Jump to content

Wikipedia:Reference desk/Computing: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Line 282: Line 282:
Is there something else I can do apart form changing the passwords? Should I change the passwords of the sites Chrome knows the password to because I logged in on them at some time in the past and had Chrome remember the password, too? Thank you for all your help[[User:Asmrulz|Asmrulz]] ([[User talk:Asmrulz|talk]]) 20:50, 22 July 2015 (UTC)
Is there something else I can do apart form changing the passwords? Should I change the passwords of the sites Chrome knows the password to because I logged in on them at some time in the past and had Chrome remember the password, too? Thank you for all your help[[User:Asmrulz|Asmrulz]] ([[User talk:Asmrulz|talk]]) 20:50, 22 July 2015 (UTC)


: You are probably fine. It sounds like the banner was using javascript to generate a popup, which looks scary, followed by a script that directs you to the store. If your phones browser intercepts a link that begins with market:\\ it will open up the google play market to the address specified. (See [http://developer.android.com/distribute/tools/promote/linking.html here]). As long as you didn't install any applications you are almost certainly safe. I'd say you don't even need to change your passwords, but there's no harm if you want to be cautious. [[Special:Contributions/81.138.15.171|81.138.15.171]] ([[User talk:81.138.15.171|talk]]) 16:28, 23 July 2015 (UTC)
: You are probably fine. It sounds like the banner was using javascript to generate a popup, which looks scary (I've never heard of any overflow attacks that involve transmitting binary over http), followed by a script that directs you to the store. If your phones browser intercepts a link that begins with market:\\ it will open up the google play market to the address specified. (See [http://developer.android.com/distribute/tools/promote/linking.html here]). As long as you didn't install any applications you are almost certainly safe. I'd say you don't even need to change your passwords, but there's no harm if you want to be cautious. [[Special:Contributions/81.138.15.171|81.138.15.171]] ([[User talk:81.138.15.171|talk]]) 16:28, 23 July 2015 (UTC)


= July 23 =
= July 23 =

Revision as of 16:31, 23 July 2015

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


July 18

Does ESP8266 has an hardware AES engine or not?

ESP8266[1] is a popular wifi-enabled SoC. I'm trying to figure out whether it has a hardware accelerated AES engine or not.

Evidence point to YES:

1. Googling "ESP8266 AES engine" yields dozens of sites saying the affirmative, though most of them likely just copy and pasted that information from somewhere else.

2. ESP8266 contains an ARM Cortex-M4 core. Googling "Cortex-M4 aes" suggests that most manufacturers pair a hardware AES engine with their Cortex-M4 SoCs, so it's likely that ESP8266's manufacturer has done the same.

Evidence point to NO:

1. This repository [2] contains a purely software implementation of AES, would seems to suggest that there's no hardware AES engine, at least not one that's available to the user. My other car is a cadr (talk) 03:14, 18 July 2015 (UTC)[reply]

For reference, AES is the Advanced Encryption Standard. Tevildo (talk) 09:23, 18 July 2015 (UTC)[reply]
According to the manufacturer's website here, it has an "integrated AES engine". The datasheet is available in various places on the internet, but not legally - I therefore won't link to it. On page 16 of the datasheet, hardware accelerators are listed for CCMP, TKIP, WAPI, WEP and CRC - if the combination of these features counts as an implementation of AES, the answer to your question is "yes". Tevildo (talk) 09:41, 18 July 2015 (UTC)[reply]
The datasheet doesn't contain the word "AES" at all though, so that's sort of discouraging. My other car is a cadr (talk) 11:42, 18 July 2015 (UTC)[reply]
Has anyone checked the assembly language instruction set? If it contains an AES engine surely there must be an instruction or some registers associated with it. --Guy Macon (talk) 12:54, 18 July 2015 (UTC)[reply]

Question about Email - Is it a social engineering scheme?

A family member received this in an email today. He wanted to know whether it is BS.

Dear Winner. This Email is to inform you that your email account has just won you ($750,000.00 USD) from the Google Gmail Promotion, online email lottery powered by Google. A random email balloting of 80 million addresses of people that are active online, among the people that subscribed to Google Mail worldwide. We have selected 7 winners from 80 million emails, without the winner applying. We are congratulating you for being one of the lucky beneficiaries of this annual promotion. However you will have to fill and reply the Below Details To:

[email redacted]

Full name

Contact Address

Age

Telephone Number

Sex

Occupation

Country

STATE

Contact Lottery Events Manager

Submit your information to the Events Manager’s email stated below;

[name redacted]

Contact Email: [email redacted]

(Events Manager)

I said that I thought that it was a scheme to collect personal information, but that I would check. Has anyone seen this? Is this a con game?

Robert McClenon (talk) 23:25, 18 July 2015 (UTC)[reply]

Blindingly obvious scam is blindingly obvious: [3] AndyTheGrump (talk) 23:48, 18 July 2015 (UTC)[reply]
It isn't blindingly obvious on first glance, because it doesn't ask to send a small payment, which would be advance fee fraud. It did seem to be probably a scam, since, unlike in a multi-state lottery, you haven't bought a ticket. I don't think it was blindingly obvious, which is why I asked. Thank you. Robert McClenon (talk) 00:09, 19 July 2015 (UTC)[reply]
Scammers frequently don't ask for money straight off - their initial objective is to find people credulous enough to hand over personal details in return for promises of implausible sums of money. Having found their mark, they can then start spinning the line through personal communication. AndyTheGrump (talk) 00:18, 19 July 2015 (UTC)[reply]
Indeed even many of the classic "very wealthy person X died without next of kin and we want to steal their money" emails don't ask for money upfront. See e.g. [4]. Nor for that matter when they pretend you already discussed stuff, see e.g. [5]. There are some that say upfront they want you to buy something or pay for something, e.g. some here do [6], but you can also see a bunch don't really say so. There is BTW some comments from Teresa Nielsen Hayden on the language used in one of the emails there, although it's a fairly different situation for someone claiming to be from wherever in Africa or Asia or whatever wanting to steal or claim inheritance, than it is for someone claiming to be from Google or Microsoft or Apple or whatever. Nil Einne (talk) 15:24, 19 July 2015 (UTC)[reply]

On thing that's obvious, if not blindingly so, is that it's badly written. Not as badly as a lot of email scams, but look:

  • The dollar amount is in parentheses as if there was an amount in words preceding, but there isn't one.
  • Using both $ and USD. (Google is a US company, but the only time Americans are likely to use the notation USD at all is in connection with currency exchange, and it shouldn't be used together with $.)
  • Odd wording "We have selected 7 winners ... without the winner applying".
  • Capital letters in "Email the Below Details" for no reason.
  • "The below" instead of "the following".
  • "State" after "country" instead of before.
  • "STATE" in block capitals for no reason.

People running a contest don't necessarily write in perfect English, but that many errors is clearly a red flag.

By googling on a key phrase I immediately found this version of the scam/spam, which contains even more errors:

  • A space in the middle of the dollar amount.
  • Sentence fragment "Online email lottery Power by Google", also with an extra capital on Power, a missing "-ed" ending, and a missing period at the end.
  • Lucky beneficiary" instead of "lucky beneficiaries".

Either Robert inadvertently removed some errors when posting it here, or the scammer/spammer decided to work on the message after sending the first batch, which would hardly be likely if it was only sent to 7 people.

And a second and larger red flag is that you are asked to reply to an address that's not in a Google domain. A quick look with whois suggests that the owner of domain qq.com is in China. --174.88.133.35 (talk) 02:56, 19 July 2015 (UTC)[reply]

Besides the mistakes found by 174.88. ... there are even more mistakes. The sentence "A random email balloting ..." has no verb. "Below" is capitalized without any reason for it.
Add to it that I could not find any hint of this lottery in Google.
I have no doubt this is a scam. Report as spam and forget about it. --Yppieyei (talk) 04:10, 19 July 2015 (UTC)[reply]

A commonly-held theory is that many email scams are purposely unconvincing and poorly-written. Anyone too dumb to see through the obvious problems is a lot more likely to be dumb enough to wire large amounts of money to a stranger in Nigeria. It helps them to avoid wasting time on unlikely prospects. --Guy Macon (talk) 05:21, 19 July 2015 (UTC)[reply]

Well, the explanation that email scams are purposely poorly written isn't necessary. They may be poorly written because the (Chinese or Nigerian) scammer's English isn't very good. Also, the fact that qq.com is in China reduces the likelihood that reporting the scam as spam will accomplish anything. The Chinese have no motivation to stop crimes that may bring hard currency (dollars, euros, pounds) into China. Thank you. Robert McClenon (talk) 17:31, 19 July 2015 (UTC)[reply]

Here is a simple, foolproof technique for determining which emails are scams:

  • If you receive unsolicited email from someone you don't know, it is a scam. Period. No matter what it's offering, no matter what it claims you've won, no matter what problem it's claiming there is with your email or bank account, no matter what link or attachment it wants you to click on for more information, it's not real. It is fraudulent. Delete it without another thought.

Email is not reliable and not trustworthy. Anyone who really wanted to let you know you'd won money, or that there was a problem with one of your accounts, would use some other method of notifying you. —Steve Summit (talk) 00:38, 20 July 2015 (UTC)[reply]

Ehh, that's not really true. If you use online banking, banks frequently send you e-mail to notify you of things. Granted, they often don't tell you exactly what the issue is, for privacy reasons; they just say you have a message or alert or something and tell you to log into your account on their website. Now, I agree with the first part: "If you receive unsolicited email from someone you don't know, it is a scam." The key part here is "someone you don't know". Random banks you've never done business with don't send you e-mails out of the blue. --108.38.204.15 (talk) 06:04, 20 July 2015 (UTC)[reply]
And if you do get an email from your bank telling you to log in, type the bank's web address in yourself (or click on your own bookmark), rather than clicking the link in the email, just in case it's not a legitimate message. 91.208.124.2 (talk) 09:13, 20 July 2015 (UTC)[reply]
Even emails that appear to be from people you know personally can be fraudulent, as in the stranded abroad scam. AndrewWTaylor (talk) 15:47, 20 July 2015 (UTC)[reply]

July 19

Will wiping a desktop that can't start up Windows 7 solve the problem?

I've got the recovery disk, I can reach the BIOS page, the only thing that happens is the desktop can't actually start up Windows 7 in any way. I'm prepared to completely wipe the desktop, factory reset the desktop, etc... anything to get it to be a working computer again. But nothing I try seems to work. --Aabicus (talk) 22:34, 19 July 2015 (UTC)[reply]

Is the hard disk working at all? It is worth trying to wipe and reinstall if nothing else works. Graeme Bartlett (talk) 22:37, 19 July 2015 (UTC)[reply]
The original wasn't, I installed one from another computer and that's how I got it to reach this far. I think the hard disk is working, I'm just worried I might be doing it wrong. Is there a guide online for wiping a computer from the BIOS page, or from outside the OS? --Aabicus (talk) 22:41, 19 July 2015 (UTC)[reply]
Usually it's just a matter of booting from the recovery disk. Do you know how to do that? It's usually as easy as putting the disk in and turning the laptop on, if there's a prompt that says "boot from CD?" hit Y or which ever key confirms you want to boot from CD. If it doesn't boot from CD or even give you the option then there might be a BIOS setting which sets the boot order, you need to make sure CD/DVD is above the hard disk in the boot order. Vespine (talk) 00:03, 20 July 2015 (UTC)[reply]
Unfortunately I've already tried that. I'll give it one more go, making sure the CD is above the hard drive. Then I guess I've got to call it a day. --Aabicus (talk) 18:44, 22 July 2015 (UTC)[reply]

July 20

non-obvious GUI elements

I have always understood that one of the cornerstones of GUI design philosophy was that it was always supposed to be obvious -- visually obvious -- what your choices were. In his seminal book The Design of Everyday Things, Don Norman talks about the duality between "knowledge in the head" versus "knowledge in the world". The Unix command line epitomizes a system where knowledge in the head is paramount -- you can do almost anything, but you have to somehow know the name of the command to type. A GUI, on the other hand, shows you all your choices -- you don't necessarily have to know anything. You just have to find the thing to click on.

More and more, however, I'm seeing graphical applications and web pages that seem to go out of their way to hide your options. Icons are getting smaller, more generic, and less obvious; more and more you have to hover over them so that the mouseover text will tell you what they do. What's even more startling (but also increasingly common) is when there are active elements which don't even appear until they're hovered over. I've noticed this especially with Ubuntu Linux: the menu bar in most windows is blank until you hover over it, at which point the menus magically appear. Most windows don't even have scroll bars, until you hover over the right edge of the window at which point this weird little scroll tool appears. But if you're used to seeing your options, or if you haven't discovered the right spot to hover over, some/all of your options are just about as obscure as if they were Unix commands you hadn't learned the names of yet. I'm reminded of graphical video games where half of the gameplay is just discovering which elements of a scene can be manipulated to do something. (But it's not just Ubuntu that does this; I'm starting to see the same sort of thing even on the Mac.)

So my questions are:

  1. Does this pattern have a name,
  2. What are the arguments in favor of it, and
  3. How do its proponents defend against the criticism that it tends to go against the GUI philosophy of transparent approachability for beginning or casual users?

Steve Summit (talk) 00:32, 20 July 2015 (UTC)[reply]

You mention Ubuntu's HUD display on Unity. The apparent goal is to hide stuff you don't use a lot and make stuff you do use more prominent. I've read your posts here and I'm sure you just had a shudder as you remembered how much of a failure that experiment was with Microsoft back in the 90's. Ubuntu development is driven by kids who have no concept of the past, so they repeatedly repeat mistakes others have made in an attempt to be "cool." As for the hidden menu thing, that is actually separate. Apple has a long history of abusing its blindly devoted followers. The rule is form before function. Having a display with no interactivity looks very pretty. It isn't important that the followers can use it. Ubuntu, in another attempt to be cool, copies Apple in what they call a minimalist design. So, it appears to me that you are looking at the convergence of two design styles: HUD (which I feel is a very improper name for that design) and minimalist. They argue that HUD makes computers easier to use by adapting to what you do. They argue that a minimalist design removes clutter so you can focus on the content easier. I believe that history has already proven that the HUD design does not make computers easier to use. It makes them harder to use and troubleshoot. I prefer the minimalist design to cluttered messes with four or five buttons and menus for every function - do you really need a print button, a print menu item, a print shortcut, and a "print this" link all displayed at the same time? However, it is important to know what CAN be done before you hide it. History has also shown that nobody will read the manual to learn what is possible. 209.149.113.45 (talk) 12:35, 20 July 2015 (UTC)[reply]
One term I hear in design contexts is the "discoverability" of the design. Our article is more about information science and metadata concerns, but it's also applied to user interfaces - see e.g. this article here [7]. SemanticMantis (talk) 14:06, 20 July 2015 (UTC)[reply]
Other possibly relevant terms are skeuomorphism (making UI elements look like real-life objects), affordance (making UI elements look as if they do something) and flat design (what it says). AndrewWTaylor (talk) 15:40, 20 July 2015 (UTC)[reply]
  • As computers get more complicated, more and more features and functions are added, and they cannot be displayed all at once or else GUI clutter would occur. The solution is to hide things away or put them in submenus so you'll see them only when you need them. It's unintuitive and clunky but it's better than the alternative. KonveyorBelt 19:18, 20 July 2015 (UTC)[reply]
Of course, we are basing this on the premise that computers are getting more complicated. That is an opinion, not a fact. It could very well be that computers are less complicated, but users are less capable to comprehend the computer interface. 209.149.113.45 (talk) 19:27, 20 July 2015 (UTC)[reply]
On the whole, over a history of decades, computers are definitely getting more complicated. The new Mac may look easier to use than a command-line program, but it is also way more complex in terms of what it can do. KonveyorBelt 20:27, 22 July 2015 (UTC)[reply]

Why did mathematical notation converge, but programming notation diverge

For example, math has one symbol for equal, =, but programing languages came to different symbols for assignment, sometimes it's =, sometimes :=. Or different ways of marking a block of code.--Scicurious (talk) 01:26, 20 July 2015 (UTC)[reply]

In mathematics, the equals sign usually means equality, not assignment. Assignment is represented in different ways (for example, you can put an uppercase Delta over the equals sign, or you can use := like Pascal, or you can just use the equals sign and let context take care of it). So I'm not sure your premise really holds. --Trovatore (talk) 01:38, 20 July 2015 (UTC)[reply]
The basic reason is that mathematics is meant to be a single international language, but that any particular programming language is meant to be a single language. There isn't any reason why different programming languages should use the same symbols. Another reason is that, in the earlier days of programming, the language designer was limited by the keyboard. The 029 card punch, for instance, didn't have 100 symbols. Also, different languages were designed for different purposes, and with different amounts of overloading. Basically, there isn't a reason why different programming languages should use the same symbols. Robert McClenon (talk) 01:45, 20 July 2015 (UTC)[reply]
Um, Robert, you seem to be repeating the OP's premise, which I have already refuted. --Trovatore (talk) 01:46, 20 July 2015 (UTC)[reply]
What premise do you claim to have refuted? The OP is stating that in Pascal, := is assignment. In FORTRAN, = is assignment. So what are you saying has been refuted? Robert McClenon (talk) 02:15, 20 July 2015 (UTC)[reply]
The one about mathematical notation "converging". As I said, the equals sign in mathematics usually means equality, not assignment, and assignment is represented in different ways. (A complication is whether you consider "equality by definition" to be assignment — I generally think of it as assignment, but there could be arguments both ways.) --Trovatore (talk) 02:19, 20 July 2015 (UTC)[reply]
Trovatore is refuting a claim that I did not make. Robert McClenon is answering the question.
The concept of equality in math is represented by "=", and this symbol has spread across all mathematics. You don't see mathematicians around using • ¶ or § to represent equality. It does not matter whether the symbol also represents other concepts. In the same way 1/2 and 3+4 have spread as the canonical forms, instead of / 1 2 or + 3 4. In computer languages there has not been such simplification (maybe it's on its way). In programming you find different symbols to express the same concepts, which McClenon's answer above does not see as a problem. However, I see it as a source of confusion, since we don't stick with a computer languages forever. Dealing with the curious design decisions of many is quite tiresome. --Scicurious (talk) 03:07, 20 July 2015 (UTC)[reply]
Well, then you expressed yourself badly. Assignment and equality are completely different. If you had expressed your question in terms of equality (for example, == in C versus just = in Pascal) then it might have made more sense. --Trovatore (talk) 05:19, 20 July 2015 (UTC)[reply]
OK, sorry, that was more aggressive than it needed to be. Just the same, it was confusing to compare notations for assignment in programming languages with notations for equality in math, totally different things. --Trovatore (talk) 05:26, 20 July 2015 (UTC)[reply]
I agree that the differences in notation are a factor that may complicate learning another programming language. However, after learning several programming languages, a programmer learns what sorts of differences and similarities there are in programming languages. (Similarly, if one has learned multiple human languages, one learns what features they share and how they differ.) As to different ways of marking blocks of code, some languages, like FORTRAN, don't have blocks of code in the C sense. Robert McClenon (talk) 03:33, 20 July 2015 (UTC)[reply]
I think our OP assumes mathematical notation is "converged" because our OP has not been reading a wide variety of published mathematical literature. There are immense differences in mathematical notation conventions: even simple expressions like addition can be notated in totally different fashions. Sometimes, different notation represents some detail or nuance; other times, it is a purely arbitrary editorial convention.
Here's a great book: Scheinerman's Mathematical Notation. It focuses on the notation you will probably see in undergraduate mathematics for science and engineering. As the author notes, it is impossible to completely describe all mathematical notation: there are just too many variations.
Nimur (talk) 09:53, 20 July 2015 (UTC)[reply]
Another reason, that I did not see mentioned so far, is parsing. Humans parse mathematical expressions. As has been demonstrated repeatedly, humans don't follow logical or even sensible steps when parsing things. Some start at the end. Some start at the beginning. Some break things up into chunks. Some drown in anything more complex than three items. Overall, math has been designed for humans to learn and understand. Programming languages are parsed by computers. They follow a very discrete algorithm. If a new character is required to mean something, that new character must not break existing rules that the parser has put in place. So, if = already has a meaning to the computer parser, it will require rewriting the parser or using a new character, such as :=. That is how you end up with == and ===. Many times, the goal is to make something new for the parser while easy for programmers to type. 209.149.113.45 (talk) 12:16, 20 July 2015 (UTC)[reply]

How to make website

Thus far, all the websites I've created have been either developed through wordpress/drupal software, or downloaded whole off the creator's site and posted to my server. Trying to create a new website now, different to what currently exists, though largely based off chatroom style sites, I find myself unable to do either of these. Instead, I'd like to take this opportunity to learn how to actually work on making a new website for myself, rather than always relying on others. Trouble is, the only language I have any real familiarity with is C, which I suspect is not appropriate here, but I'm not sure what is, or where would be best to go to learn to use it effectively. Any thoughts?

86.24.139.55 (talk) 17:02, 20 July 2015 (UTC)[reply]

There is a lot of information on the web about making websites. If you want to make one "from scratch", you either need to learn HTML or use a HTML editor. WegianWarrior (talk) 17:14, 20 July 2015 (UTC)[reply]
HTML, that's the one, couldn't remember what it was called. I had a search online but only found a couple of halfway decent guides to the sort of site I'm aiming for, and both had lots of comments posted saying the instructions given didn't work. 86.24.139.55 (talk) 17:17, 20 July 2015 (UTC)[reply]
If you like this type of chat, you could create a wiki. StuRat (talk) 17:33, 20 July 2015 (UTC)[reply]
For modern websites, learn HTML, CSS, and JavaScript. Then, if you want to get more complex with server-side programming, pick one of the common server-side languages, such as PHP or Ruby. If you do that, you will likely want a database. MySQL is a very common choice. Finally, you will likely realize that you need professional looking graphics. Most people can't afford Photoshop and refuse to download a virus-laden "Free" copy of it. Gimp is a free alternative that, in my experience, is more difficult to learn than everything else combined. 209.149.113.45 (talk) 18:32, 20 July 2015 (UTC)[reply]
I'd been reading over the articles for CSS, PHP and MySQL, from what I've picked up before I thought those were involved somehow, but I'm still not clear on exactly what each does or how they relate to each other. Looks like I've got a lot of work ahead of me. 86.24.139.55 (talk) 19:07, 20 July 2015 (UTC)[reply]
HTML contains the content. CSS describes how to display the content. JavaScript gives extra functionality to the interface. PHP allows you to create dynamic content. MySQL is a simple data storage application to store and retrieve content. 209.149.113.45 (talk) 19:23, 20 July 2015 (UTC)[reply]
PHP is a terrible programming language and I would advise you to avoid it whenever possible. MySQL isn't too hot either. I will concede that if you don't have the luxury of choosing your job, you generally don't have a lot of choice over what tools you're forced to use, and there is unfortunately a lot of software using one or the other, but you sound like you're teaching yourself, in which case I exhort you to learn some decent tools first. For one thing, it'll be easier, because you won't have to wrestle with all the brokenness of PHP and MySQL. The first linked article points you towards how to get started with Web programming in Python, and also suggests Ruby and Perl, which together with PHP are the mainstream "Web languages" (although Perl's popularity has waned). Of course you can write a Web backend in any language, including C, or for that matter COBOL, though I wouldn't advise it. --108.38.204.15 (talk) 07:39, 21 July 2015 (UTC)[reply]
It is important to note that it is not possible for a programming language to be "broken" or "terrible". It may have bugs (which are actually rare in the language and usually found in the interpreter or compiler). It may be a poor choice for a specific task while still perfectly functional for another task. Programmers are far too often broken and terrible and make very stupid choices - and then blame those choices on the programming language. "Why did PHP and MySQL allow me to make my website vulnerable to SQL injection!? It shouldn't allow me to idiotically assume some stranger isn't sending me bad data! It shouldn't allow me to run a query without validating the data! I shouldn't have to learn to program before writing a program! PHP and MySQL are terrible and broken! Boo hoo! Boo hoo!" Therefore, whenever you see someone claim that a programming language is terrible, it is very likely that the programmer is the problem. 209.149.113.45 (talk) 13:47, 21 July 2015 (UTC)[reply]
Of course it is possible for a programming language to be "broken" or "terrible". Human beings are just as capable of messing up the design and implementation of programming languages as they are of anything else. AndyTheGrump (talk) 05:02, 22 July 2015 (UTC)[reply]

My PC is spontaneously rebooting

Windows 7, 32 bit.

Is there a log I can check that will tell me why ? It's intermittent, but doesn't seem to be due to overheating, and I checked the power cord to make sure it wasn't loose. StuRat (talk) 17:39, 20 July 2015 (UTC)[reply]

You can check the event viewer like so [8]. You can disable automatic restarting like so [9]. This user had a similar problem [10]. SemanticMantis (talk) 19:12, 20 July 2015 (UTC)[reply]
Yes, you should disable automatic rebooting to see the actual BSoD. Ruslik_Zero 19:15, 20 July 2015 (UTC)[reply]
If you cant find the reason in software, check hardware issues like dried out thermal grease, dust on heat sinks, damaged fans or failed bearings of the fan motors. Take a closer look on capacitors of power supply and mainboard. Careful, the psu keeps hazardous voltage when power plug is removed. To discharge those capacitors, turn the computer on. Then you see the BIOS or UEFI or see the fans beginn blowing, remove the power plug from the wall before the the operating system is booting up. Without turning off and cutting the power grid from computer the capacitors become discharged. --Hans Haase (有问题吗) 20:06, 20 July 2015 (UTC)[reply]
Yes, I may have been premature in thinking it wasn't overheating. I took off the cover, pointed a big box fan at it on full blast, and it stopped rebooting. StuRat (talk) 03:34, 21 July 2015 (UTC)[reply]
In case you don't know, this probably means you need to clean the dust off the cooling fan inside the computer. Looie496 (talk) 13:06, 22 July 2015 (UTC)[reply]
Yep, I will give that a try. StuRat (talk) 13:38, 22 July 2015 (UTC)[reply]
The computer stopped booting up when covering a fan? It can not overheat within a minute from cold. Something else is wrong. --Hans Haase (有问题吗) 09:09, 23 July 2015 (UTC)[reply]

July 21

SOFTWARE FOR STAMP COLLECTING

Is there any free software which can manage stamp collection? Something like "my family tree'. Thank you.175.157.40.27 (talk) 03:22, 21 July 2015 (UTC)[reply]

I don't understand the comparison. Do stamps have complex relationships, like 3rd step-cousin, twice removed ? Also, do you mean to scan the stamps and organize images of them online, with an index number you can use to find the actual stamps ? StuRat (talk) 03:32, 21 July 2015 (UTC)[reply]
Have you taken a look at what Google has to offer. You could probably find something that suits your requirements. CambridgeBayWeather, Uqaqtuq (talk), Sunasuttuq 11:26, 21 July 2015 (UTC)[reply]

Youtube question

Sometimes youtube videos play well on my system. Others keep pausing as if there is not enough bandwidth.

Is there a way to play the audio from youtube without having the video signal transmitted? For much of the stuff that interests me, I only want to hear the sound.

Thanks, CBHA (talk) 03:33, 21 July 2015 (UTC)[reply]

Don't know, but you can set it to the minimum screen resolution, which will dramatically reduce the bandwidth needed. StuRat (talk) 03:35, 21 July 2015 (UTC)[reply]
reducing the resolution typically reduces the audio quality too which is annoying. There are several apps and websites which let you listen to the audio only of youtube videos. I've used a website that lets you download youtube videos as MP3, that way it will never "pause" even if you completely lose your internet connection. Just google youtube mp3 converter, I think there are several websites when you just put the youtube video address in and it downloads a mp3. Vespine (talk) 23:22, 21 July 2015 (UTC)[reply]

ICT

Does ICT includes all the current development in internet? MOOCS, OCW are they all under ICT???

Learnerktm 16:31, 21 July 2015 (UTC)[reply]

Assuming that you are referring to Information and communications technology, the answer is "it depends." Some people use the acronym ICT to refer to any means of storing, moving, or displaying information. Therefore, the entire Internet would fall under that massive umbrella - as would something like a magazine. Others use it only to cover communications. As such, the communications technology used for the Internet would be covered, but display and storage technologies would not. 209.149.113.45 (talk) 17:03, 21 July 2015 (UTC)[reply]

Gmail printing acting strangely

Hello.

Normally, when you get an attachment in an email from Gmail, like a PDF, you can click on the box representing it. This will bring up a view of the PDF and gray out the background so that other stuff isnt distracting you from the popup layer showing the PDF. Then, there is a little print icon directly in the middle at the top which auto-prints this PDF.

Somehow, my colleague managed to goof this feature up now. The popup still shows properly, but when you hit print, instead of printing, it loads some strange url in another tab and attempts to download something like:

ACFrOgA9-kgnF73NDVUOBjbI2Jpnyt02tkAakjoI1ZyPTZfZnjcPFh7YpAnHarap0mth8C8uop2NlfVkLbVDZyEMDKfBsAKFn8guciwyJpwjdqO50e38jNkWTrrq6wE=.pdf

I have tried resetting the default printer in Mozilla Firefox by resetting some property called "Printer_Print" or something like this with no results. My colleague claims he must have clicked something that asked him if he wanted to print with some other application, or something like this.

How can i restore the default action of printing in gmail? Thanks!

216.173.144.188 (talk) 16:32, 21 July 2015 (UTC)[reply]


To add more info, the NORMAL place the print icon goes seems to be in a new tab as well, and involves https://doc-04-8o-apps-viewer.googleusercontent.com/viewer/secure/pdf ...

I think the goofed up gmail account is going somewhere similar, but instead of popping up the print dialogue, it downloads a pdf. I'm starting to wonder if it is doing everything correctly, except printing to a pdf writer style fake-printer. However, if this was the case, id still expect the dialog to show up asking to confirm printer selection, # of pages, etc. This is not happening.

216.173.144.188 (talk) 16:45, 21 July 2015 (UTC)[reply]

Yes, it does sound like it's set to print directly to a file rather than bring up the printer dialog. I don't know where to change that, unfortunately. But, presumably you could then open the PDF file it generates and print from there, as a workaround, until you fix the problem. Another workaround is to use the Print Screen button, then paste into MS Paint, etc., and print from there. This is limited to one screen's worth at a time, but does allow you to cut out any portion of the page you don't want to print. StuRat (talk) 13:32, 22 July 2015 (UTC)[reply]

Windows API (Shell32.dll)

I'm using SHBrowseForFolder from Shell32.dll to display a directory selection box, setting the initial directory using the BFFM_SETSELECTION message in the callback, as described on the MSDN page. I'm setting the BIF_USENEWUI flag (only). This is working OK for "normal" directories (such as C:\MyData\MyDataDirectory), but not working for directories in "My Documents". The actual name of such a directory is something like C:\Users\Tevildo\Documents\Temp, but using this in the BFFM_SETSELECTION message doesn't work. If I manually browse to the directory, I have to go C: > Users > Tevildo > My Documents > Temp instead. The returned value of the directory name is correct (with "Documents" instead of "My Documents"). Is there anything I can do to fix this? In particular, do I need to set some additional flags? Tevildo (talk) 19:10, 21 July 2015 (UTC)[reply]

Someone reported the same thing here as a bug, and while I don't see any resolution there, it does at least mention a couple of workarounds that you might try, namely removing BIF_NEWDIALOGSTYLE (leaving only BIF_EDITBOX in your case since BIF_USENEWUI combines those flags) or not specifying a root. -- BenRG (talk) 04:30, 22 July 2015 (UTC)[reply]
Thanks for the link. Getting rid of the root directory has fixed the problem (although it's not an ideal solution, of course). Tevildo (talk) 10:48, 22 July 2015 (UTC)[reply]

July 22

android vulnerabilities

I was surfing the web on my phone. All entirely respectable sites that I've read for a long time. But one site (or a banner ad on it) redirected me to somewhere, and that "somewhere" showed a message box with unlegible (binary) text in it, and then a page opened where it said, in broken German, that my phone was infected and that I needed to install some app from google play (needless to say, I didn't)
Should I be concerned? The random text in the first message box in particular, looked like it could be an attempt to stage a stack overflow attack or trip the browser in some other way (why else call alert() with a binary string.)
Is there something else I can do apart form changing the passwords? Should I change the passwords of the sites Chrome knows the password to because I logged in on them at some time in the past and had Chrome remember the password, too? Thank you for all your helpAsmrulz (talk) 20:50, 22 July 2015 (UTC)[reply]

You are probably fine. It sounds like the banner was using javascript to generate a popup, which looks scary (I've never heard of any overflow attacks that involve transmitting binary over http), followed by a script that directs you to the store. If your phones browser intercepts a link that begins with market:\\ it will open up the google play market to the address specified. (See here). As long as you didn't install any applications you are almost certainly safe. I'd say you don't even need to change your passwords, but there's no harm if you want to be cautious. 81.138.15.171 (talk) 16:28, 23 July 2015 (UTC)[reply]

July 23

C++ pointer question

Let's say I have a local variable and a pointer. I assign the address of the the variable to it. When the variable is removed from the stack, does the pointer become a stray pointer? Thanks Kayau (talk · contribs) 06:57, 23 July 2015 (UTC)[reply]

Yes, the address of a local variable should not be returned, because its lifetime will end when the function returns. Notice that you *may* be able to use the address, as it is still on the stack and the program can access the stack at any time, but you should *not* rely on it, as it is not guaranteed. Look at the following example:
#include <iostream>

int *f1(void)
{
	int localvar;
	int *localptr;
	localvar = 5;

	localptr = &localvar;

	return localptr;

}

void f2(void)
{
	int a = 20;
	int b = 30;
	int d = 50;
	/* dummy function, but calling it will rewrite the stack */

}

int
main(int argc, char *argv[])
{
	int *mainptr;

	mainptr = f1();

	/* will print 5 */
	std::cout << *mainptr << std::endl; /* the lifetime of the local vars have ended, but they are still valid
				     since the stack doesn't changed, so you should not rely on them */

	f2(); /* this will rewrite the stack */

	/* now let's try printing the number one more time */
	std::cout << *mainptr << std::endl; /* will not print 5, but a junk value */
	return 0;
}

The output is as follows on my system:

> ./a.out 
5
20

First paint bucket tool?

What was the first consumer available graphics editor to have a "paint bucket" fill tool? We have an article Flood fill which doesn't discuss early implementations. I know MacPaint had it in 1984. Is there an earlier example? Staecker (talk) 14:18, 23 July 2015 (UTC)[reply]

This is going to be tricky... the algorithm existed since - well, it probably preceded the digital computer! Flood fill is, at its core, just a recursive search with path marking. One of the most obvious applications of this algorithm is to mark a two-dimensional array of data that represents a raster graphic. Raster graphics have existed for a long time, too... they also preceded the interactive graphical user interface. As you dive deeper into the history of computer application software, graphics editing looks a lot more like software programming; there isn't a hard "line" where suddenly consumers had access to point-and-click tools. It was a gradual transition.
You can read early history of computer graphics. Sketchpad (1963) constitutes what I would call "Application Software"; but it was designed in the late 1950s for the TX-2, and when you look at the details of machines from that era, it's not straightforward to distinguish "applications" from "system software" or even from "hardware." The author, Ivan Sutherland, implemented a recursive function (!) infrastructure for copying picture elements; but this recursion did not appear to be used for raster graphics. (Well, it's sort of on the boundary: the computer used a sparse matrix to represent a framebuffer, so it's almost modern and incredibly efficient!) The Sketchpad software even had a "graphical user interface." This infrastructure could have permitted the user (programmer!) to program a "flood fill," but that feature is not one that is described in the author's thesis. The distinction between "software user" and "software programmer" is a more recent invention than these machines! So I think it's fair to say that a user of Sketchpad could have used "flood fill."
Almost all of the early work on CAD involved graphical user interfaces: it was, of course, originally meant to stand for computer aided drafting. I expect if you deep-dive this history, you'll find a steady progression towards greater usability.
Here's Filling algorithms for raster graphics, presented by Theo Pavlidis at SIGGRAPH 1978. Apparently "flood fill" was novel enough for SIGGRAPH... but then again, the Porter-Duff algorithm was amazingly still considered novel in 1984... yes, things can be in front of other things.
Nimur (talk) 15:47, 23 July 2015 (UTC)[reply]