topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday November 13, 2025, 4:51 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 129 130 131 132 133 [134] 135 136 137 138 139 ... 264next
3326
Mini-Reviews by Members / Re: Interfaith Explorer (FREE) - Mini-Review
« Last post by IainB on December 29, 2013, 09:32 AM »
UPDATE 2013-12-30:
The initial Mini-Review was for Interfaith v2.2.1
I only just now updated it to Interfaith v2.4.0
There were also updates to the documents (for several faiths) in the database, which latter then needed re-indexing.
3327
Living Room / Re: Mid-range DSLR Camera Recommendations
« Last post by IainB on December 29, 2013, 02:27 AM »
I always thought of DSLRs as having been designed "for taking still pictures".
Changed my thinking a bit after reading this and looking at some of the videos:
More Than Just Photography: 10 Videos Shot With DSLR Cameras

The one on "Stone lithography" was pretty interesting.
3328
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on December 28, 2013, 08:40 PM »
Good demonstration of integrity:
An Open Letter to the Chiefs of EMC and RSA
Posted by Mikko @ 21:46 GMT
23rd of December 2013

An Open Letter to:
Joseph M. Tucci - Chairman and Chief Executive Officer, EMC
Art Coviello - Executive Chairman, RSA

Dear Joseph and Art,

I don’t expect you to know who I am.

I’ve been working with computer security since 1991. Nowadays I do quite a bit of public speaking on the topic. In fact, I have spoken eight times at either RSA Conference USA, RSA Conference Europe or RSA Conference Japan. You’ve even featured my picture on the walls of your conference walls among the 'industry experts'.

On December 20th, Reuters broke a story alleging that your company accepted a random number generator from the National Security Agency, and set it as the default option in one of your products, in exchange of $10 million. Your company has issued a statement on the topic, but you have not denied this particular claim. Eventually, NSA’s random number generator was found to be flawed on purpose, in effect creating a back door. You had kept on using the generator for years despite widespread speculation that NSA had backdoored it.

As my reaction to this, I’m cancelling my talk at the RSA Conference USA 2014 in San Francisco in February 2014.

Aptly enough, the talk I won’t be delivering at RSA 2014 was titled "Governments as Malware Authors".

I don’t really expect your multibillion dollar company or your multimillion dollar conference to suffer as a result of your deals with the NSA. In fact, I'm not expecting other conference speakers to cancel. Most of your speakers are American anyway – why would they care about surveillance that’s not targeted at them but at non-americans. Surveillance operations from the US intelligence agencies are targeted at foreigners. However I’m a foreigner. And I’m withdrawing my support from your event.

Sincerely,

Mikko Hypponen
Chief Research Officer
F-Secure
3330
Living Room / Re: Looking for the title of an Anime
« Last post by IainB on December 28, 2013, 01:21 AM »
I did a DuckGo search on "anime where island was a huge ship covered by vegetation".

Might be:
Thriller Bark
Thriller Bark Arc
Fillers Galore in Naruto Shippuden August 2011 Schedule | Saiyan Island

Looks like these could have been fun viewing.
3331
Thought these links might be of historic interest to computer buffs:
The CDC 6600 Architecture
Index of /CDC directory: http://ygdes.com/CDC/

I'd been looking all over for something like this a while back, and came up with nothing. Just happened to see it linked to in the Hacker News feed today.

This link to a PLATO online archive/emulation site might be of interest too: http://www.cyber1.org/
You can request a signon. The entire published catalog of courseware is there.

This page from 2010 is 404 now:
PLATO at 50
Jun 2 2010

This week, the Computer History Museum (CHM) in Mountain View, California will welcome a select group of Illinois alumni as it celebrates the 50th Anniversary of PLATO, a large-scale computer system for which numerous popular technologies were invented, including gas-plasma flat-panel displays and interactive touch screens, as well as many software innovations.

A co-production of the PLATO History Foundation (PHF) and CHM, the event will assemble in one place many of the key people involved with the creation of PLATO, for the first-ever public conference celebrating its history and accomplishments.

PLATO's list of innovations and seminal influences is considerable. Stemming from the University of Illinois in the 1960s and later marketed by Control Data Corporation, PLATO stands for "Programmed Logic for Automated Teaching Operations." Designed as a large-scale system to teach students nationwide, with more than 10,000 hours of courseware in subjects ranging from elementary math to air traffic control, the federally-funded system quickly became much more -- a virtual microcosm of today's online world, with a thriving online community predating today's social media by decades.

The PLATO@50 conference features a significant lineup of speakers, including U of I alumnus and professor emeritus Donald Bitzer ((BS' 55, MS'56, and PhD 60, Electrical Engineering), creator of PLATO and co-inventor of the flat-panel gas plasma display; and Illinois computer science alumnus Ray Ozzie (1979, Computer Science), Chief Software Architect of Microsoft who worked as a systems programmer on PLATO in the 1970's.
Illinois computer science alumnus Ray Ozzie

"Those of us who were fortunate enough to have been early users of the PLATO system got a sneak peak at what one day the internet would become," said Ozzie. "Don Bitzer believed that computers could have a far broader impact than just simply computing; that in fact they could transform how we learn. But beyond education, the unbounded creativity of its emergent online community caused PLATO's impact to be far broader than any of us could have ever imagined."

"It's one of the great, unsung stories in computing over the last half century, and we're proud to stage this event on site and online,"said John Hollar, president and chief executive officer of the Computer History Museum.

On Wednesday, June 2 at 7:00 p.m., CHM presents "PLATO@50- Seeing the Future Through the Past." The evening program will begin with a PLATO overview presented by Dear. Then John Markoff of The New York Times will moderate a panel featuring Bitzer and Ozzie. Daytime panels on Thursday, June 3 will discuss the culture of innovation fostered by Bitzer, PLATO hardware and software, online education, online multiplayer games, and PLATO's online community. For more information and event descriptions, visit http://computerhisto...listing/plato-at-50/.

About the Computer History Museum
The Computer History Museum is a nonprofit organization with a four-decade history. The Museum is dedicated to the preservation and celebration of computer history, and is home to the largest international collection of computing artifacts in the world, encompassing computer hardware, software, documentation, ephemera, photographs and moving images.

CHM brings computer history to life through an acclaimed speaker series, dynamic website, onsite tours, as well as physical and online exhibits. Current exhibits include, Charles Babbage's Difference Engine No. 2, Mastering the Game: A History of Computer Chess, and Innovation in the Valley -- A Look at Silicon Valley Startups. The online exhibit, featuring the Timeline of Computer History and over 600 key objects from Visible Storage, is found at: www.computerhistory.org.
______________________

Contact: Amy Jackson, Eastwick Communications, 415/609-2435.
3332
Coding Snacks / Re: re-map capslock function
« Last post by IainB on December 26, 2013, 10:28 PM »
As a possible solution to ALL CAPS accidents...
...
Tip - dispatching the CapsLock gremlin with Microsoft's remapkey.exe http://tips4laptopus...ck-gremlin-with.html
It refers to the Microsoft remapkey.exe utility.
...
Other keyboard mapping fixes are useful, but redundant if you use remapkey.exe, which works fine in Windows 2000, Windows XP, Windows Server 2003, Windows Vista, and Win7-64 Home Premium.
3333
Find And Run Robot / Re: 2.213.01 Hotkey mystery
« Last post by IainB on December 26, 2013, 10:21 PM »
...I've verified it's Pale Moon. ...
Not surprised. I tried out Pale Moon and rapidly uninstalled and deleted it before giving it a full trial. It was doing stuff by default in the background that I didn't know or approve of up front, so I couldn't trust it. Plus, it didn't seem any faster than FF and didn't seem to work nicely with some of my existing applications or add-ons - e.g., it grabbed hooks to hotkeys that I wanted to use. Nothing but trouble.
I only used it for a very short time - an hour or two - so I didn't really learn enough to write a Mini-Review about it.
3334
Mini-Reviews by Members / Re: Tray Management Utilities Mini-Review
« Last post by IainB on December 26, 2013, 07:33 PM »
@rjbull: Ah, thanks, I knew there was a DOS command that could do it, but had forgotten what it was. I think I might put that batch into my AHK-L  file and remove Restart Explorer (one less program).
That is a powerful DOS command, per the taskkill /? enquiry:
Code: Text [Select]
  1. TASKKILL [/S system [/U username [/P [password]]]]
  2.          { [/FI filter] [/PID processid | /IM imagename] } [/T] [/F]
  3.  
  4. Description:
  5.     This tool is used to terminate tasks by process id (PID) or image name.
  6.  
  7. Parameter List:
  8.     /S    system           Specifies the remote system to connect to.
  9.  
  10.     /U    [domain\]user    Specifies the user context under which the
  11.                            command should execute.
  12.  
  13.     /P    [password]       Specifies the password for the given user
  14.                            context. Prompts for input if omitted.
  15.  
  16.     /FI   filter           Applies a filter to select a set of tasks.
  17.                            Allows "*" to be used. ex. imagename eq acme*
  18.  
  19.     /PID  processid        Specifies the PID of the process to be terminated.
  20.                            Use TaskList to get the PID.
  21.  
  22.     /IM   imagename        Specifies the image name of the process
  23.                            to be terminated. Wildcard '*' can be used
  24.                            to specify all tasks or image names.
  25.  
  26.     /T                     Terminates the specified process and any
  27.                            child processes which were started by it.
  28.  
  29.     /F                     Specifies to forcefully terminate the process(es).
  30.  
  31.     /?                     Displays this help message.
3335
Mini-Reviews by Members / Re: Tray Management Utilities Mini-Review
« Last post by IainB on December 26, 2013, 10:22 AM »
...Basically my Win7 native system tray stopped working as it's supposed to. ...

If you have set the tray icons to be displayed by default, and yet some icons are still sometimes not displaying, then this is a recognised Win7 bug, to which a common workaround is to restart Windows Explorer.
You could do that (stop then start Windows Explorer) from the Windows Task Manager, or (better) use a utility called Restart Explorer:

how do you restart windows explorer?  The only way i know how is to crash it.

Open Task Manager
End explorer.exe process
File->New Task and enter explorer.exe

Or, try this: Add Restart Explorer to Context Menu which does the same thing in a more user-friendly manner.
3336
...I just keep getting annoyed at the pop ups "do you want to install the updates"...
What it needs is a "silent" switch.
In about:config there is an app.update.silent setting - not sure whether that would fix it.

Otherwise, I couldn't find anything to help stop this - did a DuckGo search and browsed through about:config settings.
Then I found that you might be able to block the popup with ABP (AdBlockPlus) with "select an element to hide". Not tried it out though. To test it, you would need to set it when the popup occurs.
3337
last stable ß update and stopped allowing FF to automatically update.
1. You know Iain is HardCore when he actually used the Beta symbol!
2. How do you stop Firefox (and clones!) from automatically trying to update?

1. "beta" --> "ß":
I have an AHK-L script that types the ß symbol:  :*:beta::ß

2. Getting control over auto-update of ß updates:
(a)
From: http://superuser.com...irefox-from-updating
Type about:config in the awesome bar and search for the key app.update.channel. Change the value to release to get the stable releases only.
___________________________

(b) Go to menu Tools | Options | Advanced | Update and select "Check for updates, but let me choose whether to install them".
3338
UPDATE 2013-12-25 1142hrs: - just for the record in this thread I started:
The fact of Firefox crashing after I had installed IE11 was, it seems, just a coincidence. I kept FF on its last stable ß update and stopped allowing FF to automatically update. After skipping 3 updates this way, I allowed the 4th one, and it was stable. Subsequent updates have been stable also.
Meanwhile IE11 has been running solid/stable all the time.
3339
Find And Run Robot / Re: EInvalidOp Error!
« Last post by IainB on December 24, 2013, 05:35 AM »
I'm guessing there is a file in that directory that has a p in its name, that is somehow "evil" :)
Can you check the files in that folder, and look for one that might have a messed up date stamp, or messed up icon, or something else in it?
If there are a lot of files, you might try moving half of them out of their until you find the offending file (assuming i'm right that it has to do with a file that is somehow odd).
Just a couple of thoughts:
  • 1. NTFS ADS (Alternate Data Stream):
    Is it possible that there is NTFS ADS (Alternate Data Stream) content peculiar to/attached to the file named F:\Scripts\headphones.bat , and that there is something wrong/corrupt with the data in the data stream?
    Any ADS content is lost if a file is transferred to a non-NTFS medium - e.g., it would not necessarily copy into a .zip file unless you had specifically bundled it with something like xplorer² "Bundle to go" function.

  • 2. Start the file afresh:
    Have you tried deleting or (better) expunging the file F:\Scripts\headphones.bat, and recreating it afresh, and then seeing if the error repeats?
3340
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by IainB on December 21, 2013, 03:59 AM »
I think I had read this before somewhere, but it probably belongs a s a note here - it's from Ars Technica:
(Copied below sans embedded hyperlinks/images.)
Report: NSA paid RSA to make flawed crypto algorithm the default
The NSA apparently paid RSA $10M to use Dual EC random number generator.
by Peter Bright - Dec 20, 2013 11:14 pm UTC

Security company RSA was paid $10 million to use the flawed Dual_EC_DRBG pseudorandom number generating algorithm as the default algorithm in its BSafe crypto library, according to sources speaking to Reuters.

The Dual_EC_DRBG algorithm is included in the NIST-approved crypto standard SP 800-90 and has been viewed with suspicion since shortly after its inclusion in the 2006 specification. In 2007, researchers from Microsoft showed that the algorithm could be backdoored: if certain relationships between numbers included within the algorithm were known to an attacker, then that attacker could predict all the numbers generated by the algorithm. These suspicions of backdooring seemed to be confirmed this September with the news that the National Security Agency had worked to undermine crypto standards.

The impact of this backdooring seemed low. The 2007 research, combined with Dual_EC_DRBG's poor performance, meant that the algorithm was largely ignored. Most software didn't implement it, and the software that did generally didn't use it.

One exception to this was RSA's BSafe library of cryptographic functions. With so much suspicion about Dual_EC_DRBG, RSA quickly recommended that BSafe users switch away from the use of Dual_EC_DRBG in favor of other pseduorandom number generation algorithms that its software supported. This raised the question of why RSA had taken the unusual decision to use the algorithm in the first place given the already widespread distrust surrounding it.

RSA said that it didn't enable backdoors in its software and that the choice of Dual_EC_DRBG was essentially down to fashion: at the time that the algorithm was picked in 2004 (predating the NIST specification), RSA says that elliptic curves (the underlying mathematics on which Dual_EC_DRBG is built) had become "the rage" and were felt to "have advantages over other algorithms."

Reuters' report suggests that RSA wasn't merely following the trends when it picked the algorithm and that contrary to its previous claims, the company has inserted presumed backdoors at the behest of the spy agency. The $10 million that the agency is said to have been paid was more than a third of the annual revenue earned for the crypto library.

Other sources speaking to Reuters said that the government did not let on that it had backdoored the algorithm, presenting it instead as a technical advance.

RSA is your friend, too. So many and such fine friends we have!     ;D
3341
Update 2013-12-21:
Added note for v1.16 (latest).
See list of new features by version: http://calibre-ebook.com/whats-new

Some potentially very useful new features, Still exploring them.
3342
Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content]
« Last post by IainB on December 19, 2013, 10:16 PM »
A small selection of quickies...

SCOTTISH  WEDDING
At the Scottish wedding reception the D.J. yelled...
"Would all married men please stand next to the one person who has made your life worth living."
The bartender was almost crushed to death.

SEX
Condoms don’t guarantee safe sex anymore …..
A friend of mine was wearing one when he was shot by the woman’s husband.

New Book
A man goes into Chapters and asks the young lady assistant, "Do you have the new book out for men with short penises?"
She replies,  "I'm not sure if it's in yet."
"That's the one; I'll take a copy…"

Poor Lance Armstrong
I think it is just terrible and disgusting how everyone has treated
Lance Armstrong, especially after what he achieved, winning 7 Tour de France races, whilst on drugs.
When I was on drugs, I couldn't even find my frig’n bike.

Drive By
A guy broke into my apartment last week.
He didn’t take my TV, just the remote.
Now he drives by and changes the channels.

Sick Bastard!!

The Agony of Aging
On the morning that Daylight Savings Time ended I stopped in to visit my aging friend. He was busy covering his penis with black shoe polish.
I said to him, "You'd better get your hearing checked - you're supposed to turn your clock back".

Pregnant Prostitute
Doctor asks pregnant prostitute, "do you know who the father is?" 
"For f.... sakes, if you ate a tin of beans would you know which one made you fart?"

EASYJET
Paddy calls EASYJET to book a flight.
The operator asks, "How many people are flying with you?"
Paddy replies "I don't know! It's your bloody plane!"
_____________________________________
3343
Living Room / Re: Interesting "stuff"
« Last post by IainB on December 19, 2013, 09:38 PM »
How Halley's comet is linked to a famine 1,500 years ago
Aka circa 520 AD?!
______________________
Yes, but the clue is that it's from http://www.nbcnews.com/science/, where the pseudo-scientific dogma might not like to admit to the existence of "AD" (Anno Domini) and its implications...
(That's intended as a joke, by the way.)
3344
Mini-Reviews by Members / Re: Malwarebytes FREE and PRO - Mini-Review.
« Last post by IainB on December 19, 2013, 12:08 AM »
A couple of cautionary tales on the MWB blog Malwarebytes Unpacked:
Another Day, Another PUP
Amazon Invoice Malware Spamrun Continues
3345
Living Room / Re: You're a sly one. Mr.........Disney?
« Last post by IainB on December 18, 2013, 07:01 PM »
First it was Orwell's 1984. Now it's a Christmas movie? ...
This would seem to be unsurprising.
3346
Living Room / Re: Interesting "stuff"
« Last post by IainB on December 18, 2013, 06:21 PM »
@TaoPhoenix: About that "“you wouldn’t download a car,”, reminds me of:
(Copied below sans embedded hyperlinks/images.)
Weird Al Yankovic Wiki - "Don't Download This Song"

"Don't Download This Song" is the first single from "Weird Al" Yankovic's 12th studio album Straight Outta Lynwood. The song was released exclusively on August 21, 2006 as a digital download. It is a style parody of "We Are the World", "Hands Across America", "Heal the World" and other similar charity songs. The song "describes the perils of online music file-sharing" in a tongue-in-cheek manner.[1] To further the sarcasm, the song is freely available for streaming and download (legally) in "DRM-free" MPEG fileformat at Weird Al's MySpace page, as well as his Youtube channel...

...On MTV's MTV Music site where this music video is available, they have censored the names of the file sharing programs in the song, such as Limewire or KaZaA.[6] Weird Al explained that MTV contacted him and told him they would not air his video if the references to the filesharing programs were not in some way removed, so he "made the creative decision to bleep them out as obnoxiously as possible, so that there would be no mistake I was being censored."[7]
3347
Living Room / Zork is online, via your browser.
« Last post by IainB on December 18, 2013, 05:33 PM »
^^ Zork is online, via your browser.
3348
Living Room / Re: Dungeons/Zork map - here's an image of it.
« Last post by IainB on December 18, 2013, 02:04 AM »
Yay, looky this! http://thcnet.net/zork/index.php
Found here:
(Copied below sans embedded hyperlinks/images.)
Play One Of The Most Famous Adventure Games Online
Updated 15. December 2013 - 21:51 by rob.schifreen

In the days before photorealistic graphics, multi-terabyte hard disks and seemingly endless access to RAM, programmers had to come up with games that were innovative and challenging rather than merely beautiful.  In the 1990s, one of the best-known was a text adventure game called Zork.  No panning and zooming around video-quality worlds here - everything needed to be firmly installed in your imagination.

If you yearn for those days, or just want to see what they were like, there's a version of Zork running in a form that you can play online for free in your web browser.  It's still all text-based, and it'll certainly make you think.  About how to explore the online world it creates, and just how far technology has come.

See http://thcnet.net/zork/index.php to start playing.
3349
Living Room / Re: PB&J with Potato Chips... One of Nature's Most Perfect Foods[
« Last post by IainB on December 18, 2013, 01:22 AM »
In the ampur Na-pho in Thailands North East changwat of Kong Kaen, if you are lucky you can get taken on a hunt for "epom" (pronounced "eepom"). These are a type of nocturnal cicada of 2 to 3 inches in length that have narrow windy burrows that they dig in the soft soil of the region, usually in forested areas. At nighttime, they come out of their burrows and climb the trees, and then start their "singing". The song of the epom sounds like a small, high-pitched buzz-saw and is incredibly loud/noisy - loud enough to keep you awake if it is outside your bedroom window.

The hunt is in daylight, because you know that in daytime they are hiding underground. All you have to do is spot the opening to their tunnel (which they usually conceal quite well to the untutored eye), and then dig along it with a small digging implement, until you find the epom at the end of its tunnel. It requires skill to do this, and care must be taken not to kill the epom or chop it in half with the digging implement.

Once you have caught your epom, you break its back legs and drop it, alive, into a bucket - the idea being to cripple it and thus prevent ir from jumping out of the bucket and escaping. You continue until you have about half a bucket-full of live writhing epoms. Then you take them home, and prepare them for cooking. This is done by ripping off the insect's head and pulling out its guts, which are joined to its head. The epom are then rinsed with water to get any dust off, and cooked in a frypan with one or several of garlic, salt, black pepper, chillies, vegetable oil, soy sauce.
Placed on a plate, people then help themselves to the yummy nibbles so prepared. The taste/texture is not unlike fried grasshopper or locust - sort of a nutty flavour.
I've only eaten them once, and felt sorry for their suffering. We generally don't like to empathise with the creatures we harvest or farm and kill for food, and would prefer not to think about it.
3350
Living Room / Re: PB&J with Potato Chips... One of Nature's Most Perfect Foods[
« Last post by IainB on December 18, 2013, 12:35 AM »
"Balut" (also known as "Pateros itik") are incubated Mallard duck eggs with a developed embryo of (typically) 17 to 19 days. The eggs are then boiled and eaten with or without salt. (Yummy!)
Balut is a Filipino delicacy that commands a good price. The nearly-developed and crunchy insides are eaten in the shell.
This food is considered to be a high-protein, hearty snack, and some people (not me, you understand) believe it to be an aphrodisiac - but I couldn't possibly comment.
Balut are mostly sold by street vendors in the regions where they are available, and are often sold together with "chicharon" - thin slices of fried pork skin or fat. (Yummy!)
Pages: prev1 ... 129 130 131 132 133 [134] 135 136 137 138 139 ... 264next