Jump to content
xisto Community

jipman

Members
  • Content Count

    717
  • Joined

  • Last visited

Posts posted by jipman


  1. Is there anyone here who can explain why they added a install-to-hdd option to damnsmall... It would save some extra (mega)bytes that can be used to fill with other things. I don't see why anyone would want to install a stripped down version of knoppix on his harddrive. It's an older kernel and it's incomplete for the more advanced stuff one does with his comp.anyway, I just want to warn you guys not to use this as a learning-os, since there are a few differences in it compared to a fully equiped Linux distro. I myself usually use damnsmall if I'm at a foreign computer and I don't trust the environment. DSL is like a pocketknife, it can do alot, but it lacks the power/handling of the real thing.


  2. What you also can do is use an zipped version of the bit torrent program. (bit comet is good for that) unzip it to a temporary directory, download your stuff, and when you're done, re-zip the programfiles back into the zip, and locking it with a password or something. That way, you can still get your files and prevent your father from knowing you've been downloading.;)


  3. Notebooks used to be portable computers that did not have internet hardware onboard, like modems or network ports. This was used in the old days.Laptops do have them so the are called lap (as in your lap) TOP. Which derives from desk top.But since most of the portable computers have internet access stuff on board, laptop is the most common name now.ps. don't ask me for proof or something, I read it somewhere a long time ago and I can't be bothered to find a source ;)


  4. If you go for cheap then you probably would end up with an Intel cpu. Because AMD cpu's in laptops are very rare. When going mobile, there are pentium m's and celeron m's, where pentium m's are the top of the line. If don't know what you want to do with a laptop. But if you are just using it for internet/email/chat stuff. A celeron m will do just fine.If you need somesort of portable media center like thing you might better go for a pentium m.Anyway, I've seen reasonably cheap laptops for around 800 euros that have a celeron. If you are not planning to do games or movie encoding or something, they are the best choice


  5. Usually, password protecting files is about the same thing as encryption. If you password-protect something, there are 2 ways to secure the file. 1. Put the password in the file for the program to use2. encrypt the contents with the password and add a checksum of the original file at it.with 1. All you need to do is read the password out. With 2, that is not possible.Anyway, I think that nowadays encrypting something and password protecting something is about the same, both need passwords. The reason i prefer saying encrypting is that it's not so long as password protecting :DAbout drivecrypt, doesn't that make working slow? all that encrypting and stuff? Am I wrong if I say that with frequent used files it's more a hassle?


  6. I've tried some of the fake-meats that are on the market, they are usually based on some soy stuff. Although they LOOK like meat, they taste a little dryish and don't really compare to the taste of the real thing. Also, it's seams that the fake crumbles easy (crumble as in, easy to break, where real meat kinda folds).Unless the flavours are the same or maybe even better than the original, i don't see fake meat getting a lot of fans.


  7. [offtopic]Guess what.... I use almost the same thing for authentication on my site, but i use GET variables instead of cookies, but that's only because of my laziness. [/offtopic]but arent' you forgetting about passwords?MD5( REMOTE_IP and USER-AGENT and USERNAME and SALT )Do you mean this anyway?MD5( REMOTE_IP and USER-AGENT and USERNAME and SALT and PASSWORD)I think it's quite hackable though. Ip's are easy, just look at this forum or emailing would do too, username is also quite guessable or is displayed somewhere else on the site, and user-agents are also not really unique or untraceable. So basically all you need to bruteforce is a salt and password. I doubt if this is secure enough for real important stuff, but I do think it's good enough for scripts that don't require top-notch security (like my site :D )note. You could also store the md5 of the password instead of just the pass. Since a lot of people use the same passwords for a lot of things at least if they get hacked on one site, they won't risk being hacked on everything :D. So you would get thisMD5( REMOTE_IP and USER-AGENT and USERNAME and SALT and MD5(PASSWORD))


  8. It's a commonly used trick in public libraries and some internet cafe's to prevent people from exploiting the payment-systems and use the internet for free. Also, it's very nice sometimes to prevent not-so-adept-users from fiddling with the settings and screw the settings/program/computer up.You are right though, on normal home/desktop computers it's not really usefull and quite a hindrance too.Although usually it is still easily avoided (if I remember correctly I once wrote a tutorial for that :D )

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.