Jump to content
xisto Community

tansqrx

Members
  • Content Count

    723
  • Joined

  • Last visited

  • Days Won

    1

tansqrx last won the day on June 19 2014

tansqrx had the most liked content!

2 Followers

About tansqrx

  • Rank
    Privileged Member

Contact Methods

  • Website URL
    http://www.ycoderscookbook.com
  1. I hope I never get to the point where I have to put restrictions on my access point but if I do, I still have the tools to do it. The main Linux router has Astaro (https://www.sophos.com/en-us/products/unified-threat-management.aspx) installed so I can limit the wireless network any way I need to. This is usually not possible with the comity home routers but I can control the type, amount, and time window of bandwidth. If anyone else is interested, Astaro is free for home use and just needs two network adaptors on a discarded (but working) spare computer (https://www.sophos.com/en-us/products/unified-threat-management.aspx).
  2. That has got to be one of the craziest things that I have ever seen and I have done some serious crazy/stupid things in my life!
  3. Referring to the original question, the Graduate Record Examination (GRE) (https://en.wikipedia.org/wiki/Graduate_Record_Examination) is not needed for an undergraduate bachelorâs degree application. By definition, the GRE is only used only for graduate level applications.I donât know if this is a serious question or not but from the post there are serious grammar problems with your writing. The GRE is like a SAT or ACT for graduate applications but harder. The biggest difference is a critical writing section that is not multiple choice and must be written by the student during the exam. This section is graded by a human and thus must be of a certain quality to pass. Depending on what type of graduate degree you are after, not all sections will usually be considered equally. For example, if you are applying for an engineering degree, the critical writing section may not be as important as the quantitative section.Not trying to be mean here but if you submit anything close to your original post on the GRE exam, you will not pass no matter what kind of degree you want. This is atrocious even for an engineering student.
  4. And of course the always interesting Slashdot thread. https://science.slashdot.org/story/11/01/06irport?from=rss
  5. I believe this may be what you are looking for.“Tampa runway reopens, reflects shift in magnetic north pole” (http://forums.xisto.com/no_longer_exists/)
  6. From what I can see YouTube is nowhere close to dying.YouTube has always had copyright problems and this was one of the big issues that Google had with the company before they bought them. In the end YouTube is still safe from being taken down because they have a DMCA safe harbor provision (https://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act). As long as they provide a means for copyright holders to request a take-down, and do so in a timely manner, YouTube and Google cannot be held liable (http://arstechnica.com/tech-policy/2007/05/google-cites-safe-harbor-fair-use-in-viacom-v-youtube-defense/). The perceived problem comes from the copyright holders getting trigger happy with fair use (https://en.wikipedia.org/wiki/Fair_use) and even videos they donât hold copyright to. Additionally YouTube has automated all of this work and a human doesnât make the final decision.Does a 9 year old girl singing the latest pop song in her living room constitute a copyright violation or is it fair use? Is a video with the radio playing in the background also a copyright violation? Though questions these are.I remember a TWIT episode (twit.tv) this past year that was pulled down. TWIT is a geek news show and podcast that talks about the current technology events. One of the guests on this show, Baratunde Thurston (https://en.wikipedia.org/wiki/Baratunde_Thurston) (donât know the episode) also worked for The Onion (http://www.theonion.com/). They were discussing a clip from The Onion website which was both news and a promotion for The Onion. The next week the host was complaining that the show was taken down by YouTube because of this 30 second clip from The Onion. Over the subsequent weeks the audience found out that the episode was taken down because of an automated DMCA notice. The Onion didnât file the complaint and was actually pissed that some of its content was taken down without its permission. I believe the episode was eventually put back up on YouTube but this shows you that some copyright law is just plain broken. The Onion clip was a clear example of fair use because it was part of a news item and even if it wasnât the copyright holder didnât want it taken down.
  7. Here is a story to add to the conversation: âAmazon Cloud Power Used To Break Network Passwordsâ (http://forums.xisto.com/no_longer_exists/). Thomas Roth, a security researcher, used Amazonâs Elastic Cloud Computing (EC2) service to brute force wireless passwords. The EC2 service is basically a supercomputer that you can rent for 28 cents a minute. Rothâs average cost was $2 per password. Any wireless protocol (including WPA-PSK) that uses a pre-shared key is open to attack. Apparently this attack can only find matches based on a dictionary list.So back to the original question of WEP Vs WPA? I choose neither for my home network and decided to run completely unencrypted. Anyone can connect and the access point ID is âOPENâ. I didnât do this out of laziness but out of an informed discussion to be nice to my neighbors.I live in a fairly rural area were maybe 5-6 people can even see my wireless connection. I trust most of my neighbors and I have weighed the discussion to be open with being secure. This doesnât mean that all my banking information and such is open to anyone walking or driving by. Being nice to my neighbor doesnât mean being stupid either. I have been in several situations where I needed Internet access away from home and occasionally I get lucky and find an open access point. The access points in question may or may not be left open on purpose but I am still grateful to find one. Perhaps I can be nice to someone else in their time of need.I have setup my network in a very particular way as to offer open wireless and still keep myself safe. All of my internal computers are hardwired 1 Gbit Ethernet so there is no need for wireless. The wireless network is segregated behind two routers not including the main Linux router that feeds from my ISP connection. The two routers are in series which prevents APR spoofing onto my hardwired network as ARP does not pass through a router. There are some tricks to get past one router but to my knowledge there is no way to play ARP games with two routers. Secondly, both the wireless and hardwired internal network has the same subnet addresses. This means that even if someone on the wireless knew an internal IP address, it would route to the wireless subnet and never make it past the first router. As a finishing touch, the main Linux router has some nasty rules in place to prevent ANY traffic from passing from the internal to the wireless network and vice versa.The only time I ever use the wireless network is if someone visits my house and needs to use the Internet. If they want to access any of my internal computers or the network printer then I have to tell them to get out their Ethernet cable because it simply isnât possible from the wireless network. I do realize that some bad things can happen on an open wireless access point but I am willing to take the chance and fight the fight if needed. If laws are broken then it is up to the person breaking the law to go to jail and not me. The law is certainly still in flux on this matter but I will fight for my right to provide an open access point if needed.There are currently several organizations with the goal of providing free wireless to anyone who wants it (https://en.wikipedia.org/wiki/Wireless_community_network) (https://en.wikipedia.org/wiki/List_of_wireless_community_networks_by_region). These groups usually just make their current access point open with perhaps a customized login screen or user agreement. There is no such group in my area and I donât see it as being very practical given my rural location. If something does come along I may make my wireless niceness a little more formal.
  8. Can you explain what you mean by the older platters being brownish? This is a personal story which makes me wonder what you mean. When I was a child I used to walk to my grandparents house across the road. They were somewhat of packrats and had all kinds of weird things hung up all around their property. I remember always seeing this silver, flat disk about a foot in diameter, with an inch hole in it hanging on a barn wall. There wasnât just one but many of them all over the place and they had been there for as long as I can remember. I must have been 8 or 9 at the time and asked my father what they were and he told me computer parts. Since this was the late 1980âs and I only recently learned what a computer was I thought this was really weird especially since my grandfather had nothing to do with computers and was essentially just a retired farmer. Over the years I never asked any questions until I saw a picture of an early hard drive in college. It had huge platters and I instantly remembered the silver plate on the side of the barn. This is when everything snapped together. Over the years I remember my parents mentioning that my grandfather used to work at Sperry Corporation and he would always bring home damaged parts. I guess my father was right and it really was part of a computer. My question is how early were the brown platters? I still have one of those big hard drive platters at my momâs house and it isnât brown but looks exactly like a modern silver hard drive but ten time bigger and thicker. I know it has to be from at least the late 1970âs if not earlier. Are you talking about the 1960âs era platters or something entirely different?
  9. My apologies to yordon for restating what he already said but I will put part of his response in a different context.The ntldr error message can usually be fixed by running the Windows repair utility located on the Windows install disk. Every version of Windows is different so I will outline the general process.1. Insert the Windows installation disk into your CD or DVD drive.2. You may have to change your BIOS settings if the disk does not run after turning the computer on. This is usually accomplished by setting the first boot device to the CD/DVD or hitting one of the “F” keys during startup. In my case it is F12.3. A screen appears for a few seconds telling you to “Press any key to boot from CD.” As the instruction suggests, you should press a key.4. For Windows XP and earlier, wait for all of the setup files to load and then press “R” for your bad Windows install (http://michaelstevenstech.com/XPrepairinstall.htm).5. For Vista and Windows 7, wait for the first screen to appear and then select “Startup repair” (https://support.microsoft.com/en-us/products/windows).In both cases setup will overwrite all of the critical system files (including ntldr) with the ones on the setup disk. If this fails you can also try to reinstall Windows. Make sure you don’t format the drive and place the install in the same location as the damages install.I have successfully used both methods to repair fatal Windows problems including missing ntldr. If you didn’t do anything to explicitly kill your ntldr then you should seriously look at replacing your hard drive. Unexpected ntldr errors usually result from corrupted hard drive sectors and where there is one bad hard drive sector, there are usually many. The hard drive recovery tool that I use is SpinRite (https://www.grc.com/spinrite.htm) but it isn’t free. SpinRite can usually fix the problem without repairing the Windows installation. Certainly run a check disk (https://support.microsoft.com/en-us/kb/2641432) after you get your computer back up and running.
  10. If you want to go really old school then Windows users can access the built-in FTP client in any DOS window (http://www.nsftools.com/tips/MSFTP.htm). I don’t recommend this because you will pull your hair out after typing the first 100 commands.As mentioned earlier, Filezilla (https://filezilla-project.org/) is not only the best but also a free way to get a FTP client. There is also a Filezilla server that is free.
  11. I believe the question of using mobile phone templates solely depends on your audience and the purpose of the site. I personally have no plans to make my site mobile friendly. My site (ycoderscookbook.com) has low traffic and I make no money off of it. Additionally, my content is geared towards Microsoft Windows programming so I don’t expect many mobile users to find my useful unless they are viewing it from a Windows desktop or laptop.Designing for mobile devices may also cause some problems that you may not expect. I occasionally use a Blackberry phone to visit websites. The Blackberry has a full featured browser that will display almost everything except Flash. The Blackberry can display CSS and JavaScript just fine in most case. The problem that I have run into is that some sites see my Blackberry browser as a mobile device and serve me the no feature, stripped down, and mostly useless mobile version of their page. This irritates me to no end because I do have the power to view the regular page. In most cases there isn’t even an option to visit the full site. I then leave the page mad and never go back so instead of gaining a mobile customer, they are loosing it.I also think mik isn’t living in the real world with his comments. Adding functionality to a website (such as adding mobile support) takes time and manpower. Time and manpower cost money. I face the same problem all the time at my job where I sometimes estimate software development costs. The customer rarely realizes how much effort goes into creating a single function or feature. When the average productivity for a programmer is between 1-3 source lines of code (SLOC) per hour, the cost for adding a feature that is 100 SLOC really adds up. It is a common practice in software engineering to make the customer sign a contract after the requirements are set. This is to protect the developer from the customer when the customer comes back six months later asking for a “minor” feature to be added. My company then pulls out the contract and explains how they agreed to a particular price for the given requirements; if you want the minor feature then you will have to sign another contract and pay us more money.I’m not familiar with professional webpage design pricing so I don’t know if $8000 is high or low but think of it from an engineering point-of-view. Suppose you have 10,000 mobile visitors a day visit your website and you earn 1/10 of a cent ($0.001) off of each customer (personally high in my opinion but makes for easy math). Then say it costs $8000 to add mobile support to your site. It will take 800 days or a little over 2 years to make any profit off of the new mobile additions. If you change your webpage more than every two years, you may actually be loosing money by creating mobile pages.Most everyone at Xisto creates their own pages because after all this is a free hosting site. When the practical cost of adding mobile support for Xisto users is not money but time, the user will have to decide if the time spent is worth it. I still disagree with mik because my time is worth something and it is not sloppy or “not doing your job properly” if I decide not to add mobile or other browser support. With my busy life I get very little precious time to devote to my hobby and I would much rather create content than write hundreds of CSS files for each browser and mobile profile.
  12. As of this weekend there are several websites that are effectively blocked in the US by altering the DNS records. An article in CNETâs Threat Level entitled âU.S. Shutters 82 Sites in Crackdown on Downloads, Counterfeit Goodsâ (https://www.wired.com/2010/11/us-website-takedowns/) reports that the US Immigration and Customs Enforcement (ICE) Agency has taken several counterfeit goods and torrent sites down. This is the second round of seizures which targets copyright and counterfeit websites.
  13. Hate to break it to you Rathe, but what you are doing right now is also illegal, at least in a civil court. The least that could happen is your bots will get banned from the service. The most at this point is a civil fine that could be in the thousands of dollars. The problem is the government might be able to also throw you in jail.I don’t agree with the laws either but they are still on the books in the US, like it or not. Most everyone will agree that US laws also have a far reaching impact. Even if you live in Russia.
  14. I’ve had the same problems (not the sub domains though) in the past. I found that implementing a CAPTCHA or updating to the latest version of WordPress solves the problem. Most SPAM usually occurs after a WordPress update which I haven’t had time to update my site.Looks like your site has been added to a SPAM list so from now on you will have periods of Whac-A-Mole the spammer. Hang in there because after a few months of not getting an SPAM through, they usually disappear. Unfortunately this is only temporary because a different spammer will try the same thing at a later date and you will have to do the same thing to them.P.S. Check all of your permission settings and administrative PHP scripts just to make sure they don’t have a backdoor in them. There are several websites that can scan your site for security holes but just be careful who you trust.
  15. I hate to tell you but I think Google is the best way to go. There are several search engine scripts that you can download and run on your server but they donât compare to the power of Google. The scripts that I have seen can only be run manually so you will have to rebuild the index every time you make a change to your site. Indexing is also very resource intensive so many hosts do not take kindly to them.There are also several professional scripts that will cost you. The ones that I have seen are usually in the neighborhood of $1000. You can also buy third-party indexing servers or Google servers (https://www.google.de/work/search/products/gsa.html) to do your searching.I may be completely wrong in this so feel free to correct me.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.