topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Tuesday November 11, 2025, 9:06 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 25 26 27 28 29 [30] 31 32 33 34 35 ... 264next
726
Living Room / Re: Just tried using a 4k monitor in my setup, did not like it
« Last post by IainB on December 11, 2017, 03:20 PM »
...Most modern games are not so text-dependent, so I'd think the text size problem would not be an issue...
That's probably generally true, but on my laptop (Resolution 1366 x 768 x 60 hertz) there was a perceptible down-sizing of the fonts in the scrolling Pip-Boy displays of Fallout New Vegas, when played in Ultra High Definition mode, compared to the default standard mode definition. The fonts were still readable OK (though I have to use specs anyway), but it made me wonder whether that might make them more difficult to read on higher dpi displays.

727
Clipboard Help+Spell / Re: CHS Icon Disappears from System Tray
« Last post by IainB on December 11, 2017, 02:56 PM »
@mateek: I was talking there about the stand-alone proggy Restart Explorer (by Lee Whittington) by itself - (v1.0.0.0, 2016-10-01 13:25, 543Kb).

I only mentioned it (above) as you seemed to think that it didn't work in Win10, when my experience is that it most emphatically does work OK (in Win10-64 Pro), and is dead handy. I use it several times a day, most days, when restoring the systray icons, or decluttering the system of Explorer instances that seem to be either in suspended wait-states or crashing or suspected as being involved in other apps waiting/crashing - sometimes along with RuntimeBroker.
RE is very handy because it is so efficient and brutally effective. I suppose I could use an AHK script instead, but that would probably be forced by the System to wait for a graceful shutdown of Explorer, or something, whereas Lee Whittington's executable code is tried-and-tested and doesn't usually mess about or get blocked by the System.

Sometimes, I feel that Windows 10 is a bit like a ruddy state bureaucracy that perpetuates and protects itself if citizens try to justifiably interfere in or shut down a state department's operation that is failing - it won't easily permit User control under such circumstances. We know where that gets us. RE is like the Epsom Salts for Windows 10.

Having said that, I have searched thewindowsclub.com website, and found that Whittington's software contributions would seem to have been expunged from mention, though an old "contributor profile" of his remains.
I just now got the UWC v1.0.1.0 (2011-11-26) Setup.exe from my Archives and installed it under C:\UTIL\...
That installed without hitch.
UAC is turned OFF on my system, but on your system you might see a warning from Windows when you activate the installer. If that happens, then just click on the "more" button and you should then be given the option to run the installer anyway (I think).
The standalone RE was in the installed folder "Tools". That is the file I am talking about.
I recall that some time back I had not needed UWC as it had become obsolete (left behind by newer Windows versions and other newer/better Windows-tweaking software) - but RE remained uniquely workable and useful. So, I had kept RE on its own and deleted all the other UWC stuff. RE itself doesn't need "installing".

Hope that all makes sense.
728
Clipboard Help+Spell / Re: CHS Icon Disappears from System Tray
« Last post by IainB on December 11, 2017, 12:19 PM »
@mateek:
...but went to try "Restart Explorer by Lee Whittington - it's part of Ultimate Windows Customizer" suggested by IainB but it says it won't run on Windows 10 Pro after I install ...
No, it still works fine under Win10-64 Pro (with latest current version updates).
By the way, it doesn't need "installing". I just copied the stand-alone executable into the folder where I keep my "portable" proggies: the C:\UTIL\ directory. I set it to run as Administrator (see the file Properties --> Compatibility), and it works a treat.
I usually never deliberately put what I consider to be my "portable" proggies into Windows' "Program Files" folders, as I wish to avoid the dead hand of the Windows user access control system settings taking control - which is probably what you have experienced and why RE won't work for you right now.
729
Living Room / Re: Just tried using a 4k monitor in my setup, did not like it
« Last post by IainB on December 11, 2017, 11:55 AM »
Things were just fine under DOS, but then Microsoft introduced Windows and that was when it all began to turn to custard.

...Where's me specs?...

(@mouser: thanks for posting. Is interesting.)
730
General Software Discussion / Re: Need some (security/virus-related) advice.
« Last post by IainB on December 11, 2017, 11:46 AM »
@ayryq: Hmm. Sounds fairly typical, and your Dad sounds like a typical unsuspecting potential victim. If they were claiming to be "Microsoft Support" or something, then that was probably a lie and thus probably a fraud was being committed. Classic.

Regardless, as well as the forensics, I would suggest subsequent file encryption for the (changed) passwords in the Password file, at least.

There are a couple of potential avenues I could suggest for this, findable via the DC Forum discussions/threads:
1. Frog Tea: (@f0dder seems to think this proprietary software is insecure; see below notes)
FrogTea (DCF discussion)
« on: 2012-10-06, 23:16:55 »
Quote
What is FrogTea? FrogTea is a free, Windows based, encryption utility which allows you to create a secure*, stand alone, self-decrypting HTML archive which may contain either html or plain text content. These self-decrypting archives may be decrypted on any device which has a javascript capable browser.
Copied from: FrogTea - DonationCoder.com - <https://www.donationcoder.com/forum/index.php?topic=32466.0>

However, @f0dder finds Frog Tea to be flawed as any kind of a properly secure approach and makes the point about this:
f0dder (DCF comment)
The reasons I listed against using FrogTea are pretty sound. If anything is absurd, it's that insistance that there's some merit in using an unmaintained, closed-source program with problematic encryption - while not philosophically untrue, it's about as ridiculous as insisting that it's better to wear a pajamas in a blizzard than being naked.
Copied from: FrogTea - DonationCoder.com - <https://www.donationcoder.com/forum/index.php?topic=32466.0>

2.  fSekrit: (@f0dder's own proprietary software using AES encryption)
LATEST VERSION: fSekrit 1.40 shrinkwrapped!
https://www.donation....msg186778#msg186778
_____________________________________________________
fSekrit v1.40 change log:
http://f0dder.dcmemb...sekrit/changelog.txt
________________________________
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*** Release History:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
version 1.40 - December 3, 2009 - 90kb/45.5kb
- fixed:  long-standing bug where failing to save changes when closing fSekrit
  with a modified document would cause fSekrit to exit, rather than notifying of
  error and let user attempt to save again.
- fixed:  saves are *finally* done properly, by saving to a temporary file and
  replacing the current file only when all the file writing business is done.
- added:  font selection dialog, no longer do you need to much around with the
  registry to set another default font. The font is still not stored in your
  document, though, and is single global per-user registry setting.
- added: "portable" mode, which (for now) means it will not use %TEMP% to store
  it's temporary editor executable, but instead store it in the same folder as
  the opened document. Registry is still used for font selection, though!
  To enabel this feature, create a file called "fSekrit.portable" in the same
  folder as the document you want to function in portable mode.
- added: URLs are now recognized and turned into hyperlinks.
- fixed: Read-only notes should be a lot more sane - changed from confusing
  "make read-only" that half-worked to "Save As Read-only" that works :)
- fixed: Win9x and NT4 support has been broken since version 1.35. Release builds
  are now done with an older compiler toolchain, and 9x/NT4 support is back :)
----------
version 1.35 - December 23, 2007 - 100kb/50.5kb
- fixed:  file->export appends ".txt" instead of ".exe" if no extension given.
- fixed:  file->new now clears passphrase and read-only state.
- fixed:  menu items are now properly enabled/disabled depending on read-only
  state and whether text field is empty or not.
- added:  drag&drop support: you can now drop a text file onto the fSekrit
  window, and fSekrit will load the dropped file.
- added:  right-click popup menu with edit actions
- added:  redo support
- added:  unicode text support (only the note text, not filenames yet)
- added:  now everything sensitive is always wiped from memory after use,
  as far as it's possible (with the exception of the RichEdit control).
----------
version 1.3 - November 18, 2007 - 99.5kb/50.5kb
- added:  read-only notes, finally :)
- bugfix: changing key on unsaved document would crash
- bugfix: saving an empty document would crash
- bugfix: running fSekrit.exe (w/o embedded note) from a CD was unable to
  Save As because read-only file attribute wasn't cleared on destination.

This release was actually meant to be released on 15th October 2006, but
due to the phase of the moon and real-life work, got postponed for over a
year. Sorry.
----------
version 1.2 - September 15, 2006 - 98.5kb/50.0kb
- improved security a bit (randomized IV)
- fSekrit now saves without "flickering in and out of existance"!
- you can now specify a custom font. I haven't added a GUI setting for this,
  but it's tweakable from regedit. You can create fontface:string and
  fontsize:dword values under HKEY_CURRENT_USER\Software\flork.dk\fSekrit .
- import and export plain text
- win9x: now handles large encrypted notes
----------
version 1.1 - April 11, 2006 - 75.5kb/39.5kb
- bunch of misc. bugfixes
- added menu items for most functions (were already available through keyboard
  shortcuts)
- added edit->find
- internal preparation for unicode support and other goodies

PLANNED: secure file wipe, better process model (slightly safer and more
convenient), drag-and-drop encryption, unicode support, additional encryption
tools, and of course smaller filesize :)
----------
version 1.0 - January 31, 2006 - 76kb/39.0kb
 first public release.
731
Screenshot Captor / Re: Grab selected region
« Last post by IainB on December 11, 2017, 09:46 AM »
@Evanrude: Oops, sorry. I forgot to say thanks for your potentially useful feedback (above) when I had earlier cross-posted it to:
Re: Pasted images too large with new laptop « Reply #17 on: 2017-12-10, 12:38:58 »

732
General Software Discussion / Re: Need some (security/virus-related) advice.
« Last post by IainB on December 11, 2017, 09:28 AM »
Sounds like a classic phishing hack to me. They tend to proliferate on "dubious" - i.e., not family-friendly, or X-rated websites. My kids have inadvertently stumbled on such websites and got the "phone this support number to fix the problem" display, so I raised the security bar to block them out. I have also had to fix these "phone this support number to fix the problem" scams on a couple of friends' computers.

There have been some arrests recently of Indian-based hacker teams where they hack these faux "alerts" on your PC when you visit their websites, or randomly and systematically call phone numbers in another country, claiming to be Microsoft support, and say they "noticed a problem on your computer". There are many more of these scam operators not yet discovered/arrested and still operating their scams.

This scam happened to a friend of mine a few weeks back and I advised him to string them along until they gave up - which he did, and enjoyed it too. I later got a call from a similar scam outfit on my mobile phone, so I carefully probed and established that they didn't know I had a laptop:
  • Me: "Oh you mean my desktop PC? It's a really good DELL 2020 [made that up] computer - thankyou for calling, I didn't realise that it had a problem."
  • Scammer (in a thick Indian accent): Yes sir, that is it. It is a good computer. The error report shows it has a disk error that may be virus (sic) and needs to be fixed urgently."

They did not know my name so I told them it was "Frank" and figured it had to be a random phone call, or they had found the number from hacking someone's email account or mobile phone, where they happened to have my number in their unnamed contacts list.

However, if your Dad has already succumbed to the scam - and it looks as though he has, if they have already installed Teamviewer - then they will probably have Admin rights and absolute control and full access, so they could have done anything by this belated stage, including inhibiting Malwarebytes.
So, you probably should rather urgently isolate his PC from the Internet, and treat the hard drive forensically with Malwarebytes. Attach the PC's drive as an external hard drive to another computer which is already installed and running Malwarebytes, including their anti-ransomware software.
You will also have to identify and expunge all traces of their software/data footprint on the disk.
If he has his bank account or credit card details in clear (i.e., not encrypted) somewhere in a file on the disk, then advise the banks concerned ASAP and get them to temporarily block/change the accounts whilst the passwords/PINs are being changed.

If they also had access to his social security ID information, then they potentially could have committed identity theft, in which case, be prepared for a great deal of pain to restore ownership.

Good luck.
733
General Software Discussion / Re: Windows Explorer crashing
« Last post by IainB on December 11, 2017, 07:57 AM »
Please note that I corrected a mistuk in my penultimate post above:
EDIT: see terminating restarting, above.
734
General Software Discussion / Re: Windows Explorer crashing
« Last post by IainB on December 11, 2017, 07:53 AM »
What @Shades writes about possible disk sector read timeouts due to a damaged disk sector, or something, is interesting. It does seem as though there could be some obscure suspended read "waits" going on in this case. It would be interesting to see what HDSentinel reports - if anything - on that disk, after the explorer hangs/crashes. HDS can perform real-time disk performance monitoring and would, I presume, report accordingly.

But - just a thought - is it necessary to check the integrity of ntdll.dll, or whatever, in the manner suggested?
I mean, won't the commands:
  • sfc /scannow
  • Dism /Online /Cleanup-Image /RestoreHealth
- already have checked/rectified the integrity of the System files?
(I had read somewhere that that is part of what they did.)
735
Living Room / Re: How can I blank out my laptop camera?
« Last post by IainB on December 11, 2017, 07:22 AM »
Busted!
-cranioscopical (December 10, 2017, 09:06 PM)
Oh. Ahaha! Scanning the thread, I had missed that suggestion/interpretation in the banter, first time around. Probably wasn't expecting it. And now, it seems, a pun. Intentional or otherwise, the effect is very droll.    :D

But it also could illustrate a point about the rationale and need for face-to-face discussion or video interviews. The nuances of a lot of speech can often be better communicated if/when delivered "in person".
Narrated in a story, what was said - and the accompanying cues - might be described something like, for example:
"Oh well, you could try such-and such, you know." he said, looking at me with an amused twinkle in his eye.
- which, in a phone discussion or a forum text discussion might come out merely as "You could try such-and such, you know", which doesn't really make obvious any of those associated cues. So the communication "fails" to the extent that the nuance is lost in transmission.

This reminds me of something:
Before letting us loose as lecturers, me and the newly-formed group of colleagues I was part of were first sent away on an intensive, live-in 2-week immersion training course on training techniques, held at a prestigious executive training school nestled away in the Buckinghamshire countryside. It can't have been cheap, and they pushed us (the group) hard, so it was not an easy free ride:
  • At the start, we were told what the training objectives were - what we would be learning and would be taking away from this course.
  • Then we were told to prepare a 5-minute presentation on a subject of our choice (each of us were specialists in a different area), list the objectives - what we wanted the lecture to achieve in terms of learning/understanding, and then we were each video'd delivering the lecture, using supporting visual aids. The videos were made and then tucked away for future reference.
  • For the next few days, we were taken through the theory, methods and practice in subjects necessary to enable us to maximise our understanding and effectiveness in lecturing as a communications and training delivery method.
  • Then we were told to use this new knowledge to prepare for another 5-minute lecture, to be video'd, and that these videos were to be scrutinised, discussed and critiqued by us (the group of trainees and the leading trainer).
  • The critique session was humbling, and at times ego-bruising, but - since we trainees were all in the same boat - whilst we did not pull any punches, we had the good sense to be fair to one another. The critique focused mainly on the effectiveness of delivery and the relative achievement of objectives, rather than the content of the lecture per se, except where content was felt to be insufficient or superfluous.
  • Then we had to prepare for a 2nd lecture on the same topic, then critique, wash, rinse and repeat.
  • Then we had to prepare for a 3rd lecture on the same topic, then critique, wash, rinse and repeat.
  • Then we had to prepare for a 4th lecture on the same topic, then critique, wash, rinse and repeat.
  • By the 4th lecture, we had all got the idea and learned the process, and our lectures were very good and came out with  5 stars at the critique (objectives met).
  • At this point, we were asked if we would like to share a viewing of our first video'd lecture from the very start of the course, and discuss and assess whether we had achieved the objectives of the course as originally given. Since we had all learned to become pretty thick-skinned during the critique sessions, we agreed to risk exposeing ourselves this time, again. And what we saw was how each of us had improved dramatically and the extent to which the objectives of the course had been met.
  • In the remainder of the course, we focused on practice - giving and honing a 20-minute lecture on a subject in our field of specialty.
  • By the end of the course, all objectives of the training had been categorically met, and we were safe to let loose as lecturers, with some well-honed techniques of presentation already learned and in place.

The above could be relevant to preparing for video interviews, or other meetings face-to-face, or presentations to groups. They are all very much the same thing - the communication of ideas.
Trying to hide oneself from that communication is not going to really help where the objective should arguably probably be to master the techniques of communication, so that one can relax and communicate in the most effective manner one sees available in any given environment or situation.**
Just because one had previously succeeded in getting a job in a video interview where the video was duff, and succeeded in phone interviews, but then failed in a single video interview where the video was working OK, does not necessarily mean, of itself, that ipso facto the video was the cause of failure. There would seem to be no statistical basis for arriving at that conclusion and it would thus seem to be a non sequitur (i.e., it does not follow).

There is often a natural shyness, an imagined and inhibiting fear of personal risk inherent in our communications with complete strangers, and it can inhibit us to the extent that it literally cripples us - inhibits our ability to perform successfully in what might otherwise be normal/necessary human interactions in everyday life or the carrying-out of our daily work. There is also a fear of potential failure in some cases - for example, as experienced by sales people making cold calls. This can lead to avoidance of risk by withdrawal. The alternative is to confront the fear, overcome it and do it anyway, and one of the most common ways of achieving this is through preparation and then repeated practice/drills - as in the training techniques described above, and as in many sales training courses.

Note:
** There are books written on the subject of "Thinking on your feet", and even courses of training (I once attended such a course and found it invaluable). They can transform one's realisation (for the better) as to what one is capable of. Anyone can learn these techniques, if they can accept the risk of having to develop and change/improve their skillset. Similarly, anyone can practice and learn to use critical thinking skills, if they can accept the very real risk to the ego of having to develop and change/improve their thinking skills.
The challenge of effectively and constructively interacting and communicating with others, and of effectively and constructively thinking about those communications - and about solving Life's problems in general - are endemic in our society and lives.
Nobody is born with the skills necessary to be an effective communicator, or the skills necessary to be an effective critical thinker. These are learned skills - acquired through learning - like riding a bike, or swimming, or typing. Yet many of us seem to go through life ignorant of the need to develop such skills if we wish to make our lives more fulfilling/improved. Yet we somehow accept being (say) "two-fingered typists", or "two-fingered thinkers".
Why is that? Who/what is inhibiting our self-development, preventing us from learning/acquiring new skills?
So-called "education" on its own will not necessary be sufficient, of itself, except where that education includes the teaching, development and behavioural practice of effective habits of communications and thinking skills (De Bono and CoRT).
736
Living Room / Re: Best Programming Jokes
« Last post by IainB on December 11, 2017, 05:15 AM »
^^ I'd recommend it (as being more useful) spending time replacing the clock anyway, rather than spending the time necessary to stick a derisive message on its face. It's all about time.
737
Living Room / Re: How can I blank out my laptop camera?
« Last post by IainB on December 10, 2017, 04:30 PM »
@Target:
yeah, those HUGE BREAST IMPLANTS are sure to do the trick...
That's very perceptive of you. Many people probably might not initially appreciate the importance and effectiveness of those implants. The implants could arguably be vastly more effective than merely cleaning one's face and putting some makeup on, in any event. Putting bigger headlamps on a car always cuts deeper into the gloom and makes the vehicle more visible, but a paint-job? Nah, not so much. Rabbits are also more easily transfixed by bigger headlamps.
738
General Software Discussion / Re: Microsoft OneNote - some experiential Tips & Tricks
« Last post by IainB on December 10, 2017, 04:08 PM »
You're a good tutor IainB!  :Thmbsup:
Seems like i'm missing something in my version of ON 2016:
http://imagizer.imag...g923/2442/tja10m.png

Heh, thanks. Though I left tutoring/lecturing a while back, I am still interested in the subject and the training and learning required to develop reasonably proficient tutoring skills was retained and useful, in my subsequent career, so it got fairly regular exercise, and now, later, again, with my children.

You're not missing anything except the visual perception of the RHS scrollbar visible in that panel in the screenshot. It's there, hidden in plain sight! I don't know why Microsoft engineers made it such an unintuitive, bad ergonomics scrollbar. If you make that panel scroll down, then you will be able to see what is below and currently out of sight in that screenshot. It behaves a bit erratically as a pukka scrolling window.  I initially made exactly the same mistake as you seem to have done, when I was looking for the information (that I knew was there) to put factually into my comment above.

I do think Microsoft might have done a better job with updating the training documentation for OneNote. It's been rather scrappily done, IMHO.
739
General Software Discussion / Re: Windows Explorer crashing
« Last post by IainB on December 10, 2017, 02:44 PM »
#rgdot: Commiserations. Not sure whether I can offer any useful help. It's a bit like cleaning out a toilet with some bleach, in the hope that "That should do it" - except that it doesn't necessarily always "do it".

I too have recurring problems with inexplicable Explorer long waits and crashes. I have various workarounds.

As well as what you have tried, I usually periodically run housekeeping:
  • Run CCleaner - file cleanup and registry cleanup.
  • Run cleanmgr in elevated/Admin status (includes expunging un-needed/redundant system files and historic Restore Points).
  • Run Windows standard Defrag.

Since your problem manifested a while back (with no prior manifestation), then a Windows Update could be an indirect cause.
My last Win10 update left some weird things happening:
  • My UserID Status had been changed (without notice) from "Administrator" to "Standard". Re-setting it to the Admin status helped.
  • Win10 had grabbed several default file extensions off of my preferred applications to the Win10 preferred apps. (Ruddy cheek!), so I had to restore those.
  • Some directories that I used were flagged as being not permitted for access by my UserID - so I had to reset the access.
  • I periodically run an executable called "Restart Explorer" that does just that - to work around episodic Explorer suspended waits/crashes. Interestingly, the "Restart Explorer" app sometimes hangs, and its process cannot be deleted, leaving a deleted Explorer PUID process (which is in process of being deleted) in limbo with zero resource utilisation, and does not start a new Explorer process. By trial-and-error, I established that terminating restarting the RuntimeBroker process clears these hangs, and then Explorer may need to be manually restarted, whereupon, it behaves for a while.

EDIT: see terminating restarting, above.
740
General Software Discussion / Re: Microsoft OneNote - some experiential Tips & Tricks
« Last post by IainB on December 10, 2017, 01:41 PM »
@dantheman: For data access/search, the relevant settings include:
1: Target Notebook:
In ON (2016), go to: File --> Options --> Save & Backup (panel) --> Save menu item:
Set the default Quick Notes Section to save to, and check the other defaults there are what you probably want.
NB: It is probably worthwhile going through the rest of the Options panels in that window to familiarise yourself with them, and change them as necessary. The other standard defaults in ON - as set up on installation - are usually adequate, but may not be ideal in all cases. The Advanced panel is especially useful. Microsoft have attempted to provide assumed default options for optimising the use of computing resources, including  bandwidth, response time, disk storage, and GPU, but the user can change these to suit their particular requirements/constraints. One cannot easily "break" anything here, but take care anyway, just in case - e.g., think twice before relocating the default save/backup directories.

Then move down to the Send to OneNote menu item:
Set it as: "To new page in section Quick Notes in [name of main Notebook whose Quick Notes section you want to use as the default]"

2: Audio search:
In ON (2016), go to: File --> Options --> Audio & Video --> Audio Search menu item:
I think this was NOT ENABLED by default.
To ENABLE this, there should be a tick in the box by "Enable searching audio and video recordings for words"

3. OCR and indexing of text in images:
In ON (2016), go to: File --> Options --> Advanced menu item:
In the Advanced panel, scroll down to "Text recognition in pictures".
This is ENABLED by default.
To DISABLE this, there should be a tick in the box by "Disable text recognition in pictures".

Hope that helps, or is of use.
741
Screenshot Captor / Re: Pasted images too large with new laptop
« Last post by IainB on December 10, 2017, 12:38 PM »
Image editors here respect/recognise SC's dpi setting. Which again makes me think it's a problem with Excel -- and high resolution monitors -- possibly to do with fonts etc being show at higher percentage (than 100%).

It's possible a search in that direction might find something helpful.

I reckon that is a good point (i.e., it might be some other cause that is not necessarily so obvious) and one that could be worth pursuing. I was reminded of it when I read this (comment cross-posted from another thread):

I've run into this frustrating glitch more than once.  I've tried 4.20.1, 4.21.1, I tried the old zip you linked.
No matter what I do, fresh install, old install, any version now, the screen magnifies immediately after I tell it to "select a region", OR, if I simply hit the print-screen button to capture the entire screen, it captures a zoomed image.

I'm running Windows 10 Pro 64-bit, a single monitor (65" screen). The computer DOES have to use AMD's Radeon scaling ability to scale the screen SMALLER since the graphics card wants to make the image larger than the 1920x1080p borders for some reason. So AMD software changes the "HDMI Scaling" by 6 percent in order to shrink the image to fit the 65" tv.

With that said, I've been using this Screenshot Captor software for a couple years now.  And the software worked GREAT until the recent SC update.  After that, it just started auto-zooming all the time, and I can't seem to find a version that DOESN'T do it now.

EDIT!!! I'm a computer technician... but my brain was really not working earlier (apparently).  I realized that if NONE of your versions of software worked properly, then it wasn't SC that changed, it was something else. And since we're talking about AMD Scaling issues or 'scaling' issues in almost every situation , I uninstalled my AMD video drivers and reinstalled them.  The issue was caused by AMD's own drivers interacting with SC somehow causing the magnification. After driving re-install, works perfectly again.
742
Living Room / Re: How can I blank out my laptop camera?
« Last post by IainB on December 10, 2017, 12:22 PM »
@kalos:
...I have 0% success in video interviews and 100% success in telephone interviews, ...
I couldn't really understand your difficulty here, but, triggered (in a good way) by the comment:
Then do as many women do: clean up your face and put on (some) make-up 8)
- I mentioned this discussion thread (above) to one of my associates - an excellent management consultant who has some experience in this area - by the name of "Mellanie" (not her real name). Mellanie said she quite understood what the problem was. She explained it to me, and certainly opened my eyes. She empathised with your problems and asked me to post the following advice, hoping that it might be of help, but wishes to withhold her real name and contact details:

Dear forum member,
How interesting to read of your situation - and how like my own experiences! I understand precisely. My sympathies, but worry not. All you need is to have faith in yourself and the good intentions of your fellow man. If you follow my example you may be able to transform your life, as I have mine:

I had almost exactly the same problem, some years ago, but solved it with a bit of lateral thinking. Best decision I ever made. I invested a lot of money in myself.
I already had good educational qualifications (e.g., including a Harvard law degree and good groundwork experience as a lawyer), but was an unattractive-looking person with some genetic deformity of the head/face and upper spine, including a wonky eye, hare lip and a cleft palate and a slight humpback. These sorts of things were thought to put some clients off, so I found myself "unwanted" and was sidelined as a back-room support lawyer and researcher, with little - if any - face-to-face client interaction, and relatively low pay.

So, I had some of the best plastic surgery a body can buy - on my top half - to transform myself into an attractive 30-something blonde woman (I use a wig for the hair) and with huge breast implants. After months of difficult surgery, gone were the wonky eye, cleft palate, hare lip and any visible hump (from the front view at least). When the scars had all healed up, I changed my name from "Frank" to "Mellanie" (not my real names as I wish to remain anonymous), and held video interviews wearing a daringly low-cut (revealing) top. The bits the interviewers saw in the video included just my front - head, shoulders and mouth-wateringly deep cleavage. Even I would sometimes feel a twinge of physical self-desire when I looked at my own upper body image in the bathroom mirror. Those surgeons (one of them was a guy who called himself Doc Hollywood) had done a superb job and really had earned their money. It was a pity that, at the time, I could only afford to have the surgery performed on the upper and front parts of my body, otherwise I might have considered going "the full wax", but I wasn't made of money like these film stars or army transgenders - and anyway, I'm not a transgender. I am a gender of convenience.

During each video interview, "Mellanie" used a speech converter to transform my voice into a mellow woman's voice suiting the image the interviewers saw on-screen. If there was any distortion, or my male voice momentarily came through at the edges a bit, then I could always vaguely mention and apologise for "audio problems on the video link at my end", or something.
The first job I bagged as Mellanie was only my second interview - the company on the first interview were not a good fit. The second interview was the opening interview with a different company for the role of a management consultant in a reputable firm of mostly male consultants. The interviewers (all men) were so spellbound with my lovely visage and voluptuous femininity during that first opening video interview that they probably didn't really take much notice of anything that I said, and hired me on the spot, without even bothering to check my references, and sent me the contract pronto by fast courier for me to accept and return - which, of course, I did!    :Thmbsup:

The first they knew that I was actually a bloke with a 6 foot 4 inches physique and a baritone voice was when I turned up in person on the first day to start work and go through induction, dressed - and looking the part - as an attractive young woman with muscular, hairy legs, and declaring myself (dishonestly) to be of feminine gender and a transvestite/transgender.
Of course, they could do nothing. As a  lawyer, I knew that I was Untouchable. I had a job for life, if I wanted, as my disadvantaged minority status meant that I could not be sacked, and in any event, I knew from my research that they were already having difficulty keeping up with their minority diversity employment quotas, and I could help them fill three critical spots - feminine gender, transgender, and physically disabled/disadvantaged (the humpback). They knew that it would have been professionally suicidal and unacceptably politically incorrect to make even a mention of my transgender status or the fact that they suspected that I did not have a female pudenda, or give even a hint of an objection to me - that would have been bigoted victimisation of a transgender at least, which by then was almost a capital offence in some States.

Yup, I had them over a barrel from day one, and they knew it. If they were smart (and they were), they knew that if they gave me any strife, then - just by lifting my little finger - I could put them in a world of legal pain and punitive damages into the millions of dollars - e.g., if they even dared to mention or object that I was not a "real female" as they had thought, or tried to squeeze me out with harassment, sidelining, or low pay-rises. They had to use me in top client face-to-face interactions in order to get some payback for the high salary I commanded. It was all really developmental experience for me - which was what I had wanted. I was on the gravy train for life.

I have successfully used this strategy for going on 10 years, moving jobs easily and being promoted from strength to strength, always for a much larger salary and pension each time. The strategy has helped me secure directorships of several self-styled "diversity" companies, as well as turned me into a rather capable professional management consultant. I work hard and enjoy my work immensely.

Each employer gives me the most glowing references a body could ever wish for, because they have to and because they very badly want to. Only by ensuring that they help me to go to a satisfactory (to me) and more highly-paid job can they get rid of me and relieve themselves of the burden that I represent and of the perpetual unspoken threat of litigation for gender and disability discrimination. By doing this, they hope to make me SEP ("Somebody Else's Problem") - though, to be fair to myself, I always do a good job, performance-wise, wherever I am, so it's decidedly not as though I don't earn my keep or am incompetent or can't deliver at the level that I have been promoted to (à la the Peter principle). Of course, though, for the majority, performance reviews are a sick kind of demeaning and hypocritical corporate lottery/fraud with absolutely no basis in statistical veracity, it is automatic in my case that my performance reviews always place me in the upper decile for salary and pay rises. That salary history of constant pay-rises of course serves to reflect and is consistent and compatible with and supports the veracity of my glowing references - which are so necessary for the company to expedite my moving on to the next job. In prudently looking after their best corporate interests, the company effectively have my best interests as a vitally necessary target.

The world can be one's oyster.
743
Living Room / Re: Can you hear this silent GIF?
« Last post by IainB on December 09, 2017, 09:17 PM »
I suspect that, once it has first been suggested that one might hear something, the level of one's suggestibility will then determine whether one hears something, or not - i.e., suggestion can be a pretty powerful sort of hypnotist's psychological trick.

It's nonsense anyway, as everyone knows that electricity pylons don't play skip-rope. That would be just plain silly, as my 7 y/o son has just pointed out to me. I think he might be right.


744
Living Room / Re: How can I blank out my laptop camera?
« Last post by IainB on December 09, 2017, 09:02 PM »
Use the highly-acclaimed "Zuckerburg Security Method" - i.e., attach a piece of opaque (won't let light through) tape over the camera lens and light. It is rumoured that, if you utter a couple of profanities whilst doing this, then this action could also help to consolidate/compound the effect, thus helping to make the whole thing more effective and may even help to make you a millionaire. (Unverified sources.)
745
Details of update to a very useful macro, posted in Onetastic:
(Copied below sans embedded hyperlinks/images.)
Macro Update: Convert Copied Paths to File Hyperlinks Macro
There is an update to a macro in Macroland - Last Updated: December 03, 2017
Convert Copied Paths to File Hyperlinks Macro by Simon Rear

Converts selected pasted "Copied Paths" into file hyperlinks. This provides similar functionality now removed from OneNote that allowed files copied from windows explorer to be pasted as hyperlinks.
To use:
1-Ctrl Select multiple files within windows explorer,
2-Shift + right click one of the selected files,
3-Choose "Copy as Path" from context menu,
4-Go to OneNote and paste into a page,
5-Select all pasted paragraphs,
6-Select "Convert Copied Paths to File Hyperlinks" from Onetastic's hyperlink menu.

See a demo of the macro in action at https://youtu.be/22nMT8wy8Cc. If you find this macro useful please consider donating to http://www.paypal.me/SimonRear to encourage the development of more useful timesavers.

In this version: Previous macro version had double backslashes stripped out after upload for some reason introducing a bug preventing macro from working. This version corrects this.

Go to the macro | Comments (6)
746
General Software Discussion / Re: Microsoft OneNote - some experiential Tips & Tricks
« Last post by IainB on December 09, 2017, 08:32 PM »
@dantheman: I just re-read what I had written above, and wondered whether I should have mentioned how OL (Office Lens) is integrated for use with OneNote and Onedrive. So, from memory and at the risk of duplication, in case you did not already know it:
1. Capture the document/whiteboard/photo/business card using the camera+OL.
2. Save the thing captured - document image/whiteboard image/photo/smart VCF business card (respectively) to one or both selected default destinations:
  • a OneNote Notebook (you will need to have previously set up the default destination for this save). The OneNote Notebook can be either in the Cloud (i.e., a Notebook in your OneDrive storage) or on the Client (i.e., a Notebook saved on the PC's hard drive).
  • somewhere else (typically OneDrive or your PC's hard drive) as an image file or as a document file (e.g., Word or PDF file) saved to somewhere else - typically a UserID subfolder - e.g., (say) Documents folder or Camera Roll/Saved Photos, etc.

Remember that any images saved to OneNote will be automatically OCR-scanned (this first has to be set ON in settings for it to be the default action) so that any legible text in the image becomes indexed data and can be found using the search function in OneNote (is only searched/found if the Notebook is OPEN when you start the search), and can also be found using WDS (Windows Desktop Search), if the Notebook is on the Client hard drive and that filetype (.ONE) is set to be indexed.
747
Living Room / Re: War Dogs – This brought tears to my eyes.
« Last post by IainB on December 09, 2017, 09:33 AM »
Statistics of dogs-killing-family-members demonstrate pretty conclusively that it will happen (otherwise there would be no such statistics) and that police/military-trained dogs are no exception, but in fact more likely. They are typically the loaded guns.

Such killings typically happen when the dog-handler is not around. It is thought that the dogs involved initially have become confused and, for some reason, decided the victim is a valid target that needs to be attacked. After that, their killing instinct seems to take over.

Quite coincidentally. here is a Liveleak vid that I saw in my BazQux feed-reader today:
Bodycam Video Shows Police Dog Attack innocent Woman

Fortunately, the police-dog's handler in the video was around to stop it turning into anything worse than a severe mauling of the arm and hospitalisation for the distraught victim, who asks: "Oh, what did I do to him?", to which the response was "Nothing. You were in the wrong place at the wrong time."

What was interesting in that is that the command to let go of and stop biting the woman's arm (sounded like "Out" repeated calmly several times) was not initially responded to by the dog. I would usually call that "bad training", because the handler of such a dog would need the dog to obey an instruction immediately.
If I lived in a neighborhood where police dogs and their dog handlers worked and the dogs could not be kept under control, then I would not feel safe for myself or my children.
In the UK, I think it may still be the case that any dog that attacks and bites people, without cause, is rapidly transferred to that great kennels in the sky. Owners of fierce/fighting dog breeds (e.g., including pit-bull terriers) also need to have a special dog licence and to keep their dogs fenced in, and kept muzzled and under control on a leash when out. They are not cute pets.
748
Living Room / Re: good Videos [short films] here :)
« Last post by IainB on December 07, 2017, 03:39 PM »
@Deozaan: Adam series - thanks. Annoyingly too brief. Rather good.
749
General Software Discussion / Re: Downloadable Office trial
« Last post by IainB on December 05, 2017, 09:38 AM »
I just added some details to my detailed 2nd post above - about the downloaded ISO file size and the SCDkey affiliate program - <https://www.scdkey.com/affiliate-program.html>

@mouser:
If you found it to be a good/trusty vendor, DCF could (I presume) benefit from some revenue by becoming an affiliate. (Just a thought. It's apparently what Britec do.)
I would like to know how their business model works!

They are apparently located at: AMZGAME CO.,LIMITED (FLAT/RM B,4/F,KINGSWELL COMM TOWER 171-173 LOCKHART RD WANCHAI ,HK) - from the foot of their webpages - e.g., <https://www.scdkey.com/scdkey-about-us.html>
I wondered whether the insides of their offices really do look like in the pix.
750
General Software Discussion / Re: Downloadable Office trial
« Last post by IainB on December 05, 2017, 08:41 AM »
@tomos: I don't think the sky is falling down just yet.
If one follows through the instructions before committing any $$: (I've numbered them below)
  • Promo Code: SKvip12%
  • GET IT HERE!! :  <https://goo.gl/h7Hm92>
    (That shortened link takes you to SCDkey: <https://www.scdkey.com/office2016-professional-plus-cd-key-global_1530-20.html?b> but please use the shortened link in case it benefits Britec.)
  • Download and activate product key here: <https://setup.office.com/>
  • Office Professional Plus 2016 For $30 : <https://www.youtube.com/watch?v=UHgBDZSgePk>

 - then one will be able to observe that at STEP 3 the product key is validated by Microsoft prior to Microsoft actually downloading the software from the Microsoft site at <https://setup.office.com/>/ That is, the software is only downloaded by Microsoft if the key is valid. The download of the Office 2016 installation package was uneventful and took a couple of hours on a slowish connection, by the way.
EDIT: The download was (from memory) an ISO file of about 2.9GB, which needed to be mounted as a CD-ROM in a virtual drive, and the installer run from that. (All dead easy on Win10.)

SCDkey Appears to be a legit and trusted vendor of discounted software and game keys, including, for example, for Steam, Xbox, MS Office. I could not find that this site had/has a bad rep as a fraudulent site - and presumably, neither could Britec, who does not anyway intentionally link to fraudulent/dodgy sites AFAIK.
EDIT: SCDkey operate an affiliate program: <https://www.scdkey.com/affiliate-program.html>

Thus the only risk might seem to be that the key one buys at STEP 2 might not be deemed valid by the time one gets through the validation by Microsoft at STEP 3.
In that case (i.e., if the key was invalid), then one would go back to either request a new (valid) key, or reclaim one's purchase cost of the licence from SCDkey (they also have an online chat window for support).
If they (say) refused to help or pay up, then one could reverse the transaction via the standard disputes procedures of PayPal/Visa etc. - and one's rights to avail oneself of those procedures last for about 180 days, as I recall.  If PayPal/Visa etc. received information/complaints that SCDkey was flogging dud/illegal keys and not refunding, then they would freeze and ban SCDkey's merchant accounts - which would presumably kill SCDkey's business.

There would thus seem to be little (if any) financial risk, together with a strong incentive for SCDkey to be as helpful as possible to customers - and they do seem to be. For example, I was very impressed with how secure and efficient their EFT-POS website was - so was my friend who was sat next to me as we proceeded through the steps above (it was her money that was being spent). Like I said - it worked a treat.
However, I'll let you know (via this thread) in what would seem to be the unlikely event of it suddenly turning to custard.
Pages: prev1 ... 25 26 27 28 29 [30] 31 32 33 34 35 ... 264next