Jump to content
xisto Community

wutske

Members
  • Content Count

    1,419
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by wutske

  1. the icons are just in bad quality. The white border you see should normaly be (semi-)transparent. It's also possible that windows can't handle the alpha-channel correctly, but that's the fault of the iconproducer.
  2. have you enabled the 'vnc Password authentication' option ?Forgetting to add the port at the end of the destination computer could cause problems to. So if computer a has 192.168.10.1 as IP adres, then you should type 192.168.10.1:5920 in the box of the vnc viewer.You could also try adding computer B to the 'Access Controll' list (it's on the second tab of the VNC server properties window).
  3. Try these settings:Wireless Nic:IP: sameNetmask: sameDefault Gateway:192.168.1.1Wired Nic;IP: 192.168.1.3Netmask: 255.255.255.0Default gateway: noneLaptop Nic:IP: 192.168.1.4Netmask: 255.255.255.0Default gateway: noneThis normaly should give you internet and connection with your laptop. If windows doesn't immediatly shows you the laptop, then try accessing manualy in Explorer (adress: \\192.168.1.4 )
  4. just removing it isn't such a good idea. If it's possible (but since you can't make any changes I doubt it'll be possible), try to reinstall office.
  5. ever considered looking in the spyware terminator folder to find out wich file is 9Gb large ?
  6. single core, dual core, quad core ... it just doesn't matter if the apps you're running only support one core. I'm not realy into quadcore cpu's, but it looks to me these don't use the Core2-core. The Core-architecture (low freq cores) is bloody fast compared to the old netburst-architecture (made for high clocks). Comparing freqs to determine wich is the fastest is an outdated technique that shouldn't be use since the introduction of the Pentium-M.
  7. you just dug up a 2 year old topic: //edit: 1 year and 364 days ...
  8. I've worked with windows from 3.1 to Vista (except for W2K en W2K3).I've tested a lot of linux distributions and last but not least, I've ran MacOS on a regular computer.The most important thing is that neither of the 3 is 100% stable. The only reason why I've experienced more windows-crashes is because I use it more often than Linux. Can't realy tell anything about MacOS because it ran on an unsupported system, but it crashed too .Speedwise, I'd say Windows is better (when tweaked a bit), Linux takes a long time to boot and KDE/Gnome isn't always as responsive as windows would be.Windows and MacOS are both more userfriendly than linux, linux is a real pain in the *bottom*. Personaly, I'd prefer windows, but that's because I'm used to working with it. Real MacOS users would prefer MacOS over Windows.Looks are too personal to talk about, but if I says that I'm still using the W2K theme you'll probably know enough ... sleek is more than enough for me .So, my top 3 is:WindowsMacOSLinuxBut that doesn't mean I'm not willing to learn working with linux, maybe one day I'll make the switch
  9. I have a lot of greate freeware apps (almost everything on my computer is freeware).Faststone Maxview (to replace the crapy windows gallery viewer which doesn't interpolate a picture when I zoom in)dbPowerAmp + lame.exe : great tool for encoding MP3Mercury Messenger: great messengerOpera: great browser...I could continue for a looooong while, but that's probably seen as spamming (it's a very long list )
  10. if you do so, you'll probably break the rules at school.have you tried using the tor network ? it's actualy a network to create secure (encrypted) connections, but it works as a proxy too. Problem is that it sometimes is a bit slow .
  11. glad to hear I'm not the only one
  12. There are numerous ways of getting personal information: Phishing They send you an e-mail and request you to fill in an online form. The best protection is not the believe these mails. Almost no company send you and e-mail out of the blue just for filling out some extra information (if your bank sends you an e-mail to fill in some extra information, it's best to contact them first through phone ... if they didn't send the mail, at least they know someone is abusing their name). keylogger/rootkit These are small programs that record everything you type. The most common form of a keylogger is a rootkit. These programs are very hard to detect and can't be seen with the taskmanager. Most virusscanners/malwarescanners detect 'normal' keylogger, but for a rootkit you'll need a program like rootkitrevealer, f-secure blacklight or AVG anti-rootkit. A firewall can provide protection too, but it usualy won't protect you from rootkits. trojans These little programs open ports to your computer so anybody can easily access your computer from the internet. These come as rootkits too. Protection: virusscanner, rootkitscanner and a firewall. Exploits Exploits are also used to get your personal information. Eg. when you have IE or FF to store your passwords, a hacker can make a site that exploits a security leak and sends him all your passwords. Seems logic that the program should have a security hole first before it can be exploited. The best way to protect yourself is using the most up-to-date version an regularily check for new versions or patches. Using less known programs helps too because hackers aren't interested in getting only a few information from the small group of users.
  13. why leaving it on ? It's annoying and it's slow. Securing your pc starts by being a smartass and knowing what you're doing. UAC is only for people who don't know much aboute security and still use IE.
  14. as far as I know, no, but if you already set the footer with the pagenumber in it, then you can easily see at wich page you're working on.
  15. I wouldn't directly say yes, it depends a bit on what you do and what you want. I have Vista Home Premium on a Dell with 2Gb memory and I usualy never use more than 1Gb of memory (I have to admit that I did disable Aero and some other useless services).If you don't use a lot of memory hungry applications, then maybe 1,5Gb is enough, otherwise I'd suggest to upgrade (tip: check the taskmanager from time to time to see how much memory you're currently using).
  16. It's better not to know that . It always gives me the creeps when I change something in my BIOS . I'm so glad that this board can also overclock using software instead of only through the BIOS.
  17. spyware scan like said before and make sure you have the latest updates for windows and IE.Years ago, I had to work on a computer with NT4 and it had a similar problem (it also froze for 5 minutes after loging in and then started working). It had something to do with a corrupted service, but unfortunately, I don't know wich service it was. Maybe checking the windows logs may reveal something (you can find them in the system management).
  18. I can type faster if I want to, but the texts are so incredibily stupid that I can't even predict was is supposed to come (wich does help if you type). Plus, it's too sensitive when it comes to errors.
  19. Prevent spyware: do not use Internet Explorer, most malware programs are writte to exploit this browser. Firefox is a lot more safe, but because of its growing popularity, it's becomming a new target. Same goes for Outlook (Express), alternative software is a lot better (especialy if they don't use the Internet Explorer core to show e-mails).Another way to prevent malware is by being smart, don't click on malicious links, don't dowload things you don't trust, etc ...How do you know if it's too late: most of the time, you won't even notice, that's the problem. In some cases you might notice higher CPU usage, higher disk usage and sometimes even a serious performance drop.The effect of antispyware: Probably something near a 5% performance drop, but I think it's worth. My suggestion is to have at least the following things installed and running in the background: a virusscanner and a firewall (for XP or Vista users, the Windows Firewall isn't enough, you'll need a firewall that also filters outgoing traffic). These will filter out the most malicious programs. Doing a regular complete scan with Lavasoft Adaware and Spybot S&D is more than enough, having them running in the background isn't needed if you don't use Internet Explorer (I personaly use Opera and I've never had something detected, except maybe a cookie from that one time I have to use IE).
  20. sorry about the crappy quality, I'm not one of the lucky people who have a steady hand
  21. I think the main difference between 2D and 3D are the lightning effects. In 3D you can have dynamic shadows while in 2D you can't.btw, I've recently seen some kind of 2D-based console made somewhere in Japan or China, can't remember the link tough
  22. My motherboard is an Abit NF7-s v2.0 and it has an nForce2 chipset. Believe when I say that it has to flash in order to save settings (that's why gives me a red box with a warning that I shouldn't turn off the computer while it's saving the settings). I don't know why it does it that way, but I remember something about something being to big or something like that, lol
  23. I do have two DVD with Solaris on it, I've already tried them in VirtualPC (no time to test on a normal pc, maybe during the vacations) but my first impressions are that it's just another linux distribution ... I may be wrong, because I've only tested the first DVD (the distribution on the second DVD wouldn't start in VPC).
  24. 1) no power outage (make sure nobody is doing anything that could cause a power outage)2) no unstable system (so no overclocking set in bios)3) follow the instructionsSo far I've flashed my motherboard a lot (actualy, changing settings in my BIOS are save by flashing) and I've never had any problem.
  25. front fan: inputrear fan: outputtop fan: output (hot air rises and blowing it down again would be stupid).Then you can choose, more input than output (high pressure, pushes air outside the case throug every hole), more output than input (low pressure, puls air in the case through every hole) or equal pressure (just rely on fans). I can't tell you wich is best, it realy depends on your case .
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.