Jump to content
xisto Community

tansqrx

Members
  • Content Count

    723
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by tansqrx

  1. This one has been hashed over a few times before at http://forums.xisto.com/topic/96742-topic/?findpost=1064399314. I still recommend SpinRite (https://www.grc.com/spinrite.htm).
  2. Here is an update on my Ready Boost situation. Last week I removed the flash drive used by Ready Boost and turned off the Ready Boost service. Now my machine boots about 5 seconds faster and I can see a minor performance boost during regular tasks. If you want a quick, easy way to speed up you machine then you should turn OFF Ready Boost.
  3. I picked up on an article posted on Slashdot entitled How Much Is Your Online Identity Worth? (https://yro.slashdot.org/story/09/09/10/1837233/How-Much-Is-Your-Online-Identity-Worth). Symantec is offering a free tool that will calculate how much your online identity will go for on the open black market at https://us.norton.com/. This is obviously an advertisement for Norton Antivirus 2010 as there are large advertisements for it all over the page. I took the quiz and I think it asked all the right questions such as: ⢠Can you access and pay your credit card online? ⢠Do you use peer-to-peer file sharing to download free music and video from people you donât know? ⢠Do you reveal personal information online, like you full name, your birthday, your address, you hometown, or anything that can be used to personally identify you? I was honest in all of my answers and received a score of low risk. The low risk was a surprise because I answered yes to almost all of the questions. The price for all of my digital information is around $22.22.
  4. I am currently looking for an anonymous proxy service provider to replace the one that I recently dropped. I was using SurfSolo from SecurStar (http://www.securstar.biz/) but they have dropped most of their servers and I don’t much care for their selection at the moment. The service must provide the following:1. Server in different country2. SSH connections3. P2P capable4. Reasonable speedsPrice is not a large concern because I was paying over $100 USD for my previous provider for one year. Just wondering if anyone else in the Xisto community has any experience or recommendations.
  5. It sounds like you have a very legitimate reason to encrypt everything you own. I intended the original post for the average user who just wants to keep their private documents out of the hands of thieves. One example that I have heard numerous times is auto shops taking a look at what is on your flash drive or MP3 player while your car is getting fixed. A lot of people keep their flash drive on their key chain and guess what, when you hand the auto shop your keys, they also get the flash drive. While they are “working” on your car (sorry no offense to any service mechanic out there), they pop the flash drive into the laptop running the diagnostic equipment and copy everything off the drive. The usual things that get copied are music and p0rn but they may also take a look at your last year’s tax return if they feel like it. This usually doesn’t cause any real problem and you would never know it happened. The fact is that your flash drive may be out of your control more than you realize.I do hope you get your drive secured, skedad. I have the feeling that the hardest part will be getting your customer to use the encryption also. If they don’t understand the value of the data then you may have a long road ahead. Also consider using Truecrypt to encrypt your work computer. It has a whole disk encryption option that encrypts the entire operating system so even if you remove the hard drive and put it into another machine, your data is still safe. You are asked for a password on startup (between the BIOS and OS load). Considering you have data of value I would highly recommend considering it.
  6. Let me also recommend some free internet connection speed tests from DSL Reposts at http://www.dslreports.com/speedtest.
  7. I believe the idea behind Ready Boost is to cache some of the most ran programs onto the flash drive. Ready Boost ties into Superfetch (https://en.wikipedia.org/wiki/Windows_Vista_I/O_technologies). The benefits are supposed to come from random access times which flash is very good for. A good article can be found at https://en.wikipedia.org/wiki/ReadyBoost.
  8. This trick usually only works for very slow connections and static files that have mirrors. For instance, you are downloading the latest version of Firefox. The install package is stored on multiple mirrors and it is static. You can request a download starting a 0%, 20%, 40%, 60%, and 80%. When all the parts finish you can combine them to complete the entire file. A movie from a website is different because it is streaming and the content after a certain point maybe dependant on content before that point.
  9. Perhaps Ready Boost (https://support.microsoft.com/en-us/products/windows) is a good idea in some circumstances but it has been nothing but a dog for me. I purchased a cheep 8 Gb flash drive for this purpose about a year ago and I have seen absolutely no performance gain. Many of the articles that I have read across the net seem to confirm my findings so I don’t think I have an isolated issue. If you are looking for a quick and cheep performance boost I don’t think this is it. I still have Ready Boost enabled but that’s only because I have been too lazy to remove the drive. Come to think of it, I believe I will get rid of it once I get home…
  10. One possibility could be going from a wireless connection to a wired connection to your modem, of course assuming that you are even using wireless.In some programs, such as Windows Media Player, you can raise the buffer and might get some performance increase. In Windows Media Player:1. Depending on the Windows Media Player view, you will have to take different actions to get to the proper dialog box. This assumes that you are in the default Full mode view.2. Right click the title bar and select Tools and then Options.3. Click the Performance tab.4. Set the desired changes in the Network Buffering section.Buffering is just storing content before the media starts playing. Some will notice a short pause before the media plays and this is just the application saving data in hopes that small network dips will not be noticed. The ultimate solution is of course getting more bandwidth. If you are tiring to watch a HD movie on a 56k modem connection no amount of buffering will help you unless you download the entire movie before you play it. Getting more bandwidth usually means paying your ISP more money for a better plan.
  11. Truecrypt has a special feature called âtraveler modeâ that helps in the situation where the machine you are using doesnât already have Truecrypt installed. A portable version of Truecrypt is installed and run on the host machine and you will then have full access to your encrypted thumb drive. The one deal breaker is that you must have administrative privileges on the machine that you wish to use traveler mode on. I personally just created a container on the thumb drive that was the size of the drive â 10Mb or so. I kept a copy of Truecrypt on the small unencrypted portion of the drive just in case I needed to install in on a different machine. Yes this is inconvenient but true security almost always is. If you donât have anything on your removable drive that you wouldnât mind every single person on the planet seeing, then donât encrypt and save yourself a lot of time and hassle. If on the other hand you donât want everyone seeing what you have then the extra trouble is worth it. Edit: If forgot this link http://forums.xisto.com/no_longer_exists/
  12. First I donât know if I would even bother discharging the capacitors unless I had to work on the circuit board itself. Most of the dangerous connections are under the printed circuit board and you would have to unscrew the board just to get to them. Just clip the fan wires and then put a new fan in without worrying about the capacitors. For anyone who is concerned about discharging a capacitor, a screwdriver across the leads will do it but is not recommended because of the very high instantaneous energy transfer. Basically the screwdriver blade will have a very low resistance (perhaps .5 to 2 ohms) which will cause sparks to fly on a fully charged capacitor. The better way would be to use a 1000 to 2000 ohm resistor or even a 100 watt light bulb to draw the energy off more slowly. http://forums.xisto.com/no_longer_exists/ or http://forums.xisto.com/no_longer_exists/ As for the weird radio signals on your speakers, it sounds like your building has some serious grounding problems. Since you have an upstairs neighbor I suspect you are renting and I donât know how much you can do about the problem. On the other hand, if you are mad at your landlord, you can insist on having a licensed electrician examine the wiring in your apartment. Both local and national codes require proper grounding (in the US) so grounding can lead to very specific actions that your landlord will have to take or else get fined by the city. Another possibility on your speakers is missing shielding. Either the shielding in the speaker enclosure or in the wires could be damaged. That 10 foot of wire running from the computer to the speakers can act as an excellent FM antenna if it is damaged. Sometimes you can also put a RF choke on the wires to eliminate interference. You will notice that your monitor cable has a cylindrical device on it next to the connectors. This is a classic RF choke that helps keep interference from being displayed on your monitor. You can get one from Radio Shack (http://forums.xisto.com/no_longer_exists/) or any other electronics store if you prefer not to go with âRipoff Shackâ. A general explanation of a RF choke can be found at https://en.wikipedia.org/wiki/Choke_(electronics).
  13. A lot of high level tracking or auditing can actually be performed within Windows (assuming you have Microsoft Windows). You canât get every single action taken by a program but you can see when a program is started, stopped, and a slew of other options. Change the Audit Policy by doing the following (for Windows XP because that is what I am using right now). 1. Click the Start button 2. Click Control Panel 3. Click Performance and Maintenance 4. Click Administrative tools 5. Double-click Local Security Policy 6. Set the individual policies that you would like to audit and record More information can be found at https://support.microsoft.com/en-us/kb/310399. I would suggest not turning on too many of them because you will generate a massive audit log over the course of a few days. This also leads to the problem of recording everything on your system with a third-party tool. The activity log alone would be many gigabytes for just a few hours. For hard drive access I would recommend Process Monitor from SysInternals (https://technet.microsoft.com/en-us/sysinternals/bb896645.aspx). A similar tool is FileMon (https://technet.microsoft.com/en-us/sysinternals/bb896642.aspx) also from Sysinternals. Both of these are free and very powerful but as stated above, they will show EVERY single hard drive access so be prepared to sift through a lot of data. For network traffic, the professionalâs choice is Wireshark (https://www.wireshark.org/). Wireshark is a free open-source project that has been around for years and simply gets the job done. Once again, lots of logging information so be patient. All of the tools that I listed are some of the best you can get but they do have a learning curve because they are so powerful.
  14. Let me make a different suggestion for actually securing your flash drive. Download Truecrypt (http://truecrypt.sourceforge.net/) and then turn the entire drive into an encrypted file system.Flash drives are the one piece of technology that you take everywhere and is most likely to be lost or stolen. Consider what might be on your portable flash drive and then consider what would happen if a random person saw that data. Worse yet, what if a technically savvy person stole it?
  15. I think the better solution might be to leave the side of your computer case open and just unplug the power cord when you don’t need it. Perhaps just put a single pole single throw mini switch on the side that interrupts the power.I’m sure this trick will work in Vista also because it basically just unassigns the drive letter. I guess the real question is will Windows keep asking you if you want to reformat this drive every time you open Windows Explorer.
  16. I have till:Saturday, November 7, 2054 Seconds left to live...1,426,835,337
  17. It might also be a way around supplying support. There is a clear expectation of service when you pay for an item but the expectation may not be as strong for a âdonation.â
  18. This is one of the great questions of the age and I believe you will find as many answers as people responding to your question. There will be several good answers and I don’t know if one can be the correct answer.First let me ask you how you plan to use your programming skills. If you plan to make this a career or become an expert in the field I would suggest a lower level language such as c or even assembly as your first language. This is certainly far from easy but it will provide you the necessary understanding for higher level languages.If you are only going for a casual experience I would recommend some of the higher level interpreted languages such as Java or Visual Basic.NET. I am personally a Visual Basic.NET programmer and I am able to spit out a fairly complicated program within a few hours. This is good for the beginner because you get instant feedback and you also get a sense of accomplishment.My final question is what do you want to do? I firmly believe that in order to enjoy programming, you must have a purpose. I went through college learning c, java, and even Motorola 64000 assembly. I never really programmed because I never had a reason to. After college I needed an application to download images from a certain webpage and save them to a specified directory on the local machine. This was the first true time that I used my programming knowledge and enjoyed it. From this my eyes were opened and I have enjoyed programming ever since.You may best be served by telling us what you want to do and then we will give you suggestions on what language to use. I believe the best language to learn first is the one you have a need to use. Programming is hard and the first steps will be difficult but if you have the drive and desire to learn, it is possible no matter what language you use.
  19. I would like to echo wutske about giving frames a second thought. I used to have frames on my site but I moved to CSS for one major reason, mobile phone browsers. I personally think frames are a great idea and they have their place if implemented correctly. The problem is that most of the phone browsers do not support them or they completely screw them up. My website was slit into five sections with a boarder around each edge and the content in the middle. When viewed on some browsers, only the first frame would be shown and the content was left out. I started seeing a large trend towards mobile browsers and then complaints started showing up. For the best interest of my users I completely redesigned the site and it is now strictly CSS.I found that CSS has its own set of problems and a large learning curve if you’re not familiar with it. With that said, I believe it is more powerful and you will be doing yourself a favor by going to CSS soon. Since you have most of your site already designed, I would go ahead and publish what you have and then work on transferring it to CSS over time. I personally use Adobe Dreamweaver which helped a lot with the CSS. CSS was still too much for me to handle at the beginning so I also bought a interactive Dreamweaver tutorial which made all the difference in the world.
  20. I have to say that I’m impressed. You have a lot of information in the form of reviews and comments which shows you have put a lot of hard work into this website. I believe I would promote the reviews section more as this looks like the main traffic (and thus revenue) generator for your site. I don’t mind the shark image because after reading the introduction, the shark is very appropriate.I don’t think I would personally invest in the forex market but this website looks like a good place to start if I did have such inclinations.
  21. I believe you are actually looking for the SendKeys API call (https://msdn.microsoft.com/en-us/library/system.windows.forms.sendkeys.send.aspx). I work with Visual Basic.NET all the time and this works for me. Some additional Delphi samples can be found below. http://www.delphi3000.com/= http://www.festra.com/wwwboard/messages/6475.html http://forums.xisto.com/no_longer_exists/
  22. I find that two nice ways of saving disk space is to reduce the size of the recycle bin and reduce the size of the Internet Explorer cache.Recycle Bin1. Right click the recycle bin icon on the Windows desktop and click properties.2. Go to the Global tab.3. Under the Maximum size of Recycle Bin slider, move it to a more reasonable 1-2%. This is based on percentage so a 1 Tb drive set to 10% allows 100 Gb to be saved in the recycle bin. 1% of a 1 Tb drive is still 1 Gb which should be more than enough.Internet Explorer Cache1. Right click the Internet Explorer icon on the Windows desktop and click properties.2. For Internet Explorer 7 (that’s what I have in front of me at the moment but Internet Explorer 8 is similar) click the General tab.3. Click the Settings button under Browsing history.4. Lower the Disk space to use to around 50-100 Mb. Your mileage may vary with this setting as broadband connections see almost no performance hit while dial-up may experience noticeable difference.I in general do not recommend using the compress old files option under the Windows Disk Cleanup tool. Using this is like zipping some of your old files and then unzipping them on the fly. This is very processor intensive and systems suffering from low disk space are usually also suffering from low processor power. In the end it is much more hassle than it is worth.
  23. I still believe that running multiple antivirus programs is highly unadvised but still *possible*. In satisfying the original question, I would call it a myth that it is “unbearable” or impossible to run multiple antivirus products.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.