topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 17, 2025, 11:28 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 151 152 153 154 155 [156] 157 158 159 160 161 ... 230next
3876
Post New Requests Here / Re: IDEA: PROG TO REMEMBER DESKTOP ICON LAYOUT
« Last post by app103 on July 02, 2008, 03:06 AM »
So you need a tool you can run without installing?

You could try IconLayout. It doesn't require installing.

DeskSave has an optional portable mode, so you could install it at home and then transport it to your machine at work and use it there without installing.

3877
Living Room / Re: Just needed to clear my 666 post count
« Last post by app103 on July 02, 2008, 01:08 AM »
3878
General Software Discussion / Re: The Ultimate Music File Organizer
« Last post by app103 on June 29, 2008, 03:41 PM »
Be careful with any automated tool to do this as identifying songs and tagging them can result in mistagged songs and ruin your collection and make a lot more work for you in the end.

MusicBrainz and MusicIP are not 100% foolproof and will misidentify songs.
3879
If you have Paintshop Pro, look for a good tubing tutorial for your software version.

It will show you how to isolate an object in an image and remove the rest of the image, leaving just that object with a transparent background. (you could skip the part where you make the actual .tub file from it, and save it as a .psp or .png instead, and then use it as you wish)

Since I wouldn't know what version of PSP you have (or if you have it at all), I can't really recommend a tutorial for doing it. It's slightly different in each version. Older versions don't have all the same tools that a newer version of the software has, and hence, the process used to get the best results is different.
3880
General Software Discussion / Re: System Restore Trojan?
« Last post by app103 on June 28, 2008, 02:51 AM »
If you had something on your system before, it is likely that System Restore made a backup of your infected files and that is what your antivirus is detecting.

The proper way to rid your PC of an infection, should you have one, is to turn off System Restore before removing it, that way it won't make a backup of the infected files...and it also will clean out the restore folder.

Most antiviruses can't clean the Restore folder because Windows locks it and won't let them.

The remedy for you right now to clean it up, is
  • turn off System Restore
  • reboot
  • turn it back on
  • reboot again
  • set a new restore point (right away!)

Until you do this, I would not trust any of your previous restore points as being clean and trustworthy.
3881
Every PC I have owned has come with Windows pre-installed...but only 1 of them was a factory install.

All of my computers have arrived at my home by making a detour to my dad's house for a bit, first.

In addition to installing Windows, and configuring it all to the way HE likes it, he has a habit of installing the OEM Bundle from Hellâ„¢ which means he hits some download site and grabs everything he can and keeps installing stuff till he falls asleep at the keyboard. The rest of the setup files of things he didn't get to, are included on their own partition.

Only after this, does the PC make its way from his house to mine.

The exception to this was the last PC he gave me, which didn't arrive in time for him to take out of the box, nevermind install the usual bundle. That had a nice factory pre-installed Windows, and a much smaller OEM bundle.  ;)
3882
Living Room / How Interesting is Your IP Address?
« Last post by app103 on June 24, 2008, 03:25 PM »
IP Spotting is a website that will analyze your IP address and score it based on how "interesting" it is.

It will display your IP address as a bitmap, a poker hand, a point on a map, a color, a UNIX date, a phrase, and even check to see if it is a valid product barcode.

It will score your IP based on what it finds.

My IP was scored at 14...kind of boring.

It was a losing poker hand, a nasty shade of green, not a very interesting day in history, no place special on a map.

It did contain 2 prime numbers, however.


3883
Living Room / Re: Now MPAA want the burden of proof removed in litigation!
« Last post by app103 on June 24, 2008, 02:50 PM »
The MPAA wants to be able to win any case in which a 16 year old boy is sharing a bunch of video files that show their names to be that of various Disney movies without downloading those files, analyzing them and providing those files as evidence. They want a screenshot of the list alone to be the only proof needed to get a conviction.

This means that a 16 year old boy who thought he was a smart one by renaming his porn collection to match Disney movies*, in order to hide them from his mom, will end up convicted for infringing on Disney's copyrights for distributing Disney movies, even though he has no Disney movies on his hard drive. He will not be able to prove they are not, were not, and never were Disney movies.

Do you see how this works now?

*We have all heard stories of people downloading Disney movies on P2P that turned out to be porn films. This is just one of many ways this ends up happening.
3884
Living Room / Re: Now MPAA want the burden of proof removed in litigation!
« Last post by app103 on June 24, 2008, 02:11 PM »
Sure, no argument there. Except for #1, where the defendant still had the mens rea (mental state). In some cases, depending on the specifics of the law in question, the intent to commit the crime is sufficient, even if the defendant wasn't successful. I don't know what the law says about this in copyright cases, though.

That possibly could be the case if the misconfiguring was accidental and due to ignorance. It wouldn't be the case if the misconfiguring was deliberate, in order to NOT share files, which is more common than you may think.

Additionally, a great many people are ignorant of how p2p software works and don't know that some of these applications will share a specific folder by default, and they don't know how to stop it even if they do know it does this. This is how people end up sharing their tax returns and other sensitive documents on p2p networks by accident. They don't even know they are doing it. But that is a whole different situation.

The idea that a defendant can get on a witness stand and refute the evidence of the list by explaining, isn't going to be a valid one if a list alone is considered indisputable evidence of making files available by a judge's decision on July 1.

The actual copyright law does not leave room for intent. Actual distribution must take place, and if the files can't be uploaded then no distribution can take place. This is why I say a list alone can not be used as as proof of distribution. This is the issue that the judge will be deciding.

If he decides that a list alone is valid proof, then a list is no longer circumstantial evidence. It will be considered valid proof of distribution. And if that happens, anyone in one of the 5 scenarios I provided will not be able to defend themselves with an explanation. Innocent people can and will get nailed by the blood suckers that the RIAA/MPAA are.

I could end up sued and losing, for using a chat client that can not upload, download, or share files. This would be the same as suing me for chatting. You don't see this as a way to infringe on someone's right to free speech? You don't see this as a way to extort money from innocent people? Since when is having a text file containing a list of song or movie titles illegal? If it's illegal, then every letter to Santa written by a child that wants a CD or DVD for Christmas is illegal and all our children are criminals.

All I am trying to say is that a list alone doesn't mean anything. Lists lie. You still have to have other evidence to go with it, like a file. And that file has to be something that infringes, so the content of that file must be analyzed and proven to be what the RIAA/MPAA claim it to be. If they can't get a file, then nobody else can either...and no crime could have been committed. The RIAA/MPAA don't want to go through the trouble and expense to get those files and analyze their contents. They want a decision that will enable them to have a guaranteed easy way to win, even if they are wrong.

What is next? Automatic murder convictions for anyone that owns a gun license, even if they don't own a gun, and no murder weapon can be produced?
3885
Living Room / Re: Now MPAA want the burden of proof removed in litigation!
« Last post by app103 on June 24, 2008, 12:16 PM »
Actually, this may be a bit misleading. The proof they don't want to submit as evidence against people is files.

They want to be able to use a browse list as evidence alone, without having to attempt to download any files from the person that seems to be making files available. They want the fact someone has a list showing as all the evidence needed to prove distribution of whatever the list contains.

Now while some people may think that isn't that big of a deal, it is...it's a very big deal.

I run a programming chat on a P2P network. We help people that are trying to learn programming, and often times help others clean malware off their PC's, configure their router, troubleshoot linux issues, proofread their English homework, etc. So I am pretty familiar with what is available, how things work, and in most cases know the people that made the extra goodies that are available for use on the network.

I could give 5 scenerios in which the RIAA/MPAA or their flunkies could get a list of "shared files" from someone and no actual sharing is taking place, or in some cases, can take place.


1. Misconfigured router and the proper ports are not forwarded and therefore no uploading of files can take place, even though you can still browse the person's shared files folder and see the names of the files within it. We can throw a misconfigured firewall in this scenerio, as well.

2. CD swap out. In some P2P applications, you can share files right off of a data CD (or a USB thumb drive), as long as the CD is in the drive. So inserting the CD, sharing it just long enough for the list to be created and file hashes to be calculated and then removing the CD from the drive would create a list of files that are supposedly shared but can't be downloaded. Some P2P applications will not detect that the CD has been removed and will not update the file list unless the user manually clicks a button to refresh the list or restarts the software. One can do this before connecting to the network to ensure that no sharing can take place during the hashing process.

3. Software hack. There are some "plugins" available that will stop automatic uploading in some P2P applications by stopping the queue from being processed, changing the available upload slots to always be 0. No files will be uploaded and all people that try will just wait in the queue forever. 0of0 was developed by a member of my chatroom, just for this purpose.

4. Chat only client with a mock shared list. Some P2P networks have chat and there are 3rd party chat clients available that will allow someone to enjoy the chatrooms without having any upload/download capabilities on the network. Some of these contain a way to appear to be sharing files or to show a custom message when someone browses you from the chatroom. But if you try to download anything from that list, it will always fail because it does not exist. These "files" only show on a browse from within a chatroom and never show on a general search on the network.

I have used RoboMX and Metis before, with a text file of a list of about 100 of the craziest book titles on earth, things nobody in their right mind would think were real and try to download. It was good for a lot of laughs, usually poking fun at people in the chatroom with the titles. All of the files I appeared to be sharing were just individual lines in a text file and not real files.

The same goes for AC177, but the fake list is stored in the registry instead of in a text file. AC177 was developed by a member of my chatroom.

5. Ghost files. On at least 1 P2P network there is a phenomenom known as "ghost files" that can occur if you have been connected to the same primary for a very long time. Someone else's files will show in the list when someone browses you. (for some reason it's always porn or something with a title in japanese) It is some sort of glitch in the software that is well known among users. If anyone tries to download a ghosted file, it will fail because the user that they are trying to get it from doesn't have it. The remedy for the user that has ghosted files showing in their shared files list, is to disconnect and reconnect to the network, which breaks the connection to the "tired" primary that is causing the ghosting.

-----
In each of these scenerios there is a list that can be viewed by anyone, but no way to actually transfer those files. So in essence, even though they appear to be shared, they actually are not, and in some cases may not even exist.

So, since there is at least 1 way in which someone could appear to be sharing copyrighted files but not actually making them available to anyone, and at least 1 way to appear to be sharing files that don't even exist, evidence that they do in fact exist and are available and downloadable is still needed, in order to protect the rights of the accused.

This doesn't even take into account that files could appear to be something that they are not. Maybe someone is sharing files of themselves singing in the shower. Or home-made movie re-enactment parodies of the latest film releases created with Barbie dolls or action figures. (parody falls under "fair use" and is perfectly legal)

You can't know what the case is unless you can (and do) download the file and verify the contents.

Since the judge in the Jamie Thomas case wants to hear from the public on this issue, which is why the MPAA sent their opinion to him, I mailed the judge a letter yesterday explaining in much more detail the 5 scnerios I just stated.

There was no way I could sit back and let a judge decide on July 1, that a list is all that is needed to prove files were made available, not when I can name these 5 off the top of my head so easily.

3886
Claris Easy Business Cards

Of all the software to design business cards, I love this one the best. In my opinion, it was the only thing for Windows that Apple ever got right.
3887
Living Room / Re: What's this?
« Last post by app103 on June 22, 2008, 11:06 PM »
At one time I thought it was a tinted shield to protect the speaker's eyes from camera flash, so he wouldn't be blinded and would still be able to see his speech notes.  :D
3888
Just so everyone understands where this is coming from, let me tell you a little about myself, first. I have serious trust issues. It is rare that I trust anyone at all, never mind trust anyone completely. I am a well above average in my skills for evaluating a person's character. This is why I don't trust people.  ;)

I have known mouser long enough to know that he is the most honest, respectable, trustworthy, caring, generous man I have come across in the 42 years that I have been on this earth. In the dictionary, the word "integrity" should have his picture. I could compare him to Mother Theresa.

I not only would trust my computer to him, I'd trust him with my personal information, the keys to my house, my deepest darkest secrets, and my life...because I know he would never ever intentionally harm anyone or anything. He would never be able to live with himself if he did.

Not only would he never hurt anyone, he goes out of his way to bend over backwards to help people in any way he can.

So when I saw the alleged results posted by bartolome.simpson, I had to go see this with my own eyes, because I could not believe that that many antivirus products could give off that many false positives for a single application.

I downloaded the ScreenshotCaptor setup file and using the exact same online scanner, my results were vastly different than that of bartolome.simpson.

Rather than a "copy & paste", I decided to give the screenshots:
SNAG-00042.png
SNAG-00043.png

I could express some more thoughts, but rather than attack someone else's integrity and say something I may live to regret, I'll just keep quiet now and let what I have posted so far speak for itself.
3889
Living Room / Re: DC Forum Members -- Tell Us About Your Website
« Last post by app103 on June 20, 2008, 11:06 PM »
In addition to these, there is probably another 25-30 websites in various stages of development sitting on my hard drive, and a bunch out there on the web that I don't remember creating.

App's Apps  
My software site containing a bunch of small applications, mostly in the time management & productivity category.
      
App's Trapps
Going in the opposite direction of my software that helps you get more done is this site that helps you waste more time. (Yes, it's a trap!) ;D

It's a work in progress and will become a world of addictive random randomness. Currently, it's just a endless gallery of random amusing images...just keep clicking.  ;)

(average visitor clicks about 73 times)

      
The SourceCode
This is the old website for my chatroom, containing old projects that some members worked on, old news, and other misc stuff.

For many of the members, the projects on that site is their "Hello World", or darn near close to it. (mine included)  :-*

The blog is still occasionally updated with a few interesting things. (A new site is in the works.)
      
RussoGraffix
My old art site, and one of the very first websites I ever made that still exists. Contains desktop wallpapers made by both my daughter & myself, screensavers, classic Winamp skins, Paintshop Pro tubes.
      
Free Programming Ebooks
This is my directory of free programming & technology related ebooks. My goal is to list every free programming book available on the web, in order to make it easier for the people that need them to find them.

There is absolutely no pirated books here.
      
Cranial Soup
My personal blog of thoughts, ideas, rants, web finds, and other misc stuff. A real mixed bag of stuff.
      
Mom's Cookbook
Originally started as a place to post recipes that my daughter called me up and asked for, I decided to keep it going after she moved back home and just keep posting stuff as I have the time & desire to do it...which is not all that often. Occasionally the recipes are accompanied with photos taken by my daughter.
      
omgplzstfukthx  
Watch what you say in public chatrooms. You could end up becoming forever trapped in a blog.  :P

I started this one when I got tired of Bash rejecting all my submissions. And, yes, there are some from our very own DonationCoder IRC channel.  :D
      
Read My Email  
We all have at least 1 friend that loves to forward us a ton of crap...jokes, virus warnings, hoaxes about microsoft donating burlap sacks stuffed with hay to people without a body only if you forward the email to everyone you know, etc.

Rather than forwarding this crap and becoming another annoying person that stuffs the inboxes of friends with unwanted stuff, I decided to post some of what I get here. Most of it is jokes that were sent to me by one single person...a friend's mother.  I still have about 500 of these emails from her that I haven't posted yet.  :o

So, if none of your friends send you stuff like this, or not enough of it, you can have your fill of it with mine whenever you want, without any of it cluttering your inbox.
      
Snailware  
A long neglected blog containing a few reviews of software that will run well on older, slower computers. (I really do need to start writing for this one again.) :-[
3890
Living Room / Google Developing Tools to Detect ISP Throttling
« Last post by app103 on June 17, 2008, 12:50 PM »
In an effort to identify traffic discrimination by American ISPs, Google is prepping a suite of network analysis tools for everyday broadband users.

"We're trying to develop tools, software tools...that allow people to detect what's happening with their broadband connections, so they can let [ISPs] know that they're not happy with what they're getting - that they think certain services are being tampered with," Google senior policy director Richard Whitt said this morning during a panel discussion at Santa Clara University, an hour south of San Francisco.

If the country doesn't have neutral networks, Whitt contends, innovation stagnates among application developers. And he believes that individual consumers - as well as Washington policy makers - should join the fight for such neutrality.

"The forces aligned against us are real. They've been there for decades. Their pockets are deep. Their connections are strong with those in Washington," he said. "Maybe we can turn this into an arms race on the application software side rather a political game."

3891
General Software Discussion / Re: Do we need a Linux and/or Mac child board?
« Last post by app103 on June 15, 2008, 06:01 AM »
Donationcoder is a windows-specific place, with a few users who also/exclusively use other environments.

I wonder how many people have that same impression as you, and don't feel as if they are welcome here among the windows users? Perhaps we have forum members that have never posted for such a reason.

If there was a section for non-windows users, (perhaps with it's own coding snacks area, too?) we could see more members contributing posts that never did before, and even some non-windows coding snacks requests that non-windows developers could fill.

The way I see it, adding a section for non-windows would be branching out and a step towards expanding the site into areas not really covered before.

This is definitely something to give a lot of thought to before going ahead and doing it.
3892
Living Room / Re: Where does the power go when I save it?
« Last post by app103 on June 08, 2008, 01:11 PM »
I'll tell you where the power goes when you save it...

My daughter's room, and her 320W of lights that are always turned on...and my kitchen with its 360W of lights.

 ;D
3893
Site/Forum Features / Re: Nofollow tags added to all external links
« Last post by app103 on June 08, 2008, 11:11 AM »
I also think that there shouldn't be any "nofollow" on links on the blog page, regardless of how long the original poster of the item has been a member.

You have to be a mod or admin on the forum to promote a post to the blog, so spam isn't likely to end up there.

There is no reason whatsoever to have "nofollow" on portions of the site that spammers have no access to adding content.

Because the blogging mod also is used to add posts to the coding snacks page, a "nofollow" on those pages could potentially hurt the coder that fills a request and chooses to host the resulting application on his own site. This site will end up on page 1 of results for the application, and the poor coder's page will end up at the end of the results (or not at all) because DC's PR6 beats his tiny or nonexistant PR. Sticking "nofollow" on the link to his site would be just plain selfish, and I don't think that is in the spirit of what this site stands for.

3894
Site/Forum Features / Re: Nofollow tags added to all external links
« Last post by app103 on June 07, 2008, 08:33 AM »
I doubt it, since search engines are not the only incentive they have. The purpose is to drive traffic to their site by any means, be that in search results from a search engine or by actual humans reading their posts & clicking.

With the number of members this forum has, and the volume of traffic, it is amazing that the spamming isn't more intense than it is. (or is it and we have fast mods that catch it faster than it can be picked up by MouserBot in the irc channel and that's why I haven't noticed it?)
3895
Living Room / Re: $10 cell phone?
« Last post by app103 on June 05, 2008, 06:33 PM »
There are a number of companies that have prepaid phone plans in which the phone itself is around $10-$20, and they give you a choice of which phone you want.

They even sell them in the supermarket near my house, as well as the cards to recharge them.
3896
General Software Discussion / Re: Photo watermarking
« Last post by app103 on June 05, 2008, 03:44 PM »
I would have to say that Digimarc is probably the oldest and most well known company for digital watermarking of photos, video, audio, PDF's, etc .

They should be around for quite awhile, since they have contracts with a number of states for providing secure drivers licenses, as well as some pretty big stock photo companies.

Paintshop Pro 7 even came with the plugin to add and read their watermarks, which should give you some idea of how long they have been around as a respectable company.

Their digital watermarks are not visible to the naked eye. They also allow a visible marking as well. Their hidden watermarks are supposed to resist manipulation, so they are not supposed to be easily removed from images. They also have a tracking service so you can see who is using your images online. Corbis uses their ImageBridge service to protect their images.

You have to pay for a subscription to get an ID from them to add your watermark to an image. Offsite backup and secure sharing is also part of the deal.

If that service is a bit more than you had wanted, they also have MyPictureMarc which is a little less heavy duty, but offers a lot of the same protections as the ImageBridge service. It's good for collections under 5000 images. They have a few different options packages ranging from $79/per year to $499/per year, depending on the number of images you want to protect and which services you need.
3897
Living Room / Re: Why I could never buy a Dell or HP computer (rant)
« Last post by app103 on June 02, 2008, 12:13 AM »
There is a big difference between buying an HP or Dell machine meant for a home consumer and a business machine. The business machines do not come with all the crap installed.

As a matter of fact, my daughter's HP laptop came with the OS on disk (not a restore partition), a driver CD, and a disk of optional crapware...none was preinstalled.

Hers was a business machine.

My HP desktop, on the other hand, came with everything preinstalled, lots of crap I had to remove, and a restore partition rather than an OS disk. If I had not changed settings to reveal all hidden files & folders and browsed around in the depths of things, I would not have known that there was an outdated copy of python preinstalled on my machine, which could have become an issue when I went to install my own copy. Not only that, but there are security risks associated with having really old outdated hidden copies of python preinstalled on machines.

Lesson learned: Buy a business machine if you are going to buy prebuilt.
3898
I thought we were trying to boycott McAfee for their terrible habit of too many false positives, especially with DC software.

If given a choice, I would rather people run McAfee, false positives & all, than go without.
3899
Living Room / Re: Pirating abandoned content?
« Last post by app103 on May 17, 2008, 08:44 AM »
There are a lot of professors that write their own textbooks for their courses, but I think the vast majority let their students have it at cost, or very low cost, since they are more interested in teaching well and using their book to help accomplish the job. They aren't profit driven.

I have even heard of a teacher that made his 800 page textbook free, not only for his students, but the entire world, in electonic form.
3900
Living Room / Re: Online Game: Kingdom of Loathing
« Last post by app103 on May 16, 2008, 06:05 PM »
I always thought that site was like a crude Neopets on crack.  :P
Pages: prev1 ... 151 152 153 154 155 [156] 157 158 159 160 161 ... 230next