Jump to content
xisto Community

vizskywalker

Members
  • Content Count

    1,084
  • Joined

  • Last visited

Everything posted by vizskywalker

  1. So, antilost.org was a new open source web site that some of the Xisto members were putting together. I didn't have control of the site, so I don't know why it is down. As such, within a couple of weeks, I will be posting assembly tutorials here at Xisto. ~Viz
  2. This searches the MySQL database for the word ducks in the two columns specified in all the text of the column so long as the columns are of type fulltext.~Viz
  3. Windows has a setting that restricts the list of resolutions to only those the monitor can handle. You may want to see if that setting is enabled to prevent that from happening again.~Viz
  4. First of all, encryption doesn't prevent people from obtaining data, just understanding it. Second of all, you can't encrypt energy, it would take more energy to encrypt energy than to transmit it in the clear, so really, you'd be providing even more energy to your neighbors. Thirdly, waves spread in, for the most part, spherical or cylindrical patterns, so you will lose the energy whether it goes to your neighbors or not. On the plus side, if everyone had this kind of device in there home, and the power companies used it, eventually the whole world would be powered with only a few paying, which means we would eventually need free or governement provided electricity. ~Viz
  5. Unfortunately, as more things move to wireless technology via waves, the stronger all signals need to become. Wireless interference is growing at an exponential rate. Soon people will be moving back to wires (or on to new technology) because the problems posed by too much noise becomes too significant.There is another way to wirelessly transfer electricity though. Since all electricity produces an electro-magnetic field, and is caused by a change in electro magnetic field, you can cause an electro magnetic field created by some current to cause electricity to flow in a remote wire. The current problem is that, because the field falls apart with the cube of the distance (volume and all that), it takes an incredible amount of power. But as research is done in focusing electromagnetic fields, it becomes increasingly cheaper powerwise to do so.~Viz
  6. This should not be a pop-up. What this is does is replace some standard text to all Windows machines. Windows currently displays the copy-right as you boot up. Changing this registry key simply changes the message displayed on boot-up. While it has almost no danger of harming your computer (unless you have some weird third party software that relies on it) it is illegal. It may affect whether or not Windows Genuine Advantage views your computer as legit or not, but I doubt it. Even so, it is smart to maintain a registry backup, especially before making any changes.~Viz
  7. It can also be useful to create a robots.txt file to keep out or encourage robots. Simply place a file called robots.txt in your top directory. The format for each entry is as follows: User-agent: robotDisallow: fileDisallow: folder Every Time you specify a User-agent, all following rules apply to that User-agent (read robot) until a new one is specified. You can specify a User-agent of "*" to block all robots. Disallow specifies either a file or folder that the robot should not follow. In this way, all of your robot data can be centralized. It is still useful to use meta tags however, because some robots do not check all parent directories of a file they find for a robots.txt file. ~Viz
  8. Actually, there were two Ajaxes in the Iliad, but that's besides the point. As far as the GWT goes, writing the code by hand, at least for me, results in code that's about twice as small and twice as fast. Include the fact that javascript now has the capability to be "Object Oriented" (sort of) and code can be made much more elegeant and modular by writing by hand. This is not to say that the GWT is bad. It can be very useful for people who do not know enough javascript to write effective AJAX applications. On the other hand, I have seen several abuses of AJAX for things that should not have been done in AJAX. So my feelings are mixed. ~Viz
  9. VGA modes are old VESA standard video modes that are supported as legacy modes on most graphics cards. In general, on modern graphics cards, they have variable refresh rates so as not to cause problems with monitors that can't handle the lower refresh rates frequently associated with VGA modes. Sometimes, graphics cards do not adjust the refresh rate for the monitor, and this can cause problems of minimum refresh rate being exceeded. The LCD monitor possibly has a very strict minimum refresh rate, and thus cannot handle the VGA mode on its standard refresh rate as sent by the graphics card.~Viz
  10. The issue does indeed to be that of the lack of SMTP on Windows. (As evidenced by the issue of the D:\ drive, which is a Windows designator). Once you install an SMTP program on windows, you must also tell PHP what ports it uses and the like. This is why the error mentions the php.ini file. Both the SMTP variable and the sendmail_from variables should be set, although PHP will probably work with mail() once you have installed the SMTP program without adjustment. The adjustments simply make sure the proper from address and server address are associated with mailings.~Viz
  11. I'm a little unclear as to the difference that the ORDER BY MATCH(columnname, columnname2) AGAINST('Ducks') makes to the query. First, if I understand this correctly, this query searches two columns, columnname and columnname2 for Ducks, for which they must be full text. So does this order the results by appearance order in the database? And does the second part change it to order by how closely it matches Ducks? And how many times it matches Ducks? ~Viz
  12. I tried this out an noted one difference. Rather than gaining the id of NT AUTHORITY\SYSTEM, it was simply SYSTEM, although this could depend on which version of Windows is running. This can be a minor security threat, but really only if you let computer savvy people you don't trust use your computer. It would be very difficult to exploit via a network. And it is possible to disable access to the command prompt for users without certain privileges, which prevents them from gaining more rights.~Viz
  13. Actually, one of the very nice things about Vista is that 99.9% of XP drivers will still work in Vista. However, they may need to be manually installed instead of automatically installed. Also, many companies, such as Intel and NVIDIA are working on and have published Betas or full drivers for the Vista OS. As far as registry keys go. Any program designed to let you copy registries from one hard drive to another should be able to help copy the registry keys needed. And most games registry keys can be found by doing a search either for the game name or the publisher name while in the registry.~Viz
  14. Although, Javascript is not server side includes. This is an interesting idea, and could easily be implemented in various languages. However, it fails in many cases precisely because Javascript is handled on the Client Side, and is not a Server Side include. To simply leave this as javascript, you could instead make the javascript page point either ahead to the next page assuming the ip passed, or back. Then if javascrpt were disabled, the user would see a blank page, or a page asking them to enable javascript.~Viz
  15. Not keeping track of the root password for two actions where one spawns the other is an annoyance. At least for me. I understand not running root, and even prompting for root password, but at least keep track of it for the same overall job.~Viz
  16. One commonly overlooked (but rare) benefit of two sticks:If one goes out, you can still run the computer off the other until you can get a replacement (assuming both are large enough).~Viz
  17. I've been using the Vista Beta, and have found it to be nice. As far as accessibility to administrator tools, it has more speed and easier ways to access, but the Linux annoyance of essentially asking for the root password to do anything (it only asks for permission if you have full admin status, and you can disable it). It seems to be only as fast as Windows XP, but it does more per action than XP, so in reality, it is faster, just slowed down by the extra things it does. The eye candy is amazing, I wish they'd make an aero ptch for XP. I have some problems because certain laptop generics (like touchpads) are still not fully supported, but Vista can run all XP drivers, which is nice.~Viz
  18. Have you ever heard of php.net, it's a great resource for all things php, and if you type what you are looking for into the search bar and tell it to search functions only, you can usually find an appropriate function. In this case, you want to see this page. ~Viz
  19. I don't know of any, because I've never looked into it, and while that does seem to be a possible solution (and for you, a good one) the problem comes in with the fact that if windows does any changes before the process can load, you may not have perfect mirroring anymore, and it would not be a true raid array. The other problem with this software side mirroring, is you lose a lot of the transparent lack of speed loss true raid provides because the software needs to monitor what is happening with the harddrive, while in true raid, the bios, processor, or os kernel simply lets the mirroring happen and ignores the second drive replies of completion. If you use an addon process or service, Windows may handle completion responses by capturing them, checking if it is needed, then discarding, which considering all the other types of hard drive interrupts that can be sent, can cause slowdown, although in your case probably not enough to cause problems.~Viz
  20. Okay, my biggest problem with this is that he essentially had a song made up for it (as near as I can tell). The only reason I liked the other is because it introduced me to the song Dragostea Din Tei, which I think is a good song. This new song is all just random gibberish.~Viz
  21. Remember though, that the most important part of validation is not passing validation, but that your code is valid. For example, browser specific (proprietary) css tags do not pass validation, even properly formed ones that are listed in recommendations. So if you use them, your site will not pass validation, although it will be valid.~Viz
  22. RAID mirroring should have nothing to do with software. It is usually controlled (in modern systems) by the BIOS controller or the IDE/ATA controller to do invisible mirroring. The operating system should never even know that the backup harddrive exists as a viable storage area.~Viz
  23. Any encryption, as has been stated before, is better than none. Unless you have files that would be of direct interest to people (such as important business files) if two networks are in the area, and one is encrypted, and the other isn't, 9 times out of ten (or more) the unencrypted network will be accessed. However, if only one encrypted network is in the area, it will probably be accessed if possible. That being said, WEP encryption, even WEP-128 bit has been hacked. WPA (I beleive) has also been recently hacked, but it is much harder and more time consuming to do so. So I recommend WPA encryption if you can. Also, don't share files between computers that are of sensitive nature unless you need access to them from all the computers in your home. If files aren;t shared, even if someone gets into the network, they will have a hard time getting access to the files. So if you are careful, wireless networks are very secure.~Viz
  24. Actually, C++ (or some other C language, like perhaps c#) would be a very good language for you to code this project in. Figuring out the logic is definitely a good first step here. I would try to search for some basic C# tutorials, or C++ ones since it's easier to get compiler's for C++ than for C# as far as I know.~Viz
  25. Add encryption, WEP is decent, WPA is better. Unless you are talking about wired networks. Either way, get a firewall and anti-virus program. And get spyware and adware cleaning software. I recommend Lavasoft's Ad-Aware and Spybot Search and Destroy. And before posting, search the forum, this question has been answered several times.~Viz
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.