Jump to content

Wikipedia:Reference desk/Computing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 79.179.8.59 (talk) at 22:54, 24 June 2011 (→‎Looking for an audio media player SOFTWARE: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Welcome to the computing section
of the Wikipedia reference desk.
Select a section:
Want a faster answer?

Main page: Help searching Wikipedia

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.



How do I answer a question?

Main page: Wikipedia:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


June 19

Wordpress MP3 plugin for dummies

I have a client that is using Wordpress. He wants to have an MP3 player plugin. He cannot do FTP. He cannot edit HTML. He cannot do anything that requires memorizing commands or keywords. He cannot perform the single task of adding a song to his site if it requires more then 3 steps. So... Is there an mp3 player Wordpress plugin that has an admin thing that is merely a list of mp3 files where you can delete ones you don't want anymore and upload new ones? -- kainaw 00:06, 19 June 2011 (UTC)[reply]

I don't have an answer to your question, but the following thought occurs to me :
Couldn't you put a link on his desktop (or get him to) that is an FTP link to the mp3 folder? Then he could copy/paste to it like it was on his own computer using explorer's built-in ftp capabilities? (Then use a plug-in that just uses that folder.) APL (talk) 20:51, 20 June 2011 (UTC)[reply]
That is what I would do if I could find a plugin that plays all mp3's in a folder. All of the plugins that I've found require you to place links or object variable code in your text. -- kainaw 00:45, 21 June 2011 (UTC)[reply]
While I'm not keen on mucking about with my wordpress to try it, Folder Full of Mp3s claims to do just that. Did you try that one? APL (talk) 22:41, 21 June 2011 (UTC)[reply]
I installed it and, with some pain, got it to do what I think it should do. I hoped it would play the songs, but it lists each song instead. The user has to click a song title to hear it. That isn't what my client wants, but it is a step closer. -- kainaw 00:02, 22 June 2011 (UTC)[reply]
mp3-jplayer turned out to be what I wanted. It plays songs from a folder instead of just listing them. -- kainaw 02:34, 22 June 2011 (UTC)[reply]
Excellent! APL (talk) 03:20, 22 June 2011 (UTC)[reply]

Uptodating drivers for Windows XP

Hello to so many cooperative people. Please excuse my uneasy English, I'm French. Are there reliable websites updating on line all the drivers of a configuration working under (a French) Windows XP?

That's an advice given before installing some games as the Tomb Raider's. Thank you very much for your collaboration. Rheims -France---80.236.117.41 (talk) 14:16, 19 June 2011 (UTC)[reply]

Try http://www.update.microsoft.com which requires using Internet Explorer. 92.24.177.159 (talk) 10:13, 22 June 2011 (UTC)[reply]

Search for files in Windows 7

Resolved

How can you search for files by filename in Windows 7? In previous versions, you could enter part of the file name ad also had options for the size, date, etc. That is missing in Windows 7 and if I enter a part of a filename in "search", it comes up with nothing. Bubba73 You talkin' to me? 15:41, 19 June 2011 (UTC)[reply]

I had a similar problem and couldn't find a way to fix it. I use this instead. It works quite well although sometimes crashes AvrillirvA (talk) 17:51, 19 June 2011 (UTC)[reply]
If all else fails you can start a Command Prompt and type dir *partialname* /s/b. AndrewWTaylor (talk) 20:32, 19 June 2011 (UTC)[reply]
Command line forever! Thanks, that should work, but XSearch looks good. Bubba73 You talkin' to me? 22:39, 19 June 2011 (UTC)[reply]
It is a builtin function on the start button, click the windows symbol and just type the filename you are looking for and it lists the matches. Graeme Bartlett (talk) 11:48, 21 June 2011 (UTC)[reply]
With the Vista and Windows 7 search I've found it useful to add a wildcard (asterix) if you are searching for a part of a word since sometimes it seems to not find results for partial matches (although it does other times). If you just want to find a file name try using name:SEARCHTERM to speed up search times. However I've found Windows Vista/7 searching very slow for searching for filenames when the content isn't indexed even when you use name: You can also add other search filters like size: etc and these should appear in the search bar in explorer if you don't remember them. Nil Einne (talk) 17:20, 24 June 2011 (UTC)[reply]

IPod formatted Mac/Windows

Someone helpfully "ripped" my CDs and loaded them onto my IPod. However, that was done using a Mac, and it seems that the IPod is now "formatted for Mac". When I try to link it to my PC, I get a message saying that I need to reformat the IPod for Windows. Am I right in thinking if I do that that I will lose all of the files now on it? If so, what would be an easy way to keep the existing music and yet be able to add more in future through a PC? Thanks. Itsmejudith (talk) 17:26, 19 June 2011 (UTC)[reply]

"Mac formatted" means that the hard drive is HFS+. The problem is, Windows machines can only read NTFS or FAT32. So as far as the PC is concerned, the Mac's hard drive is written in Chinese and the PC only speaks English.
The easiest solution (out of a few possible) is to use a third-party utility, like MacDrive, to allow your PC to speak HFS+ temporarily, so that you can copy the music files off and reformat it. MacDrive has a free trial download that should work fine for your one foray into this. With MacDrive enabled, you should be able to see the music directories if you have "show hidden files" enabled on your "My Computer" interface. They will look like a bunch of files with MP3 or MK4 extensions and should be organized in folders by artist.
After copying the music to your computer, then go in with iTunes, reformat the iPod in Windows (FAT32) format, and then re-import the music files into iTunes and copy them onto the iPod. (Don't just copy them directly in My Computer — I think iTunes will be necessary to set up the iPod database correctly.) (If you are given an option between NTFS and FAT32, I'd do FAT32, just because it's the more compatible format, so that Macs can also read it.) --Mr.98 (talk) 17:50, 19 June 2011 (UTC)[reply]
Great, will try that. Itsmejudith (talk) 20:01, 19 June 2011 (UTC)[reply]

Rename all subfolders by adding the same prefix

I have a directory with many sub-folders in it. I would like to add the same prefix to all these sub-folders, but not to file-names or anything else. Is there an easy freeware program that can do this? I tried searching for one, but have not found one that only works on sub-folders not files. Thanks 92.29.112.168 (talk) 19:20, 19 June 2011 (UTC)[reply]

Are you using Windows or a Unix-like system? On Unix-like systems, it should be possible to do this with the standard Unix command-like tools alone, although the syntax might get quite hairy. I don't know if the same thing is possible on Windows. JIP | Talk 20:04, 19 June 2011 (UTC)[reply]

Bulk Rename Utility can do this. In the "Selections" section check Subfolders and uncheck Files AvrillirvA (talk) 20:12, 19 June 2011 (UTC)[reply]

Under Linux, use mmv. Under Windows, I believe Rename-It! can also do this. Hans Adler 20:17, 19 June 2011 (UTC)[reply]
Note that the OP only wants to rename directories, not plain files. Can mmv do this? If not, a simple find command to find all directories coupled with the mmv command should work. JIP | Talk 20:24, 19 June 2011 (UTC)[reply]
You can do this from the command prompt (cmd.exe): for /d %i in (*) do ren "%i" "prefix%i". In Windows Vista or later, you can shift-right-click on the folder that contains the subfolders and choose "Open command window here". In XP that action isn't available by default, but you can add it. -- BenRG (talk) 02:09, 20 June 2011 (UTC)[reply]

Progress bar for auto-fsck (Ubuntu 10.04)

One of the things I didn't really like, when upgrading to Ubuntu 10.04, was the splash screen at startup that hid all the log messages. Anyway I figured out how to turn that off (in /etc/default/grub, change the line GRUB_CMDLINE_LINUX_DEFAULT="quiet splash" to GRUB_CMDLINE_LINUX_DEFAULT="", and then run update-grub).

But one of the main reasons I wanted to do that is, I don't like it when the system runs fsck and tells me it may take some time, but gives me no indication of how much time or what sort of progress it's making. And it *still* doesn't tell me that. So I want the auto-checks to run fsck -C so that I get a progress bar. Can anyone tell me how to find the script that it's running so I can change that (or maybe better, any configuration file used to generate such scripts)? --Trovatore (talk) 22:31, 19 June 2011 (UTC)[reply]

http://webchat.freenode.net/?nick=fdiskOhMy&channels=#ubuntu ¦ Reisio (talk) 15:30, 21 June 2011 (UTC)[reply]
There's a whole IRC channel about it? How complicated can it be? Can't I just throw in a -C somewhere? --Trovatore (talk) 20:05, 21 June 2011 (UTC)[reply]

Facebook question

I've never used facebook and still don't really want to (at least not as most people do) but I ended up setting up an account just to check for updates on various events etc but I didnt want people to know I had made an account so I didn't make any friend requests to the people in my email contacts. However on Facebook it says so-and-so is waiting for me to accept their requests. Do these people know that I have an account now? i think they are just requests made ages ago before I ever touched facebook and now Im seeing them on the facebook account but im not sure. --178.208.205.227 (talk) 22:49, 19 June 2011 (UTC)[reply]

No, those are in fact requests made to you since you created a facebook account. As soon as you create an account, you are searchable via facebook's database (unless, perhaps, if you fix your privacy controls to the strictest settings). Also, if you've ever "commented" on any of those events you were monitoring, people who are also monitoring those events can find you easily and bother you with friend requests, etc.. I recommend going to your privacy settings ASAP and switching everything to the most restrictive setting, which I think is "Friends Only." If you don't accept any friend requests, then you can keep a large part of your interaction with facebook private, I suppose, although you probably still can get friend requests, since facebook is based upon making electronic friends. To emphasize the point, make sure you update your privacy settings (e.g. your account is [or was last time I updated my settings] indexed by Google by default so people can search you through Google's search engine). It may also help if you don't provide your real name or any other information about you. Hope this helps you somewhat...I realize reading it over that I kind of ramble. BTW I share a lot of your sentiment about facebook--el Aprel (facta-facienda) 05:15, 20 June 2011 (UTC)[reply]
If you gave facebook data about (for example) your highschool graduating class, it will actively tell people about your existence unless you've told it not to.
Every time I log into facebook it has a panel over on the side with a couple people who graduated from my college or my high school the same year as me, suggesting that I might want to friend them. APL (talk) 08:08, 20 June 2011 (UTC)[reply]
This all makes sense if you're using facebook for it's original purpose, but now that it's being used by so many groups as a sort of online newsletter server, I agree with you that it's a bit aggravating that facebook is so aggressive in trying to find friends for you. APL (talk) 08:09, 20 June 2011 (UTC)[reply]
...and people ask me why I don't have a Facebook account. Astronaut (talk) 17:32, 21 June 2011 (UTC)[reply]
Well, yeah, okay, but it's a social networking site. It's kind of like going to eBay and complaining about "all those ads for auctions". Matt Deres (talk) 19:51, 21 June 2011 (UTC)[reply]


June 20

Help with switchboard (MS Access)

I have read sites , about how to maximize the switchboard when the database is opened , but please will u tell me step by step to : -write the macros in visual basic (it should be docmd.maximize) -enable the macros

but please write it in simple english words...Thank u in advance --95.107.197.91 (talk) 11:31, 20 June 2011 (UTC)[reply]

Just a note for those who are confused: this is a reference to Microsoft Access scripting. I've edited the title to indicate this. --Mr.98 (talk) 13:45, 20 June 2011 (UTC)[reply]
The easiest way to do it, in my opinion, is to do the following:
1. Open up the database. Make sure that the Database view is open (so you can see your forms). (You may have to go to Window > Unhide, if it is hidden. If it is hidden to the point where it won't show up in Unhide, or you can't enter Design View as in step 2, close and re-open the database while holding down the Shift key to override any startup options.)
2. Open the Switchboard form. Go to View > Design View to make it editable.
3. Go to View > Properties to open the Properties Window.
4. Make sure that "Form" is selected in the Properties window. Click on the "Event" tab within the Properties window. Scroll down to "On Open" which ought to say "[Event Procedure]" in it. Click on the "[Event Procedure]" line in "On Open," then click on the button with the ellipses (...) to the right of it. This will open up the Visual Basic Editor, into a function called "Form_Open".
5. Right after the line that says Private Sub Form_Open(Cancel as Integer), add a new line, and type in DoCmd.Maximize on that line.
6. Click "Save" in the Visual Basic Editor, and close the Visual Basic Editor. You should be back at your Switchboard form. Click "Save" there. Close the Switchboard form. Re-open it. It should be maximized.
Let me know if you have any questions. A shorter version of this would be just to say, "Add DoCmd.Maximize to the Switchboard's Form_Open function," but I assume that since you asked for a step by step approach, you wanted a more basic explanation, so the instructions above assume very little Access knowledge. You could also do it through Macros, but that would be somewhat more difficult, because the Switchboard already uses VBA scripting, and I'm not sure you can mix-and-match macros and VBA scripting. --Mr.98 (talk) 14:04, 20 June 2011 (UTC)[reply]

Thanks a lot 95.107.197.91 (talk) 09:35, 21 June 2011 (UTC)[reply]

Memory Stick question

My digital camera stores image files on a little solid state device called "Memory Stick Pro Duo". I used to be able to push that device into a slot on my computer and copy the image files to the hard disk. But that no longer works.

The memory stick still works okay in the camera. When the memory stick is inserted into the slot on the computer, the little green light still comes on to acknowledge the stick is there.

But "Removable Disk (I:)" no longer appears in the Window "My Computer" so I cannot access the files.

I think the memory stick is probably fine since it works in the camera. Is the problem more likely to be with hardware or software?

Thank you, Wanderer57 (talk) 02:02, 21 June 2011 (UTC)[reply]

I used to do this when t was annoying. What I did was to restart the computer, without the card, and then instert it again. See if it works now, good luck. General Rommel (talk) 02:33, 21 June 2011 (UTC)[reply]
A Pro Duo usually requires an adapter to fit into a computer's Memory Stick slot. You might also want to check your computer manufacturer's website for a card slot driver so that you can reinstall and/or update the appropriate software. --LarryMac | Talk 17:43, 21 June 2011 (UTC)[reply]

how is version control for a development team usually set up?

we have access to virtual servers on request through a cloud sharding solution and I've been tasked with setting servers up for web development (facing the public) of a web application run from the company. From what I can gather, the best practice is to have three servers: production, staging, and development. These would I suppose ideally be three different logical servers (own ip, etc), and even more ideally, as web developers and designers we hopefully wouldn't actually touch production. If I have it right so far, my next question is about version control. I have a recommendation for Gitosis. Shoudl this be set up on the development server, or on a fourth, separate server? Thanks for any other information you would also have. ALSO: at the moment tehre is only one production server, with gitosis half set up for it - it's serving the public. DO you think I can just clone it three times, once for staging, once for development, and on the third clone finish setting up gitosis? Or, what is the best practice approach here? Thanks. — Preceding unsigned comment added by 188.28.194.120 (talk) 23:56, 20 June 2011 (UTC)[reply]

As for the 3 environments, that's a good approach, and what I'm used to, too, although the middle one is sometimes split into "unit testing" and "integration testing" environments, with programmers doing the unit testing and customers doing the integration testing (also sometimes called beta testing) using cloned production data. StuRat (talk) 08:35, 21 June 2011 (UTC)[reply]


June 21

Tracing MAC address over the Internet

Is it possible? What if a computer has to login on a page? That would mean it would be part of your network, and therefore it's not only a visitor to your page. 88.8.78.155 (talk) 00:34, 21 June 2011 (UTC)[reply]

It is rare that the MAC address is broadcast outside of the local network. This is repeatedly asked from those who are trying to uniquely identify a computer that is visiting a website. To do that, the common solution is to use Flash cookies. -- kainaw 00:47, 21 June 2011 (UTC)[reply]

Administrator bullying situation - where to report it?

Where do I report a situation where an administrator is mean to a user? --J (t) 03:00, 21 June 2011 (UTC)[reply]

You might want to consider learning a bit more about how Wikipedia works before setting out to attack people. Poorly directed attacks have a tendency to boomerang. Looie496 (talk) 03:43, 21 June 2011 (UTC)[reply]
I would also suggest learning to look and read more carefully may help. Wikipedia:Help desk would be the place to ask any question concerning wikipedia as Wikipedia:Reference desk specifies. As with Looie496 I'm presuming you're referring to wikipedia, we have no idea where you can report an administrator in some other unspecified random website (if it is even possible). Nil Einne (talk) 05:57, 21 June 2011 (UTC)[reply]

WP:AN/I AvrillirvA (talk) 09:42, 21 June 2011 (UTC)[reply]

... but almost always better in the long run to just walk away and ignore it, rather than escalating the situation. As noted above, Wikipedia:Help desk is the appropriate venue to ask for further advice. Gandalf61 (talk) 10:31, 21 June 2011 (UTC)[reply]
It's not clear that the question is about Wikipedia admins: it could easily refer to a workplace problem, in which case we would need more details, though it would probably be very difficult (and verging on the "legal advice" area) to give an answer. AndrewWTaylor (talk) 11:03, 21 June 2011 (UTC)[reply]
Good point, but a glance at recent posts on the OP's talk page suggests they are probably asking about Wikipedia. Gandalf61 (talk) 11:21, 21 June 2011 (UTC)[reply]

Don't waste your time, admins protect each other on Wikipedia if at all possible; usually how they got to be admins in the first place. ¦ Reisio (talk) 15:34, 21 June 2011 (UTC)[reply]

I think many anon editors and non-anon editors think it is "admin abuse" when it is. What good would it do to post about it on my talk page? I just got done telling this guy not to waste his time. ¦ Reisio (talk) 01:35, 22 June 2011 (UTC)[reply]

The reason why I asked you to post it on your talk page is, in order to successfully defend your thesis that "admins protect each other on Wikipedia if at all possible" you would have to provide evidence, and I do not believe that the best course of action would be to get this discussion off of a tangent. But you need to provide the evidence, so the best place is to do it on the talk page.
If someone makes a fantastic claim like "admins protect each other on Wikipedia if at all possible" in a way to suggest that admins have a cabal conspiracy keeping the anon/new user down, then I am going to ask him/her to provide evidence.
In many cases, Reisio, anons make honest mistakes and need to learn from them. Or the anon/new user has committed a serious act of willful misconduct.
Also admin abuse is only admin abuse is the guy says "I'm an admin" to get more credibility or actually uses his admin powers.
WhisperToMe (talk) 02:33, 22 June 2011 (UTC)[reply]

You say it’s fantastic, which means you’re either an admin, a wannabe admin, or ignorant. (/me checks your page, big surprise you’re an admin) You just proved my point, thanks. ¦ Reisio (talk) 05:09, 22 June 2011 (UTC)[reply]

  • Reisio, Wikipedia:No personal attacks makes it very clear: "Comment on content, not on the contributor".
  • That was not an okay response, and it does nothing to refute my point. Failure to address my argument and attacking me personally will not help your thesis.
  • Also, administrators have more trust in them, but they do not count more than regular users. I have the same weight in a Wikipedia discussion as any other user would.
  • It would be wise for you to not do that again.
  • WhisperToMe (talk) 06:10, 22 June 2011 (UTC)[reply]
I think the OP is complaining about being told by an admin to lay off editing a particular page. Astronaut (talk) 17:29, 21 June 2011 (UTC)[reply]
When an editor politely tells someone to make their signature compliant with the rules and that editor even offers suggestions on how the other person can modify the signature to make it compliant but the other person feels that the comments were 'rude' to extent they move both to their semi hidden archive page for 'negative' comments User talk:Jeffwang/Archive 0 this makes one think the other person has problems. Even more so when the other person has been editing since 2008 so isn't a complete noob.
When that person gets into another huff, again moving the content into this semi hidden archive when it is politely suggested yelling at people in an edit notice it not the way to interact on wikipedia this calls in to further question whether that other person has problems.
So when an admin and bureaucrat suggests that same person is making problems in a page and asks them to stay away, without mentioning they are an admin and bureaucrat, and without suggesting they will take any administrative action, it seems likely the problem is more with the person then the admin and bureaucrat. Particularly when the person's response is to yell and suggest they will stop but also report the admin while again yelling and then to come to the RD/C and post an offtopic question. And regardless, calling it admin abuse when the admin has apparently not even said they are an admin in the dispute seems a little rich.
If this is the sort of thing Reisio is calling admin abuse, I would have to conclude with others that that they have no evidence for their claims. It's no wonder we can't deal with real admin abuse when people experienced with wikipedia like Reisio call stuff like this 'admin abuse'.
The simple fact is of course most human interactions whether in real life or on the internet and this includes wikipedia requires that people don't take extreme offense at every single suggestion on improvement that could be intepreted as mildly critical of them.
Nil Einne (talk) 02:02, 22 June 2011 (UTC)[reply]
P.S. Looking briefly at the actual cause for the recommendation, it seems one of the problems was the removal of a request with insufficient info but where the normal policy is to leave such requests in case the person who made it comes back. This may not be the worst crime but it does suggest they were making problems not only for the people working on the page but for the people seeking help.
Nil Einne (talk) 02:41, 22 June 2011 (UTC)[reply]
It's a little more like the sort of thing you’re saying I’m calling admin abuse, and a little less like the sort of thing I’ve actually called admin abuse. Reviewer, rollbacker, let me guess — wannabe admin? ¦ Reisio (talk) 05:16, 22 June 2011 (UTC)[reply]
Well, if you are saying that this isn't a case of admin abuse, but there are other real cases out there and what you describe is "admin abuse" is the real cases, then the discussion on real admin abuse should go on another page.
If you want to say "there is admin abuse" then take the time to document, comment, and explain. Show diffs, link to pages, catalog everything. Start appropriate threads.
Above all "Don't waste your time" (on reporting admin abuse) is absolutely not a healthy attitude on Wikipedia. Nihilism is not a good philosophy. People need to learn to appropriately engage in disputes with administrators (administrator status is only relevant if admin powers are used or if the person flaunts admin status)
WhisperToMe (talk) 06:10, 22 June 2011 (UTC)[reply]

My dear WhisperToMe, what I’ve said is above for your reading enjoyment. ¦ Reisio (talk) 18:47, 22 June 2011 (UTC)[reply]

I have already read everything that you posted before 18:47, 22 June 2011 ([1] [2]), and I replied to those comments ([3] [4]).
WhisperToMe (talk) 20:47, 22 June 2011 (UTC)[reply]

Just saying, if you want to actually know what I’ve said instead of just making up on your own what I’ve said, there it is. ¦ Reisio (talk) 21:15, 22 June 2011 (UTC)[reply]

I link to diffs, which say exactly what you said.
I do not believe that I have mischaracterized anything that you have said. If so, where? How was it mischaracterized?
WhisperToMe (talk) 21:17, 22 June 2011 (UTC)[reply]

Hopeless case. ¦ Reisio (talk) 07:02, 23 June 2011 (UTC)[reply]

When a Wikipedian makes a claim, it is up to him/her to provide evidence. When Wikipedian A makes a claim without showing diffs/evidence, Wikipedian B is in the right to ask him or her to show the evidence. So Wikipedian A ought to say "Okay, here's the evidence" and lay down everything. Wikipedian A should not attack Wikipedian B for asking for evidence.
Wikipedian B has no obligation to search for sources for Wikipedian A's claim.
If Wikipedian A makes a statement, doesn't back it up, and criticizes attempts to ask for evidence, Wikipedian A's campaign is a "hopeless case"
WhisperToMe (talk) 17:52, 23 June 2011 (UTC)[reply]

Archiving a Polish report

From http://komisja.smolensk.gov.pl/portal/kbw/633/8695/Raport_koncowy_MAK_ze_wskazaniem_zmian_do_projektu_raportu.html there is a Polish report at http://komisja.smolensk.gov.pl/download.php?s=65&id=11976

But if I use webcitation.org to archive http://komisja.smolensk.gov.pl/download.php?s=65&id=11976 , the archiving fails (instead it becomes a download link to "download.php").

How do I successfully archive the file? WhisperToMe (talk) 03:12, 21 June 2011 (UTC)[reply]

Can you download it? General Rommel (talk) 00:14, 22 June 2011 (UTC)[reply]
Yes, I can download it.
But what I want to do is have the link archived on http://webcitation.org. The website has no problem archiving a barebones PDF link, like http://www.somewhere.com/This.PDF - But the site does not successfully archive the URL http://komisja.smolensk.gov.pl/download.php?s=65&id=11976 - I want to find a way to get the real file location of the file so that I can archive it
WhisperToMe (talk) 00:54, 22 June 2011 (UTC)[reply]

Also I want to find the real location of the file at http://komisja.smolensk.gov.pl/download.php?s=65&id=11861 WhisperToMe (talk) 02:43, 22 June 2011 (UTC)[reply]

Would it be enough for You to refer to Issuu? Because the reports are there - one, two. --Ouro (blah blah) 09:46, 22 June 2011 (UTC)[reply]
I've tried one and it seems to have worked: [5]. Happy archiving. --Ouro (blah blah) 09:49, 22 June 2011 (UTC)[reply]
Thanks for referring me to Issuu! I've never heard of the site before. I could possibly see if I could upload documents there myself.
However when I checked the webcitation of the first Issuu document, it doesn't seem to work (the content doesn't display)
WhisperToMe (talk) 17:45, 22 June 2011 (UTC)[reply]
I wonder if the website is using a content management system... WhisperToMe (talk) 18:16, 22 June 2011 (UTC)[reply]
But why doesn't it work for You? It displays after the link is clicked. Darn, I'll only be able to answer more thoroughly in the morning... --Ouro (blah blah) 22:43, 22 June 2011 (UTC)[reply]
I see the page, but not the document that the page is supposed to contain WhisperToMe (talk) 03:31, 23 June 2011 (UTC)[reply]
I see it now (I mean, I see your point, and I don't see the document). Okay, so how about one link from good old Wikipedia, and another from a mediocre Polish newspaper? --Ouro (blah blah) 05:07, 23 June 2011 (UTC)[reply]
Whoa! I had no idea the CVR transcription was in the Commons!
Thanks for finding the alternate Polish language report location!
WhisperToMe (talk) 17:34, 23 June 2011 (UTC)[reply]
I was able to get an archive of the one at Gazeta: http://www.webcitation.org/5zf3EFa3M WhisperToMe (talk) 17:42, 23 June 2011 (UTC)[reply]
What about the other one, do you also need to archive it or is it enough that it's on the Commons? Stumbled upon it while searching for the PDFs for you, simple as that. --Ouro (blah blah) 18:33, 23 June 2011 (UTC)[reply]
It might be useful to find another location of the CVR transcript file that can be archived, just in case :) WhisperToMe (talk) 01:51, 25 June 2011 (UTC)[reply]
Well, take your pick. --Ouro (blah blah) 04:45, 25 June 2011 (UTC)[reply]

Best cloud desktop service

What's the best commercial cloud-computing service for occasionally running desktop GUI applications, where all I need that I don't have locally is more CPU power? NeonMerlin 07:17, 21 June 2011 (UTC)[reply]

Google's Chrome OS claims to do that. In fact it shoves everything into the cloud - your data and your apps. Astronaut (talk) 16:56, 21 June 2011 (UTC)[reply]
I dont think that's possible, as it would require very big badwith to move datat between laptop and the cloud, as the laptop still needs to display what the user is doing. So if you need more CPU power, I'd believe the only way is for the CPU to be housed in the cloud, and somehow the CPU's instruction transferred between the cloud and a reciever. Perhaps that would be the future; buying a computer that would be stored online-the only thing necessary would be a display that has a superfast wireless connection.General Rommel (talk) 01:56, 27 June 2011 (UTC)[reply]

Windows PE image restore

I'm restoring a computing using Windows PE, during the restoration process a message appears in the command line ending in "...SACL is going away". Is this a good or a bad thing? Jackacon (talk) 10:22, 21 June 2011 (UTC)[reply]

It's a normal part of the process. gnfnrf (talk) 15:45, 21 June 2011 (UTC)[reply]

Great cheers! Jackacon (talk) 14:32, 22 June 2011 (UTC)[reply]

Is there a charity that will send my old computer to the 3rd world?

I'm sure there are many schools and other facets of 3rd world life that would appreciate a computer, even if old.

There is a computer I had two systems before the one I have now, sitting in a closet in my apartment. I got it to work last time I turned it on, so it's still of some use. I wish to see it off to Africa, SE Asia, or any other impoverished area of the world that could use another secondhand computer.

Would you please help me find the right resources to get that system sent there? Thanks. --65.64.190.134 (talk) 13:46, 21 June 2011 (UTC)[reply]

Chances are you can find someplace in the very same city you live in that can relocate that to an impoverished person... in the very same city you live in. My understanding is also that most computer and electronics recycling programs end up shipping all the components to the "3rd world", where they're dismantled and separated on the cheap. It's unlikely that shipping an old computer to another continent would be an efficient use of anyone's money/time/effort. ¦ Reisio (talk) 15:41, 21 June 2011 (UTC)[reply]
The main problem with old computers is the software. Sure - you can send your old computer to someone else - you can actually walk down to a school in a poor neighborhood and ask the principal which student would make the best use of it (that's what I do). But, you need to wipe it clean first. Then, you need to reinstall the operating system - do you still have your Windows license? Then, you have make it useful by adding Microsoft Office - do you have that? Then, you need to show the kid how to use it - because you can't expect a kid in a poor school to have ever used a computer before. Then, you have to plan to be forgiving when all your time is wasted because the kid's parents take the computer straight to the closest pawn shop to get a quick $20. -- kainaw 18:30, 21 June 2011 (UTC)[reply]
Sometimes the agency collecting the computer installs the OS itself. WhisperToMe (talk) 03:31, 22 June 2011 (UTC)[reply]

If what you always do ends up with it being pawned, maybe you should stop doing that. In my town (which I wouldn't consider particularly special in this regard), we have various organizations that collect old computers to use in free computer labs, for people to learn how to use various software with, so they can get better jobs. They aren't pawned. As for kids and learning, I'm fairly sure science has proven they're much better at it than adults, particularly when there's the potential to play games. :p Linux, OpenOffice. ¦ Reisio (talk) 01:41, 22 June 2011 (UTC)[reply]

On the other hand, many charities in the UK are reluctant to take any electrical item due to liability problems should it later exhibit a fault. As for computers, there are additional problems with the software licenses - the last thing a charity needs is to be sued by Microsoft for 'distributing' improperly licensed copies of Windows/Office. Astronaut (talk) 09:45, 22 June 2011 (UTC)[reply]
That's what Linux & OpenOffice.org are for. Sending old computers to third-world countries runs into issues around toxic waste. Roger (talk) 11:04, 26 June 2011 (UTC)[reply]

Web server on top level domain only?

I pretty distinctly remember seeing a url leading to a working http server on just a top level, something like http://example or http://.example. Anyone know what I'm talking about? 71.200.137.85 (talk) 18:05, 21 June 2011 (UTC)[reply]

Generic top-level domain? It's also possible that you aren't using Internet DNS servers. If you're using a local name-resolution server (part of your intranet, or something you intentionally configured in your hosts configuration file), then a URL may point to a non-globally-qualified host. Nimur (talk) 20:55, 21 June 2011 (UTC)[reply]
In a quick sweep of country codes, I found that all of the following countries have an IP address directly on the top-level domain: ai bi cm dk gg hk io je ph pn sh tk tm to uz ws. Checking them all for the presence of a web server is left as an exercise. 67.162.90.113 (talk) 22:41, 21 June 2011 (UTC)[reply]

'Monitor Program'?

For a while now, a certain well-known game downloader /updater (similar to Steam) has not been working properly on my machine. Every time I try to run it, I get a small dialogue box titled 'WinLicense' (sometimes 'Themida'), and a message saying "A monitor program has been found running in your system. Please, unload it from memory and restart your program." I am unable to find out what 'monitor program' this is referring to, and I contacted the company that owns the game downloader. They told me that I probably ran some debugging software, but I have no knowledge of this. Since then, they haven't spoken to me at all (for over two weeks, and despite my persistent and repeated requests for help), but the problem still persists and it's driving me crazy. AVG Internet Security 2011 does not detect anything, and nor do Malwarebytes Antimalware and Ad-Aware Internet Security 2011. I also have Zemana Antilogger running and it detects nothing. Does anyone have any idea of what to do here? KägeTorä - (影虎) (TALK) 18:43, 21 June 2011 (UTC)[reply]

For some games, particularly online games, people make available programs like Glider that automate boring processes (heck, what in WoW isn't a boring process) or maphacks that allow otherwise invisible stuff to be seen. These programs sometimes attach to the game process using the OS' debugger APIs so they can monitor and intercept what the game is doing, and sometimes patch the game processes memory. Some malware also uses these APIs to steal licence keys or login information from programs (e.g. Win32WowStealer). So anti-cheating software like Warden and PunkBuster look for programs they recognise, and also for programs that hook the debug APIs. That may be what they mean by "monitor program". In this case it looks like the program in question is protected by Oreans Technologies WinLicence program (info). So it sounds like something is using one of the APIs that WinLicence finds objectionable. Unfortunately makers of programs like that aren't always very forthcoming about what they object to; and they don't give direct support to the end user (their customer is the game's maker). Assuming you really aren't running a cheat program, and you've not got any malware, then the most common category of stuff is indeed programs used by software developers - debuggers, network monitors, program-crash monitors, and things like RegMon and FileMon. Unfortunately these hooks are also used by other programs that you might not expect, such as accessibility software and remote-access software (like VNC). And (given the unresponsiveness of the vendor) figuring out what their program is objecting to can be tricky. The trouble with such hooks is that they frequently install a probe at bootup time (technically they install a ring0 monitor and hook the relevant kernel hooks) - so simply killing a program (e.g. with the Task Manager) doesn't uninstall these objects (they have to not be loaded at boot in the first place). Worse, anti-virus and anti-malware programs also hook these. Good security and licence software should recognise and whitelist other legitimate security software, but maybe in you case it's mistaking a good cop for a villain. Unfortunately the responsibility really is on WinLicense and the game program company to tell you what they're specifically objecting to, as it's really not reasonable to expect you to experimentally uninstall programs until you chance upon whatever it is they mistake for malware. -- Finlay McWalterTalk 19:51, 21 June 2011 (UTC)[reply]
Ah, cheers. Well, I know I do not have any cheat software at all. I do have Punkbuster, but I have had that longer than I've had this downloader (the name of which I would rather not divulge as they are an up-and-coming company and I do not want to give them any bad press, plus they have been very good with me in the past). At one point, I had Greatis UnHackMe, which I uninstalled - but after the uninstallation I was informed there were files left over that had to be manually removed. I did so (at least, by clearing out what was left in Program Files). Perhaps this is the culprit, as it runs a number of monitors, and perhaps I have not fully cleansed and exorcised my system of it. After reading through your post, I thought also that TeamViewer may be to blame, but uninstalling that made no difference. In the end, I have re-contacted the company in question, and they are looking into it once again. Cheers. --KägeTorä - (影虎) (TALK) 01:48, 23 June 2011 (UTC)[reply]

June 22

Firefox Icon

As can be seen here, my Firefox icon isn't showing. I tried re-installing Firefox, but that didn't help. Is there a way to get the Firefox symbol back? 74.15.136.219 (talk) 01:10, 22 June 2011 (UTC)[reply]

Unpin and repin? Bluefist talk 01:12, 22 June 2011 (UTC)[reply]
Unfortunately didn't work. 74.15.136.219 (talk) 01:33, 22 June 2011 (UTC)[reply]
What's that pic supposed to show ? (I was expecting a screen shot of your desktop with a non-standard Firefox startup icon.) Maybe I don't understand the problem. Is it one of these ? :
A) There is no longer any Firefox icon on your desktop.
B) There is a Firefox icon, but it's not the usual one.
C) Some other problem ? StuRat (talk) 01:30, 22 June 2011 (UTC)[reply]
The weird first icon is supposed to be a Firefox icon. For aesthetic and perfectionist reasons, it would be nice to have the regular icon. 74.15.136.219 (talk) 01:33, 22 June 2011 (UTC)[reply]

I’d ask http://webchat.freenode.net/?nick=w7pinIcoMIA&channels=##windows about it, but I’d be surprised if uninstalling Firefox, backing up your profile folder & deleting it, reinstalling Firefox and copying back your profile contents wouldn’t fix it. As tedious as that is, it’s fairly straightforward. ¦ Reisio (talk) 01:46, 22 June 2011 (UTC)[reply]

Couldn't you right-click on the icon, click on properties, and then change the icon back to what it's supposed to be? Even if it's windows icon caching problem, I think that would cause it to reset. APL (talk) 03:22, 22 June 2011 (UTC)[reply]

mouse single click e speaking software

I have installed e speaking voice softwre , i have used by giving some commands for example ,Mouse up ,mouse left ,..... but i do not know ,how to do single left click by using voice command ,how can i import this command. — Preceding unsigned comment added by 119.152.12.109 (talk) 05:50, 22 June 2011 (UTC)[reply]

Have you downloaded and read the manual? Have you tried the online support pages, e.g. www.e-speaking.com/support.htm?--Shantavira|feed me 10:21, 22 June 2011 (UTC)[reply]

It'd be odd if you were having trouble with this one key and no other, but just FFR, software like AutoHotkey (win32) and AutoKey (also xdotool, xautomation, xmodmap [Unix]) can often fill gaps for things like this. ¦ Reisio (talk) 18:45, 22 June 2011 (UTC)[reply]

Elite question

Elite (computer game) is a 3D spaceflight computer game from several decades ago. It features a massive galaxy, and travel between stars is done by using hyperspace jumps because the distance is supposedly too large to cover without them. My question is a technical one - does Elite, in theory, allow travelling between stars without the hyperdrive, or is there a separate "space bubble" for each star that can't be exceeded (or that goes on infinitely for an arbitrarily large distance)? What about Oolite (computer game), the free clone of the game? 212.68.15.66 (talk) 06:39, 22 June 2011 (UTC)[reply]

This is covered in the article - ships can carry enough fuel for a maximum of seven light years, which is enough to get between almost all of the stars within a galaxy. Warofdreams talk 09:39, 22 June 2011 (UTC)[reply]
The 7 light years gets you a few stars over; to get across the galaxy you have to make dozens of jumps (with refuelling between each jump). But as the article notes, the procedural generation for stars does put some outside normal hyperspace range (not that it matters, because all these procedurally generated places are as dull as one another). But that's not the OP's question - it's whether one can travel between stars without the hyperdrive; whether one can just head off in normal space (normal space travel doesn't require fuel) and eventually end up at another star (if you left your Acorn Electron turned on for 20,000 years). I believe the answer is no. I've seen back-engineered code purporting to match Elite's logic and it only flipped the "which star system we're in" indicator in response to the Jump operation. And secondly there's no meaningful correlation between the 2d coordinate system used in the galaxy map and the 3d coordinate system used in the gameplay; so one can't meaningfully head in the direction of Reidquat, because even if the coordinate systems did mesh there's no way of knowing what direction that would be. I don't know about later Elite games or things like Oolite - they all appear to have added more features. The one time in classic Elite when you can end up (in the galactic map) outside a star system is when you misjump and end up in WitchSpace (typically without enough fuel to jump anywhere), but then the Thargoids blast you to bits and it's back to the saved game. -- Finlay McWalterTalk 10:19, 22 June 2011 (UTC)[reply]
Thank you. Actually, in Oolite you can also be intercepted in witch space, but luckily they added (I think) a feature which may cause a random passing ship to notice you... In any case, seeing that Elite was very limited in memory and acording to the developers in several documentaries they worked very hard to remove unnecessary computation and memory requirements, having all the stars "coexist" seems unlikely as they would certainly be a rather superfluous feature. 212.68.15.66 (talk) 11:57, 22 June 2011 (UTC)[reply]

Does anyone know how this works in the sequel, Frontier: Elite II? JIP | Talk 19:24, 23 June 2011 (UTC)[reply]

Simplified Chinese Music Notation software

Where can I find or purchased the Simplified Chinese Music Notation software for computer that I can put in the Chinese song lyrics and guitar chords.Simonsimon123 (talk) 13:45, 22 June 2011 (UTC)[reply]

I'm not 100% certain of this, but Finale Notepad is a pretty feature rich sheet music editor. It's not free, but my recollection from when I last used it was that it supported wider character sets than most sheet music programs. i kan reed (talk) 17:37, 22 June 2011 (UTC)[reply]

Be pretty easy with LilyPond (frontends available). If you don't know how to type any Chinese, I'm not sure what will help you, it'll be tedious. If you do know, you shouldn't need the help of the music typesetter. ¦ Reisio (talk) 18:42, 22 June 2011 (UTC)[reply]

Having trouble with my computer

I just did a system restore to fight a stupid viris and now my programs don't work except a few. Any program I try to run brings up the open with window and most of my programs are not in there. Thank God Firefox is or I couldn't ask for help. Please what do I do to fix this? PS it dosnt matter if i use the desktop shortcut or try to run the exe direct. — Preceding unsigned comment added by 97.125.133.231 (talk) 17:38, 22 June 2011 (UTC)[reply]

If you reinstall Windows, you normally have to reinstall all your programs, too. Have you done this? --Phil Holmes (talk) 17:58, 22 June 2011 (UTC)[reply]
Is a system restore the same thing as re-installing windows? Googlemeister (talk) 18:19, 22 June 2011 (UTC)[reply]
No it is not. It rolls back the registry and program files to a previous state, removing any system changes along the way. All your documents and similar files are retained, but replaces things that viruses can use to control the system with a specific previous version. i kan reed (talk) 18:31, 22 June 2011 (UTC)[reply]
So the OP must have restored to an early point before most of the software was installed. The software will still be there, but its registry entries will be missing. In theory, these could be re-written with a registry editor, but it's not a task I would like to attempt! I think re-installation is the only easy option, unless a more recent restore point is still available. Dbfirs 20:35, 22 June 2011 (UTC)[reply]
I don't think so. It sounds like the OP's programs are gone. The program files folder is an exploitable point for viruses, so it gets rolled back. i kan reed (talk) 20:36, 22 June 2011 (UTC)[reply]
But then why wasn't his Firefox taken out? Googlemeister (talk) 21:11, 22 June 2011 (UTC)[reply]
I was working on the assumption that "system restore" might well be a reinstallation of the initial system as delivered, using the "restore system to its original state" manufacturer-delivered rollback solutions. --Phil Holmes (talk) 21:22, 22 June 2011 (UTC)[reply]
Assuming the OP has a Windows system, Firefox would probably not be on the initial system as delivered. Googlemeister (talk) 21:24, 22 June 2011 (UTC)[reply]

Yes I have windows and no I only did system restore for 3 days ago. I had this coputer for a year. So what do I need to do to fix this? — Preceding unsigned comment added by 97.125.133.231 (talk) 22:35, 22 June 2011 (UTC)[reply]

Was the virus something that plagued you with warnings about all kinds of weird system errors and potential hardware faults, in an effort to get you to buy some fixer program? Did it also replace your desktop background with a plain colour and make all your document disappear? That particular variety of scareware is well known for also hiding your stuff, including the program names in the start menu. Astronaut (talk) 12:48, 23 June 2011 (UTC)[reply]
With the above, if that virus hid an important dll file, that might cause something like this to happen. Googlemeister (talk) 12:58, 23 June 2011 (UTC)[reply]
Generally it sounds like the OP has malware along the lines of Windows 7 Recovery/Restore. It hides all your start menu programs (it actually hides the whole c drive). The result is that there are no programs you can launch from the start menu. This describes the problem [6]. If this is what's happening post back and there are some resources that can help. RxS (talk) 13:43, 23 June 2011 (UTC)[reply]
By the way, if this is what's going on this page has some detail about how to recover the start menu shortcuts [7] RxS (talk) 14:13, 23 June 2011 (UTC)[reply]

Kenya WiFi Security

I am going to be travelling to Kenya for a few months and will be using mainly internet cafes to access my email, facebook account and other web services. I am worried about my laptop being stolen so I have already backed up and erased all personal files. Is it safer to remove all cookies from my web browser so that I have to re-enter the passwords and account name every time I log into my email or to just leave my accounts logged in? On one hand, if my laptop gets stolen, the thief will not have access to my accounts, but if I enter my password everytime I log in, will hackers be able to sniff out my password if the WiFi connection is unsecure? Acceptable (talk) 18:03, 22 June 2011 (UTC)[reply]

Even if the WiFi in some hotel or bar or whatever was itself secure, you have no way of trusting that the hotel's wired network is secure, or indeed that the upstream connections beyond it are either. At the very minimum you should make sure that you're doing stuff over an https connection. But if it were me I'd get a VPN service like StrongVPN and only connect (for doing anything worthwhile at least) over that. Personally I wouldn't be comfortable with things that claim to clear all the confidential information; I'd use whole disk encryption as well. -- Finlay McWalterTalk 18:18, 22 June 2011 (UTC)[reply]

Router logbook

Are WIFI routers supposed to have a kind of logbook? Or do they only show the current users logged? Wikiweek (talk) 22:23, 22 June 2011 (UTC)[reply]

I'm afraid it'll depend completely on the access point make/model and the firmware it's running. Most consumer ones will simply show the MAC address of all connected devices and not much else, some will also show websites currently being visited and other current connections details, but some will literally show nothing at all.  ZX81  talk 23:01, 22 June 2011 (UTC)[reply]
And a tech-savvy operator of a router could enable it to log all traffic that goes through it.--el Aprel (facta-facienda) 01:38, 23 June 2011 (UTC)[reply]
If it's supported by the device...  ZX81  talk 02:23, 23 June 2011 (UTC)[reply]
True. I included that statement because it seemed that the OP might be concerned about their privacy (which is non-existent) over an unknown WIFI network.--el Aprel (facta-facienda) 21:55, 23 June 2011 (UTC)[reply]

June 23

Running program for Unix-based OS

Can I run softwares for Unix-based operating system on Windows?125.235.100.105 (talk) 01:07, 23 June 2011 (UTC)[reply]

That's a complicated question.
The short version is that most unix-only software will not run natively on Windows, however if the software you're looking to use is open-source, it's very likely that someone has made a windows version of it.
And, in a worst case scenario, you could probably install linux within a "virtual machine" on your windows machine, though that would probably be more trouble than it was worth.
If you can tell us what software you're specifically interested in we may be able to help. APL (talk) 03:35, 23 June 2011 (UTC)[reply]
It's not that difficult to install a linux distribution as a virtual machine in Windows. I think it's possible with the Microsoft Virtual PC and I know it's possible with Oracle VirtualBox. I have 3 Ubuntu virtual machines running on VirtualBox.--Phil Holmes (talk) 08:08, 23 June 2011 (UTC)[reply]
The software I looking for use is a platform that run Unix-based softwares on Windows, like Wine that run Windows software on Unix-based operating systems. 125.235.100.158 (talk) 09:23, 23 June 2011 (UTC)[reply]
That's co-linux. You can download a compressed image of a 1GB file system running Ubuntu for it. Extending the image is a bit of a pain - you are probably better off creating a second image for storing your documents (/home). You should also install an X-server if you want to run graphical programs. cygwin's or mingw's ones is probably the easiest. Ask here again if you need advice to set it up. CS Miller (talk) 12:07, 23 June 2011 (UTC)[reply]

There's always Cygwin. It provides a Unix-basd compatibility layer on top of Windows. You can start Cygwin as a normal Windows program, and it presents you with a Unix shell. It's not an emulator - that shell is running directly on Windows. You can traverse your own Windows file system through the Unix shell interface, to read and write files. You cannot run Unix binaries from "real" Unix distributions like Linux, Mac OSX or Solaris, but you can get Unix-based source code and compile it in Cygwin, which will then result in completely native Windows binaries that can be run from inside Cygwin. JIP | Talk 19:15, 23 June 2011 (UTC)[reply]

Ubuntu: Command + ` OSX equivalent?

On the Mac, I use Command + ` (the tilda) to cycle through windows in the current application (eg terminal or chrome). It's like alt + tab except only for the current application's windows. I also don't want any flashy graphics like exposee or anything. Is there anyway to do this on Ubuntu (possibly on compiz?)? Thanks! — Preceding unsigned comment added by Legolas52 (talkcontribs) 04:35, 23 June 2011 (UTC)[reply]

Try CTRL+TAB, CTRL+SHIFT+TAB, CTRL+PGDN, CTRL+PGUP. You can make ⌘+` mapped to any of these. ¦ Reisio (talk) 06:57, 23 June 2011 (UTC)[reply]
On my Ubuntu set up: CTRL+ALT+LEFT or CTRL+ALT+RIGHT cycles through the workspaces; ALT+TAB cycles through the windows in the current workspace (minimised windows stay minimised but still have a place in the cycle); CTRL+TAB cycles through the tabs on the currently active window. Astronaut (talk) 12:38, 23 June 2011 (UTC)[reply]

Torrents

My torrent is apparantly downloading, but olny 6.5% has been done and it isn't making any progress after that. Its ETA displays the infinity symbol. Do I have to wait some more or move to a different location or country to get more data? What are ways to speed up a torrent download, or at least not make its ETA be infinity? 72.235.230.227 (talk) 05:35, 23 June 2011 (UTC)[reply]

Usually indicates that the only person/s who were seeding it are not presently online or available. If you leave it attempting to download eventually they'll probably get back online, though eventually many torrents do "die" (lose all seeders). Most likely the same time tomorrow you'll get similar download speeds. ¦ Reisio (talk) 07:00, 23 June 2011 (UTC)[reply]
Depending on your torrent program, you can usually tell how many complete copies there are on the network by clicking around a bit. If it is less than 1, you won't be able to complete the download unless more seeders come online. Starting up torrents that have very low numbers of seeders is a recipe for stalled torrents. --Mr.98 (talk) 14:26, 23 June 2011 (UTC)[reply]
Maybe your peers or peer don't have the complete film either, and will never have, since new downloaders just pass around the pieces that they have. No need to speed torrents up, just go for healthy torrents; they'll give you at least 200 kb/s download rate. Wikiweek (talk) 14:37, 23 June 2011 (UTC)[reply]

MS Outlook 2007

I have just bought a new home computer and installed Outlook 2007. I have set up mail accounts exactly as they are already set up on my office computer. This seems to work perfectly well in terms of receiving incoming mail. However, whenever I try to send an email it immediately bounces back to me as undeliverable. I get the following error message: 553 sorry, that domain isn't in my list of allowed rcpthosts. I am hopelessly non-technical. Can anyone explain in words of one syllable how I can fix this problem? Thanks for any help. Maid Marion (talk) 09:38, 23 June 2011 (UTC)[reply]

If (as seems likely) you're using your work's email servers then they may be configured so as only to allow mail to be sent from certain IP addresses, so as to prevent spammers and other evildoers using them as SMTP relays. I'd suggest asking your IT department for advice on how to get around this. Edit: Thinking about it a bit more, the details of my answer may be wrong, but I still think the advice of asking the IT dept is valid. AndrewWTaylor (talk) 10:01, 23 June 2011 (UTC)[reply]
Thanks for trying Andrew, but there is no IT department. I am just a solitary individual, working sometimes from home, sometimes from a tiny office. The server that hosts my email and website is provided by a third party - I just pay an annual rental for this. Does your answer mean that I need to contact the outside third party? Problem with this is that I am not a high priority for them and I may get no response. Any simpler solution possible? Maid Marion (talk) 10:21, 23 June 2011 (UTC)[reply]
Googling an error message is normally a good way to get answers. You could have a look at these[8][9][10][11][12] There are a variety of possible causes, and it will depend on your mail server and other settings. One common cause is that you may have configured your email settings incorrectly in Outlook.
Most ISPs and web hosting company provide extensive online help pages or forums that you can search or post to. You should certainly try emailing them; many use semi-automated systems to respond to emails, so they may reply by pointing you to their website or other useful information, even if you do not get a response from a human being. --Colapeninsula (talk) 10:56, 23 June 2011 (UTC)[reply]
Many thanks Cola. Those links provide a mine of information. I will try their suggestions when I get home this evening. If they don't work, I'll be on my knees again asking for further help tomorrow! Maid Marion (talk) 11:09, 23 June 2011 (UTC)[reply]
In my experience the majority of Outlook outgoing e-mail problems come from issues with the outgoing server port or SSL settings. First thing I'd try is to set the outgoing server port to 587 or 465 (try both). Accounts>Your email account>more settings. Depends on if your account needs SSL or not but many ISP's are blocking port 25 these days. That setting can be affected by who you are using for an ISP. The SSL less so, but it will still be worth trying to adjust the outgoing SSL settings as well. RxS (talk) 13:50, 23 June 2011 (UTC)[reply]
Given the fact that you get a proper error message, firewall or port filtering does not seem to be an issue. You can try setting the SMTP port to 587 and to enable authentication, but this will only help if your work ISP has actually configured their outgoing email server (SMTP) to accept authenticated cnnections from users that are not directly connected to them. A lot of ISPs will not bother setting things up that way. As a spam prevention measure, most SMTP servers only allow IP addresses of their own customers to send mail through them. So when at work, you should use the work SMTP server. At home, you should set the SMTP server to the one provided by your home ISP. Unilynx (talk) 06:12, 24 June 2011 (UTC)[reply]
Many thanks to all of you - the usual fantastic Wikipedia response. The problem is now solved. I followed one of the suggestions in Cola's links and simply checked a box on my outgoing server settings saying 'Use same settings as incoming server'. It worked like a charm. Thanks again everyone. Maid Marion (talk) 10:03, 24 June 2011 (UTC)[reply]

Secure VPN + Insecure (W)LAN

If you want to connect to the Internet using a (W)LAN that you don't trust, would a secure VPN make it considerably secure? Or would it always be possible for an attacker controlling the (W)LAN (or some link above that) to pretend he is your VPN - forwarding all traffic passing through him? Wikiweek (talk) 14:34, 23 June 2011 (UTC)[reply]

When you sign up for a VPN they send you their cryptographic certificate and on subsequent connections your VPN client verifies the identity of the VPN using that. With that working properly, a man-in-the-middle attack wouldn't succeed. The danger point is that initial key exchange. For that you most often rely on public SSL certificates which your browser verifies against the SSL certificate authorities that it knows about a priori. Good VPN providers go to great lengths to make sure you get the correct certificate and not one that's been altered in transit - if memory serves the last time I signed up for a VPN they read the certificate fingerprint to me (in hex) over the phone. This isn't foolproof (certificate authorities can, in theory, be compromised, for example) but it's much more elaborate than simply putting a fake VPN inline between you and the real internet. -- Finlay McWalterTalk 14:42, 23 June 2011 (UTC)[reply]

BrowserChoice.eu - does it really work like this?

This isn't really a problem as such: more a peculiar thing that I wonder if I've understood correctly.

I've recently had to completely wipe my hard-drive and start again from scratch. So, I've got my old copy of Windows XP and am slowly going through the many, many critical updates in sequential order. One of these is the Browser Choice thing, and I make my browser choices, none of which are Internet Explorer. All seems well, and all trace of Internet Explorer seems to be gone.

But then, I go to clean my start-up folder (it comes preloaded with things like Messenger), and notice BrowserChoice.exe, which I unselect. When my computer restarts, all the Internet Explorer shortcuts are back and an Internet Explorer folder containing (among other things) the connection wizard and Internet Explorer itself has appeared. The folder cannot be deleted, because something in it is too important. If Internet Explorer is deleted, it recreates itself by the time you look in the folder again. The shortcuts can be redeleted, but are put back in all their places when you restart. When I reselect BrowserChoice.exe in the start-up folder, this behaviour stops and Internet Explorer again appears to have gone. Except that, when the only browsers I had chosen were Firefox and Opera, if I click on the 'check for updates' thing in the Security Centre, it uses Internet Explorer (which it otherwise pretends has been removed) to open the webpage. Once I installed Maxthon 3 (which uses the same engine (?) as Internet Explorer), it used that instead.

So, my understanding is that, in order to comply with the directive on provided browser choice, rather than providing a patch which deleted Internet Explorer in any way, Microsoft wrote a patch that put an exe in my start-up folder, which runs every single time I start my computer, to supress Internet Explorer from restoring all the shortcuts, and somehow hides Internet Explorer, while leaving it installed and available to the system to open a specific webpage. Is this accurate? Is it actually impossible to delete Internet Explorer from Windows XP?

And, if Internet Explorer is somehow completely embedded into the system, am I opening myself up to any problems if I don't download and install the various patches for Internet Explorer which the system keeps offering me, even after I selected not to be told about them again? I'd assumed I wouldn't need them, since I don't have or use Internet Explorer, but if it's inextricably twisted into everything else, I wonder if there will be unfortunate consequences of not updating it. 86.164.66.52 (talk) 18:44, 23 June 2011 (UTC)[reply]

The bulk of Microsoft's web browser is a GUI widget that can be used by any application. It is technically possible to delete it, but not useful because it breaks too much software. You can probably delete iexplore.exe, which is a wrapper around the widget, but you'll save hardly any disk space that way. It makes more sense to just delete the shortcuts and forget that it's there, just like the the hundreds of other small utility programs that you never use. You do need to install security updates to "Internet Explorer" because they are really updates to the browser widget.
I've never encountered BrowserChoice.exe, which is apparently a fairly new, Europe-only thing. I've never noticed IE shortcuts being automatically recreated, but I'm not sure I've ever tried to delete them. -- BenRG (talk) 00:04, 24 June 2011 (UTC)[reply]
This Technet blog entry from Microsoft explains what it does. It doesn't say it uninstalls Internet Explorer. Astronaut (talk) 11:43, 24 June 2011 (UTC)[reply]

Restarting the display in Linux

Hello. I have two questions:

  1. I'm running Debian Linux 6.0 on one of my computers. I have it set to not run gdm on bootup, so I boot right to the terminal and then run startx if I want to work in Gnome. That's been working fine until recently; now when I run $startx, it cuts to a screen that is completely blank except for a cursor and doesn't display anything no matter how long I wait. Even odder: I ran #gdm as root, which is supposed to bring up a login screen (but the same thing: blank screen with a cursor). Without seeing anything, I typed in my username, password, and hit enter, Alt+F1'd back to the terminal, ran ps aux, and saw that all the processes where running in Gnome under my uid indicating a successful login, even though the screen is blank. Is this problem easily corrected? It seems that everything is working okay except actually displaying the desktop on the screen.
  2. Since I couldn't logout of the desktop since I could not see it, I killed all the processes affiliated with Gnome at the terminal. When I Alt-F7'd to check that the mouse had disappeared and that there was no trace of Gnome, the screen froze. It's frozen on the old ps aux listing and won't let me change terminals (or do anything, for that matter). I connected with PuTTY over SSH, logged in, and everything is working fine. I logged out my frozen session through PuTTY, but the screen is still frozen. I tried Alt+F'ing to a different terminal, and even though it was frozen, I typed my username and password, and called ps aux on PuTTY and it confirmed the login—despite the frozen screen—was successful. So, is there any way to restart or resynchronize whatever is responsible for displaying the terminal to screen?

PS I'm running some lengthy processes on my Linux box that I'd rather not have to shut it down and re-run them. That would be okay if it's necessary, but I figured I'd take the time to learn a little more about Linux, too, since it seems the only problems I'm having are with the display, which may be easily fixable. Thanks!--el Aprel (facta-facienda) 21:52, 23 June 2011 (UTC)[reply]

http://webchat.freenode.net/?nick=brokenX&channels=#debian ¦ Reisio (talk) 22:58, 23 June 2011 (UTC)[reply]

Samsung Galaxy S II release date in China?

Can someone help me find the Galaxy S2's China release date? I'm having some trouble... The Masked Booby (talk) 22:30, 23 June 2011 (UTC)[reply]

Laptop design

Hello, why is it that new laptops tend not to have a screen that locks into the keyboard when closed ? The screen just sits loosely on it. — Preceding unsigned comment added by 41.141.77.57 (talk) 23:55, 23 June 2011 (UTC)[reply]

It isn't clear to me what value such a lock would have -- and if you had one and it jammed, you'd have a problem. Looie496 (talk) 00:39, 24 June 2011 (UTC)[reply]
Apple's design aesthetic is the actual answer to your question. ("why is it that new laptops tend to not have a screen that locks into the keyboard when closed".) --188.29.15.168 (talk) 01:20, 24 June 2011 (UTC)[reply]
Because without a lock, or some sort of springy firmness the two halves rattle against each other when closed.
I don't know know why they don't have latches anymore, but I suspect that it's a combination of better hinges and style. APL (talk) 01:29, 24 June 2011 (UTC)[reply]
Eh, in my experience, the hinges tend to be so bad you don't need the lock - you have to use more than one hand to open them regardless. The answer is, of course, that it is the current trend. The bulk of electronics are not designed to consumers' wants, but to consumers' present expectations (which trend low). ¦ Reisio (talk) 02:55, 24 June 2011 (UTC)[reply]
The hinges aren't "bad", they're intentionally stiff, so the laptop will stay as opened or closed as you left it. StuRat (talk) 05:03, 24 June 2011 (UTC) [reply]
From my laptop owning experience the latch-mechanism is one of the weaker/less reliable parts of the construction. My current laptop uses magnets to hold the lid closed. This works extremely well and is (in my eyes at least) 100% better than any latch mechanism. ny156uk (talk) 05:04, 24 June 2011 (UTC)[reply]
Just to illustrate this, Apple's iBook G4s had hinge locks which, if broken, necessitated replacing the entire top frame of the laptop, which was neither a cheap nor an easy piece to replace. (Or using velcro or other ersatz solutions.) --Mr.98 (talk) 12:50, 24 June 2011 (UTC)[reply]

June 24

2 x 500 GB (WD) or 1 x 1 TB (Toshiba)

Either option costs the same. Which is a better choice as external HD? Wikiweek (talk) 22:03, 24 June 2011 (UTC)[reply]

I would go for the two 500GB drives; that way if one fails you only lose half your data, instead of losing everything if the 1TB fails. AvrillirvA (talk) 22:23, 24 June 2011 (UTC)[reply]
Note that there are probably other factors here — specific models have better failure rates than other, different rotational speeds mean different data access, etc. A pro-tip is to check each specific model on newegg.com first; they're a very reliable place, and you can usually tell which drive models are lemons pretty quickly. --Mr.98 (talk) 22:26, 24 June 2011 (UTC)[reply]

Onboard video card

I want to stop using the video card I brought some years ago, as I suspect it's malfunctioning, and use the onboard video card instead. However, if I connect the monitor to it, nothing happens (neither in windows nor while loading, as if the monitor was not connected to the PC). Do I have to actually remove the video card from the motherboard for the onboard video card to work, isn't there a way to shut it off and activate the other? Cambalachero (talk) 22:20, 24 June 2011 (UTC)[reply]

Looking for an audio media player SOFTWARE

Which could let me play PLAYLISTS in FASTER playing rates. i tried with VLC media player and even asked the VLC support team, but in the current version, there is no working way to do so in a playlist (fasten) rather, only in single media files.

as mentioned, i look for a program WHO WILL (!) let me the option to do so (Fasten a playlist), for i could hear lot's of files faster than they originally played...

many thanks and blessings, would dear much for me!.

Beni.