Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


  • Content Count

  • Donations

  • Joined

  • Last visited

  • Days Won


FranceBB last won the day on May 28

FranceBB had the most liked content!

Community Reputation

269 Excellent


About FranceBB

  • Rank
    Broadcast Encoder
  • Birthday 07/29/1993

Contact Methods

  • MSN
  • Skype

Profile Information

  • OS
    XP Pro x86
  • Country

Recent Profile Visitors

3,650 profile views
  1. I'm lurking 'cause I use PotPlayer on a daily basis; as a matter of fact, I'm using it in this very moment as well 'cause my stereo only gets FM and not DAB so I listen to radio using my computer. (FYI DAB in UK airs at ridiculous bitrates, so do online radio, but we don't have any alternatives and they sound better than FM despite the very low bitrate, so...) Anyway, I'm concerned about another program as well: Telegram. I stopped receiving updates with my version (1.2.6) and if I click "search updates" it doesn't show any updates, however if I go to the website I can see that newer version have been released (without my knowledge). When I tried to install the very latest version (1.8.7 beta), it let me install it and it works, however it shows a big fat red bar at the very top saying that I should update my OS, so I think that telegram may stop working "soon".
  2. You can't invent pixels out of nowhere. What you are actually seeing is the maximum resolution of your screen, there's no way to increase it as every pixel physically correspond to an object on the screen that is charged electronically and displays a value between 16 and 235 (between 0 and 0.7 Volt) or 0 and 255 if it's full range of RGB which gives you what you see as an image. For instance, if you had a camera that was able to zoom enough you would see that when you are seeing white, each and every pixel is turned on with the maximum voltage available. You can basically see why you can't increase the resolution: there won't be enough pixels on your screen to fit it, so you would end up with a partially represented screen TL;DR parts of the elements of your desktop will fall out of your screen. - trick and attempt 1 If you are really willing to try, you can use the Windows scaling function to scale down desktop icons and text or in Firefox/Chromium to zoom out web pages. This won't give you more resolution, however it will make text and icons smaller and give you the feeling of having a higher resolution. - trick and attempt 2 Just like it's possible to encode images and video with a Frameserver, it must be possible to make a downscale of your desktop live. What I mean by that is that you will set the resolution very high and then you'll downscale the resulting signal down either via software or via hardware to fit the resolution of your screen. There are many resizing kernel like PointResize, Bilinear, Bicubic, Lanczos, Spline based resizers etc. I would personally suggest to use Spline64Resize or Lanczos. They are both very sharp, but spline is prone to create ringing on texts. This way you're definitely gonna make use of the space created by the new pixels, but you won't see them! What you'll see is rather an interpolation of them made by the resizing kernel you selected and it may look aliased or with ringing or even so mis-represented that it's impossible to read! If you wanna learn more about resizing kernel, check this out (beware, it requires at least a basic knowledge of linear algebra): http://avisynth.nl/index.php/Resampling Source: I'm a broadcast engineer you can find me on Doom9 (the international encoding forum) talking about... well... encoding all the time.
  3. And in the meantime, over here nobody shared the premium updates for XP worth 15k bucks per year since the end of support, but I'm confident that if a big enough security vulnerability will come out, Microsoft itself will publicly release the patch (or someone else will). Hello... it's me... I was wondering if after all these months you'll like to read... And go over... everything... They say time is supposed to heal ya But I ain't done much healing... Hello, can you help me? I'm on Microsoft Updates where we all use to be When we were supported... by everything... I've forgotten how it fell When installation was just a click... There's such a difference... between now and then And thousands of BATs... Hello from the other side I must have tried a thousand times... To go to Microsoft and try to update And make my computer... once again safe... Hello from the other side At least I can say that I've tried... To tell Microsoft 'I'm begging you... from the bottom of my heart' But it doesn't matter as it doesn't tear you apart Anymore... (Adele feat FranceBB - Unsupported OS).
  4. I would, except for the fact that it's written in Electron which is a programming language that doesn't support XP. I wrote to the developers long time ago but they didn't bother. The client isn't compatible and the website is crappy. Sure, there are unofficial clients made by third party developers that actually work on XP, but with no audio support. I gotta say that ever since Microsoft dropped support for XP on their Skype client, we have officially lost audio support as well, that's why we're looking for alternatives that are XP compatible and that support multiple audio calls.
  5. I know, but Telegram doesn't support group calls that's why we created it on Skype years ago. When Telegram will support group calls, then we'll move to Telegram.
  6. Good idea; I can make it execute the command whenever my VPN connection drops.
  7. That's because it's still a work in progress. It takes time, especially since Microsoft is a closed source oriented company and everything has to be guessed by disassembled lines of code of their own executables and libraries with potentially a lot of errors and no documentation whatsoever.
  8. Hi there! I'm gonna be in Italy for the next month or so and I'm gonna be using random wifi networks as I travel with my laptop, that's why I'm gonna use a VPN. I already have a contract with a VPN provider and it works fine as it has every protocol I want, from the most recent one to the very oldest one. As a matter of fact, going out and about with a computer running Windows XP using random free public Wi-Fi hotspots of various train stations in late 2019 isn't exactly the safest thing in the world and even though Avast Premier is definitely gonna do its job, I wanted to make sure to be protected, which is why I'm using a VPN and I want it to be constantly connected. On my laptop I have a triple boot with Fedora, Windows 10 and Windows XP thanks to GRUB which allowed me to chainload them all. Anyway, long story short, on Fedora I set up UFW (the built in Linux Firewall) to block all connections except for the IPs of the VPN servers I specified with the port I specified; this way, if the connection drops, all the traffic is gonna be blocked as well. I tested it and it works like a charm. On Windows 10, I have the official client of my VPN Provider which also has an internet kill switch option, which works fine. Anyway, I don't really use Win10 for anything but work-related stuff as I like to keep it clean and with only work-related things 'cause I hate it and I don't wanna use it as my daily OS. On Windows XP... Well... there's no client as it doesn't support XP (of course), so I set up the connection using the built in XP connection manager and I managed to connect to the VPN with an extremely vintage Dial-up-like window. Even though PPTP is very old and it's deprecated, I decided to connect to the VPN server using that protocol as I didn't manage to get L2TP working. Anyway, that's not a big deal; I mean, I'm not dealing with military-grade secrets here... (or am I? hahaha). Anyway, I disabled the idle time disconnection with this command: net config server /autodisconnect:-1 , I clicked on "redial" in order to re-connect if the connection drops and I set the amount of seconds between each retry to 1 sec and the number of retries to 9999999. (By the way, it's funny how it says "redial" instead of "reconnect" as the window was originally created with telephone numbers in mind back when dial-up was still a thing). I tried to simulate a few internet drops and it works, I mean, it does reconnect as quickly as it can, but my question is: is this enough? I mean, is there a way to make sure that I'm not gonna leak anything? Like making an internet kill switch I made on Fedora that blocks all but the selected ip addresses and ports? It seems that the default windows firewall is not up to the task nor is the Avast Premier Firewall, so... is there something I can do? This is how my connection looks like right now: Any idea? Thank you in advance, Frank
  9. Well, it's been working for 19 years and it's still doing its job, why should they change it? XD
  10. CTF is part of the Windows Text Services Framework (TSF), the system that manages the text shown inside Windows and Windows programmes. When users start a programme, Windows also starts a CTF client for that programme. The CTF client receives instructions from a CTF server about the OS system language and the keyboard input methods. If the OS input method changes from one language to another, then the CTF server notifies all CTF clients, who then change the language in each Windows programme accordingly, and in real-time. So far so good, but there's a problem: the communications between CTF clients and the CTF servers aren't properly authenticated or secured (I.e there's no access control in CTF). This is what Tavis Ormandy, a security researcher of the Google's Project Zero elite security team, had to say about this: "Any application, any user - even sandboxed processes - can connect to any CTF session. Clients are expected to report their thread id, process id and HWND, but there is no authentication involved and you can simply lie." "So you could connect to another user's active session and take over any application, or wait for an Administrator to login and compromise their session." And this is what Catalin Cinpanu (security expert) had to say: "An attacker that hijacks another app's CTF session can then send commands to that app, posing as the server -- normally expected to be the Windows OS." "Attackers can use this loophole to either steal data from other apps, or they can use it to issue commands in the name of those apps." "If the apps run with high-privileges, then those actions can even allow the attacker to take full control over a victim's computer." Now, I know what you're thinking "what if we disable it?" and... well... I don't really think we can, in fact, because of CTF's role (to show text inside ANY programme or service) there's a CTF session for literally everything and every user interface element on XP... Sure, antivirus softwares like Avast can try to prevent threats from getting to the computer, but what about those threats that haven't been discovered yet? Well, that's a problem. Besides, it's very unlikely that we're gonna get any update for XP/WES/POSReady at this point, so I assume that the vulnerability is gonna stay there and this is a pretty big one, I think, so... what are we gonna do now? Hope and pray for Microsoft to care enough about good old XP users and release a patch? Link to Google project zero where I read about it: https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html?m=1 Side note: this is a thing I would generally write inside the POSReady 2009 update topic, but I feel like it has become way too big and since support is officially over and we're unlikely going to see any new update, I didn't want to bring it up again, but... if you feel like it should be inside that topic, feel free to move it and merge it, Dencorso.
  11. It's too damn hot over here... I do have a fan, which is spinning at the maximum speed, but it becomes pretty much useless when outside there's 40°C and inside my house there's 37°C. You know, turning the fan on is like getting hot air from a giant hair dryer. I even had to downclock and downvolt my CPU a bit otherwise it was going to overheat for very simple task. Thanks God I do have air conditioning at work.
  12. Every time I see this topic active with someone that replies, I quickly open it 'cause I keep thinking that someone will find the KB numbers of post-EoS updates and will post the names here so that we can download them... Will this ever happen, at this point, I wonder...? 15k per year might be less than what the Navy spends on toilet paper and just a few bucks for governments and companies, but it's way more than what I'm willing to spend to keep my XP updated, so... c'mon people, we're still waiting for a "hero"... (Out of curiosity, if Microsoft was willing to put past EoS updates available for private users as well for something reasonable like 100 bucks per year, I would have happily bought it and I think many other people would have done the same).
  13. Hats off, Dave, you are the Windows XP Spotter of the year. XD
  14. I have no idea, but I think they'll probably use an FTP or Aspera or something like CloudConnect and so on. Like, professional file exchanging platforms. Anyway, that's just my assumption.
  15. Microsoft is still patching XP/ WES / POSReady 2009 x86 and they are releasing updates on Microsoft Updates. Links are then shared with companies that are paying for the premium support 15k bucks per year. For instance, the navy said that they kept buying the premium support because they do have machines running XP and that 15k was less than what they spend for toilet paper on all their facilities. Other governments and private companies bought the premium support as well. Unfortunately, those updates are not indexed on the catalogue and we don't even know which KB number they are gonna get, so we can't access them, however if we knew about the number, downloading them would be as easy as manually writing down the link to Microsoft Updates / name of the sub folder which is named after the month and the year / KB with the code of the KB. I still hope that a hero will pop out and tell us the name of the KBs, just the names, and save us all.
  • Create New...