topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday March 19, 2026, 8:57 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 148 149 150 151 152 [153] 154 155 156 157 158 ... 246next
3801
T-Clock / Re: T-Clock 2010 (download)
« Last post by Stoic Joker on August 05, 2011, 10:33 AM »
Why would you be running T-Clock elevated??

i ran TClock in the elevated state to see if that solved the problem of the calendar not appearing but it didn't. then i tried after disabling UAC, upon which the calendar appeared. i still don't know what to make of it. any suggestions?

Well... Much as I'd love to say something brilliant ... I'm stumped.

I tried running it elevated here, and nothing worked (calendar, context menu, etc.). Damn Peculiar That Are!

But it shouldn't (ever) require elevated/administrative rights to do anything (it was designed not to). Maybe try double checking the mouse click settings, and/or setting them to a different action so we can see which part of what is failing.

(Long Shot) If you check properties on the clock.exe and tclock.dll files, do either of them show an UnBlock button?
3802
Living Room / Re: Building a home server. Please help, DC!
« Last post by Stoic Joker on August 05, 2011, 10:13 AM »
^ Um...actually the data chunks and parity info are distributed among all the drives in a RAID-5  array by the controller. There isn't a unique "parity drive" per se AFAIK.  :)

Okay, I've spent a bit too much time spoon feeding end users and my brain is turning to mush (brightly colored hand puppet stuff...).


Never the less, the parity info is stagged between the drives. So if something is written to the array it will be striped between 2 of the drives, and a third drive will catch the parity info. for any given write operation. Which goes back to my original quandary ... Where is the extra per-disk write that would possibly cause it to prematurely fail?
A gets half
B gets half
C gets parity

All are on separate physical disks. So other than controller traffic (that's a given) I don't see where anything is really getting doubled-up...At the per disk level. The parity section of each disk isn't going to take any more or less of a hit than its corresponding data segments. So it's not like it's being subjected to exhaustive localized rewrites that are going to "burn-a-hole" in it.
3803
Living Room / Re: Building a home server. Please help, DC!
« Last post by Stoic Joker on August 05, 2011, 07:09 AM »
Raid-5 (and other "big storage" schemes) would be silly on SSD until their storage capability goes massively up. The added writes of raid-5 is a real concern,

Okay, this has been bugging me. What added writes?? RAID5 is striping with parity...So 2 of the drives split the writes and each get half the file. Parity is written to drive 3 which is (in that config) its sole purpose for existing. What's extra? Traffic on the controller?

I'm not arguing the point, just trying to understand it.
3804
T-Clock / Re: T-Clock 2010 (download)
« Last post by Stoic Joker on August 05, 2011, 06:58 AM »
Thanks for the program however after looking I cannot figure out how to display the calendar.

i'm having the same problem as darkhelmet. double-clicking does nothing even though i run it on an 'elevated' status. however if i disable UAC, then the calendar appears.

 :huh: Why would you be running T-Clock elevated??

As long as the Left Button->Double Click action is set to Show Calendar on the Mouse Tab, it should just pop open the (T-Clock) calendar. I never have figured out how to hook the default Win 7 calendar yet - But I do revisit the idea from time to time.
3805
General Software Discussion / Re: File system monitoring utilities?
« Last post by Stoic Joker on August 04, 2011, 03:30 PM »
Just keep an eye on the logfile size and do some periodic housekeeping. Because you'll be amazed how quickly some of those logs can grow depending on the level of activity and degree of detail they're collecting.

Large but fixed size circular log is usually the safest balance. Other wise you have an off day and the server shuts down with a can't log X error. Panic ensues... (hehe)
3806
Are you Zaphod Bebelbrox?
Humm, didn't he have multiple heads rather than arms?

Yes to both, he had 2 heads, and 3 arms. The third arm was added for the sole purpose of cheating at a game whose name I forget.
3807
General Software Discussion / Re: File system monitoring utilities?
« Last post by Stoic Joker on August 04, 2011, 01:24 PM »
Granted it not quite as glamorous, but audit tracking for various events/access types is built into Windows. And the security logs are searchable and can be filtered to only show what you're after at the moment.

Dave deletes file X. Audit tracking can be configured to show that (and when etc). Then you can simply filter by Dave and quickly see what else they were up to.

http://support.microsoft.com/kb/300549


Just a Thought.
3808
General Software Discussion / Re: Realtime backups
« Last post by Stoic Joker on August 04, 2011, 11:34 AM »
I've always felt that a real-time backup, really isn't a backup at all. It's a second copy of what just happened.

Here at the office I have too much data on my workstation to run through the rest of the offices nightly backup. So I use the built-in Win 7 backup to do nightly backups to one on the servers temporary storage RAID volumes. I don't remember if Vista has the newer Win7 style backup options...But it's worth exploring if it does.
3809
General Software Discussion / Re: How necessary is the UAC in Windows 7?
« Last post by Stoic Joker on August 04, 2011, 11:19 AM »
:greenclp: Well ya ain't gotta smack me with a fish :trout: I'll drink to that! :drinksmiley: :greenclp:

 :D
3810
General Software Discussion / Re: How necessary is the UAC in Windows 7?
« Last post by Stoic Joker on August 03, 2011, 07:09 PM »
I haven't found that the security software I currently use "only serve to slow the machine down (typically to a crawl)."  Not at all.  My computer is delightfully fast and responsive.  And WinPatrol Plus is not on my machine "just to monitor System files."  I use it primarily for a variety of other functions; it happens to also offer the option of protecting the Internet HOSTS and key System files.  Again, I haven't noticed that selecting this option negatively affects the performance of my computer.

Okay, I was being a bit harsh with the broad brush ... But I'm sure you've seen the type of baby-sitter security suite infested machine I was eluding to. I just wasted 6 hours onsite today because of a client's machine that was a few generations past it's prime, that had a full suite of crippleware running at full blast on it. There is never a truly effective way of disabling these silly things ... So you're always stuck with it unless you're willing to eat the time to remove and reinstall it.

Fortunately for the client it was a contract job. Or the bill would have been close to the price of a decent new machine. I got home an hour late, and the job still ain't done. *Joy*...

 :D
3811
The short and implementable-in-real-life answer: cover your eyes, and run away screaming, arms flailing.

  :huh: :-\ ...How do you flail and cover your eyes at the same time?

Are you Zaphod Bebelbrox?
3812
General Software Discussion / Re: Collaborative excel
« Last post by Stoic Joker on August 03, 2011, 06:50 AM »
Microsoft has a good introductory article that gives you what options are available for various levels of "collaborative" use of an Excel workbook. Link here. This is where I point my clients initially when the question comes up. Most are interested in the section that's headed: Allowing multiple users to edit a workbook simultaneously. Scroll down about midway to find it.

Cool ... Just sent that link to a client, Thanks!
3813
General Software Discussion / Re: How necessary is the UAC in Windows 7?
« Last post by Stoic Joker on August 03, 2011, 06:35 AM »
This may be a very silly question, but it has to be asked :):
if I dont use a password (admin account) is it all a waste of time anyways?

Yes. But if you wish to avoid having to type in a password every time it boots, you can use the old control userpasswords2 trick to set it to auto-login with a default account.

Auto-Login to Windows 7

Just don't forget the password or you may get locked out if you lock the console with Win + L.
3814
General Software Discussion / Re: How necessary is the UAC in Windows 7?
« Last post by Stoic Joker on August 02, 2011, 10:29 PM »
Real-time scanners & AV software only serve to slow the machine down (typically to a crawl). And in so doing can only catch what they (have signatures for) know about. Anything new that comes down the pike is a heuristics crap-shoot.

The only truly effective method (outside of common sense), is reduced permissions. Because the bugg will only have as much permission as you do. So if you don't have permission to break the machine... Neither. Does. The. Bugg.

You have an entire application running full time, grinding up CPU cycles, Just to monitor "System Files". System files that would be completely untouchable by a standard user account ... Which requires 0 CPU time.

The only "safe" trade-off for those that persist in doing day-to-day activities with administrative rights, is UAC. But it must be allowed to isolate itself from you, to be able to defend the machine effectively. Other wise if you're both sharing the same desktop/session it ends up being the same ineffectively silly light speed foot race to the kill switch that you have with AV software. Bugg comes in, slits the AV's throat, and sets up shop. I see this cycle repeated again and again.

Lady brought a laptop in today; on it she had a veritable laundry list of security applications, UAC set to the max, and 3 root kits. She lacks the most important common sense layer of security and tends to click on whatever gets her to where she wants to be the quickest...Because she is "Protected". By Elfin Magic I guess... *Sigh* ...Must be where the term Sheeple came from. :)
3815
Living Room / Re: Building a home server. Please help, DC!
« Last post by Stoic Joker on August 02, 2011, 05:10 PM »
...Boom? Boom does not sound like a good conclusion to any project that does not involve explosives.

 :D
3816
General Software Discussion / Re: How necessary is the UAC in Windows 7?
« Last post by Stoic Joker on August 02, 2011, 05:06 PM »
Microsoft explains that because the UAC dialog box isn't on the secure desktop with the setting I suggested, "other programs might be able to interfere with the dialog's visual appearance.


Um... If it's not on the secure desktop (e.g. isolated secondary session), it's not secure, period. Because under attack, when the bugg is trying to get in, it can simply respond to the prompt for you.

If everybody is on the same desktop (e.g. session), then whoever is quickest wins (and the software will be). It really is just that simple.

This is a small security risk if you already have a malicious program running on your computer."  The risk is obviously more than with a higher setting, but I don't think I'd say that UAC is rendered "pretty much useless" with the lower setting.

The question is can you keep it out when it comes-a-knocking. The answer - in that configuration - is no.
3817
I mainly use my phone to make phone calls ... because, it's a phone.

Yeah... I'm just not that popular. :)

Me either.  The only reason that I have a cell phone is for emergencies.  Most people just aren't important enough to need 24/7 connectivity that a cell phone brings.  It's more for convenience than a need, truthfully.

 :Thmbsup: :D :Thmbsup:

For me it's a work issue; I got my first cell back when I was freelancing. Now it's just for clients and the office to run me ragged.

The wife calls now and then too ...  Or send the occasional how's your day going text. That's about it.
3818
Living Room / Re: Intelligence and Internet browsers
« Last post by Stoic Joker on August 02, 2011, 02:52 PM »
The folks that got us to where we are today all graduated with the highest of academic honors - and rather less obviously - Apparently not an ounce of common sense among'em

Sorry to drift the thread, but that statement makes an implicit assumption that those folks have the same goals as 'the rest of us'.  The guy who makes a huge mess for everyone else, but ends up with millions (or billions) in his bank account, might not care so much about the mess.



Exactly. The knowledge was power wielded un-wisely.

Which ultimately isn't very intelligent...despite the GPA. ;)
3819
I mainly use my phone to make phone calls ... because, it's a phone.

I have used it to browse the web (well here actually), on the odd occasion. Ad I'll even admit to sending a text message now and then. But to me - Bells & whistles aside - It's a phone.
3820
Living Room / Re: Building a home server. Please help, DC!
« Last post by Stoic Joker on August 02, 2011, 02:39 PM »
And don't be fooled by the "live rebuild" argument that says you can hot-swap and rebuild without taking your array offline. Yes, it can be done. But it's slow, and frustrating, and it drags server performance down so much  that it's not practical for general purposes.

I've actually never had a problem with it. If the server is under high (steady 50+% capacity) load, I can definitely see that as an issue. but for a SMB it just keeps them running, instead of being down for the duration of a full restore or (eek) Brick-Level rebuild. I've actually hot-swapped a dead drive (out of a 136GB RAID5 SCSI array) on our Exchange server, and let it rebuild during business hours ... Without anyone noticing. (Dell PowerEdge 1800)


Over time, I've begun to see the space limitations on physical drives as a blessing in disguise. The bigger the drive, the more disorganized they seem to become. And thanks to disk index/search utilities like Everything :-*, most people can get away with it. Fling your stuff in folders - and put folders within folders out the kazoo - and screw organization! Just use a utility to root out where you put something when you need it.
 (see attachment in previous post)
It works. But it's sloppy. And it's not a generally good way to handle file organization.

FWIW, I tend to assign specific drives specific types of data. That allows me to more easily setup backup and sync routines on a case by case basis. Critical files and directories may get mirrored in real time. Other directories may require version control. Others may get simple backups. Some don't get copied or backed up at all since they're kept for convenience and easily replaced with newer versions should they ever be lost. (Linux distro ISOs or Microsoft's WSUS files are a good example of that.)

Simpler is better when it comes to drive and directory setups. Especially on servers. And extra especially when you're as simpleminded as I am about these things. ;D


Now this I totally agree with! I also like to keep things that fragment quickly (temporary files, logs, user folders) segregated from things that almost never fragment (long term archives, install images, reference materials (we have 17GB of service manuals)). And both of them away from databases that grow slowly and are best kept in one piece.
3821
Living Room / Re: Intelligence and Internet browsers
« Last post by Stoic Joker on August 02, 2011, 12:00 PM »
Just look at the economy. The folks that got us to where we are today all graduated with the highest of academic honors - and rather less obviously - Apparently not an ounce of common sense among'em

5 Apples - 100 Apples = A Profit How???
3822
Living Room / Re: Building a home server. Please help, DC!
« Last post by Stoic Joker on August 02, 2011, 11:48 AM »
Spanning & Striping are both incredibly dangerous for the same reason. If one disk fails (or just has a real bad day), everything on the array is gone. Now you have to rebuild the array and restore all of the data that isn't on it any more, from somewhere. So if it's a 4TB array and you have good backups, you can get everything back up and running. Sure. In a day or so...

Or you can just not be down (RAID5). Blow a drive, you're still running (instead of scrambling for backups while trying to keep your heart rate under 150). Replace the drive, let it rebuild itself, go on with your day. Sure, If something else fails during the process you get to have a catastrophic failure anyway. But, that's what backups are for.

The point is a single disk failure shouldn't automatically cut you off from all your data, until such time as the primary system can be brought back on-line. Because if you're not physically there (due to being at work/out of town) when the box goes poof. You're stuffed for the duration if you don't have a little on-the-fly redundancy cushion.
3823
Living Room / Re: Intelligence and Internet browsers
« Last post by Stoic Joker on August 01, 2011, 10:16 PM »
Asimov was a wise man.
3824
Living Room / Re: Intelligence and Internet browsers
« Last post by Stoic Joker on August 01, 2011, 06:58 PM »
Me thinks ^that^ needed said ... Good man!

 :Thmbsup:
3825
Living Room / Re: A tad paranoid when it comes to installing software?
« Last post by Stoic Joker on August 01, 2011, 03:17 PM »
I don't recall C++ ever needing additional files, unless it's an MFC app (which I never use).

While I'm not sure about the Delphi part, I have seen several mainstream production applications (like Sage BusinessWorks) that were created using Borland's (CBuilder) IDE that insisted on dumping a ton of .bpl files in the system32 folder.

But it's my understanding that these .bpl (Break Point Library) files are only used for debugging and should never under any circumstances be used/required by release version production software. So this would be a developer boo boo as I understand it.

Ummm... no.  BPL doesn't stand for break point library.  It stands for Borland Package Library.  They can either be compiled into the executable, or separated out as supporting assemblies.  And the only reason to separate them out is if you're going to load your own packages at run time.  See http://edn.embarcadero.com/article/27178.

Hm... Okay, that makes a bit more sense (it's been a few years since I last delved into it). Although it is still a bit annoying to see the installer spewing these things into the system folder. And it makes it easier to crack the application when they're done that way.


They are the same as the atl/vc libraries, and contain system level functionality.  But they can be for the most part compiled into the executable, and in the case that they can't, they can be put alongside the application.  This is a practice of some developers, just as you could do the same in .NET.  It's not a difference or a weakness in the language, but the developer and how they distribute.

So they are Borlands specific .lib type libraries?

I gave up on Borland years ago and went with MSVS C++ as it fit better with (my budget) what I was doing/looking for at the time.
Pages: prev1 ... 148 149 150 151 152 [153] 154 155 156 157 158 ... 246next