tansqrx
Members-
Content Count
723 -
Joined
-
Last visited
-
Days Won
1
Everything posted by tansqrx
-
I am sure it is possible but as you have heard, not practical. Antivirus software works by hooking (https://www.codeproject.com/articles/1037/hooks-and-dlls) system DLLs. This is basically adding your own code between existing Windows code. In the case of an antivirus solution, the antivirus may hook one of the system32 DLLs that make a directory listing or access a file. When these particular function calls are made, Windows sees the hook and then executes the antivirus code that is attached. This way any file that is accessed is scanned before it is used by the system. As a side note, hooking has a bad name because it is also used by malicious programs such as root kits to make removing them next to impossible. Without hooking malware would have a much harder time but antivirus would also not work as effectively.As far as I know there is no limit to the number of hooks that can be placed on a Windows system DLL. There is however an execution order to the hooks, i.e. the first program to place a hook will be executed first, the second program to place a hook will be executed second, and so on. This means that you can have an unlimited number of programs hooking a DLL which translates to an unlimited number of antivirus programs.More is usually not better in the case of antivirus solutions. If you look at many of the reputable antivirus solutions available, they are around 99.5% or more similar in their operation and definition files. This means that you will get less than .5% gain from adding another antivirus program but you will lose 50% hardware performance due to another program accessing the file before you use it. As you add more antivirus programs, the gain goes down even more and the performance loss goes up.Adding another antivirus program from a trade-off advantage/disadvantage point of view just doesn’t make sense. Sure you can do it but why would you? If you stick with the well known antivirus products and use good computing habits (don’t open attachments, scrutinize the downloads you open, be careful with P2P, warez, and p0rn) you should have plenty of protection. I personally use Avast! (https://www.avast.com/de-de/index) and I am happy with it. It has been well over 10 years since I had a virus (mostly due to good computing habits) so a single good antivirus and not acting stupid on the Internet should be all you need.
-
Which Web Desing Software Is The Best?
tansqrx replied to iGuest's topic in Graphics, Design & Animation
I am also a Dreamweaver user. It has a learning curve but like most other Adobe products, it is the class leader. -
Michael Jackson Was An Alien? Michael jackson, theory, alien
tansqrx replied to fermin25's topic in Science and Technology
I guess aliens like pain killers too! -
I have been in your spot before and I recommend EASEUS Data Recovery Wizard Professional 4.3.6. You can read about my experiences and reasons at http://forums.xisto.com/topic/96004-topic/?findpost=1064393112. You may also want to try SpinRite (https://www.grc.com/spinrite.htm) if you think this might be a bad sector on your hard drive.
-
Mark me down as using uTorrent also. But I only use it to download all of those completely legal Linux distributions :(The only feature I wish it had is an IP filter. I use a filter with my other p2p software and I would like to have the same protection with my torrents.
-
Microsoft Releases Windows Vista Service Pack 2
tansqrx replied to magiccode91405241511's topic in Websites and Web Designing
It’s been two weeks and no crazy “service pack destroyed my machine” stories. I am declaring this a win for Microsoft. -
LaserJet 4L, ohh the memories. I remember working on these at a company I worked for as an intern 10 years ago. Even at that time they were being phased out for more modern printers. I remember that they were good printers but very big. Can you even get toner for these monsters anymore?
-
Disable Autoplay In Xp To Reduce The Impact Of Usb Virus
tansqrx replied to takerraj's topic in Websites and Web Designing
Disabling Autorun under Windows has been one of the first things I do to my computer after a reformat for years. A good article to explore each feature, Autorun vs. AutoPlay, can be found at https://en.wikipedia.org/wiki/AutoRun. My preferred method of disabling Autorun under XP is to use the Tweak UI Power Toy provided by Microsoft (http://forums.xisto.com/no_longer_exists/). In addition to a section devoted to Autorun, you can also change many other hidden UI features, all from one program. Vista doesnât have the same Tweak UI program so you will have to do it the long way. 1. Open the Control Panel 2. Double click Hardware and Sound 3. Double click Autoplay 4. Set all to Take no action Iâm on XP at the moment so the instructions may need minor adjustment, see http://forums.xisto.com/no_longer_exists/ for more information. Microsoft recently released a patch on February 24, 2009 to correct a bug in the Autorun feature. Apparently setting some registry keys to disable Autorun didnât really disable Autorun. The patch is currently available via Windows Update and if you update regularly, you should already have it. The full Microsoft Security Advisory can be found at http://www.microsoft.com/err/technet/security/. -
Microsoft Releases Windows Vista Service Pack 2
tansqrx replied to magiccode91405241511's topic in Websites and Web Designing
I was greeted with the Vista SP2 update this past Tuesday. I was surprised that the install was out of the way, it installed in the background without any prompts. When I shutdown I got the “Shutdown and Install Updates” option which I of course took. On restart it took a few moments longer to start but nothing like service packs of the past. I was quite astonished that it worked so well (at least for me and this one system).I was not aware that they bundled Windows Search 4.0 into the service pack so I will have to go home and properly dispose of the particular nuisance. -
When you are referring to sites I assuming you mean Windows accounts? You can stop a user from accessing the command prompt by using Group Policy. You must be an Administrator on the machine to use the Group Policy Editor or make any changes so make sure your account has these permissions. A fairly useful Microsoft Knowledge Base article is located at https://support.microsoft.com/en-us/products/windows and tells you how to run Group Policy Editor. There are many options from disabling screensavers to disabling the command prompt, just look for the one that applies to you.
-
How to copy text from a Command Prompt (the easy way) I find myself at the command prompt frequently and copy/paste is essential. You can set the preferences to more permanently facilitate copy/paste. 1. Right click the title bar and select properties. 2. On the Options tab check Quick Edit Mode. 3. Click OK. 4. A new window will appear asking how you would like to save these changes, select Save properties for future windows with same title. Now when you need to copy something from the command line, use your mouse to make the selection (similar to selecting icons in Windows Explorer). Once you have what you want selected, hit the Enter key and it is saved to the clipboard. If you want to paste, right click the mouse and the clipboard will be pasted where the cursor is. This method takes some getting used to but Ctrl+C cannot be used at the command line because it has the special property of issuing a break and stopping any current processing. Ctrl+C was in DOS well before the idea of copy/paste so it gets priority by virtue of time.
-
I have stuck with HP for the past few years and my current printer is a HP Photosmart 1315. It does a good job printing but I’m not sure that I will get another HP. My biggest dissatisfaction is with the price of ink and the crummy drivers.The ink is nothing but a monopoly. HP puts smart chips in each ink cartridge so you can’t refill them yourself or use third-party cartridges. It’s the very pricy official HP or the road. There are ways around this but a company that puts “copy protection” on disposable items leaves a bad taste in my mouth. The second thing is the drivers. I used to be able to get the basic corporate drivers from the HP website but now even those are loaded with “extras” that are needed. The regular drivers that come on the CD are bloated and load all kinds of things in the background that’s not needed such as a customer feedback widget and an update widget that runs all the time.HP makes a good printer but I have also heard good things about Cannon lately. Most notable, they are going against the competition and selling cheep branded ink. If you are a casual printer then ink may not be a big concern but if you print a lot, certainly research ink prices before you buy.
-
Crypto is a very nasty and complex beast. I would never trust data to an algorithm that I created myself. Computer history is scattered with the tales of encryption gone wrong, WEP is a good example of this.From my understanding, using an XOR is actually a really good method of encrypting data as long as the key is cryptographically strong. The de facto method of breaking any encryption scheme is using brute force methods. This is trying every possible key combination and then checking the result with known good plaintext. Brute force can take a long long long long time to complete depending on how long the key is and which encryption scheme you use. A key that is 20 or so characters can be broken in a matter of hours to weeks. Anything over 50 or so could take years.One disadvantage to using XOR is the speed it takes to reverse the encryption. XOR is a single operation so checking one brute force attempt will take no time at all. AES in comparison has thousands of operations so checking one brute force attempt will take thousands of times longer. If you have a very determined attacker, they could even design special hardware to blow through XORs at an even higher rate. DES was considered secure until a group designed special hardware that dropped the brute force rate from years to days.The next attack vector is the key. I will assume that you are using alpha, numeric, and symbols that can be typed on the keyboard. Given you are using ASCII; the characters that are typeable are only a small portion of the possible ASCII set. You are missing over 75% of the possible characters. I would then design a brute force attack that only tried typeable characters which would cut my time down by no less than 75%.There are still other attacks such as using a dictionary (I assume you are not silly enough to use a password from a dictionary so I decided to skip this) or using language heuristics (http://web.cecs.pdx.edu/~bart/decrypter/paper.pdf).The underlying question is this. Why are you trying to reinvent the wheel when you have AES and other tested ciphers at your disposal? They have been shown to withstand a torrent of attacks from people much smart than myself and they are still standing. Your method may work but I wouldn’t risk it.
-
Hotmail in foreign language Live Hotmail Problems ...
tansqrx replied to iGuest's topic in General Discussion
Let me make some assumptions. First I am assuming you are accessing Hotmail through your web browser and not the Live desktop client. The second is that you haven’t checked the language settings.From the Hotmail homepage after you have logged into your account:1. Click “Options” and then “More Options”2. Under “Customize your mail” click “Select language”3. Check “English” (fifth option for me) and then “Save” (which is the left most button in the bottom right corner).Sorry if this doesn’t fix your problem but I saw it when looking for an option to turn on SSL all the time today. If anyone knows how to keep Hotmail in an SSL connection even after login I would appreciate the help. -
This also makes the assumption that the account that you are doing this from is also in the Administrators group. I donât think you really need to âhackâ the Administrator account if you are already an administrator. I still donât know why the myth of gaining Administrator on a Windows box is still so prevalent. Once upon a time most users were using Windows 95 or Windows 98 (or if they were really unlucky, Windows ME). The Windows 95 family of Windows was never designed to be multi-user and thus you could simply hit the Esc button to bypass all authentication. While the Windows 95 family was the dominant platform of the time, the original Windows NT platform also had a large market share. Windows NT predates Windows 95 but it was mostly used on high end workstations and servers. One great advantage that Windows NT had over Windows 95, besides being more stable, was the multi-user functionality. From the very beginning, you always had strong authentication with Windows NT. Moving forward a few years and Windows 2000 was released. Windows 2000 is somewhat of a blend between the Windows 95 and Windows NT families but retained all of the security of the Windows NT family if properly configured. The Home variant of Windows 2000 is much more lenient than the Professional version when it comes to security but still has nontrivial account bypass protection. As Windows XP was released, the account protection only grew. And now with Vista on the market and Windows 7 about to be released, the days of easily bypassing Windows security is long gone. I am not saying that gaining administrative privileges is not possible but it takes a lot more work than typing in a single command on the command line. Businesses worldwide depend on the built-in account security in Windows. The current world economy would collapse if a random user would just waltz in and arbitrarily take control of any Windows box in the world. Microsoft has had its failings in the past, but gaining administrative privileges on your local machine without permission is an issues that has already been addressed. If any of the simple fixes work for you then you were already in the Administrator group and there is no need for you to get the password in the first place. If the Safe boot method works for you then you had a misconfigured machine that was asking to be hacked. A properly configured, modern Windows box is not very easy to attack. P.S. I know that I have already linked to my article about resetting the administrator password using a Linux boot disk but here it is again. http://forums.xisto.com/no_longer_exists/
-
The first question is how old is the laptop? Windows Vista has higher hardware requirements than XP so your hardware may not be able to run Vista. This would be the case where a Direct3D screen saver is used. Alternatively you could just pick a different screen saver that doesn’t use Direct3D.A more likely solution is you don’t have the correct video card drivers installed. Even though you upgraded, Windows usually installs a generic video card driver if it doesn’t find an exact match to yours. This basic driver will display the desktop and not much else. First check in device manager and see what the name of your video card is. Second, go to the Lenovo website (http://www.lenovo.com/us/en/) and download the latest driver (http://support.lenovo.com/ca/en?doctypeind=9&template=/productselection/landingpages/downloadsDriversLandingPage.vm&sitestyle=lenovo). If this doesn’t help, leave another message and we will give you some more suggestions.
-
What Is Your Favorite First Person Shooter Game?
tansqrx replied to Jammerjd123's topic in Computer Gaming
I usually play World of Warcraft but when I am in the mood for a FPS I go with Team Fortress 2 (TF2). -
The first thing I would try is removing the drive from the USB enclosure and then attaching it directly to your motherboard. As the computer boots see if the hard drive is detected. If so, follow the directions below. If not, replace all the cables (data and power) and try again. If it is still not detected then you most likely have a physical defect in your drive (the platter bearings have seized or a head is stuck) and no software will help you. If the drive has been detected then I would run SpinRite (https://www.grc.com/intro.htm). SpinRite costs about $80 but usually works. You may find some other free alternatives but I have found most of them to be junk. If no defects are found then you can move onto some of the other software I have described previously. You may also be interested in an online backup solution that has been discussed in http://forums.xisto.com/topic/96780-topic/?findpost=1064399664 and http://forums.xisto.com/topic/80581-topic/?findpost=1064278739.
-
This may be completely unrelated because it does sound like a software problem but have you tried replacing the mouse with another? As odd as it sounds, I have seen faulty hardware effect software in this way. Perhaps the circuit board has gone bad in the mouse and has caused your OS to detect it wrong? This is a simple and quick diagnostic just to make sure. I always hate going through a very tedious and long troubleshoot session (such as Internet not working) only to find the Ethernet cable unplugged.
-
Shout Flooding Is Enabled [solved] Please wait 11268 seconds
tansqrx replied to yordan's topic in Web Hosting Support
I had to break out my calculator to see that this is 7.825 days. -
This is a great example of tailoring your protocol to meet your needs. I was assuming that there is only one server so the “to” field is not needed. The ClientID should take care of your “from”. Of course this all doesn’t matter because it is a fictional system but it shows that you only need one thing for a protocol; knowledge on both ends of what is in the message and how it is ordered.
-
Iâm getting the feeling that you are not very serious in your question but I will still do my best to answer it. The protocol will depend on what you are using it for. A typical application protocol will use many of the existing protocols such as TCP and IP. A fairly complex example of a protocol is the Yahoo! Messenger protocol or YMSG which I have a tutorial for at http://forums.xisto.com/no_longer_exists/ (shameless plug). As I said before, it all depends on the application. Letâs say I need to communicate weather conditions between two points, over the Internet, and using standard PCs. I would first designate one of the computers as a server and the other as a client. Since we are using the Internet, I will use standard TCP/IP. On the server I will create a listening port (in .NET you can use TCPListener - http://forums.xisto.com/no_longer_exists/) and on the client I will initiate a connection (TCPClient - http://forums.xisto.com/no_longer_exists/). Once you issue each command, the operating system takes care of all the tedious work of getting the connection working. Now you have a connection where you can send anything you want until either end closes the connection. In the weather example you may want to send temperature, humidity, and wind speed to the server. Additionally you may also want to identify the client by a unique identifier. All of these things are fairly straight forward so I would just create a string and separate each entry by a colon. ClientID:Temp:Humidity:WindSpeed The client then issues a send command on the string. The server then receives the string and splits it based on the colons. This is a very simple example but still a network protocol. As long as each field is defined and sent in a particular order, any server will be able to use the weather data that you sent. I suggest you start with the networking objects in the language you are using and then work out from there.
-
Copied from http://www.spyany.com/
-
It sounds like you are doing exactly what I am, a local and remote backup. This is mostly for all of the users here who don’t even know what a backup is.