Welcome Guest.   Make a donation to an author on the site July 28, 2014, 07:20:34 AM  *

Please login or register.
Or did you miss your validation email?


Login with username and password (forgot your password?)
Why not become a lifetime supporting member of the site with a one-time donation of any amount? Your donation entitles you to a ton of additional benefits, including access to exclusive discounts and downloads, the ability to enter monthly free software drawings, and a single non-expiring license key for all of our programs.


You must sign up here before you can post and access some areas of the site. Registration is totally free and confidential.
 
Check out and download the GOE 2007 Freeware Challenge productivity tools.
   
  Forum Home Thread Marks Chat! Downloads Search Login Register  
  Show Posts
      View this member's profile 
      donate to someone Donate to this member 
Pages: Prev 1 2 3 4 5 [6] 7 8 9 10 11 ... 64 Next
126  Main Area and Open Discussion / Living Room / Re: tip: check your mouse before going to red alert. on: February 08, 2014, 08:49:44 PM
There can still be problems with the cable between a wired USB mouse and the port it is connected to. I have a Logitech multi-button mouse that works fine when the cable is a certain position, unfortunately that position appears to shift. Never found a replacement cable here in PY. People have given me older, cheaper brand mouses and the Logitech mouse cable contains more inner wires than the cheapo's do.

What also can be a problem is the USB port that is being used by the mouse. Even if there is nothing wrong with the mouse, its cable or the physical USB port it is connected to, then still there can be problem with Windows not being able to properly communicate with the USB device. While the device would work fine on the USB port right next to it.

Extremely irritating, I can tell you that much. I have a headless server here that has no problem with any USB device I connect to it, except the keyboard. that one will only work in one of the 8 USB ports on the back which are difficult to reach. The device is detected, Windows reports that the appropriate software is successfully installed...and that is it. Do not expect to be able to type anything. I exchanged keyboards (different models, different brands), but to no avail. So I hooked up an old PS2 clunker and all is dandy.

One would assume that the USB standard is around long enough for Windows to not behave so "stubborn" as it sometimes does. Ah well.... 
127  Main Area and Open Discussion / General Software Discussion / Re: Continuing with XP on: February 06, 2014, 07:34:20 AM
I can tell you that it will not be a pleasant experience to run XP as a guest Operating System in a virtual machine on any host PC with only 2GByte of RAM. Although both guest and host should be able to run decently when each is assigned 1 GByte of RAM, they usually don't in the best of cases. Virtual Machines become way more useful when the host PC has 4GByte of RAM (or more) and the guest is assigned 2GByte.

Unless you have an SSD drive with decent amount of storage capacity in your netbook, you will find that performance from both the guest and the host will suffer greatly as well.

Sorry to be so negative to you (and your wife), but these are fair warnings and I thought it best if you received them ahead of time.

As for Linux to be used a s a desktop, I have been playing with Linux Mint 16 (Cinnamon) and I must say that this was a very pleasant experience right out of the box. Support for my movies and music was right there, read and write documents of all different sorts, surf on the internet without problem, etc. The user interface was also user friendly.

Now I must say that this was done in a virtual machine on my non-WiFi Windows 7 desktop which has only 2 GByte of RAM. Although Mint was never slow I noted that Mint could have been much more responsive if properly installed. Unfortunately my desktop PC became very unstable, resulting in lots of 'Blue Screens Of Death' (BSOD) errors. Hopefully now you see why I warned you previously.

I agree with Mouser, migrating to Windows 7 isn't hard when it comes to the user experience. Microsoft offered (free) software that can check if the netbook from your wife (and the software that is installed on it) will be able to run on Windows 7. Likely they still have similar software but I assume the target Windows version will be 8 nowadays. Anyway, that software could still help you with identifying where the problematic points of migration will be when you choose to upgrade to Windows 7.

  

128  Main Area and Open Discussion / Living Room / Re: Satya Nadella becomes Microsoft's new CEO - will things change? on: February 05, 2014, 07:34:19 PM
For the last 6 months I have been working with Windows Server 2012 and until now my feelings are very positive. Some time ago there was repeatedly a Windows 8 laptop on my desk. The owner kept asking if I could configure access and install new items, because he couldn't work with it. My experiences with Windows 8 were definitely not positive...at all.

In another (Dutch) forum I was burned down because I stated that the people behind Windows Server understand the direction in which the Windows OS as a whole should be be going, while the consumer guys should not be allowed out of the asylum. Likely it was the last part that did the burning.  tongue

Finally, my point is coming...apparently Satya Nadella was at the head of the Server division, so for me his ascension to the throne feels like good news and fills me with hope that Windows will change faster for the better. Not a fanboy here, my network is a mix of Windows and Linux. And it will take a pig, flying through hell with a snowball frozen to its snout, before I will be without my Linux servers. 

My network is a mixed environment of Windows and Linux.
129  Main Area and Open Discussion / General Software Discussion / Re: Rambooster. Junk? on: February 05, 2014, 07:04:08 PM
There are some use cases that could benefit from the use of a RAM disk. But those hardly apply to the most common uses of computers. As mwb1100 already stated: practically all software applications with RAM in their name should be avoided. The moment you really do have a need for software applications regarding RAM, that will feel almost like a moment of clarity. Until then, just don't. 
130  Main Area and Open Discussion / Living Room / Re: Recommend some music videos to me! on: February 01, 2014, 04:33:26 PM
@40hz:
131  Main Area and Open Discussion / General Software Discussion / Re: Windows Help is NO HELP on: February 01, 2014, 09:40:47 AM
Use a piece of software called Process Explorer, you can download it for free from the Microsoft website.
This software will show you all that is going on in your computer, making it easy to identify which process(es) claim a lot of CPU. If you don't know the name of the process, research on the net will show you solutions rather easy and quickly.
132  Main Area and Open Discussion / Living Room / Re: Programming/Coder humor on: January 30, 2014, 06:32:04 PM
Isn't the most expensive/exquisite coffee not made of coffee beans that have been through the complete digestive channels of some rodent?

With its logo in mind, wouldn't that make Java the language to produce similar code?    tongue
133  Main Area and Open Discussion / General Software Discussion / Re: Group two windows so they get focus together. Possible? on: January 30, 2014, 06:11:36 AM
Don't underestimate the foulness also known as Excel....(when using it in automated solutions).

And I have also noticed differences when running an application in a user account that is member of the Administrators group and running an application with 'Run as Administrator' or run the application in the Administrator accountt itself.

This might look the same but it really isn't. You will have a bigger chance of success running (experimental) applications in the Administrator account itself than in another way (with Windows 7 and up).
134  Main Area and Open Discussion / Living Room / Re: Google sells Motorola to Lenovo for $3bn on: January 30, 2014, 06:01:58 AM
Why? Doesn't LG make those Nexus phones?
135  Main Area and Open Discussion / General Software Discussion / Re: Application Database Software on: January 25, 2014, 04:33:18 PM
Powershell scripts already exist for this. Any version of Windows more modern than Windows XP comes standard with Powershell. And you can download it freely from Microsoft for XP as well.

http://gallery.technet.mi...ist-of-Installed-c47393ed

With the link above you should be able to download a script that retrieves this list for you, storing this list into a .csv file. Most modern databases can import the content from this kind of files either directly or with a little extra work.

Play a bit with the script, get it to retrieve all the information you are still missing.

136  Main Area and Open Discussion / Non-Windows Software / Re: ArsTechnica article on next-gen filesystems: Bitrot and Atomic COWs on: January 22, 2014, 08:18:08 PM
Very interesting article indeed.  Thmbsup

Sure wish I had the time to play with this some more (as there are now several 150GByte Oracle databases "running loose" in my computer setup...)
137  Main Area and Open Discussion / Living Room / Re: Hard Drive Brand Reliability Data on: January 21, 2014, 08:51:32 PM
That graph matches with my experiences over here in Paraguay, South America. Between 500GByte and 1TByte Seagate drives are really bad, anything between 1 and 3 TByte is bad as well. However, the 500GByte, the 1 TByte and 3 TByte models perform well. Over here it is so bad that I don't even want a Seagate drive with an even number for storage capacity, even if you gave me the drive + money for free. The headache, misery and loss of time just isn't worth it.

Unfortunately, Seagate (and Samsung, if you count portable drives) is the only brand you can buy here directly. All other brands one needs to be ordered online and the extra shipping costs are prohibitive.  
138  Main Area and Open Discussion / General Software Discussion / Re: Question for Linux Gurus - Ubuntu - Mouse & Network Problems on: January 21, 2014, 06:19:27 PM
BIOS/UEFI have options nowadays to boot with no USB device support, partial USB device support (default=allows you to boou from USB devices and have a keyboard, but not much else) or full USB device support. This is done to keep the time to boot as low as possible, while still supporting the essentials in case one needs to do low-level repair jobs.

I would check for this setting first, at least.
139  Main Area and Open Discussion / Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content] on: January 19, 2014, 05:21:15 PM
She Cheddar's in her boots.
140  Main Area and Open Discussion / General Software Discussion / Re: How to repair zip files? on: January 15, 2014, 05:09:58 AM
Always use the latest version of your favorite zip/unzip software. It might be that the person creating the archive has used an option not yet available in the version you have running and you will get this type of error message.

One can also try to use a different piece of software to extract the archive. In my experience the latest (portable) version of 7-zip (www.7-zip.org) is quite able in getting archives extracted. Another tool would be Universal Extractor. These are free to use, but will gladly accept your donation(s).

Too bad you missed out on deals on the BitsDuJour website. Not that long ago they offered a free version of DataNumen Zip repair. That might be an option for you as well. However, I don't know how good that software is at what it does as I usually re-download he zip file again if these kind of messages pop up in my portable versions of 7-zip and Universal Extractor.
141  Main Area and Open Discussion / Living Room / Re: PC Shipments Drop Precipitously in 2013 on: January 11, 2014, 10:46:44 AM
By street cred you mean getting kicked out of my door to the curb when you call a tablet a computer for everyone? Wink

Hey, if you say such things loud enough I might even forget to open the door first... Grin
142  Main Area and Open Discussion / General Software Discussion / Re: Do i perform L.L.F. ? on: January 11, 2014, 10:43:54 AM
Replacement is indeed the best way to go. And as a bonus you can experiment with the old disk (after you make very sure all your data has been copied to the new one, of course).

If you are feeling real adventurous you could try software like MHDD. With that software you can detect where the bad sectors are. If these are grouped together, you can actually reduce the size of the disk in such a way that the problematic sectors can never be reached by whatever operating system that is on it anymore. This method is way more powerful than anything you can do within any operating system.

This software is not for those faint of heart! Actually, you can completely destroy your hard drive with MHDD, if you are not careful. But hey, you have a drive to experiment with and if you do things right, you have a hard disk that can still be used for whatever you need or want to do with it. And even if you don't need one, the ego boost from being able to say that you fixed your (friends) drive will be great.

One important thing though, you will lose all data on the drive after reducing the storage capacity.

In my point of view it is better to use whatever storage capacity that is left than to use the hard disk as a doorstop. Being relegated to be doorstop...sounds so final.  Wink
143  Other Software / Developer's Corner / Re: How to seamlessly verify a unique identity without requiring username/password? on: January 06, 2014, 09:01:25 PM
Sounds like you want to use a certificate based setup. This is a lot of hassle for the one handing out certificates and these need to be of sufficient strength (read: quite costly in computing resources to generate) and it would be better if these certificates aren't valid for a long period of time.

Once setup the procedure for logging in is not that difficult anymore, but getting this properly setup is. You also have to convince the players that your certificates are trustworthy...especially if you generate the whole chain yourself. If you don't want to do this, there are services that can do this for you, but there will be costs involved.

Doing this on a personal level is already quite expensive, on commercial level it becomes very quick very(!) expensive. VeriSign is one of the biggest certificate vendors you'll find. Very expensive, but the least problematic to setup as most, if not all OS's, come with this as standard. Checking for the certificate and for example a MAC address that belongs with this certificate is relatively easy for the one doing the authorization and the user will hardly notice anything from the log in procedure.

Though faking a MAC address is easy, the strength of the authorization lies in the combination of the certificate and the MAC address check.

A good example of this would be how a VPN authorizes a computer to be allowed on its network. That check is done early in the full authorization process. After that the user needs to fill in a user name and password to complete the full authorization process.
144  DonationCoder.com Software / Post New Requests Here / Re: IDEA: Lan Alarmclock or Timer on: January 06, 2014, 08:26:27 PM
Isn't the moment you need to take the medicine the most important? When the moment arrives ton take the medicine, you could choose to send out a signal from the computer that keeps track of the time and setup a task on any of your computers in the LAN to responds to this signal in whichever way you see fit.

That would seem easier to do, it would at least not require to create software if you don't want to. The task manager manager in Windows 7 is quite able.
145  Main Area and Open Discussion / General Software Discussion / Re: Script to input two variables and use them to perform multiple tasks on: January 05, 2014, 05:30:07 PM
It might help you to visualize the whole procedure you have to go through to get what you need.

Don't be shy of using simple pen and paper to make a drawing using blocks containing text of the condition you want to achieve and where a line for the 'yes' and 'no' answers depart. You will get a clearer picture of the steps you need to take.

As a bonus these steps become small which makes research a lot simpler in any computer language you like to master...or should I say: 'engage with'?  Wink

AHK would by all means be the better choice than batch scripts. Batch scripts are nice for simple stuff to automatize, but you reach the limits quickly. Workarounds for those make the resulting script messy and unclear. AHK or other programming languages have more structure, a lot less limitations and make more sense in the end. Especially after you have to take a look after a year at the code you made  cheesy
146  Main Area and Open Discussion / General Software Discussion / Re: Script to input two variables and use them to perform multiple tasks on: January 05, 2014, 03:28:30 PM
This little batch script should do most, if not all of your requests.

[attach]


Hope it helps  smiley
147  Main Area and Open Discussion / General Software Discussion / Re: In search of ... assistance with a tenacious BHO ... on: January 05, 2014, 09:20:56 AM
I couldn't agree more with the quote above "an ounce of prevention is better than a pound of cure" and apply this wherever I can, including my computing.

Sometimes it can be useful to take a look with the SysInternal tools Process Explorer and Process Monitor to take a look at what is actually happening when an application such as a BHO/virus/malware runs. One can even create and apply specific security rules in Windows itself that essentially block the execution of software. As you are already infected once, there is a good chance you will not be infected twice (with the same virus/malware).

Ok, remaining infected isn't a great strategy, but it does give you the resources of your PC back in almost all cases. I have successfully applied this on several occasions on different computers. Unfortunately, it is a lot of work and there is virus/malware code that can circumvent this. Although you are infected, you do disable the functionality of this code, rendering it (almost) useless.

However, in all cases this made the owner of the computer think they were "invincible" on the web as the method does allow for even more "adventurous" behavior.

Be warned though: this kind of thing does require that you have to know what you are doing, as you can seriously limit the functionality of your PC or even make it completely unusable.
148  Main Area and Open Discussion / General Software Discussion / Re: In search of ... reasonable backup software on: January 05, 2014, 07:09:34 AM
Sorry, but as liberal as DC is  undecided, that language cannot be used here  tongue.
Okay, I'll back up a bit.

Ok, copy that...
149  Main Area and Open Discussion / General Software Discussion / Re: Printer network on: January 01, 2014, 03:05:43 PM
On any of your computers you should open the command line, just to see if that computer receives a proper IP nuimber. Use the Windows key + R to open the Run window. type inside this window 'cmd' and hit the Enter key. A new window should appear where you can type 'ipconfig /all >> c:\temp\ipconfig_result.txt'.
[attach]

That line will generate a text file called 'ipconfig_result.txt' in folder 'C:\temp'. Inside this file you will see all available network connections on that computer and how these are configured.
[attach]

The highlighted blocks show the most important IP addresses. You should notice that the network connection called 'Local Area Connection' has an IPv4 address that starts with 192.168.xxx.xxx. All the other highlighted IP addresses are similar, these also start  with 192.168.xxx.xxx.

If you check this on the PC that is hardwired to the router, you will see IP numbers that start with the same 192.168.xxx.xxx, it is also possible to that the IP numbers in your network start with 10.0.xxx.xxx. Do the same on any other PC and verify there if the IP numbers from the Wireless Network Connection on that PC start with the same 192.168.xxx.xxx or 10.0.xxx.xxx. When that is not the case, you have a bigger networking problem which requires the help from someone who has or still does maintain computer networks. It is at least a problem I cannot hope to solve from this end of the globe in a timely fashion.

Now I perused a little through the manual from the Verizon router/switch I downloaded from the Verizon website. From this I gather that it is a quite capable router switch. The pictures in that manual also indicate that a total of 4 computers could be hardwired to this router. So you could consider connecting 3 computers with a cable. I mention this as this router allows for different networks to be configured and when something is done wrong one might network connection on each PC that has been associated with that network. As I cannot see any of these settings here, it is very hard to guess how the configuration state of your network actually is.

Assuming that the hardwired PC is able to access the internet, you could connect 3 computers more to the router by cable as this part of the router is properly set up for internet access. If one of these 3 PC's would be the PC where your printer is connected to, you could at least share the printer between these 4 PC's already. Then get someone to fix and/or enable the WiFi network section of the router, so your other computers can share your network resources.

A pair of eyes and hands on-site will fix this way more promptly than any of us here can. Try to find someone in your neighborhood, a close by computing club, a Verizon tech support person or maybe even a close by living DC member can be (financially) persuaded to take a look at your network. Having said this, it would pay in the long run if you invest some time to read up on these matters yourself. It really isn't that hard once you get the concepts and it saves you a lot of time (and money) not being dependent on the expertise of others when a networking issue occurs.

Another long post, but I am still thinking that your network isn't properly setup. This needs to be fixed first before you can even think about sharing your printer between your computers. In my personal experience, wired connections are a lot less problematic than WiFi can ever hope to be. Because of this I don't even consider using WiFi in any of my own computers.
150  Main Area and Open Discussion / General Software Discussion / Re: In search of ... reasonable backup software on: January 01, 2014, 09:32:58 AM
The design decision of MS to put everything into the C:\ partition I will never understand or appreciate.
Hence, I always make sure that there are at least 4 partitions in my PC. Now I should mention that in my lifetime I only bought once a Dell and once an Acer PC. Those experiences have made me build all my PC's after that.

C:\  - will contain only the Windows files (no user profiles, to temp files, no swap, no program files).
D:\  - will contain only 3rd party software that I install + portable apps.
E:\  - will contain only data.
F:\  - will contain all temporary files and swap file (I always disable hibernation and sleep options, these always have been too problematic to me. As this setup is actually fast with booting, hibernation and sleep become useless in my opinion anyway).

Initially this is  (a lot) more work, but reconstructing a PC into a working state again is easier, making backups is easier and even a Windows recovery will not have that dramatic effect on your data (being stored separately has that effect, you know).

Each time you install a piece of software from a 3rd party software, you do need to keep a watchfull eye out, because some of these want to install (some part of it) to the C:\ partition anyway, even if you indicate that it shouldn't. Whenever I notice this, these pieces of software are removed and the search for a portable version or alternative software begins.

Anyway, when a piece of software does find its way to my system, I'll make a backup of the registry with ERUNT (to my E:\ partition). First restoring a Windows System Restore point and then restoring the appropriate ERUNT registry backup is a very fast way to be running in a good state again without having to install and/or reconfigure the 3rd party software you need/like. 

- As the content from the C:\ Partition hardly changes, it is easy create an image from it that doesn't require much updating anymore.
- The content of the D:\ partition isn't changing that often either, so you can choose to make an image from this partition if you don't install a lot of software. Even if you do install/remove software often, using incremental backup software is a fast way to secure your software.
- Making a backup from the content of the E:\ partition could be as easy as a simple file copy to a different (USB) hard disk, re-writable DVD/Blu-Ray, tape or other computer.
- The content from the F:\ partition can be disregarded at any time any event may occur.

This setup has already saved me a lot of work rebuilding/reconstructing (Windows based) Oracle database servers that run databases varying in sizes of 50GByte to 400GByte. Also personal computers that had their hard disk(s) fail. An hour or two of downtime at most and then run again if nothing has happened, makes me glad I sacrificed time and effort to create these Windows setups.
Pages: Prev 1 2 3 4 5 [6] 7 8 9 10 11 ... 64 Next
DonationCoder.com | About Us
DonationCoder.com Forum | Powered by SMF
[ Page time: 0.039s | Server load: 0.06 ]