topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Saturday December 20, 2025, 7:29 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 103 104 105 106 107 [108] 109 110 111 112 113 ... 364next
2676
Living Room / Re: External harddisk broken?
« Last post by f0dder on January 27, 2010, 01:13 AM »
Now the external HD is not recognised by WinXP, Ubuntu, or any of the HD recovery apps on Hiren's Boot CD.
In which way? "Not getting a drive letter" doesn't necessarily mean a FUBAR disk (but does mean partition and/or filesystem problems), whereas not showing up in Windows diskmgmt.msc does.

The drive does power up and spins without making any aweful noises, but when the OS tries to access it, merely cycles endlessly through a 4 or 5 second loop of whirs and clicks.
That does actually sound like "awful noises" to me - like a stuck read/write head arm.
2677
General Software Discussion / Re: Hardware/software for oral history archive?
« Last post by f0dder on January 25, 2010, 12:41 PM »
File format probably isn't going to matter terribly much - normally I'd say "use FLAC!", but when source media is casette tapes and the contents are history recordings, I'd say MP3 is just fine. I'd still use at least 192kbps encoding though, and if space isn't a problem, I'd probably still go FLAC even if it's overkill.

I have no idea how you'd go about recording the tapes onto your computer in a comfortable way, though. But I'd think that the best approach is to transfer an entire tape at a time (regardless of quality), and go do something else while it's happening (unless you have some fancy gear, it'll probably be 1:1 timewise) - skipping back and forth on old tapes to find interesting bits sound like a disaster waiting to happen.

Once you've gotten the tapes transferred over, the really important thing is left, though: finding an application that's comfortable for setting bookmarks, scanning back and forth, and is comfortable if you want to transcribe. You definitely do NOT want a standard run-of-the-mill audio editor (been there, done that - 30min interview took me 2½ hours to transcribe).

I think the software I was recommended by several friends was Scribe, but I never got a chance to look at it.
2678
Living Room / Re: Tech News Weekly: Edition 3-10
« Last post by f0dder on January 24, 2010, 10:33 PM »
Bruce Schneier(comment on cnn) : a backdoor into Gmail(required by US Govt) may have been used:
http://www.cnn.com/2...e.hacking/index.html
Take that with a pinch of salt before panicking - even if a backdoor has been used. The way CNN states this makes it sound like there's a backdoor in gmail that's as easy to use as entering a special username+password, and that the hackers penetrated google with this...

It's probably more along the lines of machines being exploited through the aforementioned IE flaw (or other means), letting the hackers inside the corporate network - and from there on exploring said corporate network. And once in there, they'd be able to look at non-internet-facing servers - which might include gmail storage servers (I'd kinda expect those to be encrypted, but who knows).

It's pretty much all guesswork, anyway. And that CNN link... is that an essay directly written by Schneier, or is it a CNN butcher-piece of this? - the latter is a lot less sensationalist then the CNN piece, and doesn't support what is probably the most alarming paragraph of the CNN piece:
In order to comply with government search warrants on user data, Google created a backdoor access system into Gmail accounts. This feature is what the Chinese hackers exploited to gain access.
2679
Living Room / Re: Tech News Weekly: Edition 3-10
« Last post by f0dder on January 24, 2010, 08:59 PM »
This was like taking candy from a baby.
Not exactly - finding an exploit like that requires a fairly decent understanding of not only Windows internals, but also above-average knowledge of CPU detail (and that's above-average for assembly programmers, mind you). There's automated tools that can find "areas of interest" for a number of exploit types, which can then be further analyzed by a security researcher (or malware writer) - this NTVDM exploit is something extraordinaire.

And while it might not be in the wild yet, you can be pretty sure it's already added to blackhat toolset, and will be added to drive-by rootkits any time now - with good reason. It's even worse than the linux kernel 2.4->2.6 privilege escalation exploit (which was bad enough - iirc that was around 8 years of kernel revisions, and multiple architectures).

Privilege escalation might not be as sexy as remote holes, but it's a dangerous addition once a hole is found... and when you get not only admin but can go kernel-mode "silently", and it can target such a large installation base - ouch!
2680
Living Room / Re: Tech News Weekly: Edition 3-10
« Last post by f0dder on January 24, 2010, 08:04 PM »
The Google attack (and the rest of them) was the IE RCE (high reliability for IE6/XP only...makes you wonder).
Yes, that's apparently how they got into the systems - I'm wondering if they used NTVDM to go LUA->Admin.

I don't believe the NTVDM has been exploited in the wild yet (at least not to great effect). I'm not terribly excited about it TBH; if/when someone finds a creative way of *using* it, it might get interesting.
Perhaps not used, but it's still one of the more interesting exploits for quite a while, even though it's "just" privilege escalation and not remote. Why? Partly because it in such an unlikely target... and very much so because it affects all 32bit NT versions. Want root? got root! (Oh, and it's not just LUA->Admin... it's full kernel-mode privileges without loading a .sys).
2681
Living Room / Re: Tech News Weekly: Edition 3-10
« Last post by f0dder on January 24, 2010, 07:44 PM »
Was the recent NTVDM local privilege escalation exploit used in the google attack?

That's a very interesting exploit, compared to your usual double-free/buffer-overrun/blablabla exploits, for a lot of reasons. Too bad MS didn't fix it long ago, they've been informed about it for a while. Also, while NTVDM is a very old component and you'd thus reason that "it's OK they haven't spent a lot of effort auditing NTVDM since it's a frozen target and unlikely to be exploited", there's been at least two privilege escalation attacks on NTVDM in the past...
2682
Developer's Corner / Re: Python Language Annoyances
« Last post by f0dder on January 24, 2010, 07:39 PM »
First: this is about Python, not IDEs - I suggest a moderator separate this post, and the posts below, to a new thread:

It boils down to static typing versus dynamic typing; and the workflow that goes along with that.
No, it doesn't :) - you can do dynamic typing even if you have to predeclare variables (just declare them as "var" rather than a specific type). Even though I generally prefer static typing (catching bugs at compile-time = :-*), I do accept that dynamic typing can be useful (especially while prototyping stuff  - nice not having to bother with endless type conversions)... but not requiring variables to be predefined is a big mistake, IMHO.

And I also agree with mouser that it's also a big mistake depending on indentation for program structure... there's just too many ways this can screw you over, and it's not like it's a big hurdle to {enclose structural blocks}. These two things are items I find problematic (and downright stupid) in the core Python language.

Also, as mouser, I think the "__self__" for Python OOP looks kludgy, nasty and superfluous. This is more of an aesthetic issue though, and not something that bothers me majorly. Most importantly, it's not dangerous as the above two points.

Final gripe is probably the standard library, which feels... messy. Some stuff tries to look like POSIX C which is OK for a lot of stuff, while other parts look like WIN32 emulations. Of course one shouldn't re-invent the wheel all the time, but it would be nice with a somewhat more coherent standard library. There's also the issue of not everything being available everywhere, leading to perhaps having to do platform-specific code (probably less of a problem now than when I last bumped into it - and I can't remember the specifics anyway).

There's also been a fair amount of times where I've scratched my head pondering why a particular routine throws an exception instead of using a return code... IMHO exceptions should be for exceptional conditions, whereas return codes signal "failure" that can be "expected" (ie, a file-read that fails would be an exception, file-not-found would be return code) - but when to use exceptions (and when not to) is somewhat of a religious subject.

And most Python programmers do TDD, so bugs are found via testing and there is no need to compile so you just run and debuging realtime based on stacktraces (which are integraded into the python tools that are worthwhile using).
Even with that, I'm still a firm believe in my first two points... doing those properly costs you almost nothing, and will very likely end up saving you a lot more in the end.

But in spite of all the above, I still do like Python, and find that it's a pretty nice tool for a lot of things, where you'd spend too much time in C++ focusing on auxillary stuff rather than getting your job done.
2683
IMHO the best route is simply redirecting the file extension(s) wanted to an app of your choice (keeping a reference to the old association, so you can uninstall later). This gets your app invoked when a file of the type is ShellExecute()'d; the simple version could simple run your hardcoded .mov with the old media player (either by hardcoding, or by "emulating" ShellExecute and parsing the old filetype association). More advanced version would would parse commandline, and take action depending on some config file.

If "Image File Execution Options" simply hijacks "mediaplayer.exe -> myhandler.exe", aren't you going to get into an infinite loop when "myhandler.exe" tries to use "mediaplayer.exe" to redirect *.mov -> "myfile.mov"? :)
2684
I wouldn't expect the windows install to clean up System Volume Information, but I honestly don't know - it might not, it might, or it might remove snapshots but not other stuff in there... at any rate, there's something nice about knowing that you have a completely fresh filesystem, without the possibility of any old corruptions :)
2685
Developer's Corner / Re: Like gitHub, but better
« Last post by f0dder on January 22, 2010, 08:27 AM »
This is not a general discussion about Version Control systems (is it CVS or VCS or both?)
Sorry for doing a potential topic hi-jack :-[. Anyway, VCS=Version Control Systems (generic term), CVS=Concurrent Versions System (specific (and horrible) product).

I'll see if I can find the time to watch your video a bit later today - and welcome onboard :)
2686
General Software Discussion / Re: Anyone else tried UltraEdit for Linux (UeX)?
« Last post by f0dder on January 22, 2010, 08:18 AM »
I also like how they worded their Lifetime license: Upgrades for the Lifetime of the product. (Was that so hard?)
...as long as they don't suddenly introduce an UeX2 and brand that as a new product... :). And what's the distinction between upgrade and update?

A bit OT, but I'm a bit wary of "lifetime ugprades" - IMHO it's better to charge for major versions, discounted upgrade (from any previous version, and not time-limited), and developers honest enough only to introduce new major versions when substantial features are added.

Lifetime upgrades do seem to work for a few developers (like WinRAR), but there's always major outcry if income drops too low and lifetime upgrade policy has to be dropped... especially because it tends to be done in sneaky ways, like just renaming the product. I'm not a fan of annual subscriptions, since you never know how many updates you're going to get (but at least there's honorable developers like Aignes who keeps bugfix releases free, even if your update period has expired).
2687
Developer's Corner / Re: Like gitHub, but better
« Last post by f0dder on January 22, 2010, 08:05 AM »
One thing I really like about a traditional (usually-)server-based VCS like subversion is that once I commit, I know that I have a "backup" of my source code on the server... and since I work on multiple machines, having some centralized repository (and keeping it up to date!) is vital as well.

I've considered looking into distributed VCS, though - sometimes I need to do work where I don't have access to my centralized repo, and it'd be nice to still be able to do commits. Also, when I eventually open-source fSekrit, I'd really like to keep the repository on my own server, but push changes from there to a public repo (and only allow read-only access to the public repo). I've been recommended SVK in the past (by tinjaw iirc), but never had time (or enough incentive :)) to look at it.

Ah well, a general discussion of VCS is probably best suited for another thread.
2688
I haven't done imaging for years, but I've been contemplating getting into it again... also, when I do a clean reinstall, I do want the format to get rid of any leftover junk and have a fragmentation-free clean slate.
I'm not really sure what you mean by leftover junk...anything on the drive that is unwanted is delete-able (I assume I'm missing something).
System Volume Information :)

Clean installs are not fragmentation free (pagefile will be in 3-5 pieces etc.).
True - and iirc you can't even get rid of pagefile + hibernation files when doing unattended setups... iirc it's possible to edit the pre-configured hive files so they should be disabled pre-install, but at least one of them gets generated anyway (agian, iirc).
2689
Developer's Corner / Re: Random bmp generator
« Last post by f0dder on January 22, 2010, 07:45 AM »
There are just some things one must learn first before attempting to do other things.
wise words.
Indeed - just don't get discouraged because you can't do everything right from the beginning :)

Outputting random bitmaps isn't too hard, but you do need a fairly solid grasp of your basic language features to avoid messy code :). Also, the BMP file format is slightly messy - if you have a graphics editor that supports .raw files, you could start by generating that output format and work up your way from there.
2690
General Software Discussion / Re: Just discovered a HUGE annoyance in Windows 7
« Last post by f0dder on January 22, 2010, 07:39 AM »
I always thought that Windows only went into Sleep mode when there was minimal CPU activity, (eg. 0-10%) ?
Nope, depends on user input activity (keyboard/mouse, like Carol mentioned). It's possible to programmatically disable this, though, rather than sending mouse input events. Most media players do this to avoid sending the OS to sleep while watching a DVD :)
2691
Imaging is much faster than a reinstall - not only the OS installation process itself, but also the task of installing (and configuring!) third party apps. I haven't done imaging for years, but I've been contemplating getting into it again... also, when I do a clean reinstall, I do want the format to get rid of any leftover junk and have a fragmentation-free clean slate.
2692
And I just discovered that Allow Empty Subject is also updated to Tb3. I also had it installed in Tb2, but forgot to install it in Tb3...
Isn't that kinda a bad idea? Not only do you run a higher risk of checking antivirus software and spamfilters, but generally it's also kinda annoying to receive mails without a subject? :)
2693
What about having a logical data "partition" accessible through drive manager and admin interfaces/tools, thus solving the data corruption and portability issue in the same way as current partitioning schemes, but still showing them as one drive for the lowest common denominator masses who, as Stoic Joker put it above, "...tend to panic if they are faced with more than one of something"
This has been possible for quite a while (iirc introduced with Win2k?) - using NTFS junctions, you can mount a partition pretty much anywhere in the filesystem, and you can even do this from diskmgmt.msc without having to bother with console apps. It's still GeekBoyPowerHead though, each partition has to have a separate mount point (ie, it's not a "fusion" filesystem wrapper), and some applications don't handle them properly (mostly only a problem with some file managers and backup tools, though).

Stoic Joker: while I agree with a bunch of your points, keeping OS+apps and data on separate partitions (on same drive) still has a lot of value for several people. Disk images are smaller that way, and it's much easier to do a restore (or fresh reinstall) as well, when you can format your system partition without losing your data partition :)
2694
General Software Discussion / Re: encrypted AHK script
« Last post by f0dder on January 20, 2010, 11:13 AM »
You are right, but remember, locks are for honest people. Just compiling should do the trick for most of the users

I am sure nobody is trying  hard to hack my computer for  passwords or private info.  I just don't want to make it easy for anyone who might take a look.
Then simply compiling the script is going to be fine, as long as it's nothing too critical - casual users won't know how to dump process memory, and I dunno if there's any AHK decompilers around :)
2695
General Software Discussion / Re: encrypted AHK script
« Last post by f0dder on January 20, 2010, 10:39 AM »
You are right, but remember, locks are for honest people. Just compiling should do the trick for most of the users
True - I just wanted to point out that there's no way to ultimately secure the thing :)

Depending on what the password is for, and where the script might be lying around, this could prove to be a problem or not. Bank or remote system credentials? Oops! For something that's not critical enough that you can live with the password being snooped by somebody very determined, but still critical enough that you don't want people to snoop it, I'd suggest a two-stage approach:

1) keep an encryption key in the Windows protected storage - this key is only available when you're logged in to the system (which does also mean, though, that if as soon as you're logged in, the key could be stolen by malware or while you're away from the computer).
2) have the password in the script encrypted by the key from part #1.

This way, you could even leave your script uncompiled, as nobody would be able to use it without the key in the Protected Storage. You're still vulnerable to sniffing and all that, but at least you've removed a fairly large attack vector.
2696
IMHO it would be wrong to ask about locations for this kind of thing at system install time, since 99% of the users aren't going to need it. Power users can tweak it after install, and it might even be possible to set the locations for unattended setups.

I've got mixed about tje "My Whatever" folders - I kind thing the spaces look ugly, but it has the advantage of grouping the folders together. The biggest mistake was placing them by default outside of the documents folder... requiring you to remap each one individually. OTOH it would've been nice if MS had added these folders much much sooner, so more apps would use them... instead of each app storing it's stuff pretty much "whereever".
2697
General Software Discussion / Re: encrypted AHK script
« Last post by f0dder on January 19, 2010, 03:44 PM »
Doesn't matter what you do, if the script is going to send the password somewhere, it can be catched somehow. Sure, you can compile the script - people will just unpack or dump from memory. You can encrypt the password and decrypt it runtime, but that can be dumped from memory as well. There's nothing you can do about it, really :)

Well, you could store the password in Windows "protected storage", and retrieve it from there - the protected storage is automatically available when you're logged in. That does mean that if you're logged in, it's again easy as eating pie to get at the password.
2698
How does ConEmu compare to console? (guess I should just download ConEmu myself and have a go :P)
2699
Hm, when using MinimizeToTray+, is there a way to always have the ThunderBird icon in the tray (whether minimized or not), and change the icon when an account has new mail? Currently I get the always-there-no-matter-what icon (from MTT+), but can't find any options to merge the new-mail-available (from vanilla TB3) with it... heck, doesn't even seem like you can turn that notification icon off?
2700
General Software Discussion / Re: Just discovered a HUGE annoyance in Windows 7
« Last post by f0dder on January 19, 2010, 08:50 AM »
Compared to one checkbox and clicking OK, yes.  Plus it just worked all the time here and it's so bl**dy slow to access the shares under Win7 from other computers not running Win7, (obviously a subtle prod by MS to get you to upgrade all your computers).
"Simple sharing" in XP never worked very well for me in a non-homogenous LAN... definitely not as no-brainer as the simple read/read-write sharing you could do in Win9x... thus I always ended up doing things properly, with matching user accounts (and passwords!) on all the involved machines... which is a PITA if you've got a lot of machines and no domain controller.

"Slow to access on non-Win7 machines" - in which way? Slow transfer rates, or is it "just" the initial connection that takes some time to establish? Haven't experienced slow transfer rates, but (on multiple Windows versions) I've had slow initial-connect delays when user accounts and/or security settings didn't match across machines.
Pages: prev1 ... 103 104 105 106 107 [108] 109 110 111 112 113 ... 364next