Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 82.44.55.25 (talk) at 14:24, 17 January 2011 (→‎Find word and beep). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


January 12

blurred (censored) image appearing un-blurred, personal information

I've come across an image on commons, it's basically a form of photo identification with a persons face and numbers on it, both of which have been blurred out, but when I opened it in GIMP I noticed that the image had been restored in the image preview (i.e. no blurring, so I could see clearly the face of the person, though it was too small to make out the text). Having opened the image the blurred parts once again looked blurred, but there is no indication of any layers other than the background, and this is a .jpg file so I wouldn't expect any. It's apparent though that GIMP has access to some extra data that was left over? before the image was saved, and anybody that wanted to could probably get at the info, so my question is two fold; how could the image layer behind the blurring possibly remain in a .jpg image, and why does this get through? This is just one example (albeit a dangerous example) of information being stored behind a layer in a .jpg but there could be hundreds more images that have the same loophole, if it's just as simple as saving a layered image as a .jpg. Forgive me for not wanting to specify the exact image, but I'd rather not give everyone access to this guys identity. 64.180.84.184 (talk) 02:01, 12 January 2011 (UTC)[reply]

First you should have an admin remove the file (but keep a copy so someone can figure this out). After that you could try to alter the image so the personal parts are indeed censored (on top of the blurring being applied), if you can; then we could all figure out what's going on. Otherwise I suppose you'd want to find and admin or three to take care of it; WP:RFAA. ¦ Reisio (talk) 02:06, 12 January 2011 (UTC)[reply]
What's going on is that a preview image is saved within the image as metadata, and it was made from an earlier (uncensored) version. This is a known flaw with a lot of image programs and has resulted in lots of information getting leaked out when people thought they were being clever and censoring it. It's easy enough to fix (open the image, select all, create new, copy and paste, save over the old file). But I agree that the file needs to be deleted entirely from Commons as well, because the preview is saved in the history as well. --Mr.98 (talk) 03:08, 12 January 2011 (UTC)[reply]
OK so it's just his picture that has been revealed, as the text is probably too small to see if it's just the preview. Good to know. Are there any commons admins floating around here? I'm not sure how to find one. 64.180.84.184 (talk) 03:34, 12 January 2011 (UTC) NM I found Reiso's link, thanks! 64.180.84.184 (talk) 03:35, 12 January 2011 (UTC)[reply]
I'd hit up irc://irc.freenode.net/wikimedia-commons ¦ Reisio (talk) 04:46, 12 January 2011 (UTC)[reply]
Also I wonder if there's no easy way to check .jpgs for accurate previews, or to remove them completely. 64.180.84.184 (talk) 03:41, 12 January 2011 (UTC)[reply]
That's a problem for https://bugzilla.wikimedia.org/ ¦ Reisio (talk) 04:46, 12 January 2011 (UTC)[reply]

skype

is there a way to search for contacts using the old skype search. the new one i cant find anyone. i accidentally deleted a contact yesterday now i cant find him again using the new search. — Preceding unsigned comment added by Tommy35750 (talkcontribs) 04:02, 12 January 2011 (UTC)[reply]

Is there such a laptop with a 22 inch screen?

I need a laptop (not at netbook) with a 22-inch screen. I have tried to find it, but without any luck so far.
I will occasionally use this laptop to view TV or Video, but first and foremost I need it as a computer. Therefore I want a higher screen resolution/image quality than the high-definition television 1080p standard.
Other wanted features are:

  1. 4 GB RAM or more. (6GB would be nice to avoid most of the disk swapping).
  2. At least 500GB harddrive.
  3. Optical disc drive capable of reading and writing CD-RW, DVD±RW/DVD+R DL and preferably also Blu-ray Disc and Blu-ray Disc recordable.
  4. 5 (or 6) USB 2.0 ports. (USB 3.0 would, of course, also be nice).
  5. SDHC Card connection.
  6. Integrated stereo speakers.
  7. TRS (jack) connection for External speakers, Earphones and Microphone. (An additional 2.5mm jack connection for use with Mobile phone headsets would be a bonus).
  8. 2 HDMI connections.
  9. Enabled support for Consumer Electronics Control (CEC) (AV.link) through the HDMI. (To talk with set-top boxes, Television sets and PVRs).

Well, I have asked around for this, at local laptop retailers, but none have been able to provide.
Do you know of such a laptop currently available from somewhere? --46.15.71.199 (talk) 10:22, 12 January 2011 (UTC)[reply]

Long sidetrack (unhelpful passage) collapsed.
The largest laptop screen size I've seen is 18.4". (I've checked for larger at various online retailers but was unable to find anything bigger) So right off, your exact specifications can't be met. The idea of lugging around a 22" laptop is interesting indeed! As is your linking of basic computing terms like "laptop" and "RAM" on a page which is frequented by people who are already knowledgeable in more advanced topics Dismas|(talk) 10:53, 12 January 2011 (UTC)[reply]
I agree. I found some 2009 speculation about 22" laptops, but none seems to have materialized. Would it be an option to buy a "normal" laptop (my concept of "normal" is a 15" MacBook Pro, but I know I'm peculiar that way) and pair it with an external display and keyboard? Reasonable 22" LCD displays can be had for about 200 RCUs. --Stephan Schulz (talk) 13:32, 12 January 2011 (UTC)[reply]
RCU? Regional Currency Unit? Dismas|(talk) 13:36, 12 January 2011 (UTC)[reply]
Reasonable Currency Unit - anything roughly comparable to EUR, CAN$, US$, AUS$, SFR, GBP ... --Stephan Schulz (talk) 13:40, 12 January 2011 (UTC)[reply]
@User:Dismas (timestamp 10:53): Please! Do not be too quick to draw your conclusions!
There is at least one 20.1-inch laptop (HP Pavilion HDX "Dragon") and the fact that you could not find anyone above 18.4-inch kind of illustrates my problem (which is: There probably are more than one 22-inch laptops out there!, I just have not found them yet!).
I take it that your calling this: "interesting indeed!" was meant to be sarcastic, but again: Please do not judge to hastily!
"Lugging around" a 22-inch laptop may seem just as silly as dragging around a 240kg (530 punds) chair everywhere one goes, until you discover that the person in question maybe would not have been able to go anywhere, at all, without it! The ability to show things, from a computer screen, to senior citizens, where ever we meet, without them having to put on their reading glasses is sometimes not something interesting, but rather a minimum requirement. And even younger visually impaired people as well might want such a portable computer themselves — even if it is not quite as easy to put in a handbag as an iPad.
About the linking of basic terms in front of the knowledgeable people here at the help desk: Many people that search for a 22-inch lapto "don't know anything" about computers. I linked those words to make this question understandable for them to.
--(OP)46.15.71.199 (talk) 13:57, 12 January 2011 (UTC)[reply]
I didn't mean to sound sarcastic by saying that a 22" laptop was interesting. I really do mean a 22" laptop would be interesting. Not only the lugging around of it but the actual existence of one as well. Dismas|(talk) 14:02, 12 January 2011 (UTC)[reply]
@User:Stephan Schulz (timestamp 13:32): Technically it will work, but practically it is (almost) not. Carrying one 22-inch plus a power supply is cumbersome enough. Carrying a 22-inch, a 15-inch, a connection cable and two power supplies will, I feel, be too cumbersome.
--(OP) 46.15.71.199 (talk) 14:32, 12 January 2011 (UTC)[reply]
The question still stands.
(Please keep in mind that the ref.desk is not a chatroom and skip the comments about how you feel about this or the eventual fact that you do not know of any such laptop either – unless they effectively helps find the answer to the question).
--(OP)46.15.71.199 (talk) 13:57, 12 January 2011 (UTC)[reply]
It is possible to treat an iMac (Intel-based) as a sort of laptop, albeit a heavy one. I have lugged around one of these for close to a year. There is even a carrying case for one of these things. Here. The weight is truly unbearable by day two. Bus stop (talk) 14:24, 12 January 2011 (UTC)[reply]
An iMac... That's an idea. Do you have the 20", 21.5", 24" or the 27" version?
Well, maybe they all will be of "unbearable" weight by day two ;-) --46.15.71.199 (talk) 15:02, 12 January 2011 (UTC)[reply]
This is the one that I dragged around. It is an older generation (white polycarbonate plastic) model. It has a 17 inch screen. It weighed 15 pounds. The newer ones (aluminum enclosure) probably weigh less (per square unit of screen space) and I believe they are available in larger size screens. They are probably going to be overly heavy for all but the most determined users. Bus stop (talk) 15:52, 12 January 2011 (UTC)[reply]


Any all in one PC should be able to approximate a laptop of that size, though making sure it has Bluetooth built in will make things easier by using peripherals you can carry around without having to worry about the cable mess you would otherwise encounter. You can buy carrying cases for monitors which should also work for the all in one PC, and some even have pockets or straps for a keyboard and mouse (or trackpad). A cursory search does show me that the iMac is one of the lighter and thinner All in One PC's as well as being surprisingly reasonable in price. 206.131.39.6 (talk) 16:14, 12 January 2011 (UTC)[reply]
Well I have a 17", incredibly lightweight Toshiba.... something or other. I'll google it. Oh wait, there's a sticker on my laptop. The laptop is a Toshiba Satellite L675. It's really It has 4GB RAM and upwards of 500 GB. It can use headphones, external speakers, and a headset. It can write CDs and I'm pretty sure it can write DVDs (not sure about Blu-Ray, but it might). It's got stereo speakers, too. I'm good with technology, but I'm better with software than hardware, so I don't know what your other specifications are.
I've had the laptop since mid-October and I really like it. It gets a little slow sometimes, but I think that's because I have a tonof documents on my hard drive and I keep several browsers open at once. This problem's easily fixable by plugging a 2+ gig plash drive into the USB port and doing something called Windows Ready Boost. Anyways, hope this helps! --- c y m r u . l a s s (talk me, stalk me) 16:21, 12 January 2011 (UTC)[reply]
I'm confused by the belief if a 22" laptop existed it would probably be hard to find.
A simple search for 'largest laptop' finds this relatively recent Yahoo answers thread which mentions 'hp pavilion hdx' and links to [1] about the Dell XPS XPS M2010. There are plenty of other discussions about these laptops from the same search e.g. [2]. From what I can tell, these are no longer sold new. Definitely the Dell website suggests the Dell one isn't. The HP website doesn't really say but the specs are rather dated suggesting it isn't and [3] is also suggestive. That may be why you can't find this in stores selling new laptops, i.e. it doesn't really meet your 'currently available' criterion. This perhaps also gives some idea of the market potential/success for such laptops (i.e. why it's so hard to find a 22" one).
Of course a search for '20" laptop' also finds plenty of discussions on both these laptops.
It's possible there's some super secret 22" mass-market (meaning something made to be sold to the general public, it's possible someone designed a 22" laptop for a customer on request) laptop that no one has ever heard of before and can't be easily found from searches, but I find this unlikely. As the relative ease with which discussions concerning the aforementioned 20"/20.1" laptops can be found attests, people naturally tend to be interested in such things so tend to discuss them even if they would never want one themselves. From a companies POV if you are making such an esoteric device it probably also helps if people know about it. (The plenty of discussions speculating on rumours of a 22" laptop shows the interest in discussion on a 22" laptop in particular.)
BTW that second ref mentions [4] the 'lenovo thinkpad w700ds' a dual screen laptop, also no longer available. However if you are interested in dual screen laptops a simple search for 'dual screen laptop' finds [5] and possibly others (didn't look in to results enough). Again no sign of super secret laptops.
Nil Einne (talk) 23:45, 12 January 2011 (UTC)[reply]
BTW similar to the above question have you considered the possibility of a touchscreen desktop? Something like [6] or [7] perhaps. Perhaps this will reduce the need for keyboards in some instances. I have no experience with how well these travel and how usable they are without keyboards or mice however. Nil Einne (talk) 00:05, 13 January 2011 (UTC)[reply]

Despite the lack of popularity in doing so, you can assemble your own laptop from separate components. ¦ Reisio (talk) 18:02, 12 January 2011 (UTC)[reply]

Firefox not saving cookies

Is there anything that would make Firefox not save cookies all of a sudden? This started happening to me a few days ago, and it's getting irritating because it will not allow me to remain logged into Wikipedia at this computer. (And before you ask, Firefox is presently not configured to delete cookies on close here.) —Jeremy (v^_^v Hyper Combo K.O.!) 11:16, 12 January 2011 (UTC)[reply]

Any response? —Jeremy (v^_^v Hyper Combo K.O.!) 04:30, 13 January 2011 (UTC)[reply]
What do you see when you go to Tools --> Options --> Privacy? Specifically, what is selected next to "Firefox will" and what is selected under "Accept cookies from sites"?--Best Dog Ever (talk) 04:40, 13 January 2011 (UTC)[reply]
Use custom settings; Accept cookies from sites and keep them until they expire. —Jeremy (v^_^v Hyper Combo K.O.!) 05:22, 13 January 2011 (UTC)[reply]
Try deleting your cookies and then logging in again.--Best Dog Ever (talk) 07:48, 13 January 2011 (UTC)[reply]
No such luck; it's still deleting cookies as it closes. —Jeremy (v^_^v Hyper Combo K.O.!) 07:58, 13 January 2011 (UTC)[reply]
Perhaps you have enabled private browsing? --Tardis (talk) 21:19, 13 January 2011 (UTC)[reply]
I have not. —Jeremy (v^_^v Hyper Combo K.O.!) 22:24, 13 January 2011 (UTC)[reply]

I'm confused by the question and follow up response; is Firefox not saving cookies at all, or just deleting them when you close the program? If the latter, check these settings 82.44.55.25 (talk) 22:50, 13 January 2011 (UTC)[reply]

Firefox is deleting them when I close the program, and, as I noted up top, is doing it in spite of the fact I have it set to not delete cookies on session close. (If it weren't saving cookies short-term, I couldn't log in to Wikipedia.) —Jeremy (v^_^v Hyper Combo K.O.!) 05:35, 14 January 2011 (UTC)[reply]
I don't think it's a problem of cookies. I select private browsing and when I close Firefox I delete everything, checking everything except Site Preference at the Setting for Clearing History, but I can remain logged in. Try to uninstall Firefox and re-install it. If it doesn't work, it might be an OS problem or something else. Did you update something lately? Oda Mari (talk) 06:45, 14 January 2011 (UTC)[reply]
No; I only just started to experience this problem within the past week just before the obligatory WinXP update. I'll take your suggestion, though, as soon as it is feasible for me. —Jeremy (v^_^v Hyper Combo K.O.!) 20:20, 14 January 2011 (UTC)[reply]
Works! Danke! —Jeremy (v^_^v Hyper Combo K.O.!) 04:01, 15 January 2011 (UTC)[reply]

tor

i cant get the Flash player to work. Any help?

Like if i were to go on youtube it wont work. — Preceding unsigned comment added by Tommy35750 (talkcontribs) 12:03, 12 January 2011 (UTC)[reply]

You will have to provide some more information as to how you are accessing Tor. The most common cause of this problem is that many browser plugins that make it easier to access Tor (such as Torbutton for Firefox) automatically disable Flash and other plugins by default because they can possibly leak your IP address. If you use one of those plugins, check its options and turn the option to disable other plugins off. Xenon54 (talk) 12:41, 12 January 2011 (UTC)[reply]

W3C suggestion box

Is there an official suggestions form for web standards in w3c's web site? נו, טוב (talk) 12:58, 12 January 2011 (UTC)[reply]

See this. As an individual, they would like you to help with translating their documents and promoting their standards, but there is little (if any) interest in your input. -- kainaw 13:25, 12 January 2011 (UTC)[reply]
You're more than decade late. Smallman12q (talk) 18:15, 13 January 2011 (UTC)[reply]

5stars

5stars — Preceding unsigned comment added by Mahmoud thalji (talkcontribs) 15:13, 12 January 2011 (UTC)[reply]

You may be looking for our article Five star, which is a "disambiguation page" containing links to many Wikipedia articles related to the concept of having five stars. On the other hand, if you intend with the above missive to award the Computing Reference Desk five stars out of five, we appreciate your rating and would ask you to tell your friends. Cheers! Comet Tuttle (talk) 17:55, 12 January 2011 (UTC)[reply]

Control-shift-J in chrome?

So what's the little interface I see at the bottom of the screen when I press Ctrl+⇧ Shift+J in Chrome? (Not Ctrl+J, which brings up downloads, but Ctrl+⇧ Shift+J.) My interest has been caught. It looks like somethig having to do with the source code of a page? Any help is appreciated. Thanks! --- c y m r u . l a s s (talk me, stalk me) 16:34, 12 January 2011 (UTC)[reply]

It's the web developer window, which has a bunch of tabs for different views of a running webpage that would be of interest to website authors trying to debug or optimise how their page works when viewed in Chrome. Firefox users have a similar thing if they install the Firebug (web development) extension. -- Finlay McWalterTalk 16:43, 12 January 2011 (UTC)[reply]
Running through the tabs left->right, there's:
  • elements: an HTML explorer, which shows the CSS markup that applies to a given tag
  • resources: shows files (and stuff) that have been loaded in order to render the page (images, stylesheets, javascript source files, etc.)
  • network: shows a log of recent HTTP transactions - this shows how the resources were loaded, and for AJAX pages shows the transactions that the page makes back to the server
  • scripts: shows the javascript scripts active on the page, and allows a website developer to debug scripts (place breakpoints, step through code, examine variables)
  • timeline: shows a nifty timeline/GANTT-chart like view of what's going on when a page is loaded and rendered (allowing you to profile slowdowns in the site - is it due to slow network traffic, slow scripts, etc.)
  • profiles: a profiler that shows where, in more detail, the execution time is spent. You'd use that if viewing the timeline didn't give you enough of an idea of where your code was spending all its time
  • audits: a tool that analyses a given web page and reports on whether it's making good use of certain web and server features; these can be good suggestions for improving the performance of a website
  • console: the console shows messages printed by javacript programs and errors reported when processing a webpage
All of this stuff is excellent info for web developers, and pretty much useless scary stuff for everyone else. -- Finlay McWalterTalk 16:53, 12 January 2011 (UTC)[reply]
Thanks! I get all curious and excited when I see shiny new pieces of code and I can't help asking --- c y m r u . l a s s (talk me, stalk me) 16:56, 12 January 2011 (UTC)[reply]

Two users simultaneously using one computer

Here's the situation: in my household, there is only one PC, a laptop running Windows Vista Home Premium, that has enough system resources (2 GB) that can adequately surf the internet, watch videos, etc. Problem is two people need to use that laptop for work. We've been switching turns for a while now, but it gets quite irritating having to wait for the other person to finish. We also have an extra monitor, keyboard, and mouse from older, non-working computers. I'm wondering if there's a way to "share" the laptop between the two of us such that one can use the actual laptop to work while the other uses the extra connected monitor, mouse, and keyboard. Unfortunately, it's not a simple matter of extending the desktop and then using something like TeamPlayer to create another mouse pointer, because only one window can be in focus at a time. I've heard using virtual machines like VMware might work, but I don't know how to make each machine use different mice/keyboards (or if I have enough resources to run memory-intensive applications while running a virtual machine)... Also, would using VirtualBox work instead of VMware?

I've searched on Google and have found a bunch of software that claim to do this, most of which are proprietary, including Windows MultiPoint Server, Userful (but it's Linux-only, unfortunately), and BeTwin VS. I downloaded the trial version for BeTwin VS, but it didn't seem to work (the laptop would crash BSoD style for unknown reasons after installation). So... does anyone have suggestions on how this goal would be accomplished? I would like to avoid having to buy things to get this to work. Thank you in advance, 151.198.251.165 (talk) 19:06, 12 January 2011 (UTC)[reply]

What you want is commonly called a "mutiseat" system. BeTwin works on Vista. I don't think MultiPoint will work for you because I've only seen it set up as a thin-client system, not a multiseat system. -- kainaw 19:30, 12 January 2011 (UTC)[reply]
Yes, I've tried the Vista version of BeTwin (which is what they called BeTwin VS). Unfortunately, for unknown reasons, the laptop would sometimes crash after running the Configuration Wizard. I might give it another try later if I have time. Thanks, 151.198.251.165 (talk) 20:12, 12 January 2011 (UTC)[reply]

You can get an entire additional computer for $100. You can get a competitive one for $400. You can switch to Linux. :) ¦ Reisio (talk) 21:10, 12 January 2011 (UTC)[reply]

It sounds like you're planning on attaching a monitor to the laptop's video-out socket. But for your two-user scheme to work, regardless of what software you use, the laptop's display adapter needs to be able to able to send a different signal to both screens (the laptop's own and the external one). The video chips used for laptops mostly don't support that: they allow the same signal to be sent to both (or to one or other) but usually not a different picture. That's unlike mid-range (and above) adapters for desktop machines, which routinely support dual-screen operation (and the software discussed above uses the same two-different-pictures capability that one-desktop-over-two-displays dual-screen feature needs). Some of the high-end adapters for fancy laptops do support dual-screen: if yours isn't one of them, I think you'd idea isn't viable. If you can tell us the specific model of the laptop (and ideally the model of the graphics chip, as reported in Vista's display properties screen) then we can look it up to see if it can handle it. -- Finlay McWalterTalk 21:25, 12 January 2011 (UTC)[reply]

Laptop is a Gateway MT6821, with a "Mobile Intel(R) 945 Express Chipset Family." Is that what you're looking for? 151.198.251.165 (talk) 22:10, 12 January 2011 (UTC)[reply]
Gateway's info for that laptop says it has a GMA 950 video adapter. The feature you'll need is what Intel call "dual independent display"; this is featured by the chipset, but seems to need some additional stuff as well. Gateway explicitly lists other Intel based laptops as having DID; it doesn't list yours as having it. But frankly both Intel's and Gateway's pages aren't very clear on the matter. Try plugging one of those other monitors of yours into the machine (and probably rebooting, just be be sure). If that model does support DID, you should see both monitors in the Vista Display control panel applet, with the option to stretch the desktop over both (rather than just clone it). If it doesn't offer that (with the latest display driver) then you may be out of luck. -- Finlay McWalterTalk 22:47, 12 January 2011 (UTC)[reply]
I can successfully "extend" the desktop over to the other monitor. 151.198.251.165 (talk) 23:41, 12 January 2011 (UTC)[reply]
It's one thing to 'extend' it, but I think what you're asking is for 2 computers, but only one doing all the work i.e. 2 computers running on one. Even if you extend it, you hve to find something that allows you to select a specific keyboard and mouse on a external monitor and the laptop keyboard and trackpad on the laptop screen. General Rommel (talk) 00:09, 13 January 2011 (UTC)[reply]
Well, yes, therein lies my problem. 151.198.251.165 (talk) 00:29, 13 January 2011 (UTC)[reply]

Our article, Multiseat configuration, lists hardware and software requirements. It is much easier to set this configuration up on Linux than on Windows. Here are instructions for Ubuntu MultiSeatX. Once booted into Ubuntu, you could each virtualize a Windows operating system if you need Windows software. Nimur (talk) 01:49, 13 January 2011 (UTC)[reply]

Archiving webpages for wikipedia

Specifics - the page COMSA contains many dead links to www.comsa.com as the company changed its name/redesigned its webpage etc. Is there a way I can get an archive version of these pages? Second question - is there a way I can mark webpages in wikipedia so that they are hopefully archived automatically ? if not how can I request archiving etc?Sf5xeplus (talk) 19:25, 12 January 2011 (UTC)[reply]

The remarkable Internet Archive, which is at archive.org, may have archived versions of the website. There is no mechanism for Wikipedia to mirror websites, no. Comet Tuttle (talk) 19:34, 12 January 2011 (UTC)[reply]
You can request WebCite archive pages for you. This doesn't involve wikipedia nor is it automatic (i.e. you need to submit every link) but these are accepted on wikipedia and you can add them to refs as an archive yourself. For the later part you should probably ask at the WP:Help desk Nil Einne (talk) 20:18, 12 January 2011 (UTC)[reply]


January 13

distinguish sound files

I know I already asked this, but I'm hoping there might be someone here today who has an answer.

I have sound files from field recordings that I recently found are not identical to their back-up copies despite having the same time stamp. (I discovered this when I scanned my comp for duplicate files.) I'm afraid that some program I used to listen to them may have made changes, though I never saved anything. This won't matter if it's metadata, but I wonder if some got slightly corrupted. I need to send copies to various archives, and am not sure which copy to rely on. Is there any free/shareware out there that will show me where the differences are? — kwami (talk) 22:59, 5 January 2011 (UTC)

As I mentioned before, if you can checksum the files, you can establish exactly-identical files. Similarly, checksumming the data portions of the files but excluding the metadata could establish exactly-identical audio data. For "almost identical" audio, the situation is much harder. This could be the case if the mp3 or file were transcoded - even if there is no perceptible change in audio quality.
Both Audacity and GNU Octave can plot, display, visualize, and manipulate audio files from standard formats. You can load audio files in Octave with auload:
% Example GNU Octave script to load and compare two WAV files:
[data1,fs1] = auload("file1.wav");
[data2,fs2] = auload("file2.wav");

% Check that the sampling rate and file sizes are identical
assert(fs1,fs2);
assert(size(data1), size(data2));

%Plot the residual error between the two audio signals
resid = data2-data1;
plot(resid);
If the audio is identical, the residual should be exactly zero; if the audio files are similar, the residual should be small. You can use ffmpeg to convert mp3 to wav files before diffing them. (I've thought about diffing the compressed data; but arguably, it is really best to decode it first, and then perform comparisons. It is best to diff an uncompressed waveform decoded by a standard tool - ffmpeg - because different decoders may produce different waveforms from the same mp3 data. Any tool that reverses the lossless coding of an mp3 must apply interpolations and to some extent, an heuristic algorithm. By using a standard tool like ffmpeg up front, we avoid hassles and get a uniform waveform). You can convert files from mp3 to wav easily using this command:
ffmpeg -i file.mp3 file.wav
If you are familiar with more sophisticated audio signal processing, you can design a program to check if the audio has been "trivially" altered, such as changing the volume, adding or removing a delay, and so on, using xcorr and other more complex audio processing. Unfortunately, because sampled audio is complicated, there is not an easier way to determine "almost" identical files. You could also investigate using a binary diff tool, but I have never found those to be very helpful. You could also wrap these conversions and comparisons into an Octave or other script. Nimur (talk) 23:30, 12 January 2011 (UTC)[reply]
As mentioned compression changes are more difficult to detect, but one potential (it a little work intensive) solution to other concerns would be to load both into a program like Goldwave (and I presume Audacity would have a similar capability), which will show the exact waveform. First check the attributes of the file for bit-rate, length, ect. then zoom in to a reasonable view that allows you to visually compare. It would be easy to do the things mentioned by Nimur (if the volume was increased, the peaks will be higher, a delay or echo will result in slightly shifted peaks or echo spikes. It might be a worthwhile way to quickly see if anything has been done 65.29.47.55 (talk) 22:13, 13 January 2011 (UTC)[reply]
Thank you, Nimur and anon! I'll try this out. I have .wav files which have not been intentionally altered since they were recorded (Marantz digital recorder); all I have done is transfer them from one drive to another, and play them with programs like SoundForge and PRAAT. — kwami (talk) 23:57, 13 January 2011 (UTC)[reply]

Big files and Fraps!

Hi, I use a program called "Fraps" to record and save videos of games that I play. I store the videos on my hard drive to later edit and upload to youtube. The only problem is that the video files end up way too large and they take up over 200 gigs on my hard drive. What are some programs that will help me scale down the size of the files without losing the high quality of the videos? What is the best program for this and whats the best free program for this?(I might be willing to pay some cash if the free programs prove to be too infective). I'd really appreciate some help and thank you for your time. :) (Ahalol123 (talk) 00:10, 13 January 2011 (UTC))[reply]

If you have money, Adobe Premiere will do this. Whether or not you have money, the free program VLC media player will do this, too. Of course, compression comes at a cost. You can tweak the video compression settings as you like to choose the tradeoffs between quality and file size — the higher the quality, the higher the file size will be. In your shoes, I would try several of the VLC settings using the highest quality compression settings possible and I think you'll be pleased. Comet Tuttle (talk) 00:17, 13 January 2011 (UTC)[reply]

Converting the video to XviD or h264 or something similar will drastically reduce the filesize. See Avidemux, Handbrake, MEncoder and Category:Free_video_conversion_software 82.44.55.25 (talk) 00:20, 13 January 2011 (UTC)[reply]

Thanks for all the help! I really appreciate it! My computer already has Adobe premiere installed, so money isn't really a problem. I'll try out both and see how good they work because I'm only really looking for the most efficient and quick program to use as I have a lot of files. Thanks again for the support! (Ahalol123 (talk) 00:30, 13 January 2011 (UTC))[reply]

Depending on what version of Premiere you are running, you may want to be sure to choose "Adobe Video Encoder" (or a similar item under the File menu) rather than "Save As" or "Export" — the former gives you the flexibility and codec options you'd expect. Comet Tuttle (talk) 22:44, 13 January 2011 (UTC)[reply]
FFMPEG, and the user-friendly version provided with the WinFF user-interface, are free software. FFMPEG supports conversion to and from almost all major formats. It is the core video engine used in almost all free and commercial (in modified form) video processors and players; so using FFMPEG nearly guarantees compatibility with most video players. Nimur (talk) 01:01, 13 January 2011 (UTC)[reply]

There's a lot of suggestions here, which one is the best? Thanks again for all the help. (Ahalol123 (talk) 02:15, 14 January 2011 (UTC))[reply]

I'm pretty sure every program listed above (excluding Adobe and maybe mencoder) uses FFMPEG "under the hood." So, you'll get the same results. HandBrake, WinFF, and so forth do have some value-add, being a bit easier to use (ffmpeg is a command-line tool); so it's a matter of your preference. In my opinion, the command-line interface is very easy to use; here are instructions for starters. Nimur (talk) 04:44, 14 January 2011 (UTC)[reply]

I tried using VLC media player and Virtualdub but I couldn't figure out how to do it properly, and then I used WinFF like you said but it took an extremly long time to compress and I was wondering if there's anyway to make it automatically compress another video after its done with one. (Ahalol123 (talk) 20:41, 15 January 2011 (UTC))[reply]

Being a command line, you can type several lines together into a script file (end in .bat) and then execute that. Video encoding takes plenty of CPU, so you will need to pick te options that make the best use of your cpu's instruction set. If you have multiple disk drives put your output on a different disk from the input. Graeme Bartlett (talk) 21:07, 15 January 2011 (UTC)[reply]

I only understood like 1/5 of what you just said, LOL. (Ahalol123 (talk) 21:55, 15 January 2011 (UTC))[reply]

Graeme was explaining that video processing normally takes a long time. It can take anywhere from several minutes to many hours to process "normal-sized" videos on moderately-powerful computers. If you want to squeeze a bit more performance, you can follow those suggestions, but it's probably not going to make a huge difference. Nimur (talk) 17:54, 16 January 2011 (UTC)[reply]

Flash 8 (ActionScript 2.0) question

Another question because of my complete n00bness! So, on the first frame:

stop();
var a:Number;
var c:Number;

On a button (I called it 'hello') in the same frame:

on(release){
	a = (c) * (3);
	gotoAndStop(2);
}

There is a textbox in the same frame with the variable c. You can input text in it (I don't know the exact name for this kind of boxes because I'm using the Chinese version.)

On frame 2, there's a textbox (which is able to display variables, but you can't input anything into it), and its variable is a.

What went wrong? Thanks Kayau Voting IS evil 10:48, 13 January 2011 (UTC)[reply]

What is not behaving the way you expect it to? I see your code, but I don't see what you are expecting it to do. --Mr.98 (talk) 14:45, 13 January 2011 (UTC)[reply]
Make sure the input text box has an instance name. (In the example below, I named it txtInput. Then, try something like this:
on(release)
{
	c = txtInput.text;
	a = (c) * (3);
	gotoAndStop(2);
 }
Then, add a text field to the second frame, make it dynamic (not static), and give it an instance name. In the example below, I called it txtOut:
stop();
txtOut.text = a;

--Best Dog Ever (talk) 19:22, 13 January 2011 (UTC)[reply]

Thanks! (BTW, it's for the same game that I asked about last year. Yeah, I still haven't finished it.) Kayau Voting IS evil 13:40, 14 January 2011 (UTC)[reply]

Copy (file differences)

If I have a 10GB file and change one tiny part of it, to copy the modified file to a backup drive with Windows 7 requires that the entire 10GB be copied. Is there a way to copy just the new changes of the file, similar to how DropBox only uploads the changed parts and not the entire file? 82.44.55.25 (talk) 14:56, 13 January 2011 (UTC)[reply]

If the file is in a human-readable text format, then the diff program can extract the differences, and the patch program to reapply them to the original. These are standard UNIX tools, and should be available on MacOS. There are ports to MS-Windows, including the cygwin and mingw toolsets. BTW, I've taken the liberty of clarifying the question's title CS Miller (talk) 15:27, 13 January 2011 (UTC)[reply]
This is delta encoding; the standard tool I know for it is rsync (the article lists Windows implementations). --Tardis (talk) 15:30, 13 January 2011 (UTC)[reply]
The problem is that file systems keep track of when each file was last modified, but not of which parts were modified when. Therefore, you would have to read the old file in its entirety to figure out which parts had changed, and that will take about as long as blindly writing over the whole thing. Rsync saves time when the bottleneck is a slow network connection, rather than the disk. It still reads the whole file, but it uses CRCs to compare the old and new data without sending it over the network. -- BenRG (talk) 23:23, 13 January 2011 (UTC)[reply]

Developing Native iPhone applications on Windows

I know that there are ways of writing iPhone applications on Windows and I was wondering how I could set up a native build environment on Windows that can compile to current (iOS 3.x and iOS 4.x) versions of iOS. iOS devices use an ARM architecture and GCC and LLVM/Clang can compile to ARM instructions sets so how would I go about using one of these to compile an iOS app into an IPA file (a ZIP file that contains the app payload for iTunes? Please, save any comments about how iOS SDK is only for the Mac or how the Apple won't allow apps developed with third-party tools because I couldn't care less about Apple's rules. --Melab±1 16:39, 13 January 2011 (UTC)[reply]

Because Apple iPhone's system architecture is proprietary, and nobody has yet reverse-engineered it, writing software for their phone without their SDK will be much more complicated than merely compiling for the CPU. (GCC can trivially cross-compile for many architectures). Compiling valid machine-code for their CPU is step one. But you also need to know what addresses and interface protocols they use for at least the following: their boot sequence; their nonvolatile storage; their video output interface; and their user-input interface. As I understand the iPhone and iPod products, they also have hardware signed executables - so you will have to learn that system and either bypass or spoof it. To accomplish these tasks, you could assume whatever you like about those systems, and perform a trial-and-error compile cycle, but if you are incorrect, you may compile a perfectly functional and valid executable that is not able to do anything on the iPhone. You probably also will want to reverse engineer their network stack, their peripheral devices, and presumably any hardware accelerators that reside on- and off-chip on the phone. Apple doesn't publish what memory-mapping, CPU instruction extensions, or other unknown mechanisms are used to perform those interfaces, so you will have to "guess", based on any information you can glean from their official development environment. Nimur (talk) 17:32, 13 January 2011 (UTC)[reply]

200 Apple

This link returns the http status code "HTTP/1.1 200 Apple". List of HTTP status codes does not list this, nor can I find any information via google on what "200 Apple" is about 82.44.55.25 (talk) 19:44, 13 January 2011 (UTC)[reply]

In HTTP, like several other Internet protocols, the text after the 3-digit code doesn't have any strict meaning. It's just there to make the response more human-readable. A server can use the generic "OK" or something more informative. This "Apple" probably just means that some Apple software is being used on the server. Whatever it is, it's meaningless to the HTTP client. See RFC 2616 section 6.1.1 67.162.90.113 (talk) 20:23, 13 January 2011 (UTC)[reply]
It's informational as .113 says. Apparently it's put out by systems running WebObjects, which is weird because there's also a "X-Powered-By: ASP.NET" header there. --Sean 20:54, 13 January 2011 (UTC)[reply]

remove duplicate lines

I have a text file with lets say a million lines in it, but many are duplicates. How, on Windows 7, could I automatically remove the duplicate lines leaving only one instance of each? 82.44.55.25 (talk) 20:07, 13 January 2011 (UTC)[reply]

http://www.netikka.net/tsneti/info/tscmd097.htm ¦ Reisio (talk) 20:24, 13 January 2011 (UTC)[reply]
1. Install ActivePerl. 2. Run this:
perl -ne 'print unless $saw{$_}++' input.txt > output.txt
Done. --Sean 20:59, 13 January 2011 (UTC)[reply]

Twitter Terms of Service

In their official Terms of Service, Twitter states: "We may not monitor or control the Content posted via the Services and, we cannot take responsibility for such Content." I am confused about the phrase "we may not..." Does this mean they are not permitted to monitor or control the content, due to some legal obligation? (Wiretap legislation comes to mind). Or, does this merely mean that they might not choose to monitor or control content, depending on their mood? Nimur (talk) 21:09, 13 January 2011 (UTC)[reply]

I think they mean the latter; it's their get-out clause when their service is misused in some way, or when a kid posts a suicide note or something. -- Finlay McWalterTalk 21:17, 13 January 2011 (UTC)[reply]
Yes, I would read it as the latter. Think about it: how likely is it that a company would ban themselves from "monitoring" the content on their own service? "Monitoring" might mean as little as "a guy looks at a post once in a while". Comet Tuttle (talk) 22:42, 13 January 2011 (UTC)[reply]
I understand (although I may be wrong) that it operates in a similar way to facebook in that regard - They don't employ people to monitor all facebook posts/updates, but they do have a team to respond to notifications about spam posts/users or innapropriate content. This system relies on users of the service (in this case twitter) reporting the content/post/update - Facebook has a 'flag' button to report such content, twitter allows you report spam-users. You may have already read this, but if you haven't, it gives a little insight into how they deal with problem users Darigan (talk) 15:11, 14 January 2011 (UTC)[reply]
(Above unsigned post not added by me.) In concurrence with CT and FM, I'd say basically it's way of covering both their bases. It's a disclaimer they don't normally monitor, so aren't responsible for content. But they also don't want to suggest they never monitor, since they may very well do so in some cases and don't want people taking their statement as a guarantee they don't monitor (and trying to sue them if they do). As unsigned says, as with many services they almost definitely primarily rely on users reporting problems. Nil Einne (talk) 14:41, 14 January 2011 (UTC)[reply]
The post above Nil Einne's was mine, forgot to sign it, sorry all (just added sig now) Darigan (talk) 15:11, 14 January 2011 (UTC)[reply]

Screen saver with own pictures

I want to make someone (who uses Windows XP) a screen saver with own pictures. I know that Windows XP allows you to use any pictures with a Windows screen saver... but I'd rather use something else as long as it's a) free, b) add-free, c) easy-to-use / -install (and ultimately de-install!), d) doesn't bog down the system, and e) small. Does software like that exist?

(The background is that I got from that person a screen saver as a present years ago when Windows didn't yet offer the built-in saver. Now I'd like to "return" the present, a little tongue-in-cheek of course, but I'd rather not just copy pictures onto the person's computer saying "Hey, use those with your own software!" On the other hand we both know of course that Windows offers the service for free and with decent quality, so it shouldn't be any worse than that.) Thanks a lot, Thanks for answering (talk) 22:49, 13 January 2011 (UTC)[reply]

Running out of memory when using IE on YouTube

If I run through several videos in a YouTube Playlist while using IE, eventually my computer stops running videos because IE (I'm using IE 8) fills up all of the available memory. I can look at Task Manager and see that iexplore.exe is huge, and I have to kill IE and restart to continue watching videos. This does not seem to be happening with Firefox, though I don't normally use Firefox to watch YouTube videos. Is there something I can do to get IE to release its used memory, or is this just a problem that I'll have to deal with by using Firefox on YouTube all the time? (I already use Firefox for Wikipedia because IE takes eons to display history pages in WP). Corvus cornixtalk 23:53, 13 January 2011 (UTC)[reply]

You might consider using Google Chrome Frame, which works inside IE. You could likely then get even further performance boosts by joining the YouTube trial which uses natively supported WebM video playback instead of Flash-embedded playback. …or you could just stop using IE. :p ¦ Reisio (talk) 01:38, 14 January 2011 (UTC)[reply]
Either close down browser tabs you don't need (each of the tabs is a separate Internet Explorer process, using up a lot of memory), use a more memory-efficient browser, or install more memory. 118.96.158.185 (talk) 01:38, 14 January 2011 (UTC)[reply]
The reason why I prefer IE over Firefox is that my RealPlayer is configured to download videos when using IE, but not when using Firefox. Corvus cornixtalk 02:20, 14 January 2011 (UTC)[reply]
Wha? ¦ Reisio (talk) 02:32, 14 January 2011 (UTC)[reply]
??? Corvus cornixtalk 03:03, 14 January 2011 (UTC)[reply]
I'm betting that Reisio is wondering why anyone would use RealPlayer. Go ahead and read the article to see what I mean. Dismas|(talk) 03:20, 14 January 2011 (UTC)[reply]
Because it lets me download videos direct from the video screen. Of course, they're in .flv format, but then I can convert them for my video MP3 player. Corvus cornixtalk 03:24, 14 January 2011 (UTC)[reply]
Did you know that you can cut out a step by doing all of that in Firefox? Dismas|(talk) 03:54, 14 January 2011 (UTC)[reply]
Thanks, that was good to know, but RealPlayer lets me download videos from other sites as well. Corvus cornixtalk 04:18, 14 January 2011 (UTC)[reply]
How about this add-on instead? Or you can try upgrading RealPlayer and/or Firefox. I have both RealPlayer SP 12 and Firefox 3.6 installed, and that version of RealPlayer claims to support "Web Download & Recording" on Firefox (it has the options to enable the feature, but I never actually used that feature). 118.96.158.185 (talk) 04:51, 14 January 2011 (UTC)[reply]
Hah. Thanks. I didn't know about that. I didn't have to do any configuring to get it to work with IE. Cheers. Corvus cornixtalk 05:21, 14 January 2011 (UTC)[reply]


January 14

Google docs arrow keys

Hi. I use google docs and by and large it's great. But sometimes the arrow keys on my keyboard don't work. This happens on linux and mac, always using the latest version of firefox. Does anyone else experience this? It's very annoying because I have to use the mouse to navigate and this takes my fingers away from the keyboard. Does anyone have any advice? Robinh (talk) 10:13, 14 January 2011 (UTC)[reply]

Since nobody's answered, a wild guess: Are you using a laptop with a touchpad as well as a mouse, and is it just the arrow keys that cease to work when this happens, or does the keyboard stop working? If so, what's happening might be that you're accidentally touching the touchpad when the mouse pointer is outside your document. That will cause your document to lose keyboard focus, and you'll need to use the mouse to give keyboard focus back to your document. If this is the case, a solution would be to deactivate the touchpad, or to reduce its sensitivity. --NorwegianBlue talk 10:05, 15 January 2011 (UTC)[reply]
Hi. Nope, the keyboard works fine but the arrow keys do not apparently do anything. It's very annoying (but only a problem about half the time I use googledocs). Cheers, Robinh (talk) 09:10, 16 January 2011 (UTC)[reply]

USB media - hard disk or not?

On a recent Linux distribution, which commandline tools can tell me whether a USB device is an external hard disk or another (storage) device like a flash memory stick? I'm writing a script that is supposed to write data to an external hard disk (connected via USB), but I want to avoid accidentally overwriting a flash memory stick that the user might have left plugged in. -- 78.43.71.225 (talk) 11:02, 14 January 2011 (UTC)[reply]

You might be able to examine /sys/class/block/<devicename>/device/model to detect a flash disk. (where <devicename> is something like sda, sdb, etc.). -- JSBillings 16:28, 14 January 2011 (UTC)[reply]
I found no /sys/class/block/<devicename>/device/model, only a /sys/block/<devicename>/device/model, which contains part of the manufacturer name for each device, it seems. I did find /sys/block/<devicename>/removable, which contains "1" for a flash memory stick, and "0" for both the first hard disk as well as the one connected via USB. I'm not sure that this is a reliable way of detecting a hard disk, though. Any further suggestions? -- 188.105.132.219 (talk) 16:56, 14 January 2011 (UTC)[reply]
IIRC, MS-Windows 7 uses the device's sustained read speed to detect if it is flash drive, you might need to do something similar. CS Miller (talk) 17:17, 14 January 2011 (UTC)[reply]
Use smartctl? I don't think flash drives and memory sticks have S.M.A.R.T. information, while I think hard drives and SSDs do. 118.96.156.2 (talk) 17:25, 14 January 2011 (UTC)[reply]
Hard drives and SSDs do have S.M.A.R.T. information, but it seems not every USB controller is able to forward this info to the host, so this isn't reliable, either. :-( -- 78.43.71.225 (talk) 17:38, 14 January 2011 (UTC)[reply]
smartctl, like hdparm -I works on ATA/ATAPI devices (that is, devices on the ATA and workalike busses). In my limited experience (that is, checking a couple of Ubuntu systems today, trying to find a decent answer to this question) suggests that the Linux usb mass storage device driver stack doesn't implement the requisite ioctls (even for an ATA drive in a USB enclosure), so neither seems like a viable option. -- Finlay McWalterTalk 17:39, 14 January 2011 (UTC)[reply]
Do you have "usb-devices" installed? When I run that, I see info under "Product=" that identifies what is plugged in. I can identify USB storage devices because they have "Driver=usb-storage". I tested a thumbdrive and it came up "Product=LEXR PLUG DRIVE". It is possible that "Cls=08" may be a thumbdrive storage class, but I don't have a usb harddrive to compare with. -- kainaw 17:39, 14 January 2011 (UTC)[reply]
usb-devices is not a supported command on my install of Ubuntu Hardy Heron. :-( According to packages.ubuntu.com, it is also not part of any package belonging to Hardy. :-( -- 78.43.71.225 (talk) 17:53, 14 January 2011 (UTC)[reply]
I don't think that's sufficient. Below is a trace of usb-devices on a machine with a SanDisk Cruiser USB flash disk and a LaCie USB disk enclosure:
T:  Bus=01 Lev=01 Prnt=01 Port=04 Cnt=02 Dev#= 40 Spd=480 MxCh= 0
D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
P:  Vendor=059f ProdID=1019 Rev=00.01
S:  Manufacturer=LaCie
S:  Product=LaCie Desktop Hard Drive
S:  SerialNumber=00E0010080086
C:  #Ifs= 1 Cfg#= 1 Atr=c0 MxPwr=2mA
I:  If#= 0 Alt= 0 #EPs= 2 Cls=08(stor.) Sub=06 Prot=50 Driver=usb-storage

T:  Bus=01 Lev=01 Prnt=01 Port=06 Cnt=03 Dev#= 39 Spd=480 MxCh= 0
D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
P:  Vendor=0781 ProdID=5151 Rev=02.00
S:  Manufacturer=SanDisk
S:  Product=Cruzer Micro
S:  SerialNumber=2400121D52C0F953
C:  #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=200mA
I:  If#= 0 Alt= 0 #EPs= 2 Cls=08(stor.) Sub=06 Prot=50 Driver=usb-storage
I don't know what the Atr=80 field is, but other than that only the MxPwr=200mA field looks discriminatory. -- Finlay McWalterTalk 17:52, 14 January 2011 (UTC)[reply]
Here's a hack: lsusb -v, and for each device find its MaxPower setting. For me, a genuine flash external disk has a MaxPower of 2mA, whereas a "real" disk in a USB enclosure has a MaxPower of 200mA. Other than that, I don't know of a way to determine the actual media of a linux block device (bar a vendor/deviceID lookup using the data JSBillings' post retrieves, which is a labourious business). -- Finlay McWalterTalk 17:46, 14 January 2011 (UTC)[reply]
Sadly, I'm getting just the opposite result here: the stick draws 200mA, the hard disk only 2mA (it has an external power supply) -- 78.43.71.225 (talk) 17:56, 14 January 2011 (UTC)[reply]
Sorry, I mixed the two up - if you look at my trace above, I get the same as you. The SanDisk is the flash stick. -- Finlay McWalterTalk 17:59, 14 January 2011 (UTC)[reply]
Okay, now I will have to look for a USB-powered hard disk to check how that one shows up. -- 78.43.71.225 (talk) 18:08, 14 January 2011 (UTC)[reply]
The fly in the ointment will be bus-powered usb disk enclosures (the slim kind that take laptop hard disks). -- Finlay McWalterTalk 18:13, 14 January 2011 (UTC)[reply]
Drat, so we're back...

... to square one, I guess. -- 78.43.71.225 (talk) 18:22, 14 January 2011 (UTC)[reply]

On a more fundamental level, what is the difference between a hard disk and a flash stick? Capacity? Moving parts? Nowadays there are solid state hard drives - no moving parts, used like hard disks. mp3 players can be plugged into USB and look like memory devices - some have rotating disks, some don't. A device might accidentally give a hint about its internal mechanics, or it might not. Should you really care?
If you really need to make a guess, how about looking at the device's maximum storage capacity, or available free storage, and deciding that anything over X GB is a "disk".
Or how about this: on disks that are allowed backup(whatever) devices, manually create a file called "this-is-a-backup-disk-please-write-backups-here". Your script will check for that file and if it is there, the script will do its thing. Random memory sticks won't have the file and your script will abort. 88.112.59.31 (talk) 20:34, 14 January 2011 (UTC)[reply]
Sadly, these approaches don't work, or at least not for long. I'm trying to build a box where the user can pull copies of a hard disk image onto "the real thing". Some of these disks are SSDs for embedded systems and have capacities of 60 or 64 Gigabytes - and with USB flash memory becoming larger and larger, using the maximum capacity of the medium as an indicator won't work (at least not for long).
The reasons why I need to be able to tell a flash memory stick apart from a SSD or moving-parts hard drive are:
  • Sometimes, data (new images) is transferred to this box via flash memory stick. Overwriting this stick, just because a user forgot to remove it in time, would be anything but user-friendly.
  • The SSDs or hard disks will be plugged in via SATA interface in their destination systems (in other words, the USB enclosures the users bring along are only temporary casings) - a flash memory stick doesn't have a SATA interface, plus the machines that still use moving-parts hard disks write to the disk pretty often, so flash memory will wear out. (I've seen two new high-quality USB sticks die in a similar application in the last 6 months. I know that these days, this shouldn't happen any more, but I guess these claims only refer to home use - heavy-duty writes like logging or database access, even today, still do kill flash memory sticks, I have seen it happen.)
Since this box will be available to a larger group of users, I have no control over the USB sticks or hard drive enclosures they will bring along, so writing a "it is (not) safe to overwrite this disk" file on the media won't work.
-- 188.105.132.219 (talk) 21:52, 14 January 2011 (UTC)[reply]
Why not present a user interface from your script to let the user pick the correct mode of operation? 118.96.154.64 (talk) 23:23, 14 January 2011 (UTC)[reply]
(EC with above) An obvious question that comes to mind that I think others may have been thinking of: Are you sure no one is ever going to connect what you consider a HD, that they don't want to be overwritten, to the computer? If you aren't even if you can differentiate the 2, it's not going to ensure you don't overwrite stuff people don't want you overwriting.
Is it possible you're approaching this from the wrong way? I kind of skimmed thru the discussion so forgive me if I missed it but is there some reason you can't ensure the HDs you want to use are identified as such. Whether a file, volume name or simply requiring the disks are cleared before they are brought to be written i.e. just don't overwrite anything.
If this doesn't work, is it possible to just ask the user? Use double prompts perhaps, with clear phrasing, perhaps even requiring they type YES or something (whatever you think is necessary).
The other alternative is probably physical. Is it possible to designate one set of USB ports or one port for bringing data? And one set or one port for connecting the backup devices. Make sure these are properly seperated and perhaps put the ports for backup devices behind a hinged door or something with a clear label indicating anything connected to them may be overwritten. Then design your script so it only writes to disks connected to these ports.
In both cases some people may still be clueless or careless so wind up overwriting what they don't want overwritten but ultimately there's only so much you can do to stop people doing stupid things.
Nil Einne (talk) 23:31, 14 January 2011 (UTC)[reply]
The "Store image" function should probably be restricted or removed anyway (either password-protected or disabled – images should be stored using special root access). The case is, what if someone were to present an incorrect, corrupt, malware-infected, etc. image to the system? Will that image be restored into subsequent disks presented to the system for restoration? 118.96.154.64 (talk) 23:50, 14 January 2011 (UTC)[reply]
All the users of this system belong to Field CircusService, and the machines they're imaging a) don't run Windows and b) are not accessible to end-users, plus the image they're storing is an individual image for each machine, so even if something does go belly-up, it cannot spread to other machines. This makes me believe that the risk in my particular case is rather low. They know that if they mess with the system, they end up creating more work for themselves (reimaging is faster than reinstalling and reloading the config, but they do have access to the full installation procedure as well, so we're not creating a deadlock situation here). I just want to keep them from accidentally shooting themselves in the foot by overwriting a forgotten USB stick. -- 78.43.71.225 (talk) 13:55, 15 January 2011 (UTC)[reply]
Thank you for all of your input. Since it seems nigh impossible to detect the media type via USB, I will probably be using a SATA drive bay for the disks. Of course, this means the users will have to power-cycle the computer before swapping hard drives, as the standard SATA controller doesn't support hot-swapping, but since the only media connected via USB will be a memory stick, all I have to do is check for connected USB devices and complain/abort if there is one. Since all USB devices automatically get mounted under /media/usbn, something like
umount /media/usb*
lsmod | grep usb_storage && rmmod usb-storage
and checking its return code (if the module could not be unloaded, it means that a usb storage device is still in use) should do.
After that,
fdisk -l|grep '^Disk /dev'|tail -1|awk '{ print $2 }'|tr -d ':'
should tell me the name of the last disk available to the system, and if it doesn't equal a disk listed in
df|grep '^/dev/'|awk '{ print $1 }'|tr -d '[0-9]'|sort -u
I'm good to go.
Of course, if anyone knows a simpler way of solving the issue, feel free to comment. :-) -- 78.43.71.225 (talk) 13:55, 15 January 2011 (UTC)[reply]

Full Screen Games Minimizing On Start

Hey all,

I've got an intermittent problem that's been doing my head in for quite a while. I've looked around on the internet for people with the same issue, and it seems there are many of us, but surprisingly few people (i.e. zero) with the answer. My problem is that when I launch a full-screen game, it minimizes almost immediately, and no matter how many times I click the tab in the task bar, it won't stop minimizing. A restart of Windows generally sorts the problem out. Now, I will anticipate a few of the possible answers I may get:

  • Do you have an IM running, as it sounds like something is demanding attention? Yes and no. I have tried playing games with and without an IM running, and I still get the same problem.
  • Do you have the latest version of your video card's driver? My driver is updated automatically whenever an update is available, so, yes.
  • Have you tried running games in windowed mode? Yes, I have, and this solves the problem. Unfortunately, not all games have a windowed mode (and many of the ones which have won't stay on screen long enough for me to change the settings).

My computer is a G60 Netbook from HP. This problem has only been occurring since October of last year. I recently reinstalled Windows (due to an unrelated issue), and the problem is still happening. Like I say, after restarting Windows, the problem is usually fixed, at least for a few games, before it starts happening again.

Any help would be appreciated. --KägeTorä - (影虎) (TALK) 19:33, 14 January 2011 (UTC)[reply]

I have noticed a similar annoying symptom for the last few weeks when playing Civilization IV recently (which I bought on Steam) on my Windows Vista machine. I do task-switch often via alt-tab, and I do play Civ IV as a full-screen game. When I alt-tab back to Civ IV, it will sometimes switch right back to the Windows desktop. I have found that if I alt-tab to Civ IV and quickly click the left mouse button, it won't task switch back to the desktop, and I have assumed there's some errant bit of code somewhere which believes that I've clicked the Windows desktop and it switches me over there; and the Civ IV click stops this behavior. I'd be interested to know if this helps your symptom, too - Comet Tuttle (talk) 23:06, 14 January 2011 (UTC)[reply]
It doesn't help - I often click or press escape after re-maximising the game, and I am not sure if it is helping because the game will sometimes minimise itself again and sometimes not. It is pretty frustrating, and seems to happen more with older games (pre-2008), although it sometimes happens with the newer ones too, especially if I've tried to play an older game first and this has happened. I forgot to say I am on Vista. --KägeTorä - (影虎) (TALK) 02:38, 15 January 2011 (UTC)[reply]
I have no references for this, but I just wanted to throw out an idea: Could it be that the games are trying to use resolutions not supported by your monitor? Google suggests that the G60 has a resolution of 1366x768 and a lot of older games especially wouldn't support widescreen. Normally I'd expect the monitor to resize accordingly, but maybe that's the problem and it doesn't/can't. Try going into your display settings and changing the resolution to 1024x768 (assuming you can - things will either look stretched or will have black edges) and then try your game and see if it's made any difference?  ZX81  talk 15:22, 15 January 2011 (UTC)[reply]
Well, the thing is, once one game starts this pallavah, they all start doing it, no matter what the resolution is. A restart will generally sort the problem out. Defragging sometimes seems to help, too. It's only been happening since October or so of last year, and before that I'd never experienced anything like it. Not only that, I can play the same games on my Ubuntu partition (using Wine) and I don't get the problem even once. --KägeTorä - (影虎) (TALK) 20:09, 15 January 2011 (UTC)[reply]

Ubuntu

Between Ubuntu variants, is there really any significant difference? And are there any major flaws or advantages of any specific variants (especially version 10.10 "Maverick Meerkat")? Thanks, --T H F S W (T · C · E) 21:31, 14 January 2011 (UTC)[reply]

Regular Ubuntu uses GNOME as its desktop environment (with a bunch of associated helper apps); Kubuntu uses KDE instead. Some folks think GNOME is easier to use, or perhaps a bit more like Microsoft Windows, and find KDE a bit techie; other folks think GNOME is inefficient and unconfigurable. In practice almost all applications will run in either environment (as Kubuntu still installs GNOME's underlying toolkit, GTK, and Ubuntu still installs KDE's underlying stuff, including QT). For a full-featured desktop, it really doesn't matter which you use, and if you don't know (or don't care) then just use regular Ubuntu. Xbuntu eschews both for a lighter-weight environment; it's more suitable for older, cheaper, or otherwise more resource constrained environments. Canonical produces a server variant of Ubuntu too; that's really mostly just the desktop one with the graphical stuff removed (and with some changes to configuration to best suit a server environment). But the desktop variant can install all the server stuff, and the server variant can install the desktop stuff, so they're not that far apart. Only use the server variant if you're setting up a genuine dedicated server machine. Beyond that there's stuff for specific purposes (produced by other development teams) like Edubuntu, which are really just regular Ubuntu with a tailored set of applications that come by default. As to versions, there's almost no reason to ever install anything but the latest one. Only people with very specific requirements to deliberately run older software (mostly to keep uniformity and predictability in an enterprise environment) should ever install the older versions. -- Finlay McWalterTalk 22:28, 14 January 2011 (UTC)[reply]

I'd stick with LTS (long term support) releases, if I used Ubuntu. Latest is 10.04, and it will be supported longer than 10.10. If you know what you're doing it won't matter, but it's slightly more insulation. I'm with Finlay mostly, but think Windows users will tend to prefer KDE. Some of the derivative distros are officially supported by Canonical, some are not, FYI. ¦ Reisio (talk) 22:34, 14 January 2011 (UTC)[reply]

It'd recommend LTS for an enterprise with hundreds of machines doing mission-critical work, where they didn't want to take the risk (and cost) of upgrading machines to a newer version during their design lifespan. LTS just means they'll continue to get patches on that install for longer. For everyone else, and I'd say for any new Linux user, the newest release is best; Canonical (and the Debian teams that do much of the work) have done a great job in making the last few Ubuntu versions (for at least two or three years) very stable. -- Finlay McWalterTalk 22:48, 14 January 2011 (UTC)[reply]
The idea of using Ubuntu for something mission critical is frankly laughable. I agree, however, that it will only make a difference to the truly uninitiated. ¦ Reisio (talk) 03:26, 15 January 2011 (UTC)[reply]
[citation needed] Marnanel (talk) 03:37, 15 January 2011 (UTC)[reply]
Ubuntu is a derivative of Debian. Debian is for home or personal use, not mission critical use. The main issue here is that package maintainers are allowed to alter the code for the package as they see fit without sending it back upstream to a main oversight group. For example, the openssl package maintainer removed a random number seed in the openssl package because he didn't think it was necessary. The change was not part of oversight. For over two years, nobody noticed (except hackers). Then, it was discovered that all of the ssl keys in Debian were weak and guessable. All Debian users had to regenerate them. An alternative is something like RedHat. All changes require extensive oversight because it is designed for a mission critical environment. For home/personal use, it isn't very nice because that is not the target market. It all boils down to two markets: Get updates slow but highly secure vs. Get updates right away and find the bugs later. -- kainaw 03:58, 15 January 2011 (UTC)[reply]

iPod touch Backup

I am running Mac OS X 10.5.8 and I have a 4th generation iPod touch running iOS 4.2.1. I have app data on it that I would like to save. I'm confused about whether or not backing up my iPod through iTunes saves app data because I've read that only certain apps allow for app data to backed up, or it doesn't backup app data, etc. I have James Cameron's Avatar: The Game on my iPod touch and I've gotten pretty far in it and I want sync a couple of recent previous firmwares and iOS 4.3 beta on my iPod touch so I can get their SHSH blobs with Tiny Umbrella. I've looked at the size of the backup created by iTunes and it is only 44 MB in size which seems way too small to have backed up all app data, contacts, etc.

So, I want to know if there is any program out there that I can use (compatible with Mac OS X) that can backup everything on my iPod touch, in a manner similar or the same as flashing the memory (when I say flash I do not mean Adobe Flash or wiping it clean) without a jailbreak? I think it might be theoretically possible by just ignoring file system privileges in the same manner some builds of xpdf can view a PDF document without respecting the DRM. --Melab±1 23:22, 14 January 2011 (UTC)[reply]

Help would be appreciated. This is time-sensitive. --Melab±1 00:37, 15 January 2011 (UTC)[reply]

Keyboard shortcut for the back button

In Internet Explorer, pressing backspace does the same thing as clicking the back button, and over many years of using windows I have got very used to this shortcut. At work I use Ubuntu and I find with Firefox the keyboard shortcut is Alt+Left-arrow which requires two hands and is pretty inconvenient (only the left-Alt works and the keys are too far apart to do this with one hand). Several times a day I automatically press the backspace and ponder for a few seconds how much longer it is going to take to go back to the previous page, before I realise I have done the wrong shortcut yet again. Until recently, I though Firefox didn't support changing the shortcut until I came across one that did. Unfortunately, I was in the middle of a training course I didn't have time to check out the settings. So, how do I change the keyboard shortcut for the back button, so it works like Internet Explorer? Astronaut (talk) 22:02, 14 January 2011 (UTC)[reply]

Open about:config and change browser.backspace_action to 0. Algebraist 22:10, 14 January 2011 (UTC)[reply]
Thanks. I'm not at work now, but I'll check it out. However, the about:config sounds interesting... where can I find out what else I can do with it? Astronaut (talk) 22:25, 14 January 2011 (UTC)[reply]
ALT+lArrow and backspace are actually redundant shortcuts, FYI, you don't have to pick just one. IME Linux builds tend to have the backspace shortcut enabled by default, which actually always bothered me personally :P while the Windows builds do not, IIRC. More shortcut configuration: http://forums.mozillazine.org/viewtopic.php?t=72994 ¦ Reisio (talk) 22:30, 14 January 2011 (UTC)[reply]
http://kb.mozillazine.org/About:config_entries for starters. ¦ Reisio (talk) 22:27, 14 January 2011 (UTC)[reply]
Resolved

Works like a dream. Thank you. Astronaut (talk) 22:09, 17 January 2011 (UTC)[reply]

Hotmail has started delivering spam not addressed to me

In the past few days I've been getting a few spam emails in my hotmail inbox which are not addressed to me, but to possibly similar addresses or sometimes addresses which are not at all similar.

Does anyone know why this is happening please? I installed Thunderbird recently, cannot remember if I did this before or after getting the spam, and it could be just coincidence. Thanks 92.15.25.173 (talk) 22:10, 14 January 2011 (UTC)[reply]

Just sounds like regular spam to me. Your address is probably on a spam list somewhere, either from a site you gave your address to, or from one of your friend's compromised computers. Astronaut (talk) 22:23, 14 January 2011 (UTC)[reply]
It is just regular spam. I get messages (to my hotmail) addressed to someone else quite often, and usually from contacts with hotmail addresses. --KägeTorä - (影虎) (TALK) 22:58, 14 January 2011 (UTC)[reply]

I do not understand why Hotmail is sending me things that are not addressed to me. 92.24.180.142 (talk) 23:30, 14 January 2011 (UTC)[reply]

Email contains two different parts: the human-readable part, and the machine-readable part. Most email systems do not require that the two actually match. So, it's entirely possible to send mail to user@server.com and place a human-readable "To: Mr. User (joe@otherserver.com)" as metadata. You can read more information in our article, Email#Message header. Specifically read: "Note that the To: field is not necessarily related to the addresses to which the message is delivered. The actual delivery list is supplied separately to the transport protocol, SMTP, which may or may not originally have been extracted from the header content." If this explanation is too technical, you can sort of think of it with this analogy: suppose a spammer sent you a paper letter via regular postal mail. On the outside envelope, he has to put your actual address (house and street number) so the postal service delivers it. But once you open the envelope, the paper letter on inside can be addressed to anybody. It can say, "Dear Aunt Sue," or "Dear Bob"... it doesn't matter. The mail has already been delivered based on the outer envelope address. Nimur (talk) 00:25, 15 January 2011 (UTC)[reply]
Many internet security experts consider the original EMAIL implementation to be fatally flawed for this reason (among numerous other problems). There is essentially no enforcement that senders authenticate themselves (they don't have to prove that they are who they claim they are); and there is essentially no requirement that metadata matches reality. See E-mail spoofing for more information. In a sense, "social network" websites sidestep this issue by consolidating every authentication in the entire world into a single login-system, which is operated by one single social network corporation's servers. Email, on the other hand, is distributed, so there is no central authority to verify credentials. Nimur (talk) 00:34, 15 January 2011 (UTC) [reply]
Note of course even if you are note in the To:, you may be in the CC: (which is visible) or BCC: (which should normally be removed) Nil Einne (talk) 10:51, 15 January 2011 (UTC)[reply]

I'm shocked that as a very very very very....very rudimentary anti-spam device that the Hotmail computers, and the well paid execs there, do not make sure that the emails are delivered only to the human readable address, or at least that emails where the human readable address contradicts the computer readable part are rejected. At the very least there ought to be an option to refuse emails with these deceptive addresses. Is there one?

How can I complain to Hotmail/Microsoft about their lazy sleeping execs who should have already fixed this long ago? You cannot say that the computers cannot read the human-readable email address - that is no excuse. Even the domain name part of the email address has been different. Its really really dumb to deliver something addressed to Pamela Anderson, Hollywood, USA, in the letter box for The Pope, Vatican, Italy. Duh! 92.15.27.244 (talk) 11:10, 15 January 2011 (UTC)[reply]

Uh who said computers can't read it? It's just that they don't because they're not supposed to and in fact doing do would likely break some things like Blind carbon copy and most mailing lists. As Nimur has said, you're letter analogy doesn't really work. If I write a letter to Pamela but address it to The Pope on the envelope, it's not the postal service's fault that The Pope receives my letter. Note that even if server did require To:, this would do little to discourage spam since the spammers can easily change their practices here, it's not likely to be much of a hurdle at all. (Things like requiring authentication would likely help more.) P.S. You can of course easily set up a filter to delete, copy to a spam folder or whatever all messages which don't have you in the To: field. You might want to at least consider looking in both the To: and Cc: but it's up to you. Nil Einne (talk) 12:16, 15 January 2011 (UTC)[reply]
Who says "the're not supposed to" look at people's emails? Googlemail got bad press about doing this routinely, but just having a computer check that the mail is being delivered to its ostensible address is nothing that anyone, apart from the spammongers, could object to. And its astounding that it hasnt been done from day one. 92.15.24.16 (talk) 14:23, 15 January 2011 (UTC)[reply]

Thanks, will look into the filter you described, but it should be the default setting.

Blind carbon copies ought at least to be signalled as such in the human readable part of the email, with an option to reject them. I suppose BCCs must be how spammongers send a lot of their spam out, otherwise it would have the correct address shown.

I'm shocked Hotmail seem to shrug their shoulders at spam and say "Stuff happens" and go back to sleep again. Emails with the wrong address are really shouting out loud with a bullhorn and waving a large flag saying "Hey, I'm spam!" yet nothing is done about it. 92.15.24.16 (talk) 12:29, 15 January 2011 (UTC)[reply]

I don't think you can do much, even with the filters. The filters only let you ignore mail from a specified address in the from field, which can also be easily faked. So, you might appear to recieve mail from panderson@hollywood.com and pope@vatican.org, but when you examine the headers and trace back the IP addresses, they actually come from the same place in China (for example). And when it comes to complaining to Hotmail, I wouldn't hold your breath. In my experience, they seem curiously reluctant to get a real person to answer users' complaints and instead rely on a computer sticking different names on form letters. If the spam really bothers you, I suggest you ditch that account and set up new accounts for different purposes (one for family & friends, one for shopping, one for work/school, one for riskier sites such as forums, etc.) Astronaut (talk) 14:35, 15 January 2011 (UTC)[reply]

Surely it must be elementary programming to check that ostensible address matches the delivery address. Why don't they pull their finger out and do it? 92.15.24.16 (talk) 14:44, 15 January 2011 (UTC)[reply]

Because as pointed out already, that's how Blind carbon copy works and to "fix" this, would break that (and people do actually use BCC for valid reasons). So I can't see them wanting to make a change that would break a feature that a lot of their members probably use/rely on.  ZX81  talk 15:17, 15 January 2011 (UTC)[reply]
I really cannot see why people cannot understand that I want to reject all emails that are not ostensibly addressed to me. BCC is irrelevant to this: all the software has to do is see if the delivery address is within the ostensible address string, and if not bounce it back - so so simple. I am on a few mailing lists etc and the emails are always properly addressed to me, so even if the use BCC they still have no problems ostensibly addressing it to me. Its a very simple and straightforward request. Its easy to understand - if the ostensible address is not mine, then I don't want it. Whats so difficult to understand about that? I've never had any valid email that's not been ostensibly addressed to my address. I cannot imaginine even the most dim-witted real postman having difficulty with the concept that you only put mail into the letterbox it is ostensibly addressed to. 92.15.24.16 (talk) 18:37, 15 January 2011 (UTC)[reply]
Well BCCs don't necessarily have your email address in the header (that's why they're called BCCs...) and as such that's why Hotmail can't just block them without blocking all BCCs. Some emails do contain it, it all depends on the sending server, but as far as I know there's no requirement for the sending server to include it. Since Hotmail is used by millions of people and they have to support BCC I'm afraid your only solution would be to set up your own mailserver and tell it not to accept BCC's, but then if someone tries to send you a BCC you wouldn't get it, nor would you know they even sent it...  ZX81  talk 18:54, 15 January 2011 (UTC)[reply]
Our article mentions some of the problems with the way what's supposed to be done with Bcc is defined. Nil Einne (talk) 20:18, 15 January 2011 (UTC)[reply]
Also, if Hotmail were to make a change like that, it would stop spam for a couple days, and then the spammers would just change what address they send things to. The reason why Bayesian spam filtering works well is that it can react quickly to new spam techniques, and that it also identifies characteristics that make a message likely to be non-spam for a particular user, which spammers can't fake without knowing the recipient's specific interests. Paul (Stansifer) 15:46, 15 January 2011 (UTC)[reply]
The point is not sending it to my address. 92.15.24.16 (talk) 18:37, 15 January 2011 (UTC)[reply]
They are sending it to your address or else it wouldn't get to you. This should be obvious.
What you're complaining about is that the "To" field does not match your email address. As has been explained above, if an email is sent to you with your address in the "Blind Carbon Copy" field then your email address will not appear on the email. (That's what the "blind" means. A regular carbon copy will show the address of the CC recipient.) There are entirely legitimate uses of this. (Bob want's Joe to have proof that Bob sent an email to Sue, but he doesn't want Sue to know that Joe is involved. So he sends the email to Sue with Joe's address in the BCC. Joe's email address will not appear on the email, but he will receive it.) APL (talk) 08:43, 16 January 2011 (UTC)[reply]
Um there are standards (RFC) that email servers are generally supposed to follow and while Microsoft and other companies do sometimes ignore them, in this cases there's no point since as me and others have pointed out, this will cause far more problems for the many people (including mailing lists) who do use BCC correctly, but will cause very few problems for spammers since they can easily change their software and don't give a crap about revealing other people's email addresses or the potential confusion about whether something was sent to a discussion list or sent to a person privately. There have been plenty of proposals which will semi-break the way e-mail works (e.g. hashcash) in an attempt to thwart spam but to be blunt, your one seems one of the more pointless ones that isn't going to achieve anything other then cause problems for those who aren't spamming (probably why you don't tend to here it from those who actually manage these sort of things). Nil Einne (talk) 20:00, 15 January 2011 (UTC)[reply]
As for the filters, I don't use hotmail (or webmail products in general) so was just speaking in general terms and apologise for not making that clear. Definitely few decent email programs would have problems setting up filters which would basically discard any emails which don't have your address in the to and cc lines (although with gmail for example where your address can actually take numerous forms it may not be so easy if possible to support all those forms depending on the boolean operators available). I'm quite confident the old Eudora has been able to do this for a long time (probably very 5 or earlier) and from a quick look at Thunderbird it should be no problem there either. If you filters lack a 'not' or 'else' function and also don't follow a defined order (with the ability to end filtering in a given filter) then it probably won't be possible. Nil Einne (talk) 20:09, 15 January 2011 (UTC)[reply]
Now they've found your email unfortunately you will get more spam. One bit of free advice - never click on a link in such spam, in particular never click on a link in spam saying you want to be removed from their mailing list. That simply tells them you read the spam and are a more worthwhile target. Dmcq (talk) 21:20, 15 January 2011 (UTC)[reply]

If I don't want garbage addressed to other people stuffed into my inbox, then I don't see why I should get it. Why bother whining? Why not simply fix the problem? If that means I never get something related to "BCC" again, then so be it. No more excuses. If a real postman did this, they'd rightly get sacked. 92.29.122.203 (talk) 11:10, 16 January 2011 (UTC)[reply]

There's no problem to fix. If you want to violate established internet standards for something that will achieve little, that's your choice and you've already been told of ways you can do it, just don't expect companies who actually think about this sort of thing and so know why it's a bad idea and why it's pointless to do it. And yes why you're whining at us none of which I suspect work for Microsoft because you don't like standards and think they should be ignored for no reason is beyond me. If a real postman decided to open your mail because they didn't trust the address on the outer envelope and didn't deliver the mail because the address inside was different they would indeed be sacked and not just for the privacy violation. (This isn't the best example but the postman analogy is starting to fail and this is the best example I can think of which fits your situation.) Nil Einne (talk) 15:09, 16 January 2011 (UTC)[reply]
Of course, spam filtering can be done pretty well. Spam Assassin is a good program that assigns a "score" to an email based on a large number of rules. (If the recipient is only a BCC it penalizes the email a few points.) Then the user can set up their email client to filter out any email below a certain score.
So far as I know, none of this could be done by an end user to a Hotmail account, sadly. But if you ran your own email server you could easily install this software or others like it and control it anyway you like. (And when it threw out an important email that you needed to read, well you could complain to yourself for setting it up, I guess.) APL (talk) 19:11, 16 January 2011 (UTC)[reply]
As others have said, the Simple Mail Transfer Protocol, which is how emails are routed to the recipients, ignores the To: and Cc: fields. Please see the example in the SMTP article for how it is actually routed. CS Miller (talk) 15:58, 16 January 2011 (UTC)[reply]
Real postmen deliver junkmail that's not specifically addressed to me all the time. Sometimes it's to "Joe Smith or Current Resident", sometimes they give up pretending they know who lives here and write "Our Valued Customer" even though I'm not, and sometimes they don't even put the address. I'm not sure how this works, but you can get the post office to deliver a piece of mail to every resident in a certain area. APL (talk) 19:11, 16 January 2011 (UTC)[reply]
Of course, at least where I come from, you can reserve yourself against that. Taemyr (talk) 22:51, 16 January 2011 (UTC)[reply]
At least I get to recycle all the spam the mailman dumps though the letterbox. Now if only there was a way of doing that with email spam... ;-) Dmcq (talk) 00:24, 19 January 2011 (UTC)[reply]

January 15

Another Flash 8/AS2 question

Frame 3, button 'Fight':

on (release) {
	var ci:Boolean = false;
	var ydie:Boolean = false;
	var ldie:Boolean = false;
	var sdie:Boolean = false;
	yealth = 16;
	lealth = 20;
	slealth = 10
	gealth = 38;
	cin = 2;
	gotoAndPlay(4);
}

After clicking the button, the computer prompts me to stop the script. Why is that? Kayau Voting IS evil 01:29, 15 January 2011 (UTC)[reply]

It could be a loop. What's the exact message? Also, what's in frame 4?--Best Dog Ever (talk) 01:42, 15 January 2011 (UTC)[reply]
It was something to do with slowing down the computer. Frame four is where the player clicks on the guard to attack him. It goes to frame five, which directly goes to six, where you go either back to frame 4 if gealth > 0 or to frame 7 if gealth = 0. Kayau Voting IS evil 02:26, 15 January 2011 (UTC)[reply]
It's really hard to say without looking at the FLA file.--Best Dog Ever (talk) 03:02, 15 January 2011 (UTC)[reply]
That is too large to upload on t35. I'll try to find some other way... Kayau Voting IS evil 12:50, 15 January 2011 (UTC)[reply]
It's now on The new official site for the game. :) Kayau HAPI B-DAY WP 14:07, 16 January 2011 (UTC)[reply]
When I click on the link, I see and error message that says, "Resource not found."--Best Dog Ever (talk) 20:02, 16 January 2011 (UTC)[reply]
Whoops! Corrected. Kayau Voting IS evil 01:51, 17 January 2011 (UTC)[reply]

Browsing OpenJDK source

Resolved

I'd like to browse the source to a few java source files (e.g. things in java.io and java.lang) of the OpenJDK project. I'd really rather not download the whole JDK source, but rather pick it out of the Mercurial web interface (in the way one can do likewise on the GNU Savannah website). The OpenJDK folks do have links to a Mercurial browser on their website, but the tree it shows only has a few infrastructure things (some makefiles etc.) not the actual JDK .c and .java source. Am I somehow missing this stuff in there, or is that stuff elsewhere (or no-where)? Thanks. 87.113.112.90 (talk) 03:50, 15 January 2011 (UTC)[reply]

Ah, I found it (here). -- 87.113.112.90 (talk) 04:28, 15 January 2011 (UTC)[reply]

Windows 7 information to XP computer

I have on my main computer XP sp3 and I have downloaded on this computer movies and have them in a download file.I also have a Popcorn hour hooked up to this computer so that I can put all the movies on a hard drive that the Popcorn hour has...then I can play all the movies when ever I want using the Popcorn hour's hard drive and keeping the main computer's hard drive free.

On my laptop which is windows 7 I have movies downloaded but wish to access the Popcorn hour and am not getting much help from these people.

I have got as far as I can and the information I have got from the Popcorn people is for XP not Windows 7.

All my computer and Popcorn Hour are hooked up through a router (hard wired)

I am new at this soooo...please excuse my ignorance on how things work! — Preceding unsigned comment added by Golferknut (talkcontribs) 21:53, 15 January 2011 (UTC)[reply]

Golferknut — Preceding unsigned comment added by Golferknut (talkcontribs) 14:23, 15 January 2011 (UTC)[reply]

Updating DirectX 9.0

Hello there,

I am trying to get the recent build of DirectX 9.0. Trying to troubleshoot a game, and I have been instructed to get the package from here. However, once this has downloaded, running it I get a dialogue box asking me where I want to put the 'extracted files' - as if I should have any idea - then it gives me 155 .rar files and two .dll's. There is no help at all on that page, and the people who told me to get this package have gone home for the weekend. I have tried installing the 'websetup' version, but that just tells me I already have a later version (maybe this means a later version of DirectX 9.0, or perhaps it is referring to the fact I have DirectX 10 and 11 - who knows?) and won't let me install. All I want to do is update to this latest build. Is there any way I can do this? --KägeTorä - (影虎) (TALK) 15:37, 15 January 2011 (UTC)[reply]

If you have a more recent version like DirectX 10 or 11, I don't see why you need to rollback to a previous version.General Rommel (talk) 03:24, 16 January 2011 (UTC)[reply]
That's actually not the latest version, for some reason Microsoft never released a redist for November 2010 [8]. But anyway if you don't want to use the webinstaller, choose a directory to extract the files and then run dxsetup.exe. Despite the statement above, no rollbacking should ever happen (even if you run an old version although I wouldn't try an 8 year old version just to see) and the updater should update whatever version you have (10, 11) if it contains an appropriate update. However if the webinstaller is telling you you have the latest version, then you probably have the latest version. Try running dxdiag.exe if you aren't convinced. If you are running Windows Vista, you may want to consider installing DirectX 11 if you haven't already, see [9]. Nil Einne (talk) 15:04, 16 January 2011 (UTC)[reply]

Database backup

How do the Wikimedia database dumps work? How do you make a copy of a database that is constantly being modified? 70.162.9.144 (talk) 18:28, 15 January 2011 (UTC)[reply]

Backups are performed using the DumpBackup.php tool, which in turn uses Export feature of Mediawiki. In essence that does a giant SQL query on the table(s) being dumped. As things are being simultaneously updated all the time on the live Wikipedia (etc.) site, there's no particular guarantee that the resulting dump will be entirely logically consistent. 87.113.112.90 (talk) 19:00, 15 January 2011 (UTC)[reply]
[citation needed] — I have never done this; but 87's link is bad, and the problem of getting a copy of a database that's constantly being modified was solved decades ago; a database dump doesn't just do a byte-for-byte copy like your OS does when copying a file, but copies the database as it existed as of a certain timestamp. I don't see an article specifically about this topic, but our backup article refers to databases several times. Comet Tuttle (talk) 19:06, 15 January 2011 (UTC)[reply]
The page is here. The core backup code itself is in Export.php in the mediawiki distribution. 87.113.112.90 (talk) 19:13, 15 January 2011 (UTC)[reply]
See this section of WP:DUMP. It is explained that the enormous size of the Wikipedia database is so huge that modern MySQL servers sometimes fail to work correctly. "The dump process has had difficulty scaling to cope with the size of the very largest wikis, and as a result the system failed for several years to produce valid, complete dumps of the English-language wikipedia. Even now, the system struggles to create valid dumps." So, even with the established techniques that should guarantee logically-consistent timestamped database copies, "implementation errors" in MySQL (and the surrounding web application frameworks provided by MediaWiki and the toolserver) currently are not capable of producing correct and logically-consistent copies for a single timestamp of the 20+ terabyte English Wikipedia back-end database. Nimur (talk) 19:17, 16 January 2011 (UTC)[reply]

Acrobat Reader X monitoring pdf files - how to stop?

Whenever I pass with my mouse over a .pdf file, AcroRd32.exe appears in Windows Task Manager and is doing something for a second or two... It seems there's some process or program monitoring .pdf files for mouseover. How this could be stopped? —Preceding unsigned comment added by 109.66.7.118 (talk) 18:34, 15 January 2011 (UTC)[reply]

I think this is somehow similar with the way .avi files are treated - the system adds additional info about them in a special tab of File Properties, so probably each time you hover the cursor over the file the system has to update this info so Acrobar Reader is called. This treatment of .avi files can be remedied by registry hack - something in HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings As to .pdf files, I don't know... Maybe somebody else could help? 213.8.52.97 (talk) 09:45, 16 January 2011 (UTC)[reply]
Disable the Adobe Reader add-on in your browser. Here's the process for Internet Explorer: [10] and here's the process for Firefox: [11]. Also, open Adobe Reader, go to Edit --> Preferences --> Internet and uncheck "Display PDF in browser."--Best Dog Ever (talk) 10:02, 16 January 2011 (UTC)[reply]

Ubuntu dual-boot troubles

I just made a new Ubuntu 10.10 Netbook Edition Live CD using Linpus Linux for the Acer Aspire One with Intel Atom and Windows Vista for an Acer Desktop PC (I don't know which, with some kind of AMD chip, I don't know which). I downloaded the .iso Ubuntu disk image using Linpus and burned it onto the CD-RW (700MB as required) using Vista.

Now, the CD seems to work fine, but when I try to boot without installing I get messages like: 'GLiB warning: getpwuid_r(): failed due to unknown user id'.

I've tried looking for help, but I don't understand all this gobbledygook. Could some kind soul tell me what to do using minimal jargon and how to do things in specific, non-vague terms, please? I really want to replace Linpus and I could use the help. Thank you very much for your time.

These are the two places I looked for help: [12] and [13]

--Editor510 drop us a line, mate 20:57, 15 January 2011 (UTC)[reply]

I dual-boot a variant of Ubuntu. While this answer may not help much, I get that error everytime (not from the CD, but from my drive partition) I boot, and so far as I know it has not caused me any problems. I have no idea what it is talking about, but I would be interested in finding out. It isn't stopping it from booting is it? Falconusp t c 04:43, 16 January 2011 (UTC)[reply]
Well, it freezes up at the Ubuntu logo. Could it be the CD drive? If it is, that means the CD I spent ages making is useless.--Editor510 drop us a line, mate 18:51, 16 January 2011 (UTC)[reply]

This error message, by itself, doesn't provide enough information for us to fix the problem - but we're close. I'll try to explain the root-cause of the error in general, and in the hope that it may hint at finding solutions for your specific case. It is the convention in many Linux/Unix operating systems Debian (and therefore in Ubuntu) that certain system processes, called daemons, have their own user account. For example, a web server (which is a standalone program that is running at all times) may log in to the computer as WebServerUser. This makes it easy for the operating system to know when Web Server accesses files; it is trivial to guarantee that file-permissions are correct (simply deny access to blocked files for the entire web server login account). Similarly, other system processes (such as certain hardware drivers and some software abstraction layers) also have their own user account. If you see an error like GLiB warning: getpwuid_r(): failed due to unknown user id, the actual problem is that a system service can not start. It was probably configured to use its own login-id; and later system-setup may have removed that login-id (without uninstalling or reconfiguring the program that expects to use it). If the daemon isn't critical, your system boots as normal and you barely notice anything. But if that was a needed system tool, the program can't start, and the boot halts. So, to fix this problem, we need to know exactly which user-id is being sought, and by which daemon. We need a more complete printout of the error-message you are seeing. Then, we can give you specific instructions to uninstall, remove, or repair that specific part of the system that is failing. Can you give us more of the error message (any text surrounding it)? Nimur (talk) 19:25, 16 January 2011 (UTC)[reply]

January 16

How to keep sockets alive in Java

Hi! I'm developing a Java program between a client and server. Both sides have a thread blocked reading for long periods of time. The problem is I get a SocketException: socket reset after about 5 minutes of not writing on either end of the socket. What's the easiest way to fix this? I'm thinking about writing a nonsense byte to the socket at regular intervals to keep it alive, but that might take some recoding so that it can be recognized and discarded by the reading end. I tried setSO_KeepAlive(true) before connecting the socket, which didn't solve the problem (does it have to be set to true on both ends?). Interestingly, if I run the client and server on a local network, there is a longer interval of inactivity before I get a SocketException: socket reset, but over the Internet it's only about 5 minutes. Anyway, I'd greatly appreciate any solutions or suggestions. Thank you!--el Aprel (facta-facienda) 02:48, 16 January 2011 (UTC)[reply]

Could you specify some versions?Smallman12q (talk) 05:08, 16 January 2011 (UTC)[reply]
I suspect you have a router/firewall that is messing with connections. See if you can configure it not to be so aggressive. Failing that, implement your plan of periodically sending a "nonsense byte" (technically known as an application protocol heartbeat). TCP keepalive does a lower level heartbeat, but the interval of keepalives is of the order of a couple of hours, and there is no API for changing it (operating system level hacks for changing it may exist, but I suggest not going there). 88.112.59.31 (talk) 13:23, 16 January 2011 (UTC)[reply]
Of course, to answer this correctly, we need to know why the Socket is timing out. Sockets don't "die" unless something kills them - usually a firewall. Is there an intermediate firewall between the computers that are communicating? Is either end-point's network driver, operating system, or software-firewall killing the socket after a certain period of inactivity? The answer "depends" and it may be impossible to find out unless you control both endpoints (and all network connections between them). A reasonable workaround is to assume that somebody's firewall is going to kill your socket after some delay. (30 seconds is a common network inactivity timeout on many firewalls with default settings). So if you send a "heartbeat" every 20 seconds, you keep most network connections alive. That heartbeat can be anything (you're programming the server and the client software, right? So just design a "NO_OP" magic byte, or packet, or whatever. Alternatively, for an even safer, more-robust workaround, (that doesn't make any assumptions about firewall-timeout rates), design your network code to be resilient in case of dropped-connection and provide for both client and server to attempt an automatic reconnection using a new Socket object. Note that the SO_KEEPALIVE implementation for Java Socket has a hard-coded time-period of approximately 2 hours (for OpenJDK and Sun's JVM implementations); this is much longer than most firewall timeouts, so you'll need a homebrew solution. Nimur (talk) 23:31, 16 January 2011 (UTC)[reply]

The application was unable..

After installing Lunascape browser, I tried to run it. But instead of opening, suddenly a message poped up and said, "The application was unable to start correctly (0xc0000022). Click OK to close the application". I reinstalled the browser but nothing happend except that weird message. It happened several times with another browser like Flock. Mozilla runs fine. How can I fix it?--180.234.45.42 (talk) 11:12, 16 January 2011 (UTC)[reply]

  • I had same problem with this browser. Follow these steps: Right click on Lunascape shortcut then go to properties. Click on the shortcut tab, there again click on advance tab and choose "Run as administrator". If the shortcut icon does not appear to be Lunascape, you can change it by clicking on "Change icon tab". Then click OK to close the window. You are done. Same process goes for Chrome browser as well. The problem occurs due to the corruption or missing of Shell 32.dll file. I hope this would help.--NAHID 00:29, 17 January 2011 (UTC)[reply]

iPhone to monitor streaming

Is there a way I can stream video (Netflix) from my iPhone 3G to my computer monitor via the Apple-provided USB cable? The OS is Windows XP. Thank you161.165.196.84 (talk) 11:22, 16 January 2011 (UTC)[reply]

Find word and beep

Resolved

I've been searching for a program (for Windows 7) which can scan a url for a word or phrase, and beep or play a sound if it finds it. So far I haven't found anything which meets all the requirements, so I am now trying to make a script myself using .bat which can do this. So far I have wget which can download the url to a file. Now I just need the 'scan for keywords and beep' component. I've tried find (command) and findstr but they don't beep or play a sound. 82.44.55.25 (talk) 13:59, 16 January 2011 (UTC)[reply]

find is your friend, when combined with && echo ^G. Note that the ^G part is entered as [Ctrl]+G.
find "thisiswhatimlookingfor" fooobar.html && echo ^G

-- 188.105.132.219 (talk) 14:04, 17 January 2011 (UTC)[reply]

Thank you! :D 82.44.55.25 (talk) 14:24, 17 January 2011 (UTC)[reply]

electronics (ripple)

The percent of ripple for a high-quality power supply is supposed to be 5%. If it is a 12v dc power supply, what is the max amount of ripple you should expect to see at the output. —Preceding unsigned comment added by 98.215.204.87 (talk) 14:35, 16 January 2011 (UTC)[reply]

This probably should have been asked on the science desk. However, the answer is 5% * 12V. Our ripple (electrical) article should cover the measurement of ripple, but neglects to. CS Miller (talk) 15:49, 16 January 2011 (UTC)[reply]

Seeking Basic program code to copy folders and files

I have tried seaching for the code for a BASIC program or routine to copy files and folders (including recursively) in Windows, but have not found anything. I would like to be able to overwrite a folder and its contents with the same folder from somewhere else, except that in the event of a file-name collision I want to modify it so that it renames the new file (eg "myfile001") instead of overwiting with it.

Does anyone know of any freely available BASIC code please? I am using WinXP. Thanks 92.29.122.203 (talk) 15:17, 16 January 2011 (UTC)[reply]

What BASIC interpreter are you using? This sort of thing would be much easier if you used something with a more robust file handling library, like VB's File System Object. If you use just BASIC, you'll have to re-invent the wheel a few times, because its file handling functions are pretty simple by comparison. --Mr.98 (talk) 15:21, 16 January 2011 (UTC)[reply]

I will use any Basic that is freely available. 2.97.211.3 (talk) 19:15, 16 January 2011 (UTC)[reply]

Would you accept VBScript as a form of BASIC? There's a file handling example in the article which you can try out right now. Copy and paste into notepad, save it and rename it to end in .vbs (making sure you can see file extensions in general, so you don't get a hidden .txt after the .vbs). Then double click it to run. If this is the sort of thing you're looking for, I'm sure further hints for how to modify it to copy files will be forthcoming. 81.131.51.219 (talk) 00:24, 17 January 2011 (UTC)[reply]

How can I insert copyright information into a digital photo file? Bubba73 You talkin' to me? 17:05, 16 January 2011 (UTC)[reply]

Depends what you would like to do - do you want any inscription to be visible in the photo, or do you want to add a copyright notice to the metadata of the file (the EXIF information)? --Ouro (blah blah) 17:51, 16 January 2011 (UTC)[reply]
Are you asking about a digital watermark? If so, most advanced image manipulation programs (such as Photoshop) should have a "watermark" function. -- 174.21.229.4 (talk) 19:52, 16 January 2011 (UTC)[reply]
I do not want it to be visible over the photo, so I want to put it in the metadata. I have Photoshop Elements version 6, but I couldn't find how to alter the metadata. (But that is when I was looking for "copyright".) Bubba73 You talkin' to me? 22:41, 16 January 2011 (UTC)[reply]
I hope you appreciate that it is a simple matter for someone to modify the metadata or remove it completely? Astronaut (talk) 23:19, 16 January 2011 (UTC)[reply]
I thought it might be. Bubba73 You talkin' to me? 02:11, 17 January 2011 (UTC)[reply]
You can alter the metadata in Windows XP in the windows explorer, if you right click the file and select properties summary advanced, scroll down to comments, keywords section, you can click on the value part and change this. Graeme Bartlett (talk) 04:13, 17 January 2011 (UTC)[reply]

Free video surveillance software.

My car has been broken in to 1 to many times, Id like to build a video surveillance system using my web cams and my extra computer. i have been looking for a free piece of software that fits my criteria, which is as follows:

  • Free.
  • Windows or linux based.
  • Time&date stamped video.
  • 24/7 video&audio recording.
  • Ability to delete old video after a set time, i.e. delete videos after 1 week.
  • supports my USB cameras at their full resolution (1280x1024).
  • record at more than 5fps.
  • ability to handle 3 cameras.
  • Ability to save video to an external drive.


If anyone knows any programs that fits my wish list please let me know. Only program that i have found that comes close is eyeline (records and 1/2 fps), and zoneminder (doesnt directly support my cameras). Please don't provide random links to webcam software that you found on Google. I know how to use Google. Please only include software that you definitely know has the feature mentioned above. kthxbai 98.208.63.16 (talk) 19:41, 16 January 2011 (UTC)[reply]

As a side note; id like to point out that i dont want motion detection based recording, it would be nice if this program would id when motion happened, but not base weather it records or not on motion. kthxbai 98.208.63.16 (talk) 20:02, 16 January 2011 (UTC)[reply]

3 high-def usb cameras on one computer sounds iffy. The other stuff seems easy. Can you use 3 computers? It is pretty easy to scrounge old laptops these days. 67.122.209.190 (talk) 10:35, 17 January 2011 (UTC)[reply]

Theoretically possible to browse iDevice file systems without jailbreak

Is it theoretically possible to browse the system partition of an iPhone, iPad, or iPod touch without jailbreaking? Say, for instance, a program that will simply ignore the access restrictions since the device would not be running? --Melab±1 22:58, 16 January 2011 (UTC)[reply]

January 17

android tablets

I notice there are a zillion cheap android tablets sprouting up everywhere, whose hardware looks rather nice. They mostly run Android 2.1 and have vendor-customized UI's and applications, which I presume is like the usual dreck situation from the PC world. Is it likely to be a big problem to root the device and upgrade to a newer version of android, i.e. do they tend to depend on proprietary device drivers and that sort of thing? I'm not trying to plug a particular vendor but one device I'm looking at is here. There are also a lot of even more generic ones at the usual no-name schlock shops. Any thoughts? 67.122.209.190 (talk) 09:58, 17 January 2011 (UTC)[reply]

Wikipedia has an article about Android (operating system). The main concern for a potential customer will be whether the tablet vendor will be still around during the life of the product and we cannot predict that. Cuddlyable3 (talk) 11:45, 17 January 2011 (UTC)[reply]

Old laptops

In an above thread someone said "It is pretty easy to scrounge old laptops these days." I was going to reply in that thread, but I didn't want to distract from the OPs question. So, is it really that easy? Where do I need to go to find old laptops for free or really cheep? And how old are we talking, Windows 95/XP? 82.44.55.25 (talk) 10:54, 17 January 2011 (UTC)[reply]

Organizations have what is known as a replacement cycle. For laptops it is between 3 and 5 years. Different organizations have different disposal policies. Example You just need to ask about. A scratch-each-others-back arrangement often works -you just have to find out who's back needs scratching. Knowing how to wipe the drives might get you an intro into a little company who does not want their customer and banking details ending up in Nigeria nor China.Offer to run DBAN on it to wipe the data, and then upgrade it by installing a Linux distribution on it.--Aspro (talk) 11:19, 17 January 2011 (UTC)[reply]
The OP is located in UK where there are many small shops that sell and repair PCs. They are likely to have many old laptops that customers have had replaced or hoped (probably in vain) to trade in, and which are now virtually unsaleable. Ask around. Cuddlyable3 (talk) 11:34, 17 January 2011 (UTC)[reply]
Try eBay, especially searching for the area near yourself to avoid paying postal charges. Old computers are quite often given away on Freecycle or Freegle, but I've never seen any laptops and there are a lot of people keen to have them. If you think the operating system is too old then you can always replace it for free by one of the many Linux operating systems. 92.15.8.13 (talk) 13:37, 17 January 2011 (UTC)[reply]

Problem with number rounding error

I've written a short program in GWBasic that involves adding up two numbers to check that they exactly match another number. If it finds a discrepancy, it stops. The program processes several sets of numbers correctly, but stops when it has to add 1210.42 and 174.65 to check if their total is the same as 1385.07. It says the numbers are different, when actually they are the same.

The two numbers both display on the screen as 1385.07, but when I subtract them and multiply the result by 100 I get a value of "-1". When I multiply by 10000 I get "2". I suppose the problem must be due to rounding errors and binary representations of decimal numbers.

What can I do to fix this problem please? Thanks 92.15.8.13 (talk) 13:28, 17 January 2011 (UTC)[reply]

In GWBasic probably not much. Can you rescale your problem so that only integer numbers appear? In your example, just multiply all numbers by 100, add up, compare. In general, if you deal with arbitrary decimal expansions, floating point is in nearly all applications the most convenient format, but in that case you must expect and learn to live with rounding errors. There are numbers with a finite decimal representation that have no finite binary representation, so that rounding is almost unavoidable. Why do you need an exact match? If its a science problem, your inputs are not constraint to arbitrary precision. If its financial, you are only interested in full cents (or whatever the smallest currency subdivision is). --Stephan Schulz (talk) 13:41, 17 January 2011 (UTC)[reply]

Will try calculating with pence, not pounds. Is there a way of telling GWBasic that these numbers are integers only, and if I do that can I expect it to ignore any hidden fractional part? 92.15.8.13 (talk) 13:51, 17 January 2011 (UTC)[reply]

[14] You type a % after the variable name. 81.131.45.34 (talk) 14:22, 17 January 2011 (UTC)[reply]