Jump to content

Wikipedia:Reference desk/Computing: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
→‎On what systems operating systems are made?: If you are talking about testing a system for unwanted behavior during an unexpected shutdown, the normal method is...
Tags: Mobile edit Mobile web edit
Line 194: Line 194:


:If you are talking about testing a system for unwanted behavior during an unexpected shutdown, the normal method is to hook up a [[relay]] that cuts the power, then use a [[function generator]] to power the system up then cut the power 0.1 seconds later, followed by doing the same with a delay of 0.2 seconds, 0.3 seconds, and so on. This is a standard test I do whenever I design anything containing a microprocessor or microcontroller. --02:57, 30 May 2020 (UTC)
:If you are talking about testing a system for unwanted behavior during an unexpected shutdown, the normal method is to hook up a [[relay]] that cuts the power, then use a [[function generator]] to power the system up then cut the power 0.1 seconds later, followed by doing the same with a delay of 0.2 seconds, 0.3 seconds, and so on. This is a standard test I do whenever I design anything containing a microprocessor or microcontroller. --02:57, 30 May 2020 (UTC)

I am asking what motherboard,CPU, RAM, HDD, Desktop do you use to test OS?

Revision as of 03:07, 30 May 2020

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


May 23

Unblocked images in Outlook

In Outlook mobile app, I unblocked an image within a spam mail by accident, as I wanted to click the i for Info instead. Is my device at risk? Splićanin (talk) 01:23, 23 May 2020 (UTC)[reply]

well, they know at least your OS (everything in the "user-agent" string) and your IP now. Technically, if they're particularly determined and vile, there's nothing preventing them from launching an all-out attack on that IP (perhaps even an automated one and tailored to your OS.) I personally wouldn't worry (moreso as this isn't exclusive to blocked images in emails - you reveal those things to a server by requesting any file or page whatsoever on the internet), but to be extra sure I would get a new dynamic IP (by resetting the DSL connection on my router, or just power-cycling it) if I was on wi-fi, or turning off, then on the mobile data connection, if I was on the mobile network (or just power-cycle the device too, for good measure.) Aecho6Ee (talk) 03:23, 23 May 2020 (UTC)[reply]
the purpose, from what I understand, of blocking images by default in the first place, was to keep spammers from doing analytics (at the very least, checking if the email account is active) by using tracking pixels and to frustrate their efforts of getting past spam filters by sending image-only emails. Aecho6Ee (talk) 03:27, 23 May 2020 (UTC)[reply]
  • @Splićanin: Basically, no. To put it in precise terms, it doesn’t give the sender any more information than clicking on a link in the e-mail, which you have surely done at some point. The biggest risk is that the spammer gets your e-mail address (they do this by inserting different images/links in the messages sent to different e-mail addresses, so when you access the image/link, they can look up which e-mail address they sent it to). This is no risk to your device at all.
Sure, they could launch some kind of attack on your IP. But you risk that anyway, just by connecting to the Internet (I’m sure I’ve seen a better reference, but I can’t remember where now). It’s not really something to worry about, for most users. Brianjd (talk) 14:06, 28 May 2020 (UTC)[reply]

This was very helpful. Thanks a lot. It's a mobile phone, no idea how to change the IP on it. Talk me through, please? Splićanin (talk) 07:38, 23 May 2020 (UTC)[reply]

I just tried it on my mobile. The IP (the one the phone has on the mobile data network) doesn't change when I turn mobile data off and on again nor when I power-cycle the phone. Your best bet therefore is to just wait... (it likely already changed - several times, too - since you posted the Q - the "turnover" seems to be much faster on the mobile network than residential broadband...) Aecho6Ee (talk) 17:38, 23 May 2020 (UTC)[reply]
This will depend completely on your mobile providers. For example those I've used in NZ will change IP when you disconnect from the network. This includes restarting the phone, and going into airplane mode. Turning off mobile data on the phones I've used, I suspect it just disables access internally on the phone. Yet I'm fairly sure there are some mobile providers who provide very sticky IPs especially for IPv6, just like some fixed internet providers do. Nil Einne (talk) 10:30, 24 May 2020 (UTC)[reply]
Sorry I meant to say "turning off mobile data doesn't seem to change the IP (at least in the short term) on the phones I've used". Nil Einne (talk) 13:36, 29 May 2020 (UTC)[reply]

RAID vs ZFS

Which is good for data corruption protection ? Ram nareshji (talk) 05:13, 23 May 2020 (UTC)[reply]

The design purpose of these technologies might be the same, but they are different to the point that you can implement both of them, none of them or either one. Raid is strictly a redundancy technology, and works by virtualization, it presents two phyiscal drives as one to the operating system. ZFS is a file system and offers many more features other than redundancy, mostly about providing visibility of hardware failures, this is in stark contrast to the RAID approach where disk failures might be invisible.
Raid would be a good choice if you just want things to work, you don't mind spending money on hardware, and you want to save time. ZFS would be good if you want things to work efficiently, you want to understand your system, and you work at a scale and domain where looking into low level storage bugs is a worthy endeavor. --TZubiri (talk) 07:17, 23 May 2020 (UTC)[reply]

So Raid mirror the data and ZFS copy the data ? Ram nareshji (talk) 09:47, 23 May 2020 (UTC)[reply]

Raid mirrors the data, yes. But ZFS is a file system which, among other things, mirrors data, copies data and identifies physical failures. --TZubiri (talk) 10:07, 23 May 2020 (UTC)[reply]

If original data is unreadable so Mirror data becomes unreadable also? Ram nareshji (talk) 16:27, 23 May 2020 (UTC)[reply]

If the corruption came from a bad disk write then yes, but if it came from a physical disk failure, then no. --TZubiri (talk) 22:23, 24 May 2020 (UTC)[reply]

May 24

Making a GitHub repository public

Following up on my GitHub project, I recently made my GitHub repositories public after transferring the original projects to them. According to what I have learned, this allows everyone to download the code and try it out for themselves, but not actually modify the repositories.

What surprised me was that GitHub warned me that making a repository public is a potentially destructive action. I would have thought otherwise, making a public repository private would be a destructive action. What is the logic behind this? JIP | Talk 00:38, 24 May 2020 (UTC)[reply]

Well, their use of "destructive" may be a bit of hyperbole, but the warning messages does list the dangers:
  • The code will be visible to everyone who can visit https://github.com
  • Anyone can fork your repository.
  • Your changes will be published as activity.
Also, people can modify their forks of your code and submit them to you as pull requests. If any of these things happen, they may be undesirable to you but they will not damage or even modify your repository. CodeTalker (talk) 16:09, 24 May 2020 (UTC)[reply]
It makes sense if you think of “destructive” as meaning “irreversible”. Sure, you can make the respository private again or delete it, but you can’t do anything about those who saw/copied your repository before you did so. Brianjd (talk) 13:58, 28 May 2020 (UTC)[reply]

SD card problem

A 128 gigabyte SD card I bought in Austria last July has recently stopped working. The card can be read just OK both on my computer and on my camera, but nothing ever gets written to it. The camera says "card fault", but the computer (using Fedora Linux) doesn't report any problem. All the files appear to transfer there all OK until I umount the card and mount it again, at which point I find out that nothing was written to the card in the first place. Is there anything I can do about this? Should I send the card to service? I mean, I can read all the pictures I have already taken just OK, but now I have 128 gigabytes of card space I can't reuse. JIP | Talk 00:45, 24 May 2020 (UTC)[reply]

No, other than return or exchange it if it's still under warranty. This is one of the most common failure modes for flash memory. It's unusual for it to happen so quickly, assuming you bought it new, but not impossible. The write circuitry could have developed a fault, or it was used for an unusually-high number of writes—flash memory has a finite number of writes.
Note that what's happening on your PC is the written data is just being stored to the write cache in RAM. Filesystems generally do this by default so the process doing the write isn't frozen waiting for the write syscall to return from the kernel. The kernel then gradually writes to the actual media in the background, unless the cache gets full. Also, of course, when a filesystem is unmounted, any pending writes in cache have to be fulfilled. You could try looking at the dmesg log for messages about failed writes to the card, but depending on settings I don't know if those are logged by default. If you really care you'll have to look into the Linux SD card driver settings. --47.146.63.87 (talk) 01:43, 24 May 2020 (UTC)[reply]
Some "counterfeit" flash cards have a lot less flash memory than they claim, so they work at first, but at some point when they run out of space they return errors. Maybe you have one of those? Dicklyon (talk) 05:07, 24 May 2020 (UTC)[reply]
I recommend getting one of these for $25 USD: SanDisk 128GB High Endurance Micro SDXC Card with SD Card adapter]. At Class 10 / U3 / V30 it is very fast, and Sandisk makes high-quality cards. You can get it in the UK, EUI, AU, etc. by searching for "SDSQQNR-128G-GN6IA". --Guy Macon (talk) 16:23, 24 May 2020 (UTC)[reply]
The card is definitely not counterfeit. I bought it from an electronics store at de:Messepark in Dornbirn, not from some shady street or online vendor. It worked completely fine for almost a year, to full capacity, until it suddenly stopped accepting any writes. JIP | Talk 23:03, 24 May 2020 (UTC)[reply]
It's disappointing that a high capacity card should only fail after a year, but it's not unexpected. I generally regard SDcards and USB sticks as I used to regard floppy disks. Cheaply manufactured, a ubiquitous commodity, and nobody's over-worried much about quality. It's temporary storage. It fails, toss it in the can, buy another 10-pak.
You seem to be using it in the right application, to transfer files taken on your camera to your computer for processing. If I were you, I'd have a box of 10 or so that I can fill up and delay upload, and so that when a few go bad, there's more where that came from.
It might be worth questioning your capacity decision. If you always buy the maximum size one, you'll have more reliability problems and more financial liability when they fail. I haven't purchased one in a while, 128GB was on the large size last time I checked. What maximum size can your camera read? Elizium23 (talk) 06:37, 27 May 2020 (UTC)[reply]

1. Try reformatting the card in a computer, not in the camera. Sometimes that works better. 2. Try for a warranty replacement (they can't be "serviced"). 3. Any card you buy on amazon is likely to be fake because of commingled inventory, so better buy from an authorized direct seller. I like bhphoto.com. 2601:648:8202:96B0:3567:50D5:8BFF:4588 (talk) 04:03, 25 May 2020 (UTC)[reply]

Good point, if it's not too much trouble you might as well try the official SD card formatting program from the SD Card Association: [1]. It can't hurt; of course this will nuke existing data on the card. Complication: they only offer it for Windows and Mac. I have no idea if it works under WINE. Can always borrow a Windows PC for a moment if you have the opportunity, though it does need a user account with administrator access. --47.146.63.87 (talk) 20:55, 26 May 2020 (UTC)[reply]

Compatibility between 3.5mm connectors

I have a laptop with a 3.5mm jack that can take headphones with a microphone, and input the sound. I have a recorder with a 3.5mm stereo line out and a 3.5mm stereo headphone out. Can I connect these to get sound from the recorder to the laptop? (My guess is that they are not compatible.) Bubba73 You talkin' to me? 04:49, 24 May 2020 (UTC)[reply]

The stereo output TRS jack/plug cannot correct directly to the TRRS output/input jack, but can be through an adapter such as this one. You may need to reduce the output volume level to be compatible with the microphone input level. Dicklyon (talk) 05:05, 24 May 2020 (UTC)[reply]
Thanks, I ordered one. Bubba73 You talkin' to me? 05:49, 24 May 2020 (UTC)[reply]
Which would be the best output to use, the line level or the headphone level? Bubba73 You talkin' to me? 05:51, 24 May 2020 (UTC)[reply]
First, make sure the line output is controlled by the volume control. On some devices it only controls the headphone level. Then, using the line out (first choice) or headphone out (second choice if the line out doesn't have volume control), start with the output volume very low, then slowly raise it while making test recordings. Stop if you hear distortion. Use the lowest volume that sounds good.
If nothing works without distortion, you may need to search Amazon for "Line to Microphone Attenuator Cable" or "Line to Microphone Attenuation Cable" --Guy Macon (talk) 21:26, 24 May 2020 (UTC)[reply]
Those are about $30! I doubt that the volume control works on the line output. However, I am just passing through the recorder to get a mike input into the laptop, so I can control the volume (of the mike) live. Bubba73 You talkin' to me? 02:52, 25 May 2020 (UTC)[reply]
The problem is that a line output typically has a voltage ranging from 0.5 to 2 volts while a microphone input is expecting roughly 5 to 50 millivolts.[2][3][4][5] It would be a very unusual microphone input that can handle a signal ten to a hundred times higher than a microphone puts out.
Try searching for "Inline microphone Volume Control". --Guy Macon (talk) 04:13, 25 May 2020 (UTC)[reply]
What is the typical voltage for the headphone output? Bubba73 You talkin' to me? 04:42, 25 May 2020 (UTC)[reply]
  • The output specs are:
    • headphone: max 40mW
    • line out: -14dBV.

Does this help decide which to use to plug into the mike input on the laptop? Bubba73 You talkin' to me? 06:03, 25 May 2020 (UTC)[reply]

There really isn't a standard voltage for headphone out, because headphone outputs and other speaker outputs are designed to supply a certain power (milliwatts) and not a certain voltage. I have seen headphone outputs that go as high as plus and minus fifteen volts (30 volts peak-to-peak) with no load (a microphone input acts like no load), but it is more common to see a peak-to-peak voltage equal to the output voltage of the battery or batteries. But you wouldn't set it at max volume, so the real question is how many volts it puts out at the lowest non-zero volume setting. Just try it. You won't damage anything if you stop raising the volume when you hear distortion. Hooking a headphone output into a microphone input is so easy to do that nobody designs mic inputs that can't survive it -- but the signal may be very distorted. --Guy Macon (talk) 06:12, 25 May 2020 (UTC)[reply]
I'll try it when the part I ordered comes in. Bubba73 You talkin' to me? 06:29, 25 May 2020 (UTC)[reply]

Manual install of a Linux application

Is there a way to install a program at a linux kernel os without package managment program or having the source code of the program you want to install at your hands?2804:7F2:591:ADF2:456C:D9BC:B019:47F0 (talk) 17:07, 24 May 2020 (UTC)[reply]

Yes, you can do that. It is not uncommon for some binaries to be distributed via a tar file which you then unpack and run. RudolfRed (talk) 19:58, 24 May 2020 (UTC)[reply]
Yes, there are plenty of ways to do what you propose, but when you make an end-run around the package management software, you often get bitten by it later. Can we ask why you want to do what you are trying to do? Elizium23 (talk) 20:01, 24 May 2020 (UTC)[reply]
Echoing the other replies, yes, but there's often not a great reason to. There's nothing magical about an "install"; it's just a process of unpacking any compressed files, copying files, and often related tasks like adding shortcuts to a desktop menu. The point of a package manager is it automates all this, keeps track of files, and lets you easily uninstall and update programs. If a program isn't available in whatever package manager you're using, you should check whether there are third-party repositories that have it available. Failing that you can write your own install script for the program or request that someone else do it. If you just want to learn more about how all this stuff works, you should probably start by reading some documentation for your package manager and distro, and then maybe start reading up on things like GNU autotools, which is what a lot of FLOSS software uses for its install process. Linux From Scratch is a great learning experience if you're willing to invest some time in it. Do it in a virtual machine for convenience. --47.146.63.87 (talk) 22:18, 24 May 2020 (UTC)[reply]
I will tell you why I personally will refuse to install software that is not prepackaged for my Linux distribution. Because packaged software is vetted (we hope) and receives security updates into the future. There is not really a virus scanner on Linux, per se, but we guard against malware in other ways. One of those ways is by using the package manager. The developers in charge of our OS who package software have a solemn duty to protect us from security vulnerabilities, and the system works pretty well. If they release a package, we can rest assured it's been under scrutiny a bit, and any further scrutiny that results in them discovering a problem, they release an updated package and we can take immediate advantage of that by installing updates.
We see this model with mobile devices and the Apple/Google Play store. These vendors have a very good reason to prevent devices from "sideloading" apps from unauthorized sites. Apple and Google expend a lot of energy vetting the apps that go into their stores, so that they adhere to standards and are verified to be secure and malware-free.
This is a facility that we shouldn't sidestep lightly. If you have a personal system and you have some software you absolutely need for work or something and you just want to slap it on there, then OK. But I would generally question the motives and goals of someone who is trying to install "mystery software" without a package in hand. Just my $0.02 as a systems admin of over 30 years. Elizium23 (talk) 06:26, 25 May 2020 (UTC)[reply]
Also, even if we wanted to help you, the answers for "how to do it" are as varied as the types of software out there. In general, you need to copy the right files to the right system locations and set the correct permissions. Those variables are determined by what the software is and what it does and who needs to run it, etc. So we cannot furnish help in a generic sense here unless you wanted to reveal the software and its structure. Elizium23 (talk) 06:31, 25 May 2020 (UTC)[reply]
"In general, you need to copy the right files to the right system locations." Cant you have an installer and stuff like that like in windows, that you can download from a site, get from torrent, get from peer 2 peer program, get from a pendrive/cd/dvd/floppies/external hd, receive thought e-mail or get from network folder....?2804:7F2:591:ADF2:34F5:F91D:932C:1ADD (talk) 00:13, 26 May 2020 (UTC)[reply]
Yes, that is what package managers are for - they usually use .deb or .rpm files. Ed6767 (talk) 00:15, 26 May 2020 (UTC)[reply]
There are self-contained installer files and their file extension is usually ".bin". They typically work by having a shell script at the top and a tar.gz file in the rest of the file. So it is a self-extracting program. The developer may only take advantage of the self-extracting nature and give you the files, or he may build installer logic into the script file. However, note well that this is also bypassing package management, and leaves your system in a less-than-ideal state. But it is certainly done all the time. I used it for my printer drivers when the repository's version was broken. Elizium23 (talk) 06:23, 27 May 2020 (UTC)[reply]

May 27

Git question

If I have understood this right, Git works unlike traditional client-server version control system in that each repository that is cloned from another is an exact copy of the original repository and works just the same. So this means if I were to clone the main repository of Linux, I would have a repository that could just as well work as the main repository of Linux, provided that (1) I were as famous as Linus Torvalds, and (2) other people would have Internet access to my physical computer (neither of which is ever going to happen, but that is beside the point)? JIP | Talk 00:04, 27 May 2020 (UTC)[reply]

Yes that's pretty much the idea, see distributed version control. If you want to give other people to a self-hosted git repo, put it on a virtual private server. Lots of people these days instead use Git hosting services like Microsoft Github or Gitlab. I find Github in particular rather distasteful, but that's just me. 2601:648:8202:96B0:3567:50D5:8BFF:4588 (talk) 22:10, 27 May 2020 (UTC)[reply]
Note that Git data is hashed (and, I think optionally signed), so in fact all clones of the Linux repository are useful for verification purposes, even if the people who made the clones are not famous and don’t run servers. Brianjd (talk) 13:54, 28 May 2020 (UTC)[reply]

How to IMPORT this blocked attachments from gmail to another gmail?

By enabling POP feature, I successfully imported almost all gmail inbox into new gmail inbox except 391 mails with

((has:attachment OR has:drive).dll)

Due to gmail blocked this .dll attachments, how to import leftover " .dll " files also to my new gmail inbox?

I learned that enabling IMAP will help me. But I am new to IMAP thing in gmail. Ram nareshji (talk) 06:12, 27 May 2020 (UTC)[reply]

Why on earth are using POP for this? I strongly suggest you use IMAP. I don't think Gmail supports accessing another account directly internally via IMAP but you probably don't want that anyway since you don't know what Gmail is doing internally. (I think Gsuite may provide tools.) Instead use a third party client like Thunderbird or even a simpler thing primarily designed for moving emails between accounts via IMAP. Nil Einne (talk) 08:26, 27 May 2020 (UTC)[reply]

User:Nil Einne I installed thunderbird on my desktop, now what should I do? Explain me in step by step since it is important email messages in it.Ram nareshji (talk) 13:23, 27 May 2020 (UTC)[reply]

I'm not going to explain step by step. But you will need to login onto both accounts via IMAP on Thunderbird then copy (I strongly suggest you don't move) your inbox and all folders from one account to the other. Also I strongly suggest you don't rely on Google as the sole copy of these messages if they are that important. Nil Einne (talk) 13:38, 27 May 2020 (UTC)[reply]

User:Nil Einne At least point me webpage which explains it. Please Ram nareshji (talk) 14:15, 27 May 2020 (UTC)[reply]

  • Thunderbird has recently had issues accessing Gmail, apparently due to a change on Google’s end. Certainly it didn’t work when I tried it (would have been in Tails 4.5 or 4.6, so fairly recent). Your operating system mostly likely has a mail client built-in; you might want to try that. Brianjd (talk) 13:51, 28 May 2020 (UTC)[reply]
    Gmail is probably the main email service used by Thunderbird users (as it's the main email service used in general), so problems with Gmail are generally fixed quickly if you're not limited in what versions you can use (as may be the case for Tails given their possible need for security review etc). The latest version of Thunderbird 68.6.0 seem to be fine with gmail. (I mean a personal account, I'm lazy to try Gsuit.) 60.9.1 seems fine as well. You probably should use OAUTH2 since AFAIK Gmail is planning to completely killed classic login at some stage if they haven't already (i.e. you can't simple enable support for insecure apps). For that reason, you will need to enable cookies etc [6]. That said, as I mentioned most applications which support IMAP and allow you to copy and paste or otherwise move mailboxes between different accounts should work for this. Nil Einne (talk) 11:18, 29 May 2020 (UTC)[reply]
    Looking into this a but more, it seems Thunderbird and/or Gmail didn't and possibly still doesn't support OAUTH2 for POP3 so you may need to set up other options like an app specific password [7] [8]. But if you're using POP3 you're defeating the purpose of why you chose to use Thunderbird for this, so it's irrelevant. Nil Einne (talk) 12:20, 29 May 2020 (UTC)[reply]

    Actually are you sure the problem you encountered actually has anything to do with Thunderbird? It sounds like Tails may have disabled OAUTH2 in Thunderbird [9] [10] [11]? I can understand that since for something like Tails, OAUTH2 provides ample room for vulnerabilities and risks given cookies and the frequent need for Javascript and the nature of how OAUTH2 works itself (i.e. with an access token and a signed application). Indeed the implementation of OAUTH2 in Thunderbird about 5 years ago was contentious [12].

    However the understandable decision of the Tails team to remove OAUTH2 isn't a limitation of Thunderbird. If you don't want to use OAUTH2 you'll face the same problem with Google with any program. Although frankly for all the problems of OAUTH2, I'd still recommend it over enabling less secure apps anyway. (From the links in my 12:20 reply, I think the end of LSA for Gmail isn't as clear as I thought. It's only G.Suite where it has a clear end date.) And if you really don't want to use OAUTH2, use an app specific password instead even if that requires 2FA.

    Still either option [13] should work with Thunderbird on Tails except perhaps for the risk, especially with LSA, that Google will be concerned over you accessing over Tor and block you from using LSA even if you enabled them. (Which again is unlikely to be anything to do with Thunderbird.) Oh and also it seems Google may automatically disable LSA if unused, I don't know how quickly but if you only do this irregularly you may need to check your LSA settings.

    In other words, I'm not sure there ever was a significant problem with Thunderbird and Gmail on Tails anyway other than the fact you probably can't use OAUTH2 so need to use the other options and hope and pray Google doesn't block you. The only other thing I can think of is that I'm not sure how well coded Thunderbird is for a lack of OAUTH2. When you try to add a Gmail account in normal Thunderbird, it will just try to use OAUTH2 without asking. It may be that when Tails disabled OAUTH2, they didn't improve the UI and Thunderbird just assumes OAUTH2 is supported so it's not clear how to proceed (i.e. you need to enable LSA or use an app-specific password).

    Nil Einne (talk) 13:32, 29 May 2020 (UTC)[reply]

    • Then it’s interesting that the Tails documentation in May 2019 had a warning about this but it was removed by the end of July 2019. I assumed on that basis that Tails was Gmail-compatible. Also I looked at posts on Google’s support forums about this, but they sounded like they were from people just playing with it without really knowing what they were doing, so I didn’t pay much attention. It sounds like you have done more thorough research. Brianjd (talk) 14:56, 29 May 2020 (UTC)[reply]
      • Oh, one of your links seems to address this already. Also app specific passwords suck. More to the point, they didn’t work for me (even though Gmail’s web interface does work over Tor). I won’t be installing Thunderbird outside Tails (yet), as I try to minimise the amount of software I install. It looks like a full resolution will have to wait for another time. Brianjd (talk) 15:00, 29 May 2020 (UTC)[reply]

Can't load online games

Hi, I have a problem with loading free online games. For instance, when I try to load Super Mario World here, it always stops saying "Setup file system ... Load wasm file 100% Load emulator file 62.7 KiB". Similar things happen when using any other platform, where loading suddenly stops saying e. g. "Loading (2/3) 4.1 MB/S". I am somewhat at a loss there and desparate! What is the reason and the easiest solution for this issue? Thanks in advance for any support!--Hildeoc (talk) 12:30, 27 May 2020 (UTC)[reply]

The easy thing to try is using another browser. I just tried it in Firefox, Chrome, and Edge, and it loaded and showed the initial screen on them all. IE crashed, but IE always crashes...) Are you using Windows? if so, what version? --Guy Macon (talk) 19:13, 27 May 2020 (UTC)[reply]
I hate to be a wet blanket, but I would not be inclined to help someone who is publicly attempting to infringe copyright on such a game. These emulators for platform games are usually legal in themselves, but when they use copyrighted ROMs from the original cartridge or disc, they are surely illegal in most jurisdictions, such as these United States. I would suggest that you purchase the console and cartridge you wish to play, or if that is prohibitive, to find some entertainment such as on Steam, that is both free and legal. Elizium23 (talk) 05:24, 28 May 2020 (UTC)[reply]
You are correct from a legal perspective, but it's hard to get exited about someone running an online version of a game that came out in 1990, can only be legally run on a system that has not been available since 1999, and is impossible to buy from the copyright holder or any authorized reseller such as steam. See Abandonware and End-of-life (product). Related: Criticism of copyright. --Guy Macon (talk) 11:15, 28 May 2020 (UTC)[reply]

????? According to Super Mario World:

Super Mario World was ported to the Game Boy Advance (GBA) as Super Mario World: Super Mario Advance 2 between 2001 and 2002.[39] It features the same number of levels as the original (albeit with a toned down difficulty), Game Link Cable support for four players, and the ability to save.[40][41] In the United States, Super Mario Advance 2 sold 2.5 million copies and earned $74 million in revenue by August 2006. During the period between January 2000 and August 2006, it became the second highest-selling portable game in that country.[42] It received positive reviews; critics enjoyed its new inclusions and retention of the SNES original's "feel".[40][41][43]

Okay that version has some modifications. But it then goes on to say:

The SNES version was released on the Wii's Virtual Console in Japan on 2 December 2006, in the United States on 5 February 2007, and in Europe on 9 February 2007.[44] It was released for the Wii U in North America and Japan on 26 April 2013, and in Europe on 27 April 2013, along with the full launch of the Wii U Virtual Console.[45] Super Mario World was also one of the 21 SNES games included in the Super NES Classic Edition in September 2017[46], and is available via Nintendo Switch Online.

and

In a similar way, Super Mario World is one of the four games whose assets are available in Super Mario Maker, a custom level creator released for the Wii U in 2015,[81] and its 2019 sequel.[82]

If you read the article for the Virtual Console, it sounds like most games are simply run in an emulator. So very like that's the case for Super Mario World i.e. it isn't even a port with some possible modification. True it's not available on Steam or for the PC. But then again, nor is Red Dead Redemption, God of War (2018 video game), Infinity Blade (discounting the Chinese version ), etc. Platform exclusivity may be annoying, and perhaps there would be some sympathy if the OP was simply trying to get a game they purchased to work on the PC. Even a different version of that game or one they got from different sources. But there's no evidence that's what's going on here.

Ironically Infinity Blade seems to be a better example of a semi abandonware game despite being released in 2010. It was removed from iOS app store in 2018 with no sign of it coming back [14]. (I didn't actually choose Infinity Blade for this reason, I was just looking for a popular iOS game that was never released on Android given the ability to run most of them on a PC, or the PC itself.)

Nil Einne (talk) 11:48, 29 May 2020 (UTC)[reply]

Ah. I was not aware of the ports. I should have read more carefully. I strongly oppose any pirating of material that the copyright owner is still selling or was recently selling. In my opinion, the concept of abandonware is only for things that are unambiguously abandoned and completely unavailable without buying twenty-year-old vintage hardware and software or running an emulator. And of course I acknowledge that, no matter what my personal opinion about abandonware happens to be, legally copyright extends to the life of the author plus 50 years. I don't like it, and everything I write other than something someone paid for and thus owns is under a CC0 license, but it is the law in the US. --Guy Macon (talk) 11:58, 29 May 2020 (UTC)[reply]

Zoom volume

Is there any way to turn off the volume of a Zoom meeting without turning off the computer's volume? I don't want to hear the meeting in background, but I still need my volume to be on. --PuzzledvegetableIs it teatime already? 19:27, 27 May 2020 (UTC) + minor edit --PuzzledvegetableIs it teatime already? 19:27, 27 May 2020 (UTC)[reply]

Assuming you are talking about the desktop program, I would say the majority of Windows applications which involve the production of significant audio (i.e. more than just warning boxes and the like) have built in volume control settings, probably especially audio conferencing programs. Sure enough a quick check shows Zoom doesn't seem to be any different. If you open settings (the gear icon), click on audio (which has a headphones icon) and there should be a volume slider for speakers, moving it to the far left should turn the audio off. Alternatively if you have an output device which won't output audio you can likely change the audio output device from whatever it's set to (probably "same as system") to the non functioning audio output device; I haven't checked that this is possible or works for an ongoing call but I suspect it does. I suspect the Mac OS X and Linux applications are the same, but did not check.

Alternatively, since about Windows Vista, the built in Windows volume mixer has the ability to adjust the volume of individual programs, as well as mute them. They will generally only show up if the program is running or maybe if it has audio, so make sure Zoom is running and if that doesn't work you're in a call. Then if you find the speaker icon in the Notification area of Windows you should be able to open the volume mixer either by double clicking (I think this worked on Windows 7) or by right clicking and selecting the volume mixer option. Alternatively you can probably just type volume mixer into the Windows start menu since per program controls were added i.e. Windows Vista to bring up the volume mixer, probably as the top choice i.e. typing volume mixer and entering will probably work.

To be fair, on Windows 10, this will may find the sound mixer instead which is the Windows 10 settings equivalent of the volume mixer. It lets you do basically the same thing except you probably need to adjust the volume slider to zero to mute. (But on the plus side, you can change the application output and input devices.) If you want the classical volume mixer via the Start Menu, I think your best bet is to open the Control Panel (e.g. type control panel in the start menu). You should be able to then find the volume mixer e.g. by clicking on "sound" and then "adjust system volume", or typing volume into the Control Panel search should also bring it to the top. (Unfortunately not volume mixer.) I'm fairly sure there must be a way to adjust the audio of individual programs at a system level on most Linux distros too, and maybe on Mac OS X.

If you are just using the browser, the second set of options should allow you to completely mute the browser. Alternatively for (IIRC) a few years now, most browsers allow you to disable the volume of any tab which has audio. Either click on the speaker icon on the tab (I mean on the tab selection bar), or on the address bar of the tab when it's active. Alternatively right click on the tab (again I mean on the tab bar). I wouldn't be surprised if Zoom within the browser also has some volume control settings, again it's probably fairly common, but I haven't checked.

Nil Einne (talk) 05:20, 28 May 2020 (UTC)[reply]

I'm using the desktop application. When I enter the settings on Zoom and move the volume slider all the way to left, the slider simply modifies my computer's volume. It's not specifically adjusting Zoom's volume. However, the Windows volume mixer method did work. Thank you very much. --PuzzledvegetableIs it teatime already? 14:55, 28 May 2020 (UTC)[reply]
Apologies you're correct. Actually I think that's somewhat common nowadays especially for audio conferencing programs. I'm too used to games and media players (although even some of those just control the system volume). Anyway I've struck out that suggestion in case anyone else ever looks at this answer for help. Nil Einne (talk) 11:56, 29 May 2020 (UTC)[reply]

May 29

Adding my company page 'Jehlum'

HI,

When i try to search for 'Jehlum' it shows redirection to 'jHElum' and doesnt show red link on original text i.e. 'Jehlum'. is there any simple way to add my company page here? — Preceding unsigned comment added by Imzargar (talkcontribs) 13:55, 29 May 2020 (UTC)[reply]

Dell Insprion 15 5000

Does the Dell Backlit Keyboard use a special type of Ink? Or is it paint on plastic, because I am noticing that the "O" on the keyboard, the black part of the keycap (plastic) seems to be chipping off --Thegooduser Life Begins With a Smile :) 🍁 15:18, 29 May 2020 (UTC)[reply]

May 30

Creating Backup of Windows Prior to Registry Change

Maybe this is an ignorant question, or maybe I am asking the wrong question after decades of almost-relevant experience. I asked about six weeks ago what to do about the system resizing windows and making them smaller. I was told that I could make a registry change, and I have saved the advice that I was given. However, I was also told to back up my system first. I have tried to research how to "back up" Windows so that I can restore it, but what I read about backup has to do mostly with backing up files, and I know how to do that. What I think I want is to create a backup copy of Windows to an external storage device. I have an external storage device with approximately 300 GB of free space (because I have backed up my data to it multiple times, occupying maybe 700 GB of free space). What I think I want to do is to back up Windows 10 itself, using something available from the Settings or the Start menu or somewhere that doesn't involve my having to buy backup and restore software, and doesn't involve using a cloud. (I don't trust clouds. As Judy Collins says, they rain and snow on everyone.)

How do I back up Windows 10 itself to an external storage device? Robert McClenon (talk) 02:00, 30 May 2020 (UTC)[reply]

@Robert McClenon: Here is one article I found on that topic: [15]. RudolfRed (talk) 02:17, 30 May 2020 (UTC)[reply]

On what systems operating systems are made?

It involves improper shutdown to test it's flexibility of OS, so system should be strong to endure all this things, what system are there? Ram nareshji (talk) 02:24, 30 May 2020 (UTC)[reply]

If you are talking about testing a system for unwanted behavior during an unexpected shutdown, the normal method is to hook up a relay that cuts the power, then use a function generator to power the system up then cut the power 0.1 seconds later, followed by doing the same with a delay of 0.2 seconds, 0.3 seconds, and so on. This is a standard test I do whenever I design anything containing a microprocessor or microcontroller. --02:57, 30 May 2020 (UTC)

I am asking what motherboard,CPU, RAM, HDD, Desktop do you use to test OS?