This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1701. |
Solve : Making A Window Inside A Window Larger And Stay That Size? |
|
Answer» I can make the window larger, just don't know how to save that size for future windows that come up in a window. Any HELP WOULD be GREAT!!!GENERALLY if you drag the outside of a window to the SIDE or up/down then close it, it will restart in that same size.. |
|
| 1702. |
Solve : Oldest thread? |
|
Answer» Is there any way to FIND out what the oldest still active thread is? Is it what you are listening to part III?Active thread? I don't know. But the oldest thread is the welcome to the forum thread. Active thread? I don't know. But the oldest thread is the welcome to the forum thread. Should of said non-sticky! Define active... Quote from: patio on August 30, 2009, 06:10:29 PM Define active... Still running within the one month limit.To my knowledge there is no method of quickly or easily finding this information.It would have to be manual. GOING through each topic in numerical ORDER by modifying the URL then checking the latest POSTS. |
|
| 1703. |
Solve : Backup type? |
|
Answer» plz EXPLAIN for me DIFFERENT between INCREMENTAL backup and differntial backup |
|
| 1704. |
Solve : Front Side Bus.....question? |
|
Answer» As an example, and I hope this question makes sense... It's a combination of FSB (memory clock speed) and CPU multiplier that equals CPU speed. http://www.youtube.com/watch?v=CTHRYDiYHQYQuote from: neelchauhan on August 31, 2009, 08:10:58 AM I asked Rodney Reynolds of 3dGameMan a similar question through E-mail. He sent me this: I was just confused as to what exactly memory dividers are and how there used...but I'm good now thanksI'm also not sure but I will overclock a Pentium II/III or a Celeron PC. |
|
| 1705. |
Solve : One internet connection, two computers? |
|
Answer» Question about privacy and use of two computers on one internet connection at HOME. Here's my current configuration: although unlikly it is possableWhat's the purpose of this post? Essentially what you are saying is: "I don't know but I want to post something, so I'll just post whatever comes to mind. But remember, I don't know what I'm talking about." Quote What's the purpose of this post? Essentially what you are saying is: "I don't know but I want to post something, so I'll just post whatever comes to mind. But remember, I don't know what I'm talking about." This sounds like a job for me! I am looking for work where somebody will pay me money to work at home and I don't have to know what I am doing. How did you ever get a job like that? It has been years since I had one of those. As to your question, you are risking your job it you use your company resources for any personal use unless you have written permission. Thanks for the reply. I'm not using the company's computer for personal use and it's my internet connection thru my carrier. I'm worried more about privacy and whether or not the VPN connection thru my company computer logs internet activity from my wireless connection on my personal computer. Hope that clarifies things... Quote from: ADG on August 31, 2009, 01:15:32 PM What's the purpose of this post? Essentially what you are saying is: "I don't know but I want to post something, so I'll just post whatever comes to mind. But remember, I don't know what I'm talking about."i did that so salmon trout wouldnt throw a fitKnock it off smeeze... |
|
| 1706. |
Solve : Universal Messenger? |
|
Answer» Hey all, It doesn't hurt to regularly scan thumb drives with your protection apps...doesn't take long/ I scanned the pen drive but AVG detected nothing at all. Once I installed the files then AVG resident shield started detecting stuff. Thanks . Quote Works great for me, definitely uses less RAM etc than others I've tried and it's got all the features I need. I read somewhere that Pidgin uses up different RAM on different systems. Is that true? Quote from: Ivy on August 31, 2009, 07:47:29 AM I read somewhere that Pidgin uses up different RAM on different systems.I can't say for sure, it does depend how many plugins you enable and so on. I've seen mine use from 10MB to 30MB, depending on how many chat windows I have open at the time. Quote I scanned the pen drive but AVG detected nothing at all. AVG...or most all Anti-Virus apps are not designed to detect rootkits... I Use This Tool...Oh, So it depends on the plugins. I see, thanks Calum. |
|
| 1707. |
Solve : Real Time Clock? |
|
Answer» I have a Compaq Evo N610c Laptop. The CLOCK that is located in the lower right CORNER will not maintain the time and date. We have to update it everytime we TURN on the computer. I looked in the manual and located the battery to change it. The manual also STATED what type is needed. When I locate the battery, it was a different number than what was in the manual. I was not able to locate the battery number that the manual stated to use, but purchased the same battery that was in there. It still does not maintain the date and time as realtime. Do I need to get the correct battery that is listed in the manual? The battery that operates the laptop is good and will maintain a charge for several hours. Is there another battery some where to change? Or is there a setting that I have to do to maintain a real time date and time? I am looking for any SUGGESTIONS. Let me know if any additional information is needed to answer this question. maybe some of the info. here will help: |
|
| 1708. |
Solve : What's your wallpaper?? |
|
Answer» I thought it would be INTERESTING to see what some of you have for wallpaper. Quite like yours though Quantos. AlienWare has a utility that lets you generate your own wallpaper from some of the material they have, that's what I did. The ALIEN doesn't usually have novas for eyes. You can do some really cool stuff with that little utility.What I'm using at the moment. [attachment deleted by admin]Yeah like that one quaxo.Nice one quaxo.This is mine, made it in photoshop a year or so ago. I had to scale it from 1440x900 to 900x900 so it'd fit. Man this thing is stupid, tells me I can't upload because its 733KB instead of 700, then tells me that its already posted after I resized it. GAH! [attachment deleted by admin]this is mine. just a little reminder [attachment deleted by admin] |
|
| 1709. |
Solve : Am I Getting Free Internet? ? ?? |
|
Answer» O... K... ..... I had to call IDT, my former phone company, to tell them to turn off my internet service - my butterfly-icon Explorer that I had through their partnership with Verizon. (I just SWITCHED my phone service to Verizon, but the internet service didn't tranfer automatically.) It has to be off for about 3 days so that it's totally out of Verizon's computer system before they can turn on my internet service as one of their CUSTOMERS directly. I know that it's off because after I LOGGED out, about an hour or so later I tried to log in and I got a popup message saying the account is no longer in effect, and if I click OK the internet connection will close immediately, otherwise it will disconnect automatically in 5 minutes. I found I could shift the message over and get my 5 minutes of what I presume is free service, since the account is closed. I found I could open the window again and get another 5 minutes. Then, while I had butterfly-icon Explorer open I tried opening big-blue E Explorer. It took a while to open, but before it was fully open I was able to search a few sites, and then I chose to log off. It's about 8 hours later. This time I opened big blue e without butterfly icon. This wouldn't work before because I had to have butterfly icon open first. Now it opens without butterfly, BUT WHO IS PAYING FOR THIS SERVICE ? ? ? Am I going to get some whopping big bill from somebody? Who would that be? I don't have internet service through IDT anymore, my phone number is through Verizon, and I don't have internet service through them yet.sounds like they made a mistake Do you connect with a wireless connection? If so, you're probably getting an Internet connection via an unsecured wireless router in some nearby residence or business. No. I have the Verizon modem that was sent to me when I signed up for Verizon's internet partnership with IDT phone service. I'm guessing there's nothing special about the modem, just that it has Verizon's name on it. If I don't physically plug into the phone jack I have no service. (Any time I've ever looked at what wireless connections are near me, even the ones that say unsecured and are at full peak bars, I can't connect to them. The only time I got on line WIRELESSLY was when I first got my computer and had AOL as a provider, I took the laptop to another room and realized I was online before I'd even plugged in to the wall.) well i would say enjoy the loop hole. they probably forgot to physically disconnect your service. But be prepared for a bill as well...enjoy while it last but be sure to report it. I am thinking of the billing... LOL! I got same issue with my telephone (no internet) I told them to disconnect it but did not cut it until they I did not paid if for a month. Funny part is they are asking me to pay the last month of service that they are supposed to disconnect it. |
|
| 1710. |
Solve : Stupid clear sky? |
|
Answer» Hello guys..Ineed help man!!I installed Stalker clear sky and applied the patch v1.5.03 then v1.5.07 on it.Then i put some MODS and fired up the game.(NOTE:I tested it before i put the mods.)
the CPP file is the name of the source code file, on the DEVELOPERS machines, that caused the assertion. from the sounds of it they put a check in to prevent loading an inventory item that weight less then 0, and your mod is trying to create one that does.Hey guys problem fixed!! :)Actually it was because i modded the LR300 to be levitating (-50 instead of 3.7) hehe sorry guys and thanks for the help.i know this is off topic but i hate assert() i hate it when people use it and i never use it instead of the program trying to resolve the error or telling what caused the error it just says assert failed on line xxx in file xxx Quote from: smeezekitty on August 26, 2009, 08:41:21 PM i know this is off topic but you need to learn what an assertion is. it's saying- "this is definitely true" however it would be kinda rare to find a good instance of it- except maybe, for constants or something. In this case they should have just set the weight to a valid value instead of basically crashing. On the other hand, a Assert dialog provides the file, line, etc in the source- which a GPF dialog won't do.but it doesnt say waht caused the assert so if your not the developer then your kind of screwedIt's more a debugging tool for situations that cannot be rectified. |
|
| 1711. |
Solve : When playing games my computer shuts down? |
|
Answer» When I am playing games my computer shuts down. I have been told I may require a better power supply. Currently I have a 650W power supply. Any Ideas and what other info can I provide?For most machines that should be sufficient...unless it's one of those cheap 20 Dollar models. |
|
| 1712. |
Solve : Help any 1 ?? |
|
Answer» Ok, so I had this game called Midnight Pool on my phone (version 1.0) and I accidently deleted it, it was a demo. So if any one can tell me where to find the game (the demo) it would be of great help.Google's working really good today...I don't really care if google is working really good today or not. And if you didn't notice I said Midnight Pool not Midnight Pool 2, I also mentioned that im looking for the demo.Well excuse the heck outta me... I don't really care if google is working really good today or not. And if you didn't notice I said Midnight Pool not Midnight Pool 2, I also mentioned that im looking for the demo.Well then try Bing...That's working too, believe it or not. We'd appreciate you not having that attitude here either.Perhaps your phone's service provider can tell you how to get the demo. They'll probably WANT you to buy the full version.Of course it would greatly help if you were to tell us what phone and service provider you are using. Just saying the game was for you phone is about like saying you need an oil filter for your car but not telling what model car or engine size it is and expecting us to just know.Sorry for being moody (wasn't well at that time =D) well size would be 128x160, tried calling my services provider no help. Quote from: Redcaa on August 28, 2009, 12:48:13 PM Sorry for being moody (wasn't well at that time =D) well size would be 128x160, tried calling my services provider no help. tell us what your service provider and phone model are and maybe we could find it for you! Quote from: Redcaa on August 28, 2009, 12:48:13 PM well size would be 128x160, Now don't bite my head off but... what does that mean? Quote from: Mulreay on August 28, 2009, 04:22:17 PM Now don't bite my head off but... what does that mean?well i guess hes trying to tell us the screen resolution for his phone , dont know what good that'll do |
|
| 1713. |
Solve : air card and virus? |
|
Answer» I just purchased a Verizon air card for broad band connection. |
|
| 1714. |
Solve : New to the board..? |
|
Answer» Hope I can help with my limited knowledge. The dealership I work at has a nice setup..since when is a mess of wires nice setup? but anyway welcome Sesko Quote Hope I can help with my limited knowledge.its not as hard as it sounds Quote from: smeezekitty on August 27, 2009, 03:15:59 PM since when is a mess of wires nice setup? I took over with it in that condition, I have since replaced some but not all of the wires. I'm not the best at WIRING but I'm trying my best to get there. Quote from: smeezekitty on August 27, 2009, 03:15:59 PM since when is a mess of wires nice setup?well i think he meant it in a sarcastic way =) but welcome and all knowledge helps (even limited)!!!I'm trying to learn about SQL injection and Vbulletin, I recently took over a WEBSITE for a friend and their Vbulletin was illegal. We just bought a legal version but and busy reading how to connect the 2. For the SQL, I play an online game and a while back one of the admins told me that if I could learn to inject SQL data, I could do anything I wanted on the game. So I've been reading up on that as well. Any experts with time and patience, I would love to hear from ya. But with all things, I look foward to learning all I can and experiencing anything I come across. Quote I'm trying to learn about SQL injection and Vbulletin, I recently took over a website for a friend and their Vbulletin was illegal. We just bought a legal version but and busy reading how to connect the 2. For the SQL, I play an online game and a while back one of the admins told me that if I could learn to inject SQL data, I could do anything I wanted on the game. So I've been reading up on that as well. Any experts with time and patience, I would love to hear from ya.Presuming you'll put it to good use, PM me for links. Hacking a game would be one "not-so-good" use, BTW. |
|
| 1715. |
Solve : how to make a shoutbox?? |
|
Answer» hello GUYZ.. i'm juz new hir.. want to ask if how to a shoutbox? wat is the html code for it.. juz like wat we SEE on fs... plz HELP me..1) There is a Web design forum. 2) HTML ALONE cannot create a shoutbox. 3) Stop sounding so demanding.And speak (or type) in an UNDERSTANDABLE language. (English is used the most here here) What is "fs"? Grammar would be nice too: Quote from: sasori on August 26, 2009, 10:08:52 PM want to ask if how to a shoutbox? And you can easily get a good shoutbox by doing a single search on google. Searching "free shoutbox" will bring up huge amounts of links. |
|
| 1716. |
Solve : XP OS? |
|
Answer» I'm using a DELL Dimension 8400. The sound card, Sound Blaster Audigy 2 was PUTTING out sound, but suddenly quit. The ethernet is not working. Sometimes when I try to reboot, I have to UNPLUG all USB devices, boot then plug back in the devices. |
|
| 1717. |
Solve : ssids? |
|
Answer» Post your wireless INTERNET ssid i have mine running unsecure Well, there's a good idea. D-Link Extreme-N DIR655, SSID: "GIGAROUTER" USING WPA2. Quote from: BC_Programmer on August 24, 2009, 04:18:12 AM D-Link Extreme-N DIR655, SSID: "GIGAROUTER" using WPA2. HAAA! Now I'm going to go to your home town and find your AP and break in Anyway, I used "CountChocula104" for a while (yes the cereal), but then I switched it because I ended up broadcasting it for a little while and I don't want people in my area to know what it is, even though I was using WPA2... aww come on, you guys have BORING ssidswell GUESS what. computeruler.... My SSID can beat up your SSID .....any day of the week why have the routers fight when I could just punch you in the face. to do otherwise would be a bit nerdy. Oh, wait, nevermind then. lets just face it....We're all nerds ...and we'll never get any chicks ....except maybe the Omega Moos from "Revenge of the Nerds" Quote from: block_head on August 24, 2009, 11:55:18 PM lets just face it....We're all nerdsi agree Quote from: block_head on August 24, 2009, 11:55:18 PM ...and we'll never get any chicksnever say never Quote from: block_head on August 24, 2009, 11:55:18 PM lets just face it....We're all nerds you wanna tell my modem that Quote the Omega Moos Heifers? |
|
| 1718. |
Solve : My Computer Doesn't Start Properly :S? |
|
Answer» Hello |
|
| 1719. |
Solve : Computer Repair Business Book? |
|
Answer» I got an email from a company trying to sell a book to help start a computer repair business (namely spyware and virus removal). They want $50.00 for the ebook. I do want to GET into the business and am studying to get there. Any comments on a book like this - helpful or ripoff?i really dont know but a mysterious email SOUNDS fishy |
|
| 1720. |
Solve : Where can I get more voices?? |
| Answer» | |
| 1721. |
Solve : HELP Screen Problems? |
|
Answer» Okay, i own a HP pavilion dv9702ea laptop. |
|
| 1722. |
Solve : Wii Connection Issue? |
|
Answer» We just got a dsl router an I'm attempting to setup the WII to see it. Thing is that it does but its not takeing the WEP keyIf it's a new router why don't you try using WPA, it's more secure than WEP.I figured you WOULD show, figured that I wasnt giveing it the right thing sorry. Quote from: squall_01 on August 23, 2009, 03:09:49 PM I figured you would show, figured that I wasnt giveing it the right thing sorry. Don't apologize, I'm just asking why you don't try WPA.cause I cant, it maybe possible but I dont knowDo you have the manual for the router? If not post the make and model and I'll see what I can find.yes, but by default that is what it came with it probably could be changed.Then just read the manual and see what it says about WPA. Many new routers will support WPA, but depending on the firmware that they are running will default to WEP.I dont KNOW its from embarqDo you have the manual that it came with?yeah Then check the manual to see what it says about WPA.it probably will allow me, just that its all setup now.So it's all working fine now? The Wii will see it and access it?*SIGH* |
|
| 1723. |
Solve : HELP!!!Smart Board and Desktop Monitor? |
|
Answer» I am setting up a SMART board in my classroom. I am GETTING the image of my desktop onto the board through the projector but I am not able to get that same image to remain on my desktop. I have an adaptor to allow both the LCD connector and the COMPUTER connector to be connected to the monitor, I just can't get the image of the desktop to DISPLAY simultaneously with the image on the smart board. I know it's probably really simple but I just can't figure it out. |
|
| 1724. |
Solve : hp pavilian a6300f help? |
|
Answer» i am haveing problems with my hp a6300f it was working fine but a mother board update download came up and i turn my computer off on mistake and now when i turn it on all it does is beep and the computer dont boot up and the windows dont start up so i was wondering if anybody had the same problem would know what wrong with it and how it can be fixedDo you mean windows update? texicanz i have the exact same problem, were you able to fix it? if so how? hey i bought another foxconn motherboard the same brand this hp came with and it work for awhile and did the same thing i am guessin the foxconn motherboard sucks so i am gonna try a GIGABYTE GA-73PVM-S2H motherboard and i am really startin to hate hp computers nowHow long did you have that new motherboard before it went out? It could be your power supply. Did you use the same one? What is the wattage of your psu? It could also be the monitor. Do you have another one that you can try? Quote from: JJ 3000 on December 23, 2008, 07:56:57 PM How long did you have that new motherboard before it went out?the power supply is new and the new one did not even last a month and i read other people problem with these motherboards sayin the bios chips on them suckI'm having the same problem and from what everyone has written, I know it's the motherboard that is fried. I was hoping it was only the video card that was fried, but I replaced it, and still nothing. I suggest that everyone replace the power supply-- I've owned two Pavillions and both have had faulty power supplies-- and the motherboard. |
|
| 1725. |
Solve : reboot and select proper boot device, insert boot media in selected boot device?? |
|
Answer» i am a confused little monkey at this point. ive just put my first build together and when i start it up it goes in to BIOS but INSTEAD of getting the menu options that i have been led to BELIEVE i am supposed to have i get the error message, "REBOOT and select proper boot device, insert boot MEDIA in selected boot device and press a key". so i rebooted inserted my mother board support disc and the same thing happend, i unplugged my other disc drive and made shore that the one that was still plugged in was the master and i still got the same unresponsive message. anyone have any ideas?How are you going into the BIOS? |
|
| 1726. |
Solve : XP Voice Logon Authenaction? |
|
Answer» TRIED USEING google too look for a way to use voice regconition to sign in to my user name from the XP logon screen but I didnt come up with anything. Are there any good free app's that will work?Speech Recognition with Windows XP yes but can I use it too get it to logon to my username?Don't know but I doubt it. thats what I figured that you would sayTry it and see. Blind people use computers too.If you are already logged on and use the 'Switch User' option to log off with then it might work granted you aren't password protected. Without being logged on the drivers necessary to use the recognition software I don't think are loaded.Yeah, that's entirely true. He still won't know until he tries it though. The blind people that I know use a program through the CNIB called Dragon, and is very expensive. |
|
| 1727. |
Solve : BANNED FROM MIBBIT FOR NO REASON? |
|
Answer» i was BANNED from mibbit for asking why i was banned from the #help channelAre you using a CGA screen? Mibbit doesn't support users of CGA.no IM server banned from everything ... for no reasonMaybe somebody in your IP address range was using a CGA screen. those CGA users, they are ever so crafty, so Mibbit tries not to let them join. It might have been just one of those crafty CGA users that was in your neighborhood and they just tired of them and banned their entire hostmask.i got z lined for complaining about ops and how they banned me for no reasonSo.....what do you want us to do?i really just want to TALK to a mibbit admin ... not an op so i can get this straightened up Well then wait for a reply. That's about all you can do. |
|
| 1728. |
Solve : Motion Detection App For Logitech Cam? |
|
Answer» I'm looking for there app SINCE they removed it to capture video with there camerac's. Thing is that it seems LIKE they only have a version for vista.Google this too?I DONT that I will find it. I dont think that it will find it, dont really knowWhy, have you not got time?Too busy for google...also if you find it for me i won't try it because i have alot going on and such...no just dont think that it will find it. If its there.http://www.simplehelp.net/2006/09/27/how-to-use-your-pc-and-webcam-as-a-motion-detecting-and-recording-security-camera/I suppose that will work then, I'll have too LOOK at it later have to go sortly. Quote from: Squall_01 I'll have too look at it later have to go sortly. Patio, is there an echo in here?It's a big big section...so yes. Quote from: Carbon Dudeoxide on August 25, 2009, 04:56:28 AM Patio, is there an echo in here? thats just you for some REASON |
|
| 1729. |
Solve : Turn off computer during thunderstorms?? |
|
Answer» Hello folks, Hello folks, ALWAYS disconnect any electronics from the power system during a lightning storm. If they are worth worrying about, then they are worth disconnecting. The lightning doesn't have to do damage to the power circuitry itself, and very few surge protectors are effective against a ground spike.Back in the day, I lost a computer from lightning. I was in the habit of shutting off my computer during thunderstorms, and naturally, I had it running from a surge protector, so I thought I was safe. What I had not realized at the time, was that my dial-up internet connection, which had a phone-line going straight from the wall jack to the computer, did not go through a surge protector, and was therefore an easy target, so to speak. Sure enough, lightning struck a telephone pole, which sent a surge right through the phone line and killed the computer, with nothing but a small black scorchmark on the end of the phone-line to hint at what had happened. Having the computer flicker on and off with your lights is certainly not a good thing, so I'd reccommend shutting it off and making sure *all* possible routes to your computer are protected. However, this is one of those "Do as I say, not as I do" situations, as I stopped proper safety procedures long ago, and don't let the storms change my activities You guy's are really unlucky! We used to have a cottage in the Ottawa valley (famous for its severe thunder storms). During one of these storms we saw sparks jumping out of the poweroutlets. Not to create paranoia, but it is a good idea to unplug the powersupply from the wall outlets to your electronics including telephone and cable during a bad thunderstorm. Sandra: A LOT depends on the electrical service where you live. In my former living location, power outages were rare, even during storms. I rarely worried about shutting down systems which were in use. Where I live now, outages due to weather are more frequent, and I will at least power down the system if I think the power is going to go out. Lightning strikes and surges do happen. I probably don't worry about those as much as I should.If one is to learn from experience the best kind is the experience of others.That being said not long before we had our 1st computer (an Apple 2e) we had a close by lightening strike during a thunderstorm. Every single electrical devise that had a filament in it (on or not) had that filament destroyed. Ever since then when we know a thunderstorm is approaching we UNPLUG everything we can that we want to protect. Sure it may NEVER happen again (lightening NEVER strikes twice) But!!!!!!!!!! truenorthNo, you're right, True. It's a good precautionary measure to take -- especially when so much might be PLUGGED into a power strip, and removing one plug can protect several devices. Quote from: Mulreay on August 21, 2009, 07:49:07 AM You guy's are really unlucky! Not unlucky...just reality. Lost 3 machines over the years to TStorms... Quote from: truenorth on August 21, 2009, 02:50:46 PM lightening NEVER strikes twiceextreamly unlikely but impossable to be neverIf you use dial-up, then you should un-plug the cord from the wall.No matter what type of connection you have the power and any network connection should be unplugged... |
|
| 1730. |
Solve : Why does my computer have trouble waking up from its sleep?? |
|
Answer» Hello, I'm not a big fan of Sleep or Hibernate. Microsoft never really perfected either and while they work fine for some folks, others have nothing but trouble with them. I prefer to set the display and HD to power down after a defined period of time. Always works like a charm. Agreed. The power saving FEATURES work fine on laptops, but they are made for it. Desktops, however, rarely ever like the powersaving features. You can turn off the display, but I wouldn't use any others on a desktop if my life depended on it.I'm sure that can't be the problem, I mean, my laptop is on a balanced power setting (recommended) :s |
|
| 1731. |
Solve : sorry if this is in the wrong place but can somebody please help me? |
|
Answer» okay so i was looking at my hotmail and my kittie jumped on the keyboard and when she did it made all the letters go SUPER tiny and small and i can't figure out how to get it BACK to normal so can somebody please tell me what to do |
|
| 1732. |
Solve : 7 crimes with a fine smaller then file sharing? |
|
Answer» This is unbelievable! hinking about file-sharing? Don't. You'll get fined, and crime doesn't pay (unless you rob banks and/or armored cars, then it pays very well). Take it from Jammie Thomas, who was fined $2 million for downloading 24 songs, or anyone else who tried to fight the RIAA.holy $### thats insane"File Sharing" strictly speaking is not the same as using a Torrent. Not many people realize that almost all File sharing networks, Such as those employed by limewire- are seeded heavily with files whose downloading is strictly monitored. this is how they catch ya. Not to say that torrents don't have similar issues, but the think is with a torrent it's a many to many uploader-downloader relationship, whereas with file sharing networks it's almost always one uploader, many downloaders. If one was to download music from a torrent, even if one of the seeders was strictly monitored, the best they could do is prove that you MIGHT have downloaded portions of the file- those portions that were uploaded to you by the "monitored" seeder. Additionally some seeders of this form try to corrupt the download... which fails MISERABLY and simply results in that seeder being ignored for future REQUESTS. |
|
| 1733. |
Solve : Defragment problems? |
|
Answer» I have an HP DeskTop PC. Defragment was never a problem until now. Now when I try to defrag a window pops up and reads Disk Defragmenter has detected that Chkdsk is scheduled to run on volume: HP_PAVILION (C:). Please run Chkdsk/f. Never seen this before and haven't a clue what Chkdsk/f is. Can anyone help me. ThanksGo ahead and run Chkdsk/fApparently, you did not visit the link I posted and follow the procedure there. Quote from: Longghairr on August 19, 2009, 09:57:26 AM Don't KNOW where to find it. Search CANT find it http://www.ehow.com/how_2052292_run-chkdsk-f-windows-xp.html --> Read the information provided by this link (which Soybean already provided earlier). chkdsk/f is NOT a file that you can search for in windows. It is a command that tells windows to check the hard drive for any errors if they exist, and attempt to do fix on them.Glad you are fixed up and stop by anytime !Someone's in a bad mood.... Patio was just being courteous.Longghairr, patio meant nothing personal with the Pay Attention mark. It's in all his posts. If you look closely, you'll see a thin HORIZONTAL liine above it. That line separates the "Signature" block from the main part of a post. Many forum members have some image and/or quote or saying in their Signature. The content for a Signature can be entered by accessing your forum profile. Wow.and i thought i had an ATTITUDE Quote Have fun on me, but PLEASE never Email me again!!!Just to clarify something (and possibly email you again), we (the members) are not actually emailing you. You obviously checked the "Notify me of replies" BOX when creating the topic, so it's not our fault you're receiving emails.You could always uncheck "Notify me of replies".... click the notify button at the top of the post then press ok and you will not get any more emailsThis has got to be the most entertaining thread I have ever seen.... Click to remove your notifications. Topic Closed. |
|
| 1734. |
Solve : fujitsu splash screen? |
|
Answer» Hi, ive been searching the INTERNET for a week now and i CANT find a solution to my problem. |
|
| 1735. |
Solve : External Hard Drive Suggestions?? |
|
Answer» I'm gonna buy a 500GB external hard drive this weekend, any suggestions on a good QUALITY drive? The last one I used didnt even last a year before it died... I'm gonna buy a 500GB external hard drive this weekend, any suggestions on a good quality drive? The last one I used didnt even last a year before it died... If your computer can handle it go with eSATA. Otherwise an addon card isn't that expensive, and the speed difference is worth it.I've had success with Maxtor external drives. They seem to be reliable and are fairly priced. |
|
| 1736. |
Solve : LED versus incandescent bulb? |
|
Answer» Does a LED giving the same AMOUNT of LIGHT as an incandescent BULB draw the same amount of current or is it LESS? |
|
| 1737. |
Solve : CANNOT REMOVE A FOLDER OFF MY DESKTOP? |
|
Answer» I'm not sure if this is where I am supposed to post this but I'm going insane trying to figure out what this means exactly. Be careful with registry cleaning, I wouldn't touch registry if it is not giving problems, as deleting wrong registry key can render previously usable computer unusable. THANK you for the suggestion 2x3i5, I really appreciate it! Unfortunately I tried to refresh it and it is still on my desktop. I am truly stumped at this situation. Are there any other suggestions you might have that I could try??? blockHEAD: Thanks for the link! I would like to see if there is any other way that can be less risky in losing important parts/functions of my computer before doing any registry cleaning, but I will keep an open mind to the option. THANKS AGAIN FOR ANY HELP! There's not a lot of risk using that program, although some would disagree...I use it all the time....If you are afraid of it corrupting your system, create a restore point manually before you use it and if something goes wrong, just roll back to the restore point The program is relatively SIMPLE to use...You can use it to back up and restore your registry as well...Boot off a live Linux CD; find the file; delete. Simple. :-) Instructions can be given if needed.What's the folder name? What options do you have, when you right click on it? |
|
| 1738. |
Solve : What type of PC do you prefer.? |
|
Answer» Off the shelf - You walk into best buy and say gimme that one. Although I haven't built myself a PC yet, I prefer "self made" How can you say that if you haven't gone through all of the trouble and toil involved in building the machine and then setting up the software? It can be very time consuming and aggravating. Sometimes it's just easier to let someone else handle all of that grunt work. By the way, I prefer to build my own The work is most of the fun though |
|
| 1739. |
Solve : not sure what is wrong? |
|
Answer» hi, i'm new here and having computer issues! |
|
| 1740. |
Solve : Recommended printer for college student? |
|
Answer» My son is leaving for college this fall and I wanted to get him a simple printer that can scan and copy. Any SUGGESTIONS? He recently got a laptop Dell STUDIO 15. |
|
| 1741. |
Solve : eMail outbox on CH forum? |
|
Answer» I can't SEE any of my outgoing mail (that I've sent). Is this how it is with EVERYONE's account or am I just special... By this, I'm guessing you mean Private Messages. There is an option for saving outgoing messages in your profile options. .it's not like I'm jealous, or anything... ) Noted |
|
| 1742. |
Solve : Differences.? |
|
Answer» Whats the difference between a Virus and a Worm and Malware etc etc and any other I may have forgotten. Malware, a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent.More info, including definitions of all malware forms, there.OK So malware pretty much covers the spectrum. Got it so far and I have an "IDEA" as to the others but figured I'd get it from the horses mouth so to speak. So to go a step further what are the differences between the underlings.Did you read the link? It describes those differences. Quote viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, crimewareAll the above are clickable links leading to appropriate definitions.More of simple definitions: http://www.norman.com/security_center/malware_types/enJust to have it in one place...... Adware Adware is software that enables displaying banner advertisements when the program is running. Adware may register your Internet behaviour, and is often mentioned in connection with Spyware, because both may register and report user information to a third party. Backdoor A program that installs itself in such a way that the infected computer can be accessed and controlled remotely. Bot / Botnet Several high profile web pages have been victims of so-called Distributed Denial of Service (DDoS) attacks. These assaults have been carried out by a set of bot (robot) computers that simultaneously send lots of requests to a special computer or a certain network. The amount of data is so huge that the computer(s) under attack are unable to handle the load, and are thereby rendered inaccessable for their intended, legitimate tasks. The users of the computers that are parts of such an attack, are often unaware of this fact - thus the computers are often called zombie computers. The person that control the attack - "the brain behind" - is located elsewhere and just presses a key to initiate the attack. Computers that are part of a network, which itself is controlled by a robot, is often called a botnet. Greyware The term greyware is used for software that may be viewed as useful in some instances, but which also includes component(s) that may be seen as malicious or annoying in other contexts. Hoax From time to time there are virus alerts which turn out to be false alarms. Several of these are rumors saying that by opening an e-mail with a particular subject you are infected. Some also states that by opening a particular attachment to an e-mail INFECTS your PC. Quite many such virus hoaxes or myths exist. Among the most famous are The Irina virus, The Deeyenda virus, Good Times, Win a holiday, The California virus (aka Wobbler) and so on. Such a myth may say that if you open an email with e.g. the subject "Good Times" your PC's files will be deleted. Email programs can be used to send attachments to an email message. Such attachments may be binary files (program files) or documents. By opening such an attachment without checking for virus by an updated virus control program, you are at the same risk as if you run any program or open any document without virus checking. This is in fact one of the most common ways to be infected by a malicious program. You should always use an updated version of Norman's antivirus products to check the file before running the attachment. Virus hoaxes often have these characteristics: * Several exclamation marks in the Subject field. * A lot of exclamation marks and capital letters in the body of the email. * Claims that the message originated from a well-known company (IBM, Microsoft etc.), thereby trying to make the message more reliable. * Warnings that you should not open an email with a special subject or an attachment with a special name. * It urges you to forward the email immediately to friends, colleagues and business associates to warn these. For a more complete explanation and list of virus hoaxes, see www.vmyths.org Image spam Spam using images as all or parts of the text. Intended An attempt to create a malicious program. However, due to programming error(s) the malware does not function (as intended). Keylogger Keyloggers are normally used as spyware. They are programs, which log the keys pressed on a keyboard and send this to a third party through a communication channel. Keyloggers may be used e.g. for stealing passwords. Rootkit Rootkits are software used to hide files, running processes, Registry entries, or other kinds of data. Although a rootkit may be used for legitimate purposes, it is a fact that this technology is often used by authors of malicious software to hide the malware they try to distribute. Spam Spam is not malicious software in its pure sence. Spam is unsolicited information, and may perhaps be called "nuisanceware". The most common channel for SPAM is email, although any communication channel may be used (web, Instant messaging etc.). It is estimated that email-based SPAM constitutes far more than 50% of all email traffic through the Internet. The spammers use different techniques to attempt to avoid the spam to be DETECTED by antispam software, e.g. using images as all or parts of the text (image spam). Pharming Pharming is a sophisticated, special form for phishing. The PHARMERS utilize the DNS system; i.e. the system on the Internet that translates a computer name to an Internet Protocol address (IP address). The pharmers attempt to change the host name to another IP address than the real legitimate address. This enables the pharmer to e.g set up a web page that looks like a bank's web page, and thereby collect lots of personal information. Another (older) word for pharming is DNS poisoning. Phishing The word phishing is derived from fishing. It is used to DECRIBE attacks where someone attempts to get your personal information, like passwords, credit card numbers, bank account numbers etc. Fake (spoofed) emails that without closer inspection seem to originate from legitimate organizations and corporations are typical tools for the phishers. These emails try to trick you into believing that you get a real request from your bank or a similar corporation, in order for you to release private information to the person with malicious intent. The phishers are often hard to track down, and may also operate from countries where the legislation system does not prohibit this kind of activity. Proof of Concept A program written to show that a particular technique is possible to use. These type of malware usually contains deliberate omissions and/or non-functional part of program code, so that a functional malware is not created. Ransomware This term is used for those instances when a malicious program encrypts files on a computer, and (usually) leaves a message that a certain ransom has to be PAID for the decryption key to be disclosed. Ransomware is usually distributed as email attachments. The encryption process is executed when the attachment is opened. Spyware Spyware is programs that collect information about a person or an organization without that entity's consent and awareness. Users are often installing spyware without being aware of it; either by downloading something presumed to be useful, or by selecting/clicking something in a pop-up window. Trojan A trojan or trojan horse is a program that seems to be genuine and even useful, and thereby tricks the users to install/use it. When the program is run however, it will perform other (often additional) actions, like setting up backdoors so that hackers may access your computer. Virus A computer virus is designed to copy itself and propagate from one computer file to another, usually by attaching itself to program files. When the infected program is run it may infect other files. Human intervention is necessary for a virus to spread between computers and systems. This may be accomplished by e.g. downloading files, exchange of diskettes/CDs/DVDs, copying files to and from file servers, and sending infected email attachments. Vishing This is a special kind of Phishing where Voice over IP (VoIP) is used as the communication channel instead of the more usual email technique. The term "vishing" is derived from VoIP and phishing. Worm A worm will infect other computers. A network worm will also spread automatically in a network and is independent on human interaction. Thus, worms are faster spreaders than viruses. Normally worms will neither delete nor change files. However, they may be loaded into computer memory, and thereby result in slower computer performance. Much appreciated. Quote from: MP1975 on June 17, 2009, 10:33:42 PM figured I'd get it from the horses mouth so to speak. Oh, so we're horses now, are we? horses are wise animals I'm more like the back end of the horse... meaning you kick a** like a horse does to some people, or you are the a**? Nice attempt at a save, there, blockHEAD, but I'm reminded of the old story where a famous Hollywood director was filming an old time stage show, with a two person horse costume. The director was told he'd need two people for the horse costume. He asked, "Where are we gong to find someone for the front end of the horse?" oh, I see my bad |
|
| 1743. |
Solve : cool backrounds? |
|
Answer» Just post some cool backrounds here. They can be from any site and any resolution Hey, I haven't noticed that.. Could this be it? Nope. That's not it...Hahaha! I think so too.. |
|
| 1744. |
Solve : Cell phone question? |
|
Answer» Hey everyone, |
|
| 1745. |
Solve : Fable 2 xbox 360? |
| Answer» WOULD somebody be so KIND as to COPY and paste fable 2 stragidy guild for me? you can properly find at cheatcc.com or gamewinners.com. I would but here at WORK they have locks on certain web pages.. thanks in advance Cant you do it when you GET home?that's a negative... I just moved, i have to wait a week for them to come and install cable/phone/internet etc | |
| 1746. |
Solve : Recovery D showing red? |
|
Answer» Would anyone KNOW what I should do when my Recovery disk drive is showing red instead of blue? I clicked on My Computer and just saw it. Someone said it could be to do with software I installed, so I uninstalled it, but it stills shows red.Is SYSTEM Restore turned on for your recovery partition? If so turn it off. The partition will show in red if the available space drops below 1GB.Thanks Dusty well the free space is 700MB but I don't know how to do what you suggest. How would I find out if System Restore is turned on for the recovery partition? Sorry, but I'm not sure, I've looked in the properties but can't see anything for system restore.Here is how to access System Restore in Vista. |
|
| 1747. |
Solve : Downloads - What's Best? |
|
Answer» Hi |
|
| 1748. |
Solve : myspace questions?? |
|
Answer» okay, I wondered how you COULD put images on too your page from your pc. Like SAVED ones I know the code an everything just not sure how to do that. Also, how do you get a MUSIC player on there? Quote from: squall_01 on June 16, 2009, 06:19:14 AM okay, I wondered how you could put images on too your page from your pc. Like saved ones I know the code an everything just not sure how to do that. Also, how do you get a music player on there? Use a image hosting site like tinypic.com or imageshack.com. A doesn't myspace already have a music player you can use? If not you can use the one from EZ Tracks.com or make your own. Not to be a rude or ANYTHING but doesn't this seem trivial compared to your computing experience? that it is but ever site has its own RULES an shorcuts of doing things. Which changes to what you can an cant do. Its like software. |
|
| 1749. |
Solve : hyperlinks, tags, atrributes ect ect? |
|
Answer» what is the default alignment attribute VALUE for horizontal lines? |
|
| 1750. |
Solve : CD-R or CD-R Music? |
|
Answer» I'n currently in the PROCESS of burning a very large collection of Vinyl ALBUMS onto DISCS. Can someone explain to me the difference between REGULAR CD-R discs and CD-R Music discs? |
|