Jump to content

I_Broke_My_MHZ

Member
  • Posts

    185
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by I_Broke_My_MHZ

  1. It will only be divided if the three computers are using the internet connection at the same time.
  2. It isn't quite spying because they do tell you, but WMP prompts if you want to send information on what you have been playing to microsoft, your GUID and other info.
  3. This is an interesting debate, especially since what you often find is the "installer" is just a package that copies files, so the files are on your hard drive the same as if you didn't install it. Let's look at the differences: 1) When you install a program, you are presented with an EULA. If the owner of the program prohibits storage of any kind it might not matter if you never were presented with the EULA (but this I don't know for sure, or if the EULA has any weight at all). 2) When you install a program, your computer does more than just write data. It reads the instructions that the installer tells it to execute, hence "executable". If your computer were to just copy the data it is only executing the commands that the operating system gave (to copy the data), it is not reading or doing the instructions of the installer itself. Therein lies the difference. Otherwise you could say that if I sent an email to my co-worker and the co-worker opened it, he installed the email because the computer copied the data from the server into memory (or even the hard drive if VRAM is being used). So install does not mean store, your friend is wrong.
  4. If you have a router you don't need the windows firewall/ICS service.
  5. Sony sure is catching a lot of crap for this. Windows Media Player has DRM and it can't be removed (technically its about as hard as removing Sony's drm), why isn't MS catching s***? When the EU was suing microsoft everyone was crying that the EU was being unfair, but now Sony is pulling the same crap that MS is with their DRM technology (installed without prompt, not easily removed) and everyone is up in arms. I know, im ranting, but people need to get real!
  6. It's only when you are connecting a router to a router that you have to deal with configuration. Adding a swich should just work as long as you use a crossover cable.
  7. That's a good way to push someone to not like their job anymore. Too much overtime takes away passion and nothing can bring it back.
  8. I stuck with Classic at first, but I was kinda bothered by the fact that the icons didn't match the theme. After I found wincustomize I picked a few themes that I did like. There are too many good looking themes to just stick with Luna.
  9. Go to wincustomize.com and get a real theme.
  10. Wireless isn't supposed to do that. Try upgrading the firmware of your router. If that doesn't work, reset the router's settings and change the channel (the default is usually 6 or 11, so something like 3 or 1 or 9 will do)
  11. There is a blank entry in msconfig that suddenly appeared. Is this just a bug? Could it be something malicious? I don't have any viruses or spyware, I'm very good at preventing them, but this entry still bothers me.
  12. The three most related courses involving computers are computer science, computer engineering and electrical engineering. Electrical Engineers are more hardware oriented, computer scientists work more with software, computer engineers sit in the middle.
  13. It's quite surprising how he was able to get his hands on a hacker program that actually works instead of one that just installs a virus.
  14. WinXP home you might have a bit more difficulty with due to limited functionality. I hear that there is a *ahem* somewhere that allows you to enable XPPro functionality in XPHome, so maybe looking for that is the answer.
  15. Some wireless programs are very poorly written. The greatest example of this is the D-link ones, or at least the older ones. Experiment and try out which one you like.
  16. I installed Windows XP to see what it was like and to my horror I saw a big ugly interface that I later learned was known as "Luna".
  17. Make a post using much greater care to ensure that it is intelligable. I understand that it is hard but I just can't understand what you want.
  18. How about not being so ambiguous. What application? What port?
  19. Exploits are what viruses use to infect a computer. The antivirus program is telling you that computers are trying to connect to yours using such exploits. These are NOT coming from your ISP. They are probably coming from other users of your ISP.
  20. It sounds like the firewall is improperly configured (on your part), which is blocking both the bad and some of the needed stuff for the connection. Of course, when you disable the firewall all the bad stuff gets in. However, this malicious traffic is NOT coming from your ISP.
  21. The advanced options allow you to pick and choose more specific permissions and ownership settings.
  22. If this is just a User1 and User2 situation, then you can set security permissions on the folder itself. Right click the folder, properties, security tab, add the proper users and configure the correct permissions. If there is an array of users you want to have permission and an array you do not want to have permission, then you will need to setup a group first with active directory.
  23. Why does this kid have the privaledge of using a corp. server? Seriously, quit your job and find a new passion, or get a clue. This is just reckless.
  24. It's on the recovory CD, but I don't know how to restore specific files manually. I got an idea! Open up the command prompt and enter sfc /scannow If the file is corrupt it will tell you.
×
×
  • Create New...