Jump to content

Former Big Iron Guy

Member
  • Posts

    4
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

About Former Big Iron Guy

Contact Methods

  • Website URL
    http://

Former Big Iron Guy's Achievements

0

Reputation

  1. Glenn, The *best* explanation and the best tool for these very esoteric "shortcuts" is found on Hermann Schinagl's website at Link Shell Extension (I.M.H.O. ! !) His shell extension and file link name utility are pretty awesome. I plan on using them to eliminate redundant data files in several games I have where the files in the "expansion" pack duplicate (at least hash-wise) the files in the original application. In my game program directories (Age of Kings/Conquerors, Age of Mythology/Titans, Cossacks: Back to War mod pack 1) I have right now 9196 files, with 832 originals with 1153 duplicates, said dupes taking up 10.90MiB of space. That directory is going on a space reduction diet real soon now. And gaming isn't the only place this happens. If you use something like Chuck Baker's FEBE to back up Firefox extensions, same sort of thing can happen. In my 5 deep FEBE backup, I have 52 originals with 78 hash-duplicates taking up 15.13MiB of very precious network flash drive storage. Try it and see. Works for me. /s/ fbig
  2. I can resemble this situation. Newly purchased commercial app. Opened it as I had daily for a couple of weeks, and SHAZAM! I had several .exe's and their icons go missing while I watched, not only the desktop shortcuts, but the program menu ones too..... Well, I used Robocopy to clone the app tree to another drive and blew the old tree away and did a clean reinstall. After the install and reboot, I ran KDiff3 against the directory tree. Only difference at first was missing executables. Then, again as I watched, things started disappearing. Did I have a program eating virus? Other malware? I fired up the OEM version of my AV/AM (Sunbelt) and pointed it at the system drive. Nothing found... (It was aready gone..) By chance, I opened up the quarantine menu, and there all the executables were. Blacklisted automagically and moved to the quarantine area, which is not visible to most searches, etc. Turns out that I had tweaked my AV/AM settings a little too much to the paranoid side. The background AV/AM process was slow crawling the file space and these guys were not on its approved list, or were otherwise suspicious, so it zapped them to the quarantine. Problem went away when I whitelisted the exe's and other program items that had been moved. Problem solved. Q.E.D. /s/ fbig
  3. Unless my list extraction error-ed out, here's another twenty. RIGA REBA REBS RIBS FIBS BIBS DIBS DABS TABS NABS NATS SATS SETS JETS HETS VETS GETS GUTS PUTS PUDS and I've left at least one escape from this chain. /s/ F.B.I.G. - sometimes you just can't Lurk......
  4. I went to Nero 5 when it came OEM'd with personal external CD reader burners. Liked it lots better than CD Creator 4 & then 5 that the company had on my company laptop. Was happy, mostly when I went to the DVD burner with 6 OEM. then the DL burner with Lightscribe when I bought the full 6 package and then upgraded to 6.6,xxx. I looked at the bloat and such with Nero 7, 8 and 9, and I'll stay at 6.6 until I can't do something with it, on a consistent basis. I also use ISO Buster for the more esoteric things that are easier that way. I just wish the mfg's would realize that if it is a pig, you can dress it up and put lipstick on it, but it is still a pig. <Semi-Rant state=on>The only difference in the word processing and spreadsheet stuff I do now, as opposed to what I did in the 8 bit era is that I have faster printers (laser and inkjet) as opposed to daisy wheel and dot matrix, so I get prettier and faster output. The basics are the same..... The price sure isn't, and the total feature set has mushroomed and ballooned well beyond *all* reasonable expectations. (Blame marketing!). In some ways, I could do as much or more with my 64K 4Mhz CP/M machine than I can with my 2.66GHz 4GB XP Pro box. Sure didn't need to have *all* those seldom or never used features added to the mix......<Semi-Rant state=off> I don't need all those fancy bells and whistles added in. If I want to do some of the stuff Nero thinks I should do, instead I pull out the real thing like Adobe Premier...... -F.B.I.G.
  5. Ah, the responsibility of being a good IT literate parent. I have shepherded two college age sons in their computer growth and responsibility. Respect, ground rules, openness and consequences. Plus some absolute policies and a little hardware. As they have grown older, they have gotten more ability to do their own thing. 1. I assume that you and your spouse purchased the machine. (We bought it, *I* am the one who fixes and upgrades it, therefore I get: An administrator account on the machine. The right and priveledge for unannounced inspection of the machine. Approvals for all applications installed or downloaded. The right of take-away, time-out, access or user level restritions for "bad behaviour" 2. To do the administration on my SOHO net, and keep track of these things I use some standard software and procedures that are mandatory. I use Network Magic Pro - Best easy to use SOHO network package I have ever found. Multiple User Packs of Avenquest-VCOM System Suite, Gives you AV, AntiSpyware, Firewall plus some of the better flavors of repair and recovery, optimization and tuning software packages. Firefox, Irfanview, SysInternals, Nirsoft, Copernic DT Search and other appropriate open source or free packages. We use MS Office 2K3 Teacher and Student edition, because most of the schoolwork to be turned in electronically needed to be in that format. 3. For monitoring and blocking I administer the master account and all email passwords for the accounts provided by our ISP. I use Logviewer on my Linksys Routers and send multiple reports schedule to DShield. I also review those logs several times a week. I use site blocking techniques, graded appropriately by age. Intrusion reporting runs on one of the retired desktops, and alerting is set up wherever possible. I use one of the VNC packages for remote monitoring if required. 4. For filtering and access control I use or have used Net Nanny back in the W95 days, but gave it up because of the spotty support. For restrictions I've used DLink's Secure Spot Web Protection Device. (Has the best filtering for the SOHO user, approaches Websense in functionality.) OpenDNS with custom filtering has replaced the D-Link because it wont keep up with my turbo rate. Time restrictions can be applied on the Router (and are) Son who is at college, on campus net also has an Alpha-Shield stateless filter device. I put that on his setup after the first family day, when "Dad. my machine is acting funny" came up. I did a quick analysis of the situation, he was hosed with all kinds of nasties. I then pulled out my traveling kit (honking USB thumb drive) and a good number of downloads and patches, then fixed everything. (Did miss the first half of the homecoming game though....) At supper after the game, he had to listen while I politely ripped him a new one in front of the whole family, without even raising my voice. I gave him all they whys and wherefores, then we went to the computer store, I gave him the $$$ and made him buy the Alpha-Shield, and install it before we left campus. He is now a true believer. 5. Sanctions for bad behavior depend on the severity of the offense. Additional blocks on the web content Increased scrutiny of logs with counseling on visits to bad places. Specific site or type blocking. Demotion of user level Moving of machine from family room to the passage alcove next to the kitchen (High traffic area) White/blacklist applications or uninstalling them if really bad. Removal or disablement of features. e.g. take out the good display adaptor and leave the poor built in vga. Seizing the computer, backing it up or using one of the forensics linux distros on it, Then reinstalling the factory image. The miscreant then has to reinstall everything under my supervision. 6. "Emergency" Situations are handled on an ad-hoc basis. Screen and Keyboard/Mouse recording when a son was being harassed in social networking, movies sent to providers and harasser's ISP, as well as saved for law enforcement. Stopped the little ~!@#$%^&*() pretty much cold. Changing the wireless password on my seldom on router (we ususally run wired at 1 GB, even the wireless laptops) Visiting the neighbors with unsecured AP's or wireless routers to help them lock *my* guys out of their networks. No wireless poaching allowed! The Internet "Off" Switch. (I have an A/B switch logically the next device after the cable modem. A for Access the net, B for Block/Bitbucket.) 6a. Not only does the A/B switch stop that net game or chat or flash movie that needs to be stopped because it is time to go to school, eat, go out or whatever, but has other emergency use also. 6b. When something bad gets loose inside the firewall, I can disconnect from the net by reaching to the back of my desk and throwing the toggle over to "B". This was really handy, BTW, when my worst offender got an IRC 'bot as the bot herder tried to set up a DDOS against someone. When my alarms went off, I threw the switch and isolated the home from the net. Good thing too, since the +_)(*&^%$#@ bot then attacked the rest of our desktops using the standard $IPC attack tactics. We shut and locked down pronto. Came back up on Linux and USB keys and killed that sucker where it lived in our machines. Lastly, you have to hold on to your trust as well as your temper. Anger and sanctions have their place, to get the kid's attention. But sitting down carefully and explaining why a certain behavior is bad and why is much better than being arbitrary. It is reason son who was being harassed felt that he could appeal to the old man when he was being beaten up electronically. I helped him install the recording software and suggested what he should say as he dealt with the miscreant, to keep my kid out of trouble and point out the bad things the other guy was doing that I never wanted to see or hear about my son doing. Let them grow from the walled back garden of home computing in safety to being ready to enter the workforce and greater community with guidance, expectations and encouragement. We'll all be better off for it. -F.B.I.G.
×
×
  • Create New...