476
Living Room / Re: Against TED talks
« Last post by Stoic Joker on March 31, 2016, 06:48 AM »Mouser - That was by far the coolest presentation I've ever seen. 


Sent log from within the program...I hope it went where it was supposed to..-Stoic Joker (March 30, 2016, 03:04 PM)
Got it, thanks. Very useful. I was unaware that there's a separate bus type for NVMe drives. Added now, so your Samsung should show up as SSD.-apankrat (March 30, 2016, 05:50 PM)
Can I get a copy of a scan log, please? There's a menu item in the app for that.-apankrat (March 30, 2016, 02:14 PM)
I'd be surprised if anybody is going to let you drop a device into their internal LAN.-CWuestefeld (March 29, 2016, 02:16 PM)
Back when I had the tolerance for stress to work on these, the client just wanted to be up, now. I think it just depends on the type of client we're discussing. If they're clients that outsource their IT, they won't know nor care- and I know this from personal experience.-wraith808 (March 29, 2016, 02:38 PM)
What kind of battery is generally used in these wireless keyboards/mice? I am just curious. I use USB keyboards and mice just because they draw power directly from the port. No heavy battery to add to the weight of my suitcase. If it is a "coin" size battery then I guess the weight is negligible. But I may have lucked into doing the right thing via being misinformed.-MilesAhead (March 29, 2016, 07:14 AM)

Does any of this apply to wireless keyboards?-mwb1100 (March 28, 2016, 06:44 PM)
A hacker uses an antenna, a wireless chip called a dongle, both available for the less $20 (USD), and a simple line of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
"So the attacker can send data to the dongle, pretend it's a mouse but say 'actually I am a keyboard and please type these letters'," added Newlin.
"If we sent unencrypted keyboard strokes as if we were a mouse it started typing on the computer, typing at a 1000 words per minute," said Chris Rouland, the CTO and Founder of Bastille.
At a thousand words a minute, the hacker can take over the computer or gain access to a network within seconds.-The Article
Adding 4 advertising/promotion links in your, otherwise useful, first-post is about 99.9% sure to assign you a spam-ban
Please explain or remove those non-relevant links.-Ath (March 28, 2016, 04:21 AM)
Where this kind of USB options are located in the BIOS/UEFI differs (a bit) with each make and model of motherboard, so you will likely have to consult your manual. Or identify which motherboard model is inside your computer and see if the manufacturer still provides a downloadable manual for it.-Shades (March 21, 2016, 07:43 AM)

The tool I envision is rather simple-- (1) a graphic image (200x200 px) and (2) a short text area form a "datacard" (I'm not stuck on the name of course). These are assembled in a scrollable list (3), although I've only shown one here. Clicking the picture with the mouse (4) opens a specified directory (4). I have shown an example here using a datatype familiar to computer musicians.-cci8j (March 04, 2016, 04:53 PM)
As this is a temporary committee formed for only this one purpose, they are most likely using laptops drawn from a company "equipment pool" While they "could" just be told be told to make new rules about completely cleaning all files and folders from each laptop after every meeting anyway (something I would have advised doing anyway as a matter of course) It isn't how things have been done before.-questorfla (March 03, 2016, 09:20 PM)
The Intent is for a User to be able to Open and view the files as much as necessary but other than making a screenshot, they should not be able to download and save the original PDF from the site.-questorfla (March 03, 2016, 12:59 AM)
What if I steam the brushes in a double boiler?-holt (March 02, 2016, 08:27 AM)

In addition, Windows uses Windows Internet Name Service (WINS), b-node broadcasts and the LMHOSTS file for NetBIOS name resolution. If all of these name resolution methods are used, an h-node host computer implements them in the following order:
1.NetBIOS name cache
2.WINS server
3.B-node broadcast
4.LMHOSTS file
5.HOSTS file
6.DNS server-MS TechNet
Interesting "stuff"3 other hacks FBI could use on killer's iPhone besides an Apple key-Arizona Hot (February 25, 2016, 11:37 PM)
All I can think of is google is providing hosting to these guys?-MilesAhead (February 18, 2016, 02:45 PM)
I don't know what is going on if Google has the power to blacklist individual files. Seems peculiar.-MilesAhead (February 18, 2016, 07:31 AM)
You know what though, if Blackbird does system tricks to protect your system it may be seen as a malware.-MilesAhead (February 17, 2016, 01:29 PM)
Just tried to download x64 version, and it is blocked with warning "Virus Blocked".
The funny thing is that I don't have AV which influences my browser(s) in such a way.
Maybe it is a W10 thing...-Attronarch (February 17, 2016, 01:57 AM)
[ Invalid Attachment ]
iOS bug warning Setting this date on your iPhone or iPad will kill your device permanently-Arizona Hot (February 13, 2016, 07:04 PM)
According to Ars Technica, this happens because January 1st, 1970 is the first day of the Unix epoch, and that allowing the phone’s battery to go completely dead (or disconnecting the battery) will reset the date.-wraith808 (February 13, 2016, 10:20 PM)