Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


Yellow Horror

Member
  • Content Count

    94
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by Yellow Horror

  1. Yellow Horror

    RAID under Win 7, Disk Manager or Intel Rapid Storage?

    Windows software RAIDs are interchangeable with any PC with the same OS version (there may be issues when moving between different Windows versions such as XP and 7). Hardware RAIDs are interchangeable only with PC with the same or compatible hardware RAID controllers. In any case you should move all disks of a RAID at once to avoid risk of data loss.
  2. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    I personally use Dynamic Disks Raid 5 on my main home PC running XP (patched to support such a config) for about 10 years. During this time, i experienced two disk failures and some preventive disk replacements due to bad SMART reports, all times without any data losses. I also experienced the disk group breakage one time due to my own fault in using a third-party disk management tool. I was able to recover all my data by properly use of another piece of third-party software.
  3. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    No. You are right, and my memory is failing me. Not Win2k, but NT 4 was the system that store grouped disks (named "multidisks", not "dynamic disks" at the time) configuration in the registry only.
  4. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    The Win2k had a major issue of keeping the configuration data of dynamic disks group in the system registry only. So a system crash meant that you can't access your data without a third-party recovery tool. Since XP, the configuration data is stored on each disk of the group, and in more than one copy. So, the dynamic disks are now safe enough. Don't forget that "two" copy on a mirrored volume should be considered as "one" against any disaster that don't boil down to a disk failure. Malware, misuse, garbage data in the backup software data buffer by a high-energy space particle, or one of millions of other possible issues destroys both of mirrored copies at once.
  5. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    There is no problem with JBOD+RAID config as long as a RAID controller is an extension board. Just connect your system drive to MB SATA port and go on. In case of on-board RAID controller, yes, you need to check if it allow such a config. I think, there is no need to purchase 2 spare disks in advance for a mirror in home usage. In most scenarios, if you experience 2 drive failures at once or in a short time, you already lost part or all of your data, and the second spare disk on hand can't prevent this. Rebuilding of a 10 Tb volume on a low-cost system may take days, so you may purchase another spare disk before it ends. Also, you definitely may use your RAID volume while it is rebuilding, if you need to. But it is highly recommended to not use it heavily, because this slows down rebuilding and so delay the time when your data will be "in safe" again.
  6. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    Just another thing you need to know about Windows software mirrors: don't try to make more than one mirror volume at one pair of physical disks. Despite Windows disk management allows this, it has a serious design flaw: after a power failure or any other not scheduled system stop, it resynchronize all software-RAID volumes at once instead of one-after-another basis. If two or more soft-RAID volumes share a physical drive, the drive has a very hard work chasing its heads back and forth for many hours.
  7. Yellow Horror

    HW RAID 1 vs SW RAID 1 vs incremental backup

    Yes. If your hardware or MB RAID controller fail, and you don't have identical substitute, returning your data may be tricky (but possible in most of the cases). In contrast, windows-mirrored data disks may be easily transferred to any other windows-based system, despite hardware difference. So, if the I/O speed isn't a limiting factor for you, the software mirror is the better solution.
  8. Yellow Horror

    In-place upgrade from XP to 8.1?

    You already receive good advices how to fix it: disable UEFI-mode and Secure Boot boot in your PC setup. Then Win'8 installer don't require GPT partition. So, i repeat my question: what is your trouble now, exactly?
  9. Yellow Horror

    In-place upgrade from XP to 8.1?

    What is your trouble now, exactly?
  10. Yellow Horror

    Desktop computer is only turning on for a few seconds

    In addition to jaclaz suggestions: check all heatsinks' fans to start turning when you power on the PC. If any of the fans don't start, clean it gently. If cleaning don't help, replace the fan.
  11. Yellow Horror

    Delayed Writing Failed

    S.M.A.R.T. is almost useless in predicting how long your HDD will work flawless for you, despite many dumb "system monitoring" software pretend to use it this way. But, there is some parameters in the S.M.A.R.T. that are really useful in detecting failures of HDD itself or the data throughput channel, including PATA/SATA controller, cable and connections. Either may be the cause of delayed write failures. So, i prefer to see the S.M.A.R.T. report ("Attributes" page in terms of GSmartControl mentioned above) before do any further conclusions.
  12. Yellow Horror

    Tor is defeated

    As far as i know, not. Using bridges do not add any extra risk to using TOR in general. A bridge may be compromised, but same is true about any TOR node. And control of just your entry node or bridge do not give the attacker any info except that you exactly use TOR, when, and how much.
  13. Yellow Horror

    Tor is defeated

    In fact, the "TOR browser" is a specially configured Firefox with some privacy protection mods preinstalled and preconfigured proxy settings. The essential part of the TOR is the proxy service that starts before the browser to establish connection to the TOR network. So, if there is a trouble to connect TOR, the TOR browser won't start. The TOR proxy service can be configured to work without the TOR browser, and you can configure your preferred browser to use with it. But this isn't recommended because any of the popular browsers reveal your identity unless carefully modded and configured (which is already done to the TOR version of Firefox).
  14. Yellow Horror

    Tor is defeated

    You are almost right, but In fact, your ISP may block TOR connections even without being under direct pressure from "authorities". You need also understand the difference between TOR "entry nodes" and "exit nodes". "Entry node" allows you to connect the TOR network. Your ISP can block "entry nodes" by their IPs because all of them are public. If you can't connect one of "entry nodes", you can't use TOR without help of a "bridge", which is (in a simplified view) a nonpublic "entry node" which IP is unknown to your ISP. If you can connect to the TOR, you can access any of the .onion websites. There is no censorship inside TOR. But, if you use TOR to connect a "conventional" website (to be anonymous or to pass a government's firewall like Great China Firewall or russian Roscomnadzor), you need also help from a TOR "exit node". "Exit node" allows your connection to pass from TOR to "conventional Internet" again. And the connection may be rejected by the target website just because it is coming from the TOR. All the "exit nodes" IPs are public, and there is no "exit bridges" or another tech in the TOR that can pass such a target website "censorship".
  15. It is hard to say something for sure without reproducing and thoroughly investigating your network configuration in the "bad" state, but i think the trouble was somehow linked to DHCP services and IP address leasing. Try to power off/on the Archer while all the cables remain connected. If the trouble won't reappear, i think, there is nothing to worry about. Then i suggest you (again) to not use "modem only" mode with your PC connected directly to Super Hub. And also to check your PC with some of antivirus/anti-malware scanners to be sure that the probable hackers' attack against the PC while it was exposed to the Internet remain unsuccessful.
  16. Yellow Horror

    Delayed Writing Failed

    Can you post here S.M.A.R.T. report of the disk?
  17. Yellow Horror

    Delayed Writing Failed

    What is the "M:" drive in your system?
  18. Yellow Horror

    Tor is defeated

    There is not so much of TOR "exit nodes" to not block them all by their IPs. Any website administrator can do this if he want. So, despite that TOR (if used properly) is effective in hiding your identity, it can't guarantee you to pass censorship.
  19. Yes, this is valid workaround also. Was your PS network cable connected to Archer or to Super Hub at the time? Either is probable. I found Super Hub 2 user's manual, but there is no "modem only" mode description in it. Web search give me some clues, that the "modem only" mode disables not just WiFi function, but routing functions also, leaving only one Ethernet port on the Super Hub to down-link connection. Is this information correct? If so, i am sure that "modem only" mode means "bridge mode" in which any device down-linked to Super Hub is reachable directly from the Internet. Placing the Archer (in "router" mode) in-between the bridge (Super Hub) and your PC, you again isolate the PC from unwanted network activity coming from the Internet. I strongly suggest you to not use "modem only" mode with your PC directly connected to Super Hub, because in this configuration everyone in the Internet can discover your PC and try to hack it. Of course, Windows 7 (if properly updated and configured) have its own defensive layer against unwanted connections. But it isn't even close to most hardware routers security.
  20. I don't know anything about this particular router. But it seems that in "modem only" mode it exposes your PC for unwanted network activity from the Internet. I may try to help you with the settings, if you give me link to user's manual for the router. The workaround for you is to find and disable "wake on LAN" feature in your PC BIOS setup. I think, you really don't need it to be enabled.
  21. Try to isolate the waking factor. May be it is malfunctioning mouse or keyboard? Or unwanted network activity? You may check them by disconnecting these devices one by one and try put your system to sleep. Also, tell more about your hardware.
  22. Yellow Horror

    Upgrading IE8 to TLS 1.2

    You are right: the registry settings recommended to use with kb4019276 needed only if you use TLS 1.1/1.2 to connect your XP to a domain.
  23. Yellow Horror

    Upgrading IE8 to TLS 1.2

    You need to modify registry settings you mentioned above to enable TLS 1.1/1.2 checkboxes in IE settings. You may set the values to 3.5.1.0.0 or delete them - both way work. I don't know if there is an official source for this. Yes. If kb4019276 isn't installed, you can "enable" the TLS 1.1/1.2 in IE settings, but it will not really work.
  24. Yellow Horror

    Corrupt Java Install

    It works for me too. I get a jp2launcher.exe error at re-enabling the option, but then Java works ok in both IE and FF. Thank you!
  25. Yellow Horror

    Corrupt Java Install

    I think, this is untrue conclusion, because the same test page works correctly w/o any proxy with Java 8u152 in IE8/XP.
×