3D graphics cards - just for games?

So you own a relatively high-end Nvidia or ATI graphics card and a modern CPU. You get a bit of eye candy in Windows Vista, and you can play the latest games. What other applications and software exist that demonstrate and take advantage of modern 3D graphics cards? I`m thinking along the lines of artistic graphics demos, graphics-creation applications, or even inventive game designs outside the standard shooter/RPG/RTS realm. Thanks, –Outriggr § 06:00, 15 February 2008 (UTC)[reply]

Demoscene (specifically, try pouet.net for downloads), 3D computer graphics software, CAD, and there are countless 'inventive' games. Just pulling random (perhaps not altogether inventive) non-FPS/RPG/RTS ones from my computer, I've got Galactic Civilizations 2, Portal, Sins of a Solar Empire, Freespace 2, stuff from ABA Games, Toribash, Porrasturvat, and other things are scattered around. Other things that you may not have thought of include Folding@Home and other GPGPU applications. And of course there are various other bits of 3D software like Google Earth and Celestia, though these aren't necessarily GPU-straining. -- Consumed Crustacean (talk) 06:31, 15 February 2008 (UTC)[reply]
Just a quibble - Sins of a Solar Empire is perhaps inventive, but is it not still primarily an RTS? -- Meni Rosenfeld (talk) 09:08, 15 February 2008 (UTC)[reply]
Also Portal is technically an FPS/puzzle game. Mad031683 (talk) 17:28, 15 February 2008 (UTC)[reply]
Well, they're both pretty much outside of the "standard shooter/RPG/RTS realm", and Sins is sooooo slow. -- Consumed Crustacean (talk) 21:57, 15 February 2008 (UTC)[reply]
In addition... you can enable maximum settings in older games and experience them again; there are many demos lurking around nvidia.com itself; demos from futuremark.com (3dmark) and related; run HDDVD or Blu-ray content on your computer instead of your PS3; do digital (DAT/HD) video-editing and compresssion to DVD or divx. In think we've pretty much covered most of it. It sounds quite limited but I'm personally contented with the wealth of games and demos out there. Sandman30s (talk) 11:28, 15 February 2008 (UTC)[reply]
Yeah, this one is the best part about having a relatively modern machine.. even if it's not a gaming machine you can certainly play like Unreal Tournament, an excellent game better than UT 2k3, 2k4, and 2k8, at max effects and 1600x1200 resolution. :D\=< (talk) 14:47, 15 February 2008 (UTC)[reply]

fonts in the terminal

On a computer not running a graphical user interface, what determines the fonts or letter representations used in the terminal? --Iownatv (talk) 07:33, 15 February 2008 (UTC)[reply]

It depends. My understanding is that the font used by many of these is stored in the video card's BIOS and implements Code page 437, though some operating systems do define their own fonts, or have the option to do so. -- Consumed Crustacean (talk) 07:49, 15 February 2008 (UTC)[reply]
There's an article: Text mode. It's not extremely detailed though. If you're talking DOS, it's probably using the font in the video card's BIOS. Linux distributions are far more likely to load an alternate font for the console, because the video BIOS font wastes a lot of slots on non-essential characters like smiley faces and box-drawing lines, which can be put to better use supporting larger alphabets. (There's only room for 256 characters in a VGA text mode font - 512 if you're lucky.)
Linux distributions are also increasingly likely to enable the fbcon console driver - which doesn't use the hardware's text mode at all, but requires the kernel to do the job of drawing character glyphs, using a default font that's built right into the kernel image! --tcsetattr (talk / contribs) 09:04, 15 February 2008 (UTC)[reply]
Original IBM-PC only had text mode, as did computer terminals such as adm3a, vt100, vt220 etc. Later, display cards were developed that had graphics modes in addition to the text mode. Even today all graphics cards have text mode, which is used for example during the boot time and when you enter BIOS setup.
When using text mode, only the text data is kept in memory (1 byte/character). This limits the maximum number of different characters to 256. The display controller hardware draws the character to the CRT screen on the fly while refreshing the display. The bitmap images of the characters are stored in the ROM of the display controller. Old terminals only had a single 7-bit character set (max 128 characters). More advanced terminals such as vt220 had multiple 8-bit character sets. The user (or the software being run) could choose which character set to use (for example for different languages). Downloadable soft fonts could be available, too. Different fonts (serif, sans-serif etc.) were usually not available (due to the low resolution).
Of course it is possible to create a terminal using graphics mode, too. And if you run DOS-box in Windows, it simulates the text mode inside a graphics mode window. Then you can choose the font from the system menu (at the upper left corner of the window).
-- PauliKL (talk) 17:09, 15 February 2008 (UTC)[reply]

Software cracks

How do people make the "cracks" for software which requires a registration code? Does the wiki have an article on this? I have searched but found nothing. xxx User:Hyper Girl 12:13, 15 February 2008 (UTC)[reply]

Um, is Software cracking of any use? Kushalt 12:51, 15 February 2008 (UTC)[reply]

Thanks Kushal! Someone should really add a link to the disambiguation page. Think outside the box 13:22, 15 February 2008 (UTC)[reply]
Its done. Think outside the box 13:24, 15 February 2008 (UTC)[reply]
A simple explanation may be appropriate.. on Windows (for *nix it's a little weird because of interpreters, though the .NET framework complicates things too) exe files are little more than processor instructions packed together into a file. These binary instructions can (with the oversight of the OS) be placed directly on the CPU's instruction inputs and the processor executes them.. if you're not familiar with how things work at the chip level, it doesn't make a lot of sense but for an extremely simple computer imagine the control lines going into a multiplexer- read that article and it'll make sense. Anyway, so these instructions are just binary machine code.. simple things like ADD, JMP (to another memory location), CMP (compare), but assembled into binary. Well with a (soon-to-be-illegal according to Richard Stallman) tool called a disassembler, you can interpret the binary instructions as data and and parse them so you can see which operations they correspond to, like ADD, JMP, CMP, etc. By examining the (extremely lengthy) assembly code you can get a feel for a program- and since you know exactly what bytes in the program correspond to which instructions (there are few things you can do to obfuscate the machine code since it has to go right into the instruction stack, and none to effectively obfuscate it) you can modify bytes. . . obviously including changing
CMP userinputtedkey therealkey
JNE failed

to

CMP userinputtedkey therealkey
NO-OP
This is ridiculously simple, and I don't know if crackers actually use disassemblers, but you get the theory.. the program is on your computer, and it can be modified transparently, though only on a very low level. A lot of people don't realize this but that's the reality of it- your programs are just data and they can be modified however you please. Microsoft was worried that drivers and other privileged code could be modified however """"malicious"""" people wanted, so they started signing their code, taking a checksum or something of all the code and then checking it before execution and refusing to run if the code has been changed- of course what's to keep people from just cracking the driver checksum code? Well, malicious code can't because of DEP but users can crack their own computer because they have root access (not at all really for Windows, but we'll say they do), and a lot of 64-bit windows users have done that since it doesn't allow unsigned drivers at all. Then Microsoft decided to do the same thing, but extend it so cracker's can't change code in other things too, including game files, so cracks are impossible. How do they do that though, if you can just crack the checksum program? Well they take away the user's low-level access to their own machine (well, another degree since a lot of things in windows are already locked out even to administrators). That's right- there's a higher level account than you on the machine, a hypervisor running in ring -1, and only Microsoft has the 'login' control information, not you. DEP prevents you from changing the code running in hypervisor mode, which includes the code that loads programs into the instruction stack (or whatever it's called I forget) and checks for signed code. That project was called, Palladium, now it's called the Next-Generation Secure Computing Base, coming to a near-future Microsoft Windows, utilizing the TPM in the computer you bought in the last 5 years, and taking away your freedoms. Due to the DMCA it's illegal to flip certain bits in your own memory chip, if those bits have to do with copy protection. With Palladium that's extended to the entire operating system, as well as trusted programs- you're legally locked out of your own machine, and if you attempt to regain control you may go to prison. http://www.gnu.org/philosophy/right-to-read.html :D\=< (talk) 14:38, 15 February 2008 (UTC)[reply]

Froth, I believe you mentioned, quite some time back, that I can disable TPM using BIOS. Can I continue to do that in the future? What if the BIOS does not give that option to me? Do you think Intel will ever take away that option from its customers? Kushalt 16:25, 15 February 2008 (UTC)[reply]

I doubt they'd take the option out of the BIOS and (as long as you don't have anything authenticating to the TPM at boot) you can always just pry it out physically or use a free OS. But take a look at the diagram- without a TPM you can't use any secure applications. Presumably the OS would fall back to a crippled "non-secure" mode that still has functionality, but commercial programs would be encrypted with codes from the TPM so that only your TPM can run them (the wet dream of software licensing).. so you wouldn't be able to run them. SSL would probably be tied into it too so you wouldn't be able to connect to secure sites. But there's really no reason to tear out your TPM- the "trusted" platform is a very good idea from a security standpoint and dedicated cryptographic and key-storing hardware has been needed for a decade.. a TPM is perfect for storing and authenticating SSH keys or for hard drive encrpytion like BitLocker.. but when it becomes "treacherous computing" because you don't have access to it, that's bad. :D\=< (talk) 16:56, 15 February 2008 (UTC)[reply]

So is it "unbeatable"? Can someone "unlock" it? Kushalt 18:04, 15 February 2008 (UTC)[reply]

From what you said, I assume that it is up to the operating system to decide to have trusted or treacherous computing. Can I assume that if an application is available for an operating system that does not recognize Palladium (or some similar acronym), it can be run as if the TPM did not exist on the computer? I am sure that Linux and FreeBSD will have at least one distro/flavor that will not have anything to do with Palladium. If I can cite this, it seems that Mac OS X does not have TPM protection, either. Please correct me if I an wrong. ÍKushalt 18:12, 15 February 2008 (UTC)[reply]

No, the theory is perfect. Inevitably people will leak unencrypted versions of code or (extraordinarily unlikely) the control codes from Microsoft, and certain Palladium apps will become usable without it. But even with a free OS not running a Palladium hypervisor, the code is still encrypted and you need the TPM to use it :D\=< (talk) 21:42, 15 February 2008 (UTC)[reply]

Hm ... Glossary term for me: Hypervisor =P Kushalt 07:18, 16 February 2008 (UTC)[reply]

Edubuntu Installation

Hello!i am facing a problrm that i install Edubuntu 7.10 on my old compaq pc with 550 MHZ processor ,10 GB disk and 128 MB Ram,when i install the winxp after edubuntu as a dual boot edubuntu is not shown as the list and when i try to access the drice D on winxp also there is no D drive in My Computer, so what i do becoz i have many important files in that.......usman khan —Preceding unsigned comment added by Usmanzia1 (talkcontribs) 12:28, 15 February 2008 (UTC)[reply]

Hi, Usmanzial!

I went ahead and added your question as a different heading.

As far as I know, for dual booting between MS Windows XP and a Linux Distro, the best way is to install Windows XP first and then install Linux. I think your situation is more serious than what I originally thought. Do you have back ups of your important files from D:? There is a possibility that you might have deleted the data. If I were you, and if I did not have recent enough back ups, I would keep the computer turned off and try to discuss a solution for data recovery. I am thinking along the lines of removing the hard disk from the computer and adding it as a slave in another computer and trying to salvage the data using data recovery software.

I would like to know what other wikipedians think in this matter.

Kushalt 12:48, 15 February 2008 (UTC) Thank You Kushal but i say how can i detect the D Drive and also Edubuntu not boot.it says os error.i tried partion magic but no plus result.[reply]

runescape

what is the point of this game? —Preceding unsigned comment added by 206.80.28.243 (talk) 15:12, 15 February 2008 (UTC)[reply]

According to our RuneScape article, "Players [ . . . set] their own goals and objectives. Players can engage in combat with other players or monsters, complete quests, or increase their experience in any of the available skills" So the point is whatever you want it to be. --LarryMac | Talk 16:08, 15 February 2008 (UTC)[reply]
It's a fantasy MMORPG.. I'm sure a psychologist could do a real sikoanalyzation but IMO it's about being a powerful figure that all the NPC townsfolk love because you help them and and all the other players respect because you're high level, have good armor, etc.. mostly increases self esteeem, though of course addictive elements like micro- and short-term rewards are the reason people keep coming back :D\=< (talk) 16:19, 15 February 2008 (UTC)[reply]
For most people, to have most ca$h/highest skill level than anyone else has. --grawity talk / PGP 14:29, 16 February 2008 (UTC)[reply]

Powering a video card

Is this power supply sufficient for this graphics card? I'm concerned about the card's system requirement of 30A, and the PSU seems to only have 28A. Useight (talk) 16:22, 15 February 2008 (UTC)[reply]

Power draw is measured in watts. And what the HECK are you doing at tigerdirect? http://newegg.com :D\=< (talk) 16:45, 15 February 2008 (UTC)[reply]
Newegg is great, but TigerDirect sells stuff über-cheap. I bought a used laptop there for about 1/3 the price of a new one, and it runs perfectly. Don't judge people on where they shop. 206.252.74.48 (talk) 17:11, 15 February 2008 (UTC)[reply]

I would not try it. If it says 30 A as minimum, I would not buy that PSU, unless I had evidence that this particular combination works. Kushalt 18:20, 15 February 2008 (UTC)[reply]

I have no idea what I am talking about, but... The graphics card says "combined 12V current rating of 30A". The PSU says +12V at 28A and +12V at 25A. Is it possible that its "combined 12V current rating" is 53A? This is consistent with the fact that this is a 750W PSU, and the card expects only 450W. -- Meni Rosenfeld (talk) 18:54, 15 February 2008 (UTC)[reply]
Watts are what matters, 750W is more than enough to power a system with a single video card. In an average system setup that's probably overkill, but it leaves room for future expansion and a margin of error should make the system more stable. Mad031683 (talk) 19:59, 15 February 2008 (UTC)[reply]
Yes and no. No, in the sense that one could easily make a PSU which can give 126A of 5V and 10A of 12V - this will have a total of 750W but will be completely useless for running the aforementioned graphics card. Yes, in the sense that no-one would do that - the manufacturer of this PSU surely had high-end graphics cards in mind, and wouldn't make it incompatible with them just to spite you. -- Meni Rosenfeld (talk) 20:28, 15 February 2008 (UTC)[reply]
Hmm, perhaps I'll call the manufacturer, just to make sure. And yeah, I use newegg somtimes, too. I know that 750 Watts is overkill for a single video card (my motherboard can't handled SLI, anyway), but I want to future-proof it a little. Useight (talk) 21:23, 15 February 2008 (UTC)[reply]

Resizing the partition on a windows xp system.

I would like to know how to resize the single partition on my windows xp system in order to make space for installing linux(keeping windows xp on the resized partition). Please give me information on what software to download and from where. —Preceding unsigned comment added by 203.110.245.31 (talk) 17:44, 15 February 2008 (UTC)[reply]

Just make sure that you back up everything (this is important!), then, install Linux for double booting options. If you are using a mainstream distro such as Ubuntu, Kubuntu, or Knoppix, you will be able to do everything from the live CD. Just please don't forget to back up your data, music and what not, please. Kushalt 18:18, 15 February 2008 (UTC)[reply]

You can use the "diskpart" command line utility. While the Microsoft description does not mention the "shrink" command, it does exist. (Maybe it's only in Windows Vista, which would explain why it's not mentioned on that page.) See [7] for command-line details.
You can also go into the disk management console. Use the Run command from the Start menu, and enter "diskmgmt.msc". You can right-click on the hard drive partition that you want to reduce, and "shrink volume" may be an option. –Outriggr § 00:38, 16 February 2008 (UTC)[reply]

I don't have my Windows XPSP2 system anymore. However, as far as I remember, I did not have such an option. (Perhaps because I was too wary of NTFS and never converted my hard disk to a dynamic disk?)

If you are creating a dual booting computer, it never hurts todo check disk and dis defragmentation just before you pop in the Linux live CD for the installation. Kushalt 13:29, 16 February 2008 (UTC)[reply]

On a machine running Windows XP SP2, I checked diskmgmt.msc and it does not have a 'shrink' option, i.e. a way to shrink an existing partition without loss of data. Same thing for the command-line utility diskpart. Google for 'diskpart vista shrink' and you can confirm what others said above, that the shrink is only available on Vista. Buying an external USB hard drive instead of partitioning your main disk is another option to consider, now that hard drives have become so cheap. The Linux program GParted says that it can shrink partitions. I personally think I'd only trust Partition Magic since I've used it and realize that XP has tricky corner cases to solve, like immovable files. EdJohnston (talk) 19:06, 16 February 2008 (UTC)[reply]
No, stay away from Partition Magic if you have Linux on there and stick to gparted. Partition Magic can wreck havoc with its half-ass ext3 support. --antilivedT | C | G 04:37, 17 February 2008 (UTC)[reply]
Concur on GParted. Used it on all kinds of systems. The Partition Magic CD is best used as a crude mirror. --Ouro (blah blah) 09:48, 17 February 2008 (UTC)[reply]
Not really that crude, they make great signaling mirrors. Just put the hole up to your eye and quickly look alternatively at the sun and whatever vehicle you want to signal (but close your eye when you look at the sun!). They can also be snapped into shards to make crude spear points. Remember that when you are stuck on a desert island. 206.252.74.48 (talk) 16:22, 18 February 2008 (UTC)[reply]

Carriage return

To whom it may concern: I am 8l years old and have been an able typist since I was a young girl. Having recently received an electronical typewriter and printer, which I am using at present, I have been unable to return the line carriage whilst composing correspondence electronically. My neighbor is a young boy and has mentioned to me that I cannot use a computer as a typewriter, but I believe that must surely be bunkum, as I have seen instances of people typing correspondence on electronical typewriters numerous times on the television. Whilst using this Encyclopedia, I noticed the Reference Desk and hope the librarians may be able to render assistance. Yours faithfully,Mary Gilmore —Preceding unsigned comment added by 79.122.32.97 (talk) 20:35, 15 February 2008 (UTC)[reply]

Just use the Return key. It's in the same place you'd find it on a typewriter. JIP | Talk 20:42, 15 February 2008 (UTC)[reply]
On the other hand, you might be talking about manual carriage returns, where you have to physically push the carriage back, which predated my time. You can't do this on a computer. Instead, you have to use the Return key as I said above. It's the key to the right of the P and L keys. (I'm European, so on my keyboard, there are other keys in between, but I am fairly sure Americans have it immediately next to the P and L keys.) JIP | Talk 20:49, 15 February 2008 (UTC)[reply]
Nope, most American keyboards have it on the middle row with ; and ' between the l and return, \ is above it and Shift is below it. I find this post a little strange since she had the computer savvy to post on this page. Mad031683 (talk) 21:29, 15 February 2008 (UTC)[reply]
Some keyboards have the 'Enter' key make an L-shape, taking up two rows, but most American keyboards have it on one row. I also find this thread suspect. Useight (talk) 01:36, 16 February 2008 (UTC)[reply]
I have to raise an obligatory mention of WP:BITE and WP:AGF. --antilivedT | C | G 04:07, 16 February 2008 (UTC)[reply]

In other words,

Do not be hostile toward newcomers. Remember to assume good faith first and approach them in a polite manner.

  • Unless there is strong evidence to the contrary, assume that people who work on the project are trying to help it, not hurt it.
  • If criticism is needed, discuss editors' actions, but it is never necessary or productive to accuse others of harmful motives.

Kushalt 07:12, 16 February 2008 (UTC) [reply]

Re the WP:AGF issue: Note that the original poster wrote "I am 8l years old", using a lower case "L" instead of a "1". I'd say that supports the claim that she has been working as a typist long before the PC era, and posted the question herself. --NorwegianBlue talk 10:44, 17 February 2008 (UTC)[reply]
I will assume good faith. The poster has also shown perfect grammar, which seems to be lost to most of the younger generation. I think you guys misread her question - she said that she had problems with the carriage return with her "electronical typewriter" and then asked if she could use a computer as a typewriter. Well Mary of course you can. Keep your printer to use with your computer, and use a popular Word Processor to do your typing. If you are using Windows, then Microsoft Word is the most popular. My grandmother uses her computer for exactly the same things - typing and internet. Good luck! Sandman30s (talk) 11:33, 18 February 2008 (UTC)[reply]

A WYSIWYM XML editor?

I am looking for a WYSIWYM XML editor. Is there such a product?

I need a tool to open plain text files and manually annotate the plain text according to a pre-defined schema. For example, if you're a cook, you may want to mark up your recipes according to the ingredients and cooking methods. -- Toytoy (talk) 20:45, 15 February 2008 (UTC)[reply]

The first reference in WYSIWYM is a link to an article that mentions ButterflyXML, which is available at SourceForge. It is a WYSIWYM editor, but I don't know if it will do exactly what you want. --LarryMac | Talk 21:51, 15 February 2008 (UTC)[reply]

smartax mt882 modem

hi, I have just switched isps (now with talktalk in uk).

The modem seems to have a mind of its own, and will switch off or stay on when IT wants.

The power supply looks really cheap.

Is this renowned as a bad product? should I demand a better modem ? —Preceding unsigned comment added by 89.241.132.238 (talk) 22:52, 15 February 2008 (UTC)[reply]

Is that a cable modem? Kushalt 01:19, 17 February 2008 (UTC)[reply]

Never mind. I googled for it and guess what, the first result isn't the company! It is a forum of dissatisfied customers. If [8], is correct, you should demand a new modem right away. The link suggests a telephone number (0870 444 1820) but you probably have the number already. Hope that helps, Kushalt 01:24, 17 February 2008 (UTC)[reply]

wii LAN-adaptor or nyko ethernet adaptor thingy

Hello, I was wondering of the nyko ethernet adaptor for the Wii is the same as ninendo's lan'adaptor. And if so what's the difference —Preceding unsigned comment added by 69.234.62.251 (talk) 23:16, 15 February 2008 (UTC)[reply]

They both perform the same function. In fact, you can use any adaptor on this list.118.90.78.205 (talk) 11:13, 17 February 2008 (UTC)[reply]
It's just a USB Ethernet adapter. There's no special software involved. It if it's USB and Ethernet compliant, I would think any adapter would work. The Datal model is less than $5 on a well-known internet auction site. --70.167.58.5 (talk) 19:53, 20 February 2008 (UTC)[reply]

viruses on Wii?

This little ?'n just popped into my head. Is it possible to catch a virus, trojan, or worm, or other malware using the wii's internet browser? —Preceding unsigned comment added by 69.234.62.251 (talk) 23:25, 15 February 2008 (UTC)[reply]

I'm not positive, but I imagine that it'd be difficult to get malware, since it uses Opera. Useight (talk) 23:42, 15 February 2008 (UTC)[reply]
Wii security is good. There are a few potential ways a hacker could try and get in:
  • The Opera web browser - Opera is very good when it comes to security and patches quickly. Not much risk here.
  • Adobe Flash is also installed, and is a bigger target due to its large install base. This is a bigger risk.
  • If anything, the games might be an easier exploit then Opera, as games tend to be built for speed over security. But I imagine this would require some hefty reverse-engineering to do.
If someone tried to exploit one of these, it could crash your machine. However, taking control of the machine would be difficule. Exploits normally need to interact with the operating system, so exploits written for other operating systems (eg: Microsoft Windows) won't work. In short, exploits affecting the Wii would need to be written specifically for the Wii.
Another route would be the WiFi connection. This sort of approach would lead to man in the middle type attacks, rather than taking control of your Wii. It would only be available for anyone in range of your wifi connection. The Wii supports good encryption (WPA), but some older WiFi routers only support the older (broken) WEP.
A check of SecurityFocus shows only one issue (CVE-2007-3456), which has already been fixed. --h2g2bob (talk) 12:21, 16 February 2008 (UTC)[reply]
No one outside of Nintendo knows how to make a program run on the Wii, yet. The best they could do now is to make Zelda crash. [9]. So the answer to your question is no, at least not yet.118.90.78.205 (talk) 11:09, 17 February 2008 (UTC)[reply]
That's not true anymore. An exploit involving causing a buffer overrun in Epona's name has been used to run arbitrary code. Check this out.
However there is no known way to run code on the Wii without editing a savefile or modifying the hardware. While this doesn't completely, 100% absolutely rule out the possibility of trojans or viruses, I think it's safe to say that it will not happen and you don't have to take any special security precautions when you use the Wii online. (Of course unencrypted wifi can, as always, allow anyone within range to eavesdrop on your traffic, possibly including personal information. )APL (talk) 22:02, 17 February 2008 (UTC)[reply]


February 16

rstatd/portmap access through firewall

I'm interested in making rstatd connections available to a single host through my firewall, but I'm not sure how to do it (or if it's feasible). When rstatd starts up, it chooses a random (and privileged) port on which to listen for UDP, and registers with portmap. Is it sufficient to allow tcp/udp to port 111 (sunrpc) to this particular host, and allow established/related connections through as well? I'm running CentOS 4.6. Thanks. --Silvaran (talk) 00:15, 16 February 2008 (UTC)[reply]

I just checked Portmap and it says to use inetd (xinetd for me) to configure a static port. Is this required, or can I get away with portmap rpc?--Silvaran (talk) 00:18, 16 February 2008 (UTC)[reply]

Image issue

Specs which may or may not be relevant: PC, Windows XP, IE, Safari and Firefox available, no special image software. I'm trying to grab this image off of Google books to use as fair use in an article. In IE I have right clicked and tried "save picture as". In the window that opens I only get two options for "save as type," gif and bitmap. I see that Wikipedia supports gifs but when I try to open the saved image I get a blank screen. I then tried saving it appending .jpg to the name, which did save to my desktop with a different icon, but it has the same opening problems. To wit, when I attempt to open it, it defaults to Windows picture and fax viewer but there is no image. I then tried right clicking on the image icon, choosing "open with" and choosing paint, and internet explorer (the only three program options he menu has) and none work. Some help for the clueless?--Fuhghettaboutit (talk) 00:43, 16 February 2008 (UTC)[reply]

That's because of stupid copyright protection.. it should be possible to go through all of Google's ajax and figure out how the pages are being loaded, but it would be nontrivial, to use the classic understatement. Just zoom in and print screen- here, I did it for you: http://img524.imageshack.us/img524/5008/screenshot2yy1.png :D\=< (talk) 00:59, 16 February 2008 (UTC)[reply]
Cutting in here to say there's a much better way: in Firefox, when you have that page loaded, just go to "Page Info" and hit the "Media" tab. Go through the images listed there, you'll see it, and there's a "save as" button that lets you save it to disk.—Chowbok 05:48, 18 February 2008 (UTC)[reply]
Thanks! Downloaded, saved and opened without problem; ready to upload. Can you give me a bit of an explanation as to how you did this so I can do so in the future if the same problem arises? I hit the zoom in button and hit the print screen button on the google book image in an attempt to duplicate what you did. So I assume that now the image is saved in some way in my computer's memory, tied to print screen—how would I take the "print screen memory" and save that as an image (I'm sure it's screamingly obvious but: *spoonfeeding required*).--Fuhghettaboutit (talk) 01:42, 16 February 2008 (UTC)[reply]
When you hit the print screen key on your keyboard, Windows copies an image of your screen onto the clipboard. You can paste it into a number of programs, perhaps the most simplest of which is mspaint (check Start, Programs, Accessories). Holding in the ALT key while you press the print screen key will copy only the active/focused window to the clipboard. When you use this method, you suffer from WYSIWYG. Essentially, what you see on your screen is what you're going to end up with--no better, no worse. That's why :D\=</Froth zoomed in, to get the most detailed view of the page you wanted before capturing the screen. --Silvaran (talk) 03:14, 16 February 2008 (UTC)[reply]

To save anything you can see on your screen:While viewing it on your screen: 1) Hit the "Print screen" button, it's probably on the top right of your keyboard. 2) go to Paint. It's in Start>Programs>Accessories. 3) Hit the "edit" button on the top left of the screen. 4) Hit "Paste". You will see your page. If you want to make any changes this is a time to do it. 5) Hit File> "Save as" Then give it a name to save under. 6) Now you can exit paint and go to Start>My Pictures and find it saved under the name you gave it. If you want to save words you can do the same thing but go to Notebook to save it in the same way.

Now that's spoonfeeding! Done thanks. My only problem was where to paste the image and that I could paste it jin the same manner as text; telling me to open paint was the key. Thanks everyone. Image by the way is here and put to good use.--Fuhghettaboutit (talk) 13:48, 16 February 2008 (UTC)[reply]

Hi Fuhghettaboutit. I'm the one who wrote the 1-6 above and glad I could be of help. I clicked on your "here" and saw your image - great! Now maybe you can teach me (please spoonfeed) how you get the click on "Here" to go to your picture. I'd like to try to do that with a picture of my own. —Preceding unsigned comment added by 74.233.68.202 (talk) 17:47, 16 February 2008 (UTC) P.S. What is the character between .png and "here" I don't see any character like that on my keyboard. —Preceding unsigned comment added by 74.233.68.202 (talk) 17:50, 16 February 2008 (UTC)[reply]

On my computer, the character | is "Shift" + "\". that is, I need to hold shift while I press \. Hope that helps. Kushalt 20:11, 16 February 2008 (UTC) I believe it is called piped link. Kushalt 20:13, 16 February 2008 (UTC) | I did it! Now I'll try to copy what you have above here lets see if this works. Well that didn't work. I see that you have to have a page in Wikipedia by the name of the picture and that your picture isn't in featured pictures. I don't know that I want to register and create a whole page in Wikipedia just for my little picture. Your picture is at least of interest to others but I might be infringing on some property rights if I tried to use this picture. Did you take that picture yourself or did you get it somewhere else? I got mine online, but I could try to do it using one of my own pictures. How hard is it to do?[reply]

Free Virus Protection

What is the best free virus protection package I can download for my computer?74.233.68.202 (talk) 03:38, 16 February 2008 (UTC)[reply]

AVG Security Software, Avast! or ClamAV. Of those 3 I prefer AVG the most as it is the least annoying (Avast! with its creepy voice notifications, and ClamAV with its unintuitive GUI). --antilivedT | C | G 04:04, 16 February 2008 (UTC)[reply]
I use Avast!, and turned off the voice notifications as soon as I got it. Does it have any more substantive disadvantages compared to AVG? Algebraist 14:13, 16 February 2008 (UTC)[reply]

I went to try AVG Security Software and got: Free - only $11.98 for 3yr, $15.88 for 2yr or $19.95 for 1yr. Not only do they not understand the meaning of "free" but they charge more for 1 year than 2 or 3 years! and I had to chose one of the above to download, not even a free trial period. So I went to Avast. At first I was turned off by the poor English on their homepage, but I read the writeup in Wikipedia and it won a lot of awards, so I downloaded it, had to restart and it ran a scan in reboot before updating. I don't want to scan every time I reboot but I don't know how to turn it off. Will go try to find out now. Thanks for the advice. —Preceding unsigned comment added by 74.233.68.202 (talk) 17:16, 16 February 2008 (UTC) Me again - asker of question - I didn't change anything, rebooted to see if it would scan on reboot again and it didn't, so I guess that was a one-time thing. Great! I'm starting to like Avast already.74.233.68.202 (talk) 17:30, 16 February 2008 (UTC)[reply]

AVG Anti Virus is free from http://free.grisoft.com/ AVG-AVpro and the full AVG security suite do cost money (and the free edition can't be legally used for business purposes). -- 17:39, 16 February 2008 (UTC) —Preceding unsigned comment added by Finlay McWalter (talkcontribs)

I went to the free.grisoft.com site which you suggested and downloaded AVG Anti-Virus free edition. I had to created a restore point and uninstall my new Avast first. It looks good so far. Thank you very much for your help.74.233.68.202 (talk) 22:13, 16 February 2008 (UTC)[reply]

System Restore has its own share of criticisms, particularly with virus and malware protection. Archiving infected files and restoring to that version defeats the purpose of having an antivirus software. Kushalt 01:16, 17 February 2008 (UTC) I had done several scans from different packages before creating a restore point and they all came out negative. I also cleaned out my temporary files first, but thanks for reminding me of that. —Preceding unsigned comment added by 74.233.41.57 (talk) 19:11, 17 February 2008 (UTC)[reply]

Javascript: events with generated content

I am trying to add buttons (spans) to a webpage using Javascript and have them run a function when they are pressed. The problem is that I can get the code to work in about 3 of the 4 browsers I test it in, but never all 4 at the same time. What do I do to get, lets say, alert("Hello") to run when a (Javascript generated) button is clicked in all major browsers.

Thanks, 159.134.98.23 (talk) 14:49, 16 February 2008 (UTC)[reply]


When I do something like this I make it an anchor tag, not a span. Something like: <a href="javascript:yourFunction();">Press me</a> usually works fine. Then you can assign those anchors a class to make it look more button like, if you want (add a border, adding some padding, get rid of its underline, etc.). However even in this case if it is something I'm expecting a lot of people to use and am worried that they might not have Javascript turned on, I'll put the javascript in the onClick= property and then put an alternative but still-functioning approach in the href property. It makes it transparently workable even without javascript turned on. --98.217.18.109 (talk) 14:52, 16 February 2008 (UTC)[reply]
How about this?

<input type="button" onclick="alert("Hi");" value="Click me" />

or

<button onclick="alert("Hi");">No, click me</button>

--grawity talk / PGP 18:29, 16 February 2008 (UTC)[reply]

The spans are being added using JavaScript (i.e. people without JavaScript will never see the buttons). I tried adding a onClick attribute containing the function to call (again in Javascript). This worked fine in everything except Internet Explorer 7 which was happy to add the elements to the page but none of them would respond to mouse clicks. Thanks, 89.127.160.227 (talk) 20:02, 16 February 2008 (UTC)[reply]

Web Content Accessibility Guidelines. Web Content Accessibility Guidelines! All right, I'll quote here for those who won't read it themselves.
6.3 Ensure that pages are usable when scripts, applets, or other programmatic objects are turned off or not supported. If this is not possible, provide equivalent information on an alternative accessible page. [Priority 1] For example, ensure that links that trigger scripts work when scripts are turned off or not supported (e.g., do not use "javascript:" as the link target). If it is not possible to make the page usable without scripts, provide a text equivalent with the NOSCRIPT element, or use a server-side script instead of a client-side script, or provide an alternative accessible page as per checkpoint 11.4. Refer also to guideline 1.
--tcsetattr (talk / contribs) 21:32, 16 February 2008 (UTC)[reply]
That doesn't help. But if you must know the buttons are for a textarea. Without Javascript the buttons will do nothing and so there is no point in displaying them, which is why I want to add them with Javascript in the first place. 159.134.98.23 (talk) 21:55, 16 February 2008 (UTC)[reply]
If one adhered rigidly to accessibility guidelines it would serious cripple the ability of web designers to push the envelope. Sometimes you're going to be inaccessible to some people if you are doing something different. I don't think the blind will ever appreciate a Pollock; sometimes you've got to use sites that require javascript and won't work without it. Life's not always fair, I'm afraid! --98.217.18.109 (talk) 17:30, 17 February 2008 (UTC)[reply]
Is there a reason that they have to be spans and not other tags (e.g. anchors)? (Not that I'm sure that will help, but I'd try it.) Anyway, what is the code you use to add the new content to the page? I suspect that might be where the issue is; it might be that IE is not adding it correctly. There are a number of ways to add code, you might try a few others (e.g. if you are just changing the innerHTML of a tag, you might instead try using the .appendChild method, build up the control in Javascript and set its onclick property there, rather than just doing it as HTML). --98.217.18.109 (talk) 17:30, 17 February 2008 (UTC)[reply]

Disabling SE Sidebar

How can the "SE Sidebar" default checkmark in the Explorer menu be removed, once it has become enabled? —Preceding unsigned comment added by 201.141.95.82 (talk) 16:02, 16 February 2008 (UTC)[reply]

"SE Sidebar"? Can you make a screenshot? Is this related to Sony-Ericsson software, or what? --grawity talk / PGP 18:14, 16 February 2008 (UTC)[reply]

I am using Spanish-based XP and this barnacle seems to have become incorporated into Wikipedia by some type of outside influence. Every time I redirect to another Wikipedia page, in the "Ver" menu (in English, I guess, Appearance)in the drop down menu "Barra del Explorador" (in English, I guess, Explorer Bar)the line item "SE Sidebar" always reverts to checked (enabled) status. I have looked for the way to disable it many hours, with no results. Thanks.189.136.132.116 (talk) 22:14, 16 February 2008 (UTC)[reply]

Sounds to me very much like some malware - there are a lot of malicious "search bars" out there that like to install themselves into the heart of IE without permission. I would run something like Spybot - Search & Destroy or Ad-Aware and see if it can identify and remove the offender for you - just changing the settings is unlikely to work, because it's not something that should be there in the first place! - IMSoP (talk) 18:42, 17 February 2008 (UTC)[reply]

Getting MS Access data into a MySQL database

I've got a database in MS Access that I'm trying to get into a MySQL database. I'm having difficulty exporting one of the tables, though, because it contains a few very large text fields (full-text contents of long documents). With the other tables I've been able to just export them as CSV and import them through phpMyAdmin, but it doesn't handle the full-text fields right at all. I've tried Googling around and all I've found are little scripts that people have written for Access that supposedly can export the data to SQL but they seem to struggle with the large text fields as well — they overflow or otherwise just don't work right with newer versions of Access (I'm using Access 2003). (They also just seem poorly written to me, the authors not even knowing how to do declare specifically which library a function is from so it won't conflict with other similarly named functions!)

Oh, and here's an important caveat. The MySQL database is on an OS X machine, and the Access database is on a virtualized version of XP that runs inside it. (Access doesn't run on a Mac, obviously.) So I can't use any of the Windows-based database management tools, I don't think, because they can't import to the MySQL database directly. Blah.

Anyway, any suggestions or thoughts? Something I haven't thought of? --98.217.18.109 (talk) 17:11, 16 February 2008 (UTC)[reply]

What is the datatype of the long text fields in the MySQL database? The Access ones are Memo I gather, are you using BLOB or LONGTEXT for the MySQL definitions? --Canley (talk) 22:20, 17 February 2008 (UTC)[reply]
LONGTEXT, but that wasn't any sort of problem with it. Anyway, I figured out a way to do it after messing around for an entire day on it—in the end I had to fix some of the free SQL generating code made for Access (really stupid stuff, like not using integers to loop over contents where they could presumably go higher than 32000 bytes) and it ended up creating a lot of INSERT VALUES statements that I could execute using phpMyAdmin. Anyway it works now, and was a one-time sort of conversion. --98.217.18.109 (talk) 22:44, 17 February 2008 (UTC)[reply]

Make a data logger

I have a Mac running Leopard. I want to make a simple data logger that works over USB, so that I can measure a voltage (from 0V to 5V), convert it to digital, and send it via USB to the Mac. I then want to either get or produce a piece of software to display it as a graph, and also to be able to export the raw data to Excel. Would it be possible to make the hardware from an old joystick, as surely they contain an analogue-to-digital converter? How would I go about this? And then, what would I need to do to produce the appropriate code to record and graph the data. Which language would be best, or is there an existing programme that is free.

Many thanks, --Cash4alex (talk) 18:05, 16 February 2008 (UTC)[reply]

How old is the joystick? Gameport ones don't contain any circuitry at all (except the later models) and all the ADC is done in the computer, but you can't use that as Macs don't have gameport. Newer USB ones either have the optical detection (Microsoft ones) which would be of no use for you, or the more traditional potentiometer ones (getting rare). I have heard of people using their sound card's line-in to use as ADC, if you can find a good guide for it that might be the easiest way to do what you're trying to do. --antilivedT | C | G 04:30, 17 February 2008 (UTC)[reply]

NNTP control messages in Thunderbird

Is Thunderbird capable of sending a valid control message to an NNTP server? If so, how do I configure it to send all the required fields (besides "Control:" in the header, and those it would be sending anyway)? NeonMerlin 18:41, 16 February 2008 (UTC)[reply]

Script class

Would this script classify as a CMS, a template engine, or what? (It basically prints out headers/stylesheet, reads some data from requested file and prints <h1>, includes requested file, and prints footer.) (and no, this is not an attempt to advertise my site.) --grawity talk / PGP 19:59, 16 February 2008 (UTC)[reply]

Proxy question

Would it be possible to download a piece of software on my home computer and use it as a private proxy from somewhere else? For example software "a" can let me configure a proxy at home and only that exact copy of "a" (on a Flash Drive) could let me access my internet/home proxy. Yamakiri TC § 02-16-2008 • 20:11:43

It's technologically feasible. Note, however, that there's nothing to prevent the remote machine's owner from installing software that invisibly copies the contents of any inserted flash drive to the hard disk. To defeat this you'd need to type in a password on each use, but that doesn't help if they also have a keylogger. To defeat that combination you'd need a one-time password system.
All that aside, you could for example run an ssh server on your home machine and use PuTTY in dynamic forwarding mode (-D command-line option) on the remote machine; this effectively turns your home machine into a SOCKS proxy. -- BenRG (talk) 22:10, 16 February 2008 (UTC)[reply]
Not sure but this could be what your after Think outside the box 17:54, 22 February 2008 (UTC)[reply]

iMovie

I am using iMovieHD as a part of iLife '06 on an Apple MacBook. I have a question regarding iMovieHD. Is the [dot] imovieproject the only file I need to back up to back up an imovie project? Does it include all the deleted scenes and sound effects? I want to back up some of my movie projects and I want to make sure I do it right. Any suggestions? Kushalt 21:17, 16 February 2008 (UTC)[reply]

Yes, that should be right. The .imovieproject file is actually a big "package" file that contains all sorts of little files inside of it, including trashes and unused scenes and etc. I am reasonably certain that when you import movies and sounds it includes them inside the file (rather than just linking to them); anyway you should be able to tell by the size of the file (it should be large). --98.217.18.109 (talk) 17:18, 17 February 2008 (UTC)[reply]

yes, 3.06 GB file size. Thank you very much. Kushal 12:25, 18 February 2008 (UTC)[reply]

Is my iTunes Music Library.xml file corrupt?

Okay so...I want to import listening the last.fm client so my profile will have my previous listening history. However, this does not work. The last.fm people said the file is either too small or is corrupt. I probably have about 1000-ish plays in iTunes and the iTunes Music Library.xml file is "1.5 mb on disk" - so do you think the file is fine, and that there is another problem? I get no errors or anything when using iTunes or synronising my iPod. -- Stacey talk to me 22:08, 16 February 2008 (UTC)[reply]

I would say the size is OK. I just checked mine, which is 2.4 MB, which covers 1662 items (counting duplicates). Did you check the previous iTunes library folder?

If everything except last.fm is working fine, I would say the problem is probably with last.fm Kushalt 01:10, 17 February 2008 (UTC)[reply]

"Did you check the previous iTunes library folder" do you mean the "Previous iTunes libraries"? Last.fm says it imported but nothing showed up because it's either small or corrupt but it seems to be neither. It's really annoying :\ -- Stacey talk to me 01:53, 17 February 2008 (UTC)[reply]

I wish I could be of help but I know nothing about last fm. Yes, I meant "Previous iTunes libraries". Try working with the latest one backups from the folder. I hope it works. Kushalt 04:53, 17 February 2008 (UTC)[reply]

Will I lose playcounts if I do that? -- Stacey talk to me 21:21, 17 February 2008 (UTC)[reply]

Your playcounts in iTunes should remain unaffected. What happens to last.fm, I have no idea. Kushal 13:16, 18 February 2008 (UTC)[reply]

February 17

A Mystery: Connection losses while streaming

Hi everyone,

I have a bit of a mystery going on with my computer. I was trying to watch House online, for free, the other day, and my connection keeps dropping! My wireless internet connection seems to drop ONLY when I'm streaming videos (i.e. episodes from ABC or FOX.com). Every ten minutes or so, the video will stop, I'll get a 'limited connectivity' message, and I have to disconnect and reconnect to the network for it to work again.

So, in the vein of House, here's the list of symptoms: I'm running Windows Vista, with a Speedstream 6300 modem, running on WPA-PSK with a very long password, and a group key renewal rate of 3600. My computer is a brand new dell XPS m1300 with the standard intel wireless chip.

I've tried changing the channel number, there are no microwaves or 2.4Ghz phones in the area.

Any ideas on a differential diagnosis? In windows XP, I read about a conflict with the Wireless Zero service, but im running vista and there is no equivalent that i can see.

Thanks for the help in advance!--68.173.40.42 (talk) 05:35, 17 February 2008 (UTC)[reply]

Is there difference between widgets and applications

Apple had said that iPhone will not open to outside applications. But I think it already has something called widgets right from the start of iphone. Just want to know whether they two are different. Has iphone allowed third party widgets from the start? Are viruses not possible in widgets? —Preceding unsigned comment added by 59.96.24.87 (talk) 06:51, 17 February 2008 (UTC)[reply]

Widgets are primarily just HTML, CSS, and Javascript—no real opportunity for viruses, not really full "outside applications." Dashboard widgets though can make function calls to compiled programs, which makes them more flexible but opens up security holes; I don't know if iPhone widgets can do that or not. --98.217.18.109 (talk) 02:44, 18 February 2008 (UTC)[reply]

havin problems with my modem on ubuntu

hi I´ve problems with my Aopen modem on ubuntu. it is a pci device with drivers designed for windows Xp and I can not use it because the Gnome PPP does not recognizes it I need some help o information where to find help thank a lot alejo

PD. I`m from Cuba so, if you want, you can write me on spanish that is better for me —Preceding unsigned comment added by Alejotaller (talkcontribs) 06:57, 17 February 2008 (UTC)[reply]

Ola. Turn to Ubuntu Forums, I believe they will be able to get you tips on your specific modem. Good luck! --Ouro (blah blah) 09:42, 17 February 2008 (UTC)[reply]

Professional Photographic Printing Resolutions

Can anyone tell me if there is a rough formula that can be used to calculate the optimum pixel size of an image for printing high quality digital enlargements using wet photo processing (not inkjet printers)? I have an amount of digital art that I wish to get printed at 18" x 12" or 30" x 20" I'm currently working in Photoshop at around 3000 pixels wide but not sure if this is anywhere near high enough. Thanks for any advice. Kirk UK —Preceding unsigned comment added by 88.144.69.28 (talk) 07:50, 17 February 2008 (UTC)[reply]

It all depends on the viewing distance. A billboard may look perfectly fine from your car but each pixel will correspond to something like a 1cm square, which is clearly not acceptable for a 4×6 print. --antilivedT | C | G 08:38, 17 February 2008 (UTC)[reply]
3000 pixels gives about 250 dpi for an A4 print, which is nice. You could probably blow it up to an A3 poster and not feel any special quality reduction. For a 30 x 20 print, this will be ca. 100 dpi, which should just be just about enough. Any stuff above that is printable on larger sheets, as they are conceived to be viewed from a larger distance, so you can live with a lower image resolution. Hope I helped a bit. --Ouro (blah blah) 09:39, 17 February 2008 (UTC)[reply]
This might be of use (http://www.northlight-images.co.uk/article_pages/print_viewing_distance.html), basically average viewing distance is pretty much equally as important as PPI/DPI . ny156uk (talk) 09:58, 17 February 2008 (UTC)[reply]

Thanks for that, really useful and informative. Kirk UK —Preceding unsigned comment added by 84.43.102.147 (talk) 12:55, 17 February 2008 (UTC)[reply]

'Collaborative' Web Browsing

Bleh, that leaves a bad taste in my mouth. Anyway, MSN had some weird plugin (or did they used to have an overlay of Internet Explorer?) that allowed atleast two users to share a browsing experience. Now, it seems that there is an extension for Firefox by the name of Cobrowse: https://addons.mozilla.org/en-US/firefox/addon/1469

Unfortunately, this extension seems to be no longer developed (was updated for 2.0 back in Oct '06). Anybody know of something similar, hopefully as an extension for Firefox, which may be better-er? Washii (talk) 09:05, 17 February 2008 (UTC)[reply]

If you want to share everything, you could use Google Browser Sync and give the other person your Google account ID and password. I do not recommend it sharing your Google account password with random people you might meet on AIM. Kushal one 14:27, 17 February 2008 (UTC)[reply]

Google Browser Sync is quite a ways over the top...I'm trying to share the actual browsing experience, not any settings. That is, the clients of the Cobrowse server open the same tabs and can all read through them, this in semi-realtime. And what does this have to do with random people on AIM? This is for my girlfriend and I to easily share pages back and forth across individual computers (and I tend to browse faster than her). Note that I'm not looking for anything that would be seen as a Browser synchronizer. Washii (talk) 04:02, 18 February 2008 (UTC)[reply]
It turns out that there is an article under basically exactly what I want to do: Cobrowsing. I left a comment there mentioning the extension, though I'd love to see if anybody has heard of anything else like this for Firefox as a simple extension. In the meantime, I'm going to investigate the article's See Alsos. —Preceding unsigned comment added by Washii (talkcontribs) 04:19, 18 February 2008 (UTC)[reply]

I apologize for the misunderstanding. Coop is currently under active development. Would this work? Kushal 18:27, 18 February 2008 (UTC)[reply]

Hmm, that's kind of cool. Sort of what I wanted, but it's a lot less cobrowsing, a lot more social networking. Was hoping for more of a real-time dynamic, though drag-n-drop may work for some of it (though I wonder what will happen with many 10s of tabs open). Thank you, Kushal. I might experiment with this in conjunction with the Cobrowse extension. Washii (talk) 04:02, 19 February 2008 (UTC)[reply]

nokia hack

can one bypass the nokia security code?there is a site that says when uve lost ur security code,it can generate a new security code for u.is it a hack or crack or just a flaw? —Preceding unsigned comment added by 212.49.74.73 (talk) 10:28, 17 February 2008 (UTC)[reply]

The security code on your cell phone can, most likely, be compromised. Doesn't Nokia want to reuse the phone if you screw it up and return the phone in a locked state? I am not sure but I am pretty confident that it is not as easy as pressing a sequence of code that will magically unlock every cell phone. I believe it must be lower level than that. Kushal one 14:23, 17 February 2008 (UTC)[reply]

I remember having such program which could generate a master code, but I think it won't work on newer Nokias. You can download it here, but you must have Java installed. Or, if you don't want to mess with downloads, you can just e-mail me your IMEI and I'll mail back the code. --grawity talk / PGP 15:20, 17 February 2008 (UTC)[reply]

Vista window won't stay open

When I try to open "Computer", "Control Panel", "Recycle Bin", a folder, even a zip file, that window opens, then it closes immediately. The start menu and all the icons on the desktop disappears, then reappear after a few seconds. What can I try? The computer is only a few days old. I am running Vista Home Basic. thanks.118.90.78.205 (talk) 11:20, 17 February 2008 (UTC) I scanned for both adware and virus. The system is reported as clean.118.90.78.205 (talk) 11:25, 17 February 2008 (UTC)[reply]

My best guess is that the Windows Explorer is restarting itself. I can see two reasons (and thus two solutions) for it:

  1. Infection; do you have a current anti-virus, anti-spyware (or anti-malware)? Is the firewall turned on?
  2. Bad installation; you might need to reinstall Windows Vista.

I am not sure which one it is. My first questions to you are:

  1. Do you get any error message(s)?
  2. Do you have a current antivirus program on your computer? Which antivirus software do you have? Could you check to see when the virus definitions were last updated and the last time you did a full system scan?

Hope to hear back from you soon,

Kushal one 14:19, 17 February 2008 (UTC)[reply]

I thought explorer was restarting at first too, but Task Manager shows explorer.exe stays running for the whole time. No error messages, and nothing in Event Viewer. I just scanned it using Norton 2007 and Spybot, with the latest updates. F (talk) 23:25, 17 February 2008 (UTC)[reply]

How bizzare! Kushal one 23:48, 17 February 2008 (UTC) I seriously have no clue about this one. Unless a wise sage comes up, the best I can say is hold on and keep breathing until Service Pack 1 comes up (some time in 2008 Q1). Kushal 02:28, 18 February 2008 (UTC)[reply]

I guess I have to reinstall Windows then. Thanks F (talk) 03:09, 18 February 2008 (UTC)[reply]

Do your windows open back by themselves after closing? Do you have to open them manually? Kushal 18:22, 18 February 2008 (UTC)[reply]

Bluetooth headset emulator

Is there a program (for windows (xp or vista)), which could emulate bluetooth headset? (Use computer's soundcard for audio input and output and connect to phone via system's bluetooth drivers). -Yyy (talk) 11:38, 17 February 2008 (UTC)[reply]

Extract vector from PDF

[10] At the bottom of page one, there is the logo (and rainbow symbol!) of the Department for Children, Schools and Families. Could someone extract it, as a vector (.svg/.eps) file and upload it to the article? Cheers! Porcupine (prickle me! · contribs · status) 13:53, 17 February 2008 (UTC)[reply]

It seems to be an embedded vector image, so you're looking for someone with Adobe Acrobat. Sorry, I don't have one but I'm sure you'll find someone here who does. The thing that concerns me here is the possible copyright (don't know what's the UK policy on government things). Admiral Norton (talk) 18:06, 17 February 2008 (UTC)[reply]
The {{logo}} would seem to be fine. Porcupine (prickle me! · contribs · status) 18:15, 17 February 2008 (UTC)[reply]
Inkscape 0.46 will start supporting import of PDF documents. Right now the 0.46 prerelease supports it as well. --Kjoonlee 19:20, 17 February 2008 (UTC)[reply]
PDF2SVG is what you need. Edit it in Inkscape later if needed. F (talk) 23:27, 17 February 2008 (UTC)[reply]
Inkscape 0.46 prerelease 1 is available free (as in free beer and free speech) and it works very well with the PDF file linked above. --Kjoonlee 15:56, 18 February 2008 (UTC)[reply]
All you need to know is how to ungroup things (ctrl-shift-g) and align them (ctrl-shift-a) and delete them (del). --Kjoonlee 15:58, 18 February 2008 (UTC)[reply]
Not neccessarily in that order, though. Oh, if you need to group things again you need to know ctrl-g for grouping as well. Why install a non-free demo, when you can do it in Inkscape? Especially if you have to run Inkscape anyway... --Kjoonlee 15:59, 18 February 2008 (UTC)[reply]

Firewire box?

I've heard that the way people record video or video games is though a box with a firewire (1394) port on it? Yet what is this mysterious firewire box? Is it a DVR or a standard cable box? And is their a way to record it onto a external firewire drive or computer? Mine is running OS X Leopard. --Randoman412 (talk) 14:05, 17 February 2008 (UTC)[reply]

Sounds like a DV Converter... try Googling it. --70.167.58.2 (talk) 23:47, 19 February 2008 (UTC)[reply]

html on invisionfree

Hi. I'm trying to edit the html on an invisionfree forum. I need to replace <%BOARD HEADER%> with my own html, but it won't let me remove that tag. So now I have two board headers, one is the default one, and one is my custom header. How do I get rid of it or somehow edit the default code? --Anakata (talk) 20:14, 17 February 2008 (UTC)[reply]

Writing a Programme

Which language should I learn and use to produce a programme that plots a graph of an 8-bit joystick value against time, and can also export this value as a CSV file. I have a Mac. How to I input the value of the joystick position?

--Cash4alex (talk) 20:31, 17 February 2008 (UTC)[reply]

The main tool used for OS X programming is Xcode, the page of which gives a description of the languages it uses. I don't know how to use it myself, though, and it's rather high-level stuff. Personally when I do Mac programming (mostly little things) I use RealBasic, which is very easy by comparison, and there are ways to make it do very powerful things. Depending on the joystick manufacturer there are different ways to do it in RealBasic. Exporting to a CSV file is trivial in any language, in any case. --98.217.18.109 (talk) 21:35, 17 February 2008 (UTC)[reply]

Unusual Outgoing Connections Blocked by PeerGuardian

Okay, Heres my story. I wanted LimeWire, So I installed PeerGuardian 2, then installed and used LimeWire. Then I noticed that PeerGuardian was blocking my computer from connecting to various IP addresses belonging to the US Army Research Laboratory, DISA, and NASA roughly every 5 minutes. I'm thinking the only reason that my computer would be doing this is if there was some kind of tracking software (I ran Antivirus and Antispyware with updated definitions, nothing). Really weirded out - I uninstalled LimeWire. -Christopher Kraus (talk) 21:31, 17 February 2008 (UTC)[reply]

I'm not sure if this is the answer to your question, but - when you decide to download something, (for arguments sake, some open source software) using peer-to-peer, your program goes out and finds a list of the networked computers which are offering a download (ie. other PTP users), and begins downloading from one or more of those users. In this case, I'm guessing those IP addresses were on the list of users-offering-whatever-you-wanted-to-download, so Limewire was attempting to connect with and download from them. However, PeerGuardian works, I understand, by keeping an updated list of users you would not wish to connect with ie. government bodies, law enforcement organisations and industry associations, in order to protect those users who may choose to download illegal things. So PeerGuardian was protecting you by preventing you from connecting with users on that list. Whether those users were honey-traps to catch people doing illegal things, or some guy who'd installed PTP on his work computer to see the latest episodes of Desperate Housewives is another matter... --Kateshortforbob 22:39, 17 February 2008 (UTC)[reply]
That makes sense, but I've uninstalled LimeWire, and my computer is still trying to connect to the government agencies. This is making me think that it is something tracking-related. --Christopher Kraus (talk) 00:47, 18 February 2008 (UTC)[reply]
Like I said below, who cares? The only reason you're seeing that at all is because you're blocking them. Just let PG run in the background :D\=< (talk) 00:49, 18 February 2008 (UTC)[reply]
I encourage people to run PeerGuardian all the time because of that kind of crazy stuff.. yes your computer is connecting to (or getting connections from) all sorts of foreign governments and the NSA etc etc, and yes you're communicating with them. Unless you have a quick netstat trigger finger or an excellent firewall, it's almost impossible to figure out what's causing the connections. But who cares, just block them with PG :D\=< (talk) 00:49, 18 February 2008 (UTC)[reply]
It's just weirds me out that my computer didn't do this before I installed LimeWire.--Christopher Kraus (talk) 01:00, 18 February 2008 (UTC)[reply]
I don't think you can say that, based on your original assertion that you "installed PeerGuardian 2, then installed and used LimeWire." If you weren't running PG before running LimeWire, than you really don't know what your computer was doing before. --LarryMac | Talk 18:51, 18 February 2008 (UTC)[reply]
These all run root namespace servers. Domain name system I've run into this before with PG2 as well. Washii (talk) 04:11, 18 February 2008 (UTC)[reply]
And there are really countless other reasons these IPs could be showing up. Random pings? People running P2P apps over a government network? Incorrect info in PeerGuardian's database? Is the program giving any more information or is that all it says? -- Consumed Crustacean (talk) 04:49, 18 February 2008 (UTC)[reply]
True, but I have a very strong feeling that should Christopher Kraus lookup the specific IPs listed at USARL, DISA and NASA, he would find that they're root DNS servers. He did say that PG2 was guarding outbound connections, where random pings would be inbound. Of course, it could be P2P on government networks, but I've checked the slew of IPs that PG2 has scrolled for those items before, because I had the same sort of visceral reaction until I found out what the IPs were.
I figured that was misinterpretation on the in/outbound, but I don't know how the software works. In any case, why would his computer be connecting to root DNS servers? Generally the ISP's DNS server does that if needed, unless he's running his own DNS server (in which case he'd likely know...) -- Consumed Crustacean (talk) 05:29, 18 February 2008 (UTC)[reply]

How long did you have Peer Guardian installed and running before you installed Limewire? Kushal 02:25, 18 February 2008 (UTC)[reply]

February 18

Types of computer

How can i find or know more about types of computer?--Stylin99 (talk) 01:44, 18 February 2008 (UTC)[reply]

It's not really clear what you mean by that. Please clarify. --98.217.18.109 (talk) 02:35, 18 February 2008 (UTC)[reply]
You could start with the computer article. Vespine (talk) 21:52, 18 February 2008 (UTC)[reply]

Accessing second computer

I have a Vista and XP machine on my home Wireless LAN (WiFi). Is there anyway I can access files that are on one computer from my other computer?Acceptable (talk) 02:28, 18 February 2008 (UTC)[reply]

Yes, look into how to do file sharing/shared folders in Windows. For Vista: [11], for XP: [12] --98.217.18.109 (talk) 02:37, 18 February 2008 (UTC)[reply]
But suppose the files are not in shared folders, is there anyway I can access them? Acceptable (talk) 02:40, 18 February 2008 (UTC)[reply]
Well, you could just enable sharing on the folders. Or install an FTP server or something and share them that way. You'll need to actually do something with that other computer in either case. Or if you have RDP set up you could conceivably do it that way. -- Consumed Crustacean (talk) 04:37, 18 February 2008 (UTC)[reply]
Yeah, you make them shared folders. You can share entire drives if you want. It's the easiest way to do what you want to do. You can also set them up as network drives, if you wanted to. --98.217.18.109 (talk) 15:46, 18 February 2008 (UTC)[reply]

Please heed to the warnings about the dangers of allowing root directory access that the "chatty" Windows likes to give. Unless it is a compelling reason, root directory level access to your hard disk over wifi may not be a good idea. Kushal 20:40, 18 February 2008 (UTC)[reply]

Right. I presumed they intended to share it with only one other machine and set it up with passwords and the like, not generally share it. --98.217.18.109 (talk) 22:34, 19 February 2008 (UTC)[reply]

CLI app for determining if a sound file is stereo or mono?

This is something that comes up for me a lot... is there a Unix application (command-line) that can look at a sound file and tell me if it's stereo or mono? I know it's possible because LAME can do it, but it will only tell you once it starts encoding, and I'd like to know before that. —Chowbok 03:04, 18 February 2008 (UTC)[reply]

Maybe something like "SoX -V file.wav /dev/null" would work? If it says 1 channel then it is mono, 2 channels then it is stereo.F (talk) 03:19, 18 February 2008 (UTC)[reply]
Thanks, but that doesn't work for what I want. I realize I was unclear. The issue isn't trying to find out how many channels an audio file has, it's that I need something to actually look at the sound and see if the two channels are identical (and hence mono). This mainly comes up with audio CDs, which are always two channels, even if it's a mono recording. Does that make sense? —Chowbok 03:48, 18 February 2008 (UTC)[reply]
XMMS has a voice removal plugin - this removes any sound that is the same on both channels. Might help you. Ariel. (talk) 21:49, 18 February 2008 (UTC)[reply]
You could just open it in a sound-editor like Audacity and look at the two different channels and see if they are identical. Should be pretty easy to spot 83.250.192.60 (talk) 23:08, 18 February 2008 (UTC)[reply]
Sure, but if I were to do that I could just listen to it and figure it out. I'd really like something that could quickly analyze it from a command-line.—Chowbok 19:14, 19 February 2008 (UTC)[reply]
I don't know if this will work but try using the sox program to add a half cycle phase to one channel, then add that channel to the first (avg command). If you get silence they are the same and canceled out. If that doesn't work, and you're a programmer, or can convince sox to do it, add the xmms sound removal plugin to the sox. Ariel. (talk) 21:53, 19 February 2008 (UTC)[reply]

E-mail address availability

I deleted an account with yahoo today. Then I decided I wanted to create a new account. I tried using the same email address that i just deleted but it said it wasn't available. So my question is.. Does an email address get voided once it is used, or can it be "recycled" for someone else to claim that address later. If so how long until I can choose that same address? —Preceding unsigned comment added by 68.7.130.43 (talk) 06:30, 18 February 2008 (UTC)[reply]

Seems obvious to me why it would be a bad idea to allow immediate reuse of a deleted address: they don't want to deliver mail to the wrong person, which is what would happen if an address owned by user X suddenly becomes owned by user Y. Forcing the address to be nonexistent for a while gives senders a chance to notice that the old user is gone and stop trying to send there. I haven't heard of any standard waiting period, but I would hope it's at least a week to allow for delayed-in-transit messages to exhaust their retry schedule. --tcsetattr (talk / contribs) 07:38, 18 February 2008 (UTC)[reply]
But there's no overall rule. Distribution of user names is entirely up to the owners of the server. You'd have to ask Yahoo for their policy. APL (talk) 13:46, 18 February 2008 (UTC)[reply]
If you wanted the same address, why in heaven's name would you delete the account? (Trust me the FBI and CIA can get to whatever . . . ) —Nricardo (talk) 01:14, 19 February 2008 (UTC)[reply]
Going to help.yahoo.com and searching for delete account brings up results like How can I delete my account? which indicate that once an account is deleted it can never be re-activated. --Bavi H (talk) 04:59, 19 February 2008 (UTC)[reply]

Give a Brief Note on Hiriyur Town .

Kindly Give a Brief Note on Hiriyur Town Located in Chitradurga District in Krnataka State with the Respective Map Which is Very Necessary For me To Update Our official Website. —Preceding unsigned comment added by 218.248.68.167 (talk) 09:48, 18 February 2008 (UTC)[reply]

We have an article on Hiriyur, except it doesn't have a map as such. --Ouro (blah blah) 14:25, 18 February 2008 (UTC)[reply]

Ubuntu root login

Hello How can i login as root in Ubuntu.thanx —Preceding unsigned comment added by Usmanzia1 (talkcontribs) 10:42, 18 February 2008 (UTC)[reply]

You are not supposed to. You can use sudo to run a command with root privileges. From the GUI, you will be prompted for your root password whenever you do an administrative action. They consider it safer this way. -- Meni Rosenfeld (talk) 13:12, 18 February 2008 (UTC)[reply]

Login? I have always been taught that logging in as root is one BAD idea. Will sudo work? Kushal 13:14, 18 February 2008 (UTC)[reply]

It's a bad idea to log in to GDM as root, but there's nothing wrong with logging in as root in the console. To enable the root account type "sudo passwd" and choose a password for your root account, then log in with "su". :D\=< (talk) 16:30, 18 February 2008 (UTC)[reply]
I wasn't about to answer, but now that the cat's out of the bag.... there's nothing that stops you from running sudo su. --Kjoonlee 20:41, 18 February 2008 (UTC)[reply]
I just go "sudo -i" when I absolutely need a root-console. I almost never do though, regular ol' sudo works for me. 83.250.192.60 (talk) 22:36, 18 February 2008 (UTC)[reply]
I'm not a big fan of sudo.. I'm the only user on this system (so root privs delegation isn't an issue) and it's horrifying to use the same password for root as for my user. Thankfully there's some option (I'd tell you but I'm in windows for some reason right now) you can put in sudoers that requires you to provide the root password for privilege escalation to root, and it works perfectly with sudo and gksudo. :D\=< (talk) 05:50, 19 February 2008 (UTC)[reply]

Apophysis Batch Rendering

Does anyone know how you can turn a number of individual .flame files into one batch for rendering? Ive been saving the flames using the 'save parameters' function and now wish to get the whole lot into one .flame file Thanks for any help. —Preceding unsigned comment added by 82.21.54.17 (talk) 12:20, 18 February 2008 (UTC)[reply]

Mac or Cross-platform OpenGL demos?

I have a Geforce 8800 on my Mac Pro. Are there any OpenGL demos that can show off what the card is capable of? --70.167.58.2 (talk) 16:08, 18 February 2008 (UTC)[reply]

http://pouet.net :D\=< (talk) 16:40, 18 February 2008 (UTC)[reply]

linux drivers, root, and X

  1. In linux do drivers run in a special ring or software-enforced security level? Does a process have to be running as root to communicate with drivers?
  2. Is that why X has to run as root? Seems like it should have its own user.
  3. Does a separate component handle the mouse cursor or is that just X being monolithic? :D\=< (talk) 16:39, 18 February 2008 (UTC)[reply]
1 With the exception of userpace "drivers" (which aren't really drivers at all) like FUSE plugins, they run in Kernel mode (which is ring0 on Intel). As such they have total access to the system, and certainly you have to trust them implicitly. This is one argument for a microkernel design, as drivers run (largely) in userspace with limited capacity to mess things up (although this is designed generally for reliability and error-resistance than downright security). With regard to communication - where the commication happens through the filesystem (/proc entries, named pipes, dev files) then the filesystem security handles who gets access. For system calls - anyone can make any system call, but the kernel and its drivers check the caller to see if they like it (so it's a per-system-call thing, callee checks). I don't know enough about questions 2 and 3 to give a solid answer, but I think X (the X server itself) only runs as root on regular linux systems is because they spawn XDM/GDM etc. which handles user credentials an makes user login processes - you can certainly kill (at least you could on Solaris and older Linux dists, last time I checked) kill the X server and run a fresh one (as a regular user) yourself. -- Finlay McWalter | Talk 16:59, 18 February 2008 (UTC)[reply]
That you can kill and restart the X server as non-root doesn't mean it's not using root privileges. It's quite often installed setuid root, which means it gains root privilege on being run, regardless of who started it. There are alternatives, such as running an X server that does all the work through the kernel framebuffer driver, but those aren't very popular. People have become accustomed to writing graphics drivers within the X server infrastructure, and the kernel drivers tend to be less featureful (barely good enough to support a text console). On the subject of putting more advanced graphics drivers in the kernel, Linus once said something like: "We already have a standard graphics interface that everyone uses, and it's called X". --tcsetattr (talk / contribs) 21:08, 18 February 2008 (UTC)[reply]
That's really stupid :( Can't wait for hurd to make sense of things (tick, tock) :D\=< (talk) 04:43, 19 February 2008 (UTC)[reply]
2: X was (at least at one time) run as root because rather than having video drivers in the kernel, it called ioperm() to allow it to twiddle certain ports on the video hardware itself from user space. Calling ioperm(), unsurprisingly, required root access. The X process would probably drop root privileges after having done so. 3) The X server itself handles the mouse, although I think in some cases there was hardware acceleration for that. --Sean 17:17, 18 February 2008 (UTC)[reply]

Digital camera "face" feature

My digital camera has a feature called "faces" which is supposed to auto-focus or something on peoples faces. My question is, will it work for cats (or animals generally) or is it just people? Thank you! xxx User:Hyper Girl 17:47, 18 February 2008 (UTC)[reply]

Face detection typically only works with human faces. It would be possible to create a cat-recognizing computer program. But as far as I know there is no software capable of recognizing faces in general, across species.
For what it's worth I just bought a new camera last week. If you use the screen as a viewfinder you can watch it moving the focus point around (a white box) whenever a human face is in frame. I had the same thought as you and tried it on a couple of cats with no luck at all. APL (talk) 18:06, 18 February 2008 (UTC)[reply]
Yeah, it locks onto peoples faces (interestingly not side portraits though) and highlights them in red, but for cats and dogs it doesn't work. I guess it might work on monkeys or other similar facial features. I'm going to try a few things. I wonder if a face drawn on a balloon would work... xxx User:Hyper Girl 18:18, 18 February 2008 (UTC)[reply]
's actually a cool experiment. Tell us how it works out with the balloon. Oh, which model camera is it now (curiosity)? --Ouro (blah blah) 19:00, 18 February 2008 (UTC)[reply]
I believe these things just look for 2 eyes, a nose, and maybe a mouth and lock-on to them (hence why it doesn't work in profile). An animal with those features easily seen and with similar ratios will probably set it off too. There are surprisingly few variations between faces from a geometry standpoint, basically everyone follows certain rules. 206.252.74.48 (talk) 19:44, 18 February 2008 (UTC)[reply]
The canon ixus cameras have this feature for anyone wondering. I have an Ixus 960IS. I thought it was pretty cool but didn't give it much thought, I assumed it was just looking for eyes but then other animals would work I guess there must be more to it.. When I get home I'm going to see if it works on someone with their eyes closed or wearing sunglasses. Vespine (talk) 21:35, 18 February 2008 (UTC)[reply]
Hey everyone! No luck with the balloon I'm afraid. But I did get it to lock onto my cats face, once, when she was sitting upright and the camera was at the same level as her. BTW its a Samsung S1050. xxx User:Hyper Girl 15:44, 19 February 2008 (UTC)[reply]

Expert Advisor for MetaTrader 4.0

I would like to know if there are any good Expert Advisors for MetaTrader 4.0. If there is could you please let me know, and if possible can I have a copy or source code of the said Expert Advisor.

Thanks. —Preceding unsigned comment added by 97.100.238.160 (talk) 17:54, 18 February 2008 (UTC)[reply]

remote port forward

I've done port forwarding combined with NAT using a machine sitting between me and the internet, but is it possible to do that using a remote machine? i.e. one that is not between me and the internet? I know I can use ssh, but I want the remote IP to be the real one, not the machine that's doing the port forwarding. If not, maybe some sort of VPN, or PPP? Ariel. (talk) 20:19, 18 February 2008 (UTC)[reply]

Wait, some clarification: do you wish that all your internet traffic be rerouted through a third-party server so that it appears that your IP is really that of the third-party computer? That's easy, just use a proxy server. There's lists of them on the internet, but using those isn't all that of a great idea, since there are serious privacy concerns. Use TOR, it's easy to install, and very, very private 83.250.192.60 (talk)
Although, I should say, it's got the speed of continental drift. You ain't gonna be watching youtube-videos with it 83.250.192.60 (talk) 22:43, 18 February 2008 (UTC)[reply]
No, the opposite of that. I want connections to that other computer to be forwarded to me, but without hiding the 'from' IP addresses. SSH would do the forwarding, but all the connections will look like they come from the remote computer, not the real IP. Ariel. (talk) 23:11, 18 February 2008 (UTC)[reply]
What you are describing is essentially an intercepting proxy server (also called transparent proxies) like ISPs sometimes use, and while I don't know how you'd configure it, there's nothing technically impossible about writing a network driver that would reroute all the packets in that fashion. Note though that if you did this, the internet sites would still see the IP of the proxy, but I suppose you wouldn't mind that. 83.250.192.60 (talk) 23:48, 18 February 2008 (UTC)[reply]
I'm not trying to hide my, or anyones IP. I'm behind a firewall, and can't accept incoming connections on some ports, so I want a machine (that I control) that is outside the firewall to redirect the connections it receives on one port to a different port on my machine. SSH can do it, and so can rinetd, but both of those change the 'from' IP to that of the machine they run on, and I'm wondering if there is any way to change that. Ariel. (talk) 00:39, 19 February 2008 (UTC)[reply]
When people think that the packet came from you, they will send responses directly to you, not some other machine. --131.215.220.112 (talk) 12:00, 19 February 2008 (UTC)[reply]

Exploding a video-file into individual images

What's the easiest way to export all the frames from a video as a whole bunch of jpegs (without having to spend a years rent on video software)? I tried using VLC and using its Image output module, but all the files looked like crap. Any ideas? 83.250.192.60 (talk) 22:31, 18 February 2008 (UTC)[reply]

And, oh yeah, I'm running Ubuntu 83.250.192.60 (talk) 22:38, 18 February 2008 (UTC)[reply]
It's normal for individual video frames to have less quality than images that were intended to be viewed as stills. You might think they "look like crap" but try playing the video and pausing it. Does the video paused on a single frame really look better? There should only be a slight difference, caused by the lossy re-encoding to jpeg. (Choosing a lossless image format like PNG could help. JPEG can also be done lossless, but rarely is.) You could try mplayer -vo jpeg or -vo png but I wouldn't be surprised if its output is nearly identical to VLC. --tcsetattr (talk / contribs) 23:12, 18 February 2008 (UTC)[reply]
Ahh, perfect! Thank you! I did try changing the format to PNG in VLC, but then it only recorded a single frame in a few (it's not the worlds fastest computer I'm using). And yes, the JPGs really looked like crap, they looked like someone printed them out and peed on them. mplayer prints out all the frames, nice and crisp! Beautiful! 83.250.192.60 (talk) 23:58, 18 February 2008 (UTC)[reply]

lol ... jpegs are just like that ... it uses lossy compression. Kushal 03:41, 19 February 2008 (UTC)[reply]

Yes, I know! I am not a moron, I know that a jpeg loses information and looks bad when you zoom in! The point was that the images produced were barely recognizable as images, they basically looked like someone had mixed the image with cosmic background radiation before faxing them through a bad line and finally coloring them by hand. mplayer also produced jpegs, and they didn't look bad at all, so obviously they were extra-super bad, I didn't just imagine it. 83.250.192.60 (talk) 05:02, 19 February 2008 (UTC)[reply]


If you purchase quicktime pro for £20, you can export as image sequence. Just don't save to your desktop like i did, because you run out of room very quickly >_< Radiofred (talk) 11:56, 19 February 2008 (UTC)[reply]

February 19

OpenGL over SSH

I have xvfb installed on a headless SSH server. I can run firefox and other X programs over SSH. When I run glxgears, it is slow, running at around 300 fps. But when I use -info, it says that the graphics card is a Radeon X1600. That is the graphics card that my laptop runs, the one I'm using to access the server. THe actual server has no graphics card! Why does it say that the server has an X1600? —Preceding unsigned comment added by 75.31.170.32 (talk) 03:25, 19 February 2008 (UTC)[reply]

When talking about the X Window System, the server is the end that provides the display, and the clients are the programs that connect to that display. See X Window System#Design. --Bavi H (talk) 04:39, 19 February 2008 (UTC)[reply]
Either you're talking about a different xvfb, or it's completely unnecessary as you're not actually making use of it. --tcsetattr (talk / contribs) 05:00, 19 February 2008 (UTC)[reply]
What are you talking about? :D\=< (talk) 05:44, 19 February 2008 (UTC)[reply]
Xvfb (virtual frame buffer) is basically a phantom X server - it behaves like an X server so that programs can connect to it and run, but it doesn't display anything anywhere. It's used when you have some program that requires X but you can't or don't want to run an X server. If I am reading everyone's mind correctly, our friend from 75.31.170.32 is under the misconception that he needs to run an X server on his headless machine in order to be able to ssh in and run X programs. (This is a misconception caused by a failure to think through the structure of the system as Bavi H pointed out.) So he chose Xvfb, being the server that doesn't actually contain any drivers for graphics hardware. But he's not actually using it. The X clients on his headless machine are connecting (through ssh's X11 forwarding) to the X server on the other machine. Thus Xvfb is unnecessary.
Now that I've typed all that, upon further reflcetion, I still prefer my comment in its original not-so-long-winded form. Oh well. --tcsetattr (talk / contribs) 07:31, 19 February 2008 (UTC)[reply]
Ah. Is it possible to actually connect to a remote X server? :D\=< (talk) 11:58, 19 February 2008 (UTC)[reply]
Yes, that's what the clients do. But I guess what you're asking is whether you can connect to a remote virtual-frame-buffer server via some other channel (unrelated to the X protocol) and view the frame buffer remotely. Yes, if the server supports it: that's exactly how xvnc works. I don't know of any other examples. -- BenRG (talk) 17:43, 19 February 2008 (UTC)[reply]

examining old Mac fonts

I have weird hobbies. I want to get a fatbits view of some ancient MacOS fonts (Los Angeles and Geneva 24). ResEdit would be the appropriate tool, but it doesn't run anymore. Suggestions? —Tamfang (talk) 05:52, 19 February 2008 (UTC)[reply]

[www.nothickmanuals.info/doku.php/minivmac Mac on a Stick]? --grawity talk / PGP 09:26, 19 February 2008 (UTC)[reply]
I could send you a HD image, if you don't want to google for System * images.
Turn on the screen magnification in the "Universal Access" control panel ("System Preferences"). But if you want the true "fatbits" experience, be sure to select "Options..." and turn off "Smoothing".
Atlant (talk) 12:58, 19 February 2008 (UTC), revised 23:13, 19 February 2008 (UTC)[reply]
Magnification is no help if I can't open the suitcase. —Tamfang (talk) 06:58, 20 February 2008 (UTC)[reply]

Concatenation in Perl

In Perl, this works as intended:

print ($a / 40300);
print " meters\n";

But this will only print the number:

print ($a / 40300) . " meters\n";

Why is that? Is there a way around it? I've been pondering this for quite some time. Thanks! ›mysid () 08:54, 19 February 2008 (UTC)[reply]

The first isn't a string, why would you expect to be able to concatenate? Perl defies strong/weak typing definitions. :D\=< (talk) 10:29, 19 February 2008 (UTC)[reply]
Shame on you for not enabling warnings! (Seriously, the perl world has been begging people to enable warnings for the last 1000 years yet still there are people asking ridiculous questions that the warning would have answered! How long is it gonna take? Will there have to be a perl version that electrocutes the user when warnings are not enabled?)
You are print()ing $a/40300 and then concatenating the string " meters\n" onto whatever print() returned, and throwing away the result of the concatenation. You should put the function-call parentheses around what you intend to pass to the function, as in

print(($a / 40300) . " meters\n");

Other similar things are

print +($a / 40300) . " meters\n";

in which the unary + forces a different syntactical interpretation, and

print $a / 40300, " meters\n";

in which there are 2 arguments being passed to print(). But the first way is the easy way: if you never omit the function-call parentheses, you'll never be surprised at where the parser decided your argument list ended. --tcsetattr (talk / contribs) 10:35, 19 February 2008 (UTC)[reply]
Thanks, that completely clarifies it. Yeah, shame on me. But I'd actually prefer Perl enabling the warnings by default rather than electrocuting me. ›mysid () 20:08, 19 February 2008 (UTC)[reply]
Oh, wow that's stupid. Why do scripting languages insist on having syntax-defying keyword versions of the print statement that muddle everyhing up? Just force the user to use parentheses.. .:D\=< (talk) 11:55, 19 February 2008 (UTC)[reply]
It has nothing to do with the print statement. Any function would behave the same way. It has to do with Perl's optional-parens-on-function-calls feature, which is very handy and certainly worth having this little wart on it, since it will warn you about it if you do it wrong. --Sean 15:06, 19 February 2008 (UTC)[reply]
It is a pretty horrible feature. Consider the examples given in perlfunc:

print(1+2) + 4; # Prints 3. print (1+2)+4; # Also prints 3!

What the author is telling us with his excited commentary is that he thinks the two lines might reasonably be expected to have different results. But surely no reasonable language would give syntactical significance to horizontal whitespace! --tcsetattr (talk / contribs) 21:59, 19 February 2008 (UTC)[reply]

Start-up problem in Windows XP, German message

When I start-up Windows the following message keeps popping up:


Setup UPDATE [-u] [-f] [-n] [-o] [-z] [-q] [-l] -u Unbeaufsichtigter Modus -f Erzwingt das Schließen anderer Programme beim Herunterfahren. -n Keine Dateisicherung für Deinstallation. -o Überschreibt OEM-Dateien ohne Abfrage. -z Kein Neustart nach Abschluss der Installation. -q Hintergrundmodus (keine Bildschirmausgabe). -l Listet installierte Hotfixes auf. OK


Although I can just click OK and go on, it is annoying to always have to do it.

I think this message is the result of a open-source program installation that went wrong. I don't remember exactly what program it was. But I was to get rid of it.

Any ideas? Mr.K. (talk) 09:10, 19 February 2008 (UTC)[reply]

If you can remember when about you tried to install this software, search for new files by date in that timeframe.--Ouro (blah blah) 14:39, 19 February 2008 (UTC)[reply]
Googling those messages points to some kind of Microsoft service pack stuff. [13] --Sean 15:10, 19 February 2008 (UTC)[reply]
Looks like xp sp1 to me. Open source now, was it? --Ouro (blah blah) 17:18, 19 February 2008 (UTC)[reply]


Ok, perhaps it was not open-source. But the message is still there. And going to this German page doesn't help me actually. I don't even think it matches too much. There are general term in the message. Mr.K. (talk) 23:11, 19 February 2008 (UTC)[reply]
Search your disk the way I suggested and tell us what you found. --Ouro (blah blah) 12:44, 20 February 2008 (UTC)[reply]

Defragment fails.

I decided to defrag today. At first it went well, but at about 15%, it suddenly stops and gave this message

"Defragmentation is complete for: (C:) Some files on this volume could not be defragmented. Please check the defragmentation report for the list of these files."

I tried running it again but it just gives the same message after about 2 minutes in. I don't understand what's going on, but it looks pretty messed up (down there). I should point out that the last time I defragged this disk was probably over 2 years ago... So I want to tidy it up now, but now I can't? Help.

View Report:

Volume (C:) Volume size = 74.52 GB Cluster size = 4 KB Used space = 56.19 GB Free space = 18.33 GB Percent free space = 24 %

Volume fragmentation Total fragmentation = 27 % File fragmentation = 48 % Free space fragmentation = 7 %

File fragmentation Total files = 190,740 Average file size = 426 KB Total fragmented files = 4,479 Total excess fragments = 574,697 Average fragments per file = 4.01

Pagefile fragmentation Pagefile size = 1.47 GB Total fragments = 44,094

Folder fragmentation Total folders = 11,796 Fragmented folders = 1 Excess folder fragments = 0

Master File Table (MFT) fragmentation Total MFT size = 242 MB MFT record count = 206,041 Percent MFT in use = 82 % Total MFT fragments = 71


Fragments File Size Files that cannot be defragmented 1,196 6 MB \Documents and Settings\Mason\My Documents\My Music\Music\The Very Best of Chopin\12 Chopin_ Etude In C Minor.m4a 2,164 12 MB \Documents and Settings\Mason\My Documents\My Music\Music\The Very Best of Chopin\10 Chopin_ Noctune In E Flat.m4a 970 14 MB \Documents and Settings\Mason\My Documents\My Music\Music\Dream Theater - Honor Thy Father.mp3 967 15 MB \Documents and Settings\Mason\My Documents\My Music\Music\Dream Theater\Dark Side Of The Moon [Pink Floyd Cover]\Cd 1\05 Dream Theater - Money.mp3 1,026 16 MB \WINDOWS\Installer\2ff158.msi 862 16 MB \Documents and Settings\Mason\My Documents\My Music\Music\Dream Theater\Dark Side Of The Moon [Pink Floyd Cover]\Cd 1\03 Dream Theater - Time.mp3 1,492 18 MB \Documents and Settings\Mason\My Documents\My Music\Music\Dream Theater\Dark Side Of The Moon [Pink Floyd Cover]\Cd 1\06 Dream Theater - Us And Them.mp3 3,464 22 MB \Documents and Settings\Mason\My Documents\My Music\Music\The Very Best of Chopin\13 Chopin_ Sonata #3, First Movement.m4a 1,276 27 MB \Documents and Settings\Mason\My Documents\My Music\Music\Dream Theater\Dark Side Of The Moon [Pink Floyd Cover]\Cd 2\01 Dream Theater - Echoes Pt. 1.mp3 1,748 33 MB \Documents and Settings\Mason\My Documents\My Music\Music\Symphony X - The Odyssey.mp3 1,958 36 MB \Program Files\Sierra\Counter-Strike\valve\halflife.wad 4,363 44 MB \Documents and Settings\Mason\My Documents\My Music\Music\The Very Best of Chopin\14 Chopin_ Piano Concerto #1, First Movement.m4a 1,218 76 MB \Program Files\Morrowind\Morrowind\Data Files\Morrowind.esm 1,283 82 MB \Program Files\Age of Empires 2\Data\graphics.drs 3,338 256 MB \Documents and Settings\Milka\Local Settings\Temp\IMAGE.img 2,646 280 MB \Program Files\Adobe\Illustrator CS2 installation\Data1.cab 1,968 291 MB \Documents and Settings\Guest\Local Settings\Temp\~PST1297.tmp 7,138 307 MB \Documents and Settings\Milka\My Documents\Anime & Movies\Cinderella\Cinderella Part 1.avi 3,633 432 MB \Program Files\Bethesda Softworks\Oblivion\Data\DLCShiveringIsles - Voices.bsa 3,168 480 MB \Documents and Settings\Mason\Local Settings\Application Data\Google\GoogleEarth\dbCache.dat 4,231 597 MB \Program Files\Backup.bkf 21,839 620 MB \Documents and Settings\Milka\My Documents\Anime & Movies\Fantasia 2000 - Walt Disney\Fantasia 2000.AVI 913 629 MB \Documents and Settings\All Users\Documents\Epsxe\CD images\Final Fantasy VII - cd3.img 21,053 684 MB \Documents and Settings\Milka\My Documents\Anime & Movies\Ghibli Studio\My Neighbor Totoro.avi 8,290 689 MB \Documents and Settings\Milka\My Documents\Alcohol 120\NEW.mdf 8,289 689 MB \Documents and Settings\Milka\My Documents\Alcohol 120\FFIX Disc3.mdf 28,681 700 MB \Documents and Settings\Milka\My Documents\Anime & Movies\Final Fantasy VII - Advent Children.avi 31,558 700 MB \Documents and Settings\Milka\My Documents\Anime & Movies\Ghibli Studio\Whisper of the Heart.avi 8,035 735 MB \Documents and Settings\Milka\My Documents\Alcohol 120\Images\FFIX disc1.mdf 156,361 4.00 GB \Documents and Settings\Milka\My Documents\Anime & Movies\Suikoden III DVD\Suikoden III.I00

I did have a look at Defragmentation, but couldn't find any info that might help. Aurora sword (talk) 10:25, 19 February 2008 (UTC)[reply]

File system damage probably. Boot from your XP install disk, hit R to enter the recovery partition and run

chkdsk /R

:D\=< (talk) 11:52, 19 February 2008 (UTC)[reply]

Just a small reminder, please back up everything that you need. Use another administrator account to do the backup for Milka's documents and setttings. The good news is that most of the fragmentation seems to be in the folder "documents and settings". Maybe you could back up everything, delete the user, and restore the backup?

I would suggest moving the documents and settings to another partition but it is too much hassle. I tried it and it did not work perfectly for me. Kushal 12:47, 19 February 2008 (UTC)[reply]

Hmm, eh. So basically what I need to do is copy those files into another disk, delete, then paste them back, correct? Might have to borrow someone's portable HD for this.. If I create the backup in the same disk that needs defragging, would it be fine or be useless? Aurora sword (talk) 17:01, 19 February 2008 (UTC)[reply]

I'd actually do it the other way around: take out your hard disk and connect it as a second drive on someone else's PC and run a diagnostic on it (Norton Disk Doctor, then Norton Speeddisk). --Ouro (blah blah) 17:22, 19 February 2008 (UTC)[reply]

It does help if it is in the same disk but NOT in the same partition. However, just to be safe, I would back it up to an external drive. On the other hand, Ouro's suggestion seems to be very good and avoids the hassle too! Do you have another computer that has the disk software that Ouro mentioned? Kushal 17:48, 19 February 2008 (UTC)[reply]

...or similar open-source software that does the same but is faster and better than Windows-native Scandisk or Defrag? --Ouro (blah blah) 12:38, 20 February 2008 (UTC)[reply]

IBM RSC (RISC Single Chip)

Does anyone know where I can find detailed information about this microprocessor? I've tried the IBM Journal of Research and Development, but there isn't anything there. Google searches don't seem to turn up anything either, except for a IEEE paper that is unfortunately available through subscription only. Thanks. Rilak (talk) 11:56, 19 February 2008 (UTC)[reply]

Pages 200-204 *shrug* We do have a tiny article. :D\=< (talk) 12:00, 19 February 2008 (UTC)[reply]

Audio communications.

I have a little problem here that I doubt can be solved, but if it can, I'm sure this is the place that can do it. I would like to be able to talk to someone that lives a long way from me. Actually talk so they can hear me, via the internet. However I don't have a microphone that I can plug into my computer, and at the moment it seems unlikely that I will be able to get one. so I thought maybe you could suggest another way in which we could talk. HS7 (talk) 13:07, 19 February 2008 (UTC)[reply]

I see three possibilities:
  1. Use headphones instead of a microphone (yes, it works).
  2. Use your keyboard and text-to-speech software.
  3. Send me 100$ and I will send you my book on long distance telepathy.
Morana (talk) 14:07, 19 February 2008 (UTC)[reply]

1 How can I talk to someone through headphones? I really can't see how that would help, unless there's something I'm not getting here.

2 The point is so that we can hear each other talking, not just hear the computer saying what we've typed.

3 I already considered that, and I'm sure if it works, I'll be just as able to do it myself.

Sorry, but thanks for your help anyway. HS7 (talk) 14:44, 19 February 2008 (UTC)[reply]

1. Alexander Graham Bell's telephone was probably something similar: a speaker works the same way as a microphone. (But you probably need to hook up amplifiers, though.) And I'm not sure if the plugs are wired so that that's possible... Anyway, if you do have a working microphone, then there's Skype and Google Talk and lots of other ways to voice chat. --Kjoonlee 14:55, 19 February 2008 (UTC)[reply]

The telepathy sounds easier. I'll give that a try. HS7 (talk) 14:58, 19 February 2008 (UTC)[reply]

OK, I'll try a different approach. is there any way that with no experience with computering or engineering or anything like that I can make my own microphone from stuff around that house that noone else wants? HS7 (talk) 16:13, 19 February 2008 (UTC)[reply]

Assuming you have stuff that no-one wants worth at least $15 (US) or so, amazon.com is the obvious option. Algebraist 16:32, 19 February 2008 (UTC)[reply]
Just do what I did and steal a microphone from your local college. I admit it! The truth really does set you free, who figured? 206.252.74.48 (talk) 16:56, 19 February 2008 (UTC)[reply]

Right. I'm not going to steal anything, I wouldn't even know how. but I notice skype was mentioned up there a bit, and even I know what that is. Would it actually be possible though without the microphone? that's basically the whole problem here. HS7 (talk) 17:19, 19 February 2008 (UTC)[reply]

As mentioned above, no, voice chat cannot be done without a microphone. --Kjoonlee 17:31, 19 February 2008 (UTC)[reply]
If your difficulty in getting a microphone is cost-related, consider that microphones can be very inexpensive these days. Better yet, ask your local friends; many new PCs come with a cheapo external microphone, and a lot of people probably have at least one extra lying around they'd be willing to part with. jeffjon (talk) 18:40, 19 February 2008 (UTC)[reply]
(I'm going to assume that you're not on a laptop or something with a built-in microphone.)
You might try hooking up a cheap pair of headphones (cheaper the better, probably) into your computer's microphone jack and turning the mic gain all the way up. See if you can get that to work. Some headphones will actually work as microphones that way.
The other option for "stuff around the house" is that if you wired a microphone salvaged from an old telephone into an audio cable salvaged from an old pair of headphones you could probably make a crude microphone that way.
But I agree with the folk above that the best solution is probably picking up a cheap microphone for about $5-$10, somewhere. I've seen them in drug stores for about that price.APL (talk) 19:11, 19 February 2008 (UTC)[reply]

I've figured out another way, i could get one of those phones that you can get the internet on, that soundly like it could work. but even if it would, i think I'll just give up and buy a microphone when I can find one. I live in a little village so I doubt there will be any places that sell them near here. Thanks for all your help. :)HS7 (talk) 19:30, 19 February 2008 (UTC)[reply]

If you search around, you may be able to find really good prices online. I've never heard of this retailer, but this looks pretty cheap : [14] —Preceding unsigned comment added by APL (talkcontribs) 19:37, 19 February 2008 (UTC)[reply]

• Download skype ( for free ) and spend about £20 on a sykpe phone http://www.travelizmo.com/archives/ipevo-skype-phones.JPG this is a usb phone which enables you to chat online with any other skype user via the internet. Radiofred (talk) 23:53, 19 February 2008 (UTC)[reply]

Email Repeat Send Online Service

I subscribe to a service that requires my consent via email each and every day that I require that service. I can email them on work days in the morning but not at weekends or when I am on holiday so I lose the service for that day. Is there a service available online where I can set up one email to be sent per day to one receiving email address on a repeated basis. The email text will always be the same. Mccartrey (talk) 13:26, 19 February 2008 (UTC)[reply]

Maybe this site can be of help. 212.123.186.64 (talk) 13:57, 19 February 2008 (UTC)[reply]

iPlayer WMV

I hear from lots of websites that if one installs the iPlayer software, one can download a DRM-protected WMV of the program, and then play it in WMP. Is there a way to download these wmvs without installing extra software? Is there a site like KeepVid that works out the link format to the direct WMV? Thanks Porcupine (prickle me! · contribs · status) 14:44, 19 February 2008 (UTC)[reply]

Windows XP Pro Booting problem

I'm using Windows XP Pro in my system.the problem i have is that we i turn on my computer,windows boots up and i even see the loading screen;but once it gets to the login screen,i can only see a mouse cursor in my screen and the rest is black.I don't have any clue as to what is the problem.Please helpChidam17 (talk) 17:03, 19 February 2008 (UTC)[reply]

I believe it is some fault with the Windows XP explorer. Have you tried Ctrl + Alt + Del Control-Alt-Delete? Does the computer respond to that? If you can get to Task manager, you can go to File > New Task (Run) >> and then type in something stupid like "my computer". Explorer should start up. (This does not work if you are not logged in.)

If that did not work, you might want to reinstall Windows altogether. If you have a bootable installation CD, you might want to reinstall Windows. To back up your stuff, you can boot with a LiveCD of Ubuntu and copy your files or you can simply take the hard disk to another computer and make a backup copy of it there. Hope that helps, Kushal 17:37, 19 February 2008 (UTC)[reply]

Actually,

explorer

should work, but not "my computer". --Kjoonlee 17:59, 19 February 2008 (UTC)[reply]
I have this happen to me all the time, but only after I log in. First I kill the "explorer.exe" process, then I start it again using run. However, it seems that you cannot even log in. This has happened to me too, and I suggest a system restore instead of a reinstall. 206.252.74.48 (talk) 19:32, 19 February 2008 (UTC)[reply]
winlogon.exe should do the trick, I believe. Admiral Norton (talk) 21:13, 19 February 2008 (UTC)[reply]

Well, I had that problem with my computer before. When I entered a valid command, just that window came up but not the taskbar. Then I tried something stupid, and taskbar and desktop and everything came up along with an error message. But the bottomline is that it worked. Kushal 19:53, 19 February 2008 (UTC)[reply]

Only thing different is that for me, it happened after I logged in (AFAIR). Kushal 19:54, 19 February 2008 (UTC)[reply]

Deleting Files from Recycle Bin via Command Prompt

Hi, I was wondering if there was a way to delete individual files from the Recycle Bin, but not every file from it using cmd.exe. Also, is there some command that allows batch files to delete other programs without moving it to the Recycle Bin, or moving it to the Bin, then deleting it? Any help would be greatly appreciated. 63.28.135.182 (talk) 18:13, 19 February 2008 (UTC)[reply]

To answer your second question, the del command deletes files without moving them to the Recycle Bin. --Bavi H (talk) 04:00, 20 February 2008 (UTC)[reply]

computer problem

1. My pentium PC can no longer start up from my hard disk. i can not start up from the floppy drive either. I have replaced the floppy drive with a new one so i know that its not the drive which is at fault. What do i do to get my PC hard drive working again.

2.i am running windows 95 on my PC and when i boot-up, it displays a black screen and the following message appears "a device file that is specified in the system.ini file is damaged. It may be needed to run windows. You may need to run the windows setup program again. If the file was included on another software package, you may need to reinstall the software that uses the findilc:\windows\system\VMM32\NTKERN.vxd" —Preceding unsigned comment added by Leoaboki (talkcontribs) 18:27, 19 February 2008 (UTC)[reply]

Did you recently install USB support? According to this forum discussion it might be the reason. Anyway, run the Windows setup (your Windows CD). Admiral Norton (talk) 21:07, 19 February 2008 (UTC)[reply]

What's wrong with this excel function?

=IF(B5<3000,*.1,IF(C5=S,x=.18,x=.15)IF(B5>3000,*.x) Bellum et Pax (talk) 21:15, 19 February 2008 (UTC)[reply]

Well, you have "F" instead of "IF" at the beginning. Is that it? Useight (talk) 21:19, 19 February 2008 (UTC)[reply]
Err yeah, it should be =IF in the beginning, but there's something else too. Bellum et Pax (talk) 21:21, 19 February 2008 (UTC)[reply]
There is something missing after "... x=.15)". Since IF only takes three parameters, it should probably be a closing paren, but then I don't know where that leftover IF goes. --LarryMac | Talk 21:47, 19 February 2008 (UTC)[reply]
Aside from that, I don't know what *.1 and *.x do. Is this a function within a macro? --LarryMac | Talk 21:56, 19 February 2008 (UTC)[reply]
For one thing you know something's wrong when you have 3 open parens and only 2 closed parens. Check how you've got your IF functions nested, there is definitely an error there. And I'm dubious that your use of the asterisks in this way is kosher—"*.1" is not a valid value for a cell to hold (perhaps you mean B5*.1?) --98.217.18.109 (talk) 23:25, 19 February 2008 (UTC)[reply]
I think a better question to work out what's wrong is "What is it supposed to do?" Confusing Manifestation(Say hi!) 00:09, 20 February 2008 (UTC)[reply]
The intention is to take a cell (B5) and multiply it by .1 if it's below 3000, or multiply it by X if it's above 3000. X is defined by weather another cell (C5) is either an S or an M. If it's S then multiply it by .15, else multiply it by .18. —Preceding unsigned comment added by Bellum et Pax (talkcontribs) 05:36, 20 February 2008 (UTC)[reply]

=IF(B5<3000,B5*0.1,IF(C5="S",B5*0.15,B5*0.18)) –Outriggr § 06:00, 20 February 2008 (UTC)[reply]

The problems are:
  1. You can't write *.1 in vacuum. It needs to multiply something (e.g. B5*.1).
  2. You can't define a variable inside a formula this way (I don't think so, anyway).
  3. Even if x was defined, it needs to be B5*x (multiplying B5 by x) and not the meaningless *.x (with a missing multiplicand and a superfluous period).
  4. You can't write two functions one after the other (the IF()IF() thing)
  5. The S is a string and thus should be in quotation marks, "S".
  6. The first IF has no closing parenthesis.
  7. The third IF need 3 parameters.
  8. You have conditioned on B5>3000 in a branch where already B5>=3000. You need to decide what you want in the case B5=3000.
No offense is intended, but a better question would be what is right about this formula. You should familiarize yourself with simpler expressions first before writing more complicated ones.
For a correct expression, you can use Outriggr's version, or the slightly shorter:

=B5*IF(B5<3000,0.1,IF(C5="S",0.15,0.18))

-- Meni Rosenfeld (talk) 11:00, 20 February 2008 (UTC)[reply]

Piracy

hi i'm making a program about piracy. i'm looking for some experts who know a lot about piracy. can anybody help provide me with some infomation about piracy. not just computer piracy, but all piracy (eg books, music, video game). if anybody can help provide some infomation or point me in the direction of some one who can i would appreciate it. thanks for you time POKEMON RULES (talk) 21:28, 19 February 2008 (UTC)[reply]

http://www.gnu.org/philosophy/words-to-avoid.html#Piracy --tcsetattr (talk / contribs) 21:31, 19 February 2008 (UTC)[reply]
A great book to read (and it's available free online) is Lawrence Lessig's Free Culture, which discusses the history of "piracy" and intellectual property protection in its early chapters and discusses modern issues as well. It's a great over-all source and is very readable. Online at http://free-culture.cc/. --98.217.18.109 (talk) 22:30, 19 February 2008 (UTC)[reply]

Running wiki offline

Hi all, I have a question about wether it is possible to run MediaWiki or another Wiki offline or not. I don't have a server, nor do I have my own webspace. I know that you can run html pages offline as well, so I was wondering if this is possible to do with Wiki software as well and if so, how to get started. Thanks a lot, AmandaT/C 23:48, 19 February 2008 (UTC)[reply]

There are a couple ways to do this. One is to run a server locally, and install it on that. This can be very hard to do, though.
The easier solution is to use one of the many pre-packaged off-line wiki software packages out there (a number are listed in the article personal wiki), but depending on what you want to do with the Wiki, the best software for the job will vary. This isn't the same thing, mind you, as having Wikipedia itself available off-line, but it doesn't sound like that's what you're asking for. --98.217.18.109 (talk) 01:59, 20 February 2008 (UTC)[reply]
I can personally warmly recommend TiddlyWiki. Just download one html-file, no installation or anything, and you have a pretty neat little personal wiki. It's quite astonishing how cool it is. 83.250.192.60 (talk) 03:01, 20 February 2008 (UTC)[reply]
Thanks, that was what I was looking for, but I still prefer MediaWiki to be running like this tiddlywiki because I'm used to that now :) AmandaT/C 05:36, 20 February 2008 (UTC)[reply]
If the problem is having no web hosting (as opposed to having no internet connection), then I recommend WOS. It allows you to install a MediaWiki server on your computer as easily as you can download a file and run it. You can then run it locally. -- Meni Rosenfeld (talk) 11:08, 20 February 2008 (UTC)[reply]

February 20

Green Colour Prints

Hello. Whenever I print in colour using a refilled cartridge, the document has a green hue. How should I fix that if I do not want to buy a new colour ink cartridge? Thanks in advance. --Mayfare (talk) 00:52, 20 February 2008 (UTC)[reply]

Memory Advice

Resolved

I'm looking at laptops, and I get this option:

  • 1 GB PC2-5300 DDR2 SDRAM 667MHz SODIMM Memory (2 DIMM) or
  • 1 GB PC2-5300 DDR2 SDRAM 667MHz SODIMM Memory (1 DIMM)

Whats the difference, and which is better? 00:55, 20 February 2008 (UTC)

The second option is better. It's 1 stick of RAM (1 GB) instead of 2 sticks (512 MB each). That will leave you an open RAM slot for future upgrades. Useight (talk) 00:56, 20 February 2008 (UTC)[reply]
Thank you! HYENASTE 01:20, 20 February 2008 (UTC)[reply]

Processor Advice

Thanks for the help on the previous question. I have one more. These processors come standard

  • Intel® Core™ 2 Duo processor T7250 (2.0GHz 800MHz 2MBL2)
  • Intel® Core™ 2 Duo processor T8100 (2.1GHz 800MHz 3MBL2)

These are $40 more:

  • Intel® Core™ 2 Duo processor T7500 (2.2GHz 800MHz 4MBL2)
  • Intel® Core™ 2 Duo processor T8300 (2.4GHz 800MHz 3MBL2)

Which should I get? HYENASTE 01:29, 20 February 2008 (UTC)[reply]

I don't understand what the 2MBL2, 3MBL2 bits mean though I assume they indicate something relating to them being mobile processors. As a general rule though if the price isn't a whole lot different (and in this case, $40 isn't much over the total cost), you should get the best processor you can, because they're near impossible to upgrade. The T7500 has a slightly slower clock speed, but has a large cache size than the T8300 (4MB compared to 3MB), and that might matter more, I'm not sure. Maybe someone else will know the answer to whether 1MB of cache size is better than .2GHz of clock speed. Those look like the only really important differences between the two. --98.217.18.109 (talk) 02:11, 20 February 2008 (UTC)[reply]
Just by looking at it, I think the extra L2 cache will be quite a bit better than a .2 GHZ gain in speed in the latter 2 processors. As stated above, $40 isn't too much of a difference, but you do get a bit more memory on a relatively bottle-necked portion of the processor, I would recommend the third option: Intel® Core™ 2 Duo processor T7500 (2.2GHz 800MHz 4MBL2). Acceptable (talk) 02:53, 20 February 2008 (UTC)[reply]
Just in case it isn't clear by now: The "2MBL2" means "2 MebiBytes of L2 Cache", and so on. -- Meni Rosenfeld (talk) 11:35, 20 February 2008 (UTC)[reply]

SQL question

I'm writing a quick and dirty search engine for an in-house database. I'm trying to implement full-text searching with MySQL. I've got a function that will generate queries like this: SELECT id FROM documents WHERE ((documents.title LIKE "%search terms%") OR (documents.pdf_notes LIKE "%search terms%") ) Which works great. Now I'd like to make it also search some other tables. In this case, "documents" has a primary key of "id"; another table, "authors" has a field of "name" and a field of "id"; the many-to-many relationship is maintained by a linking table called "link_documents_authors" that has a field "document_id" (primary key from the "documents" table) and a field for its corresponding "author_id" (primary key from the "authors" table). Make sense? Nothing too non-standard there.

How do I integrate searching of "author.name" into the sort of search above? Is it a good idea? I've learned to fear JOIN queries over the years but maybe this is a good time to get into them? --98.217.18.109 (talk) 02:25, 20 February 2008 (UTC)[reply]

Sharing with Vista and XP

Following with my previous question, I tried what was instructed on Microsoft's homepage about creating sharing folders. I have followed all the steps, but on my Vista laptop, I cannot "see" my xp machine in the networks center. On my XP machine, I can see the Vista machine, and I can even access it, but when I try to access the folders in it, I says that "Access is Denied". I am an admin on both machines and took all the password protected file sharing setting off. What should I do? Acceptable (talk) 02:50, 20 February 2008 (UTC)[reply]

ALT+??

I recently came across this symbol:

่ It looks very much like an apostrophe. However, when placed before a message in Windows Live Messenger, it makes the font super-big. Could anyone tell me what symbol it is and how I can get the alt + xxxx combination for it? Thanks. Acceptable (talk) 03:00, 20 February 2008 (UTC)[reply]

It appears to be the THAI CHARACTER MAI EK. I guess it would be alt+0E48. HYENASTE 03:16, 20 February 2008 (UTC)[reply]
I also discovered it's Unicode character THAI CHARACTER MAI EK (U+0E48). However, Alt+0E48 didn't work for me, and according to that website, using hex digits with Alt+xxxx combinations may require a registry modification. Instead, you can try typing Alt+3656 to produce it. That works for me in WordPad, but in Notepad that just makes an H. --Bavi H (talk) 03:41, 20 February 2008 (UTC)[reply]
Wow, it works. Much appreciated =) Acceptable (talk) 03:44, 20 February 2008 (UTC)[reply]

census date for Summit, California

how can i find census information or demographics for Summit, California?Boomgaylove (talk) 04:01, 20 February 2008 (UTC)[reply]

how about the zip code?Boomgaylove (talk) 05:35, 20 February 2008 (UTC)[reply]

nokia

this is my imei and i cant generate a new security code that works.its an 1110 nokia.what cud be the problem help?354572018159830