Jump to content

piaqt

Member
  • Posts

    700
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Canada

Everything posted by piaqt

  1. Try Tools | Internet Options | Programs | E-Mail. Set it to Outlook express.
  2. Sites to check: http://www.aumha.org/regfiles.htm http://www.kellys-korner-xp.com/ http://mvps.org/
  3. Aaron, what's IMO?
  4. from http://support.microsoft.com/search/previe...b;en-us;Q301221 PUB2002: Font List Is Blank, No Fonts Are Displayed (Q301221) The information in this article applies to: Microsoft Publisher 2002 SYMPTOMS When you attempt to format a type font, no fonts are available on the font list on the Formatting toolbar. The list may appear blank or may only display the TrueType symbol, represented by "TT". CAUSE This problem occurs when your display settings in Windows have been changed , specifically the color scheme for Windows. If the Window Color and the Selected Items color are the same color, the problem described in the SYMPTOMS portion of this article occurs. RESOLUTION Change the Selected Items display appearance setting in Windows to any other color. The following steps will allow you to turn the Selected Items display appearance setting to black. NOTE: These steps may be slightly different, depending on which version of Microsoft Windows you are using. From the Taskbar, click Start , point to Settings , and then click Control Panel . In the Control Panel , double click Display . In the Display Properties window, click the Appearance tab. In the Item drop-down list on the Appearance tab, select Selected Items . Click the color drop-down arrow to the immediate right of the Item drop-down list, and then click to select black. NOTE: Instead of steps 4 and 5, you could also just select Windows Standard in the Scheme drop-down list on the Appearance tab. Click Apply , and then click OK . WORKAROUND To work around this problem, turn off the font preview option in Publisher 2002. To do this, follow these steps: In Publisher 2002, click Customize on the Tools menu. On the Options tab, clear the Show font names in their font check box. Click OK. STATUS Microsoft has confirmed this to be a problem in the Microsoft products that are listed at the beginning of this article. Published Jul 3 2001 5:01PM Last Modifed Jul 24 2001 4:53AM WRStrong, try the KB. This was the FIRST article under "Search in: Publisher 2002 Search for: fonts"
  5. Oh, goody!
  6. And people actually eat this crap. Yuck.
  7. Aw, gee. I'm overwhelmed.
  8. By default, you can encrypt files in two ways: 1. Use the Cipher.exe command-line utility. This command lets you encrypt files, see the encryption status, and create a new EFS recovery agent key and certificate. 2. Right-click a file or folder that you want to encrypt and select Properties. In the dialog box, click the Advanced button. You can now encrypt the file or folder by selecting the Encrypt Contents To Secure Data check box. There's a third, more hidden way to encrypt and decrypt files: by right-clicking the file and selecting Encrypt/Decrypt from the shortcut menu. To enable EFS options on the shortcut menu by editing the registry, Go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Create a new DWORD Value. Enter EncryptionContextMenu for the value name, and enter 1 for the value data.
  9. Possibly to hide the bolt through his neck.
  10. The screenshot is small, but: It looks like the standard "my computer" view of any folder. Check your explorer settings. Or, right-click on the quicklaunch bar. Select "toolbars" and uncheck any you don't want.
  11. So who held a gun to your head and made you watch? and that ain't no LITTLE pig. That's a sow.
  12. Babis: Go baby, go!
  13. Flash: what problems? Specify. Maybe I or someone else can help. Otherwise, you're just kvetching.
  14. piaqt

    Dll help

    Good lord, the man actually gave me a compliment! OOh, I'm all a-flutter! ...And pigs have wings.
  15. piaqt

    Dll help

    http://support.microsoft.com/servicedesks/...sp?fr=0&sd=tech
  16. ....And then there's the moron who, when asked by tech support to send a copy ao the diskette, did so -- a xerox copy.
  17. OK. Flash & Homer: exactly which icons are you having trouble with? Filetypes? Individual folders? ALL folders? shortcuts? Lemme know. I'm good at this crapola.
  18. No.
  19. YES, for pity's sake. Just TRY stuff. You can always click cancel.
  20. To one and all: and Thanks, guys.
  21. So it was you who ate the mouse! (new avatar)
  22. Me-OW!
  23. from winguides; Change the Internet Explorer Search Engine Go to: [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl]. Modify the value of default to equal the URL for the search engine you want to use, substituting '%s' to represent the keywords. For example, to use AltaVista the value would be: http://www.altavista.com/cgi-bin/query?q=%s And to use Yahoo! the value would be: http://search.yahoo.com/bin/search?p=%s from my registry: Or for google: http://www.google.com/keyword/%s Also, this key: (---cut & paste, save as .reg file----) Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main] "Search Page"="http://www.google.com" "AutoSearch"=dword:00000006 "Search Bar"="http://www.google.com/ie" (----end cut & paste---) hope this helps Just thought of something else. Check the View menu > encoding submenu.
  24. Incredible, isn't it!
  25. Book by celebrated outlaw hacker describes tricks of the trade By Jim Krane, Associated Press, 07/02/02 from http://digitalmass.boston.com/news/2002/07...ing_author.html NEW YORK -- Barred by the terms of his probation from messing with computers, ex-convict hacker Kevin Mitnick has turned to writing about them, baring the tricks of his former trade in a forthcoming book. An advance copy of the book, "The Art of Deception," describes more than a dozen scenarios where tricksters dupe computer network administrators into divulging passwords, encryption keys and other coveted security details. But it's all fiction. Or so says Mitnick. Those seeking Mitnick's version of his lawless escapades will have to wait. Personal details are carefully expunged from the book, which uses fictitious names of hackers, victims and companies. "It's not the Kevin Mitnick story," said Mitnick, 38, of Thousand Oaks, Calif., who served five years in federal prison for stealing software and altering data at Motorola, Novell, Nokia, Sun Microsystems and the University of Southern California. He was released in January 2000 and is currently on three years' probation. "This book isn't about my cases, it's creating fiction stories with the same techniques I've used and others have used," he said. Mitnick says his message is aimed at computer security professionals, to help them stop people like him. But he agreed his tricks would also make good fodder for the dishonest. "The information can be used for good or bad," he said. The book's contents, to be released in October, are probably too tame to interest a malicious hacker, said Bruce Schneier of Counterpane Internet Security in Cupertino, Calif. "The bad guys don't need to read this book," Schneier said. "But the good guys need to know what the criminals are doing." Mitnick is best known for leading the FBI on a three-year manhunt that ended in 1995 when agents collared him in an apartment in Raleigh, N.C. with the help of a top academic security expert. During the chase, the bespectacled outlaw continued to break into computer networks. He was considered a cult hero among hackers and a slippery felon by the federal judge who finally sentenced him. "We've had a terrible, terrible time with this defendant," U.S. District Judge Mariana Pfaelzer said during a June 2000 hearing. In his hacking heyday, Mitnick was described as an overweight, pimpled young man obsessed with fast food. He has since undergone an image makeover. He's slimmed down, sports a stylish haircut and has appeared on television, in the courtroom as an expert witness and even before Congress. Mitnick's life still revolves around weekly visits to Larry Hawley, his federal probation officer, who declined to return calls seeking an interview. Hawley is said to be keen to read his client's forthcoming book. "He will be going over it in some detail," said a probation official in Los Angeles who spoke on condition of anonymity. To be able to prevent the government from handing the book's earnings to his victims, Mitnick said he navigated between his probation roadblocks and the court-imposed restrictions on profiting from tales of his crimes. "We've been very careful, we have nothing in the book that discusses my hacking," said Mitnick, who co-authored the book with tech journalist William Simon. Terms of Mitnick's three years of probation -- which ends in January -- require that he keep his hands off all computers, software, modems, cell phones and any devices that would give him access to the Internet. His travel and employment are also restricted. Although some of his requests have been denied -- especially those relating to travel -- Mitnick received permission to carry a cell phone, to visit his book's New York publicist and to type the manuscript on a computer that is not connected to the Internet. The probation official said the office hadn't been informed of Mitnick's plans for a six-city book tour in November, and wasn't sure whether the ex-convict would be permitted to travel. The book's veneer of fiction appears quite thin -- except perhaps where it veers into boasting. Behind their hokey aliases, the characters sound quite like the author. In one anecdote, Mitnick writes of a hacker who downloads a server's encrypted password file and uses a cracking program to perform a "brute-force attack." The hacker soon gains the keys to the company network. In another episode, a rogue caller tricks a company's IT help desk into believing he's an employee stuck at home in a snowstorm. The swindle ends with the hacker palming a password. In another, a con man talks a night watchman through the motions of creating an account for him on a company computer network. In another, a smooth-talking caller dupes an employee into downloading a "Trojan horse" program that gives the hacker remote access to the network. Several of these fictitious scenarios resemble schemes Mitnick confessed to when sentenced in 1999, according to court documents provided by the former assistant U.S. attorney who prosecuted the case, Christopher Painter. The confession, signed by Mitnick, describes how the hacker deceived operators at dozens of real companies and stole computer source code as well as services like phone calls and Internet server space using many of the same ruses. Painter, now deputy chief of the Computer Crime and Intellectual Property Section at the U.S. Department of Justice, described Mitnick's tactics as closer to those of the old-time con man than of a computer scientist. Since his release from prison, Mitnick has made a living by using his ill-gotten skills as the basis for magazine articles, speaking engagements and a recent AM radio talk show in Los Angeles. Mitnick swears that he'll never hack again -- but not because prison taught him anything. "Prison had nothing to do with my rehabilitation," Mitnick said. "I grew out of my hacking. Now I'm 38. There are no 38-year-old hackers out there." Mitnick's site: http://www.freekevin.com
×
×
  • Create New...