3276
Living Room / Re: Request: Facebook Sharing
« Last post by KynloStephen66515 on October 16, 2010, 06:46 PM »How is it 'in your face'? The button is tiny lol
I have just noticed on the website, that there is an inactive "Purchase Now" button.-Stephen66515 (October 16, 2010, 04:18 PM)
Just click on it... or follow this link - http://bvckup.com/perks - and note the paragraph at the bottom-apankrat (October 16, 2010, 04:45 PM)
very nice to know.| App Name | Bvckup |
| App URL | http://bvckup.com/ |
| App Version Reviewed | 1.0.1.401 (Beta) |
| Test System Specs | 2GB RAM, 1.5TB HDD, 3.2DC Processor |
| Supported OSes | XP and Newer |
| Support Methods | Forum and E-Mail whilst in beta, perhaps more once fully release. |
| Upgrade Policy | No upgrade policy as yet. |
| Trial Version Available? | No limitations beta version |
| Pricing Scheme | On release: $19.95 for a personal license, $49.95 for a business license |
| Author Donation Link | Donate to apankrat, the Software Author |
| Reviewer Donation Link | Donate to Stephen66515, the Review Author |
| Screencast Video URL | Screenshots: http://bvckup.com/screenshots |
| Relationship btwn. Reviewer and Product | REVIEWER: No relationship between review writer and software author. |
Additionally, we are planning on issuing complimentary production licenses to all our beta users as a token of appreciation for helping us through the beta.
First
Bvckup's default mode of operation is to constantly monitor for changes. Once the changes are detected, it propagates them to the destination. This makes Bvckup a real-time backup utility.
Second
Its default copying mode is delta copying. Which is a fancy way of saying that it copies only changed parts of the file. This makes Bvckup fast, really fast. Lots more details on why and how along, mind you, with the list of drawbacks of this particular approach is available here - Delta copying, explained.
Third
Bvckup is not a two-way sync utility, it's a backup utility and it makes full use of the core difference. By default it assumes that the destination copy does not change between the backups. This allows it to not scan the destination directory to detect what changed, but rather rely on a locally saved summary from the last backup.
I hear you say "bah, so what?". Two words - NAS backups. Not needing to scan the destination directory eliminates a lot of network traffic, and it removes the need for spinning up otherwise idle disks on NAS devices. This adds up to some major time savings, on top of those delivered by delta copying.
---
Still with me? A bit more perhaps?
Fourth
The user interface. It is not about utilizing all 16 million colors in a single toolbar icon. Verbosity is not a feature, multitude of options is not a convenience. Properly designed user interface is all about simplicity and unobtrusiveness of the day-to-day interaction flow. A small example would probably go a long way here - Bvckup toolbar - but the only sure way to appreciate the UI polish is to take the app for a spin.
In fact Bvckup is as much about the UI design as it is about technical features. This bit explains how tightly these two are intertwined in case of Bvckup and how they shaped the design of the app - Short history of Bvckup.
Fifth
It is small and very lean. The installation package is about 480 KB. That's as much as a splash screen logo of some other backup productsThe app is written in C++ but without any extensive use of ++ features. It's much more like C with Classes... just like Bjarne envisioned before he got sucked into that bloody language design committee... but I digress.
Sixth
It is technically sophisticated. It doesn't copy just the file contents and the attributes, but also the timestamps, NTFS security and ownership information. If it finds a file that it cannot copy (locked, open, etc), it will try and use Volume Shadow Copying to work around the problem. If it is running under stripped-down administrator account on Vista or W7, it will prompt and offer to elevate itself to full admin privileges.
Also, and it's for true Windows connoisseurs only - it can run in elevated and filtered modes using the same executable. In fact, the even more amazing feat is that the very same executable can interact with Shadow Copying service on both XP and Vista; even though Microsoft explicitly requires linking to two different VSS libraries for these two platforms. Took a while to figure this one out, I can tell you that
---
A bit more...
Assorted bits and pieces of some interest - built-in software updates, linear regression ETA estimator, the built-in interactive Mini Guide shown on the first run, a bit of a logo and web design goodness and a bit about myself.
And lastly...
All beta versions are free, with some tasty perks in store for the beta users.

If you phone someone and talk to them, then you KNOW they got the message.-Renegade (October 16, 2010, 10:36 AM)
You're more likely to go to voicemail and still not know whether they got the message-4wd (October 16, 2010, 10:59 AM)
i think we used to have a button for this.. seems like it would be worth an experiment adding it back, at least for a short time -- something really low key and not at all in your face.-mouser (October 16, 2010, 06:21 AM)


But like WTF do people text that much about? Seriously. I just don't have that much to say I suppose.-Renegade (October 16, 2010, 12:33 AM)


Hi Folks,
In notice there is another recent thread about false positives, and it has really jumped to the forefront of difficulties. I recently ran the A-squared free scanner and Malwarebytes, and had with A2 a rather interesting false positive situation.
(My Malwarebytes and Avira are pretty happy with my system, this was my first attempt with Malwarebytes and A2 - Malwarebytes lived up to promise, Wilder's folks generally speak quite highly of the scan, and MB's findings were neatly confirmed by Avira, which popped up when MB hit its files .. I barely knew I had memory-resident scanning on from Avira.)
All the information (which you might find boring or interesting) can be found through this thread on EMSI, which links to my earlier thread on Gladiator, which is simply 3 posts of mine.
http://forum.emsisof...p;m=28183渗
Trace.File.SpyPc 8.0 - Trace.Registry.SpyPc 8.0 (look like false positives)
There seems to be a type of institutional ossification so that these companies - even the better ones like Emsi - do not know how to get false positives out of their system on the less-publicized cases. They look at each file in an atomistic analysis level, not caring about where it came from, how it is used, the history etc. Not thinking it through.
Incidentally I had to develop my technique for finding the source of the file, which some here might find interesting. Using file properties, you find when it was installed on your system, then searching (I searched folder creation dates in Total Commander) you can often find out when and where a file came on your system. It might be nice to have a program that helps with such issues more directly (if you use a snapshot installer it might be a start) but in the real-world my method probably will work in many cases. I never did check if registry entries are similar date-stamped.
Oh, I had to puzzle around a little bit on how to search, it seems like the search programs often do not work files based on placed-on-system date (whatever they call it, it is not the file creation date). That is why I switched to folder searching, then looked at individual files .. while I would have preferred a file search.
Incidentally, all this does not mean that we are unaware about problems like .dll-injection - you can't always tell just by the name of a file, one reason the executable protector programs are an interesting realm of protection .. most of all, know your own system reasonably well.
Oh, another point of special interest. After I traced down the file origin (totally legitimate) I found a McAfee (!) confirmation that this program installs this file.
http://www.siteadvis...m/downloads/8652414/
PC Inspector task manager 3.00.000 (pci_uk_taskmanager.exe)
Which makes me want to look around at the McAfee logs of programs I am thinking of installing. In general, if they have done this for the program. Do others do similar logs ? Dunno.
Shalom,
Steven Avery-Steven Avery (April 04, 2009, 06:53 AM)

| App Name | LogMeIn Hamachi² |
| App URL | https://secure.logmein.com/ |
| App Version Reviewed | 2.0.2.85 |
| Test System Specs | 2GB RAM, 1.5TB HDD, 3.2DC Processor |
| Supported OSes | Windows XP, Vista, 7 & All Server Editions (Linux Beta has been Launched) |
| Support Methods | Knowledge Base, FAQ, Phone and Ticket Support, Documentation, Forum |
| Upgrade Policy | Automatic and Manual Updates within the software |
| Trial Version Available? | Trial Version Available, limited to a mesh network configuration, and you will miss out on web-based centralized management - Not for Commercial Use |
| Pricing Scheme | $199.00 / year for the managed Version - Unmanaged version is Free (Limited) |
| Author Donation Link | Donate to apankrat, the Software Author |
| Reviewer Donation Link | Donate to Stephen66515, the Review Author |
| Screencast Video URL | https://secure.logme...achiTour/client.aspx |
| Relationship btwn. Reviewer and Product | REVIEWER: There is no Relationship between the Reviewer and The Software Developer(s) |
@sajman99 - thanks, great to hear you like it
@cranioscopical - thanks
@Armando -
One thing to keep in mind with regards to the copying speed is the following. With delta copying there's always a small chance that a change will be missed because a block of data happens to have the exact same checksum (or hash) after it is modified. Bvckup is using MD5 over moderately sized blocks (32 KB), so technically the probability of such event are really really small. However, just to err on the side of caution, Bvckup will copy every file in its entirety every N backups (8 by default). This is configurable in backup Properties, Backup What section, behind the Details button.
Glad you like the website. My hobby du jour - http://dribbble.com/players/apankrat
Regarding Hamachi - yeah, that was my baby too. It was wildly popular in gamers' circles, but I doubt it still is as LogMeIn repositioned it as an IT/sysadmin tool.-apankrat (October 15, 2010, 12:56 AM)

A flaw in the website of micro-blogging service Twitter is being used to pump out pop-up messages and links to porn sites.
Initially, users only had to move their mouse over the link - not click it - to open it in the browser.
Thousands of Twitter accounts have so far posted messages exploiting the flaw including Sarah Brown, the wife of former Prime Minister Gordon Brown.
Twitter said it was aware of the problem and would issue a patch soon.
The flaw which caused pages to open automatically appears to have been fixed.
This command - written in a programming language called Javascript - automatically directed users to another website, some of which contain pornography. Whilst the links are still there, users must now actively click on them.
Continue reading the main story
Related stories
Twitter unveils major redesign
Twitter hit by security breaches
The malicious links look like a random URL and contain the code "onmouseover".
"There is no legitimate reason to tweet Javascript," Graham Cluley, a researcher at security firm Sophos, told BBC News.
The code is being spread by worms, self-replicating and malicious piece of code.
Scroll lock is a key (often with an associated status light) on most modern computer keyboards. The key is not frequently used and therefore some keyboards lack Scroll Lock altogether;[1] Apple Keyboards do not have a Scroll Lock key at all (except for some obsolete ADB keyboards).
The Scroll Lock key was meant to lock all scrolling techniques, and is a remnant from the original IBM PC keyboard, though it is not used by most modern-day software. In the original design, Scroll Lock was intended to modify the behavior of the arrow keys. When the Scroll Lock mode was on, the arrow keys would scroll the contents of a text window instead of moving the cursor. In this usage, Scroll Lock is a toggling lock key like Num Lock or Caps Lock, which have a state that persists after the key is released.
Today, this particular use of Scroll Lock is rare. Only a few modern programs still honor this behavior, such as Lotus Notes, Forté Agent, and FL Studio. In modern GUI environments, scrolling is usually accomplished using means such as scrollbars or scroll wheels. Therefore, Scroll Lock can be regarded as a defunct feature in almost all modern programs and operating systems.