topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 17, 2025, 4:11 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 149 150 151 152 153 [154] 155 156 157 158 159 ... 310next
3826
Not sure on XP April as I don't seem to have any restore folders (I think they were automatically deleted when I stopped using System Restore). Certainly all the restore point data is deleted when you stop System Restore on XP.
3827
Living Room / Re: is someone stealing my bandwidth?
« Last post by Carol Haynes on January 09, 2008, 04:19 AM »
Actually if anyone is stealing the bandwidth they won't see a noticeable difference in internet connection, except maybe for streaming video.  The speed increase (est at 5X) is for data transfer within the network.  Plus, G has a shorter range so at more than about 100 feet the signal degrades to about the same as B.

If it is 802.11n the broadcasting range is much larger (Netgear RangeMax) - I now get full access speeds without network boosters around my home (which has thick limestone walls and internal block walls) with b and g networks previously I got very poor coverage. My ISP supplied a free 11g router/modem when I signed up but I can't get any signal upstairs at all.
3828
Living Room / Re: is someone stealing my bandwidth?
« Last post by Carol Haynes on January 09, 2008, 04:14 AM »
It is pretty easy to spoof Mac addresses so it really isn't an effective security measure. OK it will stop the neighbours unless they are very determined but it won't stop people parked outside you home looking for unprotected WiFi.

I haven't played with bridging but what happens if you enable security with the same security protocol and code on each access point?
3829
doesn't switching off SR delete all of its accumulated rubbish - it does on WinXP. It would make absolutely no sense whatsoever to keep all the shadow copies of files if SR is switched off. Not only does it waste space but there is no way to rebuild the restore point using that data when you turn on SR again as the original restore point set will have been deleted.

If you are not sure use Disc Cleanup to remove all but the most recent restore point before switching off.
3830
Coding Snacks / Re: Play wave file through secondary sound card?
« Last post by Carol Haynes on January 08, 2008, 05:01 PM »
Not the neatest solution (and probably no better than WinAmp) but Apple QuickTime can play WAV files and also allows you to set the sound device.
3831
I have lots of static problems with my car (and have with all the different cars I have owned in the past) - the discharge strips you can dangle off the car don't seem to do anything for me so I presume it is me discharging rather than the car!

I also wear a lot of outdoor sports type clothing and find I get zapped nightly as I get ready for bed ... (not in a pleasant way I might add  :-[).

My cats also get shocks from me (which doesn't go down well but they forgive me pretty quickly for my quirky behaviour).

Don't know what the solution is - short of spending your life with bare feet on a floor that conducts to earth!
3832
Living Room / Re: is someone stealing my bandwidth?
« Last post by Carol Haynes on January 08, 2008, 01:16 PM »
That'll do it! But at least it isn't anything too sinister (hopefully).

I use UK BBC iplayer and Channel 4 On-Demand. Both use the Kontiki client to share downloaded files with other users but they are so heavy that surfing the internet crawls at dial up speed on fairly fast broadband. The only solution is to move the files once they are downloaded so that they can't be shared - unlocker is useful for this!
3833
It must be possible to stop the VSC service and set it to disabled.

Turn off System Restore too and use an incremental backup solution if you want regular snapshots of your system.
3834
Living Room / Re: is someone stealing my bandwidth?
« Last post by Carol Haynes on January 08, 2008, 03:46 AM »
I may be wrong but even if someone "borrows" your wireless Internet access your ISP gets the traffic???

True - but they will be using YOUR bandwidth via YOUR router to get to the ISP - so your own connection speed will degrade significantly - esp. if they are running something nefarious that uses a lot of bandwidth.

As already pointed out most ISPs will argue that YOU are responsible for what happens at your end of the phone line - even if it is not your computer and you don't know what is going on. The use of proper security is the only option these days in areas other than remote/rural areas where stealing bandwidth is unlikely. There have been plenty of cases of people being prosecuted for things that they inadvertently allowed to happen on their network. Ignorance is no defense in law.
3835
Living Room / Re: is someone stealing my bandwidth?
« Last post by Carol Haynes on January 08, 2008, 03:36 AM »
Probably the best long term solution is to ensure your WiFi is secured against outside users (WPA2 preferably as WEP is pretty weak).

If you have WPA2 enabled change the network security key/password and see if things improve instantly. Some routers use passphrases to generate a key. Make it a long one (as long as possible) with numbers, letters and other characters - save it to a text file so you can cut and paste it later if needed.

If you have a router with flashing lights look at it when your laptop is switched off - if it is still flashing someone is using it!

If you find there is no evidence of others stealing bandwidth then get back to your ISP. IME experience most ISP tech supports are run by drones in SE Asia because the services have been farmed out to cheap labour markets. Most of the time they read a script and don't know what to do if the problem isn't listed. Even when you do get someone who knows what they are doing it takes some effort to get past the inertial response "it must be your fault".
3836
Living Room / Re: What kind of tagging system would be appropriate for DC?
« Last post by Carol Haynes on January 07, 2008, 07:54 AM »
Back in the real world ...

Actually haven't we already got a fairly easy tagging system - when you post a new thread you can select an icon to go with that thread and it appears in the forum list of threads. Would it not be pretty simply just to supply suitable thread icons?

For example if you visit Living Room you see the first few threads looking like this:

sc.png

Edit: Actually I have just noticed that this seem to be disabled in DC forums but in 'standard SMF forums this option is available. For example posting a new thread in a non-modded SMF installation brings up:

sc.png

and the drop down menu displays:

sc1.png

I'm sure these categories could easily be modded/extended with appropriate icons.
3837
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 07, 2008, 05:24 AM »
I thought I would toy with you all a bit  :tease:
3838
General Software Discussion / Re: Dealing with spam
« Last post by Carol Haynes on January 07, 2008, 02:45 AM »
How would you stop people setting up their own SMTP server (it is easy enough on Windows and Linux to do that)?

The first time we see an IP address/sender/recipient tripple, and the sender/server meets one of the criteria for Greylisting

What about dynamic IPs which almost all ISPs use. If I send emails out I can pretty much guarantee my "IP address/sender/recipient tripple" will change on at least a daily basis (if not every time I reboot my system or my ISP decides to refresh my IP).
3839
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 06, 2008, 07:28 PM »
Hey I could usurp the big cat himself and lock it now - but that wouldn't be much fun (and I might get mouse traps sent to me in the post!)
3840
Living Room / Re: What kind of tagging system would be appropriate for DC?
« Last post by Carol Haynes on January 06, 2008, 07:26 PM »
id also like to make a way for some users (moderators only?) to be able to list threads that have not yet been tagged and let them easily tag threads in bulk.

Can we have an "OH GOD NO!" tag please  :-[
3841
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 06, 2008, 07:20 PM »
Whose Monday? It is Monday here already ...  :-*
3842
General Software Discussion / Re: Dealing with spam
« Last post by Carol Haynes on January 06, 2008, 07:18 PM »
So you are saying that the greylist keeps a list of approved servers (IP addresses?) not domain names? If an email arrives from an unapproved server it is rejected as a temporary error and the server is added if it is resent/received from the same server and the email accepted for processing further?

Sorry I thing I was getting muddled because the terminology was a bit muddled between servers and domains.

If this becomes a widespread tool wouldn't it be easy for spammers to simply check for returned mail and send it out again by beefing up their zombie servers - opening the floodgates to spam and also incidentally validating the email address (because it isn't simply bounced/ignored) so you get spammed even more ?
3843
General Software Discussion / Re: Dealing with spam
« Last post by Carol Haynes on January 06, 2008, 04:21 PM »
Whilst I was initially interested this quote from the wiki arttcle is pretty much what I suspected would be the major drawback:
Perhaps the most significant disadvantage of greylisting is the fact that, like all spam mitigation techniques, it destroys the near-instantaneous nature of email people have come to expect, and throws email back to the early days when it was slow and unreliable. A customer of a greylisting ISP can not always rely on getting every email in a small amount of time. Thus email loses its function as easy and effortless vehicle to transfer electronic information instantenously.

Yes, that does sound nasty, but in practice it means that the first time you receive mail from a new domain, it can take a little time to get through; after that, it's near-instantaneous again. It is annoying when you visit a new e-commerce site or sign up to a new forum etc., but it's a small price to pay imho.

Sorry - I think I am getting confused here - what do you mean by 'domain' in this context.

For me domain means the bit after the @ symbol so if I have some people who write to me from a common domain name such as hotmail.com which are perfectly legitimate emails so they correctly bounce back to me after being rejected then won't everything addressed to hotmail.com addresses also be validated without further checking?

I used hotmail as an example because I do know people who use hotmail (and similar domains) so how in these cases would greylisting help?

As for POPfile I have been using it for a number of years without problem but then I suppose there have been times when I started filter training again. I used to use Outpost (a plugin for Outlook which is a neat front end in Outlook for POPfile) but unfortunately that stopped development some time ago. More recently I use POPfile within Outlook by simply having a link in my mail folder list that opens the web interface page in Outlook - so it is very simple to go in and change false recognition.
3844
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 06, 2008, 01:21 PM »
It wasn't just me that thought there was a personal attack - read the 4 comments after you last post on page 7.

  • everyone has (and are entitled) to their own viewpoint
  • some people see anything opposed to full on 'anything goes' as evil
  • some people like picking fights for the sake of it
  • some people are too selfish to consider other peoples feelings

While I'm ranting, I may as well point the flame at you as well  :huh:. Your list above isn't fair. You seem to believe that you can see into the hears of other people to divine what they're thinking, what their motivations are. This is never a safe assumption. You have no way of knowing why each of us chooses to voice the views that they do. I suggest that the only civil way of handling such a discussion is to make every effort to avoid assuming the thoughts of another; if something seems to flow from illegitimate sources as you list above, ask the person for clarification.

To be fair I think I was a bit misquoted - these are human traits present in everybody to one degree or another (and I first pointed the finger at myself) - but they are some of the reasons why it is difficult to come to a consensus when there are opposing views - especially in a forum as anonymous as the internet.
3845
General Software Discussion / Re: Dealing with spam
« Last post by Carol Haynes on January 06, 2008, 11:27 AM »
About Greylisting:
http://en.wikipedia.org/wiki/Greylisting
http://www.tuffmail..../faq.php#greylisting


Whilst I was initially interested this quote from the wiki arttcle is pretty much what I suspected would be the major drawback:

Perhaps the most significant disadvantage of greylisting is the fact that, like all spam mitigation techniques, it destroys the near-instantaneous nature of email people have come to expect, and throws email back to the early days when it was slow and unreliable. A customer of a greylisting ISP can not always rely on getting every email in a small amount of time. Thus email loses its function as easy and effortless vehicle to transfer electronic information instantenously.
3846
General Software Discussion / Re: Dealing with spam
« Last post by Carol Haynes on January 06, 2008, 09:17 AM »
fOdder that's an interesting idea - but can you set it up to do it on a per email basis rather than domain name?

The reason I ask is that a lot of spam comes from common domain names (usually ISP domain names or common free webmail sites such as Yahoo and Hotmail). Mostly these are spoofed email address sources and so it is difficult to track down the actual source. Greylisting by domain name would only have partial success on the constant stream of crap I receive as a lot of the domains would have been automatically whitelisted by genuine emails being sent from the same domain name.

If you could do this you would effectively only have email coming from addresses from serious senders (or spammers that do respond to bounces).

FWIW I use POPfile as my filtering method of choice. It is very effective and a lot more flexible than pure spam filtering tools as you can use it to effectively set up intelligent rules to sort or label incoming email. It works with any POP client for windows and on any other operating system that supports PERL and is open source. See http://popfile.sourceforge.net

Edit/Update: Just looking at the latest release of POPfile it now supports IMAP (probably did before but I didn't notice it). I also see it support NNTP - which is a very interesting idea! POPfile has been at early release numbers (last version was 0.22.5) but in December came of age at version 1.0. Whooppee
3847
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 06, 2008, 06:11 AM »
You could try a:

Repeat
 something
Until FALSE

approach ;)

Actually no one answered (or even commented) on the question I posed earlier "where do the limits lie?"

I don't particularly have a problem with the YouPorn thread myself as nothing offensive was included in the thread and the following discussion was just the usually DC friendly banter and silliness. However, I didn't choose to click the link or make a comment and it did make my eyebrow raise and wonder if it was an appropriate topic when it was originally posted.

What is the limit though ... what if a site YouPaedo appears? Could some post a similar thread? In many countries accessing such a site would be illegal and may result in a prison sentence (certainly in big brother UK) but exactly the same 'technology' arguments for inclusion apply.

I was somewhat surprised by some of the self righteous pontificating going on here (and I am not necessarily talking about codeTRUCKER's posts). Stating that codeTRUCKER has no right to state or argue his position or that by stating it he is trying to force his morals and beliefs on others is just as intolerant (if not more so because you are TRYING to supress his freedom). Surely the argument being made by some of the protagonists is that you don't have to read or comment on stuff you don't like - doesn't the same apply to you in this thread? Or does the unpleasantness of personal attack illustrate that we all end up reading threads at times (and continuing them) that we really don't like or agree with?

After receiving a PM from codeTRUCKER I invited him to start this thread because I believe it is a question that at least needs to be asked. OK we will never reach a full concensus for a number of reasons, including:

  • everyone has (and are entitled) to their own viewpoint
  • some people see anything opposed to full on 'anything goes' as evil
  • some people like picking fights for the sake of it
  • some people are too selfish to consider other peoples feelings

there are probably many other categories too but these are just a few that spring to mind (mainly because I recognise all those traits in myself at times).

My personal opinion is that there are acceptable limits on freedom of speech. The difference is that I think those limits should be self imposed limits that take into account the need to avoid deliberately offending others who have a contrary view. Being able to consider others is, for me, a fundamental of any definition of what it means to be civilised.
3848
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 05, 2008, 05:38 PM »
Damn - that means I am post-Darwinian too (but only just at user number 477).

Maybe I am post-Darwinian with vestigial pre-Darwinian traces  :Thmbsup:
3849
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 05, 2008, 03:05 PM »
Just for the record. I would have absolutely no problem with even the creation (no pun intended, but you gotta admit it's a good one) of a whole forum on "Religious Software". And I would just choose not to read it most of the time.

That assumes you only read by forum - I don't know about others but I don't open individual forums very often (usually only when I am looking for something specific - and even then I mostly use search). The way i read forum posts is to use the "Unread Posts" button at the top. Unfortunately that would mean I would be faced with all of the religious software threads whether I wanted to see them or not. OK I don't have to open them but to my way of thinking they would be just as bad as the Junk folder in my email that I have trawl through.

To me codeTRUCKER hit the essence of the argument - he know some people (and I'd guess around here it would be substabtial group of people) would be offended by overtly religious references - software related or not. For me, as a rational being and an atheist, religious belief is akin to "pornography of the mind which serves to remove thought and embed dogma" so promoting software that propagates such a belief system would be as objectionable to me as whole pages of pornographic images.

There I just proved the point!  :-*

Footnote for codeTRUCKER
codeTRUCKER that little tirade was not actually aimed at you and your belief but rather to illustrate (genuinely) that what you said was true, for me at least

3850
Living Room / Re: What is appropriate content for DonationCoder?
« Last post by Carol Haynes on January 05, 2008, 06:29 AM »
I'm pretty happy with both Mouser's and tinjaw's comments (fOdder is just a naughty boy after all) ... and don't get me wrong I have argued elsewhere in this thread (and privately with codeTrucker) that I don't really see a need for censorship (or approve of it) but that doesn't mean that there should be guidelines to make life reasonably comfortable for all.

I don't particularly have a problem with the YouPorn thread myself as nothing offensive was included in the thread and the following discussion was just the usually DC friendly banter and silliness. However, I didn't choose to click the link or make a comment and it did make my eyebrow raise and wonder if it was an appropriate topic when it was originally posted.

What is the limit though ... what if a site YouPaedo appears? Could some post a similar thread? In many countries accessing such a site would be illegal and may result in a prison sentence (certainly in big brother UK) but exactly the same 'technology' arguments for inclusion apply.

I don't believe in censorship but neither do I believe in 'anything goes' especially in areas such as pornography where so many people around the world are physically, emotionally and mentally abused and even trapped in real slavery just for the titillation of a few 'free thinkers'.

Just because people smile on screen doesn't mean they are actually having a good time or have a fulfilled life!
Pages: prev1 ... 149 150 151 152 153 [154] 155 156 157 158 159 ... 310next