Jump to content
xisto Community

ethergeek

Members
  • Content Count

    388
  • Joined

  • Last visited

Everything posted by ethergeek

  1. I will never understand this concept of people paying other people to play the game for them. That's just...absurd. If you get bored with the grind of a game, go play something else.I play FFXI...yeah, leveling gets boring sometimes, but when it does I just do something else, like pop it outta there and throw Halo 3 on.
  2. Look at the the xcopy command on windows. It can do conditional copies based on file modification date, as well as copy over unc paths.
  3. Just download and install unlocker. It's a right-click item that lets you close file handles and then optionally delete, rename, or move the file. http://forums.xisto.com/no_longer_exists/
  4. You just need a nameserver...Bind 9 is the defacto choice out there for high performance and reliability, but Windows Server has a DNS service with a GUI driven configuration.
  5. Check out http://www.opensourcecms.com/. You can try out various demos of content management systems without going to the trouble of installing them anywhere. Best of all, the CMS on that page are all free and open source
  6. Lots. They're thread safe They're easier to work with Parameterized, there's no casting needed like there was in 1.4- Serialize easier Implement most of the collections interfaces, so you get sorting, iterating, serialization...right out of the box Built in batch methods for adding collections to collections Object oriented collections almost always have an advantage over simple collections like arrays. The notable exception here is arrays of primitives...you can't make collections of primitives, so the JVM has to autobox/unbox them when you try...this can be slow if done in a large loop. Edit: I forgot to mention: when updating a GUI on the fly, it's a good idea to pass it off to the Event Dispatch Thread (EDT) so as to avoid painting inconsistencies. This is easily done using the SwingUtilities.invokeAndWait() method.
  7. I always put my GA track code at the bottom of my pages...the reason being, is that I don't want the script load tying up my page load on browsers that don't pipeline and evaluate the JS before building the DOM (most mobile browsers).I've noticed that the GA code can sometimes be very slow to load...and if it makes the page unusable, then all GA is gonna see is the visitor that won't ever come back
  8. Microsoft is like a drug pusher here...they give you the "goods" (and I use that term lightly) for cheap until you get hooked/standardize...then it's just waiting for the *bottom* rape from them. Once you have an infrastructure that requires windows, you'll be paying for it.Microsoft did this whole thing for the PR. I mean really, piracy isn't a problem when people don't know if they're going to be able to afford to eat on any given day, as mHelmy said.
  9. You can stick them in an array to keep track of them (though if it's variable, I would use Vector<JCheckBox> to store them. Then just iterate across the array to add them to the form.
  10. They all put in the fine print now that the offer requires you to satisfy some offer and referral requirements. It's not a fix (they really should tell you upfront the list of things you need to do to complete the requirements...of course if they did that I don't think anyone would actually sign up) but I think they had to because they were getting so much bad PR over what they were doing. Gratis networks did start this nightmare and alot of people have copied the scam.
  11. You got that backwards Boot camp will only run on Intel based Macs.
  12. Any reason you want google checkout? Paypal is alot easier to set up, and more people already have paypal accounts, so you don't take a hit on transaction charges from them.
  13. I signed up for the freeipod.com one way back in the day, gave them an email address (when they wanted a credit card number I decided not to waste my time), and it got so spammed that I lost a good email account. It was a lesson learned, and at least all I lost was an email account. I rail on these programs in an attempt to educate those who might start being careless with their credit cards in their zeal to obtain a free new toy. There's two basic tenets that one should remember about these things: If it sounds too good to be true, it probably is Nothing worth anything, is completely free And last but not least, *always* read the fine print. When you have to do something dumb and then dupe your friends into doing it to, it really isn't worth an Xbox 360 for the aggravation you've caused your friends (who are probably scheming to kill you afterward).
  14. Are both adapters on the same subnet? If they aren't, just change your default gateway via the route command to match whichever subnet's gateway the preferred adapter is on. If they are on the same subnet, just give the preferred adapter a lower metric via the netsh command.
  15. These programs are such a scam...they require so much effort to get the "free" product (between starting and canceling "free" trials and buying dumb crap you don't want)...it's just not worth it given how much money they make off of you. If you want to see what these *BLEEP*s do, just sign up for one using a spamgourmet address or a throwaway account that has no spam...within 2 weeks you'll be getting 30+ spam messages a day. Within 2 months it will climb to about 200. It's just not worth it.
  16. I should mention the simplest solution of all: just buy a usb key with a physical read-only/read-write toggle switch. These used to be pretty standard, though they're a little harder to find these days, it's certainly not impossible to track them down.
  17. It's some cool stuff, but kind of old news...at least the simplicity of a gui interface for doing this will probably lead to advances in cryptography or at least raise the bar for what we all consider bare minimum for symmetric cipher strength.As for just cracking passwords...the speed increases this could provide are nothing compared to the speed you get with a precomputed hash-style attack. Generating the hash tables might be faster, maybe tho.
  18. 7zip is nice primarily because it does everything that WinRAR does (for most people) and more, all for free. Also, you can package 7-zip with a Linux distribution, since it's GPL licensed...you can't do that with unrar.
  19. Yeah, and there's a group policy setting in active directory for that. The only things that should be controlling aspects of the system like the task manager should be your system admin via group policies, not the registry, not some random 3rd party application.
  20. I don't think this is possible...php and javascript are handled by two different preprocessors, one of them is php, the other is handled by the servlet engine. There may be a way to do it specifically using Tomcat and php installed into Tomcat, try the documentation...but as far as doing it with apache and the tomcat redirector...you may be out of luck.
  21. Non root users can read the process table, sure...but none of them can kill tasks that aren't their own. The task manager does in fact just query the process table to enumerate all running processes.
  22. The fact that people can do inane **** like this...is exactly why I use Mac and Linux. An application running as a non-root user should *never* have edit access to things like the process table (which is basically how these apps work).
  23. I didn't say someone using ie, i said "someone using ie and has alot of toolbars". Someone using IE and having multiple advertising-oriented BHO toolbars throws up a warning flag to me. IE is bad not because it's microsoft, but because it's such a popular target for attacks due to its tight integration with the underlying operating system. Overrun a buffer in IE and you have potentially the same level of access to the computer that the shell does...overrun a buffer in firefox and congratulations, you've just annoyed someone by crashing their browser.
  24. The easiest way to do it is just enumerate all the threads on the scheduler...find threads that aren't owned by a process and suspend them, kill them, or look at their file handles and see what they're up to.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.