Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 82.43.88.87 (talk) at 17:16, 13 April 2009 (/* ҉̵̞̟̠̖̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̐̑̒̓̔̊̋̌̍̎̏̐̑̒̓̔̿̿̿ ̕̚̕̚͡ ͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


April 7

Can't access files on an iBook via Gentoo

I've been trying to access my girlfriend's iBook G4 since it broke down, using Linux. There aren't that many Linux distros that have a live CD version that can be used with a PPC. I tried Ubuntu 8.10 but it wasn't a live CD rather it was only an installer, but after a long time I found that Gentoo could access the HDD. All I had to do was mount -t hfsplus /dev/hda /media/elin as root and the HDD was accessible in the folder /media/elin. The problem is however that I can't access some of the files that have the permission drwx------ 1 501 501 13 Oct 24 2007 Documents. Who is the user/group 501 and why can't I access it, even when I try it through the command line as root?

When I click it in the GUI I get the error message "The folder contents could not be displayed. You do not have the permissions necessary to view the contents of "Documents"." Why doesn't this work? --BiT (talk) 05:13, 7 April 2009 (UTC)[reply]

Sigh.. turns out I just had to do "chown root *", "chusr root *" and "chmod 777 *". Maybe there's an easier way, but I got access to the files.. finally. But who is this 501? --BiT (talk) 05:14, 7 April 2009 (UTC)[reply]
Ok I'll just turn this into three new questions:
  1. If you're using a live CD, do you have access to all the files on the computer? It seems odd that I something like permission should affect me when using a live CD as root is like being in God-mode imo.
    Depends. When you mount a volume, the mount options can specify what to do with the permissions of the volume. It seems that by default it is set to voluntarily enforce the mounted volume's permissions on the users. In any case, if you are root you should be able to access anything. Chances are though that the GUI is not running as root. --76.167.241.45 (talk) 07:08, 7 April 2009 (UTC)[reply]
    So unless the computer's user has encrypted his or her home directory, anyone can take a look at it? I had already tried it on Windows, but when I saw that I couldn't access the files on the iBook I thought "damn, Macs must have better security than Windows". I don't know much about Macs though, OS X is based on Unix but what about the OS in iBook G4? Is it possible that this wouldn't work with OS X? --BiT (talk) 17:15, 7 April 2009 (UTC)[reply]
  1. Why do live CDs ask me for a password, like when I want to login as root?
    This is common practice. I won't go into a discussion about why you should need passwords to log into accounts here. But also often these LiveCDs allow you to run services like SSH server from it, so it is important to be able to restrict remote access. --76.167.241.45 (talk) 07:08, 7 April 2009 (UTC)[reply]
    Yeah but when you have a live CD you can easily become root, only every live CD distro has a different password. Some have user root and passwd root; user ubuntu passwd root... e.g. if you want to perform a command with sudo. But, if you do something like su - or sudo su - (can't remember atm) you become root without typing in a password! How are you supposed to guess the live CD's username and password? --BiT (talk) 17:15, 7 April 2009 (UTC)[reply]
  1. What would be the best way of transferring the data from the iBook to an external HDD? The GUI is way too slow imo so I'd like a good way to basically copy all of /dev/hda to an external HDD using the command line. Is cp my best bet? --BiT (talk) 05:33, 7 April 2009 (UTC)[reply]
    cp will probably work, though it is probably equivalent to copying in the GUI. You can also try using rsync. If the copying is very slow, and it is a USB connection, it might be because the connection is USB 1.0. I don't know about the specifics of the hardware on your computer, but if you don't have any USB 2.0 ports, you might consider hooking the external hard drive to another computer that does have USB 2.0 and transferring over the network instead (Ethernet is much faster than USB 1.0). --76.167.241.45 (talk) 07:08, 7 April 2009 (UTC)[reply]
    The iBook does have several USB ports as well as firewire and Ethernet. I guess I'll just use cp though I might try out rsync. I'm curious though because I don't know much about this, but how do you transfer your data between computers using the ethernet? Are you talking about conntecting both computers with an Ethernet cable and then transferring the data between them? --BiT (talk) 17:15, 7 April 2009 (UTC)[reply]
    Clonezilla is claimed to work with Macs as well as Wintels. -- Hoary (talk) 16:13, 7 April 2009 (UTC)[reply]

"Advantage"

When I opened my computer this morning, there was a new icon in the system tray. When I moused over it, it said: "you may be the victim of counterfeit software" or something to that effect. That is utter bullocks. All my software is original. Either it is free software straight from the source or it is bought software from sources I totally trust. (Besides, if the software is fake, it's the company that is the victim, not me)

What worries me, is that I never installed Windows Genuine Advantage because when it was released the only thing I saw it doing was look for pirated software (and I didn't want to not give myself the chance to use any if I needed to for whatever reason). So how did it manage to suddenly start up and try running a test? Can I safely get rid of this program without hurting the integrity of my Windows XP system -- if you can call it that? -- Mgm|(talk) 07:32, 7 April 2009 (UTC)[reply]

Evidently Microsoft decided to re-list "update" WGA on Windows Automatic Updates [1]. Removal instructions are widely available online (though I can't vouch for any of them). – 74  11:28, 7 April 2009 (UTC)[reply]
  • Somehow my system ended up downloading the software automatically, while I thought I set it ask me for verification with each update. Great how Windows finds money more important than general computer security. How can I find out which version of WGA I have? (not all versions can be removed with the same method) It's not in the list of installed software or Windows components. - 87.211.75.45 (talk) 16:00, 7 April 2009 (UTC)[reply]
There do exist alternatives to Windows that are written with much more attention to security than to money; if you don't think much of Windows, you can install an alternative. -- Hoary (talk) 16:10, 7 April 2009 (UTC)[reply]
Stuff like that is exactly why I moved to Linux. Also the update manager, it happened to me time and time again that I would leave my computer on for the night downloading something and the updater would find a new update, download and install it without asking me and then give me 30 minutes to stop it from restarting my machine. Since I was asleep the computer restarted and the download was ruined. Linux tells you every update it wants to install, and you can pick and choose which one you want and restart on your own time. --BiT (talk) 18:07, 7 April 2009 (UTC)[reply]
There are these things called "settings." If you, bear with me now, "set" them to not do what you described, it won't happen. 161.222.160.8 (talk) 21:41, 7 April 2009 (UTC)[reply]
You sure were quick looking down your nose at me. Everyone I know find this annoying, how is it a smart move to include a wide array of annoying settings in your OS and then telling people "why didn't you just change the settings?". Also, I'd always forgotten about this problem when the computer had already restarted. Most Linux distros tell you "we are going to install these things on you computer, because of this and this, and they are patches for this and that". You can uncheck the ones you don't want and then install it. Also, I had found the place where I could disable the updates in Ubuntu in a week as opposed to never in Windows (after around 16 years of use). Not that I would want to disable the Ubuntu update. --BiT (talk) 13:48, 8 April 2009 (UTC)[reply]
  • Unfortunately, I'm still depending on software that has no non-Windows alternative. I need to be absolutely sure I can run all the programs I require before I make such a drastic move. :( - 87.211.75.45 (talk) 18:45, 7 April 2009 (UTC)[reply]
  • Don't you just love the term "Windows Genuine Advantage" ? It's obviously not an advantage to people who are stuck with it, as all it can do is stop you from doing things. So they stuck "Genuine" in there just in case you didn't believe it was an advantage. Will the next version be "Windows Genuine Advantage, Really, We Swear" ? StuRat (talk) 22:48, 7 April 2009 (UTC)[reply]
Let's hope so. Look, Windows is by far the most popular OS in the known universe (with, what, 98% of the market?) and therefore anyone not using it is a weirdo, and your less than utterly respectful comments about it mark you as a Communist. (Emoticon!) -- Hoary (talk) 23:43, 7 April 2009 (UTC)[reply]
More like 90%, according to Microsoft Windows. Algebraist 09:57, 8 April 2009 (UTC)[reply]
Just because many people do something doesn't make it smart Hoary. You might want to read up on argumentum ad populum. --BiT (talk) 14:36, 8 April 2009 (UTC)[reply]
A million housewives every day, pick up a can of beans and say, computerz meanz windowz. -- Hoary (talk) 15:24, 8 April 2009 (UTC)[reply]
Wtf? --BiT (talk) 16:42, 8 April 2009 (UTC)[reply]
Don't fcuk with a million housewives, BiT. -- Hoary (talk) 00:48, 9 April 2009 (UTC)[reply]
You make no sense and you scare me. Good day to you. --BiT (talk) 03:04, 9 April 2009 (UTC)[reply]
        • So a pope shits in the woods? Look, these commies are getting stuff free even though right-thinking folk pay money for stuff that's no better. The commies then have money left over for stuff like trees (for hugging), DVDs of films in foreign languages (possibly even French), books, and dope. The sky is falling. -- Hoary (talk) 15:24, 8 April 2009 (UTC)[reply]
I think they're kidding (some of those replies are so bizarre I certainly hope that's what it is). StuRat (talk) 13:12, 9 April 2009 (UTC)[reply]
Thank God, trees, French DVDs and books... I was starting to get scared --BiT (talk) 02:14, 10 April 2009 (UTC)[reply]

Middleware

Would you please provide a definition for middleware in plain english... —Preceding unsigned comment added by 41.196.221.226 (talk) 11:59, 7 April 2009 (UTC)[reply]

Have you tried our article middleware? – 74  12:03, 7 April 2009 (UTC)[reply]
I don't really like the definition in our article. But it is a tough term to define clearly. I would say that they are third party libraries that are neither application-specific, nor a part of the operating system. In computer game software (for example), the physics, AI and music replay systems might be middleware that the game developers would have purchased rather than written themselves. The actual game mechanics would be a part of the application and DirectX would be a part of the operating system/drivers. SteveBaker (talk) 03:30, 8 April 2009 (UTC)[reply]

Broken PC help

I was on the "families" User account on my PC and i accesed the internet and AVG detected a Trojan and prompted me to move it. So i deleted it as it was in C\:Windows\service.exe. I then did a full scan just incase and it found a realplayer exe infected file as the downloading agent. I deleted that and then my system hung. On reboot safe mode doesnt work and it always gets a blue screen asking me to stop antivirus software blah blah and then re-try but the HD is obviously broke. How can i recover the details/system restore? P.s Using laptop now. Thanks for any help.CorrectlyContentious 15:59, 7 April 2009 (UTC)

Your HD (harddisk) should be fine, it's the operating system that has broken. Presumably because you removed a critical component of your operating system. What antivirus software are you using? - 87.211.75.45 (talk) 16:02, 7 April 2009 (UTC)[reply]
How you restore would depend on the kind of backup you made. If on the other hand you're talking about "recovering" the state when new, then you may be able to boot off CDs provided for this purpose by the "manufacturer" (marketer) of the computer; this will of course delete all the work, email, etc, that you've accumulated since the computer was new. Hoary (talk) 16:06, 7 April 2009 (UTC)[reply]
Personally if I were in this kind of frustrating situation, I would do the following unwieldy, time consuming, and expensive sequence:
  1. Get an external USB hard disk larger than the infected hard disk
  2. Use Norton Ghost to create an image file of the infected hard disk. (Choose to create it on the USB hard disk, of course.)
  3. Format the infected hard disk, deleting everything on it, and reinstall Windows from scratch. Do all the Windows Update stuff.
  4. Create a "user" account (with no admin rights). Use that account from now on, switching to the admin account only when necessary to install software that you know is safe. This will make it harder for malware to attack your system.
  5. Reinstall clean applications one by one from the source disks or the Internet.
  6. Use Ghost to mount the infected image file from the USB hard disk, and copy your data files from the USB hard disk over to your newly-formatted hard disk.
  7. Virus scan using a couple of virus scanners.
Tempshill (talk) 20:08, 7 April 2009 (UTC)[reply]
Tempshill: Use Norton Ghost to create an image file of the infected hard disk. I can't think of any way in which Norton Ghost is superior to Clonezilla, other than having a slicker interface with prompts in English that's more polished and has fewer exclamation points. And while Norton Ghost costs money, Clonezilla costs no money. Am I overlooking something? -- Hoary (talk) 23:46, 7 April 2009 (UTC)[reply]
Never used Clonezilla; I'm glad to hear there's an alternative. Does Clonezilla support incremental backups, where only changed sectors are added to the backup set? Tempshill (talk) 22:32, 8 April 2009 (UTC)[reply]
Not as far as I recall, no. It's not designed for everyday backup. (For one thing, it involves booting off a Debian live CD: nothing wrong with that, of course, but it's hardly something you can do while checking your email and so forth.) -- Hoary (talk) 00:33, 9 April 2009 (UTC)[reply]
Then that's one way that Norton Ghost is superior to Clonezilla. It's pretty nice. Tempshill (talk) 03:19, 10 April 2009 (UTC)[reply]

SMF Forums - How to require mod approval for reg's?

Hi Wikians!

I'm running a forum on SMF, and have a problem with spammers. I have it set so that you have to register to post, but the spammers just go ahead and register. Is there a way to require mod approval for new accounts before they are allowed to post? —Preceding unsigned comment added by 38.118.48.5 (talk) 17:21, 7 April 2009 (UTC)[reply]

You may be interested in the mod here. Read the docs on it. It is specifically designed to stop forum spam. -- kainaw 19:56, 7 April 2009 (UTC)[reply]
A CAPTCHA at registration may also reduce spam. NeonMerlin 23:24, 7 April 2009 (UTC)[reply]

Rip DVD with VLC

I'm trying to do this. However, I can't find a combination of file-type, encapsulation method, video codec and audio codec that either work, or don't crash my computer. Any suggestions? Do I need to download any codecs? Thanks. ╟─TreasuryTagcontribs─╢ 21:07, 7 April 2009 (UTC)[reply]

Why VLC? There are far better ways to rip dvds —Preceding unsigned comment added by 82.43.88.87 (talk) 22:38, 7 April 2009 (UTC)[reply]
Easy answer is don't use VLC. VLC is buggy and a pain in the neck. Tell us what OS you have and we can direct you to something better suited to the task. --98.217.14.211 (talk) 01:08, 8 April 2009 (UTC)[reply]
Windows XP Media Centre. ╟─TreasuryTagcontribs─╢ 06:53, 8 April 2009 (UTC)[reply]
Ripping DVD is old hat - use DVD Decrypter or DVD Shrink. Only for backup of course ;) Sandman30s (talk) 18:07, 8 April 2009 (UTC)[reply]
I did try DVD-D, but that produces some basically un-usable .vob files (I want to watch this in WMP, not burn a copy). ╟─TreasuryTagcontribs─╢ 08:51, 9 April 2009 (UTC)[reply]
You should be able to play the vob files in VLC, but WMP will not play them unless you have a MPEG-2 compatible filter. Another option is to encode the vob files to a format which WMP will be able to play. To do this, first copy the vobs to your hard drive with DVD Decrypter or DVD Shrink, this removed the copyright encryption. Then you'll need a video encoder, I'd recommend HandBrake, MeGUI or GVC. For WMP, you should probably encode to XviD in avi container. You should end up with a .avi file that will play in WMP no problem, though you may also need to install the XviD codec first. JSK715 13:54, 9 April 2009 (UTC)[reply]
You can set DVD Decrypter to rip to .iso files. Mount the .iso files using Daemon Tools then you can watch using WMP. F (talk) 10:06, 10 April 2009 (UTC)[reply]

How do I know if a Wifi network is legit or is a spoof?

My local commuter rail occasionally has free wifi, depending on whether they have the hardware set up on that specific train. The network name is something like "Free MBTA Wireless" or whatever. If I see a network called "Free MBTA Wireless" on a train, how do I know if it's the MBTA's legitimate network, or if it's someone else on the train spoofing a fake network? That is, besides asking the conductors, who know less about the system than I do and never know whether it has been turned on. This is a more general question than just my train -- for example, airports abound [2] with fake networks, and there isn't always someone to ask.

Is there any way to find out who it is that is actually broadcasting a network, without attaching to that network? Or find out other information about it without compromising yourself?

And is the danger of wifi spoofing just limited to the data that travels across the network? If I avoid using any passwords or sensitive data, am I safe? Or can they do malicious stuff even without me transmitting sensitive data, like get into my computer?

(I'm using a Mac, 10.5, with no additional wifi-related software, if that is relevant).

Thanks! — Sam 146.115.120.108 (talk) 22:48, 7 April 2009 (UTC)[reply]

Have you tried using a newer Wi-Fi detector/analyzer? NeonMerlin 23:21, 7 April 2009 (UTC)[reply]
I am using Mac's native wifi connection program. It distinguishes between access points and ad hoc networks, but afaik, it is possible for a wifi spoofer to mimic an access point. If there are other programs that can provide more detail, I'd be intersted in what they are and what they do. Thanks, — Sam 146.115.120.108 (talk) 01:59, 8 April 2009 (UTC)[reply]
They could definitely break into your system if you have a connection with them. All they have to do is send an exploit of a service you are running over their connection to you and run shellcode via this exploit that does what they want to do. For example, they could buffer overflow your web browser (perhaps) and use that to execute some shellcode that binds a shell to a port. They could then connect to that port and have root access to your computer. Hope this helps, Ζρς ιβ' ¡hábleme! 02:08, 8 April 2009 (UTC)[reply]
If a spoofer is careless, they might forget to spoof the BSSID, and then you would see that the BSSID is different than it usually is. But it is trivial to spoof that. I mean, from a philosophical point of view, there is no difference between a "legit" and a non-legit network, if they both act the same way. The only thing that would prevent a spoofer from acting the same way as a legit network is if there is some information they do not know, like an encryption key.
If the network is unsecured, then there is no difference between a legit and not legit network. (Even if the legit network were running, anyone could still intercept and/or pretend to send you responses from the access point, and hope that you accept them rather than the access point.) Besides getting stuff you transmit, anything you download could also be suspect, as they could have injected a virus or something into it. If you go onto any sites where you are logged in (even if you didn't log in while on the network, if you logged in before and it remembers), the sessions cookies might allow them to gain the same access as you.
Even if the network were secured, it would still depend on the type of security. If it's something like a simple WEP key, then if they know the key too (chances are they do if you do), then they can spoof it just the same. --76.167.241.45 (talk) 04:49, 8 April 2009 (UTC)[reply]

There's no great way to tell. When using a public WiFi network, make sure to have your firewall turned on; to use an SSL (encrypted) connection if you use POP e-mail like Outlook or Thunderbird; that your password-protected websites use an encrypted page when the password is exchanged; and that if you use something sensitive like web e-mail that you don't want snooped that the website operator uses an encrypted connection (as GMail can be configured to do). The first of these measures makes sure that the guy spoofing the network can't try connecting to your computer in any way, and the other measures are to prevent him from reading the data that you send and receive. If you utilize these measures, you don't really have to care whether the network is a spoof network or not, actually; all the spoofer will end up with is a lot of encrypted data to look at and scratch his head at. Tempshill (talk) 22:38, 8 April 2009 (UTC)[reply]

Like Tempshill says, there's no real way to tell. Any non authenticated network can be spoofed. The good news is that it's not as dire as some of the other posters suggest. First, if you're on a mac, and if your firewall's on there's not a lot of concern over someone "breaking into your system"--that would need an unpatched root vulnerability. To be sure they exist, but they're not especially common on an up to date machine, and there's nothing stopping anyone from doing this on a legit, but open network anyway. The bigger risk is a man in the middle attack. To avoid those just make sure you're checking the ssl certificates and checking fingerprints if you're really paranoid. Shadowjams (talk) 06:10, 10 April 2009 (UTC)[reply]
If your really paranoid you could set up your home computer to accept incoming vnc (or other remote protocols) connections. Then when you connect useing your macbook you can use vnc to securly connect to your home computer and surf the web that way.. there are some limitations tho. But in the end if someone did try to see your traffic all they will see is a lot of encrypted packets going to one website (or IP address.. depending on how your set up your remote computer)

TV standards with no overscan

Do any newer TV standards exist that specifically disallow overscan and make the entire frame title-safe? NeonMerlin 23:19, 7 April 2009 (UTC)[reply]

TVs are moving to digital format now rather than analogue. Are you thinking of a digital equivalent? Dmcq (talk) 09:38, 8 April 2009 (UTC)[reply]
Even HDTV formats like 720p and 1080i and 1080p aren't immune from this; some older sets like mine lose a lot of pixels at the edges. Never seen an issue with LCD sets, of course, though the video game console manufacturers still claim you need a little bit of safety at the edges because of overscan. Tempshill (talk) 22:41, 8 April 2009 (UTC)[reply]

Connecting a 2.5" SATA Laptop HDD to a Desktop PC

I am having real trouble connecting a Samsung 2.5" SATA Laptop Hard Drive to my computer for diagnostics. The model number is - (HM120IJ). It is a SATA rather than a PATA HDD and does not have a normal 7 Pin SATA connector at the edge. I have tried taking the strange looking connector off by unscrewing all mounting enclosures etc, but when the circuit board with the connector is removed there is no standard SATA connector hidden below.

The connecting end has what looks like a 7-Pin and a 15-Pin connector side by side, but neither of them are shaped in a way that a SATA cable can be attatched. For reference there is also a small row of four pins next to the stange connector (possibly jumper pins but i don't think so).

The drive has come out of a Hewlett Packard Pavillion dv2104eu (dv2000 series) laptop of just over a year old, and the hard drive connector does not have anything plugged onto it, but is merely pressed against the motherboard connector which has two sets of small raised pins (7-pin & 15-pin side-by-side).

Please does anyone have any idea what this connector is and how this thing can be connected to a normal motherboard as i cant find any suitable connectors anywhere??? Thanks.... —Preceding unsigned comment added by Dammers (talkcontribs) 23:34, 7 April 2009 (UTC)[reply]

It sounds like you might have a slimline connector and your answer may be a slimline sata cable (google). Depending on your intended use, a 2.5" sata drive enclosure (google) may also be an option. -- Tcncv (talk) 01:41, 8 April 2009 (UTC)[reply]


April 8

New HDD for Dell Inspiron 600m

I think my HDD is going out on my 600m. I'm getting weird errors when trying to mount filesystems from a BackTrack 3 final live session and I'm also getting some weird errors when booting. I have decided to get another HDD. I am wondering if this will work for the 600m. http://www.newegg.com/Product/Product.aspx?Item=N82E16822136314 Actually, that is the wrong interface (SATA). I can't find a good replacement drive for this 600m. Do any of you have suggestions about what HDD I might want to buy? TIA, Ζρς ιβ' ¡hábleme! 01:58, 8 April 2009 (UTC)[reply]

Creating deb to install to the "HOME"

I am trying to create a .deb file that would install some files into the home of the user (they are nautilus scripts) and I don't know how to make that happen... I have even tried creating a postinst file, to copy the files to the home, but that will just copy the files to the home of the root (since the scripts runs as root!) Any way to do this? or it is not possible? Thanks. Hacktolive (talk) 05:14, 8 April 2009 (UTC)[reply]

Well, if it is running as root, then how does it know who "the user" is? --76.167.241.45 (talk) 06:02, 8 April 2009 (UTC)[reply]
It is not recommended that you install files to users' home directories; what would happen if a new user is created? I'm pretty sure there's a global location for nautilus scripts anyway. --wj32 t/c 10:09, 8 April 2009 (UTC)[reply]
Actually, there isn't. I guess that's part of the problem... --wj32 t/c 10:10, 8 April 2009 (UTC)[reply]
Exactly... there is no global location... I would also install to /etc/skel so if a new user is created, they would have that... Hacktolive (talk) 12:58, 8 April 2009 (UTC)[reply]
(outdent) Well, as the first respondent says, which user or users will you install it to, if the installation is running as root?
If you want to install to every user, you could just find the home path of every user (from /etc/passwd, or using some utility that parses that for you) and loop through them. (I was going to suggest looping through sub-directories in /home/, but there's no guarantee that would be correct). Of course a lot of the "users" you find there won't be "real" users at all, but I guess that's OK as they'll never run Nautilus!
Does seem odd for there not to be a system-wide location for installing these extensions into though - most programs seem to go to great lengths to allow the same thing to be set and over-ridden at multiple levels. - IMSoP (talk) 01:47, 11 April 2009 (UTC)[reply]
Yes, there is no system-wide location for nautilus-scripts, it is a known problem. Thanks to all, I learned a little more. Cheers to all. Hacktolive (talk) 15:06, 12 April 2009 (UTC)[reply]

Automated savings

Is there a way to automate the downloading of a specific html page from a listing such as this, and also saving all linked images on said page, say for example I wanted to save "145.html" from that listing? I can't simply specify the page url to save because when a thread dies on this site saving the url would just save a 404 error. I need it to scan the directory listing so that when the thread dies the url is removed from the listing and it will have saved the latest version and then stop. Help please, thank you. -- signed 79.76.215.204 (talk) 08:49, 8 April 2009 (UTC)[reply]

That link is dead, so I'm not sure what you mean, but you might be interested in wget. --Sean 12:33, 8 April 2009 (UTC)[reply]
wat! paintchan is down?? Noooooo! Anyway, I think Op means something like this where you see the files of a website rather than the actual web pages. You could just run httrack or something on it, though I've no idea how you would automatically run that process —Preceding unsigned comment added by 82.43.88.87 (talk) 12:42, 8 April 2009 (UTC)[reply]
Actually httrack can be run from the command line in windows, so you should be able to write some script that could run it at set intervals —Preceding unsigned comment added by 82.43.88.87 (talk) 12:43, 8 April 2009 (UTC)[reply]

iMacros

Resolved

Is there a similar tool to iMacros that would work not just for web content but also for all Firefox tasks like saving pages, updating addons etc. —Preceding unsigned comment added by 82.43.88.87 (talk) 12:11, 8 April 2009 (UTC) [reply]

Never mind I got something.

My old CRT made a weird noise when I turned it on.

It was like a mechanized or controlled version of gas escaping. I turned it off and on again, and now it works without any noise. Should I still be concerned? Thanks in advance! Imagine Reason (talk) 14:15, 8 April 2009 (UTC)[reply]

perhaps it was degaussing but that usually sound like "boing" to my ears. Theresa Knott | token threats 15:14, 8 April 2009 (UTC)[reply]

This often happens on older TV's too. I thought it was the sound of static electricity sparks. It is a sort of short hiss (sound like Psssssss, is that it? Graeme Bartlett (talk) 21:25, 8 April 2009 (UTC)[reply]
Yes, it sounded like that, but I was afraid of it getting louder (not sure if it did), and I thought sparks are more like pops? Imagine Reason (talk) 03:30, 9 April 2009 (UTC)[reply]
It may be the capacitor in the tube discharging, which creates a high voltage sound that sounds like air escaping. I have no clue what effect this has, or if it indicates a dangerous condition or not. Shadowjams (talk) 06:04, 10 April 2009 (UTC)[reply]

MS Access question

As many know, the Ctrl-' combination in MS Access copies the contents of the field immediately above the selected one in tables and forms and inserts them into the active field (also works in Excel, by the way). I, however, noticed that this combination periodically stops working for no apparent reason. Exiting and starting Access again fixes that, but closing and re-opening the database does not. Does anyone know what this may be caused by? I am using Access 2003.—Ëzhiki (Igels Hérissonovich Ïzhakoff-Amursky) • (yo?); 17:51, April 8, 2009 (UTC)

programing

need to learn programing need help i need mainly java and visualbasics with java am trying but visaul basics is killing me help needed want to become a programer--Mozy1691 (talk) 18:40, 8 April 2009 (UTC)[reply]

What language? C++, Java, ADA...? -- kainaw 19:31, 8 April 2009 (UTC)[reply]
Start with BASIC. Tempshill (talk) 22:44, 8 April 2009 (UTC)[reply]
Erm BASIC? Are you sure? --BiT (talk) 00:33, 9 April 2009 (UTC)[reply]
Perhaps you could mention your purpose. I mean, why learn programming? Depending on the purpose, even BASIC might be a good choice. -- Hoary (talk) 03:11, 9 April 2009 (UTC)[reply]
Or javascript or PHP or Ruby or Lisp... without a why, the how is difficult to know. -- kainaw 03:39, 9 April 2009 (UTC)[reply]

Learn a training-language. Something like Pascal would be beneficial. Your best idea is to understand the structure and logic that programming language apply and then use that as a basis for learning whichever language you want. I say this as a student of Pascal, though I admit at the time I didn't feel it was worthwhile. Anyhoo it's become a bit of a bug-bear of mine. Lots of kids (adults too) are taught how to use MS Word version X, rather than taught how to work with programs. Once you're taught the 'structure' of how programs operate (and 95% follow similar setups) you can quickly learn <bold> any </bold> program. I believe that the same rules work in learning programming languages too. 194.221.133.226 (talk) 11:08, 9 April 2009 (UTC)[reply]

There's Small Basic: [3]. A Quest For Knowledge (talk) 12:30, 9 April 2009 (UTC)[reply]
I'm surprised that Python has not been mentioned yet. 89.241.40.76 (talk) 22:03, 12 April 2009 (UTC)[reply]

Help Needed from Web Designers: Public Call for Responses

I need qualified web designers to answer some questions for me. It need not be right here on this page; if you could simply point me towards some Wikipedians who can help me out, I'd be very grateful. I figured this page was as good a starting point as any, even if it may not be the be-all and the end-all.

Basically, I'm in a job program for disabled people. In order to get them to pay for training in my chosen field - web design - you have to jump through several hoops. One of these is doing "information interviews," where you try to get information from people who are already doing the job you want to do. Yes, it is somewhat silly but I still have to do it anyway.

If anyone volunteers to answer these, keep your responses down to a sentence or so. It's not necessary to write a whole essay. You can respond any way you want: on my talk page, by email, or otherwise.

The Fluffy Questions

  1. How long have you been doing web design?
  2. What do you enjoy most about your job?
  3. If you had to start over from the beginning, would you still choose to do web design?

The Important Stuff

  1. What tasks do you perform during a normal workday?
  2. Is this web design a full-time, part-time, or other kind of job?
  3. What hours do web designers generally work?
  4. Generally speaking, what kind of money can a web designer expect to make?
  5. What kind of market demand is there for web designers?
  6. What are the mental/emotional demands of this occupation (eg. high stress, dealing with customers, etc.)?
  7. What sort of qualifications and training are necessary to become a web designer?

Thanks, Gws5597 (talk) 18:58, 8 April 2009 (UTC)[reply]

Java Programming: Merging Two Images

Hi, I basically need help merging two images (two BufferedImages in Java). Can anyone suggest how I can do this? I tried various things, but none of them worked ideally. Thank you!

Sharpshot240 (talk) 21:09, 8 April 2009 (UTC)[reply]

What do you mean by "merge"? That can mean a thousand different things - all with different answers. -- kainaw 03:43, 9 April 2009 (UTC)[reply]


April 9

mysql

hi, i want the coding of connection string and insert query of MySQl with .net framework. —Preceding unsigned comment added by VAIDEHI SMARTq (talkcontribs) 03:50, 9 April 2009 (UTC)[reply]

Hope this helps. There are more links in our ADO.NET article. Jay (talk) 08:43, 9 April 2009 (UTC)[reply]
There's also www.connectionstrings.com. AndrewWTaylor (talk) 11:13, 9 April 2009 (UTC)[reply]

office automation

why is automation necessary in the following workplaces:

library

bank

payment department

examinations council

—Preceding unsigned comment added by 41.220.51.11 (talk) 12:04, 9 April 2009 (UTC)[reply]

It isn't. It is kinda handy, though. Algebraist 12:06, 9 April 2009 (UTC)[reply]
In a profit-seeking entity, it is necessary if competitors gain from it. Zain Ebrahim (talk) 12:10, 9 April 2009 (UTC)[reply]
Could this be a homework question? -- Hoary (talk) 13:36, 9 April 2009 (UTC)[reply]
We have an article on office automation, which may serve as a definition (it's also the top Google search result). Our automation article has a section on "impact" too. This should be good enough for a starting point, but we won't do your homework for you. Cycle~ (talk) 14:11, 9 April 2009 (UTC)[reply]

Google getting results that don't match (?) what I type

While researching to complete an article on a lock and dam, I searched Google this morning with the following words:

"beaver county times" merrill lock

Not finding anything useful, I added "dam" [without quotes, just by itself], and the number of results jumped from 342 to 367. I thought the idea was that Google found pages that displayed all of the typed words; but as I can't imagine that there are more pages with all six words than with just five of them, I'm confused. Can someone explain quickly what I'm misunderstanding? Nyttend (talk) 12:21, 9 April 2009 (UTC)[reply]

I've found this before. Some of the rerturned results are pages that have the search words in links to the page, so that might have something to do with it. LHMike (talk) 13:51, 9 April 2009 (UTC)[reply]
Google result counts are an estimate: explanation. --205.174.162.243 (talk) 16:06, 9 April 2009 (UTC)[reply]
"Estimate" is giving it too much credit. There are cases where it estimates 100,000 hits when the actual figure is closer to 100. For example, "regulatory region" and "regulatory sequence". -- BenRG (talk) 20:11, 9 April 2009 (UTC)[reply]

Does SQL server have view constraints?

Does SQL server (2005) have view constraints? I'm not interested in the WITH CHECK OPTION or having it actually enforce the constraints, I'm more interested in being able to extract the metadata. I'd like to put a primary key (and not-null) constraint and a foreign key constraint on one column, and a not-null/unique constraint on another column. (haha you can do this with Oracle :)).--205.174.162.243 (talk) 15:50, 9 April 2009 (UTC)[reply]

Knoppix and Virtual PC

Problems!

I'm having trouble booting a Knoppix CD with a virtual machine under Virtual PC 2007. When I boot Knoppix 5.1.1, the Knoppix splash screen does appear, then the screen goes black and the Virtual PC window size gets larger, and a penguin appears in the upper left. Usually at this point the system appears to hang forever. Sometimes, it gives the "Welcome" string, says it's enabling DMA acceleration for hda and hdb, and then it gives an IO error when "Accessing KNOPPIX CD at /dev/hdb".

When I try typing "dos" from Knoppix's boot prompt, I get the error message, "Cannot load disk image (invalid file)?".

I've tried booting the physical CD and the iso image and gotten the same issue. One odd thing is that I've used Virtual PC's disk wizard to specify that the virtual disk image should be 20GB, but Windows reports the .vhd file to be 42K in size ... but I hadn't thought this would matter with a CD-booting Knoppix.

Thanks in advance for any help - Tempshill (talk) 16:14, 9 April 2009 (UTC)[reply]

Postscript: I have been able to boot from an Ubuntu CD in this same Virtual PC setup. Tempshill (talk) 22:15, 9 April 2009 (UTC)[reply]
...Ubuntu ftw —Preceding unsigned comment added by 64.30.106.235 (talk) 06:41, 12 April 2009 (UTC)[reply]

OpenOffice Writer Copright Symbol

When I type (c) into a sentence in OO writer, it autocorrects this into a copyright symbol. Would be great if that's what I wanted. However, I'm writing about a piece of legislation and I wish to mention sections and paragraphs e.g. section 4 (3) (c). I can't seem to turn it off! Fribbler (talk) 16:21, 9 April 2009 (UTC)[reply]

I'm sure there's a technical way of doing this, but the following works: type 4(3)fc) and then go back and change the f to a ( ╟─TreasuryTagcontribs─╢ 16:24, 9 April 2009 (UTC)[reply]
You can remove the autocorrect by going to Tools -> Autocorrect and click on the Replace tab. Just delete the autocorrect there. Livewireo (talk) 16:26, 9 April 2009 (UTC)[reply]
TreasuryTag's suggestion worked, albeit non technical :-). However, the replace tab itself contains nothing. No custom Autocorrects. Nor can I see it on the list in the Word Completion tab. Fribbler (talk) 16:32, 9 April 2009 (UTC)[reply]
Still slightly non-technical... why don't you try creating a custom Autocorrect for (c) to (c) - 'replace' it with itself, see if that overrides whatever's causing the copyright symbol to appear. ╟─TreasuryTagcontribs─╢ 16:34, 9 April 2009 (UTC)[reply]
Unfortunately not. I'd guess it was replacing (c) with (c) and then applying it's own autocorrect . Fribbler (talk) 16:43, 9 April 2009 (UTC)[reply]
Look again in the "Replace" tab. Either it's there or you are using an odd version of OpenOffice. You'll also find various other horrors thereabouts. (About the first thing I do when installing OOo somewhere is to uncheck "Replace 1st with 1^st", a horrible notion that, like much that's bad in OOo, apes what's bad in MS Word.) -- Hoary (talk) 17:07, 9 April 2009 (UTC)[reply]
I haver solved the mystery. My replace tab said "replacements and exceptions for language: English(Eire)" whereas I was typing my document in English(UK), where the copyright autocorrect exists. I changed the whole doc to Éire (why didn't they use "Ireland"? Éire is so Daily Mail) and problem is solved. Fribbler (talk) 17:21, 9 April 2009 (UTC)[reply]
Another workaround could be to type (c) in Notepad, copy it, go over to OpenOffice, and paste it? 24.16.106.217 (talk) 17:35, 9 April 2009 (UTC)[reply]
Yet another workaround would have been to do a global search and replace of © to (c) when you'd finished typing. --Sean 17:55, 9 April 2009 (UTC)[reply]
Also, pressing Ctrl-Z after an autocorrect will undo it and stop it from happening again during the session. --jh51681 (talk) 08:32, 10 April 2009 (UTC)[reply]

Internet connection sharing

I have a Windows XP computer with an ADSL internet connection and I'm trying to share that wirelessly with my Windows Vista laptop. I'm pretty sure I have all the settings correct on the XP machine with the internet connection shared over the wireless connection, and the Vista machine is connected to the ad hoc network and it's aquiring an IP address correctly (with correct default gateway, etc.), but Vista apparently can't see the internet connection, it says the wireless network is "Local only". Any ideas? Is there something I need to do to tell Vista it should look for an internet connection on that wireless network? Thanks! --Tango (talk) 19:32, 9 April 2009 (UTC)[reply]

Just gots to [BestBuy] and gets a wifi router —Preceding unsigned comment added by 64.30.106.235 (talk) 07:28, 12 April 2009 (UTC)[reply]
I would love to, but I'm not allowed to change the way my grandfather's computer is set up too greatly or we'll worry him (or so I'm told...). --84.71.164.106 (talk) 16:45, 12 April 2009 (UTC)[reply]

DVD/CD-ROM Drive Name

I recently installed and played Rome: Total War under Sandboxie. Because all the changes to the disk were sandboxed, nothing was written the rest of my hard drive and I easily wiped off 2 GB of data in the sandbox today. However, now when I open "Computer" from the start menu or look at "Computer" from any Windows Explorer window, my DVD/CD-ROM is displayed as "DVD RW Drive (F:) SEGAROME" and it has the Rome: Total War icon next to it rather than the standard Vista CD drive icon. How do I revert to the old name and icon? [Old name was "DVD RW Drive (F:)" with the standard Vista CD drive icon]--Xp54321 (Hello!Contribs) 21:27, 9 April 2009 (UTC)[reply]

Never mind. I fixed it myself. All you have to do is edit the registry. Create a text file like this:

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\F\DefaultLabel]
@=""

[Change the file extension to .reg afterwards and the file is now a registry script that can be executed.]

This reset the drive name to "DVD RW Drive (F:)" and also reset the drive icon. This can be used to customize your optical drive names and also the icon for the drive. Simply point it at your preferred icon: @="youricon.ico" Don't forget: "Explorer\DriveIcons\YourDriveName\DefaultLabel" Otherwise it has no effect as you'd be renaming the wrong drive. ;)

Cheers! --Xp54321 (Hello!Contribs) 21:58, 9 April 2009 (UTC)[reply]

DHCP Problem

I have a Dell XPS running Windows Vista. I work in an environmental consulting firm. I travel a lot. I connect to an average of 5 different networks per month. 2 of these networks do not have a DHCP router. To connect to these i have set up the Alternate configuration for my NIC. I am having a problem when i try to connect to one of my networks that does have a DCHP router. When first plug in the network cable my computer takes a while trying to get an IP address before it tells me that it has Limited Connectivity. I have to "repair" the connection before it will finely grab an IP address from the DHCP router. This takes about 20 minutes and it really getting annoying. There is nothing wrong with my network cable or the cable going to the switch. There is nothing wrong with the DHCP server as my computer is the only one that has this problem (maybe because i am the only one on the network that has an Alternate Configuration). But the other computers on my network does take about 5 to 10 seconds to grab an ip address. This problem with my computer only happens when i try to connect to this one network, does not happen on any other network i have tried. This includes my network in Peru, Chile, My internet at home, The internet in hotels, The internet at internet cafes; They all work just fine. I suspect that the problem is with my DCHP router, i think that it's taking it's time to issue an IP address. So my question boils down to this: Is there a way that i can make Vista wait longer before trying the Alternate Configuration? Thank you. – VectorEng. Inc. 21:52, 9 April 2009 (UTC)[reply]

I might consider writing a little batch ("xxxx.bat" in a text editor like notepad) that does the following:
ipconfig /release
ipconfig /renew
Run the batch file when you first connect the the network and see if it gives you an address right away.NByz (talk) 02:27, 10 April 2009 (UTC)[reply]
Why would your router take it's time to respond? Could it's speed be increased? —Preceding unsigned comment added by 64.30.106.235 (talk) 07:05, 12 April 2009 (UTC)[reply]
This might be of some help.Spammeristatic07 (talk) 22:44, 13 April 2009 (UTC)[reply]

Ubuntu Question

In ubuntu when i type in 'ifconfig' it lists my network conections. My question is; Is there a way that i can change the name of one of my network cards? Right now my wifi card is named "Wlan0" and i would like to change it to "eth2". Thank you. – Elliott(Talk|Cont)  22:04, 9 April 2009 (UTC)[reply]

I initially thought that the best way to do this might be by creating an alias (which is discussed in the ifconfig man page), but I think you might want to look at this instead, as it might be more directly what you're trying to do. Shadowjams (talk) 05:58, 10 April 2009 (UTC)[reply]

Ubuntu and Virtual PC and networking

I've installed Ubuntu 8.10 in my Virtual PC 2007 setup. I'm able to ping external websites by specifying their names ("ping www.yahoo.com" resolves to f1.www.vip.sp1.yahoo.com, for example, and it sends all the packets and shows the ping times) but Firefox and wget are never able to connect to websites. Firefox is "Waiting for www.yahoo.com" forever. Any ideas on how to troubleshoot this? Thanks in advance - Tempshill (talk) 22:20, 9 April 2009 (UTC)[reply]

I am not sure what would be wrong but you should update your copy of ubutnu, you can do this from the command line: sudo apt-get update – Elliott(Talk|Cont)  23:26, 9 April 2009 (UTC)[reply]
I downloaded it 2 days ago and doubt that an update is needed. I did try, and got an error staying it was unable to lock the list directory. Tempshill (talk) 21:56, 10 April 2009 (UTC)[reply]
I would strongly suggest you tried Ubuntu on other VM, like VMware Workstation (closed source, non-free) or VirtualBox (open-source and closed-source, but free/gratis), they are much better than Virtual PC... SF007 (talk) 03:52, 12 April 2009 (UTC)[reply]
I tried VirtualBox and it just works! Thank you! Tempshill (talk) 23:17, 13 April 2009 (UTC)[reply]

Random word generation

I've got an old handwritten text that I can only partially decipher. I thought that if I could find a way to generate all the possible combinations of words I could, by process of elimination, figure out what it is. Is there any way I could do this? I know roughly the length of the word, and what some of the letters are (It's something like "???i[n?]ly", where the ?s have no ascenders or descenders). Is there any easy way of doing this? 76.117.247.55 (talk) 23:33, 9 April 2009 (UTC)[reply]

Maybe a photo or screen shot of this text whould be very helpful. !– Elliott(Talk|Cont)  23:41, 9 April 2009 (UTC)![reply]
You might consider a crossword dictionary for this. Good luck! — Zazou 23:49, 9 April 2009 (UTC)[reply]
You could try to get a large (complete?) list of words in the relevant language (from Wikisource perhaps? Or the index of Wikipedia, if that's feasible), learn regexp, and search for the regexp equivalent of "???i[n?]ly" in the large list of words. I'm sure a simple Perl script could then output all the matches. I don't know the exact details of these things, though, but to my eyes they look pretty simple to learn if you're determined. Jørgen (talk) 23:53, 9 April 2009 (UTC)[reply]
I don't want to ask assistance with the word itself, only to try and find out if this is possible. I will try the xword puzzle solver though. Thanx, 76.117.247.55 (talk) 23:59, 9 April 2009 (UTC)[reply]
Less information has been used to successfully uncover redacted text [4]. You might want to review the field of document analysis of handwritten manuscripts. – 74  03:08, 10 April 2009 (UTC)[reply]
Using the online crossword dictionary and the criteria above then for the version without the contents of the brackets the results are (sorry output was in uppercase): AIRILY COSILY COZILY EASILY EERILY MAZILY NOSILY OOZILY RACILY ROSILY SEXILY SICILY TINILY VERILY WARILY WAVILY WAXILY WIRILY - assuming that "z" is written without a descender. For the version that includes "n" alone then only one word is returned: PLAINLY but as this is ruled out as it has a descender. It could also be a name such as Emily. If the ? after the "n" signifies a character, then all the words returned include ascenders or descenders. You may also be interested in regular expressions. 89.243.179.4 (talk) 00:03, 15 April 2009 (UTC)[reply]


April 10

Compressing my old music

I was thinking just now about how valuable my music collection is to me. I've been keeping it exclusively on an external hard disk. and it is taking up about 60 GBs. I've worked very hard to put this collection together and I'd be a tad destroyed if I were to lose it (even just the Table of Contents from the drive). I have another 250 gb drive that I use for media.

I'd like to do a backup of this music on my media drive. What is the best compression format for a collection of (mostly) mp3s 60 GB in size? NByz (talk) 02:30, 10 April 2009 (UTC)[reply]

Mp3s are already compressed; further (lossless) compression is unlikely to yield a significant reduction in size. Your best bet is probably just to copy the entire collection to the second disk. – 74  02:39, 10 April 2009 (UTC)[reply]

Broken XP

A friends computer encountered a stop error(0x00000021a). Anyways, the only way to get access to his hdd was to hook it up to one of my computers as a slave. I removed any spyware that I could find off of it and replaced winlogon, csrss, msgina. At any rate, none of these things helped. My best guess is that there is something nasty loading up at boot or something wrong with the registry, thus, this is my question: is there any way to access the registry or modify the startup programs for the copy of windows on the drive when it is set up as a secondary drive? (Obviously, attempting to do this the usual way only allows me to change the settings for my primary drive.) Thank you for any help:) Phoenix1177 (talk) 04:15, 10 April 2009 (UTC)[reply]

Have you tried safe mode? Or an on-top reinstallation of XP? F (talk) 09:59, 10 April 2009 (UTC)[reply]
It won't go into safe mode, that's why I had to hook it up to a second computer. I, unfortunately, don't have any of the windows disks to do a reinstallation. If I could just edit the registry of it from the second computer, I could fix it; I'm almost positive what the problem is. Unfortunately, I don't know how to get at the registry since its not the registry being used by Windows on the computer the drive is a slave to. Is it possible to edit by directly manipulating the files the registry is stored in? 66.202.66.78 (talk) 10:19, 10 April 2009 (UTC)[reply]
I would try putting the hard disk back in the original computer, and booting it with BartPE or some other "rescue" boot disk, and see if that allowed you to eventually fix the problem. See also List of live CDs. The free virus program Avast! allows boot-time virus scanning, but I do not know if it would work with a "rescue" disk. When I tried different memory in my computer, and indavertantly swapped the order of the memory in the slots, that produced similar problems. Another problem where I could only boot into safe-mode was caused by a defective video driver or videocard - disabling it solved the problem. 78.147.135.185 (talk) 22:52, 11 April 2009 (UTC)[reply]
May i suggest teh of teh live cd BackTrack? —Preceding unsigned comment added by 64.30.106.235 (talk) 06:32, 12 April 2009 (UTC)[reply]

Disc space

Can I increase the space of an already created disc drive?I did an idiotic thing by creating a small 4.87GB drive for storing the system files and the program files.Now it is almost full leaving a paltry 32MB.I am not able to install MS office since it requires 100 MB space on the drive in which the system files are stored.I think it is compulsory that it should load its files only on the system files drive.Is there any other way out? —Preceding unsigned comment added by 59.165.84.9 (talk) 04:16, 10 April 2009 (UTC)[reply]

Your question appears to make sense, but actually doesn't. I seriously doubt you created a disk drive. Did you create a partition on a drive? If so, you can resize partitions (there are many programs that do it - just Google for "resize partition"). If you want to change the size of an actual drive, you are out of luck. That will require taking it apart and replacing all the insides - which is far more expensive and difficult than just purchasing a larger disk. Do you want to install a second drive? That will help. However, Windows will not automatically use it. You need to manually move files to the second disk. However, only move things such as music and movies. If you move executable programs, you will cause problems. The registry knows where the programs currently reside and will not realize they just moved to another drive. If you can make your question clearer, please do. Then, someone can provide a better answer. -- kainaw 04:23, 10 April 2009 (UTC)[reply]
Apologies to Kainaw, above, but while your question appears not to make sense, actually it does. Or anyway it does if your "32GB" is, as I suppose, a mere typo for "32MB", and if, like many people, you are a bit hazy about the distinctions between partitions and logical drives. Still, it's likely that you created too large an additional partition (whether primary or extended). Yes, you can get software that will adjust the boundaries separating partition from partition, decreasing the size of what's unnecessarily large and adding this to what's too small. It's a very long time since I've done this but if my memory is working right this might involve some time and disk thrashing. Typically there's an awful lot of junk in C: and also a lot of material in C: that you do need but that could go elsewhere. (For example, where are your browsers? Where's your mail program, and where are your mailboxes? On my sole surviving Windows machine, whose C: drive is roughly the same size as yours, they're all in E:, not C:. And, before I deleted it [because I never used it and wanted the space], MS Office too was running off a combination of C: [a bit] and E: [a lot].) Incidentally, OpenOffice requires little or no space on C:. -- Hoary (talk) 05:16, 10 April 2009 (UTC)[reply]

Partition editor —Preceding unsigned comment added by 82.43.88.87 (talk) 06:48, 10 April 2009 (UTC)[reply]

Yes, and for junk removal see nLite and vLite and XPLite. -- Hoary (talk) 09:11, 10 April 2009 (UTC)[reply]
Before you go messing with the partitions, it would be a good idea to back up the entire system including the 4.87GB drive. Pay particular attention to your documents, photos, music, emails, and internet bookmarks - ie. the stuff that is real hard (or impossible) to get back if it gets deleted. Astronaut (talk) 15:01, 10 April 2009 (UTC)[reply]

WLM & dll problems

i can't sign into my WLM (windows live messenger) accounts no matter what client I'm using (WLM 2008 8.5.1302.1018 and Pidgin 2.5.5). I get error code 80048820. I tried the steps on this site but when i try to register wintrust.dll i get the error 0x80070005 and am told by my computer to do an internet search to fix it. well um, screw that; an internet search only comes up with forum posts of people who have the same problem but don't know how to fix it. cursory googling tells me this might have something to do with 1. cookies, 2. windows defender, 3. permissions or possibly all of the above. can anyone help me? i am an MSN addict I need my freaking MSN. 99.245.16.164 (talk) 04:28, 10 April 2009 (UTC)[reply]

Using sed to remove characters

I would like to have sed remove a specific character. The twist is, I need to be able to remove it only when it appears in a certain context. For example, I want to remove dashes from numbers in a document: [Document 000-00000-000-000000-00], but only when they appear in a certain context (with brackets and the word document before it, for instance). I know how to do this if I know the number of dashes, and I know how to do it if I wanted to remove all of the dashes in the document (tr -d '-'), but I don't know how to make it work if I want to remove all dashes that fall inside of some standard formatting, without actually knowing where and how often the dashes will occur. Any ideas? Other basic unix utilities that will do the same job are fine, but I don't want to get any more complex. Thanks. Shadowjams (talk) 05:37, 10 April 2009 (UTC)[reply]

One way would be to write some code to remove the first dash found inside those brackets, then put that code in a loop and run it as many times as the maximum number of dashes which might occur on such a line. This isn't the most efficient approach, but, if performance isn't a problem, it might be the simplest. StuRat (talk) 14:31, 10 April 2009 (UTC)[reply]
This'll do it:
perl -pe 's/-//g if /^\[Document.*\]$/'  file.txt
--Sean 15:23, 10 April 2009 (UTC)[reply]
Thanks. Perl works perfect. I knew I could put the whole thing inside of a loop, but I wasn't sure how to do that loop in bash and have it exit after it had finished, but only after it had finished removing all of the dashes. Come to think of it, perhaps I could use grep to do that search, but it looks like that perl will be more efficient. Shadowjams (talk) 23:33, 10 April 2009 (UTC)[reply]
Here's one in Sed:
sed '/^\[Document [0-9-]*\]$/s/-//g' file.txt
or if you want it to work with [Document] entries embedded in text, not just on a line on their own, you can use a loop though you have to split the sed script across multiple lines:
sed '{:a
s/\[Document \([0-9]*\)-\([0-9-]*\)\]/[Document \1\2]/
ta
}' file.txt
Awm (talk) 22:14, 11 April 2009 (UTC)[reply]

Computers Languages

I want to build a base strong in computer languages. I want to learn Python;Lisp;Perl;Javascript;Java. Can someone suggest me books available in India for deep knowledge of these above mentioned languages? —Preceding unsigned comment added by Ingineered (talkcontribs) 06:57, 10 April 2009 (UTC)[reply]

I am not a programmer. Nevertheless.... There's learning, and there's deep knowledge: they're different. In your position, I'd start by learning the basics of one language, and for that purpose I'd ask about a good introductory text (which might be one that allows for deep knowledge). With my elementary but functional understanding of one language, I might want to explore the language further or I might want to move on to another language. If you don't know which language to start with, I'd choose the one that's most likely to let you achieve something that you want to achieve in the short term: that will be a powerful incentive for practicing. Of course, there may be texts that are good introductions and also examine theory and go into advanced areas, but they're likely to be big, so they're likely to be expensive, and if after you have consumed 20% of a large, wonderful and expensive book you decide that the language is not the right one for you, you may wish you hadn't spent all the money. -- Hoary (talk) 09:25, 10 April 2009 (UTC)[reply]
My advice is to start actually writing code in a single language. It makes learning far more rapid and deep. Write larger and more ambitious programs. The point of a university education in computer science with an emphasis in programming isn't to teach graduates all the details about every computer language, but to teach them how to program. Once they know how to program in one language, it only takes 2 or 3 weeks for the graduate to learn 90% of what he needs to know about any new language. Anyway, learn to code by writing code. This link is Microsoft's free Visual Studio Express versions; one is for BASIC, one is for C#, and one is for C++. Tempshill (talk) 16:45, 10 April 2009 (UTC)[reply]
www.infibeam.com/Books/ is an India-specific online bookstore. If you search on the various programming languages you are interested in, these appear to be the exact same books I see in the UK and US - so I don't think there are special recommendations required here. Personally, I like the O'Reilly books - (they all have white covers with line drawings of animals on them) - those are great for delivering the information with the minimum of extraneous junk - and they remain good reference material, long after you've basically grasped the language.
If you are already a programmer (ie if you already understand one language pretty well) - then this is certainly the way to go about picking up these other languages. However, if you are not already pretty competent with at least one language - then I strongly agree with Tempshill that you should concentrate on just one language because first you have to learn how to program...and in a sense, that's independent of the language you choose. So pick one (I'd suggest Java) - study it and write as many programs as you can...the only way to get good at programming is to do a LOT of it!
After you've been writing programs with one language every single day for at least a year - you can call yourself a "programmer" and start looking at learning a second programming language. The second language you learn will be tough because while some things will translate pretty cleanly from one language to another - some things have to be "unlearned" because they are different or do not apply at all for your second language. At this point, you don't know what things are true of pretty much all languages - and which were unique to the first one you just happened to learn. However, after a couple of months - you'll have that second language down pretty good and you can start looking at more and more additional languages.
Eventually, you'll be able to learn a new language in just a couple of days and become fluent in it after just a few weeks of practice - but that's mostly because you'll be saying to yourself: "Oh! That feature is just like JAVA and this other feature is just like Python..." etc - so the more languages you know, the easier it is to learn another. I have literally lost track of the number of languages I know. It has to be more than 30...but then I've probably forgotten a good number too. There comes a point, where you really don't bother to learn new languages unless you absolutely need them. Sure, I know enough 'Python' to get by - but since I can do nearly everything I want in C++, PHP and JavaScript - I very rarely need to serious amounts of work in Python, Java, Perl, etc. Hence, my need to retain details about those languages is much less since I pretty much only need those skills for debugging and extending existing programs written by someone else. This weekend I learned MEL (so I can write scripts in Maya) - I didn't even bother with getting a book - the online documentation was enough. I doubt I'll ever write more than a few thousand lines of MEL...but it didn't take much to pick it up and there are a few tasks I have to undertake for which it's the only language available...so I have to learn it. SteveBaker (talk) 07:21, 12 April 2009 (UTC)[reply]

Files not played (Q moved from entertainment desk)

Hello. When i open a .avi movie with any of my players, i am just getting a black screen. The audio is coming fine, but no video. Please help me. Files that have played well previously are also now facing the same problem. —Preceding unsigned comment added by Rkr1991 (talkcontribs) 07:43, 10 April 2009 (UTC)[reply]

Have you tried VLC Player? That seems to play .avis pretty well. --Richardrj talk email 08:05, 10 April 2009 (UTC)[reply]

I have tried all players in the world! Including VLC player. The files played very well previously are also facing this problem. What do i do? —Preceding unsigned comment added by Rkr1991 (talkcontribs) 08:11, 10 April 2009 (UTC)[reply]

Well, it sounds to me like you have a codec missing. I don't know much about this, but until someone more knowledgeable comes along you might want to have a look at Video codec. --Richardrj talk email 08:30, 10 April 2009 (UTC)[reply]
I don't think it's likely be a codec problem, especially if they were playing before and now aren't. VLC plays pretty much anything, so if that's not working either then I'd look somewhere else for the problem, perhaps some sort of graphics card error? I don't know. —Preceding unsigned comment added by 82.43.88.87 (talk) 13:31, 10 April 2009 (UTC)[reply]
I'd recommend downloading GSpot and opening the AVI file in that. It'll show you what codec the video is using (even if you don't have it installed) and with that we'll be able to work out where to go next. ZX81 talk 15:12, 10 April 2009 (UTC)[reply]

Facebook ?

If I am logged into Facebook, search for somebody by name, and click on the profiles that come up to get more details, will those people know that I have been checking out their profiles, even for example under the "other people you might know" section ? Don't worry, not up to anything nefarious, just want to avoid embarassment ! Thanks ! --41.15.58.173 (talk) 09:45, 10 April 2009 (UTC)[reply]

No. F (talk) 09:57, 10 April 2009 (UTC)[reply]
Short answer; No. Long answer; Maybe. To elaborate on the long answer; It is possible for that person to find out who has looked at his profile, But he/she must have access to FaceBook's logs or your personal computer's logs. several ways this person could obtain this, either by directly hacking FaceBook's computers or by hacking your computer. Another way would be if your computer is infected with malware, where this malware uploaded your browsing history to some website, and that website desiced to try and blackmail you with that information... highly unlikley but it is not infeasible. If you are really parenoid then i'd suggest you try and go though a proxy server... or go to a puplic libarey ... or take a laptop up to an open (or, using aircrack, closed) network and look from there... —Preceding unsigned comment added by 64.30.106.235 (talk) 06:26, 12 April 2009 (UTC)[reply]
What they mean to say, is no, unless they have the technological knowhow to hack into facebook and find out. —Preceding unsigned comment added by Yakeyglee (talkcontribs) 00:41, 13 April 2009 (UTC)[reply]

Is it possible to have a dynamic ip for one wireless network and a static ip for an other without having to change the settings each time you connect.

Well it's basically all in the subject line. I want a static IP in one wireless network and dynamic ip in the other ones, how do I do it guys? Bastard Soap (talk) 13:32, 10 April 2009 (UTC)[reply]

You could write shell scripts that configure the network interface. The details depend on your operating system; here are samples for Windows[5]. Write two .bat files, one for static and one for DHCP, and place shortcuts to them on your desktop for quick access. For more instructions and other operating systems google is your friend: [6]. 88.112.62.225 (talk) 08:52, 11 April 2009 (UTC)[reply]

Reusing laptop DVD drive

I recently dismantled a broken laptop for spares. One thing I thought would be useful was the CD/DVD drive, which I imagined I could reuse in an external enclosure. Unfortunately, the connector on the back of the drive doesn't seem to be compatible with the external enclosures I've seen in my local computer accessories or on eBay. The connector looks like this, but all I can find is enclosures with standard IDE or SATA connectors. Does the connector on the drive have a specific name that I should be searching for?

Ideally, I'm looking for a slim enclosure that doesn't need an external power source - ie. it draws power via the USB connection. I've seen such a thing for sale, but it already has a drive fitted and is quite expensive. Does anyone have any hints on how to find just the enclosure? Thanks. Astronaut (talk) 13:34, 10 April 2009 (UTC)[reply]

Sorry, don't know what connector that is and can't quite make out the model number on the label in order to Google that model number and find out what sort of connector it is. One point that comes to mind, though, is that new DVD-ROM drives cost US$30 currently, and DVD±RW drives cost only US$10 more, and any enclosure you buy is likely to cost around US$25 at least ... so this used drive is probably not worth converting into a working drive. Tempshill (talk) 19:41, 10 April 2009 (UTC)[reply]
I'm pretty sure the connector is standard across many (or maybe all) laptops. I just don't know what it is called.
I know I can buy a new external DVD drive in an enclosure for around £40, but this is actually for a friend who is on a very limited budget. I thought that since I can buy an empty external enclosure (IDE or SATA) for about £10, I should be able to get a similar thing to take the old laptop DVD drive for a similar price - and that is much closer to the budget my friend has in mind. Astronaut (talk) 00:49, 11 April 2009 (UTC)[reply]
Do these look like it: [7][8]. 88.112.62.225 (talk) 08:46, 11 April 2009 (UTC)[reply]
Yes, that's exactly what it is like. So it's a 50-pin JAE.
I'll try to find an external drive enclosure for a slim DVD drive, or failing that get a JAE - IDE adapter and try a regular IDE drive enclosure. Astronaut (talk) 11:33, 11 April 2009 (UTC)[reply]

Linux devices

I'm quite a linux newbie and one thing has been puzzling me about the devices in /dev. If I connect a device it needs to be mounted using a command like mount /dev/??? /mnt/somewhere When I connected an external IDE disk drive via a USB cable, I looked up and down the many devices in /dev and nothing hinted at which device I should mount. It was only when I looked in /etc/fstab that a comment line suggested to me that external USB drives were /dev/sda1, /dev/sda2, etc, and I successfully mounted the drive. But, is there a way I can tell which device in /dev is the one to which my physical device is actually connected to? Astronaut (talk) 15:21, 10 April 2009 (UTC)[reply]

There is some variability, but there are guidelines about how things are listed in /dev . IDE hard drives and CD drive will generally be listed as hda, hdb, etc and the number after it is the partition number. SCSI drives are listed like sda, sdb, etc (USB disks will also be listed like this because Linux tends to use SCSI emulation). Other devices have handy shortcuts like /dev/audio, /dev/cdrom, etc. Have a look at Device_file#Naming_conventions for the specifics. Freedomlinux (talk) 15:41, 10 April 2009 (UTC)[reply]
SATA drives are also listed as sda, sdb, etc.  Buffered Input Output 12:52, 13 April 2009 (UTC)[reply]
The easiest way is to use dBus to detect when external drives are added/removed. The hardware abstraction layer (HAL) sends a signal along the system dBus which all programs can see (this is how Nautilus realises usb sticks/cds have been inserted). --h2g2bob (talk) 17:33, 10 April 2009 (UTC)[reply]
dev has loads of devices other than just disk drives. The naming convention in MOST linux setups is to use sd for sata, then a sequential letter for a drive, and a sequential number for the partition. So sde1 is the fifth sata drive, partition one. IDE drives are usually hd with the same drive and partition sequencing. The simplest way to determine what node a device is assigned to is to take a look at "dmesg" which is a copy of the recent kernel messages. Just type dmesg at the shell, and it might help give you some hints as to the device. Shadowjams (talk) 02:38, 11 April 2009 (UTC)[reply]
See also udev, which (when you have it) reduces the confusion by dynamically creating the device files that correspond to what currently exists. It's still a bit inobvious how to determine which device is which, but it helps; the /proc and /sys information directories can also be of use, although there's a lot to sort through in them. --Tardis (talk)
When I'm curious about which device file corresponds to something I just plugged in, I run "tail /var/log/syslog" (on some systems syslog.0). Usually some diagnostic messages about the device being detected will be printed there, and they usually mention the device filename. Indeterminate (talk) 10:43, 12 April 2009 (UTC)[reply]

Failed emails which I never sent

Logging into Windows Live Messenger today, I find myself with 19 emails. Surprised, I check them to find that they are delivery failure notices. Every invalid address on my contact list is contained within these 19 emails which tell me the message I sent failed to reach them. My first thought was that someone obtained the email addresses (presumably by somehow obtaining my password) and emailed everyone. This would seem to be confirmed by the list of addresses at the bottom of each failure notice; the list is of every address the email was sent to, and between them, the 19 emails contain every contact I have.

However...

I've contacted several people who are on the lists at the bottom of the emails. None of them receieved the email.

Can anyone explain this? Vimescarrot (talk) 18:19, 10 April 2009 (UTC)[reply]

I get these phantom failure notices all the time, and have for years. There are a couple of possibilities. (a) Your system has been infected with a computer virus or some other malware that read your address book, and then sent copies of itself to everyone on that address book (or maybe just sent them Viagra ads). (b) A friend of yours has been infected with similar malware, and the malware signed each outgoing e-mail with your e-mail address, as though you personally had sent it. (In case (b) here, your computer itself was never involved; the malware just found your e-mail address in your friend's address book and thought it would be fun to pretend you had sent the e-mails.) I would scan your computer with two anti-malware scanners, for safety, and if nothing is found, then just ignore these phantom failure messages. Tempshill (talk) 19:32, 10 April 2009 (UTC)[reply]
(edit conflict) - Spammers will often "spoof" a valid email address in hopes of getting more views once their own accounts have been flagged as a blacklisted account. That basically means - someone else used your email address as the return address for some spam they sent out. You can try to track IP numbers and report them to various ISP's, but in the long run it's going to be a lot of work with little result. I just delete those messages myself. — Ched :  ?  19:35, 10 April 2009 (UTC)[reply]
Don't forget that these email messages contained my entire contact list; somehow, they had access to my account; they weren't just using it as a return address. I scanned four days ago and did nothing out of the ordinary since then; is it really worth scanning again? Vimescarrot (talk) 19:43, 10 April 2009 (UTC)[reply]
If you just saw the failure messages today then maybe it's scenario (a) above. Yes, scan again; it doesn't hurt. And scan with an alternative program, too; all malware scanners have different approaches and find different things. Tempshill (talk) 21:55, 10 April 2009 (UTC)[reply]

Executables files on Linux (ELF)

I was just wondering if ALL executable files that run on Linux (Ubuntu, Fedora, Debian, etc...) are ELF files? PS: I am not counting with scripts (nor stuff like wine to run .exe files) Thanks -- SF007 (talk) 20:32, 10 April 2009 (UTC)[reply]

No, they could also be a.out or a number of others. If you look at the files called binfmt_XXX.c here, each one implements a different binary format. --Sean 22:27, 10 April 2009 (UTC)[reply]
In practice, however, a modern system will only have ELF binaries - the a.out article says that Linux's a.out implementation was unsuited to shared libraries, and was phased out fairly early on in Linux history.
The binfmt-related kernel config options show what's available, and include the message:
"Linux used the a.out formats QMAGIC and ZMAGIC until they were replaced with the ELF format. The conversion to ELF started in 1995. This option is primarily provided for historical interest and for the benefit of those who need to run binaries from that era."
An interesting point is that "binfmt_script" is what implements shebang handling, and binfmt_misc allows binding various kinds of magic to interpreters or virtual machines, so the kernel can execute a Perl script or Java class in much the same way as an ELF or a.out binary, blurring the distinction made in the original question. - IMSoP (talk) 23:04, 10 April 2009 (UTC)[reply]

April 11

Common displayable Unicode mathematical symbols

Sorry if this belongs in the Math section, but it kind of seeps into both. I was wondering what are the most commonly displayable. Sure, most of them can display whatever's on the keyboard, but what else? Some computers back in the day were capable of displaying things like ², «», ±, °, √, ≤, etc. Now, they have much more advanced functionality, capable of displaying obscure symbols like ►,₪,↔,∕,⌡,∂,⅝, etc. But what's the limit to these symbols? Would they be able to display Unicode characters like ⁶ (superscript 6),₍ (subscript left parenthesis), or even ℏ (reduced Planck's constant)? I don't think so. So what would be the most common set of characters that would be compatible to computers back to say, the Windows 98 era? Obviously it would be different from computer to computer, but I'm asking just for the general sets. The use of images aren't acceptable in my case. I greatly appreciate your help! Thanks so much. 141.153.214.155 (talk) 02:31, 11 April 2009 (UTC)[reply]

Off the top of my head: Windows 98 didn't support Unicode via UTF-8, let alone any other character encoding system. A US-market copy of Windows 98 supported character set X, whereas a Japanese-market copy supported set Y. Not "X" or "Y" of course, but I forget what the names were -- all of this stuff is available for the searching within a certain online encyclopedia -- but anyway X didn't even include the Cyrillic alphabet, let alone fancy-schmancy maths symbols. What people did was to use odd, nonstandard fonts that substituted particular nonstandard symbols they wanted to use for those that they didn't want. Thus (imaginary example) Bludoni (which included ê and ç, though not ŏ or ą) might have had an additional Bludoni Math, with maths symbols taking the place of ê and ç and so forth. It was all rather nightmarish and I'd say you'd have to be perverse or masochistic to want to relive it. -- Hoary (talk) 04:05, 11 April 2009 (UTC)[reply]
I'm pretty sure that Windows 98 didn't only support ASCII, however. I think it used the localized variations of ISO/IEC 8859. See the table in that article; it looks like what you probably want. Column 1 is the most commonly used, the Western European set. Indeterminate (talk) 10:32, 12 April 2009 (UTC)[reply]
Win9x didn't support Unicode in file names or in the standard GUI widgets (buttons, edit boxes, etc.) but it did support Unicode text rendering (TextOutW was implemented). Some applications (including the major web browsers and word processors) took advantage of this and provided full Unicode support. But typical applications were limited to the system default code page, which was an extended ISO Latin-N in many countries but certainly not all. I don't think there's a single non-ASCII character that's found in all of the widely used code pages. -- BenRG (talk) 16:21, 12 April 2009 (UTC)[reply]

Music Player Site

Is there some sort of website in which you can somehow enter musical notes and it will play the music? --Nick4404 yada yada yada What have I done? 03:32, 11 April 2009 (UTC)[reply]

How about Musipedia? Oda Mari (talk) 04:43, 11 April 2009 (UTC)[reply]

Right-justified text in text box

Sometimes when I am editing Wikipedia, I accidentally press some key combination that causes the text in the text box to become right-justified. Similar to when you edit in Wikipedias where the writing is right to left (e.g. Hebrew, Arabic). The keys involved are some combination of :

  1. CTRL and (ALT or SHIFT)
  2. and:
    • some letter(s) in the lower left (on a QWERTY)
    • or (the left arrow xor right arrow)

This is probably more detailed than necessary, since some of you may already know the combination. What key combination causes this, and what key combination do I need to press do undo this? My current solution is to open a new window, and copy and paste my progress into that. — Twas Now ( talkcontribse-mail ) 10:12, 11 April 2009 (UTC)[reply]

In Firefox, Ctrl+Shift+x. Same to switch it back. — Matt Eason (Talk &#149; Contribs) 11:07, 11 April 2009 (UTC)[reply]
Ha ha, thanks. That makes things easier. — Twas Now ( talkcontribse-mail ) 23:07, 11 April 2009 (UTC)[reply]

Open source game developing

Are there open source platforms out there for game developing? The main idea is that I would do the "screenplay" and graphics and put it on a kind of virtual machine that would deliver the logic behind the game.--88.6.158.100 (talk) 11:59, 11 April 2009 (UTC)[reply]

Blender has a built-in game engine. --93.106.178.219 (talk) 12:16, 11 April 2009 (UTC)[reply]
It does - and there are other things like it - but they don't really do what the OP needs - there is always some programming involved somewhere. Your best bet for most game genres is to find an existing game that's similar to what you want and which is 'mod-able'. SteveBaker (talk) 06:51, 12 April 2009 (UTC)[reply]
Note however that won't meet the open source requirement. I presume the OP want his/her games to be widely available so doesn't want to limit them to people who own a certain game Nil Einne (talk) 15:43, 12 April 2009 (UTC)[reply]
It really depends on what sort of game your talking about and what you want to do besides creating the graphics. For example, there is Adventure Game Studio which unfortunately is not open source (but is freeware) and also only has a Windows version (there used to be a Linux and Mac OS X version of the engine but that was discontinued) which is commonly used for creating amateur adventure games. As SB mentions, there are moddable FPSes, RPGs, RTSes and probably other games although these suffer the limitations I mention above. I believe ID software regularly releases the code for their older FPSes under an open source licenses and I presume versions of these have been made which are modable Nil Einne (talk) 15:43, 12 April 2009 (UTC)[reply]
iD games are generally moddable out of the box - but indeed, there are huge opensource communities who take the OpenSourced Quake/Doom engine code and make entirely new games with little or no actual programming. I have good friends who work at iD - they are truly one of the better software companies out there...they entirely "get it". SteveBaker (talk) 18:59, 12 April 2009 (UTC)[reply]

whats with possible loss of precision (java)

This isn't exactly what I'm trying to do, but it will illustrate what I'm asking well enough: http://www.cs.princeton.edu/introcs/31datatype/Rot13.java.html

In that program

   char c = s.charAt(i);

complies fine. But if I replace that with

   int d = s.chatAt(i);
   char c = d;

the code refuses to compile, and I get a "possible loss of precision" error. Why? And how can I avoid possible loss of precision errors in general?

Thanks in advance. —Preceding unsigned comment added by 137.165.246.36 (talk) 20:08, 11 April 2009 (UTC)[reply]

The "possible loss of precision" is because you are assigning an int (d) to a char, which stores less bits than an int. Thus if d had a value greater than 255 (or 65535 if a char in Java is wide), it would be "trimmed" to fit inside a char, producing the "loss of precision". --wj32 t/c 23:27, 11 April 2009 (UTC)[reply]
Yes. This is called a narrowing conversion, and Java does not allow these implicitly. You need to explicitly specify the conversion using a "cast" expression, such as
char c = (char)d;
which is allowed. -- Tcncv (talk) 04:07, 12 April 2009 (UTC)[reply]

Recently I had been doing an online puzzle game which has many levels. When I got up to level 33 I, and several other people on the internet, found that the game would not allow entrance to that level, despite there being several levels beyond that. The site owner does not respond to emails. After examining the cookie for level 32 with IECookiesView by Nirsoft dot net it seems that the cookie may not work due to having an invalid date, which can be corrected with IECookiesView.

However I was busy at the time and I have now lost the cookie I had after completing level 32 (the levels have to be done in sequence). I do not want to plod through all 32 levels again. Instead I have inspected the cookies obtained after completing levels one, two, and three, and the relevant differences in the cookies are shown below:

LEVEL ONE
Key  : __utma
Value  : 11671083.1539782161861915000.1239481907.1239481907.1239481907.1
Key  : __utmb
Value  : 11671083.1.10.1239481907

LEVEL TWO
Key  : __utma
Value  : 11671083.1539782161861915000.1239481907.1239481907.1239482097.2
Key  : __utmb
Value  : 11671083.1.10.1239482097

LEVEL THREE
Key  : __utma
Value  : 11671083.1539782161861915000.1239481907.1239482239.1239482420.4
Key  : __utmb
Value  : 11671083.1.10.1239482420

Can anyone deduce what the relevant values may be for level 33 please? Note that the value for utmb for the first and second levels differs by one digit, the fourth from the end. The online game, if you are curious, is Ice Breaker by Nitrome, which was recommended by someone here. Thanks. 78.147.135.185 (talk) 22:37, 11 April 2009 (UTC)[reply]

1239481907 appears to me to be the number of seconds since Jan 1, 1970 if measured at Sat, 11 Apr 2009 20:34:57 GMT. -- kainaw 00:01, 12 April 2009 (UTC)[reply]
You're looking in the wrong place - __utma and __utmb are Urchin (Google Analytics) tracking cookies. The unlocked levels information is stored Flash cookie somewhere in %appdata%\macromedia\flash player\#sharedobjects . Dig down in the directory for cdn.nitrome.com and you'll eventually find a file called so_icebreaker1.sol. Open it in a hex editor like xvi32. Starting at address 38, every other address is the 'unlocked' status of a level (level 1, level 2, level 3...). Just change the value from 00 to 01 to unlock that level (select the cell and type 01). Hit Ctrl+S to save, reload Icebreaker, and the levels should be unlocked. — Matt Eason (Talk &#149; Contribs) 01:52, 12 April 2009 (UTC)[reply]

Thanks!!!! I did as you said and now have access to all levels, including the mysterious level 33! Design note - I hate games that require you to go through a series of levels again if you restart the game or whatever - destroys the fun completely. 78.151.152.56 (talk) 20:47, 12 April 2009 (UTC)[reply]

I think a better way to design multi-level games is to allow access to all levels right from the start, but have some bit of info that is divulged at the end of each level which is needed to be successful in higher levels. For example: "Don't waste ammo of schnurzels, just charge at them and they will run away". StuRat (talk) 10:04, 13 April 2009 (UTC)[reply]

April 12

Wiki-table syntax

This is more a request for assistance than a question. I'd like to remake the table at Chinese pronouns (which I didn't make) in a vein similar to this one. I've looked at Help:Table but am still too inexperienced with wiki syntax to attempt it. There are apparently HTML-to-wiki conversion tools but no English-to-HTML tools for those with no background in HTML. Any help would be greatly appreciated. Recognizance (talk) 04:53, 12 April 2009 (UTC)[reply]

This is indeed not a question. You should probably ask at the Village Pump or perhaps at WP:HELPDESK. SteveBaker (talk) 06:46, 12 April 2009 (UTC)[reply]
Replied on talk page. — Twas Now ( talkcontribse-mail ) 14:14, 12 April 2009 (UTC)[reply]

Resetting my homepage

I am trying to reset my homepage on IE8 with a couple of issues: First, my intended homepage is google.com, but for some reason that is completely ignored and instead, IE always opens with Internet Explorer 7: Get It Now. Second, when I try to change the homepage by going in Tools -> Internet Options, the option for setting my homepage is inexplicably disabled with a message that says "Some settings are managed by your system administrator". I AM my system administrator, my computer is not part of a domain or a group, so what the hell? That happens only on my administrator account, IE functions normally on my limited account. I use Windows XP SP3. --Whip it! Now whip it good! 06:25, 12 April 2009 (UTC)[reply]

I dont know if this would work but try typeing in about:config in your address bar... this works in FireFox. From there you should beable to change the settings. Alternately go to "c:/documents and settings/YOUR USER NAME/application settings/Internet Explorer" from what i remember there should be a file or folder there that will house your user settings for internet explorer... try playing around in there and see if anything sticks out as being usefull. —Preceding unsigned comment added by 64.30.106.235 (talk) 06:59, 12 April 2009 (UTC)[reply]
Alternatively, switch to Firefox ;) — Twas Now ( talkcontribse-mail ) 13:00, 12 April 2009 (UTC)[reply]
Law 87 of The Intertubes; if someone says "Internet Explorer" then, no matter how irrelevant to the discussion, someone will say "Get Firefox". Vimescarrot (talk) 18:35, 12 April 2009 (UTC) [reply]
By an amazing coincidence, Law 88 of The Intertubes says; if someone says "Get Firefox" - you should immediately do what they suggest. SteveBaker (talk) 18:55, 12 April 2009 (UTC)[reply]
And Law 89 is that everyone should follow SteveBaker's advice. Genius101Guestbook 19:09, 12 April 2009 (UTC)[reply]
People, I have Firefox. I just don't want some suspicious website making its way through ANY of my browsers. --Whip it! Now whip it good! 22:26, 12 April 2009 (UTC)[reply]
My guess would be that there's a value somewhere in the Windows registry telling IE to force this as the homepage for admin accounts, presumably to encourage adoption of IE7. You could try searching for that string using Regedit to see if you can find it - although you run the risk of messing up your system if you edit or delete the wrong thing. Also, the value in the registry may be a redirect URL that you don't notice, so you won't find the full URL anyway.
I suppose something like Ad-aware or Spybot S&D just might be able to reset it, since hijacking the homepage is frequently exploited by adware.
The other option would be to follow Microsoft's advice and install IE7, assuming you haven't actually already done so - it really is miles ahead of IE6 in all sorts of respects, and as a web developer I would love to see the eradication of IE6 with all its eccentricities! The only downside is that the pared down user interface can take a bit of getting used to if you're familiar with the toolbars and menus presented by IE6. - IMSoP (talk) 13:39, 12 April 2009 (UTC)[reply]
The asker has IE8. — Twas Now ( talkcontribse-mail ) 14:22, 12 April 2009 (UTC)[reply]
D'oh! That's what skim-reading does for you! - IMSoP (talk) 16:19, 12 April 2009 (UTC)[reply]

Is this a good computer?

Is this computer a good one? —Preceding unsigned comment added by 64.30.106.235 (talk) 07:15, 12 April 2009 (UTC)[reply]

The would-be seller would certainly like potential bidders to think so. (I wonder why you ask.) -- Hoary (talk) 07:52, 12 April 2009 (UTC)[reply]
No, it is not (by modern standards). A modern laptop would have a modern, faster CPU (with at least two cores), much more RAM (at least 2 GB = 2000 MB), much larger HDD (perhaps 200 GB), at least a DVD writer, and a newer OS (e.g. Windows Vista). But it is indeed cheaper than a new laptop, so if you think it would be sufficient for you, then it might be "good enough". --Andreas Rejbrand (talk) 13:07, 12 April 2009 (UTC)[reply]
It's more than adequate for most purposes. The kind of user who needs a huge hard drive or the latest graphics card is likely to know that already. There are some red flags, though, like "the battery and the wifi card has been recently replaced and has not been tested" (emphasis mine) and the bit about the hard drive needing to "warm up" (I'm not convinced this is the reason for the startup problem, but if it is then the hard drive is likely on the verge of failure, and if it isn't then it still points to some other hardware problem that might be serious). -- BenRG (talk) 16:30, 12 April 2009 (UTC)[reply]
It depends what you want it for and how much you have to spend. For the $112 the bidding had risen to when I wrote this, I'd say it was a pretty good deal. I wouldn't pay over $200 for it though. For doing email, surfing the web, word processing and such - it should be perfectly good. Don't expect to play state-of-the-art games on it though...for that, it would be useless. The worst problem (IMHO) is that it has a teeny-tiny hard drive...if you end up replacing it, you'll blow my $200-is-what-it's-worth limit...but if you already have a decent USB hard drive, then you'll be fine. SteveBaker (talk) 18:51, 12 April 2009 (UTC)[reply]
For my part of the world (eastern USA) - I'd say Steve has pretty much nailed this one dead on. Price, content, value, etc. — Ched :  ?  21:16, 12 April 2009 (UTC)[reply]

I wouldn't touch this. Why? The seller can't even manage correct english for a start :- "Buildin modem", "carfuly handled" "write papers for collage" "fantatic gift" - hardly inspires confidence. Exxolon (talk) 23:43, 12 April 2009 (UTC)[reply]

Does installing Visual C++ 2008 express edition interfere in any way with an existing Visual C++ 6.0 installation?

Title says it all. Anyone here tried this? I don't want to mess up my existing installation, but would like to try out Visual C++ 2008 express edition. --NorwegianBlue talk 14:52, 12 April 2009 (UTC)[reply]

I've never found it safe to install a "limited" version X+1 over an unlimited version X, especially a Microsoft product. It's called "asking for trouble". --jpgordon∇∆∇∆ 17:34, 12 April 2009 (UTC)[reply]
I'm pretty sure VC++ 2008 won't conflict with VC++ 6; they are almost completely different products. It's more likely that VC++ 6, being so old, would interfere with your OS (which I'm assuming to be XP or Vista) by installing old DLLs. --wj32 t/c 03:44, 13 April 2009 (UTC)[reply]
I have Visual Basic 6, Visual Studio 2005 and Visual Studio 2008 all on my Vista laptop and have not had problems continuing to use Visual Basic 6 for continued development. (Although I should note that Visual Basic .NET (and later) is esentially a different language from Visual Basic 6.) I believe there is still a large base of Visual Studio 6 developers out there who have transitioned to the .NET environment, but who also still maintain legacy applications, so I suspect that the two environments coexist in general. Minor conflicts such as file extension associations exist (clicking on a .cpp mat bring up the later version), but for project based development, this should not be a significant problem. And I would doubt that even Microsoft would engineer the express version to introduce conflicts that don't exist with the full version. Bottom line, you should be OK. Worst case - you have to uninstall Visual C++ 2008 Express and might have to reinstall Visual C++ 6.0. -- Tcncv (talk) 04:48, 13 April 2009 (UTC)[reply]

Bash script to install file to all $HOMEs (Linux/Ubuntu)

Hi, I am currently trying to make a bash script that would install a script to the "homes" of all users in the system (part of App Runner). I was told the best way was to use the /etc/passwd to check the current home of all users. Any ideas how to do it? (samples, please?) "Sample" of what I wanted:

  if <read the homes location and make the "if" go through them>
   then 
        cp /var/myscript.sh <path to home of user currently in the "if" variable>
   fi

Instead of "if" a "while" or "for" or "until" are also fine (as long as it works properly, of course!). Thanks Hacktolive (talk) 15:21, 12 April 2009 (UTC)[reply]

the easiest way to break /etc/passwd apart is with awk. You need to skip comment lines and non-users in your environment e.g. uid < 100
awk -F: '/^[^#]/ && $3 >= 100 {print $6}' /etc/passwd | while read homedir; do cp /var/myscript.sh $homedir; done
$3 represents the third passwd file field (uid) and $6 is the sixth (home directory)
Awm (talk) 16:06, 12 April 2009 (UTC)[reply]
[simultaneous post via edit conflict]
Well, the basic requirement is to extract the 6th field of /etc/passwd into a local variable, using something like awk or cut. Something like the following should work:
</etc/passwd cut -d':' -f6 | while read homepath; 
do
	echo -n "Doing something with $homepath... ";
	echo OK;
done
Caveats:
  • I've only run this, briefly, under bash; I've no idea if it's portable, in particular the | while read variable_name idiom
  • I'm not 100% confident that /etc/passwd is guaranteed to be the authoritative source for this information
  • This will include a whole load of "home directories" that you almost certainly don't want to mess with - on my system, the results included /, /bin, /sbin, and /dev/null!
You might want to think of some criteria for identifying "real" users. One thought would be to filter out users whose login shell is not a shell (system users will often have /bin/false or similar in that field) - a quick and dirty way would be to see if the shell's name (and therefore the whole /etc/passwd entry) ends in "sh":
</etc/passwd grep 'sh$' | cut -d':' -f6 | while read homepath;
...
Alternatively, you could look within each of the directories found for existing settings that imply they are likely to run nautilus. - IMSoP (talk) 16:10, 12 April 2009 (UTC)[reply]
Yes, the awk approach is probably superior, since it will be easier to combine extra criteria like comment lines without lots of grep pipes.
Note that on the Gentoo system I'm looking at checking for UID >= 100 does not eliminate all non-users. However, checking UID >= 1000 eliminates all but "nobody" (UID 65534); I don't know if this is what was meant, and is standard? - IMSoP (talk) 16:17, 12 April 2009 (UTC)[reply]
Sorry to keep talking to myself, but User identifier (Unix) says that the range of IDs reserved for system users, and the assignment for nobody, varies by Unix/Linux flavour/distribution. If you are specifically targeting Ubuntu systems, you might be able to find its conventions and write your script based on that (probably 0-999 are reserved, as that is mentioned in our article as being Debian's convention). - IMSoP (talk) 16:32, 12 April 2009 (UTC)[reply]

__________

Thanks for all the replies. I have found an easier way to find out it it is a real user: only real users have "/bin/bash" in the /etc/passwd (I tried it and works!!!)
But I have some more questions: Is it also possible to put this expression ( awk -F: '/^[^#]/ && $3 >= 100 {print $6}' /etc/passwd | while read homedir; do cp /var/myscript.sh $homedir; done )in a format like:

        while <condition>
           do
               <do some actions> 
           done


(samples appreciated...)
One more thing... I figured out that I can check if the user is in the group "users" (therefore, and easier way to see if it is a "real user"!):

  • Read the file /etc/group
  • Read the group ID (not user id!) of the group "users"
  • in the script that reads the file /etc/passwd with awk, I could simply do an "if" to check if the group ID of the user matches the group ID of the group "users" <<--- This is the step I do not know how to do... any ideas?

But thanks, this was great help. Hacktolive (talk) 01:58, 13 April 2009 (UTC)[reply]

Connecting to dynamic ip

I have a computer with a dynamic ip address which I need to connect to from a remote location. How can I do this, preferably for free. Is DynDNS the way to go? —Preceding unsigned comment added by 82.43.88.87 (talk) 15:23, 12 April 2009 (UTC)[reply]

Yes, it is the "way to go". There is also "No-ip". For me the main problem is not the dynamic IP, it is the router/firewall/etc... I recommend you first try to connect using the dynamic IP (put it on paper, ask a friend to tell you that by phone, etc...), and if it works, only then try something like DynDNS or No-IP SF007 (talk) 15:53, 12 April 2009 (UTC)[reply]
ok, I think I'll need to configure the router, as even entering the ip address does not connect to the server running on the other computer. Any advice on how I do this? Thanks —Preceding unsigned comment added by 82.43.88.87 (talk) 16:15, 12 April 2009 (UTC)[reply]
What exactly are you trying to do? accessing files or running some server? (HTTP or something like that?). You can't just access the files on the PC, using the IP, you need some kind of server (VNC, or even built in tools of the OS: "remote desktop" on windows). And then what you need to do is something called "port forwarding": the way to do it depends on the router, you have to search for that in the interwebs... SF007 (talk) 16:34, 12 April 2009 (UTC)[reply]
I'm trying to set up a remote desktop on Windows Xp, from a previous question I asked here. I'm using TightVNC which is just awesome (I tested it on localhost). I've set a DynDNS account and have the updater software running on the pc, so I'm guessing it's just the router now which is the problem. I don't have direct access to it but I know the password —Preceding unsigned comment added by 82.43.88.87 (talk) 17:23, 12 April 2009 (UTC)[reply]
You need to enable port forwarding on your router for the two ports that TightVNC uses; see the TightVNC FAQ. – 74  20:15, 12 April 2009 (UTC)[reply]
If you have some kind of web site that your computer can get to then you can have it copy the IP address there either whenever the DHCP server changes it - or (say) once every 10 minutes regardless. I used to do this and had the computer write a file to my web site that said:

<HTML><BODY> <A HREF="http://xxx.xx.xx.xx">My Computer is at xxx.xx.xx.xx!</A></BODY></HTML>

...(where the 'x's were the current IP address) so I could just visit that page and click on the "My Computer!" link to get to it's local HTTP server or cut/paste the IP address for some other reason.
SteveBaker (talk) 18:43, 12 April 2009 (UTC)[reply]
To the OP: If you have Internet Explorer and don't mind using it, I would recommend LogMeIn Free. It doesn't require you to do any tinkering with the router or IP addresses; your computer automatically reports its address every time it boots up. In my experience, it's as fast as VNC but offers more features (like recording remote control sessions or emergency reboots). --Bowlhover (talk) 20:12, 12 April 2009 (UTC)[reply]

Weird computer video drawing thing

What is the name of the phenomenon seen here and what are the most frequent causes under Windows XP? ----Seans Potato Business 17:27, 12 April 2009 (UTC)[reply]

Don't know the name, but you've got a window open that's hung -- not refreshing itself -- so it can't fix the "damage" when you drag a window over it. --jpgordon∇∆∇∆ 17:32, 12 April 2009 (UTC)[reply]
Aww man this happens so often with my computer. Sometimes it corrects itself but usually I have to end task it. Kinda reminds me of the old windows solitaire game when you win and all the cards jump out like that —Preceding unsigned comment added by 82.43.88.87 (talk) 17:41, 12 April 2009 (UTC)[reply]
The cause is that the window is not being redrawn by the application program - but the window frame is being updated by the OS. When you move or resize the window, you leave behind the previous window frame in the pixels inside the window. I don't know of any name for this phenomenon - but mostly it's caused by either a VERY slow computer that's not giving enough time to the application to get it's work redone - or by a buggy application that's locked up somehow without crashing out. This problem isn't specific to Windows XP - and you can even see it happen under (for example) Linux - although simple or slow Linux applications can minimize this by requesting that the windowing system 'retain' the image of the window contents and handle window motion without requiring the application to repaint the window. SteveBaker (talk) 18:37, 12 April 2009 (UTC)[reply]
The name I know for it is just what jpgordon called it — damage. That's the word used, for instance, in the AWT documentation. --Tardis (talk) 15:19, 13 April 2009 (UTC)[reply]
Visual artifact may fit the bill for a name. Nanonic (talk) 00:09, 13 April 2009 (UTC)[reply]

Sounds

Where can I download the Jungle, Musica, Robotz, and Utopia sound themes that came with Windows 9x? 58.165.25.29 (talk) 22:30, 12 April 2009 (UTC)[reply]

Hearts

I'm trying to play a network game of Hearts. Since XP and Vista don't have the network version, I downloaded a network version onto my XP computer and my Vista laptop. But I would like to know how I can get network play working. And another question: why did they even remove the network play? 58.165.25.29 (talk) 22:29, 12 April 2009 (UTC)[reply]

If you're talking about the Hearts games that comes with Windows, I was under the impression that the network play option was something they intended to some day offer but never fully implemented. Thus they eventually dropped it from the menu entirely. If you want to play Hearts with others over the Internet, I suggest you go to Pogo.com. StuRat (talk) 09:50, 13 April 2009 (UTC)[reply]

E-mail

I keep getting e-mails entitled "How to Get a Girl to Do Anything and Everything" or something of the sort. Though I cannot read the e-mails, I know I have them because of a message saying they were blocked. I can't find any news stories on this, so what is with these e-mails? Why am I even getting them? 58.165.25.29 (talk) 22:29, 12 April 2009 (UTC)[reply]

It's called spam and you're hardly alone in getting them. The article on Anti-spam techniques may help you in stopping them. --Whip it! Now whip it good! 23:02, 12 April 2009 (UTC)[reply]

DosBox

How can I avoid that "Mounting C:\ Is Not Recommended" message that DosBox gives when you mount your entire C:\ drive? And why don't they want you to mount your whole drive anyway? 58.165.25.29 (talk) 22:29, 12 April 2009 (UTC)[reply]

Any part of the drive that is mounted may be potentially altered by the program. You do not want your system files altered. They are on the C: drive. So, the program is attempting to protect your from yourself by warning you not to mount a drive containing your system files. -- kainaw 23:12, 12 April 2009 (UTC)[reply]

Youtube

Is there a way to view the country flags in Youtube users' profiles that used to be next to country names? For some reason, they removed those flags. Why? And, as I said before, is there a way to view them? —Preceding unsigned comment added by 58.165.25.29 (talk) 22:34, 12 April 2009 (UTC)[reply]

Windows

Whenever someone lists some versions of Windows, why is Windows 2000 sometimes left out? And why is it left out more often than Windows ME is? 58.165.25.29 (talk) 22:48, 12 April 2009 (UTC)[reply]

Windows 2000 was not a "personal" version of Windows. It was a server version (like Windows NT). When listing versions of Windows that people would have installed on their home PC, Windows ME is a possibility, but Windows 2000 is very rare. -- kainaw 23:11, 12 April 2009 (UTC)[reply]
Er, well, slightly. Back in 2001 or so I and most people I knew had 2000 installed on our home computers, and only two I can think of used it as a server. (ME was dismissed as a joke, with no advantage over 2000 and some major disadvantages.) Microsoft was marketing 2000 to companies and people wearing suits and going to conferences, ME to nuclear families gazing in awe and delight at their one CRT. (The cheapest version of 2000 was pompously called "Professional".) Perhaps elsewhere in the world people consumed these advertising cliches seriously. In reality, you could of course use 2000 for Tetris and the viewing of pr0n if you wished, but you'd have had to be perverse (or underinformed) to trust your biznis to ME. -- Hoary (talk) 23:42, 12 April 2009 (UTC)[reply]

Malware

Why does most malware originate from poor countries? 58.165.25.29 (talk) 23:14, 12 April 2009 (UTC)[reply]

What makes you assume most malware originates from poor countries? It originates from criminals. As for the servers that the malware are launched from, they have a tendency to be from China, mainly due to lack of government/police control over the servers. -- kainaw 23:18, 12 April 2009 (UTC)[reply]
I thought most of it originated from Russia. Yakeyglee (talk) 00:32, 13 April 2009 (UTC)[reply]

Wordpad

How can I change WordPad's default font? 58.165.25.29 (talk) 23:35, 12 April 2009 (UTC)[reply]

You can't (unless you want to decompile the program to assembly and hack the assembly language to have it load a different font). -- kainaw 23:45, 12 April 2009 (UTC)[reply]
Well, I suppose you could copy another font file over the font file Windows uses for WordPad -- mine appears to default to Arial -- but this would also affect plenty of other things. It's most likely a bad idea. -- Captain Disdain (talk) 13:55, 13 April 2009 (UTC)[reply]

Backup RAZR contacts to computer (preferably something involved with gmail/google)

So I'm worried about eventually losing/breaking my phone (like everyone seems to) and I can't afford to lose some of the numbers I have.

I'd like ot find a way to back them up, preferably to my gmail contacts. Also, if possible in a fashion I could transfer them back to some/most phones.

Is there any free way of doing this at all?

Thank you very much guys (and gals), I appreciate all of your help here.

Chris M. (talk) 23:41, 12 April 2009 (UTC)[reply]

Ask your cell phone provider. My Verizon account has a feature exactly like this. It backs up my contacts once a day. And when I got a new phone last year, I just had to go through a couple menus on the phone to download my contacts to the new phone. Dismas|(talk) 00:39, 13 April 2009 (UTC)[reply]
If your computer has Bluetooth and your cell phone provider has not disabled it, you may be able to push transfer the contacts from your phone to your computer via OBEX. Also, some computers have software that will copy all of your contacts from the phone to the computer and viceversa (iSync comes to mind). You might want to give this a try. Titoxd(?!? - cool stuff) 01:14, 13 April 2009 (UTC)[reply]

҉̵̞̟̠̖̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̐̑̒̓̔̊̋̌̍̎̏̐̑̒̓̔̿̿̿ ̕̚̕̚͡ ͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿

Does anybody know what type of symbols those are and what they are used for and why when they are typed pressing backspace makes the cursor go both to the left and the right? The text also sometimes goes vertical. It's very weird. It's behavior is really hard to describe. My friend and I have been discussing it and haven't been able to figure anything out about them. And if this may help, I am using Firefox 3. Does anybody know anything?--Yakeyglee (talk) 00:14, 13 April 2009 (UTC)[reply]

҉̵̞̟̠̖̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̐̑̒̓̔̊̋̌̍̎̏̐̑̒̓̔̿̿̿ ̕̚̕̚͡ ͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉҉҉҉̡̢̡̢̛̛̖̗̘̙̜ ̝̞̟̠̖̗̘̙̜̝̞̟҉ ̒̓̔̕̚ ̍̎̏̐̑̒̓̔̕̚̕̚ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉ ̒̓̔̕̚ ̍̎̏̐̑̒̓̔̕̚̕̚ ̕̚̕̚ ̔̕̚̕̚҉ ҉̵̞̟̠̖̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̐̑̒̓̔̊̋̌̍̎̏̐̑̒̓̔̿̿̿ ̕̚̕̚͡ ͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙̜̝̞̟҉͡҉҉ ̵̡̢̛̗̘̙̜̝̞̟̠͇̊̋̌̍̎̏̿̿̿̚ ҉ ҉҉̡̢̡̢̛̛̖̗̘̙̜̝̞̟̠̖̗̘̙

See this previous discussion. --wj32 t/c 01:52, 13 April 2009 (UTC)[reply]
If you ever want to examine a set of Unicode characters, one by one, you can try my simple Unicode editor Rejbrand Text Editor, which will display all Unicode characters (and tell you their codepoint, name, and block), but will treat all of them like normal characters, so that keyboard commands will still work as usual in such extreme cases like this one. By the way, the RD and even its history (due to the edit summary) is quite messed up by these characters! --Andreas Rejbrand (talk) 11:27, 13 April 2009 (UTC)[reply]
I don't understand, it displays perfectly well for me. ‪‪‪

April 13

Problem

My computer shows Verdana instead of Times New Roman on sites that use TNR. How can I fix this? 58.165.25.29 (talk) 02:49, 13 April 2009 (UTC)[reply]

Verdana is the default Windows font for sans-serif fonts. Are you absolutely positive that the website's css is not set to sans-serif? -- kainaw 03:00, 13 April 2009 (UTC)[reply]
A URL to such a website would be highly helpful. --Andreas Rejbrand (talk) 11:29, 13 April 2009 (UTC)[reply]
Never mind, I found out the problem. It is because I chose that font for viewing text on such pages. 58.165.25.29 (talk) 11:56, 13 April 2009 (UTC)[reply]

.Desktop (dot desktop) file and portable Firefox [Portable Apps] [Linux] [Ubuntu]

I am currently trying to make a .desktop file to launch portable Firefox (on Linux), but I just can't get it to work! The problem is trying the .desktop file to recognize the location of firefox (not to mention the icon), and I can't use global paths, because this is a portable USB drive... Any ideas?
Location of the files:

  • /media/Disk/Firefox/Firefox.sh <<--- launcher for firefox
  • /media/Disk/Firefox/icon.png <<---- icon
  • /media/Disk/Firefox/firefox.desktop <------ the .desktop file (not working!)

I have tried using this parameters (together and separated, in various combinations):

PATH=./
Exec=./Firefox.sh
Exec=Firefox.sh
Exec=$PWD/Firefox.sh
Icon=./icon.png
Icon=icon.png

I even tried inserting this line found on other .desktop file:

 #!/usr/bin/env xdg-open

But nothing!!! :( Is this even possible? I have read the .desktop file specification ([9]/[10]), but that did not helped anything... Hacktolive (talk) 04:21, 13 April 2009 (UTC)[reply]

Hi everyone.I'm looking to creating a community website with a few community based sections. I am hoping to have a shopping section where I display various products from a number of online retailers. In relation to this -do I have to ask for permission of using a product image (i.e. like a dvd) from the online retailer (that does not own the copyright)? Can I simply just use the image and provide a link to the online retailer? If it is the case that I have to ask the copyright owner- would it be likely I even get a response (ie. From a big hollywood studio or a big publisher)? Would they care if I'm encouraging the purchase of their product? And secondnly do I have to ask for permission to link to someone else's website page? And just in case I WILL have google adsense on my website. Thanks for your help!

You do not need permission to link to websites on the internet. But beyond that, we cannot provide legal advice. — Twas Now ( talkcontribse-mail ) 11:36, 13 April 2009 (UTC)[reply]
Usually images of a product you are directing someone to buy are considered to be implicitly released for such purposes (for the obvious reasons—the copyright holder benefits directly when you are selling their product). In the US, the Copyright Act is pretty clear about this (17 U.S.C. 113(c), BUT that doesn't stop companies from trying to use legal muscle to keep you from undercutting their profits if they think that is what you are doing (here is a clear blog post about such practices). This is, of course, NOT legal advice—in particular, I am telling you that the issue appears in practice to be cloudy, though per the law it should be straightforward. --98.217.14.211 (talk) 12:58, 13 April 2009 (UTC)[reply]

Asterisk

Why is the asterisk (a pop-up dialog with an "i") so-called? 58.165.25.29 (talk) 09:43, 13 April 2009 (UTC)[reply]

I'm not sure what you mean by a "pop-up dialog with an 'i'". Typically, "asterisk" refers to the character "*", which is called an asterisk after the Latin word asteriscum, which means "little star". -- Captain Disdain (talk) 13:45, 13 April 2009 (UTC)[reply]
In Microsoft Windows, the Win32 API provides a standard message box, via the MessageBox function. The function takes a parameter "uType" of type cardinal, and some of the predefined constants for this parameter are MB_ICONHAND, MB_ICONQUESTION, MB_ICONEXCLAMATION, MB_ICONASTERISK, MB_ICONWARNING, MB_ICONERROR, MB_ICONINFORMATION, MB_ICONSTOP, and MB_ICONMASK. Depending on this parameter, the icon (and the corresponding sound!) will be a red circle with a white cross, a yellow triangle with an exclamation mark, a blue circle with a question mark and so on. MB_ICONASTERISK (and MB_ICONINFORMATION) gives a blue circle with a "i" (as in "information"). --Andreas Rejbrand (talk) 14:37, 13 April 2009 (UTC)[reply]
The asterisk character is often used in written text for footnotes and similar references. My guess is that some software has applied the name "asterisk" to an informational ("i") pop-up dialog used for a purpose analogous to a footnote. --Scray (talk) 14:05, 13 April 2009 (UTC)[reply]
Possibly even with an actual asterisk originally, which was eventually replaced with the 'i' when they discovered it was too close to the 'x' or that the footnote analogy was lost on the majority of users (or even the majority of users likely to call tech-support). The problem with giving constants descriptive names is that, if the usage ever does change, you are left with a confusingly mis-labeled constant. About all you can do (without removing the old name and breaking all prior code) is to add a new name (like MB_ICONINFORMATION) and list the old name as deprecated. – 74  16:13, 13 April 2009 (UTC)[reply]

Mac OS X Leopard using a non-Apple keyboard

Does anyone know of an easy way to remap and/or configure a non-Apple keyboard on OS X Leopard? Well, I know this isn't something that Steve Jobs and his Cupertino cohorts like to see, but I'm on an OSX86 install, using iDeneb. I could have burned a thousand bucks for a real Mac, but I tried on installing Hackintosh just for curiosity's sake. Blake Gripling (talk) 13:03, 13 April 2009 (UTC)[reply]