Jump to content

Yellow Horror

Member
  • Posts

    95
  • Joined

  • Last visited

  • Days Won

    1
  • Donations

    0.00 USD 
  • Country

    Russian Federation

Posts posted by Yellow Horror

  1. On 4/29/2019 at 12:44 AM, mo832 said:

    @heinoganda

    I am having a relapse of the same issue from 2017 regarding the HTTPDL.exe error. We had a discussion on pm back then which it was fixed. There is also some comment about it in this forum on page 18. Please see what you can do. 

    I have the same issue on one of my XP-based systems also. It have an older hardware than the other one, on which the updater works. May this be incompatibility with extended CPU instrutions? The affected system supports MMX, SSE and SSE2 only.

  2. Windows software RAIDs are interchangeable with any PC with the same OS version (there may be issues when moving between different Windows versions such as XP and 7). Hardware RAIDs are interchangeable only with PC with the same or compatible hardware RAID controllers. In any case you should move all disks of a RAID at once to avoid risk of data loss.

  3. I personally use Dynamic Disks Raid 5 on my main home PC running XP (patched to support such a config) for about 10 years. During this time, i experienced two disk failures and some preventive disk replacements due to bad SMART reports, all times without any data losses. I also experienced the disk group breakage one time due to my own fault in using a third-party disk management tool. I was able to recover all my data by properly use of another piece of third-party software.

  4. 10 hours ago, jaclaz said:

    I may remember it wrongly, of course, have you got any sources about your statement?

    No. You are right, and my memory is failing me. Not Win2k, but NT 4 was the system that store grouped disks (named "multidisks", not "dynamic disks" at the time) configuration in the registry only.

  5. On 11/15/2018 at 1:20 AM, Tomcat76 said:

    The only thing I'm really worried about is the requirement to convert to dynamic disks.  Many years ago, I was taught to always stick to basic disks because of possible issues regarding data integrity with dynamic disks.  It was the Windows 2000 era, though.

    The Win2k had a major issue of keeping the configuration data of dynamic disks group in the system registry only. So a system crash meant that you can't access your data without a third-party recovery tool. Since XP, the configuration data is stored on each disk of the group, and in more than one copy. So, the dynamic disks are now safe enough.

    On 11/15/2018 at 1:20 AM, Tomcat76 said:

    A Windows mirror would already give me three copies of most files (the original, the main backup and the mirrored backup)

    Don't forget that "two" copy on a mirrored volume should be considered as "one" against any disaster that don't boil down to a disk failure. Malware, misuse, garbage data in the backup software data buffer by a high-energy space particle, or one of millions of other possible issues destroys both of mirrored copies at once.

  6. There is no problem with JBOD+RAID config as long as a RAID controller is an extension board. Just connect your system drive to MB SATA port and go on. In case of on-board RAID controller, yes, you need to check if it allow such a config.

    I think, there is no need to purchase 2 spare disks in advance for a mirror in home usage. In most scenarios, if you experience 2 drive failures at once or in a short time, you already lost part or all of your data, and the second spare disk on hand can't prevent this. Rebuilding of a 10 Tb volume on a low-cost system may take days, so you may purchase another spare disk before it ends.

    Also, you definitely may use your RAID volume while it is rebuilding, if you need to. But it is highly recommended to not use it heavily, because this slows down rebuilding and so delay the time when your data will be "in safe" again.

  7. Just another thing you need to know about Windows software mirrors: don't try to make more than one mirror volume at one pair of physical disks. Despite Windows disk management allows this, it has a serious design flaw: after a power failure or any other not scheduled system stop, it resynchronize all software-RAID volumes at once instead of one-after-another basis. If two or more soft-RAID volumes share a physical drive, the drive has a very hard work chasing its heads back and forth for many hours.

  8. 12 hours ago, Tomcat76 said:

    From what I understand, it can prove difficult to rebuild a broken hardware or MB (fake) RAID, while drives once belonging to a Windows mirror can be reused independently.  Is this correct?

    Yes. If your hardware or MB RAID controller fail, and you don't have identical substitute, returning your data may be tricky (but possible in most of the cases). In contrast, windows-mirrored data disks may be easily transferred to any other windows-based system, despite hardware difference. So, if the I/O speed isn't a limiting factor for you, the software mirror is the better solution.

  9. 1 hour ago, ABM said:

    Windows 8.1 as a error message pops up when I am running the setup which tries to say me that my PC has MBR type of partition but it requires a GPT type of partition.

    You already receive good advices how to fix it: disable UEFI-mode and Secure Boot boot in your PC setup. Then Win'8 installer don't require GPT partition.

    So, i repeat my question: what is your trouble now, exactly?

  10. On 6/24/2018 at 2:56 PM, jaclaz said:

    S.M.A.R.T. (which I personally call "DUMB") data is usually of no use whatever, but in some, few and rare, cases it may help in understanding if a disk drive is actually going bad.

    S.M.A.R.T. is almost useless in predicting how long your HDD will work flawless for you, despite many dumb "system monitoring" software pretend to use it this way.

    But, there is some parameters in the S.M.A.R.T. that are really useful in detecting failures of HDD itself or the data throughput channel, including PATA/SATA controller, cable and connections. Either may be the cause of delayed write failures. So, i prefer to see the S.M.A.R.T. report ("Attributes" page in terms of GSmartControl mentioned above) before do any further conclusions.

  11. 1 hour ago, Radish said:

    Whatever the case, though, do you, or anyone else, know if there is any inherent security risk to the Tor user by having to use meek-bridges?

    As far as i know, not. Using bridges do not add any extra risk to using TOR in general. A bridge may be compromised, but same is true about any TOR node. And control of just your entry node or bridge do not give the attacker any info except that you exactly use TOR, when, and how much.

  12. 1 hour ago, Radish said:

    Also this is happening before the Tor browser opens -- in fact there as complete failure of the browser to open.

    In fact, the "TOR browser" is a specially configured Firefox with some privacy protection mods preinstalled and preconfigured proxy settings. The essential part of the TOR is the proxy service that starts before the browser to establish connection to the TOR network. So, if there is a trouble to connect TOR, the TOR browser won't start. The TOR proxy service can be configured to work without the TOR browser, and you can configure your preferred browser to use with it. But this isn't recommended because any of the popular browsers reveal your identity unless carefully modded and configured (which is already done to the TOR version of Firefox).

  13. 5 minutes ago, Radish said:

    I would think "authorities" and my ISP would be involved in the blocking of Tor.

    You are almost right, but In fact, your ISP may block TOR connections even without being under direct pressure from "authorities".

    You need also understand the difference between TOR "entry nodes" and "exit nodes".

    "Entry node" allows you to connect the TOR network. Your ISP can block "entry nodes" by their IPs because all of them are public. If you can't connect one of "entry nodes", you can't use TOR without help of a "bridge", which is (in a simplified view) a nonpublic "entry node" which IP is unknown to your ISP. If you can connect to the TOR, you can access any of the .onion websites. There is no censorship inside TOR.

    But, if you use TOR to connect a "conventional" website (to be anonymous or to pass a government's firewall like Great China Firewall or russian Roscomnadzor), you need also help from a TOR "exit node". "Exit node" allows your connection to pass from TOR to "conventional Internet" again. And the connection may be rejected by the target website just because it is coming from the TOR. All the "exit nodes" IPs are public, and there is no "exit bridges" or another tech in the TOR that can pass such a target website "censorship".

  14. 14 minutes ago, Radish said:

    So what was the difference this time round? The difference was in the order in which I connected the Ethernet cables to the Archer. Seems that you need to first connect the computer to any of the Archer's LAN(n) ports and only after that has been done do you connect the cable from the Super Hub to the Archer's LAN4/WAN port. (You do this with both routers powered on at the time.) Thinking about that, after the internet connection was suddenly working, I thought that this was odd that it had to be done in that order, but I thought, as that seemed to be the case, this was probably a problem with some part Windows 7 rather than the two routers. If you have any comments to make on this I would be grateful for them.

    It is hard to say something for sure without reproducing and thoroughly investigating your network configuration in the "bad" state, but i think the trouble was somehow linked to DHCP services and IP address leasing. Try to power off/on the Archer while all the cables remain connected. If the trouble won't reappear, i think, there is nothing to worry about.

    21 minutes ago, Radish said:

    As to Windows 7 I only use default fresh install of it (though I tweak that a lot, of course), have never updated it and never will

    Then i suggest you (again) to not use "modem only" mode with your PC connected directly to Super Hub. And also to check your PC with some of antivirus/anti-malware scanners to be sure that the probable hackers' attack against the PC while it was exposed to the Internet remain unsuccessful.

  15. There is not so much of TOR "exit nodes" to not block them all by their IPs. Any website administrator can do this if he want. So, despite that TOR (if used properly) is effective in hiding your identity, it can't guarantee you to pass censorship.

  16. 12 hours ago, Radish said:

    So that solved my immediate problem with the computer waking out of sleep.

    Yes, this is valid workaround also.

    12 hours ago, Radish said:

    Once I had them connected, and having my network adapter enabled for "Allow this device to wake the computer" but disabled for "Only allow a magic packet to wake the computer", I found that my computer wasn't waking unexpectedly from sleep.

    Was your PS network cable connected to Archer or to Super Hub at the time?

    12 hours ago, Radish said:

    Are you saying that there are random attempted internet connections trying to get into my computer in "modem only mode"? Or are you suggesting that someone must be deliberately trying to hack into my computer?

    Either is probable.

    I found Super Hub 2 user's manual, but there is no "modem only" mode description in it. Web search give me some clues, that the "modem only" mode disables not just WiFi function, but routing functions also, leaving only one Ethernet port on the Super Hub to down-link connection. Is this information correct?

    If so, i am sure that "modem only" mode means "bridge mode" in which any device down-linked to Super Hub is reachable directly from the Internet. Placing the Archer (in "router" mode) in-between the bridge (Super Hub) and your PC, you again isolate the PC from unwanted network activity coming from the Internet.

    I strongly suggest you to not use "modem only" mode with your PC directly connected to Super Hub, because in this configuration everyone in the Internet can discover your PC and try to hack it. Of course, Windows 7 (if properly updated and configured) have its own defensive layer against unwanted connections. But it isn't even close to most hardware routers security.

  17. 2 hours ago, Radish said:

    The router is a Virgin Media Super Hub 2 Router.

    I don't know anything about this particular router. But it seems that in "modem only" mode it exposes your PC for unwanted network activity from the Internet. I may try to help you with the settings, if you give me link to user's manual for the router.

    The workaround for you is to find and disable "wake on LAN" feature in your PC BIOS setup. I think, you really don't need it to be enabled.

  18. 2 hours ago, Thomas S. said:

    But: no registry settings for the older update necessary!

    You are right: the registry settings recommended to use with kb4019276 needed only if you use TLS 1.1/1.2 to connect your XP to a domain.

  19. You need to modify registry settings you mentioned above to enable TLS 1.1/1.2 checkboxes in IE settings. You may set the values to 3.5.1.0.0 or delete them - both way work. I don't know if there is an official source for this.

    12 minutes ago, Thomas S. said:

    Is the older update necessary for the new one?

    Yes. If kb4019276 isn't installed, you can "enable" the TLS 1.1/1.2 in IE settings, but it will not really work.

  20. 11 hours ago, Dave-H said:

    All I had to do in fact was to disable and re-enable the "Enable Java content for browser and Web Start applications" option in the Java Control Panel Security tab, and it all came good.

    It works for me too. I get a jp2launcher.exe error at re-enabling the option, but then Java works ok in both IE and FF. Thank you!

×
×
  • Create New...