Jump to content

LLXX

Banned
  • Posts

    3,353
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Canada

Everything posted by LLXX

  1. This is just a guess, but IKH looks like an acronym for some kind of Kernel Hook. Perhaps that's what Spyware Doctor uses for background monitoring.
  2. Do you guys have any clues how to make MSI 2.0 work in NT mode ? That doesn't look too good... it looks like it requires the NT service architecture which is going to be next-to-impossible to implement on 9x.
  3. I wouldn't worry about it. According to M$, there hasn't even been any "proof-of-concept" code that has been written to take advantage of this exploit.
  4. I'm 46 and I can still hear it... my ears are still working well It's 14KHz:
  5. Here's mine BTW:
  6. Error in loading DLL, this is certainly a browser hijack. I recommend you reinstall IE.
  7. Yes, looking for artifacts is one way, but if the MP3 encoding was done at a high enough quality it's nearly indistinguishable from the original. Same with JPG images at 100% quality. Do you want me to show you ugly degradation visible to the naked eye in 100% jpgs ? Here is one. It's some artwork I am doing. It's in true color png (lossless). Convert it to 100% jpg and see what I mean. Huge loss of quality. http://stashbox.org/uploads/1150207339/Master%20001s.png As for audio it is the same I believe as lossy is not lossless, but without an original to do an ABX test with, it may be hard to say. So the above artifact identifier is probably the best method without originals. Hydrogen Audio is the best place for that type of question anyway. http://www.hydrogenaudio.org/forums/index.php Perhaps your JPG encoder's "100%" isn't the same as mine... and your test sample looks like it was designed to test the limits of the encoder (nice art btw). Here, for your enjoyment, is a JPG created from your above sample at 100% quality level: http://img107.imageshack.us/img107/6702/master001s2pl.jpg@Elektrik: I definitely see a difference, but all MP3 encoders are not created equal, just as JPG encoders I demonstrated above.
  8. Another MSI utility: http://www.qwerty-msi.com/
  9. I don't think it has the required instructions, sorry.
  10. ...remember the WMF exploit? I deliberately went to the website with the exploit code but it did nothing to my system. I think this is a similar situation, where M$ announces that the OSs are vulnerable but there is no proof at all.
  11. You can try the Kernel Update Project in the service pack forum... But if I were you, I'd just find some other software. I stay away from any software that requires extra libraries.
  12. System Idle Process is normally at 100% when the CPU is idle. No concern.
  13. LLXX

    Slow Shutdown

    Reduce the wait for services to end. It's a key in the registry, I forgot exactly where it is. Googling "service wait timeout" or similar should find it.
  14. There is a program called HiJackThis, run it and you can inspect where the browser is being hijacked.
  15. Of course it's Google... but sometimes you need to use more than one search engine. Here's an entire site about how to search effectively: www.searchlores.org
  16. That is one truly lame feature... If I hadn't known better I would've thought a fan was dying.
  17. 50°C is well within the temperature limit of your processor (max=67°C). Unless you're overclocking, you shouldn't need anything more than stock. But now that you just bought a better cooler, you should put it to use and start overclocking
  18. No, unless you're recording uncompressed high-quality video. You can look at the hard drive specs on the manufacturer site, there is usually a "Maximum read rate" and "Maximum write rate" as well as "Average read rate" and "Average write rate". This is the rate at which the heads read/write the platters, the interface speed will be lower. ...and cache helps with burst transfers, with continuous transfers it's the read rate from the platters that matters as the cache is emptied quickly.
  19. Yes, looking for artifacts is one way, but if the MP3 encoding was done at a high enough quality it's nearly indistinguishable from the original. Same with JPG images at 100% quality.
  20. Put them on two partitions and edit the MBR when you want to switch between them.
  21. According to M$: I think this vulnerability is only applicable in special circumstances, as it both requires cooperation on the part of the user and very low security settings (to the point of allowing ActiveX controls to run, as this is the basis of the attack).I don't even have this one installed.
  22. Ping the site from the command line, if the IP is anything other than 213.186.33.16 the problem is with the DNS. Otherwise, it looks like a browser hijacking.
  23. Start regedit and go to the classes_root, find Drive and expand it, select Shell subkey and then select the Default value on the right, press Delete key.
  24. That would cause it to remain in memory, needlessly taking CPU time and RAM. However strange this may be, my print spooler is disabled but I can still print to the local printer.
×
×
  • Create New...