Jump to content
xisto Community

vizskywalker

Members
  • Content Count

    1,084
  • Joined

  • Last visited

Posts posted by vizskywalker


  1. @vizskywalkerYour site is returning an ERROR while visiting.Please fix that

    So, antilost.org was a new open source web site that some of the Xisto members were putting together. I didn't have control of the site, so I don't know why it is down. As such, within a couple of weeks, I will be posting assembly tutorials here at Xisto.

    ~Viz

  2. I would not want to my by neighbors usage charges. Back to the health topic. Its already quite bad that we live in a world of waves.

    First of all, encryption doesn't prevent people from obtaining data, just understanding it. Second of all, you can't encrypt energy, it would take more energy to encrypt energy than to transmit it in the clear, so really, you'd be providing even more energy to your neighbors. Thirdly, waves spread in, for the most part, spherical or cylindrical patterns, so you will lose the energy whether it goes to your neighbors or not. On the plus side, if everyone had this kind of device in there home, and the power companies used it, eventually the whole world would be powered with only a few paying, which means we would eventually need free or governement provided electricity.
    ~Viz

  3. Unfortunately, as more things move to wireless technology via waves, the stronger all signals need to become. Wireless interference is growing at an exponential rate. Soon people will be moving back to wires (or on to new technology) because the problems posed by too much noise becomes too significant.There is another way to wirelessly transfer electricity though. Since all electricity produces an electro-magnetic field, and is caused by a change in electro magnetic field, you can cause an electro magnetic field created by some current to cause electricity to flow in a remote wire. The current problem is that, because the field falls apart with the cube of the distance (volume and all that), it takes an incredible amount of power. But as research is done in focusing electromagnetic fields, it becomes increasingly cheaper powerwise to do so.~Viz


  4. This should not be a pop-up. What this is does is replace some standard text to all Windows machines. Windows currently displays the copy-right as you boot up. Changing this registry key simply changes the message displayed on boot-up. While it has almost no danger of harming your computer (unless you have some weird third party software that relies on it) it is illegal. It may affect whether or not Windows Genuine Advantage views your computer as legit or not, but I doubt it. Even so, it is smart to maintain a registry backup, especially before making any changes.~Viz


  5. It can also be useful to create a robots.txt file to keep out or encourage robots. Simply place a file called robots.txt in your top directory. The format for each entry is as follows:

    User-agent: robotDisallow: fileDisallow: folder

    Every Time you specify a User-agent, all following rules apply to that User-agent (read robot) until a new one is specified. You can specify a User-agent of "*" to block all robots. Disallow specifies either a file or folder that the robot should not follow. In this way, all of your robot data can be centralized.

    It is still useful to use meta tags however, because some robots do not check all parent directories of a file they find for a robots.txt file.

    ~Viz

  6. I've messed with the GWT quite a bit and can't help but admire it. It's great how compatibility isn't really much of an issue anymore with the GWT. There does seem to be a small drawback--the files can be really huge, even if what you want to do doesn't necessarily garner such a file size. Coding the Javascript yourself probably makes for slightly cleaner/clearer code, but if you're like me and are lazy, using GWT is great.
    And...if not obvious it, I've definitely heard of Ajax. When I first found out about it, my reaction was, "What's some ancient Greek soldier doing in web design?" (Yes, Ajax was a dude in Homer's Iliad).


    Actually, there were two Ajaxes in the Iliad, but that's besides the point. As far as the GWT goes, writing the code by hand, at least for me, results in code that's about twice as small and twice as fast. Include the fact that javascript now has the capability to be "Object Oriented" (sort of) and code can be made much more elegeant and modular by writing by hand.

    This is not to say that the GWT is bad. It can be very useful for people who do not know enough javascript to write effective AJAX applications.

    On the other hand, I have seen several abuses of AJAX for things that should not have been done in AJAX. So my feelings are mixed.

    ~Viz

  7. VGA modes are old VESA standard video modes that are supported as legacy modes on most graphics cards. In general, on modern graphics cards, they have variable refresh rates so as not to cause problems with monitors that can't handle the lower refresh rates frequently associated with VGA modes. Sometimes, graphics cards do not adjust the refresh rate for the monitor, and this can cause problems of minimum refresh rate being exceeded. The LCD monitor possibly has a very strict minimum refresh rate, and thus cannot handle the VGA mode on its standard refresh rate as sent by the graphics card.~Viz


  8. The issue does indeed to be that of the lack of SMTP on Windows. (As evidenced by the issue of the D:\ drive, which is a Windows designator). Once you install an SMTP program on windows, you must also tell PHP what ports it uses and the like. This is why the error mentions the php.ini file. Both the SMTP variable and the sendmail_from variables should be set, although PHP will probably work with mail() once you have installed the SMTP program without adjustment. The adjustments simply make sure the proper from address and server address are associated with mailings.~Viz


  9. I'm a little unclear as to the difference that the

    ORDER BY MATCH(columnname, columnname2) AGAINST('Ducks')
    makes to the query.

    First, if I understand this correctly, this query searches two columns, columnname and columnname2 for Ducks, for which they must be full text.

    So does this order the results by appearance order in the database? And does the second part change it to order by how closely it matches Ducks? And how many times it matches Ducks?

    ~Viz

  10. I tried this out an noted one difference. Rather than gaining the id of NT AUTHORITY\SYSTEM, it was simply SYSTEM, although this could depend on which version of Windows is running. This can be a minor security threat, but really only if you let computer savvy people you don't trust use your computer. It would be very difficult to exploit via a network. And it is possible to disable access to the command prompt for users without certain privileges, which prevents them from gaining more rights.~Viz


  11. Actually, one of the very nice things about Vista is that 99.9% of XP drivers will still work in Vista. However, they may need to be manually installed instead of automatically installed. Also, many companies, such as Intel and NVIDIA are working on and have published Betas or full drivers for the Vista OS. As far as registry keys go. Any program designed to let you copy registries from one hard drive to another should be able to help copy the registry keys needed. And most games registry keys can be found by doing a search either for the game name or the publisher name while in the registry.~Viz


  12. Although, Javascript is not server side includes. This is an interesting idea, and could easily be implemented in various languages. However, it fails in many cases precisely because Javascript is handled on the Client Side, and is not a Server Side include. To simply leave this as javascript, you could instead make the javascript page point either ahead to the next page assuming the ip passed, or back. Then if javascrpt were disabled, the user would see a blank page, or a page asking them to enable javascript.~Viz


  13. I've been using the Vista Beta, and have found it to be nice. As far as accessibility to administrator tools, it has more speed and easier ways to access, but the Linux annoyance of essentially asking for the root password to do anything (it only asks for permission if you have full admin status, and you can disable it). It seems to be only as fast as Windows XP, but it does more per action than XP, so in reality, it is faster, just slowed down by the extra things it does. The eye candy is amazing, I wish they'd make an aero ptch for XP. I have some problems because certain laptop generics (like touchpads) are still not fully supported, but Vista can run all XP drivers, which is nice.~Viz


  14. I don't know of any, because I've never looked into it, and while that does seem to be a possible solution (and for you, a good one) the problem comes in with the fact that if windows does any changes before the process can load, you may not have perfect mirroring anymore, and it would not be a true raid array. The other problem with this software side mirroring, is you lose a lot of the transparent lack of speed loss true raid provides because the software needs to monitor what is happening with the harddrive, while in true raid, the bios, processor, or os kernel simply lets the mirroring happen and ignores the second drive replies of completion. If you use an addon process or service, Windows may handle completion responses by capturing them, checking if it is needed, then discarding, which considering all the other types of hard drive interrupts that can be sent, can cause slowdown, although in your case probably not enough to cause problems.~Viz


  15. Any encryption, as has been stated before, is better than none. Unless you have files that would be of direct interest to people (such as important business files) if two networks are in the area, and one is encrypted, and the other isn't, 9 times out of ten (or more) the unencrypted network will be accessed. However, if only one encrypted network is in the area, it will probably be accessed if possible. That being said, WEP encryption, even WEP-128 bit has been hacked. WPA (I beleive) has also been recently hacked, but it is much harder and more time consuming to do so. So I recommend WPA encryption if you can. Also, don't share files between computers that are of sensitive nature unless you need access to them from all the computers in your home. If files aren;t shared, even if someone gets into the network, they will have a hard time getting access to the files. So if you are careful, wireless networks are very secure.~Viz


  16. Add encryption, WEP is decent, WPA is better. Unless you are talking about wired networks. Either way, get a firewall and anti-virus program. And get spyware and adware cleaning software. I recommend Lavasoft's Ad-Aware and Spybot Search and Destroy. And before posting, search the forum, this question has been answered several times.~Viz

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.