Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Sushil shenoy (talk | contribs) at 15:51, 18 July 2009 (→‎network adapters??). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:



July 12

red alert 2 yuri's revenge

Hi Wikipedians:

I'm currently having lots of fun editing the rulesmd.ini file of the game. I am wondering if there is anyway of making a soldier unit such as conscript deploy into a building such as the construction yard?

70.31.152.197 (talk) 01:39, 12 July 2009 (UTC)[reply]

Probably. Look up the MCV rules and see what they say, however it accomplishes the same feat. --98.217.14.211 (talk) 02:21, 12 July 2009 (UTC)[reply]

Safety of online RPGs

Do ourWorld and Spineworld allow for safe chatting? Although the kid in question should be fine, I still worry (and no, I'm not a parent). If not, any alternatives that I can suggest (besides Disney sites and Poptropica)? Vltava 68 02:57, 12 July 2009 (UTC)[reply]

I realize you're not a parent, but you might still find ourWorld's page of information for parents helpful. They look like they try to be very accommodating. Spineworld also has some information in their FAQ (under Safety), saying that they take child safety seriously, you can ignore/block "unwanted communication" with other users, etc. Indeterminate (talk) 07:50, 13 July 2009 (UTC)[reply]

Video games with background eye candy

I'm a sucker for high detail backgrounds, especially in a natural-type setting. Realistic rocks, plants, trees, etc. I've logged more hours on my X-Box 360 playing Oblivion than any sane person would care to admit and Fable was another favourite. Could anyone suggest other games (preferably available for the 360 or PC) that are similar, either in gameplay (love nonlinear gameplay) or background eye candy? Matt Deres (talk) 16:51, 12 July 2009 (UTC)[reply]

I do not have any suggestion, but I can understand what you mean. Personally, my favourite game would be a completely non-linear (there really do not need to be any objectives at all) sandbox game set in the jungle of Ice Age 3. The jungle needs to be very large, so large that you "never" will get tired of it (not like The Simpsons Game, where you know the entire city after only a few minutes), and there should be an seemingly infinite set of different plants, animals and other natural objects, and you should be able to walk in the djungle, fly through it, or even dig you way through it in the soil. The vegetation is dense, and the graphics is detailed, high-resolution, truly high-end (at least as good as Crysis). And, of course, the main characters from the film series is there, and their activities and the player's interaction with them should never become repetitive. --Andreas Rejbrand (talk) 20:41, 12 July 2009 (UTC)[reply]
(For PC) At the risk of getting accused of POV by the above poster, a game similar to Oblivion, with the most gorgeous nature graphics and beautifully rendered fantasy locations: Sacred 2. Of course that is a medieval fantasy world. I do agree with Crysis for the best realism I've ever seen (Call of Duty in second place), providing your computer can handle it on high resolution. Oh, and Test Drive Unlimited has some spectacular scenery of Hawaii. Sandman30s (talk) 21:37, 12 July 2009 (UTC)[reply]
I've got to add a word of caution to buying sacred2 - at least on the xbox 360 - it really didn't sit well with me - in fact I would say that it was a blood awful game - but I do agree that the background graphics were nice in places. Unfortunately it had other flaws.83.100.250.79 (talk) 16:50, 13 July 2009 (UTC)[reply]
The PC version, with the latest patch, is running very smoothly for me. Diablo-type games are not everyone's cup of tea... Sandman30s (talk) 12:21, 14 July 2009 (UTC)[reply]
It was the "when you attack or cast spells you stop moving thing" that killed it for me, Baldur's Gate Dark Alliance did the mechanics much better last generation, so having played that I couldn't go back to something inferior - I was upset/bitter - because it had many good points.83.100.250.79 (talk) 16:01, 14 July 2009 (UTC)[reply]
Potentially Assasin's Creed - anoyingly the roaming is limited until the game is half finished, and the colour palette is annoyingly grey - but once you get a chance to go climbing on the roof tops I think you might enjoy it - it does eventually get a really good "just wandering around because I like it feeling", and the views are great.83.100.250.79 (talk) 16:58, 13 July 2009 (UTC)[reply]
Fallout III's wide open environment might qualify, but it's more about overgrown centuries old ruins and not so much about lush greenery. APL (talk) 20:13, 13 July 2009 (UTC)[reply]
Get the PC version for the Elder scrolls. They come with an editor (Construction set) and you can basically create your own worlds/games. You can start creating your own thing based on the games and landcape/items they came with. With a few add-ons you can even design your own building elements, terrain patterns, animals, game play etc. (There are a few bugs and hick-ups that occasionally don't let you do quite what you want, though.) WARNING do that when you have some time off from school/work and make sure a relative/spouse will feed you and pull the plug occasionally so you can get some sleep. The mod forum [1] has lots of helpful people who'll lend n hand and swap mods. (OR: Try the birds!) 71.236.26.74 (talk) 07:47, 16 July 2009 (UTC)[reply]

Thanks for the responses everyone. My PC can't handle Oblivion in anything close to normal graphics (I've been spoiled by the 360 version anyway), though I'll consider the mod thing when I move on to the next PC. I wasn't aware of Sacred 2 at all, so that's one I'll have to look at further fer shure. The graphics for Crysis look amazing, but the subject matter isn't quite to my taste. Matt Deres (talk) 23:50, 16 July 2009 (UTC)[reply]

Stolen Music

Basically, I know nothing about computers.

A while go I put some music onto an Ipod, somehow, and it worked for a while. However,recently that ipod stopped working, and I sent it to a mechanic to get fixed. Somewhere along the way everything on it was deleted, and I have had to put it all back. But some of the music in Itunes refuses to copy over because it apparently isn't on my computer any more. This has only affected the music I added to the collection more recently.

Where then is this music? I can't find it anywhere on my computer, I had assumed putting it into Itunes would save the files there, where I could get then back again if I needed to, but apparently it just saved the names and finds the rest somewhere else on my computer. What can I do to get this back?

HS7 (talk) 17:25, 12 July 2009 (UTC)[reply]

I wrote out long answers to this question twice so far but each time got bogged down in trying to cover several OS's and music types. Could you help us narrow down a solution by telling us (a) how did you get the music in the first place? Did you buy it via the iTunes Store, or perhaps did you rip CDs? (b) What version of Microsoft Windows are you running? Windows XP? Windows Vista? Tempshill (talk) 21:54, 12 July 2009 (UTC)[reply]

Name of simple one- screen game (Japanese)

Some time ago I remember that I saw some very simple but funny one screen games. It showed only one picture and you had to discover something. For example, it was a room and you got to go out of it discovering a saw or other tool. Is there any name for this kind of game? —Preceding unsigned comment added by Quest09 (talkcontribs) 19:13, 12 July 2009 (UTC)[reply]

I don't believe I've heard a word describing such games. Ludomancy has several arty one-screen games. Many of the "I Spy" games are one-screen games. Tempshill (talk) 19:40, 12 July 2009 (UTC)[reply]
Are you looking for the name so you can know the name, or looking for the name to go search on your own? If the latter, literally gazillions of such games (mostly titled "Escape the ...") exist on the Addicting Games site. Many of them seem to be little more than slap-togethers or ripoffs of one another, but they may be "good enough" for your needs.
(Now that they've added pre-game advertising in the form of videos that don't seem to be skippable, I've found the site to be a lot less addicting...) --DaHorsesMouth (talk) 22:09, 12 July 2009 (UTC)[reply]
Yes, this information is good enough. I wanted to know both, the name and where to find them. I do believe they had a specific name. "Escape the ..." is what I was thinking at. --Quest09 (talk) 10:26, 13 July 2009 (UTC)[reply]
Would the Crimson and Viridian Rooms be close to what you want? Washii (talk) 06:11, 14 July 2009 (UTC)[reply]
Escape the room sounds like the genre you are after. Warofdreams talk 19:42, 14 July 2009 (UTC)[reply]

MHz - Help

I have just updated my recent hardware (gaming PC) but getting a problem in system. Sometimes my system gets hanged in the middle of operation.And even worse it is constantly happening while playing game with standard recommendation. I suspect about the bus speed of RAM. Here is quick view:

Intel Core 2 Quad 9400 (Frontal Bus Speed or FBS 1333 MHz)

XFX play hard 750i SLI nForce Motherboard (FBS 1333 MHz)

RAM Transcend 2 GB (800 MHz)

So, is RAM with lower bus speed causing this "hanged" problem? There's a 1066MHz RAM available in the market. Thanks in advance--202.56.7.153 (talk) 21:29, 12 July 2009 (UTC)[reply]

No it shouldn't cause the symptoms you've described. Can you elaborate more on your "hanged" state? Does the screen go black or just stay frozen for some time and then continue? Do you happen to have an ATI card? ATI cards (not sure about Nvidia cards) can reset the GPU through its driver when it encounters an error or overheats or becomes unstable due to overclocking, and that fits your description of it happening more often in games than in desktop. --antilivedT | C | G 22:53, 12 July 2009 (UTC)[reply]
  • Screen stays frozen for forever and I have to press Restart button. I have an ATI card (Sapphire ATI Radeon 4890 1 GB Cross Fire). It usually happens if my system runs for 5 to 6 hours. I am using 38'C PC Case recommended by Intel, but it's not branded. One more thing is that I am using XP service pack 2.But I found that Intel Core 2 Quad 9400 requires Vista 64 Bit Service Pack 1. Can it be PC Case which is not enough to provide better air inside the hardware (Motherboard, Graphics card, RAM) or operating system?--119.30.36.53 (talk) 09:11, 13 July 2009 (UTC)[reply]

Update: I have just tried to play Call of Duty 5. But within 10 minutes screen gets frozen again. I had no choice but pressing reset button. How can I rectify this problem without changing motherboard, processor and graphics card (because there's no possibility of changing them)? Should I get better PC Case or something else? --119.30.36.54 (talk) 10:51, 13 July 2009 (UTC)[reply]

Sounds to me like its overheating (running fine then stopping), though that more usually then not results in an auto shutdown/reboot. Try checking the fans on the CPU / Graphics cards. Also, try disabling any programs on startup. Look up memtest, 3dmark and prime95, they're used for stability testing for memory, graphics, and cpu respectively (tho 3dmark does also benchmark cpu). HTH PrinzPH (talk) 20:29, 13 July 2009 (UTC)[reply]
Download CPUID Hardware Monitor and play games for a few minutes then exit before it freezes. It will record the maximum temperature each component reached during that time which would be really useful in diagnosing the problem. Also, make sure to revert any overclocking that you may have done. --antilivedT | C | G 01:15, 14 July 2009 (UTC)[reply]
    • I have checked the fans on the CPU / Graphics cards. They are running fine even in frozen state. I ran CPUID Hardware Monitor. It shows the little difference though. One example is given below:

ATI Radeon HD 4800 Series hardware monitor (before playing game)

  • Voltage sensor 0 1.05 Volts [0x1] (GPU Core)
  • Temperature sensor 0 63°C (144°F) [0x3E] (GPU Core)
  • Fan sensor 0 1657 RPM [0x679] (GPU)

ATI Radeon HD 4800 Series hardware monitor (after playing game)

  • Voltage sensor 0 1.05 Volts [0x1] (GPU Core)
  • Temperature sensor 0 64°C (147°F) [0x40] (GPU Core)
  • Fan sensor 0 1807 RPM [0x70F] (GPU)

I never overclock my system and don not know how to do it. I just let the shop's hardware technicians to assemble all the components after purchasing them. I assume they did not do any drastic change to the system. After having this trouble I brought all the components to that shop and had the system checked by them. Surprisingly, everything seemed fine as they have air conditioner in their testing room which provided sufficient air inside the PC case. My PC Case does not contain any single cooling fan except the fans on CPU / Graphics cards. The shop suggested me to buy this PC Case recommended by ATI which has better ventilation then the current one. Can PC case be the problem of overheating? I have met some people who had this problem and they solved it by adding additional cooling fan or changed the PC Case. One more thing, how can I understand my system or graphics are being overclocked? How can I reset them to default condition?--202.56.7.151 (talk) 09:58, 15 July 2009 (UTC)[reply]

I found the my computer would freeze while playing call of duty 4, and the problems were down to the graphics card (NVIDIA 8800GT). I used RivaTune to decrease the memory speeds on my graphics card by about 5% and that stopped my PC crashing. Rjwilmsi 17:16, 18 July 2009 (UTC)[reply]
Are those temps from the max column or just the current temp? A screenshot of Hardware Monitor after you've left it open and played games will be more useful. --antilivedT | C | G 04:59, 19 July 2009 (UTC)[reply]

Best way to do graphics cards diagnostics in Linux?

I've recently installed Ubuntu Linux on an old computer. I've never used Linux before. How can I diagnose the problem that the graphic card does not give any video - only the on-motherboard video works. I'd like to find out if the computer is aware that the graphics card is there, why it is not using it, is the card giving any error messages etc etc. I have another working computer, so I can burn boot cds and so on if needed. Thanks 78.149.188.94 (talk) 23:30, 12 July 2009 (UTC)[reply]

lspci lists all the pci, pcix, and agp devices; if the card is listed there, then linux can see it. Have you simply tried disabling the onboard video - some (most) motherboards can't cope with two graphics devices active at the same time. 87.112.22.255 (talk) 23:54, 12 July 2009 (UTC)[reply]
[How to change video cards in Linux Ubuntu?] a few questions further up is about this subject, you may get some clues from that.
The graphics card may be one the Ubuntu has no drivers for; see if you can get one from the internet. But first check the BIOS and turn the on-board video OFF, if that's possible, to force it to look for the other card. If that fails, just run it with the on-board one.
I had two "identical" Win installations on two hard drives once; one would understand the on-board only, the other the add-on card only, no matter what I did with BIOS settings and drivers. To boot from the other disk I had to change the video being used.
Most newer mobos will run twoo sets of graphics, that's how you get to use two monitors at once. There may be considerations of similarity involved though. - 125.63.156.249 (talk) 05:11, 13 July 2009 (UTC)[reply]
The mobo is old, the monitors are old. 78.149.198.158 (talk) 10:49, 13 July 2009 (UTC)[reply]
To troubleshoot video problems, the most helpful place to look is the /var/log/Xorg.0.log file. Specifically, look for lines that start with (EE) - they indicate an error that occurred. If it's an unhelpful error like "No screens found", try looking further up in the logs. Usually you can find a message from the video drivers that'll tell you exactly what the problem is. Indeterminate (talk) 07:42, 13 July 2009 (UTC)[reply]

Thanks. Please explain how to use these commands. How do I open a command box? Do I just type in the commands above as written and press return? Thanks. 78.149.198.158 (talk) 10:49, 13 July 2009 (UTC)[reply]

I have now found out how to do commands - use something called the "Terminal". I typed the lspci command in, and I got eight lines of information in responce. Only one line mentions anything to do with graphics: "00:02.0 VGA compatible controller: Intel Corporation 82815 Chipset Graphics Controller (CGC) (rev02)", and only one line mentions PCI: "00:1e.0 PCI bridge: Intel Corporation PCI Bridge (rev01)". Does that mean the computer is not aware there is a graphics card in one of the PCI slots? Using lspci -help I see that it has other sub-commands to access PCI: do I have to tell the computer to look at the PCI slot? I had an AGP graphics card in when I installed Ubuntu - the AGP card does not seem to work and may have been damaged in another computer.

I also tried the /var/log/Xorg.0.log command, but it gave the responce "Permission denied". Should I just bin the graphics cards and/or the motherboard? thanks 78.146.166.2 (talk) 18:30, 13 July 2009 (UTC)[reply]

That lspci is showing you that it sees only the motherboard's onboard graphics card, not the one in the AGP slot (which is presumably an nVidia or an ATI?). As I said above, I think you need to turn off the onboard graphics in the BIOS screen; I do not think your old machine can support two graphics adaptors. 87.114.25.180 (talk) 18:55, 13 July 2009 (UTC)[reply]
Sorry for not being clear: /var/log/Xorg.0.log isn't a command, it's a text file. If you browse to it, and open it with a text editor, you can read about why your X server (the graphical part of the Linux OS) isn't working properly. But yeah, it looks like it's not detecting your PCI video card; it might be broken, or it could be those BIOS settings. Indeterminate (talk) 07:56, 14 July 2009 (UTC)[reply]


July 13

Internet Explorer opacity support

Is there any way I can get IE7 to render opacity like <div style="opacity: 0.5"> or doubly -moz-opacity?

In a proper browser,

this text

is 50% transparent. Is there any possible way to get IE6 or IE7 to render that properly?-- penubag  (talk) 08:49, 13 July 2009 (UTC)[reply]

See http://www.quirksmode.org/css/opacity.html , which lists two different ways for two different ranges of IE versions. 87.114.25.180 (talk) 10:45, 13 July 2009 (UTC)[reply]
Thanks for that link, it help a lot! -- penubag  (talk) 20:38, 13 July 2009 (UTC)[reply]

Open source Flash

1st: Is there any advantage for the end-users to use open source Flash instead of Adobe Flash? 2nd: If I develop a .swf using the Open source approach, but the client needs a .fla file. How can I get this .fla file? Would decompiling my open source .swf work?--Quest09 (talk) 11:10, 13 July 2009 (UTC)[reply]

1. no. 2. probably not very well. --98.217.14.211 (talk) 18:28, 13 July 2009 (UTC)[reply]
There are advantages of free SWF players. Both Gnash and SWFdec support non-x86 machines and SWFdec supports saving media files used by Flash (e.g. movies from YouTube or similar sites). MTM (talk) 18:01, 17 July 2009 (UTC)[reply]

doubt!!

The first programmed unix was written in which programming language?? —Preceding unsigned comment added by 122.164.109.75 (talk) 13:15, 13 July 2009 (UTC)[reply]

Ken Thompson and Dennis Ritchie were assembly language programmers. After getting the basics of Unix running, and after Ritchie had developed the C programming language, C was used to write Unix. -- kainaw 13:32, 13 July 2009 (UTC)[reply]

Thanks .... a dumb friend of mine told me it was cobol !!! —Preceding unsigned comment added by Sushil shenoy (talkcontribs) 13:43, 16 July 2009 (UTC)[reply]

First computer language

In what computer language was the compiler of the first computer language written?--Quest09 (talk) 15:47, 13 July 2009 (UTC)[reply]

Perhaps A-0 programming language? I'm no computer history buff but the article suggests it was the first Compiler ever developed for an electronic computer. ny156uk (talk) 15:51, 13 July 2009 (UTC)[reply]

You may also be interested in History of compiler writing which is linked within that article. ny156uk (talk) 15:52, 13 July 2009 (UTC)[reply]

The first compiler would have been written in assembler - before we had compilers - that was pretty much it. SteveBaker (talk) 02:41, 14 July 2009 (UTC)[reply]
Unless anybody wants to start a messy debate about blurry definitions of "compiled code" on antique computer architectures, let's just all agree with Steve and move on with our lives... Nimur (talk) 05:02, 14 July 2009 (UTC)[reply]
Do you have any evidence that it was written in assembler? The article Assembly language says assembly language was developed in the 50s, while A-0 dates back to 1951, but there's not much information about the implementation of A-0. Before assembly languages, programs were entered in numeric machine codes, and programmers would have to know the code corresponding to each instruction. --Boris straight (talk) 17:11, 15 July 2009 (UTC)[reply]

Hard drive failure?

One of my desktop PCs has suddenly started reporting "missing system disk". The problem is that the disk is either found at POST or it is not found at POST. If it is found, then the PC boots into Windows XP with no problem. Re-seating the IDE and power cables seems to have fixed the problem for the time being and I have managed to retrieve important documents. I am considering buying a new disk and reinstalling Windows, but I would like to be sure it is the disk at fault and not something else like wobbly cables. Is there a way of telling if the disk is actually faulty? Astronaut (talk) 16:40, 13 July 2009 (UTC)[reply]

I've had badly kinked IDE cables that lead to intermittent connections (leading to weird behaviour), so swapping that is a first measure. Secondly make sure you're really getting enough power on the power rails running the drive (with a multimeter into a spare molex connector); new hardware (like more disks, or a fancier graphics card) can cause the power rail to be a tad low, which means things sometimes work and sometimes don't. 87.114.25.180 (talk) 16:46, 13 July 2009 (UTC)[reply]
But, apart from the cables, the disk could be starting to lose the boot record sector, which means one day it won't be recognised at all, and that's that. So rescue what you want from it right away. (Though I used one for 6 months like this before it finally totally died). If replacing the cables etc then stops the problem, you can feel safe using it.- KoolerStill (talk) 18:15, 13 July 2009 (UTC)[reply]
A bad boot sector won't prevent the machine from seeing the drive at post, just from booting from it. It's perfectly simple to wipe the boot sector off a drive (e.g. with dd) and the drive shows up in BIOS fine. 87.114.25.180 (talk) 18:22, 13 July 2009 (UTC)[reply]

How to enter comands in Linux Ubuntu

After a lot of internet research I eventually found out that you use the "Terminal" to enter computer commands. (I hope I'm not breaking any Linux rules by revealing this closely-kept secret. Of course nobody actually wrote anywhere on the internet that you use the Terminal - that would make it too easy - but I deduced it by implication). But, when I click on Terminal on my Ubuntu computer, all I get is a blank white rectangle. It is just pure white - no text, no graphics, nothing. Is there any other way of entering commands please? 78.146.166.2 (talk) 16:53, 13 July 2009 (UTC)[reply]

Here are some beginning tutorials for using the linux command line: [2], [3], and [4] 87.114.25.180 (talk) 17:01, 13 July 2009 (UTC)[reply]

Thanks. Upon restarting the monitor now has a higher resolution and I can see the "Terminal", so its no longer a problem. 78.146.166.2 (talk) 18:05, 13 July 2009 (UTC)[reply]

You can also get a console by hitting ctrl-alt-f1 (f2, f3...). Hit ctrl-alt-f7 to return to the X gui. 87.114.25.180 (talk) 18:13, 13 July 2009 (UTC)[reply]

HP laptop quick buttons with VLC media player

I have an HP Pavilion dv4 laptop which has quick buttons for play/pause, stop, forward, backward. They work with Windows Media Player and Windows Media Center but not on any other program. Is there a way to make them work for VLC media player, iTunes, Real Player and others? I'm mainly interested in using the buttons with VLC but others would be nice. 95.84.64.174 (talk) 17:00, 13 July 2009 (UTC)[reply]

Why was download so slow?

This is the information about my computer.[5]

Over the weekend, I got one of these messages at the bottom of the screen saying I should download an update. I did, and while it slowed down all the web sites I went to (ESPECIALLY Wikipedia, but you were having a problem of your own), I continued to use the Internet during the process anyway. When I was ready to sign off the computer, it was still doing the second part of the process. So I clicked on the red X for the other stuff I had been doing and left the computer for a few hours. When I came back, nothing had changed (except I now got a "Welcome to Internet Explorer 8" message), and the screen that I thought I had clicked on the red X for was still sort of there. Parts of it were there. When I clicked on the red X again I got "not responding". A few minutes later, though, everything looked normal, and the downloading process appeared finished, and I felt confident shutting down. I knew that downloading new software requires restarting the computer, so I did that, and the third phase of the process was completed after I did that, so I shut down.

The next time I used the computer, I got a message saying I had new updates, and when I clicked, it showed "Internet Explorer 8", but it said "Failed". Now I have had that message appear, but the next time I signed on the computer, after a very, very slow download, the download went very quickly and was completed. I haven't had any such message this time. I don't know what slowed down the computer so much in phase 2 or why I haven't been told what to do for phase 4.Vchimpanzee · talk · contributions · 17:21, 13 July 2009 (UTC)[reply]

Sometimes Windows Update goes wrong, and doesn't seem to work. As you have found trying a second time (after a few hours) usually fixes the problem .
Question - is your computer ok now?
One thing to try is go to windows update (you can eaily find it by searching the internet), and make sure that there are no outstanding downloads (you only need the ones it automatically selects - the others are optional, and most people won't need them)
It sounds like the first download failed for some reason - when you restarted the computer it recognised this, and tried again - and by the sounds of it - worked.
Assuming the computer is working I'd put it down to experience - just a unidentified fault the first time. If there still is a problem please expand.83.100.250.79 (talk) 18:20, 13 July 2009 (UTC)[reply]


The windows update that includes internet explorer 8 is not an unattended install. A message about IE8 (for which you have to click 'next' 'next' 'ok/apply') failed to properly display (or opened in the background.) This hung-up the installation, which was manually aborted. Your computer successfully recovered from this error by error checking its first download against the server source (which is why the second download was fast, there wasn't much of one) and re-installing the patch. You can manually check for updates again, but it sounds like windows took care of itself. Taggart.BBS (talk) 18:22, 13 July 2009 (UTC)[reply]

Yes that sounds far more likely than my above comment about a 'bad download' - though I still maintain that windows update has issues periodically.83.100.250.79 (talk) 18:29, 13 July 2009 (UTC)[reply]
I don't know if there was a "second download". But that comment about needing to say "OK" makes sense. It may be I was supposed to click on that second message, which wasn't there hours earlier. It still says "Failed" on the update history.
Other than that, the computer has been working fine today and so has Wikipedia.Vchimpanzee · talk · contributions · 18:54, 13 July 2009 (UTC)[reply]
Wait, there was another update today, and it says the same thing as the other one about Internet Explorer 8. It's just waiting for me to restart.Vchimpanzee · talk · contributions · 18:57, 13 July 2009 (UTC)[reply]
What does it say ? Does it say that IE 8 successfully installed, and you need to restart for it to initialise, or something else?83.100.250.79 (talk) 19:25, 13 July 2009 (UTC)[reply]

Sorry, I got busy and never got around to posting this. I have restarted the computer and I got a special welcome inviting me to see all the features of Internet Explorer 8. It's done.Vchimpanzee · talk · contributions · 13:38, 14 July 2009 (UTC)[reply]

Recognising wireless cards by "noise"

Tin foil hat man changes his mac address very frequently, but he is worried if it's possible for the black helicopters to identify him by using a big antenna to listen to some unique background noise/errors in the signal/something you can listen to with an antenna his laptop with wifi generates? --194.197.235.56 (talk) 17:33, 13 July 2009 (UTC)[reply]

It would be very difficult. If someone tried very hard, they could probably distinguish between one 801.11x transmitter and another from tiny variances in the performance of analog components in the transmit circuitry, or drift rate of the transmitter's internal clock. But it's likely that these will vary over time, and due to external factors like temperature, making this a very difficult process. In practice anyone with equipment that sensitive can just sniff your screen with Van Eck phreaking and identify you 'cos you've always got the same Cindy Crawford desktop wallpaper. 87.114.25.180 (talk) 17:53, 13 July 2009 (UTC)[reply]
It's a lot more practical to distinguish between one model of card and another. Cards with different firmware will take slightly different times to respond to signals, which may be enough to distinguish them. The same analog electronic components mentioned above, which will be fixed for fairly long production runs, subtly shape the output waveforms generated, and different models will use different circuits. To use this in practice the snooper would have to have a very extensive library of signal traces from every card (and each time the factory specifies a different component the trace will change) - that's a huge amount of trivial work, but such is the lot of forensic scientists already, with their massive collection of shoe prints and button designs and bat eyelashes. 87.114.25.180 (talk) 18:02, 13 July 2009 (UTC)[reply]
They probably just look for people who's MAC address changes suspiciously frequently! SteveBaker (talk) 02:39, 14 July 2009 (UTC)[reply]

perl script

I'm trying to run [wakaba.c3.cx/ this script] on XAMPP server but I keep getting this error message:

Server error!

The server encountered an internal error and was unable to complete your request.

Error message:
Can't locate config.pl in @INC (@INC contains: . C:/xampp/perl/site/lib/ C:/xampp/perl/lib C:/xampp/perl/site/lib C:/xampp/apache) at C:/xampp/htdocs/img/wakaba.pl line 16. BEGIN failed--compilation aborted at C:/xampp/htdocs/img/wakaba.pl line 16. ,

If you think this is a server error, please contact the webmaster.
Error 500
localhost
13/07/2009 06:55:30 PM
Apache/2.2.11 (Win32) DAV/2 mod_ssl/2.2.11 OpenSSL/0.9.8i PHP/5.2.9 mod_perl/2.0.4 Perl/v5.10.0

What do I have to do to fix this? —Preceding unsigned comment added by Onesevensix 77 (talkcontribs) 17:57, 13 July 2009 (UTC)[reply]

You must put a file called "config.pl" in C:\xampp\perl\site\lib\ or one of the other directories listed. The installation instructions will probably tell you how to find or create that file. --Sean 21:00, 13 July 2009 (UTC)[reply]

MS Excell (also star/open office)

Probably the ultimate dumbo question : Once a value has been entered into a cell I can't find a way to edit the value except by going up to the 'equation editor' - clearly this is inefficient as I have to move my hand at least 1" to move the mouse cursor there - is there a way to change a value in a cell once it has been entered into the cell.? 83.100.250.79 (talk) 18:14, 13 July 2009 (UTC)[reply]

At least in OpenOffice Calc, I move the "cursor" box around with arrow keys, and anything I type goes into the cell. If I move the box elsewhere, then back and type then that just overwrites the cell contents. I never have to go to the text field at the top. I'm pretty sure Excel works the same. 87.114.25.180 (talk) 18:18, 13 July 2009 (UTC)[reply]
Click in the cell and overtype it??? To change only part of the content you need to use the top field, unless you look in tools or preferences for a setting that lets you "edit in the cell". - KoolerStill (talk) 18:23, 13 July 2009 (UTC)[reply]
Yes overtyping is a right royal pain in the, I just want to edit one digit of many - you can imagine my frustration... I'll have a look and see if I can find a setting (I think I tried that before and couldn't find it) 83.100.250.79 (talk) 18:26, 13 July 2009 (UTC)[reply]
In Excel it's Tools > Options > Edit > Edit directly in cell. I don't have OpenOffice. - KoolerStill (talk) 18:45, 13 July 2009 (UTC)[reply]
In Excel, you can press F2 or double-click a cell to edit it directly. 95.84.64.174 (talk) 19:07, 13 July 2009 (UTC)[reply]
I'm sure I tried double click, and it didn't work - will try it again. 83.100.250.79 (talk) 19:23, 13 July 2009 (UTC)[reply]

You're all right - I think I was getting confused because I expected it to work like a browser box input window - one click to select all, arrow to move cursor inside box - that is of course impossible if the arrow keys are to navigate through cells as well.. It's official - I'm stupid..

Resolved
(Don't be so hard on yourself -- after all, you /are/ dealing with a Microsoft product! --DaHorsesMouth (talk) 23:34, 13 July 2009 (UTC))[reply]

DIV with relative position still taking space

Hi Wikipedians,

I'm about to go nuts, I cant figure out how to make the extra space disappear! Oh yeah, here's whats happend. I had to use relative positioning to get a search bar where I needed it, and I declared this div above a table, and got it to show up in the right place, but I'm peeved to discover this has forced the table rendering lower than it should be (I suspect the height of the div is still being rendered on top of the table despite that the div being repositioned). I know its the positioned div 'cause when I comment it out the space goes away. I guess looking at it would make more sense: my frankenstein.

heres what I have for the div:

 <div class="pSearchBar">
    <form action="/SearchResults.asp" method="get" name="SearchBoxForm">
    	<span style="color: white; font-size: 18px;">Search <input style="width: 200px;" type="text" maxlength="30" value="" name="Search"/>
        	<img src="vspfiles/templates/Prince/myimages/images/gobutton.png" border="0" style="cursor: pointer; vertical-align: middle" onclick="document.forms['SearchBoxForm'].submit();" />
        </span>
    </form>  	
 </div>

 ... table goes here ...

Here's the CSS:

.pSearchBar {
	position:relative;
	width: 300px;
	left: 670px;
	top: 94px;
	height: 50px;
}


Any suggestions how I can keep the search bar there while removing the extra space on top?

TIA PrinzPH (talk) 21:29, 13 July 2009 (UTC)[reply]

Have you tried it without the FORM element? FORM elements add space if I recall (though you can probably get rid of it by playing with its CSS). When debugging weird DIV things, always try it without the content of the DIV to see if that is causing the problem. (Obviously the only way to tell if that is the case is to add a temporary border to the DIV, but that is easy enough). --98.217.14.211 (talk) 00:03, 14 July 2009 (UTC)[reply]
You might try nested div span elements like:
        <div style="position:relative;">
          <div style="position:absolute; left: 400px; top: 50px; border:solid; background-color:yellow;">
            Sample text.
          </div>
        </div>
The outer div defines an empty box relative to the surrounding content, which serves as a reference to which the inner box is positioned. (You may not need this if you already have a suitable container such as a table cell or if you want the inner element to be positioned relative to the entire page.) The position:absolute attribute of the inner div removes its content from the normal flow, so it will not take up space. If you change the outer element to a span instead of a div, no break occurs and the inner box is positioned both vertically and horizontally relative to the surrounding content. There may be a better way, but this is what I came up with through experimentation. I would verify expected results across multiple browsers, and of course all of the style attributes can be moved to a CSS file. -- Tcncv (talk) 01:08, 14 July 2009 (UTC)[reply]
Off topic but why do you need to define the position in the first place? Can't you just pop it in pScarletUpper2 next to your buttons? Your code is a strange mix of table and CSS based layout and is littered with <br> tags later on. Are you using a WYSIWIG editor? Also, naming your styles after its colour is bad practice as it will make no sense at all when the styles/colour change later on; name it after its purpose instead. --antilivedT | C | G 01:25, 14 July 2009 (UTC)[reply]
Thanks for the inputs! :) @Tcncv - will try it out. @Antilived It's a mess I agree. I eventually want to learn to use pure CSS, I guess im still 'transitional' having to fallback to tables when I'm too dizzy with CSS. Eventually I'll man-up and pull it off! But seriously, thanks for the input, am beginning to learn a lot! :D PrinzPH (talk) 23:15, 14 July 2009 (UTC)[reply]

Trojan

Anyone got some info on Trojan.Win32.Vapsup.uxx came across it on my system today thanks. BigDunc 21:56, 13 July 2009 (UTC)[reply]

McAfee's virus library is pretty good resource for these things. This page (http://vil.nai.com/vil/content/v_150856.htm) has the closest match I can find but not sure how much use it is info-wise. ny156uk (talk) 22:18, 13 July 2009 (UTC)[reply]

This page (http://www.pctools.com/mrc/infections/id/Trojan.Vapsup/) may also be of use. There is an e-how page on this but Wikipedia is stopping me linking (Something about blacklisted, but a google search term of 'Trojan.win32.vapsup' should return the e-how article ny156uk (talk) 22:21, 13 July 2009 (UTC)[reply]


July 14

Priority queue with same priority

How does the problem of a priority queue change when multiple elements can have the same priority, and those that do should be FIFO? NeonMerlin 02:22, 14 July 2009 (UTC)[reply]

It doesn't have to change and it doesn't have to be FIFO. It is up to the implementation to make it FIFO if that is required. Otherwise it is just a sorted list of items in the queue. As with any sorted list, it is up to the implementer to decide if anything special should be done when to items are equal. -- kainaw 02:27, 14 July 2009 (UTC)[reply]
Typically elements of the same priority will come out in some unspecified (and not necessarily consistent) order relative to each other. --76.91.63.71 (talk) 05:07, 14 July 2009 (UTC)[reply]

speech recognition for mutiple voices

Does modern speech recognition software works with one voice only (end user on a computer), or is it good enough for multiple voices (interview transcription, etc.)? --Piotr Konieczny aka Prokonsul Piotrus| talk 03:40, 14 July 2009 (UTC)[reply]

There are companies which use speech recognition software for their phone support services...the user has to answer with words rather than push buttons, to make choices. For simple yes/no answers the software is trained to understand various accents and voices, as well as "okay, yep, that's right" and other common equivalents of the desired responses. For other replies, the software prompts to "say XYZ or ABC". These words are chosen to be hard to misunderstand for another possible choice. The system is "trained" on many voices (and still often doesn't understand the user).- KoolerStill (talk) 09:38, 14 July 2009 (UTC)[reply]
Right, but does it meant that there is or there isn't a piece of software one can use to transcribe 2+ voices without training them? --Piotr Konieczny aka Prokonsul Piotrus| talk 01:17, 16 July 2009 (UTC)[reply]
You mean two voices at the same time? Well, Premiere Pro CS4 has a transcribe tool that is pretty amazing. It can detect multiple voices and will transcribe a separate text for each person. [6] --68.102.170.184 (talk) 12:19, 16 July 2009 (UTC)[reply]

A stupid question about moving a window off the screen in Windows

I recently dragged a window off the screen and cannot access this file as I cannot see it any more. The particular file program in question is the Winamp media player in Windows Vista. I was watching a video clip on Winamp and manually increased the attached video screen to the size of my monitor (I should of pressed F11 but didn't). Now the video portion of Winamp is the size of my monitor and the main GUI is off the screen. If I press the (x) to close the application, it only closes the video part but winamp is still running off screen and reattaching the video makes the whole thing go off screen. I've tried everything and given up. Since Winamp doesn't act like a normal window, the "Cascade Windows" doesn't work. The only solution I have in mind is to reinstall Winamp but is there a better way?-- penubag  (talk) 07:30, 14 July 2009 (UTC)[reply]

Have you tried right-clicking the program icon in the notoifcation area, going to options, and playing with all the window sizing stuff? Maximising/minimising a few times? Ale_Jrbtalk 07:37, 14 July 2009 (UTC)[reply]
My usual method is to right-click the process in the task bar and select "Move". You can then use the arrow keys to move it back on-screen. Another option for Winamp is that it used to save its window position in its .ini file, I think. If you close it, open the file, change the position to 0,0 and then start it back up, that might work too. Indeterminate (talk) 07:45, 14 July 2009 (UTC)[reply]
When those suggestions fail, my last resort has traditionally been to move / resize the window programmatically using the Windows API. The following C++ program:
#include <windows.h>
int main()
{
	HWND h = FindWindowA(0,"Window title");
	SetWindowPos(h,0,0,0,0,0,SWP_NOSIZE);
}
should move the window named "Window title" to the top left corner of the screen. If you do not have a C++ compiler you can use an Excel macro or similar. decltype (talk) 08:11, 14 July 2009 (UTC)[reply]

Ale_jrb and Indeterminate's solutions don't work. The "Move" doesn't work because of the size of the entire window fills up the entire screen so I cannot move it any higher (which is what I need to do to access the GUI at the bottom) the arrow keys and mMaximzing and minimizing don't seem to work either for winamp. I'm not sure which .ini file you're talking about (apparently not the one in the main Winamp folder since that didn't do anything). The mp3 file doesn't have any .ini files attached. Decltype's solution is very interesting however I know nothing at all about C. I have Microsoft Visual C++ 6.0 which is a 1994 version! Vista says it has compatibility problems but maybe I'm just not compiling it correctly. I opened VS and went to "File>New>C++ source file" and entered your above code verbatim and pressed Compile. This is the output:

--------------------Configuration: mover - Win32 Debug--------------------
Compiling...
mover.cpp
C:\Windows\System32\mover.cpp(1) : error C2143: syntax error : missing ';' before '<'
c:\program files\microsoft visual studio\vc98\include\excpt.h(36) : error C2143: syntax error : missing ';' before '{'
c:\program files\microsoft visual studio\vc98\include\excpt.h(36) : error C2447: missing function header (old-style formal list?)
C:\Windows\System32\mover.cpp(7) : warning C4508: 'main' : function should return a value; 'void' return type assumed
C:\Windows\System32\mover.cpp(7) : error C2143: syntax error : missing ';' before '<'
Error executing cl.exe.

mover.obj - 4 error(s), 1 warning(s)

I'm probably missing a step or two. -- penubag  (talk) 08:40, 14 July 2009 (UTC)[reply]

I meant to try using "Move" after closing the full-screen video window. As far as the config file goes, this link describes where to find it and gives an exhaustive list of the options. Note that you need to close winamp before editing it. You can set wx and wy to 0, which should cause it to be in the upper-left corner the next time winamp is opened. Another option is to set "easymove" to 1, which will allow you to move winamp by clicking on any component window (which should include the video window). Good luck. Indeterminate (talk) 10:26, 14 July 2009 (UTC)[reply]
The "missing ';' before '<'" errors are because you pasted in the <syntaxhighlight lang="cpp"> and </syntaxhighlight> along with everything else. That's not C++, it's Wikipedia markup. The "warning C4508" is because Visual C 6.0 wasn't very compliant with the C++ standard (which wasn't even published until 1998). You can work around it by changing int to void. -- BenRG (talk) 15:13, 14 July 2009 (UTC)[reply]
WinAMP does this a lot - they've got "fancy" window behavior, which doesn't always play nice. Here's what you can do, without having to write and compile code:
Windows Key + R   (Or, Start Menu + Run)
winamp            (to start Winamp)
ctrl+D            (command to resize WinAMP window)             
This will usually push the main window back to the main viewable area. Note: do not click the mouse, or do anything else, between calling up winamp and pressing (CTRL+D) - because you need keyboard focus to hold for the invisible (or non-present) WinAMP window. Some other things to try are the built-in winamp keyboard shortcuts (Alt+W, for example, can create and solve the mysterious "Winamp Disappeared But The Music Is Still Playing" feature). Nimur (talk) 22:23, 15 July 2009 (UTC)[reply]
@Interminate: Move doesn't work at all because Winamp doesn't act like a standard window. Bummer :( .
@Ben:Oh I get it now but that didn't work either
@Nimur: Thanks!! It works! I finally got it fixed :) -- penubag  (talk) 06:40, 16 July 2009 (UTC)[reply]

One more solution for you to try: Install Pitaschio (exact spelling, Google it). Amongst the other nice settings it has is an option to force windows to stay within the borders of the screen. I got it via a recommendation on this very RefDesk (for a different problem: making the desktop icons appear as a "list view"). Zunaid 08:53, 16 July 2009 (UTC)[reply]

Thanks for that link! It's really handy! Unfortunately it doesn't work on winamp since it's not a real window. -- penubag  (talk) 10:00, 18 July 2009 (UTC)[reply]

Is there such a thing as password protection in one direction only? I have in mind Apple Disk Image files. I use them to store things I don't want others to gain easy access to. (I use a password.) Trouble is, a password is required just to put things into it. I think it would be more convenient if I could put things into it without having to enter a password. I would still like the added security of the requirement to type a password in order to view or remove anything. Anything like that, or is it impossible? Bus stop (talk) 15:04, 14 July 2009 (UTC)[reply]

Yes, you can do this with public key encryption, using gpg for example. Generate a public/private key pair and protect the private key with a passphrase. Then you can encrypt things using the public key without the passphrase and you will need to enter the passphrase to decrypt them. -- BenRG (talk) 15:19, 14 July 2009 (UTC)[reply]
What you want is some sort of encrypted drop box (a drop box lets anyone put things in it but lets only the owner read it). I would be surprised if there wasn't a program already to do it if you Googled around with that phrase. --98.217.14.211 (talk) 22:44, 14 July 2009 (UTC)[reply]
Thank you for the responses. Bus stop (talk) 21:15, 15 July 2009 (UTC)[reply]

I'm looking for excellent headphones for listening to music WITH a microphone

Hi. I am looking for headphones which are excellent for listening to music but which can also be used for Skype, so it has to have a built-in microphone. The best I have so far found are the so-called "Gaming Headsets" from Creative but they just have one problem: their ear parts are too small!!!! I want to have something like a combination of a headset with BIG ear parts so that it covers but doesn't touch the ear and a headset with a microphone. Can anyone help me? Thank you in advance! --Tilmanb (talk) 15:26, 14 July 2009 (UTC)[reply]

I can vouch for the sound quality of Sennheiser gear. The PC 350 gaming headset appears to meet your criteria; there are other headsets with smaller ear cups. Sennheiser is good (IMO), but pricey. The RRP of the PC350 is apparently $229.95 (Amazon US), although Amazon offers them with $100 discount. Searching Amazon (other online retailers are available) for headphones with microphone produces around-ear headsets from $5.99. I'm not sure where you are based - I've used the US as an example, but I would imagine similar products are available elsewhere. --Kateshortforbob 11:03, 15 July 2009 (UTC)[reply]
Thanks for your answer. I forgot to mention that I don't like behind-the-neck headphones but that it has to be an over-the-head headphone. So the PC 350 looks good otherwise but it seems to be a behind-the-neck model, right? The other Sennheiser models have too small ear cups. Can you suggest which brand or model is the best (has the best audio quality) apart from Sennheiser (as they don't seem to have over-the-neck models)? The Amazon search you mention looks great but I have no clue which model has the best (or good enough) quality. Of course I can judge by the picture whether it fulfills my requirement (big ear cups, microphone, over-the-head), but I'd like to make sure that it is also suitable for (serious) music listening. The $5.99 model LOOKS good but can it be good quality if it is so cheap? The price isn't as important for me at the moment... Thanks again for your help! --Tilmanb (talk) 06:08, 16 July 2009 (UTC) P.S. I am based in three countries: Finland, Germany and Costa Rica. I am intending to use eBay for buying the headphone of my choice.[reply]
Get one of these clip-on microphones, and use it with normal headphones. Best of both worlds. -- Consumed Crustacean (talk) 06:01, 16 July 2009 (UTC)[reply]
Should I really? I have difficulties imagining that a clip-on mic would be as comfortable as a headphone with a pre-built mic. I am really afraid that the clip-in will fall off, be directed the wrong way, face away from me, catch the background noise rather than just my voice, etc... So, unless you can really tell me that I am wrong (for example by showing me good reviews and pictures of working arrangements), I don't like the idea of buying a clip-in. Thanks anyway for the idea! --Tilmanb (talk) 06:13, 16 July 2009 (UTC)[reply]

I just bought a Sennheiser PC350 and I'm using it right now! Strange world we live in. It is EXCELLENT. The sound quality is amazing, and the mic is extremely high quality. if you can afford it, buy it. Also, Plantronics makes some headphones with large headphones. I have them sitting next to me, I used them before I bought my Sennheiser a few days ago =P 68.123.28.58 (talk) 05:57, 19 July 2009 (UTC)[reply]

Hi, the Sennheiser PC350 OTHERWISE looks good, EXCEPT that it is NOT an over-the-head headphone but a behind-the-neck headphone! I definitely require it to be an over-the-head headphone! Can somebody suggest an excellent over-the-head headphone covering the whole ear with a microphone? --Tilmanb (talk) 06:17, 20 July 2009 (UTC)[reply]

Slightly more advanced database

Say I wish to store the animal kingdom family tree in a database (along with top-trumps type information such as length, max age, weight etc), or alternatively I want to store a list of football players, along with individual detailed records for each match they play.

What sort of database program would be up to this - it seemed to be that the common desktop database programs don't really go much beyond a table of values - much like a spreadsheet - am I missing their higher order features, or are they 'just shit'? (excuse my french) 83.100.250.79 (talk) 17:13, 14 July 2009 (UTC)[reply]

Sounds like you're talking about a relational database. However I have no idea what desktop apps help facilitate this. Friday (talk) 17:14, 14 July 2009 (UTC)[reply]
For a relational database there are a number of programs you can use. All require some real time to get to know, and reading up on a few database design tutorials will definitely help out. (My general rule: keep it is as simple as you can. Elaborate, many-linked-table databases are a pain to use, alter, and maintain, and in most cases one doesn't need quite as much flexibility in such an area as one suspects one will.) Standard desktop, user-friendly solutions include Microsoft Access, Filemaker Pro, and the free-but-hard-to-use OpenOffice.org Base. Note that none of these are as easy to use as, say, a word processor or a spreadsheet -- they are not intuitive, they have their own complicated way of doing things, and they will all require substantial investment of time to learn how to use even at all. These provide tools to develop user interfaces that sit on top of relational databases, but because relational databases are very flexible, even with a lot of easy-macroing and things of that nature there is a lot of complexity involved in setting up even something quite simple. I recommend getting a "learn in 7 days" type book for any of these programs before attempting to use them yourself, just to help you get acquainted with them. Another approach is to use MySQL (which has no user interface) as a backend database and to write your own interface using any other language you are comfortable with (PHP does a pretty good job of this, and I know people who have done similar things with Perl). Once you have familiarity with a minimum amount of database theory and the means of making them, a decent home-made database can be constructed quite quickly, but it's a steep learning curve to get to that point. (I say this as someone who has done this sort of work for a decade.) --98.217.14.211 (talk) 17:48, 14 July 2009 (UTC)[reply]
Hypothetically I think I would need
The ability to store multiple data items in a field eg field_subspecies might contain "dog","cat" etc, each with their own database of (mostly) different fields.
It looks like somesort of "pointer to" in a field is necessary too.
Database_model#Hierarchical_model is probably what I need, and it's fairly clear that a relation database can emulate/simulate/be a tree type data base.
I was wondering about "object orientated" concepts as well - since things like inheritence/methods/classes etc might be useful here.
It's already clear to me that this gets complex rapidly, and you might be right about ease of use/access / complexity issues making the whole thing basically inefficient to implement (especially if no money is riding on it!)
I've tinkered with access and base, and it wasn't immediately apparent that they would be able to do a hierarchical model of the sort I might need - can someone confirm that they can/can't (I don't want to spend a lot of time learning only to discover that they are useless to me)83.100.250.79 (talk) 18:17, 14 July 2009 (UTC)[reply]
Specifically I think the most important point is that I could make a database field contain more databases - I suppose this is done by the "keys" described in the article which would be the equivalent of "pointers to other databases" I described above.83.100.250.79 (talk) 18:21, 14 July 2009 (UTC)[reply]
My personal preference for something like this is Filemaker Pro. You can create multiple tables/databases and relate them to one another. I once wrote a maintenance scheduling system for a college motorpool department using FMP. And this was the old version, where each table had to be in a different file! — The Hand That Feeds You:Bite 18:43, 14 July 2009 (UTC)[reply]
It appears that what you mean when you say "database" is what database people call a "table". A database contains many tables. The table can look like a spreadsheet, but doesn't have to. As an example, the database I use every day has one table with a bunch of people's names, birthdates, social security numbers, and stuff like that in it. Another table has an entry for every blood pressure for every patient. Another table has an entry for every prescription for every patient. This allows for freedom of having a person in the people table that does not have a prescription in the prescription table or a person in the people table that has dozens of prescriptions in the prescription table. It is called relational because the person's identifier in the people table is used to relate that person's record there with all that person's records in the blood pressure and prescription tables. -- kainaw 18:49, 14 July 2009 (UTC)[reply]
Yes I don't want to be stuck with a Database_model#Flat_model. However I don't want to be 'pretending' I've got a databases when what I've got is in fact a collation of flat file databases in a computer filing system - ie/eg I would like the database program to be able to open a persons "prescription history" from the "patients list" within the same program - I haven't yet found out how to do this in access. It's the presense or absense of those links I'm interested in - ie I don't want to be the database management program !83.100.250.79 (talk) 19:23, 14 July 2009 (UTC)[reply]
Filemaker Pro sounds quite good
Basically I'm looking for a database that allows a spreadsheet (probably as a specific templated type) to be allowable as a type in a cell (just as integers, text, date etc are allowable types)83.100.250.79 (talk) 19:41, 14 July 2009 (UTC)[reply]
The easiest way to emulate a hierarchical structure in a relational database is to have parent/children fields. Let's say you wanted to do a family tree. It wouldn't actually be efficient to create a new table for each branch of the family, which is what you are suggesting. This would get out of hand and unmanagable very quickly. What you could do, though, is have something like this:
Id Name ChildOf
0 Erasmus Darwin
1 Robert Waring Darwin 0
2 Erasmus Darwin II 0
3 Charles Robert Darwin 1
4 Erasmus Avery Darwin 1
...And so on. This is very simplified but you can see how it works. Charles Robert Darwin is a ChildOf Robert Waring Darwin who is a ChildOf Erasmus Darwin, who is a child of no one. Siblings are identifiable by having the same ChildOf status. Obviously a real family tree requires more fields than this (there are no spouses in this chart) but you can see the gist of things. This sort of structure is much more scalable and easy to deal with than tables-of-tables. With the right user interface you could easily have the above structure mapped onto a simple TreeList control (like a file system).
A relational database can also be used to simulate very flexible structures. Imagine that you have Footballers and each of them has played in an arbitrary (and different) number of Games. The Games information (with fields like the team names, where it was played, the date, the final score, etc.) would be in its own table (Games), the Footballers (with fields like player names, numbers, teams, etc.) would be in their own table (Footballers). Each table would have a list of primary keys uniquely identifying the game and the footballer. A third, intermediary table could then link up footballers to games by collecting their primary keys in one place.
And maybe you'd want a fixed list of Teams for the footballers to be part of; this would be its own table with its own primary key, and the Footballs would have a field that pointed to the primary key of a team in the Teams table.
All of the above structures are very elementary. This is why I suggested a little database theory would go a long way -- thinking about how data works is not terribly difficult but most people are not very natural at it, because they are not familiar with the specific constraints that organized (computer) data requires. A relational database is almost infinitely flexible (though not infinitely efficient) in these sorts of things, but it requires a bit of either experience or poking around before you are going to figure out what the minimal structure it is that you need in order to get it to work the way you want it to. Rest assured, any of the programs I named can do whatever kind of data you want to do—the trick is not finding the "right" program so much as it is in your own understanding of how to efficiently create table structures that hold the data you need. Hope this of some use. Again, as you report with Access, it is not at all clear when you first start how to make this programs really do what you want them to do—I heavily, heavily suggest getting a simple "learn databases in 7 days" sort of book and working through it. You cannot just walk into database programming and expect it to make sense without some sort of basic guidance. --98.217.14.211 (talk) 22:27, 14 July 2009 (UTC)[reply]
Your footballer/games example is exactly the sort of thing I was looking for - but so far in both access and base I've not been able to find any real way of doing this - I was at least expecting an abstracr pointer type (key) but I found no such thing. I'll keep trying.83.100.250.79 (talk) 20:42, 15 July 2009 (UTC)[reply]
Relational databases are able to store hierarchical data easily, but the problem arises when there is a huge amount of complex hierarchical data - the time taken to read and collate this information into meaningful reports using SQL queries can be quite restrictive. However, I'm assuming you're not going to have large amounts (millions of rows) of data. I wouldn't use Access for anything other than simple, small relational tables and joins. Use something that uses some sort of ANSI SQL. Oracle would be ideal, but there are any number of 'free' SQL RDBMS's out there. MySQL and Firebird are some that come to mind, or even cheaper single-user licences of Oracle or SQL Server. Alternatively, if you really want to start with an architecture more suited to handling hierarchical data, then something XML based might be the way to do. Sandman30s (talk) 08:30, 15 July 2009 (UTC)[reply]

Thanks. Actually the data is v. large, and intinsically hierarchical - so I wouldn't dream of attempting to store in in one massive 'spreadsheet' with relational pointers - in general most querys would be of small mostly intrinsically self contained data sets, so I would expect to be able to set up relational links between different files - I'll assume that's all possible with standard programs. (There could be statistical analysis of the whole set - which as the above rightly points out - would be time consuming, and potentially problematic) I don't need to worry about 'circular relational links' - which I expect is an advanced topic. I'll have a try and maybe ask another question later on.83.100.250.79 (talk) 18:04, 15 July 2009 (UTC)[reply]

Oh, and thanks everyone who responded - I really expected a very short and quick answer, but people did a whole lot of typing. Cheers ! :) 83.100.250.79 (talk) 21:19, 15 July 2009 (UTC)[reply]

I find it very unlikely that you really do need some sort of radically different database structure than a well-thought-out relational database. Consider that Wikipedia is essentially just a very large relational database, as is probably every other dynamic site you use on the Internet. The trick is learning how to think in terms of relational databases and the languages used to manipulate them (e.g., SQL can understand that tables are linked to other tables quite readily, but it takes time to learn how to create complex SQL queries). Again, I recommend getting some sort of book on it. Database programming is not intuitive and requires a little disciplined study if you want to avoid just wasting a lot of your time on schemes that won't work. (You're free to do as you please, of course, but I speak from experience! I deal with a lot of people who decide one day, "I need a database!" and try to do it from scratch, only to find out six months later that really they have no idea what they are doing and their work has produced nothing.) --98.217.14.211 (talk) 16:48, 16 July 2009 (UTC)[reply]
You have sort of hit the nail on the head - in that nobody wants to start from scratch when a solution exists
- one thing I wonder is about browsability - specifically for an end user - not an expert database designer - eg will an end user be able to simply browse the database in a way that would be easily learn - ie probably using paradigms inherited from the internet - such as hyperlinks between data bases - eg suppose one set of data is "Mammals", and contains amongst other things a list of mammal families eg dogs, cats, cows etc. Will a given database program allow me to create a database that a non expert user can "browse" - eg expanding or switching to a "cows" database by clicking in some way on the "cows" field in "mammals". My first guess is that I'd need to implement the equivalent of a 'hyperlink' on fields in "report" or "query" mode, and have each sub-database identified by type (ie order,family,species,subspecies etc), with a record/query template for each type. Does that sound do-able?83.100.250.79 (talk) 18:00, 16 July 2009 (UTC)[reply]
Or to put it another way - do these 'databases programs' actually support end-user access - or is it expected that the programmer write their own display routines using the windows API or whatever, search the actual database using SQL queries, and in fact only use the database program eg 'base'/'access' to create the database??83.100.250.79 (talk) 18:18, 16 July 2009 (UTC)[reply]
Maybe there is a different set of software programs addressing the problem of end user accessibility - do these 'database browsers' have a name?
After reading through this, it appears that the questioner simply has not discovered how to make foreign keys in Access. Make the key field in one table. I will assume it is an integer. Add a field to another table using the same type (integer). Now, go to the relations field. Use the mouse to drag the ID field of the first table to the key field on the other table. A line will appear that indicates you've created a foreign key. Now, you can easily create reports and queries that map data from one table to the other using the foreign key. -- kainaw 16:58, 16 July 2009 (UTC)[reply]
Yes that's useful information for me. It's a relief to know they can do relational stuff - however I have another question about browsability for non-expert users. (see 2 paragraphs above)83.100.250.79 (talk) 18:00, 16 July 2009 (UTC)[reply]
Thanks, again, I finally found the relationship manager screen - those db designers certainly know how to keep anything actually useful well hidden!83.100.250.79 (talk) 20:11, 16 July 2009 (UTC)[reply]

Finding ip address in php

I'm trying to find the ip address of people who visit a web site using php, but all I'm getting is addresses like "hsd1.co.comcast.net" and not the actual ip address. The script is this:

I'm extremely new to php, and I would be so greatful if someone could look over this and tell me what I need to do. Thanks so much! —Preceding unsigned comment added by 82.43.91.128 (talk) 18:53, 14 July 2009 (UTC)[reply]

gethostbyname 87.114.25.180 (talk) 19:21, 14 July 2009 (UTC)[reply]
Thanks, but I'm utterly clueless what to do with that lol. If it's not too much to ask, could you modify the code I posted above to include the new function in the correct way. Thanks so much! :) —Preceding unsigned comment added by 82.43.91.128 (talk) 20:22, 14 July 2009 (UTC)[reply]

wow this script is fantastic. Thank you for this.! but to get the ip address of people that visit your site you just need this part. That is it.

$_SERVER['REMOTE_ADDR']

to test this, visit any page you are creating with this:

$ip=$_SERVER['REMOTE_ADDR'];
print $ip;

It will display your ip address, if someone else visits it will display theirs. Now your issue is storing this information. you will need to know SQL to do this. create a table and store the values in it or use a flatfile. Ivtv (talk) 21:26, 14 July 2009 (UTC)[reply]

Thanks guys! I worked out what the problem was by removing "gethostbyaddr" from
$host = gethostbyaddr($_SERVER["REMOTE_ADDR"]);
so it's now just
$host = ($_SERVER["REMOTE_ADDR"]);
Again, thanks! —Preceding unsigned comment added by 82.43.91.128 (talk) 23:03, 14 July 2009 (UTC)[reply]

weather radar netherlands android G1 phones

Does anyone know of an android G1 app that currently gives weather radar in the Netherlands. I've installed imap Weather on the phone, but it doesn't seem to have radar and the website suggests that it has radar only in the US at this point. Thanks if you can help. —Preceding unsigned comment added by 83.98.238.113 (talk) 21:33, 14 July 2009 (UTC)[reply]

July 15

Linux server. How To.

Ok, I am thinking on renting a server from host provider the planet. They are going to give me 2 500 gig drives. At first I never saw the need for a secondary drive because I really am not sure how to navigate with a linux OS on a server. I have used Cpanel and know it well which I will be getting. So, I realized I can use the secondary drive as a backup of my database and www directory. Or entire root directory for that matter. Ok, now my question...Is there anything in cpanel I can click, or a command I can use to make sure that my mysql database and my directory is backed up to the other drive? It will be a dedicated box with root access.

I know I am better off asking someone on a tech forum. But im at work and all that is blocked. its more of a general question because it will be a bit before I get the server anyway. Ivtv (talk) 00:03, 15 July 2009 (UTC)[reply]

I strongly suspect you are getting 2 identical drives to set up RAID 1. Both drives will contain identical information. If one fails, the other still has valid data. That is a very common form of backup as it is handled by the drive controller and no software configuration in the operating system is required. As for navigating in Linux, forget the concept of drives. That is so Windows. In Linux, you have a root mountpoint. That is where you start from and it doesn't matter what drive it is on. All directories/folders are mounted somewhere under root. So, you don't jump from drive to drive. You just change from one directory to another and, if that directory is mounted on a different drive, it just happens automatically. It is also common to mount directories from one computer on another computer. For example, I have my computer's drive and I mount my personal fileserver, my work fileserver, my webserver, and my backup server as folders in my home directory. I can move, copy, edit files on any of those computers as though they are local since they are mounted right in my home directory. -- kainaw 00:37, 15 July 2009 (UTC)[reply]

well that is good news. yeah, I dabbled with Knoppix and Ubuntu back a few times so I have an idea on how linux works but forgot about the mounting jazz. Ill have to ask for a raid 1 configuration then if it is not default which now i am assuming it is. I would like some type of offline backup somewhere tho. For example, if users on my site decide to destroy a table or something I would not want the destroyed data to be mirrored on drive 2. I would want to go to drive 2 to get the data. you have given me some answers and I am thankful for that. Going to be awhile till i get the hardware. Thanks! Ivtv (talk) 01:18, 15 July 2009 (UTC)[reply]

I use rdiff-backup for offsite backup. It saves the changes so you can get back an old version of a file (even a deleted file). -- kainaw 01:19, 15 July 2009 (UTC)[reply]

SSH for mobile phones

My son tossed my phone in the pool so I now have a smart phone. I like having email on the go, but 99% of my non-spam email is a request to fix a problem on a server. I need SSH for that. I've been searching (I even called Verizon support), but I cannot find an SSH app for cell phones. Does one exist? If I can find one, I can probably get from there to one that I can force to install and run on my phone. -- kainaw 00:39, 15 July 2009 (UTC)[reply]

This is a long shot, but since you took the time to help me I thought I would return the favor. I personally had a look here: http://download.cnet.com/TouchTerm-SSH/3000-2352_4-10914575.html and my co worker stated look for a program called Token2Shell. Maybe you already looked, but I thought I would give it a go for you. Ivtv (talk) 02:13, 15 July 2009 (UTC)[reply]
What phone/platform is it? If it's Windows Mobile you can use PocketPuTTY which I find works quite well, the only real problem is the limited screen space, but that's more the phones fault than the application. ZX81 talk 02:55, 15 July 2009 (UTC)[reply]
I've never tried it, but MidpSSH is a Java/J2ME ssh client for mobile devices. Indeterminate (talk) 04:41, 15 July 2009 (UTC)[reply]
You never mentioned what kind of smart phone this is. Since you're on Verizon I guess you're not using an iPhone, but the iphone does have a few ssh clients out there, and one of them is free. Shadowjams (talk) 05:17, 15 July 2009 (UTC)[reply]
Shell in a Box exports a command line to a standard web browser using AJAX. It works pretty well. --Sean 13:57, 15 July 2009 (UTC)[reply]
Thanks all. I'm going to use the free iPhone one's source to make one for my phone. It shouldn't be nearly as hard as messing with Thunderbird to get it working on the dumb thing. -- kainaw 13:59, 15 July 2009 (UTC)[reply]

Best Way to Protect File

What would be the best way to protect a .doc or .odt file from other people viewing it even if they get a hold of it? I know that Word and Open Office both have password services, but how secure are these methods? Nkot (talk) 03:53, 15 July 2009 (UTC)[reply]

Their methods are usually as secure as your password. You can also use programs like winrar or winzip to compress the file and add a password to it as well. I have never dabbled with open office or word password crackers but you can get around winrar ones if your password is something simple like a dictionary word. But a password like "hE$8*9_+=!!~389jHU**&@#$" needs more computing power to crack then something like the password "JamaCa1". You can also get thumb drives that have passwords on them as well. So, technically you could go with a password for the file, password for the .rar or .zip and a password for the drive it is being stored on. Just do not forget these passwords and make them secure and at least 10 alpha/character/numeric strings Ivtv (talk) 04:40, 15 July 2009 (UTC)[reply]

Both Open Office and Word have a standardized encryption format, that if I remember right uses RC4. As the previous commenter says, they are only as good as your password, which should not be a dictionary word, and should be more than 8 characters, a combination of upper and lower case, and perhaps numbers and punctuation.
I don't think there are any public vulnerabilities in the most recent versions of these standards, but I haven't looked, and can't be sure. If you are really looking for single file encryption, there are a lot of programs out there for you. PGP and its implementations are obvious answers, but also check out List of encrypting file systems for other ideas. With these sorts of things you should always keep in mind that there is the issue of the encryption algorithm itself, (RC4, for instance, is still a very good method. it's held up well and although there are some small, academic issues with pieces of it, none of those translate to a vulnerability right now), and the system that implements it. It's this second part that gets most people in trouble. Could be a bad implementation, virus on the computer, weak password, etc. Shadowjams (talk) 05:15, 15 July 2009 (UTC)[reply]
The latest version of Word uses AES-128,[citation needed] and I'm not aware of any attacks. decltype (talk) 16:25, 15 July 2009 (UTC)[reply]
The password-protected Microsoft Office format does pretty strong encryption already. But, your best and most secure option is to wrap the .doc file in an encrypted archive with an unintelligible filename. By denying the viewer any information about the file-type and contents, they will have no starting point for decryption, and will essentially be reduced to brute-force guessing at decryption algorithms and passwords. (Knowing that the file is a MS Word .doc gives them a hint about what decryption method you used - and then they must only guess your password). Note that password-protection is not identical to encryption - you definitely want an encrypted archive file, so that the contents are unreadable. The ultimate question is, to what extent must you protect this data; and how much inconvenience are you willing to put up with when you want to legitimately open or edit the file? You can take data-security to an extreme; perform high-grade software encryption, and then store the encrypted data-bits on some obscure physical media (e.g. modulating the paint on toothpicks in a box that is locked in a safe inside of a secure facility). Attempting to decode this would be a pain; the information-per-volume is atrocious; but it would probably be impossible to brute-force attack, and would almost certainly be tamper-evident if anybody even tried to decrypt it at all. Nimur (talk) 22:35, 15 July 2009 (UTC)[reply]

Custom animation in powerpoint

Is there a way to REMOVE all the custom animations(from all the slides) at once in MS powerpoint 2003?Shraktu (talk) 05:12, 15 July 2009 (UTC)[reply]

Yes, but its not obvious ! In the Slide Show menu select Animation Schemes ... which displays a list of pre-canned animation schemes. Select a scheme from the Animation Schemes list - "Appear", for example - and click on Apply to All Slides. This overwrites any custom animation in all slides with the selected animation scheme. Then select "No Animation" in the Animation Schemes list and again click on Apply to All Slides. This removes all animation from all slides. Gandalf61 (talk) 11:14, 15 July 2009 (UTC)[reply]

Internet connection farts out

I've noticed this at home with both DSL and Cable modem, and a couple times at work (Fiber Optic). But sometimes it's like the entire net is dead. The throughput meters on my computer show 0Kb/s. Even when I have several webpages trying to load. And then all of a sudden (usually 30 seconds or more of no traffic), everything downloads at full speed. The fact that it has happened on different types of connections at different locations makes me think it's something more than just my computer. --68.102.170.184 (talk) 13:48, 15 July 2009 (UTC)[reply]

This is not normal behavior. I suspect that the cause of your seeing this on multiple machines might be a piece of software that you run on all your machines. It might not be network related, either; it might be that the software sometimes maxes out your CPU, which becomes 100% tasked for 30 seconds or so; does the Task Manager indicate anything like this? What happens if you quit Outlook and all the programs running in the system tray, and just run a browser? Tempshill (talk) 16:03, 15 July 2009 (UTC)[reply]
Tried not running the throughput meter? 98.14.223.143 (talk) 20:17, 15 July 2009 (UTC)[reply]


Try safemode /w networking Ivtv (talk) 21:23, 15 July 2009 (UTC)[reply]

Sorry, my Core 2 Duo stays pretty idle (around 8%) during the "blackout" phase. I'm on a Mac, but when I run Activity Monitor, there aren't any processes gobbling up RAM or CPU cycles. There's no VM thrashing. The computer is perfectly responsive -- except the network activity just farts out. (again, multiple machines, multiple browsers, multiple locations, both WPA2 WiFi and hardwired (DSL, Cable, Fiber Optic.) It's like the internet doesn't exist for 15-60 seconds and then it's back. --68.102.170.184 (talk) 12:15, 16 July 2009 (UTC)[reply]
So this happens with any type of internet connection you use, but just on this particular laptop? I can assure you that there is no such thing as "the internet doesn't exist", so in this case I can say without hesitation that there is something wrong with *your* computer. Are you sure that you are experiencing the same thing with both ethernet and wi-fi? Macs (in my experience) hare extremely fickle about wi-fi unless you happen to be connecting to an AirPort. In addition, the evidence of the problem you are looking for is probably in /var/log... --Jmeden2000 (talk) 17:02, 16 July 2009 (UTC)[reply]
Assuming they aren't jet setting around the planet you could assume that this is happening in a fairly localised location - there's more to the internet than just 'your computer' - if you think about it..83.100.250.79 (talk) 17:46, 16 July 2009 (UTC)[reply]
Happens a lot to normal people - I'd guess a problem at the local exchange. Question can you disconnect the connection, then reconnect, then try accessing the internet - does this give a short burst of activity followed by snail-net? 83.100.250.79 (talk) 17:44, 16 July 2009 (UTC)[reply]
I'm sorry if I wasn't clear. This happens on all sorts of Mac computers at work and home. Laptops, towers, iMacs. Is it possible whatever backbone my area is connected to winks out or can't handle all the traffic (I work less than 5 minutes from my home, so they could be on the same trunk... or whatever you call it) --70.167.58.6 (talk) 00:15, 17 July 2009 (UTC)[reply]
It's worth asking - if possible (though it may not prove anything if negative) - does the same happen on windows/linux etc.?
It does sound like some-sort of bandwidth throttling on the surface, which may not be intentional, though other things (such as the macs itself could be the problem) (I have had vaguely similar experiences on windows - from year to year the connection sometimes seems to be crap for weeks, then fine for months...???)83.100.250.79 (talk) 01:07, 17 July 2009 (UTC)[reply]

Computer chassis of sisal?

How likely do you think it is that a small computer which makes a computer case made of water-proofed sisal woven over a frame, will be adopted by major computer companies like Dell and HP? N.B. sisal would save energy by allowing heat to escape. (Cross-posted to science board) --Patar knight - chat/contributions 17:42, 15 July 2009 (UTC)[reply]

Like it says at the top of the page: The reference desk does not answer requests for opinions or predictions about future events so I'm afraid you won't find an answer here and I'd recommend trying a forum instead. ZX81 talk 18:12, 15 July 2009 (UTC)[reply]
The theory is that this would allow us to use less fans? I don't buy it. Computers with their cases left entirely open are fully capable of overheating. It's not enough to "let the heat escape". You need to actively get rid of it. A well designed case with properly installed fans acts sort of like a wind tunnel, blowing the air right past the areas most likely to overheat. APL (talk) 18:46, 15 July 2009 (UTC)[reply]
The concept is workable (although most concepts are) - I'll give you an opinion : chance of adoption my major computer manufacturers = 0.
However chance of case using sisal fibres as a reinforcing agent is greater than 0
How about a bamboo case - they exist?83.100.250.79 (talk) 20:45, 15 July 2009 (UTC)[reply]


Try stop creating the heat in the first place :) Ivtv (talk) 21:49, 15 July 2009 (UTC)[reply]

We're already trying! It's just a lot harder than you might realize... Nimur (talk) 22:41, 15 July 2009 (UTC) [reply]

If you have a question that covers more than one desk can you redirect to just one of them - like this:

see WP:RD/S#Computer_chassis_of_sisal? 83.100.250.79 (talk) 22:45, 15 July 2009 (UTC)[reply]

Or rather, link them to the science desk instead of the science page. --antilivedT | C | G 06:10, 17 July 2009 (UTC)[reply]

Cell phone recharging contact erosion

I don't know what the part is called, but it's the port on the cellular phone into which you plug the non-transformer end of the charging cable into. It looks gold-plated to this ignorant user, but it's also been eroded, so much so that I'm have real problems recharging the phone. The charging cable is not at fault because other phones have no trouble with it. How much will a repair like this cost? 98.14.223.143 (talk) 20:15, 15 July 2009 (UTC)[reply]

The price of a phone Ivtv (talk) 21:12, 15 July 2009 (UTC)[reply]

Unfortunately, Ivtv's brief statement is probably correct. Modern cellular phones (along with most other mass-produced electronics) have few serviceable parts; very rarely do any distributors stock replacement parts; and technicians are rarely trained in (even simple) hardware repair. Hiring a specialist to perform a custom repair-job with custom-ordered parts would probably be much more expensive than replacing the phone. Nimur (talk) 23:11, 15 July 2009 (UTC)[reply]
I would try cleaning the contacts with alcohol, as a patina can build up on them (particularly if one lives in a humid clime). It's pretty rare for the gold contacts to wear all the way down such that they are entirely unserviceable; if this really is the case, Nimur is right - a fix is generally cost ineffective. -- Finlay McWalter | Talk 02:20, 16 July 2009 (UTC)[reply]
Lots of people use erasers for cleaning corroded electrical contacts. I first heard of it being used with the contacts on sticks of RAM, where it works pretty well. Anyway, yeah, if it's corrosion you can clean it off with baking soda or a pencil eraser, but if the plating is worn off, you probably need a new one. Indeterminate (talk) 06:16, 16 July 2009 (UTC)[reply]

Existence+

Hi guys,

Look: I'm having some more trouble with existence+. I saw my friend the other day and he was hurt pretty bad. He was all bloody.

Anyway, I don't want to "destroy" anything. I want to represent what the FUCK I want to show to the user and let HIM show me whatever.

;kjfbgkdfb (talk) 21:43, 15 July 2009 (UTC)[reply]

Wikipedia Reference Desk cannot provide psychological counseling or medical advice. Perhaps you should talk to your doctor about your concerns. Edison (talk) 21:46, 15 July 2009 (UTC)[reply]
[7] - yeah can you lose the riddles seriously - because any questions you have are just going to get deleted as nonsense aren't they. —Preceding unsigned comment added by 83.100.250.79 (talk) 22:43, 15 July 2009 (UTC)[reply]


Is there a computing question buried in there? Was this question entirely incomprehensible to everybody else? I can't find anything related to "existence+" as a software package or anything. Is it maybe a question about a user-interface? Nimur (talk) 22:46, 15 July 2009 (UTC)[reply]
I think C++ programming has sent someone insane.. (I know the feeling) Try pascal instead ";kjfbgkdfb" .Good luck.83.100.250.79 (talk) 22:58, 15 July 2009 (UTC)[reply]
Pity...He could have learned java... Nimur (talk) 23:03, 15 July 2009 (UTC)[reply]

July 16

Sniffing BitTorrent Traffic

If I am using BitTorrent (Azuereus client) to download movies, will someone, say an ISP or a hacker, be able to sniff or find out the content of my traffic and hence, know what movies I am downloading? Acceptable (talk) 00:35, 16 July 2009 (UTC)[reply]

yes, this is very easy to do with each client. If you look at the piece graph/information of each torrent it will list your IP and anyone elses that is uploading/downloading. No need to packet sniff. it is public info Ivtv (talk) 01:43, 16 July 2009 (UTC)[reply]

This is true if the ISP/Hacker is taking part in the file upload/download. What about others who are not taking part in this way (such as the ISP providing internet access to the user)? --Jwoodger (talk) 03:14, 16 July 2009 (UTC)[reply]

Any user can see this data. It is clear on any client. I use BitComet and Under your tasks there are menu's you can click. One menu, I forget the name at the moment because I am at work you can see every IP attached to the torrent either uploading or downloading and how much of the torrent you have accumulated and your upload/download speed. It is out there in the open. Then, if you really wanted too you can take those IP's and do a whois to determine what ISP it is attached too. The short of it, when you download or upload via torrents, your IP is CLEARLY visible.

edit: Ok, I think I mis read your question. To re-answer it, Anyone that is using a TORRENT program that has the same torrent as you can see your IP on it. so if you are downloading show X, and someone else is downloading show X, they can see in the ip list your ip and you can see theirs. But if you were downloading show X and they were downloading show Y, they cannot. Your ISP, if they wanted too(even tho it is illigal) can record what you are doing while you are using their service. Also, I know that when you download a torrent your ip can be stored somewhere. So, if people wanted too they could gain access to the information you are worried about

Ivtv (talk) 04:37, 16 July 2009 (UTC)[reply]

Basically, if you don't want your ISP (or hackers, although that's unlikely anyway) to be able to view anything you're doing on the internet, you need to use some sort of encryption. Most secure websites (like banks and such) use SSL/TLS. BitTorrent clients, for the most part, don't have any kind of encryption. It would slow down your downloads, and all the other peers would have to support the same kinds of encryption. The pirate bay guys were trying to make an encrypted network with IPREDator, but it's still beta-invite-only. So, yeah, until something better comes along, anyone who can intercept your traffic can tell how much porn you download. Or whatever. :) Indeterminate (talk) 06:07, 16 July 2009 (UTC)[reply]
At least µTorrent supports protocol encryption and it's possible to set it enabled or forced. In the forced-mode it'll only connect to peers with encryption enabled. The torrent-files themselves aren't encrypted (unless you download it from a https server). Thykka (talk) 13:20, 16 July 2009 (UTC)[reply]
Note that as the internet transitions to network switches instead of network hubs over more of the hops, "fewer" people can intercept your traffic. This does not mean "zero" people can intercept your traffic; especially if you do not trust the ISPs to respect the privacy of your data. As a general rule, you can not be certain which network(s) your data will traverse when you connect to the internet, so you must assume that it is possible for some untrustworthy third-party to intercept your data. Nimur (talk) 09:16, 16 July 2009 (UTC)[reply]
How does protocol encryption help? The way your ISP will find out what you're downloading is when the copyright holder (or the FBI, depending) logs onto the torrent themselves and saves the list of peers. You can encrypt your packets all you like, but that won't stop them from getting a list of everyone who has downloaded a particular contraband file. APL (talk) 15:28, 16 July 2009 (UTC)[reply]
APL, that's a valid consideration. With modern encryption (properly implemented), we can "guarantee" that no third-party can eavesdrop. However, as APL points out, the fallacy with peer-to-peer networks is that the "second" party (whomever you are connecting to) is an unknown individual - so it is technically meaningless to verify that you have a secure connection to an anonymous recipient. Nonetheless, this is a totally different class of network eavesdropping (in both the technical and the legal sense). Encrypting the protocol categorically denies eavesdropping capability to anybody who is not an active participant in the transmission. (This may actually be beneficial, from a legal point of view, because it forces the eavesdropper to actively participate in a protocol connection. In some jurisdictions, this can implicitly bind all parties to certain terms of service, etc., etc., and certain obtained evidence may be inadmissible in court, etc, etc. Of course, your local jurisdiction may vary and Wikipedia can not give legal advice. Nimur (talk) 18:38, 16 July 2009 (UTC)[reply]
I'd just like to point out, to the 'at least uTorrent' comment, that the main protocol encryption used was developed between the uTorrent and Azureus Inc. people, way back when. Azureus/Vuze also has the very same 'force encryption' modes, with at least two different encryption methods.
On topic: a third party, not part of a particular torrent's swarm, would have a somewhat hard time figuring out what you were transferring with even plaintext encryption on. RC4 is a wee bit more effective, though (somewhat effective shaping tools don't really care though, BitTorrent traffic is somewhat easy to spot). Also, remember that the encryption is only on the protocol headers, not on any of the piece data! Washii (talk) 10:24, 18 July 2009 (UTC)[reply]

Playstation/PC

Kind of a dumb question... I recently bought a Playstation I game, and rather than drag out the Playstation my roommate has, I was hoping to play it on my PC. I run Ubuntu and have PCSX. However, my computer couldn't even mount the CD, quite possibly due to the black underside. Is there a way around this? I could just try to download the ROM from the internet I suppose, ha ha, suggestions? Magog the Ogre (talk) 03:07, 16 July 2009 (UTC)[reply]

You tried to mount the disk through the emulation software correct? I've never been able to mount the disk in the traditional windows way of clicking on it in "My Computer" (Or the Linux way, for that matter), but doing it through the emulator software worked just fine.
Failing that, it could be a problem with your CD drive. I know that Playstations with slightly "misaligned" laser assemblies will sometimes read silver disks but not black ones, or vice-versa.
Incidentally, In my opinion a lot of PlayStation 1 games look a LOT better on an emulator than they do on hardware. It's amazing the difference you get drawing the exact same geometry on a modern PC video card. I was disappointed when I discovered that the PS3's emulator didn't work like that. APL (talk) 05:47, 16 July 2009 (UTC)[reply]
Thanks all, you were right APL; I had to download a BIOS from the internet, and it opened, though it appears this game is not running correctly, and unfortunately I must drag out the old PS1 beast itself. Magog the Ogre (talk) 11:41, 16 July 2009 (UTC)[reply]

SATA hard disk for a 2006 MacBook

Hey guys, I have not been here for a while now ... I guess things have changed ...

I have a question, I habe a 60 GB hard disk on my 2006 MacBook and I am considering getting a bigger alternative. How does this http://www.amazon.com/Western-Digital-Scorpio-Drive-WD2500BEVS/dp/B000SIG5QW/ref=sr_1_3?ie=UTF8&s=electronics&qid=1247714298&sr=8-3 look? I don't think I need to get much bigger than this ... any suggestions? How about the price? Please respond ... :) Kushal (talk) 03:25, 16 July 2009 (UTC)[reply]

At 5400rpm, it might be a little slow, but it shouldn't be too bad. And that price is pretty good, those drives usually go for about $90. I did about the same kind of upgrade on my laptop (40gb -> 250gb) and it totally gave new life to my old laptop. Indeterminate (talk) 05:58, 16 July 2009 (UTC)[reply]
Thank you for your quick response, Indeterminate. I already have a 5400 rpm HDD (60GB 5400-rpm Serial ATA - http://support.apple.com/kb/SP31). It might be worth mentioning the model number is MA254LL/A. One more question, is there any reason I should get a SATA 3 Gbit/s instead? Will it even work? Thanks. Kushal (talk) 14:53, 16 July 2009 (UTC)[reply]
Well, it'll be faster. :) But yeah, if your laptop is 3 years old, it might actually not be faster - it might fall back to 1.5gbps. If there's a big price difference, I wouldn't bother, but it's your call. Indeterminate (talk) 23:57, 16 July 2009 (UTC)[reply]
The price difference is not that great. and perhaps I could reuse the newer drive (hopefully I don't have to) later on. Thanks a lot. Now the only question is the disk size ...I wonder if 320 GB will be big eno.. Kushal (talk) 14:28, 18 July 2009 (UTC)ugh. .[reply]

i think my memory card reader is disabled

i think my memory card reader is disabled (the thing that you put SD cards in). is there a way to re-enable it? it worked fine before I did a system restore, now it doesn't recognize any SD cards and doesn't show up in "My Computer".--Drawngray19 (talk) 12:48, 16 July 2009 (UTC)[reply]

Go to the Device manager it may be that that piece of hardware has been disabled. Here's a guide on how to get to it if you don't know how to (http://pcsupport.about.com/od/tipstricks/f/finddevmngr.htm). ny156uk (talk) 17:52, 16 July 2009 (UTC)[reply]

i was looking there already, but i can't seem to find anything that says "memory card reader" or "5-in-1 reader" so i dont know what to do.--Drawngray19 (talk) 15:50, 17 July 2009 (UTC)[reply]

network adapters??

how do i find which network adapter i have in my computer (ie. wireless)?? and which driver do i install to make "airopeek" work on my computer??

sushil —Preceding unsigned comment added by Sushil shenoy (talkcontribs) 13:38, 16 July 2009 (UTC)[reply]

I have never used Airopeek, but to find out about your network adapter, first open the Device Manager and then click "Network adapters". You didn't tell us what OS you are running on your computer, so for instructions on how to access the Device Manager, I'll refer you to our Device Manager article. Tempshill (talk) 16:08, 16 July 2009 (UTC)[reply]


i run on win xp !! simply the best !!

Sending huge files as time intervals

Is it true that if we had virtually zero latency across networks, we could send arbitrarily large files almost instantaneously? If we converted the binary value of the file into a number, x, and then sent two pings to another computer, x miliseconds apart, the other computer should be able to create the original file, right? (Idea from Dinosaur comics).

Even if x were very, very large, couldn't we compress it even further, by taking factors of that number and sending those factors all at the same time? Say for instance the factors of x were y and z. We could send the transmission like so:

ping!----[y]----ping!
  pong!--------[z]-------pong!


So we should be able to send any number, no matter how large, in a very short time, with enough factors, right?

Obviously, we don't have zero latency. But we could have some known time slice that was large enough that both computers could be sure they would both measure accurately, say "number of half-seconds" between the two pings. Two computers on the same network should at least get that kind of accuracy. Then if you broke down the factors so they were small enough, each one would only be a few "half-seconds."

Are people already using this kind of compression?

— Sam 14:00, 16 July 2009 (UTC)


Comment : Why are you factoring the numbers? That's an expensive operation. Why not just break the file up into chunks of some number of bytes in the traditional way? APL (talk) 14:13, 16 July 2009 (UTC)[reply]
Or that. I just figured factoring would allow the number to be broken into even smaller chunks, but I don't know which would be more efficient. Point being, either way you could break a large number down into many smaller ones and just send those smaller ones as very short time intervals, all at the same time (or very slightly offset). Would that work, and does it already exist? — Sam 14:30, 16 July 2009 (UTC)
Your factoring is nothing more than a form of data compression. You are using a well-defined method to take a large data item and represent it as a small data item (two or more factors). So, you are asking: "Can we use data compression to transfer large files over a network faster than sending the large file itself?" Yes. It is used all the time. Most large files are compressed in some fashion before being transferred over a network. There are also programs for some slower networks that compress all traffic on one and and decompress it on the other. -- kainaw 14:34, 16 July 2009 (UTC)[reply]
Using time intervals between pings is not a practical method of compression. Here's why. Let's assume we chop a document into kilobit chunks and turn each chunk into a binary number between 0 and 21000. Half of these numbers will have a 1 in the most significant place, so average value is about 2999 (give or take 1). Some of the numbers will be prime numbers, for which factorisation will not help. So at least some of the time intervals involved will be of the order of 2999 time slices which is 2998 seconds. Turn this into years, then compare it with the age of the universe.
Now you could refine the method by using smaller chunks, which makes the average time intervals shorter. Ultimately, you can use a separate pair of pings for each bit - say half a second apart for 0, one second apart for 1. Then what you have done is reinvent Morse code. Gandalf61 (talk) 14:46, 16 July 2009 (UTC)[reply]
This is why I was suggesting taking factors, and not just chopping up the number. Say we were sending a kilobit. That would be a number in the order of 21000, right? So if we take the hundreth root of that, we get 1024, So if we sent out a hundred pings in a row, and sent a hundred pings again 1024 ms later, then that would be read as 1024100 = 21000. Now obviously I'm seeing that this is silly, since it should take much less than 1024 ms to send one kilobit of data. Is there any case where this might be useful? If the clocks were so synchronized that they could count the nanoseconds accurately, say, then 1024 ns would actually be very fast, right? And it would always be able to send the kilobit in 1024 ns no matter what the speed of the network (or rather, 1024 ns + initial latency) if the computers could confidently measure the time interval. No? (Well, I guess there are a lot of hypotheticals in that last thought, so I guess we're in hypothetical land now...) — Sam

63.138.152.238 (talk) 15:15, 16 July 2009 (UTC)[reply]

If such reliable clocks could be synchronized, they could be used for transmitting data directly. The flaw here is that the bit-rate is actually very low on the average. Assuming a uniformly random distribution of numbers to be sent, ranging from 0 to N, you need an average of N/2 symbols. It "seems" like you are sending very little information, ("two bits"), but in fact you are simultaneously sending "no information" (... zero-value bits) for the entire intermediate time interval. This must be counted as part of your coding scheme (because if you sent anything in the intermediate time, you would change the transmitted message). Like all perpetual-compression-schemes, this method cannot and will not violate the Shannon information theorem - the data transmission rate can be no faster than half the Nyquist-rate. You might be interested in other methods, like CDMA, PSK, and the like - these use chipping or symbol coding by methods other than "binary bit" - but in the same sense, they always must be limited by Nyquist criteria. (The Computer Scientist can invent whatever coding method he wants, but when he passes it off to the Electrical Engineer, it must have a hardware manifestation which is invariably going to be bound by certain physical law)... Nimur (talk) 18:50, 16 July 2009 (UTC)[reply]
If you have nanosecond accuracy in the timing of when you can send signals out on the wire, you're likely to have at least a 1 bit/ns throughput. That is, as you count off the nanoseconds, you can monitor the communication channel. If there's signal, it's a 1, if not, it's a zero. So in 1024 ns, you're likely to be able to transmit at least 1024 bits of information in such a fashion ... which is exactly equal to the kilobit you're trying to encode. The only possible application for something along the lines of your idea that I can envision is if you have some sort of system where the recovery time for the signal is much longer than the timing accuracy. That is, if you can initiate a signal with nanosecond accuracy in any arbitrary nanosecond, but once you trigger the signal, it suppresses further signals for a significant period of time. An example is a theoretical system transmitting signals with high intensity laser pulses. The signals can be very brief and timed to the sub-millisecond level, but it might take the capacitor bank several milliseconds to recharge for the next pulse. -- 128.104.112.87 (talk) 18:48, 16 July 2009 (UTC)[reply]
You just can't win...the laws of information theory are every bit as rigid as the laws of thermodynamics (to which they are closely related). One law is that you can't compress arbitary data without loss. Your scheme MIGHT compress numbers that happen to not be prime - but prime numbers take MORE space to send because you have to send the two factors '1' and the full value of the number. When it all averages out - you lose. Perfect, lossless compression is like perpetual motion machines - it's DEFINITELY not possible. So, forget all of the compression...all you have left is "turn the file into a number - 'send' the number as a delay. Fine - OK - so let's send (say) the Declaration of Independance (of Lithuania as it happens!): it's 818 bytes. So if you send that as a number, it's 6544 bits long - making the length of your transmission significantly longer than the expected life of the universe! So you can't do that. How about sending each letter as a delay in the range 1-256 ms? Well that's only 209 seconds...but we can do better. If we chop each letter into two 4-bit numbers in the 1-16 ms range - then your system can sent the 1636 four bit numbers in a mere 26 seconds! If we go to 3272 two bit numbers in the 1-4ms range then it's only going to take 13 seconds...and (guess what?!) if you send each bit as a delay of 1 or 2 ms - then you can still do it in 13 seconds. But hold on - rather than sending "START....delay...STOP" why not just send "ONE" or "ZERO" - no delay is needed - and you only need to send one 'special code' instead of two. In fact, what we've just demonstrated is that the most efficient possible way to send the lithuanian declaration of independence is as a simple, uncompressed binary code. Boring, eh? Well - that's life. You can't do better - it's quite simply impossible - and that's as true as that perpetual motion machines are impossible. SteveBaker (talk) 01:54, 17 July 2009 (UTC)[reply]

regarding pointers

can pointers be declared using different datatypes? can a float value be stored using *ptr? —Preceding unsigned comment added by Srividhyaathreya (talkcontribs) 14:11, 16 July 2009 (UTC)[reply]

What language? Pointer handling is different in different languages. APL (talk) 14:13, 16 July 2009 (UTC)[reply]
I'm sure in most common languages the compiler will work out/require that the pointer is associated with a particular datatype, so the answer is yes in general, when you are using a high level programming language such as pascal, or if using C. In a lower level language such as assembler you have to do this yourself sometimes - ie the you need to remember what type of data a memory pointer is pointing to. Are there any exceptions?83.100.250.79 (talk) 15:18, 16 July 2009 (UTC)[reply]
The obvious issues are if you try accessing data that might not actually be a float (or might be in a different byte order). In that case, you can still read it or write it as a float, but the actual value will be garbled if it is re-accessed as something else. Another worry is word-alignment. In C, for example, a byte* can point to any address; while a float* should point to a 4-byte-aligned address (on many architectures). Some machines will give you an alignment exception if you use a 32-bit float on a non-word-aligned pointer. Others will re-align the word at runtime. Nimur (talk) 19:44, 16 July 2009 (UTC)[reply]
And if you are using C, you could of course destroy yourself if you had used malloc to reserve enough space to store a 16-bit word, but subsequently you end up storing a 64-bit float. Tempshill (talk) 21:10, 16 July 2009 (UTC)[reply]
Don't frighten the questionees - memory overflows do not cause one to physically disintegrate.83.100.250.79 (talk) 22:21, 16 July 2009 (UTC)[reply]
Also think of the questioner, we wouldn't want to frighten him or her either. --Anonymous —Preceding unsigned comment added by 70.254.170.8 (talk) 01:06, 17 July 2009 (UTC)[reply]
the damage has probably already been done ;(

Pointer (computing) might answer any specifics. in C I think it's

float *peter to declare a variable called peter used as a pointer for/to floats

in Pascal I think it's

var
 peter: ^float  different syntax, same effect

though you are obviously asking about something like C Pointers in this context are always pointing to memory locations so they are always integer types themselves - probably 32 or 64 bit. If you wanted the pointer itself to be a non-integer datatype that's a different question, and an odd thing to do.83.100.250.79 (talk) 01:03, 17 July 2009 (UTC)[reply]

Folder Option

HELP NEEDED

Hi All, the other day i inserted a flash drive in to my USB port and since i have open the drive, i can't see my "FOLDER OPTIONS" in "TOOLS" menu... and moreover i also can't use the "SEARCH" feature in "START MENU"...

Can anyone let me know how to overcome this problem?

Does this look like what is happening to you? Google is our friend. Kushal (talk) 15:14, 16 July 2009 (UTC)[reply]

autorun.exe

How do i see the autorun.exe of any flash disk/pen drive??? —Preceding unsigned comment added by Sushil shenoy (talkcontribs) 15:19, 16 July 2009 (UTC)[reply]

The autorun.exe file is usually marked as "hidden", so the easiest way to do this is to tell Windows to "show hidden files". In Windows XP, do Control Panel->Folder Options, and then I think it's on the "Advanced" screen. In Vista, open Control Panel and then type "folders" in the search field, then choose "Show hidden files and folders". After this is turned on, the autorun.exe on a flash drive will be visible (and easily deletable, which I assume is what you're aiming for). Tempshill (talk) 15:58, 16 July 2009 (UTC)[reply]

COBOL Help

Hello. I installed OpenCobol, which uses Visual C++'s cl command to make binaries from COBOL source files. So, I made a COBOL hello-world program (TEST.COB), and compiled it, but it just creates (1) test.dll, (2) test.dll.manifest, (3) test.exp, and (4) test.lib. Anyone know how to make a .exe or at least use those files to output the message to standard out? I tried running the .dll using rundll32, but nothing happened. Here's the source for TEST.COB:

000100 IDENTIFICATION DIVISION.
000200 PROGRAM-ID. "TEST".
000300 ENVIRONMENT DIVISION.
000400 DATA DIVISION.
000500 PROCEDURE DIVISION.
000600 DISPLAY "HELLO".
000700 STOP RUN.

Thanks for any help.--H. Gutmans (talk) 18:53, 16 July 2009 (UTC)[reply]

Nevermind. Sorry. I needed to add a -x to the cobc command to get it to output a .exe.--H. Gutmans (talk) 19:08, 16 July 2009 (UTC)[reply]

Who am I connected to?

Is there any way of checking that I am connected (broadband) to the ISP I expect, and that my broadband connection has not been hijacked and put through some expensive thing? I know my anti-virus software will check for diallers, but is there any more direct way of checking please? 78.145.23.157 (talk) 19:40, 16 July 2009 (UTC)[reply]

If the hijacker is good enough, it is impossible to tell. The hijacker will inspect and fake all traffic so even something like traceroute will show you incorrect information to make you think you are on your network. It really isn't worth it do go to that much trouble for some random Internet user. So, just run traceroute on something like Google. You will see each IP address between you and Google. You can check to ensure that the ones closest to you are your ISP. -- kainaw 19:48, 16 July 2009 (UTC)[reply]
Dialers affect users using dial-up, not those on broadband.--Xp54321 (Hello!Contribs) 20:54, 16 July 2009 (UTC)[reply]
Yes, I think the OP is asking: When he connects to the Internet via his laptop or iPhone or whatever, might he be connecting to the Internet via some expensive ISP that charges him a lot of money? Offhand I can't think of any way this could happen, because unlike with a telephone line provided by your local phone company, you have not authorized your ISP to charge you for services that are performed by other companies. At least, I haven't ever heard of such a thing. Tempshill (talk) 21:07, 16 July 2009 (UTC)[reply]

Mathematica 6.0

Does anybody know what algorithm Mathematica 6.0 (student edition) uses when the Sort[list] function is called? --72.197.202.36 (talk) 20:34, 16 July 2009 (UTC)[reply]

It seems to be Quicksort which we also have an article about.-KoolerStill (talk) 23:16, 16 July 2009 (UTC)[reply]

How to compare two folders?

What would be the easiest way of comparing two folders and checking that their subfolders and the names of the files within them are the same please? I just want to confirm they are the same, not move files around. The folders may be on different drives. I am using Windows XP. Thanks 78.145.23.157 (talk) 21:29, 16 July 2009 (UTC)[reply]

command prompt: tree C:\path\to\folder1
command prompt: tree C:\path\to\folder2
put the windows side by side
Ivtv (talk) 22:10, 16 July 2009 (UTC)[reply]
Even better!
CMD: tree c:\path\to\folder1 > c:\folder1tree.txt
CMD: tree C:\path\to\folder2 > c:\folder2tree.txt
CMD: fc c:\folder1tree.txt c:\folder2tree.txt
(If you don't know what '>' does, it redirects the output into a file of name some (path and) file)
This should work pretty handily without any extra software on I believe Win2k+ Washii (talk) 10:34, 18 July 2009 (UTC)[reply]
Get the free winmerge.exe (http://winmerge.org/). Wonderful tool! Saintrain (talk) 00:55, 17 July 2009 (UTC)[reply]
I agree! We do have an article on WinMerge though. Jay (talk) 09:37, 17 July 2009 (UTC)[reply]

Security

http://news.runescape.com/newsitem.ws?id=2003

How secure is this, really? Someone was claiming people would "work around it", but if you had such a key I can think of no way, beyond physical theft, to compromise the security of someone else's account. Or maybe I'm misunderstanding it entirely. Is it possible to hack someone's RuneScape account if they've got one of these keys? Vimescarrot (talk) 21:47, 16 July 2009 (UTC)[reply]

The security token article may be of interest to you. Tempshill (talk) 22:13, 16 July 2009 (UTC)[reply]

I cannot access this page, but I am assuming that you order a physical device and through a random number generator every 10 seconds it matches the same number generator to your account. World of Warcraft does the same thing. if you implement this to your account it is next-to-impossible to crack it. each number generator is unique Ivtv (talk) 22:21, 16 July 2009 (UTC)[reply]

How to identify a running application in Ubuntu?

Say I have a GUI application running on Ubuntu, for example the tracker applet or the sound recorder or the screenshot application and I'd like to report a bug against it. The command ubuntu-bug <packagename> would take care of that but how would I know the name of the package in the first place? (This is also very useful if you would want to use killall <NameOfApplication> or simply want to know how to start the application with parameters from the commandline.)

Does it boil down to using top or htop to look through possible application names or asking at the forums or is there a smarter, better way? Any help will be greatly appreciated. Thanks. Jarl Arntzen (talk) 23:15, 16 July 2009 (UTC)[reply]

Yeah, I usually use top or ps auxf. The tree organization of ps auxf sometimes help find the program, and if you just started the program, it's often the last item in the ps list. There must be some better solution, though. Indeterminate (talk) 23:22, 16 July 2009 (UTC)[reply]
Thanks! That's certainly one possible way. Have anyone else some other, good technique to suggest? Jarl Arntzen (talk) 23:34, 16 July 2009 (UTC)[reply]
Many window managers have an "identify window" widget. If yours doesn't, the following Perl script will change the cursor to a crosshair, you click on a window, and it will tell you the command line of the process that opened that window:
#!/usr/bin/perl -w

`xwininfo` =~ /Window id:\s*(\S+)/ or die "could not find window";
$id = $1;

`xlsclients -l` =~ /^Window\s*$id:.*?Command:\s*([^\n]+)/sm
    or die "could not find client";

print "$1\n";
--Sean 14:28, 17 July 2009 (UTC)[reply]

JSON texts versus values

RFC 4627 says that "A JSON text is a serialized object or array.", and that "A JSON value MUST be an object, array, number, or string, or [one of 'false'/'true'/'null'.]" What reason is there for requiring that the top level construct be an aggregate? My impulse would have been to make the text be a value so that there was only one concept to address. Is it perhaps related to XML's restriction that the top level be a (single) tag? --Tardis (talk) 23:15, 16 July 2009 (UTC)[reply]

We may have to wait for The Design and Evolution of JSON, but I've also found that weird. --Sean 22:58, 17 July 2009 (UTC)[reply]

What's wrong with this javascript widget?

I have User:Henrik/sandbox/google-search installed in my monobook.js. It's supposed to put a google search box in the left menu column, which indeed it has done for ages. Today I found no such search box & am v.depressed since I make major use of google searches of wikipedia. Does anyone have a clue what's going wrong? thanks --Tagishsimon (talk) 23:20, 16 July 2009 (UTC)[reply]

WP:VPT would be a better place for this question. Algebraist 23:22, 16 July 2009 (UTC)[reply]
I can't see anything wrong with it, and it works fine here. Have you tried bypassing your cache? Algebraist 23:25, 16 July 2009 (UTC)[reply]
Thanks. It was a cache problem, or, was solved by clearing the cache. --Tagishsimon (talk) 23:28, 16 July 2009 (UTC)[reply]

Windows needs disc to boot

My PC with a Gigabyte motherboard and Windows Vista has an odd problem. It will not boot unless the Vista DVD is in my DVD drive. It then does not boot *off* the DVD — it just seems to need the DVD to get started, and then it proceeds to boot from the hard disk. I may have faulty recall here, but I think a similar problem occurred before I had installed the current hard disk and installed Vista — the old hard disk, with Windows 2000 on it, required a boot disc in the DVD drive in order to proceed to boot from the hard disk. Changing the boot device order in the BIOS does not seem to affect this issue, other than when the DVD drive is set to be the boot device, it boots from the DVD. Any suggestions? Tempshill (talk) 23:52, 16 July 2009 (UTC)[reply]

this does not seem to make much sense at all. Try resetting your bios to default, then boot to windows and update your bios. did you do a clean install of vista? Ivtv (talk) 00:00, 17 July 2009 (UTC)[reply]
This sounds contradictory (though I'm guessing you're pretty sure you're accurately describing the symptoms). Are you very certain that the system is not booting off the DVD? Maybe there is a broken bootloader; can you try booting off the DVD and reinstalling the boot-loader (or using a Linux CD to install GRUB)? Nimur (talk) 00:23, 17 July 2009 (UTC)[reply]
Some more details: I'm very certain it's not booting off the DVD, which runs an installer. Yes, this was a clean install of Vista. Each time I boot the system, after the disks are listed and the memory check is done, it seems to hit the hard disk for a long time (during which the LED seems lit at half-intensity, telling me it's flickering fast), and then an error message appears saying, "DISK BOOT FAILURE, INSERT SYSTEM DISK AND PRESS ENTER". I have now clumsily tried installing GRUB from a Knoppix CD (I fumble with Linux) and after mounting the C: drive into /mnt/temp, and trying "grub-install --root-directory=/mnt/temp /dev/sda", it hit the hard disk for a while and then said "The file /mnt/temp/boot/grub/stage1 not read correctly." I also have booted the Vista install CD and tried installing the Windows Boot Manager, and got a file error that I didn't write down. I haven't tried re-flashing the BIOS; I guess I'll attempt that (and then reinstalling WBM) next. Tempshill (talk) 04:40, 17 July 2009 (UTC)[reply]
Try shuffling your boot order. Sometimes if you have the optical drive as the first boot device the BIOS can be stupid and stop at that when it detects no disc in the drive. Set it to hard drive and make sure the drive priority is correct. --antilivedT | C | G 04:59, 17 July 2009 (UTC)[reply]
I found that my BIOS is a couple of revisions old, but the only BIOS flash utility from Gigabyte I was able to find on their website is for 32-bit Vista only (yay Gigabyte), and from the descriptions, it appears that the changes are some CPU ID additions and one added feature. I checked my boot order; it's HD first (always was) and I verified the drive priority is correct (SATA HDD, then a PATA HDD master). I stared at the drive light while booting, this time, and logged the following bizarre behavior, which does occur with 100% reproducibility:
  1. Memory test completes on the BIOS screen
  2. Drive indicator light turns "half-intensity" (which I interpret to mean it's getting accessed repeatedly but not continuously) for 25 seconds
  3. The BIOS lists all the connected drives
  4. The drive indicator light turns "half intensity" for 35 seconds
  5. The BIOS lists all the PCI devices then says "Verifying DMI pool data"
  6. Drive light is off for a couple of seconds
  7. Drive light turns on, half-intensity for an amazing 122 seconds
  8. Text appears saying "Press any key to boot from CD/DVD..." At this point I leave it alone and it boots Vista off the hard disk.
So, yes, it takes me 3 minutes to boot my computer, and nearly all of that time is spent accessing the hard disks, if my drive indicator light isn't lying. Could this be the root of the trouble? Tempshill (talk) 07:49, 17 July 2009 (UTC)[reply]
Strange, indeed. (1) nothing to do with the BIOS version, if it ever used to work at all (2) looks like it is searching madly for a boot sector, as indicated by the "disk boot failure" error message. Having finally found the boot instructions on the DVD, it then proceeds to load these into memory and run the rest of the OS from the hard drive.
It sounds like the boot sector is corrupted. So stranger still if it did, indeed, do the same with another hard drive and OS. If it's done it with more than one disk, it is more likely a kinked or cracked ribbon cable to the drive. Triple check, flatten out and reinsert the cable, ideally replacing it with a new one. (I've had cable problems create Disk Boot failure errors with no other trouble once the HDD was running).
The DVD should have a Repair section on it. Fire that up and go to the Booting section, which should allow you to "fixmbr" (rewrite the master boot record).This will overwrite the Grub, which does not sound a very successful installation either. Or get a hand from this BCD repair programwhich works without the DVD. Leave the BIOS set up to start from the HDD. - KoolerStill (talk) 12:40, 17 July 2009 (UTC)[reply]
OK - I tried the Vista disc's "Repair -> Startup" process, and it went through a diagnostic and said that no problems were detected. Following a Googled tip, I did bootsect.exe /nt60 all from a command prompt after booting from the DVD; bootsect went through and stated for both my C: and D: hard disks that it had "Successfully updated NTFS filesystem bootcode." This didn't lead to any change in my 3 minute boot times or the need for the Vista disc in the drive. Thanks for the tip on the cables — I guess I'll take a look this weekend. I would have guessed that a cabling problem would cause ongoing HD access failures and wouldn't have expected problems only at boot. Tempshill (talk) 16:18, 17 July 2009 (UTC)[reply]
It's possibly a more insidious failure, e.g. failing hard-disk that is intermittently flaking out. By the time the OS boots, error-correction can make this seem transparent or nonexistent. It's also possible that there is a power brownout in effect - your hard-disk may be right on the edge of consuming more power than your PSU can supply (again, intermittently failing). I would treat this system very cautiously and back up all important data; hopefully a fix can be found, but these symptoms may indicate a more severe crash is imminent. Nimur (talk) 20:54, 17 July 2009 (UTC)[reply]

July 17

Using PC power supply for scanner

My flatbed scanner power supply (wall wart, 12VDC, 1A) went away. :-(

Any potential problems using a +12V line from my PC's power supply; ground loops, etc?

Thanks. Saintrain (talk) 00:45, 17 July 2009 (UTC)[reply]

Does the PC supply have a 1A overhead ? (You know how cheap a new 12W power supply can be right ? ) 83.100.250.79 (talk) 01:10, 17 July 2009 (UTC)[reply]
If scanner (data cable) is connected to the same computer as power supply, there could be no ground loops. I do not know for sure, but scanners peak power consumption does not seems to be very large, so it should work. -Yyy (talk) 07:27, 18 July 2009 (UTC)[reply]

Kristin ITC font

I have the font "Kristin ITC" installed on a computer at work but not at home. Work machine is XPH and the home is XPP. Can someone tell me what software app comes bundled with this font? There seem to be several like that but this is a good start I think. ZabMilenkoHow am I driving? 06:05, 17 July 2009 (UTC)[reply]

Oops, maybe if I googled right the first time, this would have come up. Thanks. ZabMilenkoHow am I driving? 06:06, 17 July 2009 (UTC)[reply]

Database (MS Acess)

How can I have the value for a field be calculated automatically based on values in 2 other fields one of which is in the same table and the other in different table? --195.244.210.38 (talk) 09:31, 17 July 2009 (UTC)[reply]

If I understand the question correctly, for a particular table you want a particular column in each row to be calculated based on the value stored in another column (of the same row in that table) and a column in a different table? If thats right - then no; not possible at the raw table level. Can I assume you are actually referring to creating a form tied to underlying tables? If this is the case, complicated manipulations of data is possible... Jwoodger (talk) 14:00, 17 July 2009 (UTC)[reply]
I thought they might have meant 'cells' when they wrote 'fields'.83.100.250.79
Yes, 'cells' is probably easier to write than my definition, but they refer to the same thing (columns of a row) Jwoodger (talk) 15:33, 17 July 2009 (UTC)[reply]

(talk) 15:21, 17 July 2009 (UTC)[reply]

If you are using a Query, it is easy to do this with complicated functions. Set the value to one of the columns to something like =Table1.[Foo]+Table2.[Bar]. Syntax might not be exactly right but it is something like that. You can't do this with raw table view itself; it needs to be done in a Query. (Tables are just data, they don't have functions. Queries are basically tables+functions.) --98.217.14.211 (talk) 14:21, 17 July 2009 (UTC)[reply]
Are you certain tables are raw data - eg are spreadsheet functions like sum(a1:a10) lost when importing a table and converted to a number? This sounds like a nightmare. There's another way right??83.100.250.79 (talk) 15:21, 17 July 2009 (UTC)[reply]
Spreadsheet functions are NOT included in tables. It's not a nightmare, it's a different paradigm. Tables are NOT the same thing as Excel spreadsheets AT ALL and should not be confused with them. They hold numbers and text and things like that. No functions. --98.217.14.211 (talk) 14:43, 18 July 2009 (UTC)[reply]
Well, to be precise tables are not just data, they include structural definitions as well (data types, relationships, other metadata). As for the rest of that question, I'm not sure what you mean... Jwoodger (talk) 15:33, 17 July 2009 (UTC)[reply]
From your previous questions, you appear to confusing the database and the application. The database is nothing more than a bunch of tables of data. The thing that you use to put data in the database and get reports out of the database is the application. Access is unique in that it combines a database and application into one product. Most databases do not include the application. So, understanding that Access is two things combined into one, the database should not contain data that is just a combination of two other fields. That is something you place at the application level. When a person fetches data, you add up the two columns and display the result. -- kainaw 15:25, 17 July 2009 (UTC)[reply]
There must be properly integrated database/spreadsheet systems out there though, surely?83.100.250.79 (talk) 16:27, 17 July 2009 (UTC)[reply]
The problem is that the application (spreadsheet) must be customized for every purpose. For example, I have a field on my report (which you are calling a spreadsheet) that is a percentage. The denominator is the number of times a patient has a systolic blood pressure > 140 or diastolic blood pressure > 90 and the previous blood pressure was also > 140 or > 90 (unless the patient is diabetic, then I use 130/80, not 140/90). The numerator is how many of those occurrences coincide with an increase in anti-hypertensive medication. So, do you propose that MS Access (or some "properly" integrated program) include this special field? Of course not. It is the job of the database administrator to customize the application to the user's needs. It is not the job of the program to instamagically create the application because no matter what is available there will be requests for more application features. -- kainaw 16:32, 17 July 2009 (UTC)[reply]
I would suggest that the database program be able to handle the same form of data as the spreadsheet. So if the spreadsheet can handle your data - the database would be able to (sounds like you have 2 values per cell or something - I don't know medicine) and vice versa
I don't see what is so outrageous to expect that sort of commonality. It's not a case of application features - it's a case of expecting two closely related programs to be able to use the same data set, without loss of data (or functionality).
In other words "properly integrated" means the database accepts a .xls file or whatever as a (dynamic) table (keeping the interelatedness between values), not just a static 'snap-shot' of the numerical values. Obviously access can't do that - I have to open a spreadsheet to alter data that affects a third value, then reimport it to create a report or whatever. Or maybe write out the statistical functions twice - ones for the spreadsheet, and once for the data report in database mode - doesn't sound good.83.100.250.79 (talk) 16:55, 17 July 2009 (UTC)[reply]
It sounds like you are looking for functionality that would be available as a calculated column, or a view in full database system. As far as I know, MS Access does not have calculated columns or view by that name, but the same effect can be achieved by defining and saving a query that contains the desired calculation, and then referencing the query as if it was a table. For example, if you have a table Table1 with numeric columns a and b. You could define a query on that table as "SELECT a, b, a / b as c FROM Table1;" and save it as Query1. (Although I've written this as a SQL SELECT statement, you can do the same with the query designer.) You can then browse Query1 or write another query against it just as if Query1 were a table. You can even save data to columns a and b, and column c will be calculated automatically. -- Tcncv (talk) 04:32, 18 July 2009 (UTC)[reply]
Yes, that's the sort of thing. I was wondering if more money can buy better integration between a spreadsheet and database program - but it looks like that particular product is called a database engineer.. Actually I'll shut up because I just remembered that this wasn't my question - don't want to start hijacking it83.100.250.79 (talk) 09:02, 18 July 2009 (UTC)[reply]
Don't confuse the spreadsheets of Excel with the tables in Access. Their similarity in appearance is only superficial. You cannot use Excel-like functions or row references or calculated columns in Tables. You CAN do waaaay more awesome and complicated things with your data in Access Queries than you can in any Excel spreadsheet. They do two very different things, don't confuse them!! --98.217.14.211 (talk) 14:45, 18 July 2009 (UTC)[reply]

Comparing zip file to directory in Ubuntu

If I have a directory (and I have one) and if I want to compare it to a zip file (and I want to) to know what is different and add or remove stuff from the zip file, what can I do it in Ubuntu? This would be like a simple backup, but it is also useful for other purposes (like packing a set of up-to-date docs).--Quest09 (talk) 10:54, 17 July 2009 (UTC)[reply]

Beyond Compare will compare a directory to a zip file. I have only used the Windows version but according to their website, they also do a Linux version. Mitch Ames (talk) 11:20, 17 July 2009 (UTC)[reply]

banning ip ranges in php

Hi everyone, I have another question about php, this time how to ban entire ip address ranges. This is the code I've got so far, but it only works on single ips:

How can I ban entire ranges in php? Thanks for your help! —Preceding unsigned comment added by 82.43.91.128 (talk) 11:13, 17 July 2009 (UTC)[reply]

This is a tricky problem because of the syntax of IP addresses. Here's the simplistic solution: If you want to block, say, 12.34.xxx.xxx, you can add the key 12.34. to your block list and, if the incoming IP begins with 12.34., you block it. So, instead of comparing equality between the remote address and the key, you see if the remote address begins with the key. Here's the problem: what if you specifically try to block 1.2.3.4, so you make that key. Now, someone comes in with the remote address 1.2.3.45. That begins with 1.2.3.4, so it will be blocked. So, you are better off doing wildcard matching. So, instead of blocking 12.34., you block 12.34.*.*. Now, you have to write a comparison that matches "*" to any number. Regular expressions are commonly used for that. Another problem: the period is a reserved character in regular expressions (it means ANY character). So, 1.2 will readily match 152 (the period between 1 and 2 matches anything, including 5). So, what can you do? A million or so things. One is to not use periods. Use dashes. So, before the comparison, $key = str_replace(".", "-", $key) ... and the same with the remote address. Now, the period will be a dash and the address will look like 12-34-56-79 instead of 12.34.56.78. Then, if you used * to mean "any number", you have to change that to regex syntax with $key = str_replace("*", "{0-9}*", $key) ... no need to do that on the remote address as it won't have a * in it. Now, you can test: if (preg_match($_SERVER['REMTOE_ADDR'], $key)) { die... I know, it isn't as easy as you probably want, but it is one of a thousand or so ways to do it. Want a different example using the explode function on the IP addresses? -- kainaw 13:04, 17 July 2009 (UTC)[reply]
Might it be better practice to block IP ranges at the HTTP server or even at the network level, rather than at the application level? I guess it depends on your application. If you are the server administrator, you can edit the web server settings. Even if you are not, you can create a .htaccess file (this works with most configurations of Apache). (Here's a quick and easy tutorial. Nimur (talk) 14:17, 17 July 2009 (UTC)[reply]
That would probably be better, but I'd really need this to work in php so that I can just transfer the entire web folder from place to place and run it in an instant without any server setting up. Thanks Kainaw, I'll give your suggestion a go. —Preceding unsigned comment added by 82.43.91.128 (talk) 16:29, 17 July 2009 (UTC)[reply]
Just for your information... you can have an .htaccess file which specifies such IP blocks in the same directory as your PHP files; and you can move this .htaccess file around with the PHP source (as long as the webserver recognizes .htaccess files, which most standard-configuration servers do). Good luck with your implementation, however you choose to do it... Nimur (talk) 20:51, 17 July 2009 (UTC)[reply]

Preventing background tabs from playing YouTube movies automatically?

When restart Firefox 3.5, it restores the tabs from my previous session. It's a great feature and I love it. But one problem is if I have multiple YouTube tabs, it starts playing ALL of them and I have to step through each tab to stop the movie. I don't remember this problem in the past. Is there a way to prevent YouTube movies from auto playing unless it's the frontmost, active tab? --70.167.58.6 (talk) 12:01, 17 July 2009 (UTC)[reply]

I have added the Firefox addon "flashblock" which replaces all flash content with a placeholder. The flash will only load and the movie start playing when you click the flash object placeholder. -=# Amos E Wolfe talk #=- 12:11, 17 July 2009 (UTC)[reply]

NooB wireless LAN question

For years I was happily connected to the net via wired LAN or (olde-worlde) modem. But these days I have to be connected via wireless LAN and I'm acutely aware of not knowing what the pluck I'm doing. The wireless router has instructions in Japanese only, which doesn't help, but I can't make sense of the en:WP articles either.

First, the OS I'm using isn't among those for which the manufacturer (Corega) of the wireless router provides idiot-proof instructions. A sticky label on the router tells me that its SSID or ESSID is such and such and that the "network key" is a certain eight-digit number. The OS wants the SSID (unproblematic) and also either or both of "BSSID" (which it glosses as "Only connect to the station with this hardware address") and "MAC address" (which it glosses as "Override hardware address"). Specifying an address that one then overrides makes no sense to me, or perhaps I should say that it makes even less sense than anything else does. Should I then use "BSSID"? Whichever I choose, I'm to supply it in the format "__:__:__:__:__:__": a twelve-digit number; should I type this in from the left, leaving the rightmost digits blank, or to the right, leaving the leftmost digits blank?

Secondly, is a WPA2/WPA-PSK -protected connection to a given wireless router in any way vulnerable to an unprotected connection to the same wireless router? I really don't care if others are freeloading off my LAN as long as they can't sniff what I'm doing. I did once manage to set up one of these wireless routers, protected and all; but I never could figure out how to disable the bonus unprotected network "cg-guest".

Thank you. -- Hoary (talk) 12:06, 17 July 2009 (UTC)[reply]

The BSSID and MAC are typically supplied only when one is building an infrastructure-mode wireless network (that is, a bunch of wireless router boxes all connected together). Clients typically need only the network key (and often maintain a mapping table correlating the right key with a given SSID; so when your laptop sees ssid="hoarynet" it knows which of its stored keys to send). So I wouldn't set either of those, but instead look for some other place in which to input the key. Regarding your second question - home routers are set either to allow only encrypted connections or only naked ones (not a mixture); but it sounds like this Corega thing might be a bit fancier than a basic home router (such as the kind found in hotels)? If so it'll have two (virtual) lans, one for the encrypted traffic and another for the naked stuff; if anyone can sniff the encrypted traffic then the router is very stupid, but whether broadcast traffic is visible between the two depends on how the router was coded. You might not think you're doing any (ethernet layer) broadcast traffic, but Windows' wins/smb service announcements ("hi I'm a printer... hi I'm a network share called "porn folder"... etc.) are incessant. -- Finlay McWalter | Talk 20:45, 17 July 2009 (UTC)[reply]
Ah, perhaps I'm starting to understand. The Corega device is (I translate from the Japanese) a "wireless LAN broadband router", a "super high power 11n wireless LAN", offering "150Mbps" -- which may all sound very grand but actually this little plasticky thing is about the cheapest device I could find (circa &eur;30). I merely want a wireless LAN for use within a single small office in which two people are often using any of five or so laptops to connect to the net and a printer -- this is more convenient than plugging and unplugging a USB cable and trying not to trip over LAN cables. It seems that every Corega wireless router is set up with an unprotected LAN named either "corega" or "cg-guest" (indeed, for one entire week I was connected to the net via "corega" belonging to some unidentified neighbor). In principle, I'm happy if anyone wants to be my "cg-guest"; if this threatened to be a great drain while I was doing some major once-a-year feat such as downloading the latest Debian, I'd simply (?) disable wireless while connected, um, wirefully. -- Hoary (talk) 00:20, 18 July 2009 (UTC)[reply]
Is it one of these Corega routers? They all seem to have English manuals at the bottom of their pages. If you need the MAC address, it might be on the bottom of the router, near the serial number. And no, AFAIK being on WPA2/WPA-PSK or any other encryption should prevent other people from easily intercepting your data, even if you're both on the same router. It's still not totally secure, but nothing is... Indeterminate (talk) 08:33, 18 July 2009 (UTC)[reply]
Thank you for the tips. No, my device is specific to the Japanese market. And oddly it doesn't much look like any of those shown on that page. (Or perhaps not so oddly, as it advertises itself as "150Mbps".) Any idea on the best way of supplying an eight-digit MAC address to a blank for twelve digits? (Maybe if I took the number as decimal -- which it seems to be -- and converted it to octal....) -- Hoary (talk) 14:53, 18 July 2009 (UTC)[reply]

Decisions on pyramid of images

I'm unaable to guess the levels of resolution microsoft maps or similar websites possess. When making an image pyramid, How does one decide on the levels of resolution and even the size of an indvidual tile?. Can anybody throw some light please. —Preceding unsigned comment added by 131.220.46.25 (talk) 13:21, 17 July 2009 (UTC)[reply]

If you'd like to view the individual image tiles that sites like Google Maps download, the easiest way is with an HTTP proxy that lets you save the individual downloaded junks as files. For similar tasks I've used HTTPripper, but there are lots to chose from. Google's tile size is 256x256, so that's a pretty big clue that zoomed in tiles cover either quarters or sixteenths (I'd guess quarters) of their parents. This article says there are 17 levels of zoom, and he says it's quarters. Finlay McWalter | Talk 18:48, 17 July 2009 (UTC)[reply]

Reformatting my Compaq Notebook

My notebook is infected with a weird virus and so I wanted to do a clean format of the HDD and reinstall Windows. Compaq (which btw is now HP) did not give me a recovery disk (which I have used in the past) but instead has a recovery partition on the HDD. How then do I use the partition to reformat and reinstall Vista? Also, will I be able to backup my data before the reformatting is done? I do not want to connect a thumb drive or external HDD to my system to save my data because the external device may also get infected. Help needed. Thanks 116.71.75.2 (talk) 21:04, 17 July 2009 (UTC)[reply]

Okay so I found out how to do it.

http://h10025.www1.hp.com/ewfrf/wc/document?lc=en&dlc=en&cc=us&docname=bph07145#bph07145_xp

But this means there isn't an inbuilt option to backup my data. Can anyone give me an idea on how to do this without letting the virus spread to my other devices? Thanks. 116.71.75.2 (talk) 21:14, 17 July 2009 (UTC)[reply]

Tap F11 on boot will get you to the recovery manager. you can backup data in there with an external drive. contrary to popular belief you cannot 'infect' an external drive(anymore at least). Data can be corrupt yes, but as long as you avoid transferring over anything that can execute you will be fine. that and pdf files. Ivtv (talk) 21:23, 17 July 2009 (UTC)[reply]
I don't think the last 2 sentences of Ivtv's answer help the OP much. 116, what you probably want to do is to indeed back up all your data to an external drive, and then reformat your internal drive, reinstall Windows, set up an account without admin rights for normal everyday use, install antivirus software, install all your applications you use, and then, while using your non-admin-rights account, copy your documents from the external drive to your internal drive and make the virus software scan them. There are several ways that documents can indeed be infected. Then take your external drive, put a warning sticker on it, and throw it in a drawer in case you need to get other files you didn't copy initially. Tempshill (talk) 22:12, 17 July 2009 (UTC)[reply]
I'd recommend virus/malware scanning the external drive before copying the files back to your new, clean system, but yeah, good advice. Indeterminate (talk) 08:17, 18 July 2009 (UTC)[reply]
Thanks for the reply Tempshill, but that is not really an option for me, because I use the external HDD regularly and cannot condemn it to the junk heap. What if I copy data from my internal drive onto a CD? Will that carry the infected stuff? Also, where do I get all the drivers for the notebook? Are they already on the recovery partition? 116.71.78.131 (talk) 11:39, 18 July 2009 (UTC)[reply]

Freeware Calendar

I am looking for a popular freeware calendar application that I can use. I need one that allows me to create a schedule on one computer, then save it in a file that can be transferred to another computer (with the same app obviously) and then imported into the app on the second computer. Is there an application that will allow me to do this without distorting the original schedule of the second computer's app? 94.7.166.22 (talk) 21:28, 17 July 2009 (UTC)[reply]

why don't you just use goggle calender? --Cameron Scott (talk) 21:29, 17 July 2009 (UTC)[reply]

does it do everything i need? 94.7.166.22 (talk) 21:37, 17 July 2009 (UTC)[reply]

I think it does — there is no app, and everything is stored on Google's servers, which you can access from anywhere (using any reasonable platform). It's free, so you may as well try it out. Tempshill (talk) 22:07, 17 July 2009 (UTC)[reply]
Although, you'll need an internet connection everywhere you want to access the calendar. Unless you sync it with some software on your computer. Dismas|(talk) 05:29, 18 July 2009 (UTC)[reply]
Mozilla Sunbird can do what you want, but I'm not sure how easy it is to sync accros computers. Otherwise you might look at List of personal information managers. Or just use google. Personally, I hate trusting outside providers for that sort of stuff, I prefer using my own computers, but I'm forced to admit that Google Calendars works very well.
PS. I'm not sure what you mean "without distorting the original...", perhaps we're misunderstanding that part? APL (talk) 14:47, 18 July 2009 (UTC)[reply]

Need help setting up a FTP server

Hey guys. I'm new with this whole FTP thing. I currently use BulletProof FTP Server v2.3.1. I followed many, many online tutorials and instructions on how to set it up, and I've almost got it... but ran into some problems. First of all, it seems that I'm able to connect to the server fine using PASV mode (I have a dynamic DNS name via No-IP), but for some reason I can't get the LIST working. I'm also a bit confused on some things concerning port forwarding. I think I've got everything forwarded correctly but I'm not too sure... Just to clarify, where do I need to forward ports 20 and 21 to? This question goes the same for the range (I'm using ports 50000-50100). If I need to forward them to the machine hosting BulletProof, how do I do that in my router firewall (2Wire 2071) and my software firewall (PC Tools Firewall Plus)? If there are any questions then ask, and I appreciate as much help as possible! Thanks. Vic93 (t/c) 22:31, 17 July 2009 (UTC)[reply]

You only need to do port forwarding in the router's firewall, and yes, you forward it to the machine hosting BulletProof. Here's a guide to forwarding a port on a 2wire router. On your software firewall, you just need to open the ports that you're going to be using. In the program window, you probably want to click on "Applications" or "Application Blocking" and define your ftp ports. To find out if everything's working, get a website (like this one) to run a port scan on your ip address (select "common ports" or something). If it tells you that you "failed" because your FTP port is open, then congratulations, it works. Not sure about the LIST problem, let us know if you still have that after fixing the port forwarding issue. Indeterminate (talk) 08:12, 18 July 2009 (UTC)[reply]

How to find out what kind of broadband I'm using?

I'm considering buying a second-hand internet gateway or router, because its cheap. How can I find out the technical details of the kind of broadband I'm using please? Do different types of broadband need different types of gateway/router/modem? 89.240.61.156 (talk) 23:31, 17 July 2009 (UTC)[reply]

Your IP resolves to "OPAL TELECOM DSL NETWORK" in the UK. So you're using an ADSL broadband connection. Most broadband in the UK is ADSL, which comes over BT wires. The only significant exception to that is people who have Virgin cable; they need a different kind of box to the ADSL folks. Before you change box, you'll need to write down the login parameters (username and password) that are encoded in your current box, as you'll need to enter these into the new one. -- 87.115.153.0 (talk) 23:36, 17 July 2009 (UTC)[reply]
In the UK we basically have cable and ADSL. If you tell us your ISP (e.g. talk talk, orange etc) we will be able to tell you what is suitable. Rjwilmsi 07:03, 18 July 2009 (UTC)[reply]
Thanks. The ISP is Talk Talk and the device is either a Zyxel Prestige 700 series or a Zyxel Prestige 600 series. The owner probably disposed of them because they do not offer wireless: I on the other hand do not trust wireless and do not want it. My aim is to get more than one computer using the same broadband connection, while appearing to the ISP to be only one computer. And if possible to allow passing files between computers for back-up purposes. I do not think the Zyxels have any software CDs with them. One computer will be running WinXp (as the ISP requires), the other one or two will have Linux Ubuntu. 78.146.236.46 (talk) 08:00, 18 July 2009 (UTC)[reply]

July 18

Framerate problems

When I play a computergame on my laptop, the framerate starts out just fine. However after about 15-30 minutes of playing the framerate drops to unplayable levels. I don't know what's the problem. It happens when I run any game, so it's not specific to any particular program. I'm baffled really to what might be causing this. I'm running an Intel Centrino Duo. Videocard is a Quadro NVS 110M. ScienceApe (talk) 07:56, 18 July 2009 (UTC)[reply]

How to take screenshots of Mac OS X applications's windows

I have recently found myself uploading screenshots of an application designed for Mac OS X, (see Chromium screenshot). However, so far I have only done this using Preview and the "grab" function. This meant that I have not been able to reproduce the semi-translucent shadow that windows in Mac OS X produce. Could somebody kindly tell me how I can capture the semi-translucent shadow, (as seen in File:Finder.png, and File:ITunes 8 OS X.png). Thanks alot, --P.Marlow (talk) 10:30, 18 July 2009 (UTC)[reply]

Try Apple-Option-4. That should allow you to define a screenshot area that includes the shadow. --98.217.14.211 (talk) 14:09, 18 July 2009 (UTC)[reply]
and if you press the spacebar immediately, you should get a camera icon that will grab the image of the window only. :) Kushal (talk) 14:24, 18 July 2009 (UTC)[reply]

GIF2APNG

Please convert most animated GIFs on Wikipedia Commons to APNG! --88.78.10.214 (talk) 14:35, 18 July 2009 (UTC)[reply]

This is the reference desk. Try the WP:Village Pump. APL (talk) 14:43, 18 July 2009 (UTC)[reply]
APNG is not supported on nearly enough of the current browsers that people actually use. Sure, it would be nice if lots of browsers supported MNG or APNG, but they don't, and promoting non-standard minority formats isn't Wikipedia's job. -- 87.114.153.140 (talk) 15:25, 18 July 2009 (UTC)[reply]