Jump to content

Tripredacus

Supervisor
  • Posts

    13,346
  • Joined

  • Last visited

  • Days Won

    26
  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by Tripredacus

  1. Occasionally I will hear XP sounds on radio station broadcasts.
  2. Certainly they do, but it depends on how you use their service. Especially if you use Android phone.
  3. 20GB was my standard disk size from 98 to XP as well.
  4. There even exist 4:3 LCD monitors with HDMI inputs, but I usually find these on websites that sell embedded/industrial systems. Prices are typically put as "ask for a quote today!" :\ I will get one some day...
  5. Ok just making sure. In a situation like this when trying to do something that doesn't work, using as much detail as possible is best.
  6. Which suggestions would those be exactly?
  7. 80GB for OS is just fine for Vista or 7. If you every save or create data then it isn't a good size, but it depends on what kind of data you use. I use an 80GB in my Win7 32bit at home without a problem, but I have additional disks to keep files and some programs.
  8. Thanks. Mis-attribution is common on forums but is a big problem. I only commented on it because of the word "we" which (without quotes) would mean mis-attribution to the information to yourself which is bad. There have been numerous stories of forums (or users) getting in trouble from those who actually write things and being found verbatim on other websites. We should always be careful to make sure that any text from another website with a word such as "we" or "I" is used in quotes, the quote tag or some other way (bold or whatever) to separate it from the rest of your text, including when alacran puts his name at the end of his post like jaclaz does, it reads as all being written by you.
  9. So you can only view your data by logging into a website and seeing it there? Nothing stored locally? Would be interesting to know if you could monitor the activity before and after disabling it, and seeing if anything is still being tracked after disabling even if that website doesn't show anything.
  10. Who is we? If you have copied this text from another site you should put it in quotes. If you actually typed all this, you can tell us how many people are involved in creating your posts.
  11. The same can be said for "awesome." https://en.oxforddictionaries.com/definition/awesome I didn't want to link back to learnersdictionary.com because they use XSS.
  12. Yes it is disconnected now for good. Fortunately, all the history still remains so I can go back to read conversations going back years because the client saves those logs.
  13. I think it still only will do one file at a time.
  14. Yes let's be honest here. The best practices from the 90s are the same as today. All the things you weren't supposed to do in the workplace still apply to now. There are no new attack vectors from back then. People downloading and running attachments from emails, people replying to social engineering (fake/phishing) emails, people going to porn and warez websites, people downloading things from the internet, these are all the same things from back then. So let's be honest that not everyone who uses a computer now had used one back then. Let's then just go back 5 years. People using a computer on the internet for 5 years or more should be fully aware of these vectors by now and not be fooled by them. But that is not the case. All the things we are reading about online of people getting hacked, or ransomeware or whatever else isn't because it is only new users or children are using the computers. In most cases these are adults who have been using computers for years. It is this mentality of the users that causes companies to treat their users like children. Always finding ways of stopping their users from installing programs, or going to certain websites, or coming up with plans on how to deal with them. Some of these corporate end people have even created threads here on that subject, like "I have a user that keeps doing this one thing, what program can I use to stop them from doing it." That is not the correct way to handle that type of situation, but it is the same side of the coin because the irresponsibility is being shared between both parts. Think about it like this. How many people do you know that constantly have to reinstall their OS or keep getting viruses over the years? That is the problem. They are continuing a bad pattern and not adjusting their behaviours so that it doesn't happen again. But instead of changing behaviours or trying to understand what they are doing, people will often just change their antivirus program, or use a different browser, or get a new computer with a different OS on it and then continue to do the same things. But we live in this world and it is accepted for people to not care about computers in such a way, or that if they have a problem on their computer that they caused then there is nothing they can do about it. Or corporations must treat their employees like children, or that it is OK to pay for a program you probably don't need because you "don't know how to computer" or whatever else. This is "the norm" and has been this way for a long time.
  15. It is likely this one, Visual Basic 6 Common Controls. It indicates that the program you have was written for XP or earlier OS. https://www.microsoft.com/en-us/download/details.aspx?id=10019 The system requirements do not even list Windows 7. I don't know if the software will actually install. The file just needs to be in System32 OR (more responsibly) in the working dir of the .exe you are trying to run.
  16. ANNOUNCING MSFN FORUM RULE #11!
  17. There is no incorrect answer when an opinion is asked. I have nothing against Malwarebytes itself. I use it as-needed if I suspect that something wrong is on the system, but I do not use it for active protection. When it comes to active protection of anything, I see it as a last line of defense and if I am to choose anything (Malwarebytes or anything else) then the ultimate deciding factor for me is how it taxes the system. The one that takes up the least amount of resources is the one that I would let run as active protection.
  18. I don't understand why people would rather pay for an antivirus rather than play it safe on the internet.
  19. Could it be for named pipes? https://technet.microsoft.com/en-us/library/hh125927(v=ws.10).aspx#BKMK_workstation
  20. I recall not liking how the ADK could write directly to USB, so I have never done this. What I do instead is just format the USB as FAT32 and then copy all the files from c:\winpe_dir\media to the root of the USB. Also, make sure you use the boot menu on your hardware to verify which boot method you are choosing because you can't let the system pick on its own.
  21. There is no story about this one:
  22. Yes there was a particular problem on 100Mb networks that I encountered... but I can say (in my experience) it had nothing to due with 100Mb connections. In fact, your imaging time is maybe only increase 10-20% on a 100Mb connection. And also I will consider a *normal* (maximum) image size to be around 6GB. And unless you are running a pure 100Mb segment, I would recommend using hardware that support Link Aggregation so to not slow down gigabit connections.
  23. Yes this way is possible. On your old phone, you transfer your contacts to Gmail, then on new phone you just sync your Gmail. There are problems with this for some phones, where phone based contacts and those that came from Gmail are in separate sections. I recall this was how I got my contacts moved from Galaxy S to Galaxy S 4, because the old program I used before couldn't see into the S4 properly. So it is a bit annoying on the new phone that the default Contacts list only will show the contacts added into the phone directly, while the imported ones do not show up in the main list, but can be seen in "Unsorted" and others in other categories. They can all be found using search.
  24. It is the yes in a normal world. However in this UEFI world, things are a bit more complicated. The part I posted is still true, but with UEFI we have this: 1. 32bit CPU with UEFI that allows booting 32bit EFI applications 2. 64bit CPU with UEFI that allows booting 32bit EFI applications 3. 64bit CPU with UEFI that allows booting 64bit EFI applications 4. 64bit CPU with UEFI that allows booting 32bit and/or 64bit EFI applications 5. 64bit CPU with UEFI that allows booting 32bit and/or 64bit EFI applications under special circumstances I almost forgot about the board I once worked with that fell into 2, 3 and 5 of that list on different BIOS versions. The underlying facts still remain that in any case a 64bit CPU can run either architecture, but a 32bit CPU can't run 64bit but could run 16bit. And I think a 64bit CPU could run 16bit also.... There was news recently that Intel says they are going to get rid of CSM or the ability to boot legacy OS on their boards, by 2018 or 2019. I surmise this means that those future chipsets will only be able to boot EFI applications on GPT. I wonder what this means for DOS. :'(
  25. Back then XP was still a current product, we (my company) opted to go with imaging rather than using any sort of unattended setup like with WDS or from CD+network share because imaging was just faster. You only have some initial setup time for creating the image itself, which does not get figured into manufacturing time. Then when you can image a system in 4 minutes, it can be a big deal when you are talking about needing to image hundreds of systems. WDS and CD installs just did not cut it.
×
×
  • Create New...