Jump to content
xisto Community

bureX

Members
  • Content Count

    320
  • Joined

  • Last visited

Everything posted by bureX

  1. Well, yeah!But, it will share your PC's motherboard, RAM memory, Graphics Card, power supply, etc. It will only have it's own HDD and a small EEPROM chip that will contain that tiny OS. If you don't know what EEPROM (electrically erasable programmable read only memory) is, take a look: http://www.webopedia.com/TERM/E/EEPROM.html
  2. Whoah! Slow down! You are asking for allot dude! It will be very diffictult for you to make such a thing. I doubt that someone made such a thing and that he is willing to share it just like that! You should try a CMS, such as PHPnuke (https://www.phpnuke.org/). I think that you can install it from your CPanel... Have a look at http://www.freeprogrammingresources.com/phpcms.html also.
  3. What did you mean by saying "get back phone number on siemens c60"? It would be very nice if you could rephrase your question!I have a Siemens M55 and a COM port cable. I don't see any electronic equipment located inside that cable. Just a COM port, a cord and the Siemens port that you connect to your mobile phone. Google a bit and I'm sure that you will find a scheme on how to make it.
  4. I am currently using Slax - a live CD based on Slackware, but I installed it to my HDD (a small one - only 1,5GB in size, I didn't want to mess with partition resizing, so I recycled this HDD). It has the perfect stability of Slackware and KDE 3.4 (and FluxBox also) as it's window manager. I added the development module to it and now I can compile and install new programs! However, I tried out some other distros (not on my PC) and here are the ones that I really like:1. Mandrake Linux2. Fedora3. Slackware4. Debian5. GentooHere are the Live CD distros that I really like:1. Knoppix2. Slax (only 200MB! fits on a mini CD!)3. DSL (Damn Small Linux ? fits on a business card disk ? 50mb, it even has a window manager!)4. BeatriX (it's based on Knoppix, if I am not mistaking)Believe it or not, I tried out Hal91 - it's a Linux distribution that fits on a single floppy! It doesn't contain a window manager, but it's still very usable! (can be used as a rescue disk for old computers running Windows with a FAT or FAT32 filesystem)Unfortunately, it hasn?t been updated since 1998...I didn't try out Ubuntu, but I heard allot of good things about it... I ordered a CD and I hope that it will arrive soon!
  5. Wireless LAN signals can ALWAYS be tapped, but if the network is encrypted, the received tapped material is a bunch of trash! You can't do anything with it! As I said before, switch to WPA if you are having second thoughts about WEP. WPA cannot be cracked yet. WiFi encryption systems are INTEGRATED in WiFi equipment, it does not use any system resources. In fact, it shouldn't cause any slowdowns at all! Unfortunately, some manufacturers didn't implement this technology very well, and that's the reason why some cheap equipment causes the network bandwidth to be 2%-5% slower than usual when encryption is on. He wants to share his internet connection, I don't think running around with CDs from one computer to the other will aid him very well . PS: You can always enable MAC address filtering, but if your network is unencrypted, an attacker can use a network sniffer to discover a mac address in the data that is sent over a network, and then change his mac address to be the same as the one that he discovered. By doing that, he can gain access to your network. Again: Use encryption! Oh, and hiding the SSID can cause allot of compatibility problems, because some devices require a SSID to connect to a wireless network. Besides, Air Snort can detect it anyway. If your network is secure, you've got nothing to worry about.
  6. You should also read these topics: http://forums.xisto.com/no_longer_exists/ http://forums.xisto.com/topic/106-free-web-hosting-service-registration-3-easy-steps-to-your-new-free-website/ Most of your topics (that BuffaloHELP listed) are considered spam because you didn't help anybody, the post isn't interesting at all, it only takes up valuable forum space. At this moment, it does not look like anything bad, but what would happen if the whole Xisto forum was covered in single-word posts like "Yep!", "True", "w00t", "WTF?" etc. And that's the main reason why the hosting credits system kicks *bottom* around here! A simple "Yes" is not equal to a bigger and more interesting post! Don't force yourself to post in threads that you didn't read carefully or that simply aren't interesting to you! By doing so, you will be disgusted every time you enter the Xisto forums! ("Oh, sweet Jesus, not that Xisto again, why do I even have to talk about somebody's stupid problem with a bunch of people that I don't even know to get the best free hosting around?")
  7. 1) You should center the contents on your page and make a border around it. 2) The new features image (located at the bottom of the page) is very ugly 3) Use text instead of images for crying out loud! (like Tyseen said) WEB pages with lots of images take allot of time to load! Dial-uppers will eat you alive! 4) The footer image (*C* 2005 Jerry Li. Li. INFO) does not appear properly in Internet Explorer, and it looks even worse in Firefox! 5) The site menu is pretty static and the user doesn't know whether to click it or not because it does not react to mouse-hover actions, it appears like an ordinary non functional image! 6) If your page is still under construction, please don't reject users like this: Example from: http://forums.xisto.com/no_longer_exists/ And, I repeat: Your web page is simply HUGE! Use text instead of unnecessary images, optimize the images that you need for the web and don't use unnecessary GIF animations! Good luck!
  8. Well, the BIOS itself may eventually expand and make a good home for a black box in the future.There has been some projects and ideas about enhancing the BIOS (because the BIOS is truly independent on a ordinary PC), by making it more flexible, powerful and user friendly. The idea is about making the BIOS be able to receive input not only from keyboards, but from other pointing devices (e.g. an ordinary PC mouse), and make the BIOS be able to have a file browser that can read and edit the contents of your disk. Unfortunately, it will take some time until this idea is realized. After all, there are a bunch of file systems around (FAT, FAT32, HPFS, NTFS, Ext2, Ext3, ReiserFS and CD file systems etc. and there is a problem when accessing SCSI hard disks also) and such a "mini OS" can't handle them all. However, it would be neat if the BIOS could monitor dangerous system operations (and warn users about it) such as changing the MBR (master boot sector) of the hard disk, formatting the hard disk, overclocking your CPU, RAM or graphics card, or stop a virus that is trying to access vital parts of the computers operating system.Maybe that "black box" can even have it's own hard disk, and when you shut down your PC, it would copy the entire contents of your hard disk to the black boxes backup hard disk, so you can restore your PC without problems when there is a need to do so.Let's hope that this idea comes true, because operating systems today cannot interact very well with the BIOS. For example, the cpu overheating protection (Asus calls this C.O.P.) that most motherboards have is working pretty well. When your CPU overheats, the PC shuts down. But, that's about it! You don't actually know what happened! This could scare the pants of newbie computer users (their PC turned off by itself, what will their reaction be?)! Here's what should be done in my opinion:Before the PC switched off, it could save the whole RAM contents by not turning off power supply to the RAM (RAM memory looses it's contents when it looses it's power supply). When the CPU cools down, the PC could turn back on and everything will be exactly on your desktop as you left it there (all running programs will continue to run, all your documents will remain untouched). The BIOS should also let the user know that the reason for the sudden PC shutdown is the CPU overheating problem.This is still in a ?blurry idea? phase, so we will have to wait for a while before a PC black box comes to life. The CPU overheating scenario is just an example of what the PC black box should do in cases where data loss and hard disk corruption represent a threat.
  9. I only used Electronics Workbench and Protel, so I can't recommend one, but here are some links, check them out: http://home.planet.nl/~heuve345/freesoft/elec.html http://www.electronics-lab.com/downloads/pcb/
  10. I guess that you live in a town where people think that the Discovery Channel is the tool of the devil? Back on topic: Mobile telephony uses these frequency bands: 900MHz 1800MHz 1900MHz You would be safe if you would put that cell phone antenna near your face! I mean, people live near TV and radio antennas, they emit more power than cell phone antennas, but people are not complaining about it because they don't feel a thing, besides, TV is TV, everybody has one, and everybody needs one! Mobile phones are completely harmless (unless you plan to do some biking while talking to your friends ), and so is that cell phone antenna. Your neighbors probably don't need a cell phone, and that's the main reason for protesting against it! They don't need it, and they are afraid of something changing in their town! It sounds strange, but it's true! People can be that weird! My neighbor told me that his neighbors were complaining about his WiFi access point that was on top of the building where he lives. They said that it was causing loss of quality on their favorite TV stations! What they didn't realize is that WiFi operates on 2.4GHz, and TV stations operate from 500MHz to about 800MHz (more about TV/FM/CATV frequencies here: http://forums.xisto.com/no_longer_exists/)! They can't interfere with each other! Plus, they all have cable! LoL! Their old TV antennas weren't even used the whole time! Check out this link to learn more about this topic: http://forums.xisto.com/no_longer_exists/ However, if you find bunch of dead birds around, then you should complain about that cell phone antenna!
  11. This is a pure hoax because: 1. I have seen this sentence in a "phishing" scam e-mail message before! (I think that it was sent to PayPal members) 2. Yahoo! mail support doesn't send attachments in their e-mail messages. 3. If you have really sent a really large amount of spam e-mail messages recently, your Yahoo! Mail account would be surely terminated by now! Why would they ask you for excuses when you have a free e-mail account? 4. Yahoo mail messages usually come from support@yahoo.com 5. It reached your spam (bulk) mailbox! I doubt that Yahoo would deliver this kind of sensitive information would to your spam mailbox! I guess that the attachment contains a trojan or a virus, but it usually contains "very important form that you need to fill". That form usually asks for you password! Yahoo staff will NEVER ask you for your password, and that includes other free mail services! You can ignore this message, or report it: GMail has a feature "Report Phishing", but I think that Yahoo doesn't have this one-click feature. You should forward that message with a brief explanation that you are not sure whether this e-mail message is a hoax or not to abuse@yahoo.com. Keep your eyes open for these kinds of phishing scams!
  12. Try it, have a few laughs! Here are the links: Which OS are you? http://www.bbspot.com/News/2003/01/os_quiz.php Which extension are you? http://www.bbspot.com/News/2004/10/extension_quiz.php Which Nigerian spammer are you? http://www.bbspot.com/News/2004/04/nigerian_quiz.php
  13. 200$??? Everybody knows that it's a scam immediately! No one with a brain that is bigger than a pea will give you 200 bucks for receiving an e-mail! We will have to invent a new abbreviation and use it here: RTFLA (Read the f*****g license agreement): Hehe... Nice trick! Make 1000000$ out of sending e-mails to registered users, and choose one of them that will get 1000$. You have a greater chance to "win a free iPod" (yeah right) than to earn money with this scam. Just another scam in the ocean...
  14. True, but I think some people cheated and gained more reputations than they actually deserve, so this is not a great loss! I know, I know... reputations don't mean anything, but I'm sure that allot forum members (especially newbies) notice this very quickly while reading posts on the forum, and they are not aware of this. About the new forum: it ruleZ! I thought that the forum was loading slowly before because of the ads, but I was wrong! I was surprised when the Xisto forum loaded almost instantly! Great job guys! Keep up the good work!
  15. It won't do any harm, I'm sure! Try it!All you need to do is to start BootVis, select Trace > Next Boot, restart your system, wait for BootVis to do it's job, and when it's done, start it again, but this time, select Trace > Optimize System.
  16. The attacker can use a WEP cracking tool (such as AirCrack or AirSnort) to discover your WEP key if he collects about 300-500 megabytes of data from your network.The best thing to do would be to buy 802.11g enabled wireless devices that can reach speeds (theoretically) up to 54Mbps, so data transfer between your two PC's should be way faster. 802.11g works pretty well on small distances, and it supports WPA (that can't be cracked yet, and allot of time will pass until someone figures out how to do it).So, the final checklist would be:1) Change the default admin username and password on your router/AP2) Enable WPA if possible, or the highest possible WEB encryption.3) Use a firewall (such as Zone Alarm) and an antivirus program on both sides (safety first!)4) Make sure that there are no cars or vans near your house with a bunch of geeks, sitting inside it, fiddling with their laptops and giggling about something. (Just in case)
  17. First, enable POP access: https://support.google.com/mail/answer/7104828?visit_id=0-636135428686701988-3830205362&rd=1 Second, configure Outlook: https://support.google.com/mail/ Done! Next time, try the GMail help database first!
  18. Here's an another good way of improving Windows XP's startup speed (this tip is only for Windows XP users, of course). It's called "BootVis" - a free tool from Microsoft that is supposed to make your computer start up more quickly... I didn't believe it could do such a thing at first (and it isn't created for that purpose anyway, a friend recommended it to me), but I tried it out and I noticed an large increase in startup speed! If anyone is willing to try it out, here's the link: http://bootvis.soft32.com/ or http://www.winxpfix.com/shop-texas-life-insurance-online/ BootVis is a bit hard to use, so if you don't really know how to use it, you should read this page first: http://forums.xisto.com/no_longer_exists/ I really hope that it will do wonders for someoneÂs PC like it did to mine! Cheers!
  19. Go to... http://area51.phpbb.com/phpBB/ ...register and discuss about the new features in the "New features discussion" forum. You can also make a feature request if you want: http://forums.xisto.com/no_longer_exists/
  20. 1024x768 @ 85Hz17" CRT LG Monitor32-bit color
  21. Oh, really? In order to earn something on the internet, it is not enough to be honest, you have to work with the right (honest) people! OpaQue is a nice example: After I posted a small post that had a quite large quote, I gained 5 hosting credits! I knew that there was something wrong and I alerted the admins immediately (in other words, I was being honest): And OpaQue replied with this: So... You don't have to be a cheater or lie to people, you just have to make sure that you know who you are working with!
  22. And a GREAT DEAL of those 90% of users are HOME/OFFICE users! Servers usually run a *nix or *BSD based operating system: Taken from http://forums.xisto.com/no_longer_exists/ That was in 2001! How many servers are running Linux right now? And there's one of the answers right there: Hackers (usually the ones who play dirty) ARE INTERESTED in your personal data! Why would they bother stealing money from a large company with enormous risk of getting caught, when they can steal money from you with numerous methods and with very little risk of getting caught? ("Phishing", sniffing, IP scanning for open ports and shared disks, exploiting, you name it!) A few dollars from a few users every day can pile up a great amount of cash! Windows source code is not available to the public (except a part of the Win NT and Win 2000 code that I mentioned earlier, but thatÂs illegal), and if hackers are still able to find security holes inside MS software, that means that Windows is not that secure. Linux, on the other hand, is Open Source, and itÂs whole source code is available to the public, so, if there is an error, or a potential security breach, hackers will find it very fast! (but only a few are actually discovered) Isn't the job of the security staff to decide if the company (that is receiving the Windows source code) is capable of guarding it also? Remove it from where? You can view Windows XP error reports when you encounter one, but you canÂt edit it... and if you could, you would have to be an very experienced user to find that information in that large hex dump... Windows gathers information during an error from the system memory also (which is unencrypted, by the way), and that includes information that is typed in text boxes, so there is a great risk of your credit card number being included inside the error report. Everything? Does that Âeverything include your personal information? LetÂs face it! Computers canÂt see the difference from your passwords, credit card numbers and other personal info from cake recipes, your homework or your note to pick up a few groceries on the way home. Like you said: 80% of Windows users will not be able to remove that information before the report is submitted, and (like I said) Windows will not be able to tell the difference between important and completely irrelevant information, so it will not be able to ask the question ÂThis error report contains your credit card number, would you like to remove it?Â. IÂm not saying that users will have to type in low level information in the error report (btw: they wonÂt be able to see it in the first place), but I know that if you say that an error occurred while pressing the ÂCheck hard disk for errors button in *insert program name here* from *insert company name here*, it will be allot easier to determine what is causing the error. What if I am running a third party program? Will Microsoft be able to create an simulation without it? I doubt it... The main question still remains unanswered: While there is a very slim chance of getting into an situation where an Microsoft employee is viewing and writing down your personal information for later use, is MY ERROR REPORT SAFE in MicrosoftÂs hands?
  23. What will happen when your internet browser crashes while submitting your credit card number? What will happen when an application crashes when you enter your password? All of that information will be kept inside that error report! I'm not saying that the Microsoft (notice: no more $ instead of s ) employees will read my personal information from my every error report, but this confidential information may eventually leak out! What do you think about this? http://forums.xisto.com/no_longer_exists/ If Windows NT and Windows 2000 source code can be available on the Internet, what can happen to your privacy? There is a very slim chance of this happening, but how many people do use Microsof Windows? Just one incident... just one is needed to cause a very big scandal! And a little bit more about the error reporting features in Windows: Error reporting cannot help the Microsoft staff very much unless you take some time to describe what were you doing when the error occurred! So... Unless you write an complete error report (this is a thing that a beginner or a novice user will not be able to do, and advanced users will simply refuse to do it), it is very difficult to know what the user did to make that error appear. (It can be a wrong video codec, a faulty application, a virus, spyware... anything!)
  24. Yep... I will eventually optimize and shrink the header as soon as possible, I also realized that it's too big... About the navigation highlights: Will be fixed too! Thanks for the tip! One question: How can I align a small 1x1 cell table (that is about 30 pixels in height and is stretched 100% to the page width) to the absolute bottom of the page? The footer where the copyright sign is located isnt currently aligned at the bottom, and I am afraid if someone with a high resolution visits the page, or if my one of my pages doesnt have that much content, views my site, the footer will be located at middle of the page (ugly!). Can somebody help me with this? Thanks for all of your very creative and helpful feedback so far!
  25. That's quite OK! In my school, every student had administrator rights on his workstation in class! They thought that the teachers won't let the students play PC games, listen to music or browse the system folders. What happened? All of the PCs were swamped with games, music and, later on, some *BLEEP* erased some system files! Ever since that happened, you have to have your own password to gain access to a computer, but now you have only main user rights. You can't write to any other folder, except to your MyDocuments folder. However, I practiced some social engineering ( http://forums.xisto.com/no_longer_exists/ ) and my teacher revealed me the Administrator account password, which I used to make my account an administrator one! Nothing special... I know that it is not in my interest to harm that computer, so I just used that account to install drivers for the ATI graphics card that is installed on that system. (They weren't installed, all of the menus were appearing very slow and the refresh rate was limited to only 65Hz).
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.