Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


Yellow Horror

Member
  • Content count

    87
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    1

Yellow Horror last won the day on June 23

Yellow Horror had the most liked content!

Community Reputation

16 Good

About Yellow Horror

Profile Information

  • OS
    XP Pro x86
  • Country

Recent Profile Visitors

690 profile views
  1. Yellow Horror

    In-place upgrade from XP to 8.1?

    You already receive good advices how to fix it: disable UEFI-mode and Secure Boot boot in your PC setup. Then Win'8 installer don't require GPT partition. So, i repeat my question: what is your trouble now, exactly?
  2. Yellow Horror

    In-place upgrade from XP to 8.1?

    What is your trouble now, exactly?
  3. Yellow Horror

    Desktop computer is only turning on for a few seconds

    In addition to jaclaz suggestions: check all heatsinks' fans to start turning when you power on the PC. If any of the fans don't start, clean it gently. If cleaning don't help, replace the fan.
  4. Yellow Horror

    Delayed Writing Failed

    S.M.A.R.T. is almost useless in predicting how long your HDD will work flawless for you, despite many dumb "system monitoring" software pretend to use it this way. But, there is some parameters in the S.M.A.R.T. that are really useful in detecting failures of HDD itself or the data throughput channel, including PATA/SATA controller, cable and connections. Either may be the cause of delayed write failures. So, i prefer to see the S.M.A.R.T. report ("Attributes" page in terms of GSmartControl mentioned above) before do any further conclusions.
  5. Yellow Horror

    Tor is defeated

    As far as i know, not. Using bridges do not add any extra risk to using TOR in general. A bridge may be compromised, but same is true about any TOR node. And control of just your entry node or bridge do not give the attacker any info except that you exactly use TOR, when, and how much.
  6. Yellow Horror

    Tor is defeated

    In fact, the "TOR browser" is a specially configured Firefox with some privacy protection mods preinstalled and preconfigured proxy settings. The essential part of the TOR is the proxy service that starts before the browser to establish connection to the TOR network. So, if there is a trouble to connect TOR, the TOR browser won't start. The TOR proxy service can be configured to work without the TOR browser, and you can configure your preferred browser to use with it. But this isn't recommended because any of the popular browsers reveal your identity unless carefully modded and configured (which is already done to the TOR version of Firefox).
  7. Yellow Horror

    Tor is defeated

    You are almost right, but In fact, your ISP may block TOR connections even without being under direct pressure from "authorities". You need also understand the difference between TOR "entry nodes" and "exit nodes". "Entry node" allows you to connect the TOR network. Your ISP can block "entry nodes" by their IPs because all of them are public. If you can't connect one of "entry nodes", you can't use TOR without help of a "bridge", which is (in a simplified view) a nonpublic "entry node" which IP is unknown to your ISP. If you can connect to the TOR, you can access any of the .onion websites. There is no censorship inside TOR. But, if you use TOR to connect a "conventional" website (to be anonymous or to pass a government's firewall like Great China Firewall or russian Roscomnadzor), you need also help from a TOR "exit node". "Exit node" allows your connection to pass from TOR to "conventional Internet" again. And the connection may be rejected by the target website just because it is coming from the TOR. All the "exit nodes" IPs are public, and there is no "exit bridges" or another tech in the TOR that can pass such a target website "censorship".
  8. It is hard to say something for sure without reproducing and thoroughly investigating your network configuration in the "bad" state, but i think the trouble was somehow linked to DHCP services and IP address leasing. Try to power off/on the Archer while all the cables remain connected. If the trouble won't reappear, i think, there is nothing to worry about. Then i suggest you (again) to not use "modem only" mode with your PC connected directly to Super Hub. And also to check your PC with some of antivirus/anti-malware scanners to be sure that the probable hackers' attack against the PC while it was exposed to the Internet remain unsuccessful.
  9. Yellow Horror

    Delayed Writing Failed

    Can you post here S.M.A.R.T. report of the disk?
  10. Yellow Horror

    Delayed Writing Failed

    What is the "M:" drive in your system?
  11. Yellow Horror

    Tor is defeated

    There is not so much of TOR "exit nodes" to not block them all by their IPs. Any website administrator can do this if he want. So, despite that TOR (if used properly) is effective in hiding your identity, it can't guarantee you to pass censorship.
  12. Yes, this is valid workaround also. Was your PS network cable connected to Archer or to Super Hub at the time? Either is probable. I found Super Hub 2 user's manual, but there is no "modem only" mode description in it. Web search give me some clues, that the "modem only" mode disables not just WiFi function, but routing functions also, leaving only one Ethernet port on the Super Hub to down-link connection. Is this information correct? If so, i am sure that "modem only" mode means "bridge mode" in which any device down-linked to Super Hub is reachable directly from the Internet. Placing the Archer (in "router" mode) in-between the bridge (Super Hub) and your PC, you again isolate the PC from unwanted network activity coming from the Internet. I strongly suggest you to not use "modem only" mode with your PC directly connected to Super Hub, because in this configuration everyone in the Internet can discover your PC and try to hack it. Of course, Windows 7 (if properly updated and configured) have its own defensive layer against unwanted connections. But it isn't even close to most hardware routers security.
  13. I don't know anything about this particular router. But it seems that in "modem only" mode it exposes your PC for unwanted network activity from the Internet. I may try to help you with the settings, if you give me link to user's manual for the router. The workaround for you is to find and disable "wake on LAN" feature in your PC BIOS setup. I think, you really don't need it to be enabled.
  14. Try to isolate the waking factor. May be it is malfunctioning mouse or keyboard? Or unwanted network activity? You may check them by disconnecting these devices one by one and try put your system to sleep. Also, tell more about your hardware.
  15. Yellow Horror

    Upgrading IE8 to TLS 1.2

    You are right: the registry settings recommended to use with kb4019276 needed only if you use TLS 1.1/1.2 to connect your XP to a domain.
×