Jump to content
xisto Community

ethergeek

Members
  • Content Count

    388
  • Joined

  • Last visited

Posts posted by ethergeek


  1. Xisto does NOT sell email information nor has there been a database compromise. Your email address is listed in your application for free web hosting. Email harvesters have little difficulty collecting emails without any protection which is probably why you use a junk mail account for your account here!
    Admins use the email address you supply in the application to determine if the correct account is being activated for hosting when we approve applications. I designed the hosting application form and hope to add a measure of security to the email address during my next update.

    Thank you,
    vujsa


    Thank you for the official confirmation on that. I didn't mean to sound accusatory, I was just bringing the situation to the staff's attention.

  2. I have had an email address on gamma for 6 months. I have received zero spam there. I would infer from that, that there is definitely not a deliberate policy of harvesting email addresses. :)

    That's why I'm wondering if there was a compromise to the user db...I've only gotten about 2 per week or so of them. My hosting account went inactive (I moved to hostgator)...maybe there's a policy to sell off addresses to people who don't post in so many days...

  3. You should check out the GIMP. It doesn't have a ton of features (compared to say, Photoshop CS3) right out of the box, but it does have an open source scripting API that alot of developers have written effects for. Basically, all the effect plugins you'd have to purchase for Photoshop are developed by coders who want them, and they're free ;)It also runs on Windows, Linux, and OS X!


  4. Yeah, I honestly can't stand MS office anymore. The new ribbon thing...complete and utter garbage. I had some hopes for the Mac version that just came out, but that was almost as bad and bloated as the PC version. I use OpenOffice (well, actually NeoOffice, which is just OpenOffice with Cocoa interfaces for OS X) exclusively now for my office software needs.I'm still stuck using office at work unfortunately, because they're using the latest version of microsoft sex change that you need the latest version of outlook to connect to, and despite my protests, have turned off IMAP access internally ;)


  5. hmm.. Is it possible to use an USB(mp3-player, but I use it as an USB) instead of a CD? would it work ?(Put all the files in the mp3-player, and then boot with it.)

    Yes! but you have to do some special things to the USB key like set a proper partition type so the BIOS understands that it's bootable. The documentation over at damn small linux's site walks you through all of it.

  6. I had to do this with Fedora Core 2 awhile back, because my DVD drive wasn't booting properly. No idea why. Anyway, here's what I did:1) Get a bootable flash-drive distribution like Damn Small Linux and put it on your flash drive.2) Boot the system with the drive. When booting is done, umount the flash drive remove it.3) Download the network install (or mini as some call it) ISO image.4) Format the flash drive as Fat32 and drop the iso image on there.5) Plug the drive back into the computer and mount it using the -t iso9660 -o loop options.6) cd into that directory and run the installer.It took about 4 hours, but I was impressed I was able to do it back then.


  7. I'm wondering if he has RAM errors...those can lock up a machine pretty good. On the other hand, video seems to do it, so maybe it's an issue with the graphics card.Check your system log in event viewer to see if you can locate a STOP code anywhere...or a slew of programs crashing or erroring? Maybe the RPC server or DCOM took a dive and just started a cascade failure in windows till it freaked out and crashed./sigh...this is why I use Mac...there's always a log when something goes awry.


  8. The way I do it is to turn SNMP services on my router on and point MRTG at it. Granted, the MRTG stuff runs on the router, but you could conceivably run it from another machine as long as your SNMP daemon allows connections from other machines to read the necessary OIDs to get the byte counts.


  9. There's another post like this around somewhere that I've said the same thing on: hiding files is pointless!If you're the computer's only administrative user, just change the permissions on the file or the directory its in. If there are other admin users, just install something like TrueCrypt to stash your private files in. If you don't have admin on the computer, just keep your private files on a thumb drive.Or better yet, keep a copy of GPG and your keyrings on a thumb drive and just encrypt your files when you aren't using them. The same effect can be achieved by a password-protected 7-zip or RAR file.Simply hiding files just doesn't work...this was great to keep your files safe from your kids back in the DOS days...but in modern times...no. If your privacy is at all important, put a little more effort into maintaining it.

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.