Welcome Guest.   Make a donation to an author on the site April 19, 2014, 12:13:07 PM  *

Please login or register.
Or did you miss your validation email?


Login with username and password (forgot your password?)
Why not become a lifetime supporting member of the site with a one-time donation of any amount? Your donation entitles you to a ton of additional benefits, including access to exclusive discounts and downloads, the ability to enter monthly free software drawings, and a single non-expiring license key for all of our programs.


You must sign up here before you can post and access some areas of the site. Registration is totally free and confidential.
 
The N.A.N.Y. Challenge 2013! Download dozens of custom programs!
   
  Forum Home Thread Marks Chat! Downloads Search Login Register  
  Show Posts
      View this member's profile 
      donate to someone Donate to this member 
Pages: Prev 1 2 3 [4] 5 6 7 8 9 ... 62 Next
76  Main Area and Open Discussion / Non-Windows Software / Re: ArsTechnica article on next-gen filesystems: Bitrot and Atomic COWs on: January 22, 2014, 08:18:08 PM
Very interesting article indeed.  Thmbsup

Sure wish I had the time to play with this some more (as there are now several 150GByte Oracle databases "running loose" in my computer setup...)
77  Main Area and Open Discussion / Living Room / Re: Hard Drive Brand Reliability Data on: January 21, 2014, 08:51:32 PM
That graph matches with my experiences over here in Paraguay, South America. Between 500GByte and 1TByte Seagate drives are really bad, anything between 1 and 3 TByte is bad as well. However, the 500GByte, the 1 TByte and 3 TByte models perform well. Over here it is so bad that I don't even want a Seagate drive with an even number for storage capacity, even if you gave me the drive + money for free. The headache, misery and loss of time just isn't worth it.

Unfortunately, Seagate (and Samsung, if you count portable drives) is the only brand you can buy here directly. All other brands one needs to be ordered online and the extra shipping costs are prohibitive.  
78  Main Area and Open Discussion / General Software Discussion / Re: Question for Linux Gurus - Ubuntu - Mouse & Network Problems on: January 21, 2014, 06:19:27 PM
BIOS/UEFI have options nowadays to boot with no USB device support, partial USB device support (default=allows you to boou from USB devices and have a keyboard, but not much else) or full USB device support. This is done to keep the time to boot as low as possible, while still supporting the essentials in case one needs to do low-level repair jobs.

I would check for this setting first, at least.
79  Main Area and Open Discussion / Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content] on: January 19, 2014, 05:21:15 PM
She Cheddar's in her boots.
80  Main Area and Open Discussion / General Software Discussion / Re: How to repair zip files? on: January 15, 2014, 05:09:58 AM
Always use the latest version of your favorite zip/unzip software. It might be that the person creating the archive has used an option not yet available in the version you have running and you will get this type of error message.

One can also try to use a different piece of software to extract the archive. In my experience the latest (portable) version of 7-zip (www.7-zip.org) is quite able in getting archives extracted. Another tool would be Universal Extractor. These are free to use, but will gladly accept your donation(s).

Too bad you missed out on deals on the BitsDuJour website. Not that long ago they offered a free version of DataNumen Zip repair. That might be an option for you as well. However, I don't know how good that software is at what it does as I usually re-download he zip file again if these kind of messages pop up in my portable versions of 7-zip and Universal Extractor.
81  Main Area and Open Discussion / Living Room / Re: PC Shipments Drop Precipitously in 2013 on: January 11, 2014, 10:46:44 AM
By street cred you mean getting kicked out of my door to the curb when you call a tablet a computer for everyone? Wink

Hey, if you say such things loud enough I might even forget to open the door first... Grin
82  Main Area and Open Discussion / General Software Discussion / Re: Do i perform L.L.F. ? on: January 11, 2014, 10:43:54 AM
Replacement is indeed the best way to go. And as a bonus you can experiment with the old disk (after you make very sure all your data has been copied to the new one, of course).

If you are feeling real adventurous you could try software like MHDD. With that software you can detect where the bad sectors are. If these are grouped together, you can actually reduce the size of the disk in such a way that the problematic sectors can never be reached by whatever operating system that is on it anymore. This method is way more powerful than anything you can do within any operating system.

This software is not for those faint of heart! Actually, you can completely destroy your hard drive with MHDD, if you are not careful. But hey, you have a drive to experiment with and if you do things right, you have a hard disk that can still be used for whatever you need or want to do with it. And even if you don't need one, the ego boost from being able to say that you fixed your (friends) drive will be great.

One important thing though, you will lose all data on the drive after reducing the storage capacity.

In my point of view it is better to use whatever storage capacity that is left than to use the hard disk as a doorstop. Being relegated to be doorstop...sounds so final.  Wink
83  Other Software / Developer's Corner / Re: How to seamlessly verify a unique identity without requiring username/password? on: January 06, 2014, 09:01:25 PM
Sounds like you want to use a certificate based setup. This is a lot of hassle for the one handing out certificates and these need to be of sufficient strength (read: quite costly in computing resources to generate) and it would be better if these certificates aren't valid for a long period of time.

Once setup the procedure for logging in is not that difficult anymore, but getting this properly setup is. You also have to convince the players that your certificates are trustworthy...especially if you generate the whole chain yourself. If you don't want to do this, there are services that can do this for you, but there will be costs involved.

Doing this on a personal level is already quite expensive, on commercial level it becomes very quick very(!) expensive. VeriSign is one of the biggest certificate vendors you'll find. Very expensive, but the least problematic to setup as most, if not all OS's, come with this as standard. Checking for the certificate and for example a MAC address that belongs with this certificate is relatively easy for the one doing the authorization and the user will hardly notice anything from the log in procedure.

Though faking a MAC address is easy, the strength of the authorization lies in the combination of the certificate and the MAC address check.

A good example of this would be how a VPN authorizes a computer to be allowed on its network. That check is done early in the full authorization process. After that the user needs to fill in a user name and password to complete the full authorization process.
84  DonationCoder.com Software / Post New Requests Here / Re: IDEA: Lan Alarmclock or Timer on: January 06, 2014, 08:26:27 PM
Isn't the moment you need to take the medicine the most important? When the moment arrives ton take the medicine, you could choose to send out a signal from the computer that keeps track of the time and setup a task on any of your computers in the LAN to responds to this signal in whichever way you see fit.

That would seem easier to do, it would at least not require to create software if you don't want to. The task manager manager in Windows 7 is quite able.
85  Main Area and Open Discussion / General Software Discussion / Re: Script to input two variables and use them to perform multiple tasks on: January 05, 2014, 05:30:07 PM
It might help you to visualize the whole procedure you have to go through to get what you need.

Don't be shy of using simple pen and paper to make a drawing using blocks containing text of the condition you want to achieve and where a line for the 'yes' and 'no' answers depart. You will get a clearer picture of the steps you need to take.

As a bonus these steps become small which makes research a lot simpler in any computer language you like to master...or should I say: 'engage with'?  Wink

AHK would by all means be the better choice than batch scripts. Batch scripts are nice for simple stuff to automatize, but you reach the limits quickly. Workarounds for those make the resulting script messy and unclear. AHK or other programming languages have more structure, a lot less limitations and make more sense in the end. Especially after you have to take a look after a year at the code you made  cheesy
86  Main Area and Open Discussion / General Software Discussion / Re: Script to input two variables and use them to perform multiple tasks on: January 05, 2014, 03:28:30 PM
This little batch script should do most, if not all of your requests.

[attach]


Hope it helps  smiley
87  Main Area and Open Discussion / General Software Discussion / Re: In search of ... assistance with a tenacious BHO ... on: January 05, 2014, 09:20:56 AM
I couldn't agree more with the quote above "an ounce of prevention is better than a pound of cure" and apply this wherever I can, including my computing.

Sometimes it can be useful to take a look with the SysInternal tools Process Explorer and Process Monitor to take a look at what is actually happening when an application such as a BHO/virus/malware runs. One can even create and apply specific security rules in Windows itself that essentially block the execution of software. As you are already infected once, there is a good chance you will not be infected twice (with the same virus/malware).

Ok, remaining infected isn't a great strategy, but it does give you the resources of your PC back in almost all cases. I have successfully applied this on several occasions on different computers. Unfortunately, it is a lot of work and there is virus/malware code that can circumvent this. Although you are infected, you do disable the functionality of this code, rendering it (almost) useless.

However, in all cases this made the owner of the computer think they were "invincible" on the web as the method does allow for even more "adventurous" behavior.

Be warned though: this kind of thing does require that you have to know what you are doing, as you can seriously limit the functionality of your PC or even make it completely unusable.
88  Main Area and Open Discussion / General Software Discussion / Re: In search of ... reasonable backup software on: January 05, 2014, 07:09:34 AM
Sorry, but as liberal as DC is  undecided, that language cannot be used here  tongue.
Okay, I'll back up a bit.

Ok, copy that...
89  Main Area and Open Discussion / General Software Discussion / Re: Printer network on: January 01, 2014, 03:05:43 PM
On any of your computers you should open the command line, just to see if that computer receives a proper IP nuimber. Use the Windows key + R to open the Run window. type inside this window 'cmd' and hit the Enter key. A new window should appear where you can type 'ipconfig /all >> c:\temp\ipconfig_result.txt'.
[attach]

That line will generate a text file called 'ipconfig_result.txt' in folder 'C:\temp'. Inside this file you will see all available network connections on that computer and how these are configured.
[attach]

The highlighted blocks show the most important IP addresses. You should notice that the network connection called 'Local Area Connection' has an IPv4 address that starts with 192.168.xxx.xxx. All the other highlighted IP addresses are similar, these also start  with 192.168.xxx.xxx.

If you check this on the PC that is hardwired to the router, you will see IP numbers that start with the same 192.168.xxx.xxx, it is also possible to that the IP numbers in your network start with 10.0.xxx.xxx. Do the same on any other PC and verify there if the IP numbers from the Wireless Network Connection on that PC start with the same 192.168.xxx.xxx or 10.0.xxx.xxx. When that is not the case, you have a bigger networking problem which requires the help from someone who has or still does maintain computer networks. It is at least a problem I cannot hope to solve from this end of the globe in a timely fashion.

Now I perused a little through the manual from the Verizon router/switch I downloaded from the Verizon website. From this I gather that it is a quite capable router switch. The pictures in that manual also indicate that a total of 4 computers could be hardwired to this router. So you could consider connecting 3 computers with a cable. I mention this as this router allows for different networks to be configured and when something is done wrong one might network connection on each PC that has been associated with that network. As I cannot see any of these settings here, it is very hard to guess how the configuration state of your network actually is.

Assuming that the hardwired PC is able to access the internet, you could connect 3 computers more to the router by cable as this part of the router is properly set up for internet access. If one of these 3 PC's would be the PC where your printer is connected to, you could at least share the printer between these 4 PC's already. Then get someone to fix and/or enable the WiFi network section of the router, so your other computers can share your network resources.

A pair of eyes and hands on-site will fix this way more promptly than any of us here can. Try to find someone in your neighborhood, a close by computing club, a Verizon tech support person or maybe even a close by living DC member can be (financially) persuaded to take a look at your network. Having said this, it would pay in the long run if you invest some time to read up on these matters yourself. It really isn't that hard once you get the concepts and it saves you a lot of time (and money) not being dependent on the expertise of others when a networking issue occurs.

Another long post, but I am still thinking that your network isn't properly setup. This needs to be fixed first before you can even think about sharing your printer between your computers. In my personal experience, wired connections are a lot less problematic than WiFi can ever hope to be. Because of this I don't even consider using WiFi in any of my own computers.
90  Main Area and Open Discussion / General Software Discussion / Re: In search of ... reasonable backup software on: January 01, 2014, 09:32:58 AM
The design decision of MS to put everything into the C:\ partition I will never understand or appreciate.
Hence, I always make sure that there are at least 4 partitions in my PC. Now I should mention that in my lifetime I only bought once a Dell and once an Acer PC. Those experiences have made me build all my PC's after that.

C:\  - will contain only the Windows files (no user profiles, to temp files, no swap, no program files).
D:\  - will contain only 3rd party software that I install + portable apps.
E:\  - will contain only data.
F:\  - will contain all temporary files and swap file (I always disable hibernation and sleep options, these always have been too problematic to me. As this setup is actually fast with booting, hibernation and sleep become useless in my opinion anyway).

Initially this is  (a lot) more work, but reconstructing a PC into a working state again is easier, making backups is easier and even a Windows recovery will not have that dramatic effect on your data (being stored separately has that effect, you know).

Each time you install a piece of software from a 3rd party software, you do need to keep a watchfull eye out, because some of these want to install (some part of it) to the C:\ partition anyway, even if you indicate that it shouldn't. Whenever I notice this, these pieces of software are removed and the search for a portable version or alternative software begins.

Anyway, when a piece of software does find its way to my system, I'll make a backup of the registry with ERUNT (to my E:\ partition). First restoring a Windows System Restore point and then restoring the appropriate ERUNT registry backup is a very fast way to be running in a good state again without having to install and/or reconfigure the 3rd party software you need/like. 

- As the content from the C:\ Partition hardly changes, it is easy create an image from it that doesn't require much updating anymore.
- The content of the D:\ partition isn't changing that often either, so you can choose to make an image from this partition if you don't install a lot of software. Even if you do install/remove software often, using incremental backup software is a fast way to secure your software.
- Making a backup from the content of the E:\ partition could be as easy as a simple file copy to a different (USB) hard disk, re-writable DVD/Blu-Ray, tape or other computer.
- The content from the F:\ partition can be disregarded at any time any event may occur.

This setup has already saved me a lot of work rebuilding/reconstructing (Windows based) Oracle database servers that run databases varying in sizes of 50GByte to 400GByte. Also personal computers that had their hard disk(s) fail. An hour or two of downtime at most and then run again if nothing has happened, makes me glad I sacrificed time and effort to create these Windows setups.
91  Main Area and Open Discussion / Living Room / Re: HAPPY NEW YEAR TO ALL OF DONATIONCODER - 2014! on: January 01, 2014, 08:03:38 AM
A happy new year to everyone here at DonationCoder, one where we can all find opportunities to grow and be merry. Thmbsup
92  Main Area and Open Discussion / General Software Discussion / Re: Printer network on: December 31, 2013, 06:35:23 AM
Never had (major) problems with sharing an 8-year old HP Laserjet 1020 (USB, attached to a computer) through a workgroup consisting of 12 (wired) computers.

The printer ran fine with XP based Workgroup, Windows 7 based Workgroup and there is not even sharing the printer now the PC that it is attached to runs an evaluation copy of Windows 2012.

What I found is that you want to download the most basic driver you can get from HP. These keep working in a multitude of OS's. However, I never had too much luck with the all-in-one's of HP...or any other brand for that matter.

The advice given earlier is the best way to go, though. Turning any kind of printer into a network printer is always preferable.

And one more bit of advice: drop Homegroup and just use a Windows work group. Go to the advanced settings of your computer (where you can set the name of your computer) and adjust the name of the workgroup to whatever name you like. Just make sure it is the same on each computer in your network.

Homegroup should make networking easier, but it is sheer misery in my experience and expect to lose 10 to 15% of overall network speed, if you do decide to keep using it.

From your description I understand that you have a lot of trouble getting computers to "see" each other over your network. How are the required IP numbers (one for each PC) distributed? You have a router/switch that supports DHCP?
When that is not the case, buy a router/switch that does. You have models that do this and support a USB printer as well. Products intended for SOHO's (Small Office, Home Office) are likely your best bet. SOHO equipment is usually not that expensive and make your life (you know, the part that has to handle your computer network) often a lot easier.

Sharing a printer over a network, while the network itself isn't setup properly...expect a lot of "sudden and acute discomfort" in the the area where your rear end resides.

 

 
93  Main Area and Open Discussion / General Software Discussion / Re: text file editor personalyzable on: December 30, 2013, 06:34:54 PM
My suggestion would be to take a look into the Style configurator from Notepad++.

[attach]
You can set the background color for different sections of text inside a text file. It doesn't seem that easy, but also not that difficult.
94  Main Area and Open Discussion / Living Room / Re: Interesting "stuff" on: December 29, 2013, 05:27:35 PM
Fastest lap ever on the Japanese Formula 1 circuit Suzuka was done by Ayerton Senna da Silva in the McLaren Honda P4/5...24 years ago in 1989!
Honda will propel F1 cars again very soon and to start the momentum they have recreated this fastest lap, but only by using sound and light.

The video is very entertaining, even if you don't like race cars in general or Formula 1 in particular.
And actually quite impressive project after watching the 'making of' video.

The video:
<a href="http://www.youtube.com/watch?v=oeO2q8FzcnM" target="_blank">http://www.youtube.com/watch?v=oeO2q8FzcnM</a>

The making of:
<a href="http://www.youtube.com/watch?v=RVeSYyYzjhY" target="_blank">http://www.youtube.com/watch?v=RVeSYyYzjhY</a>
You can turn on English subtitles.
95  Main Area and Open Discussion / General Software Discussion / Re: 'logging off' & 'shutting down' on: December 28, 2013, 08:16:55 AM
In Windows 7 (and higher) the Windows Event viewer shows you a lot more. Although this info can be overwhelming, it is very useful.

Go to the Windows Control Panel > Administrative tools> Event viewer

A Window will open. Maximize it as the information that will be shown to you needs all the screen real-estate it can get. On the left is a tree view, select option 'Application and service logs'

New options will appear, select Microsoft > Windows > Windows Firewall With Advanced Security > Firewall.

On top of the center of the screen you will see a chronologically ordered list of events that took place. Select any event and the bottom half in the center of the screen shows you the detailed information of the selected event.

Now, most of the occurred events are likely not that interesting, but events with event id 2011 could be. Events with that id show a network communication attempt with any application (including port, process ID and complete file path) on your system. Searching on the internet with the application name and port number will show you if the communication is benign or not.

My computer only has its standard firewall enabled, without anti-virus. If you have another firewall and/or anti-virus solution enabled, I am sure you will find it in the 'Application and service logs' section of the event viewer.
96  Main Area and Open Discussion / Living Room / Re: Looking for the title of an Anime on: December 27, 2013, 06:13:47 PM
Here is a list of anime series from the 80's and 90's:
http://www.retrojunk.com/community/post/index/413

Maybe there is one title (+short description) that juggles your brain so much that you remember it again smiley
97  DonationCoder.com Software / Post New Requests Here / Re: So, about wallpaper changers... on: December 26, 2013, 02:31:20 AM
SkreenSwapper

Using the first 2 characters of your nick seemed appropriate with this one...
98  DonationCoder.com Software / Post New Requests Here / Re: So, about wallpaper changers... on: December 25, 2013, 07:29:34 AM
Upscaling (enlarging) images is very hard to do. Of course, enlarging an image with dimensions 1024x768 to 1280x1024 is not that hard, especially when the ratio remains the same. However, when upscaling to bigger

The compression level of the JPG image format is a huge factor in the upscaling capability of an image. Compression normally means: how can I get rid of as much image data as possible, without affecting the image (too much).

After compression (of any image format, really) the upscaling capability diminishes significantly. Myself, I tend to use the following rule of thumb: if you have a JPG image with 80% compression (a very common, if not the default level of compression) you can more or less safely upscale up to 20% of the original size (about 25% of the compression level value), but only if the ratio remains the same. For example: 1024x768 (original) + 20% would become 1280x1024.

After that, don't bother. Years ago, around 1998-2000, I did buy a piece of software (for about 150 of today Euros) that could significantly upscale images successfully. The floppy it came on wasted away and as far as I know this software isn't on the consumer market anymore. The guy who made it was always busy making computer demos (in Assembly) in his free time, while studying mathematics in University. He finished his study with a project where someone would make a random pile of coins from different countries and his software could tell you the exact amount of coins from a satellite image.

Recalculating the correct missing image information from any image is very hard to do and will always lead to artifacts. Nothing substitutes uncompressed image data. Still, all bets are off when the image ratio changes during upscaling, even if the image is uncompressed. Not all of the tricks that work when upscaling (compressed) movies, work as well for stationary images I'm afraid.
99  DonationCoder.com Software / Post New Requests Here / Re: So, about wallpaper changers... on: December 24, 2013, 10:19:11 PM
Nowadays I just use the standard wallpaper that comes with Windows 7. But this used to be a favorite of mine:
http://www.johnsadventures.com/software/backgroundswitcher/

Never tried this one myself, but looks promising:
http://www.caledos.com/lab/Caledos/featuresC.aspx

Although it doesn't fit the requirements from the OP, I cannot forgot about the eye-candy generated by this piece of freeware. At the time I enjoyed this very much:
http://alumni.cs.ucr.edu/~gstitt/motionpicture/
It is from 2004 and doesn't look to be actively maintained, but it still works in my Windows 7 64-bit installation and to be honest...I still like it a lot!

*- edited: added eye-candy part -*
100  Main Area and Open Discussion / General Software Discussion / Re: System Volume Information on: December 24, 2013, 05:32:40 PM
Isn't the 'System Volume Information' folder by default hidden from view?

When one sees this folder, it is most of the time because one has adjusted the appropriate setting in the 'Folder view', accessible through the Windows Control Panel.

To my (limited) knowledge, after formatting the thumb drive, the first time the thumb drive is accessed by Windows, the folder returns.

As Stoic already explained, it's a system folder and is in principal harmless. 

Pages: Prev 1 2 3 [4] 5 6 7 8 9 ... 62 Next
DonationCoder.com | About Us
DonationCoder.com Forum | Powered by SMF
[ Page time: 0.038s | Server load: 0.03 ]