Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 217.227.112.112 (talk) at 12:03, 26 April 2009 (→‎free forum without ads - Is this legit?: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


April 19

Gateway Laptop completely freezes when AC cable is unplugged.

Hi everyone,

Somewhere around half of the times that I unplug my AC plug from my laptop when it's turned on the computer completely freezes. Clock doesn't move, mouse stops, everything. The only way to fix it is to hold down the power for a few seconds until it turns off then turn it back on.

I can't think of anything I did that might have caused this, and I've ran numerous virus/spyware scans (ad-aware/avg/hijackthis). This leads me to believe something in the hardware is failing, or it's some setting I changed somehow without knowing.

The fact that it doesn't always happen bothers me, also rarely when I remove or plug in a USB device while the laptop is on, it does the same thing.

I have a Gateway M-6851, running Windows Vista SP1. Any ideas? Thanks!

Chris M. (talk) 00:19, 19 April 2009 (UTC)[reply]

I'm no expert, but it sounds like it's causing a momentary power fluctuation - which sometimes is bad enough to crash the laptop but sometimes not. Exxolon (talk) 02:38, 19 April 2009 (UTC)[reply]
That's just what I was thinking. Try unplugging the other end of the power cord first, and see if that makes a difference. Also, if you have an outlet hooked up to a wall switch, try turning it off at the wall switch before you unplug. You could also use a power strip and flip that switch off before you unplug. StuRat (talk) 15:20, 19 April 2009 (UTC)[reply]

Awesome window manager

I need some help with the Awesome window manager. I basically want it to look like this. I'm looking for the name of that font, what terminal/console that users is using and what the best file manager would be for Awesome. File managers always look horribly when I use them with Awesome. --BiT (talk) 00:51, 19 April 2009 (UTC)[reply]

Also, can someone tell me what file managers are being used in the aforementioned link and in this one? They both seem to have the GNOME icon but they don't look like Nautilus or anything like that. --BiT (talk) 01:06, 19 April 2009 (UTC)[reply]
Pretty sure the file manager is Thunar. It's the default file manager for Xfce. Indeterminate (talk) 00:41, 20 April 2009 (UTC)[reply]
Are you sure? I've tried Thunar and the form looks rather like it but as you can see the Thunar manager doesn't have the GNOME icon in the corner. --BiT (talk) 01:12, 20 April 2009 (UTC)[reply]
Yep, I installed it on my ubuntu system here and it's got a little gnome icon in the corner. I don't know what build they're using in that picture. Indeterminate (talk) 01:40, 20 April 2009 (UTC)[reply]
But I'm currently using Thunar with Awesome and there isn't a GNOME icon there? Also, have you got any idea what theme those people are using? --BiT (talk) 01:47, 20 April 2009 (UTC)[reply]
Hmm, strange. Maybe it depends on what distribution you're using and what version of Thunar. Anyway, sorry I can't help much, I haven't used AwesomeWM before. Indeterminate (talk) 09:54, 20 April 2009 (UTC)[reply]

Installing MakeHuman

I've just downloaded MakeHuman, and extracted all the files from the zipped folder, now how do I actually install it? (I'm running Windows XP SP3). Thanks! 203.40.181.54 (talk) 01:16, 19 April 2009 (UTC)[reply]

I believe it's a "plugin" for the blender (software) 3D modeller - right? That being the case, I think you need to find the blender instructions for installing plugins from the blender website - at which point (hopefully) it'll be obvious. SteveBaker (talk) 00:30, 20 April 2009 (UTC)[reply]
Umm... I don't think it is, Wikipedia says it is a stand-alone piece of software (http://en.wikipedia.org/wiki/MakeHuman), not a plug-in for anything else... 144.138.21.31 (talk) 03:38, 20 April 2009 (UTC)[reply]
Hmmm - evidently it WAS a blender plugin back in 2005 (which is about the last time I played with it) - but has since gone stand-alone - so at least I'm not completely crazy! SteveBaker (talk) 21:19, 21 April 2009 (UTC)[reply]
[Check this out]. Apparently you need to install the Microsoft package and then double-click the makehuman.exe file. Indeterminate (talk) 09:58, 20 April 2009 (UTC)[reply]

Learning VisualBasic

I downloaded the visual basic thingy...from...somewhere (it was a long time ago). Is the in-built tutorial (which, from what I did, is pretty in-depth) a particularly good or bad way to learn my first programming language? I ask because I'm unable to learn anything from it. Vimescarrot (talk) 12:40, 19 April 2009 (UTC)[reply]

I've never seen this tutorial but the language I'm most familiar with is visual basic and I've done a lot of work with it. After I had learned some I had grabbed VB 6 for dummies (on amazon), which I thought was impressively well written and easy to understand, even though I had done a lot of it, the parts that were new were very clear. If you're using a new version (.net, or 2008 for example) there are equivalent books I assume would be valuable. On the other hand, a free but very effective tool to learn visual basic is the wikibook. Several of my friends learned with this source (link) and feel that they understand it well enough to use it. It also goes into some more advanced things the dummies books wouldn't, which is nice for the future. Chris M. (talk) 15:10, 19 April 2009 (UTC)[reply]
Thank you for that information but it didn't actually answer the question I asked. ;-) Vimescarrot (talk) 19:05, 19 April 2009 (UTC)[reply]
Sorry, the answer was more subtle then I had intended. You said that you weren't able to learn anything from it. I said that it's not hard to learn from several other sources, and so by saying that I was implying that it wasn't a particularly good source, or I would expect you'd have more success. 74.218.161.17 (talk) —Preceding undated comment added 19:56, 19 April 2009 (UTC).[reply]
But the logic of that is flawed. It may be my sheer ineptness which prevents me from learning, not the tutorial. Vimescarrot (talk) 21:11, 19 April 2009 (UTC)[reply]
I don't know the answer - but unless you have a specific need to learn VB (eg for your job) - I would pick a different language to learn as your first. VB is an evolutionary dead end. Learn Java first. SteveBaker (talk) 00:31, 20 April 2009 (UTC)[reply]
"VB is an evolutionary dead end." Care to back that up? Granted, I haven't done any VB development in years, but I still see job ads for VB and Microsoft keeps updating it so I'm not sure how VB is an evolutionary dead end. A Quest For Knowledge (talk) 01:28, 20 April 2009 (UTC)[reply]
I was recommended VB as an easy language. But I'd be happy to hear reasons to learn something else. Vimescarrot (talk) 10:54, 20 April 2009 (UTC)[reply]
Well, the main problem I have with VB is that it combines legacy features from VB6 with modern OO features and Microsoft provides no real distinction between the two (i.e. Len(myString) versus myString.Length()). For those that care about code quality, things like that will drive you nuts. Another option is Small Basic.[1] What kind of applications do you want to write? A Quest For Knowledge (talk) 12:20, 20 April 2009 (UTC)[reply]
I wasn't thinking of writing any kind of application. I just wanted to learn it. I spend all of my free time on my computer; I thought it was a useful, non-timewasting thing to do...(I'm happy to hear the answers to this, but may I point out my original question remains unanswered? :) ) Vimescarrot (talk) 14:07, 20 April 2009 (UTC)[reply]
Think up a specific application that you could use. In the work it takes to figure out how to implement it, you'll end up learning a ton. There's really no other way I know of to do it—you have to jump in with two feet. Feel free to ask on here for good "beginner" applications (don't try and write a BitTorrent client right off the bat!). How about a simple address book? Tackling that will show you the basics of GUI development, data processing, maybe even some mild databasing. All good things to know how to do! --98.217.14.211 (talk) 22:48, 21 April 2009 (UTC)[reply]
(outdent). Oh, you want your question answered? Why didn't you say so!  :) OK, which tutorial are you referring to? Is it the "Visual Basic Guided Tour" found in help? If so, no it doesn't look like a good way to learn programming. If it's "Creating Your First Visual Basic Program" also found in the help, that looks a little better. I recommend going out and buying an intro VB book. Alternatively, you can take an intro to programming class. A Quest For Knowledge (talk) 14:18, 20 April 2009 (UTC)[reply]
Thanks. I can't remember what the tutorial was; it was on an old PC, so I don't actually have access to VB now anyway. No doubt I'll be just as incompetent at it no matter what method I try to use to learn it. Vimescarrot (talk) 17:04, 20 April 2009 (UTC)[reply]
  • The first programming language I learned was Visual Basic.NET. It's a very common beginner's language. It is also very powerful. It makes learning other languages much easier, so there's no reason not to learn it. Visual Basic 6 is much different from Visual Basic.NET, by the way, and Microsoft no longer supports VB 6. You can't do nearly as much in VB 6 as VB.NET. You can do almost anything you want in Visual Basic.NET -- anything you can do in C++ or Java. In fact, unlike C++, it has built-in garbage collection. You can also use it in web pages via ASP.NET. The programs run very fast, too, because they use the .NET Framework, although the end user has to have the .NET Framework installed in order to run your apps. It's very intuitive, although I wouldn't mind having C-style braces to aid code readability. Multi-line comments would be nice, too. My favorite part of coding in VB.NET is the IDE -- Visual Studio. I've tried Eclipse for Java, and that is one of the biggest pieces of shit on planet Earth. (No wonder they give it away for free.) Visual Studio's debugger tells you exactly what the problem is and highlights the error. The auto-complete function saves you a lot of time, too.--Tim james 5 (talk) 17:36, 20 April 2009 (UTC)[reply]
VB6 is in my estimation reasonably easy. VB.NET is not as easy but it is more regularly structured. Languages that are more regularly structured (Actionscript, as one random example) are in my opinion a LOT easier than either VB or VB.NET. --98.217.14.211 (talk) 22:45, 21 April 2009 (UTC)[reply]
This is purely WP:OR (although I am a published author in this field), but a lot of people who say that VB6 is easier than VB.NET started learning VB with VB6. Thus, VB6 seems easier because they already knew it. IMHO, if you took someone who was completely new at VB, VB.NET would be easier to learn than VB6. A Quest For Knowledge (talk) 12:45, 22 April 2009 (UTC)[reply]

Creative SoundBlaster Live! Sound Problems

Hi.

I have a Creative SoundBlaster Live!, its not the one with the full chip, but the cut-down version. (I like the MIDI SoundBank manager better on this version.)

I have two problems with this sound card which cropped up last year. I was on XP SP2 and it worked fine, upgraded to SP3 and it was still fine for a while, but then these problems started appearing. Me being the type of person I am, I had to re-install Windows after fiddling with it. I am now using XP SP2 again and the problems are still here.

1.) If I have my sound volume very low, the sound card will actually turn its self off. i.e. nothing plays, not even the small buzzing that usually comes out of speakers. The only way to cure this is to move the main slider (called playback) on the Mixer up to a higher level, let go of the mouse and it plays the XP error noise (like it should) and then move it back low again.

2.) If I use certain programs then my P.C. after a little while, randomly each time between about 10 and 30 seconds, will pause with the sound jamming and playing the last "second" over and over again. The only way to get rid of this is to do a hard reboot.

Known programs that cause this error:

Audacity - version 1.2.6 (Recording or Playing), Notation Player - version 2.1.2

It might help to know this piece of information. Its a nightmare trying to find drivers from Creative. They have this soundcard in about 5 or 6 different varieties. It is possible I have the wrong drivers installed. I used Creative's Auto-Update service to determine what my soundcard was, and then manually downloaded the drivers from their website. I manually downloaded them because Creative seems to not Auto-Update everything like it claims to.

I have disabled the onboard audio, and as this sound card wasn't with the P.C. (Its basically been built from scratch, but with HDD and RAM from an older P.C. which used an onboard chip. The old sound drivers (C-Media) won't uninstall and that could be the problem. Everytime I go to uninstall them it says uninstalling and then asks to re-boot. When it boots its still there in the Control Panel. I have done this under my account, in safe mode using the Administrator account. and using TuneUp Utilities 2008 to try and remove it.

If anyone knows what could be the problem I would be grateful to know your thoughts. Thanks. Elven Spellmaker (talk) 13:06, 19 April 2009 (UTC)[reply]

I've owned almost every Creative soundcard since the Soundblaster 1 and the most joy I ever had was with the SBPro. It was the most compatible card ever, and it worked until I had to retire it. Ever since, I've found all SB cards deteriorating over time... ranging from annoying little sound crackles to the computer not even picking it up. I think your card has had its life (since it did work at one point with XP). Use your onboard sound... this has caught up over the years to be as good to sometimes better than Creative's mid-range offering. Creative's top-end is for a minority of audiophiles or for people with extra cash. On one of my older computers, I've thrown out the Audigy 2 and enabled the onboard 6 channel sound - and it actually sounds better, not to mention some games actually picking up the 3D sound. Onboard is also more efficient as there is no overhead of having to use the PCI bus. Sandman30s (talk) 14:41, 19 April 2009 (UTC)[reply]
I would use my Onboard sound, if I didn't use MIDI so much. The general MIDI DLS that Windows uses is appalling. Also I think that the C-Media drivers might confuse the onboard chip. Elven Spellmaker (talk) 16:17, 19 April 2009 (UTC)[reply]
Re the drivers, the only way would be to delete the drivers themselves after removing all C-Media entries from the registry. You can always download Yamaha/Roland soundfonts (not free but worth it and cheaper than buying a soundcard) if the default ones are that bad. I thought that the default Windows General MIDI samples (in XP onwards) have always been better than the default AWE32/Audigy/Live! soundfonts anyway. Good luck, elven friend! Sandman30s (talk) 18:49, 19 April 2009 (UTC)[reply]

what's the cheapest fm radio attachment that plugs into the BOTTOM of an iPod ie completely portable (not lighter jack for the car thing)

Which one is the cheapest fm radio attachment for the iPod that just plugs into the bottom of it in a portable way, ie suitable for just carrying with you in your purse? 79.122.6.184 (talk) 14:38, 19 April 2009 (UTC)[reply]

Here. Five bucks. Add some duct tape if you want portability. F (talk) 10:19, 21 April 2009 (UTC)[reply]
Or if you just consider duct tape to be a fashionable addition. :-) StuRat (talk) 18:49, 23 April 2009 (UTC)[reply]

Script to replace an image

Resolved

I'd like to write a greasemonkey script that will replace a certain image on a webpage, say for example the Wikipedia Globe logo with another image of my choice. I'm still a n00b at userscripts, so any help would be awesome. Thanks —Preceding unsigned comment added by 82.44.54.169 (talk) 15:08, 19 April 2009 (UTC)[reply]

Never mind guys, I worked it out myself
You can also use My Image Here if you don't want to write scripts. F (talk) 10:21, 21 April 2009 (UTC)[reply]

Script to replace an image (part 2)

I need some help with writing a greasemonkey script. I thought I had it figured out, but I just can't seem to make it work. I'd like the script to replace any instance of a certain image on a webpage with another image of my choice. So for example, on this page I might like to replace this image and this image with this and this

From looking at other userscripts, I've come up with:

var findString = ['http://www.ucmp.berkeley.edu/geology/mag_anom.GIF']; // array of image src
var newString = ['http://upload.wikimedia.org/wikipedia/commons/3/37/2_russian_street_cats-crop.jpg']; // array of new image src

var findString = ['http://www.ucmp.berkeley.edu/geology/curr2.JPG']; // array of image src
var newString = ['http://upload.wikimedia.org/wikipedia/commons/9/9b/Domestic_cat_cropped.jpg']; // array of new image src

var allImages, thisImage;

allImages = document.evaluate(
    '//img[@src]',
    document,
    null,
    XPathResult.UNORDERED_NODE_SNAPSHOT_TYPE,
    null);

for (var i = 0; i < allImages.snapshotLength; i++) {
    thisImage = allImages.snapshotItem(i);
    for (var j = 0; j < findString.length; j++) {
        if (thisImage.src.match(findString)) {
            thisImage.src = thisImage.src.replace(findString[j], newString[j]);
        }
    }
}

but it's not working. What do I need to do? Many, many thanks for any help with this —Preceding unsigned comment added by 82.44.54.169 (talk) 18:52, 20 April 2009 (UTC)[reply]

Here's a working version without the XPath stuff:
// a hash table where the images we want to replace are the keys,
// and the replacement images are the values
var substitutions = {
    'http://www.ucmp.berkeley.edu/geology/mag_anom.GIF':
            'http://upload.wikimedia.org/wikipedia/commons/3/37/2_russian_street_cats-crop.jpg',

    'http://www.ucmp.berkeley.edu/geology/curr2.JPG':
            'http://upload.wikimedia.org/wikipedia/commons/9/9b/Domestic_cat_cropped.jpg'

};

var allImages = document.getElementsByTagName('img');
for (var i = 0; i < allImages.length; i++) {
    var thisImage = allImages[i];
    var subst = substitutions[thisImage.src];
    if (subst)
    {
        // we want to create a new image rather than modify the old
        // one's src in order to get the width and height of the new image
        var newImg = new Image();
        newImg.src = subst;
        thisImage.parentNode.replaceChild(newImg, thisImage);
    }
}
--Sean 20:43, 20 April 2009 (UTC)[reply]
Thank you! :D —Preceding unsigned comment added by 82.44.54.169 (talk) 22:31, 20 April 2009 (UTC)[reply]
It was my pleasure. Plus I was on the clock. Apparently the only kind of programming I enjoy is WP:RD/C requests. --Sean 02:25, 21 April 2009 (UTC)[reply]


Script to replace an image (part 3)

Last question, I promise! I'd like to achieve something similar to this script, but instead of just google it could be modified to work on any image on any page. Say for example I wanted to replace the cnn logo with a selection of randomly changing images. Many thanks, not only for this question but to all those who helped with my other questions too! WP:RD rules! —Preceding unsigned comment added by 82.44.54.169 (talk) 07:26, 21 April 2009 (UTC)[reply]

Can't you just change the @include line to "http://*/" or "http://*.*/" or something like that? --Sean 13:00, 21 April 2009 (UTC)[reply]
hmm, I've been mucking about with it, but on other sites it just displays the images (the google logos in default state) in the top left hand corner of the page, or seemingly chooses a random image to replace. I'd like the option to replace a specific image of choice. I hope I'm not asking too much, or have I expended my question quota! Don't worry I do answer questions too —Preceding unsigned comment added by 82.44.54.169 (talk) 13:18, 21 April 2009 (UTC)[reply]
You should put in some logic along these lines:
if (document.URL.indexOf("http://cnn.com") == 0)
{
   // replace CNN's logo here
} else if document.URL.indexOf("http://google.com") == 0) {
   // replace Google's logo here
}
And so on. For followup questions like these, you should just add on to the original query. --Sean 14:12, 21 April 2009 (UTC)[reply]
I've condensed the question to one heading. Sorry to be a complete annoyance, but I really have no javascript knowledge at all, and I'm not sure how to use those lines of code you provided. They don't work on their own and I don't know how I should integrate them into the google image script.

garage door opener, forgot code

I need some help reseting the code on my garage door i can't figure out how. thanks for your help, -Rob 64.198.92.180 (talk) 21:16, 19 April 2009 (UTC)[reply]

Garage door opener: Sears Craftsman 41a5021-2b Wireless outdoor keypad: Sears Craftsman 132b2171-2 —Preceding unsigned comment added by 64.198.92.180 (talk) 21:16, 19 April 2009 (UTC)[reply]

I don't know about that specific opener - but on mine there is a reset button on the motor housing - you have to bring all of the remotes to the garage with the door shut, press and hold the button for (IIRC) 30 seconds and all is well. But I don't know specifically about yours - the procedure might be way different. SteveBaker (talk) 00:25, 20 April 2009 (UTC)[reply]


April 20

Base classes (C#)

I have a handle management class called Win32Handle (written in C#) and specialized derived classes for objects like job objects, processes, threads, etc. In Win32Handle I want to have a Duplicate() method which all derived classes will inherit. The problem is, instead of the Duplicate() method returning a Win32Handle I want it to return a specialized class instance. For example:

ProcessHandle ph = ...;
ProcessHandle ph2 = ph.Duplicate(ProcessAccess.Terminate);

instead of:

ProcessHandle ph = ...;
Win32Handle ph2 = ph.Duplicate((int)ProcessAccess.Terminate);

How can I do this? --wj32 t/c 02:49, 20 April 2009 (UTC)[reply]

You could make your Win32Handle class be generic Win32Handle<T>. Then redefine Duplicate to return a T. 124.214.131.55 (talk) 04:59, 20 April 2009 (UTC)[reply]
Great, that works! Thanks a lot! I didn't try this before because using D the compiler just segfaulted. --wj32 t/c 06:25, 20 April 2009 (UTC)[reply]
This is called the curiously recurring template pattern. -- BenRG (talk) 01:02, 21 April 2009 (UTC)[reply]
Thanks for the link. I think D (although I am not using it right now) may have some problems with this pattern... --wj32 t/c 04:21, 21 April 2009 (UTC)[reply]
You may want to post this question to the newsgroup "microsoft.public.dotnet.languages.csharp" instead. Quite possibly you will get a better answer. That's not to say that there's anything wrong with 124.214.131.55's answer (I couldn't tell). decltype (talk) 05:51, 20 April 2009 (UTC)[reply]

Time Travel

What is your current advances on time travel? —Preceding unsigned comment added by 64.30.106.235 (talk) 05:48, 20 April 2009 (UTC)[reply]

Take a peek at the article on time travel. Going forwards works pretty well. (Or, given that this is the computing reference desk, you didn't mean time capsule did you?) 88.112.62.225 (talk) 06:47, 20 April 2009 (UTC)[reply]

I have formulated a way to travel forward in time about an hour every 3600 seconds! Gunrun (talk) 08:09, 20 April 2009 (UTC)[reply]

and each of that second must be at least as fast as (1/5.39124)*1044 tp manya (talk) 05:03, 21 April 2009 (UTC)[reply]
It would be better to ask this question on the Science Ref Desk - since it has nothing to do with computers. Sadly, the answer there will be just the same - you can't go back in time - and going forwards is mundane. SteveBaker (talk) 21:15, 21 April 2009 (UTC)[reply]
Going forward isn't always mundane. It's possible to go forward in time at an accelerated rate, by moving at high speeds, such as those which are a substantial portion of the speed of light. See Time_dilation#Time_dilation_and_space_flight. Just don't plan on going back in time to where you started. StuRat (talk) 18:39, 23 April 2009 (UTC)[reply]
Travelling fast is pretty mundane. There is nothing qualitatively different about travelling at relativistic speeds compared to walking down to the shops. There is nothing that one would think of as a special time machine invention involved. --Tango (talk) 18:49, 23 April 2009 (UTC)[reply]
"Mundane" is in the eye of the beholder. Sure it doesn't break any laws of physics, but nothing ever does. If you left Earth, and returned a week later to find that humans were extinct and had been replaced by talking chimps, you wouldn't find that mundane. You would think "Wow. Time travel is amazing." APL (talk) 19:50, 23 April 2009 (UTC)[reply]

TrueCrypt's security

Why does everybody (internet forums, wikipedia, etc) believe that TrueCrypt is really secure? How should a skeptical proceed to test this assertion?--80.58.205.37 (talk) 10:23, 20 April 2009 (UTC)[reply]

Mostly because it is open-source for public scrutiny, and the rationale for all the security design considerations are very well documented, and it uses well-known ciphers. As opposed to proprietary software who claim to be secure because of their "amazing 4096-byte parallel matrix" closed-source cipher. decltype (talk) 11:00, 20 April 2009 (UTC)[reply]
If the ciphers are secure, and the implementation is straightforward, then it should be secure. As for someone skeptical, consult paranoid security experts — unless you have a deep understanding of both computer programming and cryptography you're not going to be able to come up with a meaningful way to test it yourself. ---98.217.14.211 (talk) 13:05, 20 April 2009 (UTC)[reply]

Type of DC socket in a HP laptop

The laptop shows it is powered only when the power plug is inserted and kept at certain angle. I did some research on the internet and found out that the problem lies in the socket in the laptop. One of the tests was to remove the battery and see if the laptop goes off if the angle is slightly changed. HP's website unfortunately does not have a manual for this model (ze5700). I have never opened this laptop before, if the socket is soldered to the mother board I cannot replace it anyway, so i won't open it in that case. If the socket is of non-soldered type, perhaps I can buy one and replace it. ( is it a generic part? or i have to order it from HP?). Can you please say which type of socket this laptop posseses?. —Preceding unsigned comment added by 131.220.46.24 (talk) 10:47, 20 April 2009 (UTC)[reply]

I've never seen your exact model so I accept I could very well be wrong, but I've personally never seen a non-soldered power socket on a laptop motherboard. Soldering is simply the quickest/easiest/cheapest way for them to do it and I would assume that yours is the same too. I also doubt that your socket is faulty, the socket itself doesn't really have anything in it that can break, but from you're describing the problem sounds like part of the solder connecting the socket to the motherboard has come off and you only get a proper connection when you angle it a certain way forcing the connection. Whilst you could try getting it repaired under warranty (if it's still valid?) it's not really a manufacturing defect and it's only really the sort of thing that can happen if it's dropped or knocked whilst the lead is in and I'm afraid finding someone to try and resolder it is probably the only solution. Even then it might not work very well though, we had a Dell laptop that we tried to fix for this problem and it just kept breaking again and in the end we had to get the user another laptop. I appreciate my entire post is an assumption on your laptop, but I hope it's of some help. ZX81 talk 11:26, 20 April 2009 (UTC)[reply]
There are really two kinds of problem - one is that the socket is bent inside and only makes contact when you bias the plug in that particular way. The other is that one of the solder joints that holds the socket to the circuit board has cracked and is only making intermittent contact. If you are lucky - and it's the first of those things then perhaps you can gently bend the connector back to where it makes good contact. It's usually the bigger strip of metal that contacts the outside of the plug rather than the thin one that goes up the center of the plug. However, in likelyhood - you'll have to either replace it or re-solder it - and that amounts to the same thing in the end. If you can find a local computer repair store, they should be able to do it while you wait...but how much that's gonna cost is anyone's guess. Anyone who can solder can do this...and learning to solder isn't that hard (I'm self-taught - and I'm a klutz - but I can do stuff like this easily). Fry's have low-budget soldering irons for $10 and solder for $5 - so perhaps this is time for you to learn! It's such a simple job that if you happen to live near Round Rock, Texas - I'll do it for you for free. In the unlikely case that the socket is literally broken (I think that's unlikely) then you'll first need to remove the old one - and that's a bit harder...you need a way to remove the old solder first and that requires another tool called a 'solder pump' - which will probably set you back another $15. No matter what, you've obviously got to get it fixed - so that's that. SteveBaker (talk) 21:11, 21 April 2009 (UTC)[reply]

kezboard trouble

to get y i have to tzpe z and vice versa. close square brackets comes up as equals. how do i fix it_ cannot find the tilde.


I think you are mapped to a german keyboard. If you are using windows xp, click the "DE" icon in your task bar (near the clock) and select EN to change it. If that is not the case, perhaps there are other errors. —Preceding unsigned comment added by 131.220.46.24 (talk) 11:28, 20 April 2009 (UTC)[reply]

Try Alt+Shift. --Andreas Rejbrand (talk) 11:33, 20 April 2009 (UTC)[reply]
Still in XP, if you go to the control panel, click Regional And Language options, and make sure the Standards and Formats is selected as the English of your nationality. Livewireo (talk) 21:27, 20 April 2009 (UTC)[reply]

How to count characters on Wikipedia articles

Hello, is there any tool which can be used to count the length of a Wikipedia article in characters (i.e., not in bytes)? Thanks for your help! --Leptictidium (mt) 16:21, 20 April 2009 (UTC)[reply]

Add this to your monobook:
importScript('User:Dr_pda/prosesize.js');
In the toolbox on the left there should be a new link ("Page size"); click that.  GARDEN  16:47, 20 April 2009 (UTC)[reply]

Port Forwarding

I'm looking for information on how to forward ports on the Ambit DOCSIS cable modem. —Preceding unsigned comment added by Shadowclouds6635 (talkcontribs) 18:21, 20 April 2009 (UTC)[reply]

You might be able to change the settings by going to this page, but it looks like your model allows your ISP to disable settings from their end, so it might not be possible.
Also you can try using username: admin password: cableroot and see if that shows more options. These are just internet rumors, so don't take my word for anything. Indeterminate (talk) 19:22, 20 April 2009 (UTC)[reply]
hmm, I came across a similar thing about the ISP rewriting the firmware or something, to prevent port forwarding. I've phoned and asked them and they say they do not prevent port forwarding, so I'm at a loss as to what to do. The link you provide doesn't work, and there are no options for changing settings at the router login page. Are there standard unblocked ports already forwarded which I could use? Like 80 or something? I'm trying to let my friend connect to my server from her computer. Shadowclouds6635 (talk) 19:30, 20 April 2009 (UTC)[reply]
From your response it seems that what's probably going on is that your ISP is blocking port 80 (or 25, or whatever else) for their own reasons (viruses, to create price discrimination, some other reason). If your cable modem is a level 2 device (what I'd expect), then port forwarding is irrelevant. You might be more interested in figuring out how to port forward on the IP device connected to your modem (router or computer). If your cable modem is a combined router and modem, then access the router portion of the modem and setup the settings as the other responses and your instructions suggest. In many cases cable modem configurations are not accessible (legally) by the user. But a cable modem at its most basic level won't be doing TCP level restrictions. Anything doing that is more than a simple cable modem (which is certainly possible). What ISP is this? Shadowjams (talk) 08:11, 21 April 2009 (UTC)[reply]
Virgin Media. The port I wish to forward is 5800, so my friend should just have to type my ip address such as xx.xxx.xxx.xxx:5800 to connect. I've added the exception in the Windows firewall, I just can't think of what else to do. There are no changeable options in the modem page, even after I log into it with the password, it just lists the version number of the modem, downstream and upstream info. Thank you for helping me. Shadowclouds6635 (talk) 08:47, 21 April 2009 (UTC)[reply]
Bump Shadowclouds6635 (talk) 09:05, 22 April 2009 (UTC)[reply]
Bump Shadowclouds6635 (talk) 12:11, 23 April 2009 (UTC)[reply]
I don't mean to sound like a jerk, but please don't bump your help request. It says at the very top of this page that it might take several days for someone to reply (and that's assuming anyone knows the answer) and it certainly won't "bump" it back to the top like it would on a forum. Regarding your actual problem, I assume if you're using port 5800 then you're trying to configure VNC's web access so try opening port 5900 as well. 5900 is VNC's (default) data port and I can't remember if you need to open that for the the web access to work, but it's worth trying. Other than that Virgin Media might be blocking port 5800 (I don't know) so to test that, configure VNC to run on a different port and see if you have the same problem. ZX81 talk 14:28, 23 April 2009 (UTC)[reply]
 
Based on what I infer from forums posts about your modem, it sounds like the ISP can restrict what the modem can and can't do. I'd consider dropping the lease in favor of something like this, or one of these. If that's not an option, contact me again.   — C M B J   16:39, 23 April 2009 (UTC)[reply]

MicroSd and MicroSDHC compatibility?

I have a Toshiba TS705 see and it has a card slot microSD (TransFlash). Can I put a 4GB microSDHC into it?--212.79.145.190 (talk) 18:58, 20 April 2009 (UTC)[reply]

Well, you can put it in, and it shouldn't break anything, but it might not work. SDHC is backwards compatible with SD, meaning that SD will work in SDHC readers[2], but SDHC won't work in SD-only readers. It sounds like the TS705 might be SD-only, but I can't find any definitive specs. Indeterminate (talk) 19:11, 20 April 2009 (UTC)[reply]
I am thinking about buying it, and I cannot test it without buying it...  :(--212.79.145.190 (talk) 19:15, 20 April 2009 (UTC)[reply]
MicroSDHC#SDHC Might be an intresting read.. if your intrested in that sort of thing. If you do buy one get it from Fry's Electronics, They have a relaxed return policy. – Elliott(Talk|Cont)  19:18, 20 April 2009 (UTC)[reply]
According to the Toshiba Europe site, it supports up to 512MB microSD, so I don't think it has microSDHC. --Wirbelwindヴィルヴェルヴィント (talk) 15:40, 21 April 2009 (UTC)[reply]
In the meantime, I tried it with a SDHC card and it didn't work. :( On the other hand, it do works with a 1GB microSD. Anyway, having 1GB is enough. --85.137.179.58 (talk) 18:47, 21 April 2009 (UTC)[reply]

From a Wikimedia sound file to Itunes

How would I copy a Wikimedia file to Itunes, or make an audio CD from it? It is easy to play a w=Wikimedia sound file, but (using Windows XP) I do not see how to save it on my computer or import it into another application. An example is [3]. The closest I see when I click on the file is "Open link," and "save link" which does not save the file as such so that some application such as Itunes or Audacity could burn a CD of it. Thanks. Edison (talk) 19:23, 20 April 2009 (UTC)[reply]

This google search might be of some help. – Elliott(Talk|Cont)  19:33, 20 April 2009 (UTC)[reply]

When I say "save target as" on your example above, I get an 18M ogg file saved. You can import this file into any number of converters or burners... it works with Nero to make an audio cd. Sandman30s (talk) 20:35, 20 April 2009 (UTC)[reply]
Save the file to your desktop and see if iTunes can open it. It may be able to convert it to a format it can burn (.ACC). Livewireo (talk) 21:24, 20 April 2009 (UTC)[reply]

Restore image within VBox

This is an interesting question too which i am not sure there is an answer. I have 2 laptops, the firstlaptop is running windows XP Pro. The second laptop (of different design than the first) is running Ubuntu 8.10. The second laptop has VBox OSE installed. My goal is to take am image of the first laptop and restore that image on a virtual hard drive within a virtual environment ran by VBox. The only problem i am encountering is that when i try to start up that virtual environment i get a Blue screen of death shortly after HAL loads. Is there anyway i can prepare the first laptop to function in a virtual environment? Or is there a way i can change VBox to emulate the hardware found on the first laptop? Or is there any other ways that i can get this to work? Not only would i like it to work when i restore an image from another computer but i would also like it to work when i map a hard drive from another computer using VBox's built in raw disk utility (as i am encountering the same problem with the BSoD and what-not). Any advice / links / URLs / hugs and/or cookies (chocolate chip please) would be very useful and/or appreciated. Thank you. – Elliott(Talk|Cont)  20:49, 20 April 2009 (UTC)[reply]

In an attempt to clareify, here is a copy of what I said on the Talk page.

I supose that is where my problem lies. My inability to relay the right question. My question is about taking a running system; a home computer for instance, And take an image of that hard drive with a program like R-Drive. Then using R-Drive's bootable CD to boot up a another computer, and restore the image taken on this other computer. The only problem is this 'other' computer is really VBox. And since this 'other' computer is searching, reaching, trying to feel for what it's world was not moments before, and not finding it's hardware, it's world, it falls in to a state of Kernel panic. My question is how to i tell the computer, the OS, that it's world, it hardware, what it has known to be true and what it has relied on for it's life, is about to change in every way, to prepare it to be plunged in to darkness. How do i give it a flicker of light to rely on? Something to grasp and hold on to. – Elliott(Talk|Cont)  17:03, 24 April 2009 (UTC)[reply]

digital camera

My digital camera is pretty new. it used batteries really fast, like needs new batteries every 5-10 pictures. is there something wrong? Wikivanda199 (talk) 22:24, 20 April 2009 (UTC)[reply]

What kind of batteries does it use? Are you using the recommended ones? There might be a low-power setting you can switch it to, which could help. --Tango (talk) 22:31, 20 April 2009 (UTC)[reply]
How much time passes between pictures? What kind of camera is it(make / model)? – Elliott(Talk|Cont)  22:45, 20 April 2009 (UTC)[reply]
Most cameras use rechargable, special batteries, but some cheaper models use standard, non-rechargable AA(A) batteries. I believe that cameras using standard AA(A) batteries will require quite frequent battery replacement, but certainly (unless it is a really cheap camera!) not as often as every 5-10 pictures. --Andreas Rejbrand (talk) 07:50, 21 April 2009 (UTC)[reply]
Not convinced by the AA perspective. I have a Pentax K100D, not exactly an expensive camera but not cheap either. It takes AAs and it can take around 500-700 shots with them. Certainly the proprietary battery-packs that some cameras take aren't 'better' than normal batteries, they're just designed so you have to use their replacements instead of normal batteries. Most dSLR cameras i've seen take AA batteries. 194.221.133.226 (talk) 15:07, 21 April 2009 (UTC)[reply]
Scratch that last comment - seems that's more just because i'm a Pentax lens only so only really looked at Pentax. Seems Nikon and Canon use their own batteries. 194.221.133.226 (talk) 15:11, 21 April 2009 (UTC)[reply]
Cameras that use AA batteries work with NiMH rechargeable AA batteries. The non-rechargeable batteries you're thinking of are alkaline batteries, which are available in AA size. Plenty of expensive cameras use AA batteries and plenty of cheap cameras use proprietary batteries. My Canon PowerShot SX100 gets hundreds of shots on a pair of AA rechargeables. There's no way a camera could only get 5–10 shots on a single charge (regardless of battery type) unless there were long periods of standby between the shots. It's not even physically possible to drain a battery that fast. -- BenRG (talk) 15:40, 21 April 2009 (UTC)[reply]
Yeah - there is something very odd going on here. If you put a new set of disposable batteries into the camera - turned it on and pressed the shutter button five to ten times over (say) 20 seconds - and then found that the batteries were dead - they'd be so hot, you'd burn yourself touching them! You simply can't discharge a battery that fast without it getting insanely hot. In fact, they might even get so hot that the chemicals inside might boil and then the battery would explode! Since none of these terrible things have happened to you (presumably), there must be something else going on. So either you're talking about taking a picture, leaving the camera turned on for 20 minutes, taking another picture, waiting 20 minutes and so on (in which case, just remember to turn the camera off when you're done using it)...or, possibly, you have rechargeable batteries that aren't properly charged - which suggests that they are either duds or the charger isn't working or something). Dead batteries will sometimes "come back to life" after a few minutes of recovery time - then die again shortly afterwards - so if your charger were completely dead (or not plugged in or something) then you might take the rechargeables - think that you're charging them (when really you aren't) and because they've rested for a while, you get a few more shots out of them before they die again. However, after you've repeated this procedure a few times, they'll die and stay dead. So this kinda fits the possibility that you have a dead battery charger. I suppose another possibility is that you aren't letting them charge for long enough. SteveBaker (talk) 20:37, 21 April 2009 (UTC)[reply]
I had this experience once when the only AA cells I could buy where the non alkaline "heavy duty". These hardly lasted for 20 pictures, when normally 100 or 200 pictures come off alkaline cells. Are you using fresh alkaline cells? Graeme Bartlett (talk) 20:56, 21 April 2009 (UTC)[reply]

These are AA batteries. It usually takes 20 minutes for me to take the 10 pictures and it is on for most of that. All the pictures are in macro mode if that makes a diff. The camerea is a Nikon L18 coolpix. Wikivanda199 (talk) 12:12, 23 April 2009 (UTC)[reply]

Are they rechargeable batteries ? I have rechargeable AA batteries which are several years old, and they don't hold much of a charge any more. 5-10 shots with the flash on is about what I'd expect. Perhaps they gave you some old rechargeable batteries with the camera ? StuRat (talk) 18:34, 23 April 2009 (UTC)[reply]

Take the camera back to where you got it. I'm actually in the middle of a similar situation (my camera is older, but one day it just started burning through batteries at a rate similar to the OP's). I talked to my sister, who used to work at a camera shop, and she said that it's not unheard of for cameras to suddenly fail in this way. I have no idea if there's a fix for it (she didn't think so, but was unsure). I'm using this breakdown as an excuse to get a dSLR, but if your unit is still under warranty, you should have someone fix/replace it if you can. Matt Deres (talk) 20:37, 23 April 2009 (UTC)[reply]


April 21

Problem with Java applet

I'm programming a java applet for a computer science class. The applet is basically a simplified version of a minesweeper game. The professor has removed several sections of code and commented the area with "//YOUR CODE HERE".... I have provided code which i think completes the requirements, but when i compile the code and run the container HTML, it has a few strange bugs.

Basically it says i've won as soon as i click any square. I've looked over the code many times and still can not find the problem. Additionally, Netbeans 6.5.1 shows no errors.

Can anyone enlighten me as to what the heck is wrong? Thanks! :)

http://pastebin.com/m6423e51e

137.81.112.205 (talk) 01:08, 21 April 2009 (UTC)[reply]


Additionally, i've looked at the method "allSafeSquaresAreExposed", since if there is a problem here, it would tell me ive won... but there seems to be no fault in this method.

137.81.112.205 (talk) 09:41, 21 April 2009 (UTC)[reply]

Well, first let's figure out if the bug is in the "allSafeSquaresAreExposed" method. Remove your code and hard-code the method to always return a false. Does this stop the Java applet from ending immediately and saying you've won ? If so, this is where the problem is manifested. Note that this isn't necessarily where the problem originates, however. StuRat (talk) 18:15, 23 April 2009 (UTC)[reply]
Here's the method in question:
   public boolean allSafeSquaresAreExposed()
   {
       //YOUR CODE GOES HERE
       for (int i=0;i<numSquares;i++)
       {
           for (int j=0;j<numSquares;j++)
           {
               if (hasMine[i][j] == false && isExposed[i][j] == false)
               {
                   return false;
               }//end if
           }//end for j
       }//end for i
       return true;
       //end of YOUR CODE GOES HERE
   }
Looking at your code, I don't recognize the "i<numSquares" and "j<numSquares" syntax (but then again, I don't know Java). What does that do differently than just putting "numSquares" in both positions ? I'd also expect the number of squares in the i and j directions to be different, and thus have different variables, but apparently your program is only designed to handle square grids. StuRat (talk) 18:15, 23 April 2009 (UTC)[reply]
[to StuRat] In C and derived languages, the syntax for a for loop is for(init;test;step) body. It just means "Execute init, which may declare a variable, then evaluate test some number of times. Each time it turns out true, execute body and then step. When it's false, stop.". The most common kind of for loop is over a fixed range (usually, in 0-based languages, 0 up to but not including n), so you write for(int i=0;i<n;++i) ... which evaluates its body with i=0, then 1, ... and stops (before executing the body again) when it becomes n. (++i — or, in isolation, i++ — is equivalent to i=i+1.) --Tardis (talk) 23:02, 24 April 2009 (UTC)[reply]

Java Cipher

I would like to make a new Java cipher that can be loaded with Cipher.getInstance("MyNewCipher"). I've looked at a lot of code examples and they all have something in common that doesn't make sense to me. See this example. If I copy that as is and attempt to compile it, I get an error because Cipher is not imported, but the class extends Cipher. If I import Cipher, I get an error because there is no constructor and Cipher does not have a null constructor. How is it that apparently everyone else in the world can extend Cipher without importing it and then magically get a null constructor out of it? -- kainaw 01:52, 21 April 2009 (UTC)[reply]

The Cipher with the no-args constructor is com.sun.portal.kssl.Cipher which is not the same as javax.crypto.Cipher. Perhaps Bouncycastle source code has more relevant examples. I'm not sure but you may need to sign you cipher jar for it to work; see [4] and google. 88.112.62.225 (talk) 04:12, 21 April 2009 (UTC)[reply]
I'll check bouncycastle. There's a lot of code there. I was hoping this would be as easy as adding a MessageDigest service. -- kainaw 20:43, 21 April 2009 (UTC)[reply]

Printing seamless tiles

Is there a simple tool (Windows or Linux) that can print a page full of seamlessly tiled, err, seamless tiles (like the ones you can use as a tiled desktop background)? I tried searching on Google, but I can't for the life of me figure out how to search for that...tiled printing, which I assumed to be the term for that, is actually the name for rasterbation which is the opposite of what I want to do, and all other combinations of search terms I can think of give me tutorials on how to create seamless tiles (which I already know) and repositories of printable seamless textures (which is useful, but I still don't know how to print them). Thanks in advance, Ferkelparade π 02:38, 21 April 2009 (UTC)[reply]

That sounds like a feature you might find in a word processor. For example, I have OpenOffice 2.3 Writer on my computer. I was able to go to Format, Page, Background, choose an image and set it to tile. --Bavi H (talk) 03:53, 21 April 2009 (UTC)[reply]
ImageMagick can do everything. For this, try:
composite -tile tiled_image.jpg -size 1200x1600 xc:none tiled_output.pdf
That will give you a 1200x1600 tiled image that you can print. You can twiddle the dimensions to suit your paper size. --Sean 12:49, 21 April 2009 (UTC)[reply]
Thanks for both your suggestions. I've meanwhile figured out that there's a way to do that in Scribus but it's not that comfortable, so I wil definitely give ImageMagick a try. -- Ferkelparade π 19:17, 21 April 2009 (UTC)[reply]
It's easy to do in GIMP too (that's a free paint program). Load up your image, right-click on it and select: "Filters/Map/Tile..." then enter the size you'd like the result to be (either as a percentage or in pixels) and hit "OK" then right-click again and do "File/SaveAs...". SteveBaker (talk) 20:26, 21 April 2009 (UTC)[reply]

Less number of Seeds

Does having less number of seeds during downloading a movie through a torrent affect the quality of film at the end?Most of films like Ali,Cinderella man etc...have come out awful after download.They had less number of seeds initially.In all these films for every few minute a scene get stuck for four to five seconds and jumps to the scene which is at the end of four seconds.It happens too frequently through out the film.How should I select good torrents? —Preceding unsigned comment added by 121.246.174.130 (talk) 05:00, 21 April 2009 (UTC)[reply]

You are paying for the films you download, I hope? --Andreas Rejbrand (talk) 07:47, 21 April 2009 (UTC)[reply]
No, a low number of seeds will only affect the download speed, or if there is not a distributed copy of the file among the seeds you will not be able to complete the download. The problem you describe, of the playback skipping throughout the film, is caused by an incomplete download. Where the film jumps it means you are missing small "chunks" of the download. You must go back to your torrent program and complete the download to view the film properly. 8I.24.07.715 talk 08:30, 21 April 2009 (UTC)[reply]
While you shouldn't download illegally, this is still a very valid question. What the above poster said is right; if you get the file downloaded to 100%, it doesn't matter if there are 1000 seeds or 1, because you won't get it to 100% unless the CRCs match (although there are ways to trick the CRC to match, but that's a different story). Another problem could be that you are getting a poorly encoded file, or a very well encoded file that your computer isn't good enough to handle. My desktop can't handle 720p h.264 too well, for example. --Wirbelwindヴィルヴェルヴィント (talk) 15:32, 21 April 2009 (UTC)[reply]
BitTorrent doesn't use CRCs, it uses SHA-1. CRCs can be spoofed easily but there's no known way to do that with SHA-1. -- BenRG (talk) 16:37, 21 April 2009 (UTC)[reply]
Oops, my bad. I was mistaken because for some reason, I recall organizations trying to create false pieces, and CRC wasn't too hard to spoof. --Wirbelwindヴィルヴェルヴィント (talk) 19:32, 21 April 2009 (UTC)[reply]
As far as I know there are organizations out there right now injecting fake data into torrents of Hollywood movies. The fake data can't end up in a completed download, but it can make downloading a lot less efficient, especially since the .torrent file only stores hashes of chunks of 256K to several megabytes while files are usually transferred in chunks of 16K. When a 1-megabyte chunk fails the hash check, the client can't immediately tell which peer is responsible since it might have received parts of it from several different peers. Also, in the worst case the whole megabyte has to be downloaded again just because of 16K of bad data. -- BenRG (talk) 01:15, 22 April 2009 (UTC)[reply]
It's called Torrent Poisoning —Preceding unsigned comment added by 82.44.54.169 (talk) 07:40, 22 April 2009 (UTC)[reply]

row separator in MS Excel?

Just like you have separators in menus to club related items together, is there anything like row separator in Excel? I do not want to use text or background/fill colors, and I do not want to leave empty row of small height. Any ideas please? I am using Excel 2003. manya (talk) 06:35, 21 April 2009 (UTC)[reply]

Would making some of the gridlines/borders bold also be out of the question? Zain Ebrahim (talk) 07:15, 21 April 2009 (UTC)[reply]

I got something close to what I am looking for by removing all cell borders and then applying only bottom line border to the last row in each 'set of rows'. But when I print it, it does not look good because of missing borders of all cells :( Still looking for better solution. manya (talk) 07:16, 21 April 2009 (UTC)[reply]

Why don't you use standard borders and make the bottom line borders thicker? Zain Ebrahim (talk) 07:18, 21 April 2009 (UTC)[reply]

Thanks Zain. That works well for me. - manya (talk) 07:25, 21 April 2009 (UTC)[reply]

Google

1. How can you make a Google search case sensitive?

2. How can you make it so you get a result with your phrase at the end of the sentence, not any part of the sentence? For example, a sentence that ends with "but dos isn't"? 58.165.23.195 (talk) 07:11, 21 April 2009 (UTC)[reply]

1. You can't. Also see an old post.
2. If Google supported the period character, it would have worked, but Google ignores most special characters excluding +#$_-
Jay (talk) 08:28, 21 April 2009 (UTC)[reply]
1) I've often wished Google could do case-sensitive searches. A search for "NeXT" gets over 3 billion hits, for example. (At least the first one is our article on NeXT.) StuRat (talk) 17:55, 23 April 2009 (UTC)[reply]

Switch

What happened to when we could just turn off a computer by pressing the On/Off switch? Why do we now have to hold the switch for 5 seconds to turn the computer off? After all, you may need to turn a computer off like that if you are forced to. 58.165.23.195 (talk) 09:08, 21 April 2009 (UTC)[reply]

I've always thought the reason was to prevent you from accidentally turning off the computer and losing unsaved work. That's probably why the reset button is so tiny. Zain Ebrahim (talk) 09:12, 21 April 2009 (UTC)[reply]
Yeah, that seems pretty obvious to me.  GARDEN  09:24, 21 April 2009 (UTC)[reply]
You can still turn it off using a single press on the power button. Just set the option in the Power control panel (for Windows). F (talk) 10:14, 21 April 2009 (UTC)[reply]
Suddenly turning off the power can cause problems and in some cases seriously damage your computer. The delay is presumably so you can be certain you want to turn the computer off with none of the pre-preparation a compauter normally goes through. Vimescarrot (talk) 10:48, 21 April 2009 (UTC)[reply]
Agree 100% with above. Even if it doesn't damage the hard drive, your computer uses cache memory and that data will be lost when the power is pulled, which alone is enough to lose or corrupt files. Also, harddrives could have the heads parked wrong or something and cause some sort of failures, although I'm not sure what comes into play if you use solid state hard drives. I've seen power outages cause all sort of havoc, even with surge protectors and APCs (well, 1 APC, but still, the possibility is there). --Wirbelwindヴィルヴェルヴィント (talk) 15:24, 21 April 2009 (UTC)[reply]
In most systems, pressing the power button once will trigger the shutdown command. You can press the button and walk away. The computer will (eventually) shut down. Of course, it may get hung waiting for you to verify that you don't want to save changes to some files you have open. -- kainaw 15:48, 21 April 2009 (UTC)[reply]
And holding it down forces a shutdown by the hardware, not by the OS (or something like that). 24.6.46.177 (talk) 01:18, 22 April 2009 (UTC)[reply]
I mean, if you really can't wait a few seconds to turn off your computer when it isn't responding (which shouldn't happen that often anyway), you can still always just pull the plug from the outlet, flip the switch on the power supply on the back of your computer (if you have one), or flip the switch on your power strip, and it would be the same. --76.167.241.45 (talk) 16:22, 22 April 2009 (UTC)[reply]

Seeds

While a torrent is downloading under the seeds column wi find 2 numbers one not in bracket and other one enclosed in bracket.Same with peers column.What do they mean? —Preceding unsigned comment added by 121.246.174.130 (talk) 12:50, 21 April 2009 (UTC)[reply]

I believe the open number is seeds you are connected to and the number in the brackets is seeds connected to the torrent. I assume you are using utorrent? Livewireo (talk) 13:10, 21 April 2009 (UTC)[reply]
That should be correct, in general. To be more specific, the larger number should be the pool, cause some software might have different notations. And uTorrent uses parantheses. I think Azureus uses brackets but it's been a long time since I've used it. --Wirbelwindヴィルヴェルヴィント (talk) 15:18, 21 April 2009 (UTC)[reply]

Resin and Mysql

Resolved

Hi I am having a problem trying to display an image using resin and mysql. I have the code as such

'http://localhost:8080/Project2/images/acerpal.jpeg'

When I try to display the image all I get on my display page is the above text any ideas thanks. BigDuncTalk 14:46, 21 April 2009 (UTC)[reply]

Please don't post multiple copies of the same question =3 --Wirbelwindヴィルヴェルヴィント (talk) 15:14, 21 April 2009 (UTC)[reply]
I didn't I was getting an error when I tried to post and wasn't aware that I had posted and only came here to re post from my home PC. BigDuncTalk 16:53, 21 April 2009 (UTC)[reply]
Silly question, but when you type that URL into your address bar, does the picture show up? x42bn6 Talk Mess 00:41, 22 April 2009 (UTC)[reply]
It does yes. BigDuncTalk 11:12, 22 April 2009 (UTC)[reply]

Berne convention and the Internet

Hello. I have three questions about the Berne Convention as it applies to the Internet. I hope this is the appropriate desk for these. ^^

1) I've heard that anything you write in a blog is automatically subject to the Berne Convention. Is this true? Would this apply to anything written in web pages in general? (Also, what would happen if the web page disappeared? Would the rights hold?)

2) If I upload a file to a file hosting service, would it apply to the Berne Convention as well? Would the file type make any difference?

3) Are there any other ways to apply a document to the Berne Convention besides these (if at all)?

Thanks in advance, Kreachure (talk) 21:14, 21 April 2009 (UTC)[reply]

1. Depends on what country you are in. If you are in a Berne country, then yes, it automatically goes under Berne, because you are a citizen of said country and Berne is automatic.
2. Uploading is not a creative act. Berne comes into effect whenever you create something new. Did you create the thing that you are uploading? Then Berne still applies. File type doesn't matter. Note that you can lose your Berne-given copyright ability if you, say, agree to transfer the copyright (which some file uploading services and etc. make you do, so they don't have to worry about being accused of copyright infringement).
3. I think you're kind of confused on what's being covered by Berne. Not "documents"—think instead, "expressions." If that expression is in the form of a document, so be it. If it is in the form of a speech, no different. How about a song? No difference. A building? No difference. A Microsoft Word file? No difference. What matters is the jurisdiction in which it is created (under Berne or not). At least, that's my understanding of it. --98.217.14.211 (talk) 22:42, 21 April 2009 (UTC)[reply]

Thanks for your reply. Being in a jurisdiction not covered by the Berne Convention seems very unlikely, so yeah, my questions were assuming you're inside the Berne Convention coverage. I have another question from what you said though, related to proving that it's you who created something first: Is blogging, making a web page, and uploading safe ways to prove that it was indeed you who created whatever it is you created first, so that the Berne Convention applies automatically to you as soon as you 'publish' (or upload, etc.) them (and no one else can claim that it was them who created it instead)? Might there be safer ways on the Internet to prove it? I came up with file hosting because I presumed that there's some timestamping involved in the process (which would prove that it was you who created the thing first), but maybe there are safer services to 'secure' your rights through the Berne Convention? (Or, maybe there's simply no need to worry about timestamps and such in the first place?) Kreachure (talk) 23:22, 21 April 2009 (UTC)[reply]

See poor man's copyright. The best way is to avoid the internet altogether if you are really worried about such things. Personally if I were doing a poor man's copyright I would do it with hashes and services (like Usenet) which distribute said data widely (making it increasingly unlikely that I was in collusion with any given site or company). --98.217.14.211 (talk) 00:13, 22 April 2009 (UTC)[reply]
You may also want to read through World Intellectual Property Organization Copyright TreatyChed :  ?  02:37, 22 April 2009 (UTC)[reply]


how can people just hack into gov. computers??

how is it possible to simply hack into a government computer or power grid or whatever? Let's say there wasn't any social engineering with email either. I mean, I just don't get it, if this capability exists couldn't someone technically shut down 80% of every internet end-user because we're all on the same windows operating systems? or couldn't the entire backbone of the internet run by the DoD or DARPA or whatever be shut down? If gov. computers are vulnerable it just seems like nothing is safe. why isn't there trillions of dollars of credit card fraud if you can hack F-35 data filtering 16 digits of credit card data on a 128 bit encryption should be child's play. Any inight into this? thanks, -Rob 173.30.14.113 (talk) 00:26, 22 April 2009 (UTC)[reply]

I can't remember numbers, but I think a large proportion of hack-jobs involve insiders, which presumably makes the job considerably easier. And for some reason, I think decryption is one of the worst ways of hacking since it's infeasible to attempt to crack some of the stronger algorithms out there (240+) - it's a lot "faster" to look for exploits like open ports and badly-configured control panel areas. x42bn6 Talk Mess 00:39, 22 April 2009 (UTC)[reply]
Further... If you read an article in mainstream press that states something like "Someone hacked the CIA," it does not mean that someone hacked into a CIA computer that contains anything secure. It means that someone hacked into the CIA webserver, which is obviously accessible from the Internet, and is not considered a "secure" or "high risk" server. Often, the web servers for secure locations aren't even housed in the same building (or state) as the real servers that are used for storage of information. -- kainaw 01:20, 22 April 2009 (UTC)[reply]
You say that - but just today I read that many terabytes of design documents for the Joint Strike Fighter were copied by hackers - probably from China: http://online.wsj.com/article/SB124027491029837401.html In this case it seems they hacked into computers belonging to the developers of the jets - and from there got into Pentagon computers.
What amazes me is that this information is stored on computers that are connected in any way whatever to the outside world. The best security is physical security - if there are no wires and no wireless connections - then it's going to be very tough indeed for the information to get away. But evidently, even the best kept secrets of the US government are out there on servers that you can reach from the Internet. Incredible. SteveBaker (talk) 03:03, 22 April 2009 (UTC)[reply]
I read the paper today and i think it said the real real top secret data was physically separated from the internet, but yes, still that terabytes could be stolen out of thin air is just incredible to me. how could there be that many loopholes that net admins aren't monitoring!?? -Rob 173.30.14.113 (talk) 03:23, 22 April 2009 (UTC)[reply]
Unless I'm reading that article incorrectly, it does not make any sort of claim that hackers got into Pentagon computers. It specifically states that the Pentagon computers are not connected to in any way to the Internet. It states that the hackers got into computers that monitor the flight tests, which record a lot of information about performance and such. Sure - that's bad. However, it isn't the same scale as hopping from AOL to Lockheed to the Pentagon and then downloading all the nation's top secret info. I also like the way the article scales up: It appeared to come from China, but very well could have been anyone since online identities may be spoofed ... It is possible it was China ... China would do something like this ... We are damn certain it was China because we need another reason to convince everyone that China is evil! -- kainaw 05:32, 22 April 2009 (UTC)[reply]
There's a name for this: air gap (networking). -- BenRG (talk) 21:44, 22 April 2009 (UTC)[reply]
  • This morning there was an article in Dutch papers that said the Chinese government spied by breaking into "secure" computers of the Dutch government. In this case it was possible due to pure ignorance about security on their part. - Mgm|(talk) 09:38, 22 April 2009 (UTC)[reply]
You don't have to hack into them, see Data spill (and that lists only a tiny fraction). Only foreign governments are interested in things like CIA records and it's dangerous meddling with them so there's more easy money in things like your credit card details, but even that's not worth much because it is so easy to get such details nowadays, they need thousands to make a good profit. Dmcq (talk) 17:10, 22 April 2009 (UTC)[reply]
I used to work on the NSSN nuclear submarine program, and they kept all the important data (nuclear reactor, weapons/sonar systems, etc.) on different, secure computers while the majority of the boat was less secure. So, it's quite possible that someone could have broken in and gotten lots of data on the less secure parts, but who wants the plans for crew quarters, galley, and bathrooms ? ("Those yanks have X98 urinal cakes on-board ? Now we know the secret to world domination !") StuRat (talk) 17:42, 23 April 2009 (UTC)[reply]

April 22

Laptop graphics - will it run..

Hello, I'm thinking about getting hold of some older RPG games to run on a laptop - the amount of memory and processor speed it has seems much greater than that required. However I'm not sure about the graphics - it has an "Intel Mobile 945 Express chip" which I think will use software for much of the rendering - I've heard that sometimes such chips just don't work..

Games I am considering include the old Baldur's Gate and Icewind Dale series, and maybe Neverwinter Nights

I've done dxdiag successfully to 9.0c.

Should I expect problems (esp on Neverwinter Nights) ? Thanks.77.86.67.245 (talk) 00:38, 22 April 2009 (UTC)[reply]

BG and IWD shouldn't have any problems running, but it depends on the rest of your hardware. If you have a decent CPU and RAM, then you might manage to get NWN running. What are your other system specs? --Russoc4 (talk) 01:29, 22 April 2009 (UTC)[reply]
You beat me to it - update - I downloaded a Neverwinter demo (couldn't find demos for BG/Icewind) - curiously - it worked - even with everthing turned on (shadows etc).
However that was just as far as getting the 3D display up and running, moving around, menus etc.
I think I'll take the risk that it continues to work on a full version - unless anyone knows better.?
Is there any reason I should expect problems later on? I can still supply specs if wanted (tell me what figues you need).FengRail (talk) 02:12, 22 April 2009 (UTC)[reply]
Intel graphics chips are extremely problematic. You might get lucky - but I wouldn't bet on it. If you'd named an older nVidia or ATI chipset, I'd have said "Yes" with a high degree of confidence. SteveBaker (talk) 02:04, 22 April 2009 (UTC)[reply]
That's what I had heard hence my suprise when it worked - if it starts ok should I expect it to continue to work - any thoughts?FengRail (talk) 02:14, 22 April 2009 (UTC)[reply]
Not necessarily - but it's a promising sign! SteveBaker (talk) 03:07, 22 April 2009 (UTC)[reply]

I'm going to mark as resolved and cross fingers. Thanks.

Resolved

Infected

My brother's laptop with XP won't load the desktop when started up. When running in safe mode, I got the error code 1073741819, which apparently means the computer is infected with a virus. All the fixes I see online involve going to start and then run..which is impossible since the desktop won't load! Any ideas? 174.16.93.99 (talk) 01:26, 22 April 2009 (UTC)[reply]

Try to start in safe mode: (press F8 as the computer is booting up)

if computer starts shutting down

  1. Press CTRL+ALT+DELETE.
  2. Click the Task Manager button.
  3. Click the Processes tab.
  4. Click the Image Name column heading to sort the processes alphabetically by name.
  5. Look for a process named Msblast.exe. If you find it, click the name to select the process, and then click the End Process button.
  6. Close the Task Manager

Then go to here and download the tool and run it.

Hope that helps — Ched :  ?  02:23, 22 April 2009 (UTC)[reply]

 
You can access the "run" dialog by pressing and holding the Windows key plus the letter R, irregardless of whether or not explorer is running visible.   — C M B J   04:03, 23 April 2009 (UTC)[reply]
No, Windows+R is handled by explorer so you cannot use it when explorer is dead. --wj32 t/c 07:20, 23 April 2009 (UTC)[reply]
I sincerely apologize. You are right. In the event that explorer is an invisible zombie process, however, it will get the job done.   — C M B J   15:17, 23 April 2009 (UTC)[reply]

Viruses

I just downloaded Dr. Spyware to run a scan, and it found 21 infections of these two viruses: Trojan.CWS and Trojan.ClientMan. First, what exactly are they? Second, this pretty much confirms the reasons behind my computer freezing and crashing and what everyone has said about Windows Live OneCare sucking. Of course, the reason I took it was because some guy at FutureShop recommended it to me. Does anyone working at those electronic retail stores really have a clue about what they're doing? --Whip it! Now whip it good! 03:29, 22 April 2009 (UTC)[reply]

Hey Whip, re: the various viruses/trojans - I'd just google each term, read the summary on the first few lines to get an idea of what each one is. The following rant, is all WP:OR and IMO only. First, most of the people you find in tech stores are either going to be older folks just supplementing their income, or younger kids either working through school, or looking to get into the technology field. Also, stores are going to have "hot items", sales folks are told what items to push, because of a markup or promotional gig. Live One Care is M$, so it's gonna have a brand recognition advantage. I won't get into what I think about Best Buy. So the answer to your question is: NO, they don't really have a clue - that's not meant as a violation of NPA, just that the folks who do have the ability in the technology fields, don't work those type of jobs. Get yourself a free copy of Spybot S&D, or AdAware - then protect your self with a good AV program. The top free ones would be (AVG, Avast, or Avira). All IMO as I said. — Ched :  ?  03:48, 22 April 2009 (UTC)[reply]
Thanks, and I do have Spybot S&D, which is why I'm so miffed that these viruses got under the radar. BTW, when Dr. Spyware "cleans" the infections, does it really get rid of them? Cause I have the free version. --Whip it! Now whip it good! 05:08, 22 April 2009 (UTC)[reply]
As a general policy, I do not certify infected machines as sanitary unless they have been freshly reformatted. You cannot ever be absolutely certain beyond any reasonable doubt that an infection is in fact gone.
With that said, when I am, however, forced to eradicate an infection manually, I use a combination of HijackThis, Autoruns, Process Explorer, Process Monitor, and RootkitRevealer. (Note: These tools are designed for advanced users. Use them carefully under the supervision of someone knowledgable that can provide advice, or seek a qualified friend to do it remotely for you.)
My advice is this: if the machine is used to transmit or store sensitive data; play it safe. It's a whole lot easier to reinstall Windows than it is to clean up identity theft.   — C M B J   04:19, 23 April 2009 (UTC)[reply]
P.S. To verify the integrity of a single file, scan it with Jotti and Virus Total. This will test the file up against 30+ different virus scanners.
For future reference, when you are deciding which anti-virus solution to use on your computer, take a look at the latest benchmarks. According to the charts, OneCare has 81.1% detection rate, whereas Kaspersky has 97.1% and AntiVir Premium has 99.7%.   — C M B J   04:28, 23 April 2009 (UTC)[reply]
Don't trust an antivirus or antispyware product just because it reports an infection that another one doesn't. Some of these products are outright scams which tell you your system is infected so that you will pay for the registered version that can uninfect it. Even the legitimate products (I gather Spyware Doctor is in that category, if that's what you meant by "Dr. Spyware") often report false positives. The vendors don't have a lot of motivation to reduce false positive rates because it helps their bottom line, both by encouraging unregistered users to register and by creating the impression that the product is actively fighting off barbarian hordes when in reality it's just sitting there wasting RAM and CPU. Note the quote from the review at the bottom of the Wikipedia article: "in our trial scans, Spyware Doctor repeatedly flagged several dozen harmless cookies as potential threats, more than any other antispyware product we tested." Were those Trojan.CWS and Trojan.ClientMan infections that it flagged just cookies? If so, you're not infected. -- BenRG (talk) 12:54, 22 April 2009 (UTC)[reply]
Uh..no. Spyware Doctor would probably not report cookies as Trojans! :O Trojans.CWS refers to CoolWebSearch, an infamous browser hijacker Trojan. The PC Tools description And here's the PC Tools description for ClientMan. Both are real threats and should be removed ASAP. Additional scans should also be run with Malwarebytes' Anti-Malware and SUPERAntiSpyware Both are legitimate programs that well known for their detection and removal capabilities. In fact, MBAM (Malwarebytes' Anti-Malware) recently removed its one billionth piece of malware. :D (MBAM does not target cookies; SAS [SUPERAntiSpyware] does) I should note that Microsoft Live OneCare will be discontinued in June and that it is not a recommended anti-virus. Even McAfee does better in the latest AV Comparatives tests. It is simply not effective enough against malware.--Xp54321 (Hello!Contribs) 23:25, 23 April 2009 (UTC)[reply]
One more important note. The free version of Spyware Doctor does not remove detected threats. It only detects them. You're better off with Malwarebytes' Anti-Malware and SUPERAntiSpyware instead. Replace OneCare with avast! or Avira but not AVG Free. (Or any good paid anti-virus; Kaspersky, NOD32, avast! Professional, and Avira AntiVir Premium are all good choices) AVG Free lacks anti-rootkit; something simply not acceptable these days. Rootkits are used by a lot of malware these days to both hide themselves and protect themselves against removal. If anyone wishes to debate my recommendations; please feel free to do so. ;) I will provide links to back them up along with more information on why I consider certain programs to better than others. :)--Xp54321 (Hello!Contribs) 23:33, 23 April 2009 (UTC)[reply]

Torrent

Suppose I wanted to check the movie while it is still downloading....Will it damage the file permanently?What will happen if the % is around 50? —Preceding unsigned comment added by 121.246.174.130 (talk) 03:38, 22 April 2009 (UTC)[reply]

It depends what program you're using to download the torrent file. I know LimeWire and FrostWire allow you to preview what you're downloading, playing only the percentage that has been downloaded so far, but I can only say that about audio music files. Don't know about movies. --Whip it! Now whip it good! 03:47, 22 April 2009 (UTC)[reply]
I don't know of any bittorrent client that will damage a file if you open it for viewing before its done. Keep in mind, however, that sometimes you won't be able to view the file. 1) bittorrent clients do not download the files in order. If you don't have the parts at the beginning of the file, you cannot view it. 2) Some filesharing clients seem to use some sort of cache mechanism I've never bothered to figure out, so the file isn't where you think it is until it's done. I'm not sure if I've ever seen this in a torrent client, but it's pretty common in programs like Limewire. APL (talk) 04:03, 22 April 2009 (UTC)[reply]
I have had torrents stop downloading because the data was in use by the media player when an upload request came in. Just had to restart, picked up right where it left off. Was using utorrent. 161.222.160.8 (talk) 18:28, 22 April 2009 (UTC)[reply]
What media player were you using? That wouldn't happen unless the media player opened the file for write access, which is just stupid. --wj32 t/c 07:23, 23 April 2009 (UTC)[reply]
When I download stuff I sometimes check the first few seconds (if available) to take a look whether that which I am downloading really is what I want, to check quality and things. Never had any interruptions, neither with videos nor with audio. Using Transmission running on Zenwalk Linux. --Ouro (blah blah) 10:49, 23 April 2009 (UTC)[reply]

Firefox 3 tabs

I'm not sure if this is belated or if I'm just missing something, but I thought the tab bar didn't show if there was only one tab. I just recently installed Firefox beta but uninstalled it shortly after, but maybe it affected Firefox 3.0 since this was about when I started noticing this. But then again it could be some of the addons I have installed since some of them lost their preferences (no idea why). I always thought the tab bar hid when there was only one tab open was a FF default (at least in ≤3.0)...was it? -- penubag  (talk) 06:02, 22 April 2009 (UTC)[reply]

I have no idea if it is a FF default or not. But you can change it. Tools→Options→Tabs, and check 'Always show the tab bar'. Oda Mari (talk) 06:27, 22 April 2009 (UTC)[reply]
It's not a default (or at least wasn't in v3.0.3)- somehow the setting must have been changed. --Alinnisawest,Dalek Empress (extermination requests here) 17:11, 22 April 2009 (UTC)[reply]

Software for interior design

Can someone help on software for use in interior design? The name of the software? Difficulty to learn? Thanks for the help. roscoe_x (talk) 07:12, 22 April 2009 (UTC)[reply]

Whilst you wait why not browse Category:Computer-aided design software - some are not for interior (architectural design), some are.
Also List of Lighting Design Software might help you in a web search - depending on what sort of thing you were looking for.

How does YouTube generate its unique IDs

YouTube is using rather short, 11 characters long, unique IDs to identify their videos (see for example this video), and I'm wondering how they generate them and make sure there are no clashes? My assumption is that they generate a standard UUID (36 characters), base64 encode it (22 characters) and finally only keep the first half of the string (11 characters). However, by doing so, isn't there a risk of getting duplicate IDs? What is the theory / reasoning behind generating such short IDs? Laurent (talk) 09:37, 22 April 2009 (UTC)[reply]

Conversely, what would be the point of generating longer IDs? As long as there are sufficient IDs for all the videos, does it matter if they are 11 characters or 22 characters? Well, yes, because humans don't much care for long strings of random characters. If the URLs are too long, people will feel the need to abbreviate them. In the event of a collision/duplicate ID, youtube can just modify or regenerate the second ID. While there are some very good reasons to make UUIDs secure, none of them apply to youtube video/page IDs. Besides, your suggested "shortened" IDs provide 6411 possibilities—roughly 7.3x1019 (73 quintillion) unique identifiers—well more than youtube is likely to ever need. – 74  10:58, 22 April 2009 (UTC)[reply]
Yes 6211 (62 = 26 lower case a..z + 26 upper case A..Z + 0..9) is a big number.
To prevent duplication I would imagine that they would implement some sort of numbering scheme eg start at 0 and work up 1,2,3 etc - to prevent codes looking like "aaaaaaaaaaa" "aaaaaaaaaab" etc they might perform some sort of add followed by bit shift to make the strings look more random - what the exact proceedure is I don't know. — Preceding unsigned comment added by FengRail (talkcontribs)
They don't need to avoid colliding with other people's ID generators like UUIDs do, which makes the problem much easier. They could just use a counter that increments once for every video that's uploaded. If the system is too distributed for that, there are still ways they could densely pack the ID space—for example, each server could request blocks of 1000 IDs from a master server as needed. I don't know how many videos are on YouTube, but I think it's less than 230, so they shouldn't need anywhere close to eleven characters—five should be enough. (And if those ran out they could just bump the length.) But the identitiers are much longer than that and they look random, not sequential. One possibility is that they're using some sort of counter but then obscuring it, e.g. by encrypting it with a block cipher and a fixed key. That would still guarantee no collisions (because block ciphers are invertible). I'm not sure why they'd want to obscure the id, though. Another possibility is that they're generating random IDs and hoping there won't be any collisions. In that case I hope they're aware of the birthday paradox, which says that the probability of a collision will rapidly go to unity when the video count exceeds 233 ≈ 8 billion videos, a number I can imagine them actually reaching some day. They could avoid random collisions by checking with a central server, but if they're going to serialize everything through a central server then it would be easier to just use a counter. -- BenRG (talk) 12:17, 22 April 2009 (UTC)[reply]
Many thanks all for your help. I wish it wasn't so much WP:OR so that I can add the result of this discussion to the UUID article. I ended implementing a short UUID algorithm using the BenRG's suggestion - i.e. I store in my database a unique number that's incremented each time it's read. I then encrypt this number using a block cipher and a fixed key and finally base64 encode it so that's it's usable in a URL. Again, thanks for your help! Laurent (talk) 15:10, 22 April 2009 (UTC)[reply]
Just wanted to add the following observation. YouTube video IDs are made of eleven base-64 characters (A-Z, a-z, 0-9, - and _). However, for the last character in the ID, only 16 out of the 64 characters are uniquely used. (For example, in the video pF7snTyCrJs, you can use s, t, u, or v as the last character to get the same video. There are 16 groups of four sequential characters that follow this pattern, so there are really only 16 unique values for the last character.) Thus, the total number of unique IDs is 6410 × 16 = (26)10 × 24 = 264. In other words, the internal ID number is 64 bits. --Bavi H (talk) 03:23, 23 April 2009 (UTC)[reply]

Please help me understand more about java applets/content panes.

I want to modify a program that i just completed for a class, and add extra functionality. The program is basically a java applet which allows the user to play minesweeper. I want to add the contents of the current applet to a Jpanel or something so i can add a little section above the game where the user can change the game difficulty by pressing one of three buttons.

What i dont understand though, is how to get the contents of the applet to put it on a Jpanel in the first place. I talked to a friend who happens to have years experience with Java and he told me that there should be a place where the code uses .add, and i dont see it. How is the content added to "Applet", which The public class "MineFinder" extends?

If anyone could help me to better understand what is happening, and how to add the information displayed by my applet to a Jpanel for me to mess with, i would greatly appreciate it! Thanks!

Here is my code: http://pastebin.com/m6f8e6678

Thanks again!

137.81.47.223 (talk) 15:47, 22 April 2009 (UTC)[reply]

Your friend is generally correct, but in this case your applet is being a component, rather than containing components (which would indeed be added to it with the add method). The good news is that, with the source code, this is no impediment. You just rewrite your code to inherit from JPanel (or just JComponent) instead of Applet, and then remove the Applet-specific code (principally init(), jbInit(), getAppletInfo(), and getParameterInfo()). Then you can add an instance of your new class (that looks and acts very much like the old class) to a JFrame or so to make an application, or even to another Applet that also contains buttons or whatever. Hope this helps. --Tardis (talk) 00:20, 25 April 2009 (UTC)[reply]

screensharing

I have been reading about remote desktops. I have used remote administration, in that the techies at work prefer to do things this way when staff phone up with queries that are not simple. I know that there are various ways to share screens, and that this lets you virtually look over someone's shoulder -- great for explaining an aspect of a project to a co-worker, e.g. a pdf. What I am trying to find is a way to look at the same webpage at the same time, with the ability to point to and annotate stuff. For example, let's say I phone my brother to choose a present for our parents. I go to mythologicalfemalewarrior.com to find something suitable, and invite him to the page I found. I click on one item, he says he prefers another and moves his mouse to it, and my cursor moves too. Is there a service like this? BrainyBabe (talk) 16:58, 22 April 2009 (UTC)[reply]

What you might be looking for is VNC. Setting it up might be a little complex if your not really IT, but it can be done. Hope this helps – Elliott(Talk|Cont)  19:19, 22 April 2009 (UTC)[reply]
 
If remote desktop is acceptable, take a look at this list of remote desktop software. TeamViewer, for example, is free for personal use, requires zero (and I do mean zero, as it automatically bypasses host and client firewalls,) configuration, and overall handles bandwidth very well. VNC, which is available for Linux, Mac, and Windows, should also be considered as a viable solution. A KVM switch is more akin to what you describe, but it would not be as practical.
If you need any further assistance, or if remote desktop is simply unacceptable, feel free to give me a holler. I'd be glad to help.   — C M B J   03:34, 23 April 2009 (UTC)[reply]

Where can I get a supercheap big TV or LCD display

hi there, thanks for any leads or tips you can give me, Wikipedians! I am a PHD student in Los Angeles, California and my colleague and for research purposes (we analyze TV, film and online video content) we need a big flatscreen TV or LCD monitor (maybe about 30inches but could be smaller) for supercheap (almost free or free!) due to our tight budget. Where would be a good place to find such a thing? I know this is a long shot, but this site was recommended to me as somewhere which might come up with a good answer! thank you very much! —Preceding unsigned comment added by 128.125.239.87 (talk) 17:16, 22 April 2009 (UTC)[reply]

Since you are in Los Angeles, there are refurb factories nearby. They take returned monitors/tvs and check them to see if they are in fact broken (and make minor repairs). The ones that work are resold at a fraction of retail cost. I purchased a 42" LCD television that was $1800 retail for $600 refurbished. Come to think of it... My printer was $300 retail, but I paid $50 refurbished. My two monitors on my computer were $400 retail, but I paid $150 refurbished. My laptop was over $2,000 retail. I paid $900 refurbished. That is the way to go, in my opinion. However, you state that you are a PhD student. You must be going to a university. I've worked at many universities and they all have a supply office which allows you to "borrow" things that aren't being used by others. I borrowed 32 computers (with monitors, keyboards, mice, desks, etc...) once to do networking research. -- kainaw 18:04, 22 April 2009 (UTC)[reply]

Thanks very much Kainwai!!!! you mean I can go right to the refurb factory and buy equipment? I will look into the supply department angle too! —Preceding unsigned comment added by 75.47.142.129 (talk) 03:32, 23 April 2009 (UTC)[reply]

Yes. Some refurb factories will sell direct to the public. Some may be under contract to only sell to certain dealers. You are in LA though - so there are many refurb businesses. I see no reason for all of them to be under a contract to sell only to certain dealers. Another option, if you are still looking, is to purchase from a rental company. Again, there are a lot of rental companies to choose from in LA. Along that line, there are a lot of pawn shops, but my experience with pawn shops in LA is that they will give you about 1% of retail when they buy from you and charge 90% of retail when they sell stuff. -- kainaw 04:25, 23 April 2009 (UTC)[reply]

Google News down?

Is anyone else getting an HTTP 503 error when browsing to http://news.google.com/? Is the site down or is it a problem with my network? Mike R (talk) 18:37, 22 April 2009 (UTC)[reply]

Fine here. Algebraist 18:40, 22 April 2009 (UTC)[reply]
I get a 503 as well. --Russoc4 (talk) 18:45, 22 April 2009 (UTC)[reply]
Same problem here: "Server Error The service you requested is not available yet." Laurent (talk) 18:46, 22 April 2009 (UTC)[reply]

I am in the Central US. Could the problem be geographically based? Where are all of you? (Feel free not to answer due to privacy concerns etc.) Mike R (talk) 18:56, 22 April 2009 (UTC) [reply]

I'm in the UK. I tried accessing the site via a US-based proxy, but it still works for me. Algebraist 18:59, 22 April 2009 (UTC)[reply]
I've also gotten the error several times today. I wait 30 seconds, refresh, and I do get the results though. — Ched :  ?  19:00, 22 April 2009 (UTC)[reply]

I am no longer getting the error. Mike R (talk) 19:29, 22 April 2009 (UTC)[reply]

Here's a nice resource that helps answer your question for any URL: http://downforeveryoneorjustme.com/ I hope I have been helpful. 137.81.96.96 (talk) 19:01, 22 April 2009 (UTC)[reply]
Thanks for the info, that's a helpful site. Mike R (talk) 19:29, 22 April 2009 (UTC)[reply]

Cursor moves up and down on computer screen all by itself

Most of the time it behaves, but sometimes it suddenly jumps to the top or bottom of the screen, sometimes it moves just a little (from one memu option to another), sometimes it moves up and down at random even when I'm not touching the mouse. It never moves horizontally. I often do different malware scans, nothing significatant found. I cleaned my mouse shortly before it tarted, but that might be merely coincidence. 78.146.109.34 (talk) 21:28, 22 April 2009 (UTC)[reply]

I would lean toward a mechanical "problem". Is it an optical mouse? Could you give us any details? Kushal (talk) 01:05, 23 April 2009 (UTC)[reply]
It's a common symptom of a mouse with a broken tail. The cable bends and flexes every time you move the mouse and wires are really not good at doing that so they break. When they do, one of two things happens - either you can't move the mouse in one axis because the metal broke and the wire is disconnected - or (as you've found) the insulation between the wires breaks and one of them shorts against the next - then the mouse won't stop moving in one direction. Wiggling the wire will sometimes restore function for a while - but it's going to do it again after another couple of minute's use. I've thrown away literally dozens of mice over the years that failed in exactly this way. If you're desperate and you are handy with tools - you can de-solder the cable - cut maybe three inches off of the end and solder it back again...but I've bought perfectly usable mice for $5 - so I don't think it's worth the effort. SteveBaker (talk) 02:14, 23 April 2009 (UTC)[reply]
Unless it's a wireless mouse - I which case electromagnetc interference could cause it - I get similar effect at ~11pm as the motors in the central heating go off - shouldn't happen to a digital signal - but does. (Before anyone asks - yes the motors are sparking and should be fixed)FengRail (talk) 04:09, 23 April 2009 (UTC)[reply]

Blu-Ray

Does anyone else hear wonder why blue ray, is so successful, it this where we are going in the next 20 years, isn't the whole 3d shape of a dvd out of date with growing flashdrives, highspeed internet and frostwire. "Blue ray lasers" have a wave legnth of 405 metres which is still within the range of light visible by the human eye, can a ray outside that range still be burned? —Preceding unsigned comment added by Ryan Prevost Baldwin (talkcontribs) 22:14, 22 April 2009 (UTC)[reply]

Blu-Ray is much higher quality than DVD. There is no other viable competitor. With Blu-Ray, if I want to watch a movie, I just pop it in and watch it. With high-speed Internet, I can download a movie at lower quality (Blu-Ray is 1080p and our on-demand HD is 1080i). Of course, I can't watch it right away because it takes about 8 hours to download the movie. I can drive to Blockbuster and rent a Blu-Ray version of a movie I don't have faster than waiting for it to download. As for flashdrives, it is possible to put movies on many different storage formats. Discs are easy to store. The case is just about the right size for scanning a stack of blu-rays and easily seeing which one you want to watch. So, this all comes down to asking why DVDs were so popular when everyone had VHS tapes or why CDs were so popular when everyone had cassette tapes or why cassettes were so popular when everyone had LPs or why the next storage medium will be so popular when everyone has blu-rays. -- kainaw 03:24, 23 April 2009 (UTC)[reply]
Flash/stick/pen drives do seem to me to have potential to take market share from Blu-Ray. They have the advantages of being more portable (a Blu-Ray won't fit in your pocket), and have more storage capacity, so you can store an entire season of a TV show on one versus just a few episodes on Blu-Ray. The moving parts in a Blu-Ray player guarantee that it will break down in a few years, and waste electricity until it does. A Blu-Ray disk is also more fragile and subject to breaks, scratches, and delamination. Flash drives can be rewritten, too, or made as read-only devices. The price for flash/stick/pen drives is a bit more, at the moment. The real disadvantage, currently, is that flash drives don't have read speeds high enough to play 1080p directly, so you'd have to copy from there to a hard drive first. When this improves, watch out Blu-Ray. StuRat (talk) 14:03, 23 April 2009 (UTC)[reply]
USB 3.0 has the speed requirements and is supposed to be available next year. --Wirbelwindヴィルヴェルヴィント (talk) 06:28, 25 April 2009 (UTC)[reply]

Good use for a Caps Lock key?

Does anybody know of a good use for a Caps Lock key? One day while at work I realized that the only time I ever hit the caps lock key was by accident, so I found a screwdriver and pried it out of my keyboard. I now have a new & improved 103-key keyboard (patent pending) and love it, but I also have a useless caps lock key cap that I don't know what to do with. Any suggestions?

Real question: Can I do the same with my laptop? Can laptop keys be removed as easily as desktop computer keyboards without doing real damage? I have a Toshiba Satellite A205 series. -- Tcncv (talk) 23:45, 22 April 2009 (UTC)[reply]

On my Toshiba Satellite Pro A100 I can remove and reattach keys without problems. An alternative solution would be to remap the capslock key to do something useful. Algebraist 23:48, 22 April 2009 (UTC)[reply]
If you have a word processing software, you can always set case in it if you made a mistake. I don't really use the caps lock but some people might need it *cough* Oprah *cough*. Kushal (talk) 01:01, 23 April 2009 (UTC)[reply]
I'm also a rabid caps-lock hater. Generally, I lever off the keycap, pour plenty of super-glue into the hole beneath - then cut the bottom quarter inch off the bottom of the keycap and epoxy the cap back in place. Sure, I could remap it - but that hardly expresses my distaste adequately. As an alternative - you can get one of these [5] and glue that onto the capslockectomy site. As for the left over key...hmmm...high explosives? SteveBaker (talk) 01:55, 23 April 2009 (UTC)[reply]
I just tell the computer to remap the caps lock key to nothing. --jpgordon∇∆∇∆ 02:26, 23 April 2009 (UTC)[reply]
The Colemak keyboard layout replaces Caps Lock with a second Backspace key; you might give that a try (or, as jpgordon said, just remap it to nothing instead of removing it). – 74  02:43, 23 April 2009 (UTC)[reply]
I use the caps lock key rather often. When someone claims that a computer is not responding, I press the caps lock key. If the little light turns on, the computer is still functioning. If it doesn't, the computer is no longer responding to the keyboard. This often shows how bogged down it is. If it takes 5 seconds or so to turn on, the computer is running at max processing power on something rather nasty. For me, it isn't for capitalizing text, it is a quick PC diagnostic key. -- kainaw 03:18, 23 April 2009 (UTC)[reply]
Yeah - that's a useful diagnostic - but you have NumLock AND ScrollLock that both do the same thing...so you don't NEED CapsLock for that. SteveBaker (talk) 15:12, 24 April 2009 (UTC)[reply]
First of all caps are very useful - there got it off my chest. As is the caps lock key. I like to press caps lock, scroll lock, and num lock in rapid succession and watch the lights go on and off - who needs drugs.
Uses - scrabble - that's quite a good score. Otherwise make a pendant - sell it to a geekFengRail (talk) 04:06, 23 April 2009 (UTC)[reply]
I use the caps lock key reasonably often, for, I guess, its intended purpose: connecting to an IBM mainframe, which likes to be talked to in all-caps. Something of a special case (ho ho) though. 93.97.184.230 (talk) 07:37, 23 April 2009 (UTC)[reply]
I use caps lock as a backspace and my older laptop's caps-lock key wore out and fell off. There was no way to put it back (glue might have worked but with my skills I had probably jammed the rest of the keyboard too). I think you can remove it carefully if you are not planning to put it back. --194.197.235.70 (talk) 09:15, 23 April 2009 (UTC)[reply]
Some entertaining and useful ideas in this thread. I enjoyed reading it. --Dweller (talk) 10:48, 23 April 2009 (UTC)[reply]
I grew up with Sun Oracle keyboards, which had a Ctrl key where the CapsLock is on PC keyboards, so I just remap my caps lock key to that. It's a lot more comfortable than reaching way down to the corner. --Sean 13:38, 23 April 2009 (UTC)[reply]
The only time I would use it is when entering a lot of text as uppercase, such as on the title page of a document. However, I agree that it's probably hit by mistake more often than on purpose. They really should move it away from the A, perhaps it could be stuck over with the Print Screen/Scroll Lock/Pause buttons. That leaves open the question of what to put in it's place. Perhaps a reverse tab ? That is, what shift-tab does at present (returns you to the previous field in a form). StuRat (talk) 13:47, 23 April 2009 (UTC)[reply]
I JUST USE IT TO SHOUT! To be honest though I did just type that with the shift-key held down rather than caps-lock on...so maybe the caps-lock is a bit of a waste of time ny156uk (talk) 16:24, 23 April 2009 (UTC)[reply]

Thanks for all the ideas. I popped it off my laptop, but with the exposed mechanism underneath, it wasn't as clean a fix as on my desktop. I'll pursue the remap approach. -- Tcncv (talk) 22:16, 23 April 2009 (UTC)[reply]

I use the CAPS LOCK semi-regularly at work. Some of our branches use alpha-numeric locations in their warehouses and the alpha part has to be entered in CAPITAL letters. So, when I need to do a lot of entering involving those locations, it's easier for me to CAPS LOCK it to avoid accidentally making a % instead of a 5 (especially since that's a wildcard character on my WMS... Matt Deres (talk) 01:42, 24 April 2009 (UTC)[reply]

DRM strip

i downloaded the Robot Chicken Star Wars Specials and can play them on iTunes 7.6, but on iTunes 8, it says that my computer is not authorized to play the videos. I can play them on QuickTime, but can't convert them. I've already paid for the videos and don't want to buy them again. Can i use a program to get rid of this DRM?

PS: I've tried re-authorizing my computer, but even though i can play songs and other videos, i can't play these two videos.

 Buffered Input Output 23:51, 22 April 2009 (UTC)[reply]

I'm not sure if it works with video but with songs from iTunes you can just write them as an audio-cd and then download them. If you could do the same burning to disc and reimport it might wipe the DRM. ny156uk (talk) 22:33, 23 April 2009 (UTC)[reply]

iTunes doesn't allow ripping video, so you'll need a DVD importer. Dendodge T\C 15:28, 24 April 2009 (UTC)[reply]

April 23

Permanent call tracing with a PBX

Does permanent call tracing, or at least a harder-to-forge version of call display, become easier to set up if one is using a private branch exchange? NeonMerlin 04:21, 23 April 2009 (UTC)[reply]

NeonMerlin, I dont know much about analog PBXs but I've worked with VOIP for a while now. If you wish to unmask the CID of any caller, regardless of they blocked their phone number or not, I would try a simple Asterisk setup to forward your calls. This idea is not my own; this is the way Kevin Mitnick handles his blocked callers. To make this work, you need a VSP that passes the P-Asserted-Identity to your Asterisk box. Have Asterisk forward the call to your mobile/landline using its own modified p-asserted-identity with a constant prefix/suffix to know the call originated from you VOIP line. AFAIK, this is the closest the consumer can get to directly reading ANI numbers and as such will not unmask an op-divert. Here is a vid of Mitnick explaining the solution: YouTube aszymanik speak! 05:42, 24 April 2009 (UTC)[reply]

Linking excel data with word documents

While preparing reports i have to prepare documents in microsoft word in which there are a lot of tables.The values come from the result of calculation in excel.Is there any way to link the values in both documents so that whenever something is changed in excel it is changed automatically in words. —Preceding unsigned comment added by 120.89.108.128 (talk) 07:45, 23 April 2009 (UTC)[reply]

Yes. I just tested this with Office 2007 so if you're using an earlier version of Office the procedure will be a little different.
  1. In Excel, select the cells you want and hit ctrl-C to copy them to the clipboard.
  2. In Word, click where you want to paste the Excel table, and hit ctrl-V to paste. (Don't hit any other keys yet.)
  3. When the paste is complete, a little clipboard icon appears to the lower right of the pasted table. When you mouse over it, it turns into a dropdown menu. Choose "Keep Source Formatting and Link to Excel".
Now every time you make a change in the Excel sheet, it'll be updated in the Word doc. Tempshill (talk) 20:07, 23 April 2009 (UTC)[reply]

Statically linking C++ Windows Forms Applications (CLR)

Hello. I don't have much experience with building Windows Forms Applications in Visual Studio, and I am not sure how to link the application statically. When I was writing Win32 console applications before, I always used to use the /MT switch instead of /MD to statically link the CRT library to make the executable work on all computers. However, when I do the same in a CLR project, I get an error saying that /clr and /MT switches are incompatible. Is there any way to statically link a Windows Forms Application? Or make it work on all computers in some other way? I would appreciate any feedback on this. Thanks in advance!  ARTYOM  09:20, 23 April 2009 (UTC)[reply]

Statically link the .NET runtime libraries? No, you can't do that unless you use some special linking software like Remotesoft's linker. --wj32 t/c 10:02, 23 April 2009 (UTC)[reply]
Hmm, I believe there must be a way of running the program on other computers. Maybe something besides static linking that might help?  ARTYOM  12:38, 23 April 2009 (UTC)[reply]
I don't know what you mean by "running the program on other computers". If you're using the CLR for your program, the target program must have the CLR (.NET Framework) installed. --wj32 t/c 00:33, 24 April 2009 (UTC)[reply]

Free software and non-commercial use

I'm trying to figure out whether Snes9X should be considered free software or not. It's an open source, free application, however it doesn't allow commercial use of its source code, therefore somebody recently added that it's not a free software (per Wikipedia's definition). However, as long as it's open source I think it is free software, even if there is a special clause for non-commercial use. What do you think? Laurent (talk) 09:51, 23 April 2009 (UTC)[reply]

Open source has a definition which clearly stated that any open source license must allow commercial use. There was a license which was open source but not free software, although in most cases these terms are equivalent from technical point of view. MTM (talk) 12:32, 23 April 2009 (UTC)[reply]
Thanks, I've updated the article and wrote that Snes9x is not a free software and that its license cannot be approved by the OSI. Laurent (talk) 13:00, 23 April 2009 (UTC)[reply]
FreeSoftware is supposed to mean 'free of restrictions' rather than 'free of cost' (although if there are no restrictions and you charge for it - someone will re-distribute it for free and there is nothing you can do about it). Arguably though, software under the GPL isn't strictly free of restrictions. So this is a very grey area. The term "OpenSource" is the one I'd prefer to use. SteveBaker (talk) 14:59, 24 April 2009 (UTC)[reply]

Difference: plugin and activex

Resolved

What is Adobe Flash player 10 plugin and what is adobe flash player 10 activeX? How are they different from each other? 117.0.60.206 (talk) 15:52, 23 April 2009 (UTC)[reply]

"ActiveX" would just be for use in Internet Explorer and the "Plugin" would be for every other browser - The end result is exactly the same though, it's the addon for your browser to allow you to see Flash content, it's just a difference in naming. ZX81 talk 17:23, 23 April 2009 (UTC)[reply]
Thank you very much! 117.0.60.206 (talk) 18:54, 23 April 2009 (UTC)[reply]

What is windows media format runtime?

What is windows media format runtime? 117.0.60.206 (talk) 15:56, 23 April 2009 (UTC)[reply]

I'd have to see the context to know for sure, but it could refer to a program which plays videos designed for Windows Media Player (as opposed to a more robust program that can create and edit them, too). StuRat (talk) 17:34, 23 April 2009 (UTC)[reply]
It is listed in the Add/Remove programs of my PC. And can Windows Media Player not play videos by itself? I see both windows media format runtime and Windows Media Player 10 in the installed programs list, and that got me confused. 117.0.60.206 (talk) 18:57, 23 April 2009 (UTC)[reply]
I think it's it's to enable you to play Media Player formats newer than you have installed. For example WMP 11 is now out and you've said you have 10 installed so possibly this is allowing you to play WMP 11 encoded files, but I'm just guessing and another user may have a better idea. ZX81 talk 19:44, 23 April 2009 (UTC)[reply]

Scenario

Computers A and B operate on Windows XP. Computers C and D operate on Windows Vista. Computers A and C have crashed while the other two are operational. No recovery discs. If I create a recovery disc from computer D, will I be able to use it (legally) on computer C using the Windows product key for computer C?

Same question for the XP computers. 90.216.35.141 (talk) 16:17, 23 April 2009 (UTC)[reply]

If you're using the product key for C that came with C, then yes that should be legal as the media kits are all the same. How are you creating the recovery disc though? I only ask because if it's recovery software made by the computer manufacturer, if the computer you try and install it is a different make it might not install even with the correct product code. ZX81 talk 17:29, 23 April 2009 (UTC)[reply]
I haven't decided that yet. Will it not just ask for the product key as you are installing the OS? 90.216.35.141 (talk) 17:46, 23 April 2009 (UTC)[reply]
Sorry, I need to add a correction to what I wrote above and I'm kicking myself for having not paid more attention when I wrote it, I was focusing more on the licencing part than the actual discs. If you have an OEM XP Licence code (i.e. the operating system came with the machine), then it'll need an OEM XP CD to install it from. If you using a retail version that you bought, you'll need a retail disc. If it's an upgrade version... you get the idea. With XP all the files on the disc are actually the same except one file which controls what type of disc it is, I'm not sure how media kits for Vista work though. If you don't have the original discs (of the right type) then you may just be able to contact the computer manufacturer to purchase new discs or Microsoft if it was retail/upgrade (since you don't need a code, just the discs). ZX81 talk 18:24, 23 April 2009 (UTC)[reply]

Got phished - what now?

Am I just overly concerned? I just got a phishy mail "from IRS", and stupidly clicked on the link. So far, nothing bad happened, it just gave me the message "The requested URL /~phil/index.html was not found on this server.". (The complete URL is http://members.boo.net/~phil/index.html.) Is there anything I should do to prevent any damage? The article on phishing seems to be only concerned with lofty concerns, not with what the individual user can do. Mary Moor (talk) 16:37, 23 April 2009 (UTC)[reply]

It sounds like the phishing site was already taken down so don't worry about it. It's only if you've actually typed in your personal details you should start worrying. ZX81 talk 17:15, 23 April 2009 (UTC)[reply]
(ec) You appear to be safe; the page has simply been taken down. Clicking on links generally won't do any damage (at least no more so than visiting any other webpage—a secure browser is important), but you should never provide any privileged information (including usernames, passwords, SSN, etc.). To prevent future attempts, you might want to upgrade to a browser that automatically identifies suspicious websites (the link you posted displayed a very obvious phishing warning in Opera). – 74  17:20, 23 April 2009 (UTC)[reply]
Clicking on the link would confirm to the spammer that your email address is real, and therefore you might get more spam. 130.216.222.184 (talk) 01:51, 24 April 2009 (UTC)[reply]
Agreed; never click on links in spam, scam, phishing e-mails, etc and never click unknown links in general!--Xp54321 (Hello!Contribs) 02:24, 24 April 2009 (UTC)[reply]
Unless the "spammers" already know which email address associates with your IP or include a uniquely-identifying string in the URL there is no risk of them "confirming your email" (and both approaches take significantly more effort than most spammers are willing to invest). Spammers aren't the most discriminating collectors of email addresses either—continually failing to respond in any way has done nothing to reduce the amount of spam I receive. It isn't wise to go looking for trouble, sure, but clicking on an "unknown link" is practically one of the cornerstones of the internet. On the other hand, Never install or run programs or ActiveX content unless you fully trust the source. – 74  06:35, 24 April 2009 (UTC)[reply]
Phishing involves them asking you to enter account numbers and other personal info on what you think is an official bank or government web site. If you haven't done that, then you should be OK. StuRat (talk) 17:28, 23 April 2009 (UTC)[reply]
Thanks, everybody! Would it make sense to add that information to the phishing article? Mary Moor (talk) 17:45, 23 April 2009 (UTC)[reply]
The article already has that information. :-) "phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication." In this case, the e-mail claimed to be from the IRS. ;) --Xp54321 (Hello!Contribs) 23:10, 23 April 2009 (UTC)[reply]

Open-source vs. proprietary reward

Is there any case where an open source project is economically more rewarding than keeping things as proprietary? I know that most don't do it for the money. --80.58.205.37 (talk) 17:46, 23 April 2009 (UTC)[reply]

The obvious example is Linux. While there are more profitable operating systems (ie: Windows), there are many proprietary operating systems that are not anywhere near as profitable. -- kainaw 18:17, 23 April 2009 (UTC)[reply]
How about Wikipedia ? Had it been a proprietary system written by paid experts and sold just like a paper encyclopedia, it would likely have been a dismal failure. StuRat (talk) 18:58, 23 April 2009 (UTC)[reply]
A proprietary system would not allow so many people from around the world to collaborate on an encyclopedia. This is also true for Linux; it would take much, much longer for a small group of "professionals" to make something as big as the Linux (kernel). --wj32 t/c 00:38, 24 April 2009 (UTC)[reply]
Well, there are business models surrounding OpenSource where you give the software away for free and charge for providing helpline support and maintenance and such. In the case of many sorts of software, it would be quite hard to break into the market with a product that cost a lot of money - but giving it away for free and then charging for your expertise is a model that might earn you income. So there are certainly situations where it's economically viable. RedHat had revenue of $400 million in 2007 - and almost everything they do is OpenSourced. It's hard to imagine a closed-source operating system that would sell in enough volume today to make that kind of money from sales alone. A million copies a year at $400 a pop? Unlikely. 10 million copies a year at $40 a pop? Nope. But a ridiculous number of copies at $0 - WITH the offer of support and service at a reasonable price...that appears to be a viable business model that others (eg SuSE) have managed to emulate. Personally - I've written a lot of OpenSource software - and I think that in many cases, I've gotten jobs on the basis of that - so for me, even as an individual, I think OpenSource has been "profitable" - in a sense. SteveBaker (talk) 14:53, 24 April 2009 (UTC)[reply]

Screen resolutions by O/S

I have a Windows 98 computer with a RAGE PRO TURBO AGP 2X graphics card which has a 1600×1200 max screen resolution on my current monitor. I also have a Windows XP computer with NVIDIA GEForce4 MX 420 graphics card. What max resolution could I expect to get on each of these if I went out and bought a bigger monitor ? I would like a dual monitor setup, if possible. Also, new monitors are all wide-screen, while my current monitors are full-screen. Can those be mixed together with a dual-screen set-up ? StuRat (talk) 19:12, 23 April 2009 (UTC)[reply]

I may be wrong, but I think a larger monitor will not affect the max screen resolution that Windows's "Display" control panel shows. For example, if I take my old 14" CRT monitor and plug that into your Windows 98 machine, I would expect to be able to set the display to 1600x1200, and when I click "OK", the display will just go blank, because that old monitor doesn't support that resolution. The control panel doesn't - I think - remove screen resolutions that aren't supported by your monitor. So, the maximum resolution won't change if you get a new monitor. A dual-screen setup with an extended desktop can mix multiple monitor aspect ratios. GeForce 4 Series may be of interest. Tempshill (talk) 19:54, 23 April 2009 (UTC)[reply]
I'm pretty sure the default is to only list resolutions which are supported by the current monitor, although they do provide the option to list unsupported resolutions, along with a warning that they may damage the monitor. StuRat (talk) 07:21, 24 April 2009 (UTC)[reply]
I think that this is true if the monitor is plug-n-play. Older monitors that just show up as "Default Monitor" will work more like Tempshill described.APL (talk) 13:02, 24 April 2009 (UTC)[reply]
Sorry if I misunderstood, but I assume what you're saying is that you want to take both graphics cards and put them in the same machine (the XP one?) and have dual monitors, one on each card? Is the GeForce MX 420 is a PCI card? The only reason I ask is because I've personally never seen a motherboard with 2 AGP ports so if it's AGP then you wouldn't be able to fit them. Likewise I'd recommend reading our AGP article as you may have some voltage compatibility issues with putting the ATI card into the XP machine because of the differences in AGP versions. Also, you'd be mixing ATI drivers with NVIDIA drivers and whilst it can work, it's not ideal and can give you system stability issues. I'd recommend simply buying a new AGP graphics card (they're not that expensive anymore) with dual outputs and then connecting your monitors via that. It might be hard to find an AGP card these days though, but they do still exist. Speed wise it's going to be a lot faster than either of what you have now too. I can also confirm you can mix widescreen/non-widescreen monitors too, each with different resolutions (I'm using 3 monitors at the moment with 2 different sizes/resolutions). Hope this helped! ZX81 talk 20:00, 23 April 2009 (UTC)[reply]
No, I have no intention of moving any graphics cards around. I'm just wondering what my options are for bigger monitors on each computer with the current graphics cards. I believe that both currently support dual monitors with the current graphics cards. StuRat (talk) 07:21, 24 April 2009 (UTC)[reply]
As a side note may i suggest Synergy (software). Its a very userful program that will allow you to use one mouse, one keybored with 2 or more computers. 64.172.159.131 (talk) 21:58, 23 April 2009 (UTC)[reply]

Cell phone as microphone

Is there a way to use a cell phone as a computer microphone? Not for recording but for, say, Skype? Thanks.--Elatanatari (talk) 21:47, 23 April 2009 (UTC)[reply]

In theory, yes. You'd need a phone with a usb link to your computer. Then you'd need to write and install a new operating system for your cell phone that has a custom application for transmitting its microphone signal to your computer. Or you could spend 10 bucks and buy a mic.
edit: it also occurred to me that you can disassemble the phone, cut out the microphone, and wire it with an amplifier and a 3.5mm TRS connector. You can then plug it into the mic jack. Taggart.BBS (talk) 00:49, 24 April 2009 (UTC)[reply]
I wonder whether you can do this with bluetooth? SteveBaker (talk) 14:44, 24 April 2009 (UTC)[reply]
You can buy USB phones (terrible stub) fairly cheaply that are designed for just that purpose. I have one and it works really well with skype. It have a microphone and speaker like a normal phone and a keypad that allows me to control skype directly from the phone (it uses some software called "SkypeMate" that came with it). --Tango (talk) 15:02, 24 April 2009 (UTC)[reply]

April 24

Downloading

My torrent file of Forrest Gump has finished downloading.But out of 1.2 gb file I have got only 763 mb file that too broken.Should I wait till the uploading also also completes?It is now seeding.Is it necessary for seeding to complete?The ETA ishowing 18 hrs to complete!! —Preceding unsigned comment added by 121.246.174.130 (talk) 03:11, 24 April 2009 (UTC)[reply]

Is it just one file? What program are you using? You can usually force a re-check of the file by right-clicking the torrent in the program and selecting "Re-check". --wj32 t/c 04:22, 24 April 2009 (UTC)[reply]
You will in general never be "done seeding", since new peers will connect. If you are seeing a time until completion you are doing something other than seeding. Taemyr (talk) 04:38, 24 April 2009 (UTC)[reply]
In μTorrent, at least, there's an ETA displayed while seeding. It's the estimated time until you've achieved your desired ratio of upload to download. Algebraist 10:00, 24 April 2009 (UTC)[reply]

Common ancestor class in C#

Is there a way in C# to find the closest common ancestor of two classes? NeonMerlin 05:59, 24 April 2009 (UTC)[reply]

Here is something quick that I just threw together. It should get you pointed in the right direction. Modify as needed:
static IList<Type> GetTypeHierarchy<T>()
{
   IList<Type> hierarchy = new List<Type>();
   Type type = typeof(T);

   while (type != null)
   {
      hierarchy.Add( type );
      type = type.BaseType;
   }

   return hierarchy;
}

static Type GetMostCommonDerived<T, U>()
{
   IList<Type> hierarchyT = GetTypeHierarchy<T>();
   IList<Type> hierarchyU = GetTypeHierarchy<U>();

   Type t = null;
   Int32 minCount = Math.Min(hierarchyT.Count, hierarchyU.Count);

   for (int i = 0; i < minCount ; i++)
   {
      Type typeT = hierarchyT[hierarchyT.Count - 1 - i];
      Type typeU = hierarchyU[hierarchyU.Count - 1 - i];

      if ( typeT == typeU )
      {
         t = typeT;
      }
   }

   return t;
}
Then pass two types into GetMostCommonDerived. Regards, Bendono (talk) 06:51, 24 April 2009 (UTC)[reply]

Cell phone chargers

They show television commercials about how cell phone chargers are consuming power even when there is no phone connected to it. But how? There is no current in the charger when the phone is disconnected. There is nothing on the charger itself that consumes electricity. — Kjammer   09:53, 24 April 2009 (UTC)[reply]

Because it's not just a charger that connects your phone to the ac outlet, but also a transformer. See standby power and wall wart for more. 96.227.82.128 (talk) 10:05, 24 April 2009 (UTC)[reply]

It's certainly true that any kind of charger or 'wall-wart' consumes power when there is nothing connected to it. You can actually feel that they get a little warm all the time. Not as much power as when they are actively charging a phone - but yeah - you should unplug them from the wall when you're done with them. SteveBaker (talk) 14:42, 24 April 2009 (UTC)[reply]
Will switching them off at the wall have the same effect as unplugging them? Vimescarrot (talk) 18:02, 24 April 2009 (UTC)[reply]
If you turn off the electricity to the charger by any means, it will stop consuming electricity. I put mine on a power strip and flip the switch to turn them off. -- kainaw 18:07, 24 April 2009 (UTC)[reply]
Also note that some transformers will draw no real measurable wattage, with idle transformers typically drawing 0+ ~ 2.5 (I think 0.5~0.8 is pretty typical) watts from any info I've ever seen. IMO, it's insignificant compared to conserving energy when it matters, like switching from 60 watt bulbs to 13 watt CFLs, or turning down your AC, or not leaving the fridge door open, or leaving your computer on (way worse if running SETI/F@H), or... You get the point. --Wirbelwindヴィルヴェルヴィント (talk) 06:04, 25 April 2009 (UTC)[reply]

Screensavers

I have copied some screensavers to my System32 folder, but they don't appear in the Screensaver tab of Display. How can I fix this? 58.165.23.195 (talk) 11:52, 24 April 2009 (UTC)[reply]

Try copying them to the C:\WINDOWS folder (that sometimes works). Also try right-clicking the screensaver and clicking "Install".  Buffered Input Output 12:34, 24 April 2009 (UTC)[reply]

Wireless mice + keyboards

I've been asked to help a family member with some wireless computing advice; not using wireless myself, I don't feel I know enough about the security aspect. They'd be using a wireless mouse/keyboard up to 7 meters away, which rules out IR and suggests radio (RF) or bluetooth. The question I have is security and "ease of use" issues. I tend to be security conscious (wired ethernet, etc). They aren't using any other wireless devices. I need to consider:

  • That they can switch from internal to wireless mouse/keyboard easily
  • That the wireless is secure and doesn't expose them unduly to security openings, flyby hacking, scanning, whatever else can be done.
  • That when they are using the internal keyboard in a public location, any open bluetooth/RF isn't posing a security risk.

So I'm after advice such as:

  • Bluetooth or other RF?
  • How secure it would be in practice? (both for malware/intrusion as a point of entry, and for data interception)
  • Any particular configuration/s or "things to check" needed to maximize security?
  • Is built in bluetooth low risk or should they use a removable dongle?

Any tips from someone technical much appreciated - thanks! FT2 (Talk | email) 13:25, 24 April 2009 (UTC)[reply]

Bluetooth is a bit 'iffy' at 7 meters. There are three classes of bluetooth gadget, Class I is good out to 100meters - but class II is limited to 10m and class III to 1m. At 7m, the class II devices are really rather unreliable - while they can reach 10m in theory, if there is any interference source or intervening walls or even heavy bits of furniture or many people - they don't work at 10m. So unless you have class I devices (which are rather rare), I wouldn't recommend it for this application. At 100m, bluetooth security is certainly a concern - and the bluetooth protocols really aren't very secure. They are designed for relatively trivial things like connecting headsets to cellphones and mice to computers where security is generally considered to be irrelevant - and the need for a hacker to get within a few meters of your equipment generally means that security is a non-problem. So I can't recommend bluetooth at all.
WiFi (802.11) keyboards and mice simply don't exist...your options are IR (which won't do 7m), USB (which needs wires) or BlueTooth (which I've already dismissed). So on the face of it, you're completely screwed! But you don't tell us precisely why they need to do this - but it sounds to me like they should be using a complete laptop as their "keyboard and mouse" and using WiFi (802.11) to talk to whatever computer needs the input. WiFi has more than enough range and is extremely secure when you use all of the encryption stuff correctly (which isn't hard - you just have to know how to do it). There are plenty of progams out there that'll let you drive one computer using the mouse/keyboard of another computer via the network - my son uses one all the time to do exactly this kind of thing - using a Windows-based laptop as keyboard & mouse for a Linux-based desktop computer. You can buy super-cheap WiFi 'sub-notebook' or 'netbook' laptops for a couple of hundred bucks these days - which includes your keyboard, mouse and WiFi stuff. Something like the ASUS Eee PC would fit the bill rather nicely. SteveBaker (talk) 14:31, 24 April 2009 (UTC)[reply]
It's going with a general-purpose laptop for a relative. They will use it sometimes "stand alone" on vacation (internal keyboard/mouse) but quite often (almost daily) for group discussions, or on the TV in their living room.
In those contexts the laptop would be next to and plugged into a TV (visible to anyone in the room) and the keyboard and mouse would be on a coffee table or the lap of whoever happens to want to use it, and passed around as needed. Some of the rooms concerned are small conference rooms up to 6 x 6 m, and the keyboard/mouse would regularly be used 3 - 5 m from the laptop where IR isn't viable. The security issue is because the laptop will contain their private documents as well - letters to hospitals, credit card companies, all the usual stuff people have on their main computer. (I can secure the machine generally, but I'm not familiar with wireless aspects which I tend to avoid personally.)
Realistically a maximum range of 5.5 m would probably be okay, and there will be little in the way; I figured up to 6 - 7 m to include some safety margin.
I can easily set "non-discoverable mode" and tell the user/s not to accept any strange "do you want to connect to this device" pop-ups, but they aren't hacker savvy, so I don't know if that would be enough. FT2 (Talk | email) 15:19, 24 April 2009 (UTC)[reply]

Bulk Mail in Outlook 2003

I am working on a project that has me sending out a lot of emails with a fax number for people to sumbit documents (each emIl only has one recipient). We're having technical issues and I want to bulk eMail people to give them a different fax number. I have all of the original emails I sent in an isolated outlook forward, so I was hoping I could just select a bunch of emails and hit "reply to all" or something but outlook wouldn't let me do that. Is there any function I can use to draw the eMail addresses out to bulk mail the new phone number? thanks --Shaggorama (talk) 15:06, 24 April 2009 (UTC)[reply]

How to adjust the 3d accelerator? And where...?

Hey, I have had some trouble with the graphics when playing a game. (presumably because it's a little old and my computer is new and strong with Windows Vista which means it's not entirely compatible) However, I found somewhere that I read that "turning on the 3d acceleration" will likely solve my particular problem. what does that mean really, or rather how and where do I turn it on?

I don't know, maybe that's not so much info and maybe it's difficult or even impossible to asnwer without more info?

Thank you for any answers, I'll come back soon to look for any —Preceding unsigned comment added by 84.49.121.115 (talk) 15:41, 24 April 2009 (UTC)[reply]

3D Acceleration is a function of the video card. First, to be very clear: Many video cards do not have 3D acceleration. Do not start from the assumption that your video card does have 3D acceleration and you just can't find it. Start from the assumption that if your video card did have 3D acceleration, it would already be turned on. Starting from there, if it isn't turned on, it will be an option in the video settings. I don't know where Vista moved it to. It used to be that you could right-click on your desktop and choose settings. I'm sure it is now hidden beneath a long series of left and right clicks or strange commands from the run menu now. -- kainaw 15:52, 24 April 2009 (UTC)[reply]


Thanks! Without more directions though I don't think I should start any mission impossible here trying to find it. I would need more guidance... but I am grateful for your answer —Preceding unsigned comment added by 84.49.121.48 (talk) 16:34, 24 April 2009 (UTC)[reply]

Be aware some games have a setting for turning 3d acceleration on and off. It may be presented as a choice between "SOFTWARE" and "OPENGL" (or "DIRECTX"), or it may just be a setting for "3d acceleration on/off". OF course, if you've got an older video card, or one designed exclusively for business use it may not have any 3d acceleration at all. APL (talk) 16:38, 24 April 2009 (UTC)[reply]


No I don't have a bussiness-use kind of card. It's a gaming machine so I suspect it should be 3d acceleration on it if this is normal on cards meant for gaming. But you mean that this might be an option in the configuration programme outside the game or in the Options-menu of the game itself while running the game? I see none... these were the first places I looked... hm.. —Preceding unsigned comment added by 84.49.121.48 (talk) 16:49, 24 April 2009 (UTC)[reply]

Just got a response from another IT guy... Go to start, then run, and run "dxdiag". You will see a window like this with 3d acceleration info. -- kainaw 17:52, 24 April 2009 (UTC)[reply]
If it's a setting specific to the game, then mentioning the game might help. Perhaps one of us knows it. APL (talk) 18:26, 24 April 2009 (UTC)[reply]

Dual-booting XP and Ubuntu; multiple hard drives

Hi all,

So I've been playing with Ubuntu through a Wubi install for a while. With the new release of Jaunty yesterday, I've decided that it's time to switch to Ubuntu as my main OS, but I will install XP as backup, and for a couple of apps that I use in XP that don't work in Wine well enough yet. So, I've found these instructions here: http://apcmag.com/how_to_dual_boot_linux_and_windows_xp_linux_installed_first.htm which are pretty straight-forward. Here's my question:

I have 3 HDDs: 35GB (currently my primary), 70GB (slave), and 300GB (external/USB) used for data storage (pictures, etc). Any reccomendations as to what do to, in terms of where to create the partitions? I'm thinking: use the 70 as the primary, for the Ubuntu install; use the 35 as slave, but with the Ubuntu swap and XP partitions on it.

What will happen when I try to install XP? Will it force me to install on the primary, or will it give me the choice to install on the slave? Any other thoughts/reccommendations?

Thanks! --richardmtl (talk) 16:00, 24 April 2009 (UTC)[reply]

Well, I just thought of something that may be easier. I can keep my setup as is, and delete the Wubi install. Then, I can install Ubuntu fresh, on the slave drive. I can alswo resize the XP partition on the primary, and use the freed-up space as the swap drive. This way, I also keep my current XP install, without having to re-install the programs that I need there.

2 questions, then:

1) Is it better to have the swap partitionon a different drive than the OS, as I plan on doing? Seems to me that it could give better performance, especially on a somewhat older machine like mine (Dell P4, 2.4 Ghz, 786 MB RAM)

2) is it worthwhile to have a seperate /home partition and/or /usr partition(s)?

Thanks! --richardmtl (talk) 17:15, 24 April 2009 (UTC)[reply]

It used to be that XP would not boot from a USB drive. I await others' responses with interest, since I could use the answer. EdJohnston (talk) 17:24, 24 April 2009 (UTC)[reply]
Swap: well yes, it's better for the swap to be on a different drive, and ideally a different interface, and ideally to be a particularly fast disk (like a solid-state drive). But don't think that "good swap" makes for "good performance". Swap is, for interactive applications and desktop machines, the epitome of >teh suck< ; once your (sum of) working sets has grown so big that it doesn't all fit in RAM and you need to be paging apps in and out, your user experience has degenerated to sitting listening to disks grind while looking at a screen full of unresponsive apps. If more apps were properly written to handle failed malloc() properly, I'd probably just disable swap altogether. Short answer: don't worry very much about swap (it sucks whatever you do). 87.112.75.169 (talk) 01:05, 25 April 2009 (UTC)[reply]
That 786 MB isn't a bad size (I've been using a 512Mb laptop for ages, without major issues), but more RAM (as much as you can get in there) is the best way to avoid the suckage of swapping. 87.112.75.169 (talk) 01:05, 25 April 2009 (UTC)[reply]
home partition: well yes, I guess so, but don't bother. People sometimes advocate /home be its own partition so that, if ordinary users totally fill their accounts so that the partition is totally full, you can still login as root and do stuff. But you can still login as root (if you enable that, which you don't need to) or anyone else (and su or sudo from there) even if the disk is full. If it's just you using it then you don't care (you'll be the only one to suffer), and if it's a truly shared machine then you should look at a proper quota scheme. People also used to advocate a /home partition because they used a partition based backup scheme (where the whole partition was replicated or tarred or whatever); you'll probably backup to DVD or by rsync to another disk, so that's not an issue. Short answer: don't bother. 87.112.75.169 (talk) 01:05, 25 April 2009 (UTC)[reply]

Video Screenshots ?

Is it possible to take pictures/screenshots while playing a video?

Like when I'm watching a dvd, or you know, a private video or movie clip and such on my Windows media player, RealPlayer, Quicktime or VLC player or whatever, can I somehow pause the clip and take a screenshot, getting pictures in BMP or JPG formats or such? I have already tried the simple way, pausing my clip and pressing the button on the keyboard called "prt scn" (Print screen) but that didn't work obviously (Or if it did, I can't find where the pics was saved, but I really doubt it worked), so I was thinking maybe this is not possible to do... but I really hope so because I have some clips that would make for some good photos to have in our photo album

tnx

VLC player has this function. It's in the "Video" menu, under "Snapshot". By default, it saves a png file to the My Pictures folder. This can be changed in the video section of the preferences panel. Cycle~ (talk) 17:11, 24 April 2009 (UTC)[reply]


WOW! Thanks! I have been struggling to figure this out for quite some time. The VLC player is probably the only of the many players I have that I had not tried. Thanks alot, you made my day ;D Krikkert7 (talk) 17:31, 24 April 2009 (UTC)[reply]

The reason you can't normally is because the video is being played with hardware acceleration (your video card is beaming it directly to your monitor, skipping your operating system). You can turn off hardware acceleration under your display settings—dial it down to zero and you can take screenshots as usual. However hardware acceleration is a Good Thing so after you are done with your screenshots, you should turn it back up again. "Print Screen" takes a screenshot and copies it to the clipboard—so you've got to paste it somewhere (like MS Paint) before you can save it. --140.247.249.237 (talk) 17:41, 24 April 2009 (UTC)[reply]

mplayer has this function too, while playing press "s" key

Gom player can do this easily. And when you press shift-PrintScreen the image is saved to the clipboard and can be downloaded into Irfanview and another similar freeware picture editor I've forgotten the name of. 78.151.148.89 (talk) 21:55, 24 April 2009 (UTC)[reply]

iPod DST

I have a 3rd generation iPod nano. The features guide, [6], says that the DST option is in the settings>date&time menu. I dont have any sort of option for DST on the screen. What is the problem? Thanks. —Preceding unsigned comment added by 116.71.53.143 (talk) 18:17, 24 April 2009 (UTC)[reply]

Couldn't get on Internet earlier, screen turned completely blue with no messages or anything

I don't remember how to find what kind of computer I have, but it was on this desk once before.

I know it's an HP Pavilion desktop.

I tried to get on the Internet when I turned it on, and the screen just stayed blank. The circle just kept turning.

The modem lights were working normally. The last time I told tech support this they said to do a system restore (though the lights on the back of the computer were working normally this time). So I pressed F11 and maybe selected the wrong option because the screen turned completely blue and I couldn't do anything or even turn the computer off. I could, however, unplug it. That didn't help, and furthermore, there was no more place for the URL and no buttons at the top. I pressed F11 again and the information at the top of the screen came back.

I finally realized unplugging the modem sometimes works. It did.Vchimpanzee · talk · contributions · 19:57, 24 April 2009 (UTC)[reply]

I figured out how to find my information. OS Name Microsoft® Windows Vista™ Home Premium Version 6.0.6001 Service Pack 1 Build 6001 Other OS Description Not Available OS Manufacturer Microsoft Corporation System Name System Manufacturer HP-Pavilion System Model KT369AA-ABA a6512p System Type x64-based PC Processor Intel(R) Pentium(R) Dual CPU E2200 @ 2.20GHz, 2200 Mhz, 2 Core(s), 2 Logical Processor(s) BIOS Version/Date American Megatrends Inc. 5.23, 4/21/2008 SMBIOS Version 2.5 Windows Directory C:\Windows System Directory C:\Windows\system32 Boot Device \Device\HarddiskVolume1 Locale United States Hardware Abstraction Layer Version = "6.0.6001.18000" User Name Time Zone Eastern Standard Time Installed Physical Memory (RAM) 4.00 GB Total Physical Memory 3.99 GB Available Physical Memory 2.15 GB Total Virtual Memory 8.18 GB Available Virtual Memory 6.13 GB Page File Space 4.28 GB Page File C:\pagefile.sysVchimpanzee · talk · contributions · 21:15, 24 April 2009 (UTC)[reply]

How much do I use the Internet?

Several weeks ago Time Warner Cable was doing a test in which users in certain areas would be charged according to not only their speed, but also the number of gigabytes used. I was not a customer of theirs at the time I got the Internetand still don't get my Internet access from them, but if my Internet service provider were to do such a thing in the future, I'd like to know how much to cut back. One of the articles on the Time Warner test--which was cancelled after protests--said there's a web site you can use to measure your usage before the company does it for you and charges.Vchimpanzee · talk · contributions · 20:10, 24 April 2009 (UTC)[reply]

They (Time Warner) meant that there was an internal web site that offered users access to the tracking database (how nice of them!) so they could at least be aware of their usage before blowing past it on their way to a $150/month internet bill. Just to put this in perspective, from the article I saw they were going to cap their 6 megabit service at 40 gigabytes a month. This means that at full throttle it would take you 15 hours to burn through your 40 GB cap. Inversely, if you were to want to manage your bandwidth all month to stay under the cap, your average speed could not exceed 146 kilobits/sec. Now, to get to the meat of your question, how do you know how much you have used... There are a few mildly technical ways to do this. One is using a metric on your perpetually connected broadband device of choice, such as a cable modem. Chances are it has a web interface of some sort and a spot to report the cumulative bits/bytes/etc in and out. Using an old fashioned pencil and paper you could track this with mild accuracy, recording what the count is on given days. Be mindful that there is a chance the counter has a relatively low rollover point, for example 4.1 GB (if it is a 32 bit integer counting each byte). This is why frequent checking may be necessary. --66.195.232.121 (talk) 20:51, 24 April 2009 (UTC)[reply]

Thanks. No wonder I couldn't find the specifics in the article.

I never watch videos or listen to music not only to keep my computer safer and faster, but to avoid this possibility.Vchimpanzee · talk · contributions · 21:03, 24 April 2009 (UTC)[reply]

Download the free Networx utility from here http://www.softperfect.com/download/ and leave it running all day. It tells you maximum and average download speeds and gives hour by hour reports of your usage - down and up load speeds and quantity. It is interesting to reset the meter and watch it for specific downloads/pages. This will tell you which activity is using the most. A very low average speed does not mean modem failure; it means a time where you were reading a page (by eye), not actively downloading it. I have successfully used logs from it to prove my ISP was giving me less than a quarter of the advertised speed.KoolerStill (talk) 08:51, 25 April 2009 (UTC)[reply]
Another good (albeit commercial) tool is NetLimiter found here. In the free version, it will track usage and break down individual program usage over hours/days/etc. It also has the ability (in the paid version) to limit applications in order to keep under a bandwidth or transfer limit cap. --99.11.199.76 (talk) 13:43, 25 April 2009 (UTC)[reply]

A free easy to use database that learns

I've started keeping a record of all the food I buy (and eventually eat) with various nutritional details copied from the packaging. I want to enter these in a database so that I can calculate my average daily nutrition. But, when I enter the name of something I have already entered the details of before, such as 1 litre of skimmed milk for example, I want the database to fill in the details for me. Is there / are there any free databases that are suited to doing this please, and that are easy to use for a novice please? 78.151.148.89 (talk) 21:49, 24 April 2009 (UTC)[reply]

open office comes to mind right off the bat. While I'm sure there are good "single purpose" databases that may serve you better, and a search for "free, download, database, food" might be a starting point. openoffice is a good general free alternative to expensive software. — Ched :  ?  05:09, 25 April 2009 (UTC)[reply]
The problem is that what you're describing would not be hard to make if you were a database programmer, but if you're not... then the learning curve is steep. OpenOffice Base is free but not easy (even if you are a database programmer). -98.217.14.211 (talk) 15:18, 25 April 2009 (UTC)[reply]

Want to download and check my online bank statements for regular payments

My bank provides online bank statements and in addition allows the data to be downloaded in two or three different formats such as comma seperated values and Quicken format (I have never used Quicken). I would like to be able to check automatically that some regular monthly or weekly payments to me have actually been paid, preferably by the programme dialling up and downloading the data itself. The amounts should be that same, the description should usually be the same, but the actual date of payment may fluctuate by a few days. Is there any software available that can automatically check or monitor these payments and alert me if they are overdue please? Rather than me having to do it manually. Proprietory, freeware, or any other licence will do. Thanks. 78.151.148.89 (talk) 22:07, 24 April 2009 (UTC)[reply]

April 25

Computer

Are old computers more likely to be found in rural/remote areas? 58.165.23.195 (talk) 01:35, 25 April 2009 (UTC)[reply]

Well, this is really getting into an original research area, but here's my take. Simple statistics would indicate, that the more populated an area is, the more computers there are. Hence, more - "old computers". Just a thought. — Ched :  ?  05:05, 25 April 2009 (UTC)[reply]
Adding to Ched's logic, rural and remote areas would have had the occasional computer for office, accounting or other business use. But for Internet, they'd not have had any (many places still have none) because they are lacking internet services....facilities ranging from none through dial-up through exorbitantly expensive satellite service would tend to reduce the total number of computers in use. As the service becomes available, NEW machines would be purchased to use on them. If an area is sufficiently rural/remote, even in First World countries, even their electricity supply may be home-generated or non-existent.KoolerStill (talk) 09:54, 25 April 2009 (UTC)[reply]
So, by combining the first two answers, I'd predict both more old computers, total, and more per capita, in populated areas which have had the support infrastructure in place for computers for many years. StuRat (talk) 21:32, 25 April 2009 (UTC)[reply]

weird web traffic

my webpage has gotten some very weird traffic today. basically a LOT of different domains all hitting weird random (buried) pages. no referrers. the domains range from being in the US, Japan, Benin(!!), UAE, Korea, China, Hong Kong, UK, and Australia. All hits happened within a few seconds of the others. All identify with the user-agent of "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) ". This is strange, no? Could this be some sort of botnet? (I've no idea why they'd want my page, there's nothing interesting on it). Or what? (it is not slashdotting or something similar; each IP hits one and only one page, and does so within a second of another having hit a page, sometimes the same page. in my experience slashdotting has more variety in user-agents and people browse around a little more.) Any thoughts as to what I'm seeing here? --98.217.14.211 (talk) 04:25, 25 April 2009 (UTC)[reply]

Could it be an attempted distributed denial-of-service attack? If your website is on a shared server, an attack is probably directed at your web host's server and not your particular website. In other words, there may be another website on the server that's the motivation for the attack, but all websites on the server are being attacked in an attempt to bring the sever down. --Bavi H (talk) 05:01, 25 April 2009 (UTC)[reply]
Hmm, that might make sense. My site is on a shared server, so the 14 hits for my files (all of which were of relatively large PDFs) might have been that. Interesting. (Seems fine now.) --98.217.14.211 (talk) 15:12, 25 April 2009 (UTC)[reply]
(ec) As much as I hate to answer a question with another question, I have to in this case. How long have you been monitoring your web logs? It's not unusual really for bots (especially search engine bots) to suddenly show up and tick your pages. Some search engines (yep, there are still a lot out there besides google) will send bots around every 3 months or so to see what's out there. I'm guessing that that's what you're seeing here, but I don't know for sure. ;) — Ched :  ?  05:03, 25 April 2009 (UTC)[reply]
Yeah, I've monitored it for years, it doesn't look like search bots. The funny bit is that the servers are totally random looking, and not the standard bots at all. What's weird is the geographical distribution. (I had never even heard of Benin before this, to be honest.) If they were all from the same server or server bloc, that would make sense, but given the random country distribution it looks like some sort of botnet. Anyway, they all accessed weird, random PDFs on the server. --98.217.14.211 (talk) 15:12, 25 April 2009 (UTC)[reply]
A distributed denial of service attack on your host like Bavi H says sounds the most likely, I would expect it to last longer though, perhaps they were trying to gauge the hosts bandwidth for some reason like a future attack. I certainly wouldn't refer to my websites as uninteresting though others might differ :) Dmcq (talk) 07:30, 25 April 2009 (UTC)[reply]
And another question-with-another-question response: how could they be hitting random buried pages? Some other agent must have already crawled your site or perhaps some agent has gained access to your directory information. I kinda suspect a compromise - check your access settings for FTP, strengthen your admin password, etc. If it's a truly buried page (i.e. unlinked from any other page) no-one should be able to find it than you. Franamax (talk) 09:23, 25 April 2009 (UTC)[reply]
Further paranoia: yes, sounds like a botnet and if so, probably probing your web server responses for possible exploits (not the pages themselves, the HTTP response header could reveal clues about the webserver version you're using and how it's configured). And when you mention the user-agent field, is it just the text you quoted, or is there more? Most IE user-agent strings I've seen have a bunch of version information following what you've quoted. Possibly your logging software is stripping out the version information. And of course, I can access your site with whatever user-agent I want, it's pretty easy to specify (if you know how). Franamax (talk) 09:50, 25 April 2009 (UTC)[reply]
I should have clarified, they aren't darknet buried, but they are pages-within-pages. What I meant was, they aren't hitting the main page and drilling down, they're hitting a page that is five times already down the hierarchy, and kind of random pages at that (PDFs of random things—not the sort of thing that would be linked to from another site). --98.217.14.211 (talk) 15:12, 25 April 2009 (UTC)[reply]
It might be a Doomjuice virus. This creates a spambot net, which could be active enough to almost be a DoS attack. Run both a virus and malware scanner (the one from www.malwarebytes.com is a good free one). Doomjuice is fairly easily found and removed.
Or it might be AVG anti-virus "link scanners" at work.In Versin 8 there was a toolbar that would check out all links on a search results page BEFORE the user clicked any of them, to be able to report on the safety or otherwise if they did click. This might account for the large number of strange locations the log is showing. There is an esoteric way of blocking these, using the Apache URL redirection tool. This site has some of the code needed : http://www.the-art-of-web.com/system/logs-avg/ -- it takes some learning, but is also useful for other purposes, such as fixing broken links.KoolerStill (talk) 09:52, 25 April 2009 (UTC)[reply]
(Just to say, if it is a virus, it's not on MY end of things, it's on the end of those who are creating the traffic. So there's nothing much I can do about that, obviously.) --98.217.14.211 (talk) 17:28, 25 April 2009 (UTC)[reply]
Thanks for the responses! I'll keep an eye on it. It seems to have stopped not long after it started... we'll see if there's some future thing being heralded! --98.217.14.211 (talk) 15:12, 25 April 2009 (UTC)[reply]

DNS sub-domain entries

Given a subdomain, xyz.abc.com, I'd like to discover all the A records for the abc.com domain (with the simplifying assumption that everything in abc.com is contained within one SOA). So I want to query the DNS server responsible for abc.com and discover that it has subdomains xyz., www., and qrs.abc.com. How can I do that?

If I still had a Solaris or Linux system, I'm pretty sure I could set up my named to do a zone transfer, then just look at the cache file - but they took my toys away, and I'm stuck with Win XP Pro. Also, I really don't want to set up any MS implementations of a DNS server, because, well, you know...

Is there a way I can do a zone transfer with telnet or nslookup? Any alternatives? If my terminology is garbled, please forgive and thanks! Franamax (talk) 09:36, 25 April 2009 (UTC)[reply]

Assuming the DNS server allows it, you can do a zone transfer by starting nslookup then doing:
set type=any 
ls -d example.com > somefile.txt
This is according to [7]Matt Eason (Talk &#149; Contribs) 10:02, 25 April 2009 (UTC)[reply]

Playstation

I'm trying to install a Playstation 2 with a connection to an LG plasma television. 1) When we attach the system to the TV directly we get black and white images. 2) When he connect through the DVD player we get color on the screen, but interference of the "no disc" screen of the DVD player.

How do we get the system connected AND get color? - 82.173.183.1 (talk) 15:58, 25 April 2009 (UTC)[reply]

Interesting. Are you using the regular PlayStation composite video connector, or the component one? Try jiggling the video connector at the point where it connects to the PS2. Mine is "weak" and I often have video problems until I (seem to) bend the connector at just the right angle. Another thing to try would be borrowing a different video cable from a friend (preferably the cable with component connectors, since you have a newfangled, fancy TV.) Tempshill (talk) 16:22, 25 April 2009 (UTC)[reply]
The red-white-yellow is common PS2 connector. Red and White are audio (no video on them at all). Yellow is video. There is another one that has Red and White paired off and another Red, Green, and Blue connector. In that one, the red and white pair is still audio. The Red, Green, Blue group is the video. If you have one yellow video on the tv, use the yellow connector from the PS2. If you have a red/green/blue connector on the TV, use the red/green/blue connector from the PS2. -- kainaw 22:43, 25 April 2009 (UTC)[reply]
Yes, I should have asked first. How is the input connector on your TV labeled? And by "three separate thingies", are you talking about the red, white, and yellow cables on the PS2 cable? Assuming you have the regular PS2 composite video cabling (red-white-yellow), the yellow plug should go into a connector on your TV labeled "Composite In" or "Video In". Tempshill (talk) 04:00, 26 April 2009 (UTC)[reply]

High quality media player for website

Hello.

I am designing a website and I need a media player (like Adobe Flash Player) for high quality movies, that can play on ALL computers (or as many as possible)?

It is not suppose to be like Youtube. Its meant for another purpose. So still - A good platform independent or cross platform media player for very high quality movies.

Anyone knows one??? —Preceding unsigned comment added by 92.243.235.218 (talk) 16:19, 25 April 2009 (UTC)[reply]

Flowplayer? Tempshill (talk) 16:23, 25 April 2009 (UTC)[reply]

TeamViewer

When setting up TeamViewer is there any special requirements? Do I have to know any of the computers ip addresses or ports, or does it somehow just know how to connect to the other computer across the internet by the id number? thanks —Preceding unsigned comment added by Shadowclouds6635 (talkcontribs) 17:01, 25 April 2009 (UTC)[reply]

It just knows. Both ends have to have it installed. When you open each end, it gives a code number and freshly generated password, which you have to pass on to the other party (via email or some other means), then both enter in the received codes into another dialog, to establish the connection. The codes are the private and public keys to an encryption system which makes it a fully secure connection at all times, using 256 bit encoding. A permanent connection can also be configured, allowing access to a remote which is unmanned (it must be powered up, of course). KoolerStill (talk) 18:10, 25 April 2009 (UTC)[reply]
It must make some sort of connection to a TeamViewer server which would store both computers id and ip; it can't "just know" by the codes alone —Preceding unsigned comment added by 82.44.54.169 (talk) 18:26, 25 April 2009 (UTC)[reply]
The encryption is partly to make the data hidden even from their routers and servers. Clearly, those must have the ID and IP information, from when the session is started. I used "it knows" in the same sense as Shadowclouds did - that it is automatic, and the user does not need to know, in order to be able to set it up. All the users need to know is to download and install, then click the icon to start it.KoolerStill (talk) 18:38, 25 April 2009 (UTC)[reply]

April 26

Hey guyz! I go to a web site. I click on a flash thing or a video clip. It downloads on my computer for a little time and then it plays. Yhong is, I want (want it soooo baaad) to save it on my system to be able to play it when I'm offline. There gotta be a Guru out there who knows how I can do that 'cause I tried right-clicking to do the "save target as...." But it's always deactivated!!!! So please help me Thanks for your time —Preceding unsigned comment added by 41.247.4.68 (talk) 11:03, 26 April 2009 (UTC)[reply]

free forum without ads - Is this legit?

[8] It seems too good to be true. How do they make their money then?