Jump to content

Shotgun

Member
  • Posts

    457
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Puerto Rico

Everything posted by Shotgun

  1. Cartoon Network Buffy TVS or Angel?
  2. Windows doesn't use LM hash for passwords >15 characters. It's better to have passphrases, with a symbol or high-ascii (ex: alt-255) combination thrown in to really throw off hackers. Here are some excellent references on good passwords: Why you shouldn't be using passwords of any kind on your Windows networks . . . Rainbow Crack--Not a New Street Drug 10 password myths
  3. video capture card? I believe there's a PS2 emulator somewhere on the net
  4. The mouse cursor change is done thru the mouse driver software. It normally is a call to a function to load a specific pattern, and that pattern can be user supplied or a default within the mouse driver. Examples of default mouse patterns (shape) are: text mode cursor, hand cursor, arrow pointer, hourglass, etc. The effect you need/want could be made, even when I have never seen an application doing what you say. Out of my mind I can only conceive an app that would monitor the memory area where the current mouse shape is stored and take action if that particular shape changed. I would need to consult tech documents regarding this, but I believe it could be possible. I would not give a definitive answer until I can verify for this.
  5. Doom! Monster Garage or American Chopper?
  6. I believe that SUS options has an option to automatically approve all downloaded updates. Also, check this link: http://www.susserver.com/Tools/Tools-SUS-A...proveUpdate.asp
  7. Not really for Opera Beta 8, but these are worth a look: http://www.aimwell.org/Help/Tips/tips.html http://nontroppo.org/wiki/Opera7 http://people.opera.com/rijk/opera/ http://www.msfn.org/board/index.php?showtopic=11456&hl=#
  8. You have: OemPreinstall=No It should be: OemPreinstall=Yes
  9. I have to say 10-12. This is one of the "mandatory" sites I must go each morning. During the day, when I can I log in to check on new posts. This board is so active!
  10. San Juan, Puerto Rico Home of the 1st tropical rainforest to be part of the US National Park system: El Yunque! Also, home of the Arecibo Radio Telescope/Observatory the largest Radio Telescope of the world and home of SETI.
  11. RU using a beta? That's the only reason I could think it could crash on that page. I use Opera almost all the time [when not using FF ] and so far it has never crashed on me.
  12. 5:45am (I have to work, duh) work a lot or learn a lot? (what you do everyday)
  13. lcd (althou they are still somewhat expensive) mayonaise or jelly? [on a sandwich]
  14. @phoenix_nf How do you get the invitation links? I have 4 invites (of 6), but the only way I can invite someone is to have their email, and send it thru the gmail interface.
  15. I started using CMD files, then switched to RunOnceEx. When Xplode got out, I waited a while then converted. Up to this day that's what I still use for my installs.
  16. 4 me it was the same. The only "old" OS stable enough to still use it on low-profile PCs would be WFW 3.11 for really, really old PCs and Windows 98 SE. I wouldn't install anything else from MS, then I would go upwards starting with Windows 2000, next XP Pro, then 2003. The other ones are just "crapware".
  17. http://www.kontraband.com/show/popup.asp?ID=1790&TTVAL=2 And you thought you've seen everything on Paris Hilton!
  18. This is really hilarious! http://www.thinkgeek.com/stuff/41/habicase.shtml
  19. NoTrax Browser - Does not write anything to registry, cache is erased when browser is closed. No javascript or ActiveX. 100% anonymous surfing. I have it on my USB flashdrive (registered ver.) and only takes about 2Mb.
  20. I know it's an old post, but any search can also be implemented in Opera as I describe here: http://www.msfn.org/board/index.php?showto...indpost&p=79425
  21. If you have the laptop VNC client connect to your server, I would recommend to monitor the connection for a while to try to get as much information as possible from the person using the laptop. That way you could easily go to that person's door with a police officer and get back your computer. Thru telnet you could initiate a logging program in the laptop to get as much info as possible from these guys. Not really something illegal since its your sister's computer and you have her authorization, right?
  22. I go with Skin(ning). That way you can customize whatever to your particular taste, not the taste of the designer. Your computer is a: work tool or entertainment device?
×
×
  • Create New...