Jump to content
xisto Community

miCRoSCoPiC^eaRthLinG

Members
  • Content Count

    2,482
  • Joined

  • Last visited

Everything posted by miCRoSCoPiC^eaRthLinG

  1. Waahahahahaahaa.. you.. and staying away from girls ???? whahahahahahaa...hhohohohoho... god.. thanks for making me lol so hard after so long. You without girls, WHAT A JOKE !!!!
  2. Your upgrade didn't happen. You still have the same system token you received for upgrading your account. You can still go ahead and try once again to upgrade. No harm done. Sometimes the process aborts due to timeouts and it involves calling a whole bunch of shell scripts to create/upgrade your account.
  3. Yes - absolutely. Each member has his share of 3GB monthly bandwidth ready for his usage - whether he uses it up compltely by the month-end or just ends up using only 1-2% of it. But keep in mind, this quota is NOT carried forward to your next month and added to the quota there.. i.e., say in one month you use only 100MB. This doesn't mean next month you're going to get 3GB + 2.9GB = 5.9GB bandwidth. Upon beginning of next month, all quota's are reset and everyone starts fro 3GB again. You can the statement as, 3GB or a Month's bandwidth - whichever comes earlier.
  4. The only good other place I know of (for IPB - this kind of board) is http://mods.invisionize.com/ - search or just browse around here and you might find one. Found one - here's a points system that with a little modification can become a credit system. Perfect Points System with Control Panel
  5. Wait a sec - I didn't understand the last part Why do you have Ip's associated with your domain ? And how come abhiram.be points to ns1 and http://forums.xisto.com/no_longer_exists/ points to ns2 ?Where do you change these settings ? Seems like a config. error... Need some more details ..
  6. Lol.. thanks for pointing that out szupie. I guess we got carried away a bit here, but this has definitely brought up an interesting issue. More often than not you'd find issue under discussion taking place. So we do need a basic outline of tutorials - some basic format, in which all platform/sftware info and versions have to be clearly stated. Rest of the tutorial can be left to the author's imagination.
  7. Same problem here. I hate both of those services. I haven't been able to download a single file till date whether through direct connection or through a proxy. I always end up with the messages; 1. Your IP has exceeded the download limit for today 2. Your IP is x.x.x.x is downling blah blah file and you can't download any more till this is finished. 3. Your IP has downloaded blah MB and cannot download till next hour.. etc. etc... more etc.......revolving around those 3 messages. For crying out loud - am using a ADSL link and of course there might be n number of different people who've used this IP prior to me.. but then, even when I disconnect and reconnect several times (my provider doesn't affix a particular IP to you.. it changes everytime you login - just like dialup) - but even that doesn't work. What I think is they play a very smart trick - they block the whole segment from any ISP is a little heavy download is going on... everything about these sites just SCREAM OUT - GO GET THE PREMIUM SERVICE or else all you get is NADA.
  8. Nope.. and exactly my feelings. I couldn't spot what was wrong, but surely I was looking for those words - Dodgey and Weird.. and like it's your extremely familiar browser with everything out of place. I didn't get the point of trying to come up with something like Flock when we have firefox in existence... I mean how much better can it get ? It's using the same goddamned engine running behind. Moreover, after using Firefox 24/7, if you start using flock, you'd immediately get into a real nasty mood when you can't find the right controls in the right place. Seriously, I don't get the point of the whole effort.
  9. Hi guys, ????[/tab]I came across this site just today, following up on some Wired News.. This is actually quite old, but nevertheless nobody seems to have posted about this earlier on. You guys simply got to see this. The site's called Surservient Chicken and it turns out that it's another cool sales gimmick by Burger King - done way back around April 2005. ????The site contains a small window showing livecam view of a guy dressed up as a Giant Chicken (from Outer Space ??) .. anyways, there's this small command line box right below the image where you type in a command and the chicken acts it out, LIVE, for you It's terrific fun - all you need to do is start issuing a bunch of commands and see which one turns out to be the most hilarious. For a starter, try "STAND ON YOUR HEAD" and sit back and watch the misery the poor chicken goes through trying to do just that.. lol [tab]Apparently the idea for this gimmick was a rip-off from some of the rather "decadent" (??) sites offering you live web-cam feeds of rather scantily-clad (or completely unclad) and overly well-endowed females entirely willing to do as Your Master Pleases. But apparently the damned gimmick worked like a charm straight out of hell.. Enough of talking bull on my part... Now I leave you at the mercy of the Subservient Chicken @ http://www.subservientchicken.com/ Whoever happens to visit this site, make sure you come back and paste in here the most hilarious action you could get your chicken to do... I can already see the beginning of an ultra-funny thread right here.. Have fun m^e Forgot to mention - DEFINITELY TRY: I want a chicken sandwich - or any variation of it containing the words "Chicken" & "Sandwich"
  10. Hmm good idea - am going to take that up and chalk up a basic format. Thanks
  11. See, Ghost on-the-fly burning has terrific problems. Most of the time you end up with bad images and more than 20-30 wasted cds. This is because, everytime it fails, you've start from CD 1 all over again. It has no way of figuring out which CD is bad and creating only that part of the image. Best is to span it into volumes onto some separate partition - but the spanning is a trick which i couldn't uncover yet.. maybe someone else can help you there... Once spanned and broken into 700MB images, not a hassle to burn them using Nero. In case you want to make sure your first disk is bootable, you should use WinImage to create a separate boot image and NOT RELY on Ghost to do it. Along with this bootimage you place Ghost.exe and Mouse.Com ..and your job's done. I STRONGLY recommend usage of WinImage and it makes your boot image extremely flexible and tailor-made to the exact order you want. Suggested Reading: Guide to Creating Bootable CD/DVD's without A:\ Floppy Drive
  12. It's very simply - you right click on the filename and then click on File Permissions from the pop-up menu. In there check all the checkboxes and press enter. That'll give you permission 0777. If you want further information on what is CHMOD and how the modes work, take a look at: Demystifying CHMOD
  13. Shell access isn't allowed by default as most people don't use it and can cause more damage unknowingly ... but there's no restriction on it as such. It doesn't cost you either to get it. All you'll have to do is make another request in the Misc. Requests forum under Hosting Request Forum and it'll be done. Yup, the server denies creation of empty folders through FTP upload - so that's one problem you got to live up with. On the other hand, if you're using some good FTP client, you can manually create those directories - not a problem at all. This is another feature which you cannot do anything about. By default on all *NIX systems, files beginning with "." or "_" are treated as hidden/system files and thus don't show up on normal listing. Only a ls -la will show you all those. However, I use WS_FTP and FileZilla - and those show up on my listings. GD is supported for sure - but after the server shift, it hasn't been enabled on the new servers. The technicians have been notified, but sometimes you'll notice that such things take a little time to get fixed. We try to offer really quick and state-of-the-art service but we run on limited manpower, managing so many different sites under the Xisto ring. And none of this is paid for as such - most of the administering is done by people who do it on a voluntary basis. They've got their own work & life too and they time-share between them and maintain our sites/boards. So sometimes if you see the pace slacken a bit, this is the only reason behind it. We're sorry about that.
  14. See first of all, the .NET platform was supposed to be Microsoft's answer to Java. I've been coding in .NET well over 2 years now - and despite being a hardcore MS hater, I'd say, this product isn't one you can discard like cheap trash. For once (despite all the pitfalls) - MS has come out with something well worth mentioning. .NET is basically a OOP Framework - a set of files/libraries that provide you with thousands of pre-designed classes allowing you to rapidly develop and deploy applications on Windows. The underlying principle is almost 99% same as Java - and so is the class/package organization. If you're an experienced Java programmer, switching to .NET is a matter of minutes - as it happened in my case. The way Java produces an intermediate ByteCode - which can be run on any platform that has Java Runtime Environment installed - so it's the case with .NET. The compiled .exe-s are in an intermediary format known as MSIL - MS Intermediate Language. .NET offers a very handy way to write Managed Code where you never have to worry about freeing allocated memory yourself at every step - thus avoiding potential memory leak problems. The unified Garbage Collector (similar to Java) runs from time to time freeing up memory from object references which have gone out of scope. That's ONE LESS headache when it comes to voluminous coding - let me tell you. VB.NET, C# (C-Sharp).NET, C++.NET and J#.NET - all form a part of the .NET framework - the BIGGEST ADVANTAGE in this case is Mixed Coding. Since all these languages use the underlying .NET Framework, a project you design can contain code in any of these languages. They'll all compile and live harmoniously together. So in effect, my main program can be written in C#, one dll in VB.NET, some addon classes to the main in J# and some more WinAPI libraries in C++.. the development environment wouldn't even hiccup at this. It calls the appropriate compiler in each case and combines the code from all these different languages together in a very robust way, I must say. Moreover, .NET surely offers the great flexibility of OOP coding.. Like Java, all your code HAS TO BE in the form of Classes and you're advised to use the OOP features to their fullest extent. As for C# - I would say, it's a rip-off from Java - the structure & style of your code is 100% same as Java - only variation you find is in the syntax, which again, J# makes up for. But it's not something to dump as outright trash. One little known fact - .NET framework isn't going to die out as many might like to think. According to me it's here to stay for good. Because, with .NET, MS has "SOMEWHAT" started to realize their prior mistakes and have even released a .NET framework for FreeBSD. To me, that says a lot coming from a company like MS. This means, any code you write for .NET on Windows, should ideally run without any further modification on FreeBSD too. I'm eagerly waiting up to test this out. All in all I'd give .NET a rating of 7/10 - and advise all of the serious coders to give it a try. Once again, it's not as trashy as you might like to think of it. All this coming, from someone who goes around proclaiming "Linux: What WINDOWS will never be" - is a big thing, my friend. I'm surprised at it myself at times.. but I surely must have realized the good points/advantages to come out and speak such volumes about it. No matter what, I still believe that the learning curve for coding should start off with C++ (the OOP way), as it provides a very good platform-independent (more or less) foundation for coding. Once you've got a fair command on it, shifting to other languages isn't a problem at all. Suggested Readings & Downloads: .NET Nuts '& Bolts - The Joy of Rotor (C# on FreeBSD) .NET SDKs, Redistributables & Service Packs Mono: FreeBSD#Mono is an open-source project providing the necessary software to develop and run .NET client and server applications on Linux, Solaris, Mac OS X, Windows, and Unix. Shared Source Common Language Infrastructure 1.0 ReleaseThe Common Language Infrastructure (CLI) is the ECMA standard that describes the core of the .NET Framework world. The Shared Source CLI is a compressed archive of the source code to a working implementation of the ECMA CLI and the ECMA C# language specification. This implementation builds and runs on Windows XP, the FreeBSD operating system, and Mac OS X 10.2. It is released under a shared source initiative. Please see the accompanying license.
  15. I don't think so - as far as I know, it can be done by a client too. Besdies you don't need any special setup to have this functioning except for: From what I know, it uses the basic FTP protocol to do the transfer - but with another layer of abstraction over it, not letting you see the actual files being transferred. That part of the process is fully automated. My point is, since it still uses FTP in the background, as long as both sites support PASV mode and PORT commands, it shouldn't be difficult at all. As for Xisto, it supports both PASV and PORT - so no problems at this end. Might be something to do with the other host you're trying to copy your files from. Find out if they support both these commands. Regards, m^e
  16. Hahahaha thank you for that curare. That was simply a brilliant example. Thanks for the terrific new addition to my quotes & phrases handbook And since you brough the term brown-nosing up, I remember seeing an extremely hilarious rendition of it on Webster.Com.. What can I say except - "Very well put"
  17. I'd posted a tutorial quite sometime back exactly on this topic. You might want to take a look at it: Howto: Domain Name Server On Linux Also suggested that you follow it up with: Howto: Setup Your Own DHCP Server On Linux Howto: Setup Windows NT/2K Domain Using SAMBA All these services work almost hand-in-hand.. so it's quite necessary to know about the inners workings of all of them and how they interact with each other. Great fun too, experimenting with them and making them work in sync.
  18. Hahahaha.. rofl.. nice one guru.. from the looks of it - he's probably using Flash. This is something that should be made mandatory.. we have to come up with a basic format for stuff/tutorials like this. The member has to include complete information about his system specifications and softwares used on top of each article. Otherwise nowadays we're getting a whole bunch of posts like this which doesn't give you even the tinniest wingling of what software you're supposed to use.
  19. Yes, BW definitely means Bandwidth. It stands for the total amount of data that can flow in and out of your account every month. That includes, the amount of data that flows out when someone views your web-page or downloads a file from your site or even uploads something. In all these cases, the total amount of transfer is deducted from your monthly quota. BTW, salempc, it's not 500-3000GB but, 500-3000MB or in other words, 500MB - 3GB. Now, not in all cases, it is possible to provide every individual user with a total quota of 3000MB (3GB) - the host itself might not have that kind of bandwidth. So what is done is this 3GB bandwidth is alloted on a shared basis. The assumption is that NOT ALL USERS will be using the whole amount - some will use as little as 10-15 MB per month and some as high as 3GB per month. So the bandwidth that is not used by a lot of users generally, is alloted to those who use the most. This process is transparent , and you'd never realize it. In case some user intends to use the whole of it - he/she still can do it. There's no restriction on that. This doesn't mean that every user cannot use the whole amount if they wanted to - they surely can. On the other hand, at Asta what is being offered now is dedicated 3000MB bandwidth, i.e. 3GB BW is specifically reserved per month for each of our Hosted members.
  20. See this Credits System code is proprietary and non-open source because of several reasons. The routines involve a series of complex mathematical formulas which weighs out your content, topic title, over-all presentation, ratio of text : pictures etc. - if the code was made available for download one can easily analyze these routines and start making posts that would get you the maximum credits for the minimal effort or no effort at all. That in itself beats the whole purpose - as here the sole purpose is to increase the knowledgebase with good articles/tutorials/posts. That'd stop immediately if the routines are released publicly. Besides, leaving it out to the users to find some of it by chance has got more of a charm to it - more adventurous.
  21. Oh great.. it's like one blast after another.. non-stop. Sony's going to the dogs, completely. Isn't there any internet body which takes up such issues legally and forces the companies to comply with these OSS licenses ?
  22. See all these Ghost images are completely hardware specific - so in 99% cases ghost image for one system wouldn't work on another unless it has the exact same configuration. Problem is not with ghost, but Windows - which configures itself to a particular system by installing only those specific drivers needed for that system. That's why it's so difficult to run a ghost image on a different configuration. On the other hand, when I used to work on my univ. IT dept., I had the advantage of having all similar systems in each lab... So creating one set of images for each lab would do the trick real easy..
  23. Nope - that credits system is proprietary code written by the founder of the Xisto ring. Moreover the code contains all the in-house routines utilized for granting credits, which could be easily exploited if it was publicly known. So that is not available for download. However, you can find similar scripts at HotScripts.Com surely. All you'll have to do is make minor modifications to suit your purpose.
  24. - But that is the whole idea behind it - NOT TO BE ABLE TO decrypt passwords, the encryption process being just one-way. In almost any given scenario, you'll find the password being encrypted and stored the first time you enter it. From next time onwards, whenever you login, the newly entered password is again encrypted - the matched against the stored & encrytped form in the database. For security reasons password decryption routines are never built into the system. Why do you think, 99% of the web-based services (the more secure ones) never e-mail you your password, but instead ask you to set a new one when you forget your old one. SIMPLE - because your old password cannot be decrypted and mailed to you. Having a decryption system in place (even if it is not accessible to outsiders) opens up the doorway for a prodigal system administrator or some lesser mortal in the same office, to have a means to decrypt the passwords of other users and have some fun with 'em Take for example - even on Linux, a sysadmin cannot KNOW or FIND OUT what a user's password is. In case it is lost or forgotten, at best he can reset it to something that the user desires. The standard technique (one-way) is the most secure you can get, although you can use some other routine and not just a simple MD5 hash. If you're implementing this in your own application, you can easily use MySQL AES_ENCRYPT () function to store your passwords in an encrypted form (only constraint - the storage field in mysql has to be declared Binary). AES_ENCRYPT (Advanced Encryption Standard), however has a matching decryption function too - AES_DECRYPT - with which you can achieve what you're seeking to do... but this just serves to weaken the security mechanism - like a weak-link in the chain. Besides, to use either of these functions, you've to use a Secret Key - sort of a master password, which will be used to encrypt the stored passwords. You need to have this handy during decryption too..or else you can never get back the original pass. One idea, in case you want to implement this method, is to generate this secret key dynamically for each user based on some other stored data, say their name/address/phone/date of birth etc.. so each user will have a separate secret key, with which you encrypt/decrypt their passwords. Example: Some stored fields in the database: ============================ UserID????[/tab]????--> Some Autoincrementing ID maybe First_Name???? --> Joseph Last_Name????--> Somebody Phone????????--> 123456789 BirthDate????--> 10/12/1900 Password[tab]--> mypassword Once the user enters all the details (including a plain text password) in the web-form, I use a routine to: Take the middle two characters of the First_Name = se First and last character of Last_Name = Sy Last 3 digits of Phone = 789 First two digits of birthdate = 10 I get my secret key = seSy78910 Now I use this to call the AES_ENCRYPT function and encrypt my password and put it in the password field in the DB along with another INSERT instruction to store the rest of the data: INSERT INTO usertable ( First_Name, Last_Name, Phone, BirthDate ) VALUES ( '...', '...', '...', '......' ); UPDATE usertable SET Password = AES_ENCRYPT ( 'mypassword', 'seSy78910' ) WHERE UserID IN ( SELECT LAST_INSERT_ID FROM usertable ); There.. that statement should update the password field in your db with the encrypted form. By issuing these two statements together I can use the LAST_INSERT_ID to get the last inserted ID of the user (depends on the auto-incrementing field) and update the password. OR, You can issue both statements together in a single set of instructions, in this format: INSERT INTO usertable ( First_Name, Last_Name, Phone, BirthDate, Password ) VALUES ( '...', '...', '...', '......', AES_ENCRYPT ( 'mypassword', 'seSy78910' ) ); Since the key to encrypt is being dynamically generated using some string manipulation routine, it'll always be unique for each user and quite secure in a sense. Only thing that you'll have to safeguard is this Key Generating Mechanism. If this falls into someone else's hands he can decrypt anybody's passwords in your db. So use some pretty ingenuous and complicated routine to generate this key. Hope this will put you on the right track.. Regards, m^e
  25. You bet... and I was surprised at how many come in from MySpace.Com .. got so many pm-s like that soliciting me to go to some Cyber site. Why would one want to engage in cyber is way beyond me, though - when nothing can be "funner" than real life
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.