Wikipedia:Reference desk/Computing: Difference between revisions
edited by robot: adding date header(s) |
|||
Line 199: | Line 199: | ||
::I don't think this plan will work. I doubt that an old XP install will take too kindly to being cloned to radically different hardware, and it looks like [[Windows 7 editions#Upgrade compatibility|you can't do an upgrade install of XP to 7]] (I'm also pretty sure you can't upgrade 32 bit Windows to 64 bit). Why not just put the old HDD aside for the moment, build the new PC with a fresh copy of Windows 7 and get it all set up, then connect the old HDD up and copy off all the data you need? [[User:CaptainVindaloo|CaptainVindaloo]] <sup>[[User talk:CaptainVindaloo|t]] [[Special:Contributions/CaptainVindaloo|c]] [[Special:Emailuser/CaptainVindaloo|e]]</sup> 23:49, 16 December 2011 (UTC) |
::I don't think this plan will work. I doubt that an old XP install will take too kindly to being cloned to radically different hardware, and it looks like [[Windows 7 editions#Upgrade compatibility|you can't do an upgrade install of XP to 7]] (I'm also pretty sure you can't upgrade 32 bit Windows to 64 bit). Why not just put the old HDD aside for the moment, build the new PC with a fresh copy of Windows 7 and get it all set up, then connect the old HDD up and copy off all the data you need? [[User:CaptainVindaloo|CaptainVindaloo]] <sup>[[User talk:CaptainVindaloo|t]] [[Special:Contributions/CaptainVindaloo|c]] [[Special:Emailuser/CaptainVindaloo|e]]</sup> 23:49, 16 December 2011 (UTC) |
||
:::I've already copied all the data, etc. Since I have an upgrade disk, I wanted to use that to do a completely clean install of Windows 7 64 bit instead of shelling out $100-200 for a retail copy of Windows 7 or sticking with the old 32 bit XP. Essentially, this is a brand new computer, but I was wondering if I could take advantage of the fact that I have a legal Windows XP license, instead of paying the full price for Windows 7. My only concern is that XP, since its OEM, could refuse to work with the new mobo/ components and not "activate". However, I don't know if that matters when I boot off the disk. [[User:Mtzen|Mtzen]] ([[User talk:Mtzen|talk]]) 00:35, 17 December 2011 (UTC) |
|||
== How can I download 40,000 web pages while re-pooling open connections? == |
== How can I download 40,000 web pages while re-pooling open connections? == |
Revision as of 00:35, 17 December 2011
of the Wikipedia reference desk.
Main page: Help searching Wikipedia
How can I get my question answered?
- Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
- Post your question to only one section, providing a short header that gives the topic of your question.
- Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
- Don't post personal contact information – it will be removed. Any answers will be provided here.
- Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
- Note:
- We don't answer (and may remove) questions that require medical diagnosis or legal advice.
- We don't answer requests for opinions, predictions or debate.
- We don't do your homework for you, though we'll help you past the stuck point.
- We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.
How do I answer a question?
Main page: Wikipedia:Reference desk/Guidelines
- The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
December 11
Desktop link not showing up after I mount Truecrypt volume
In the case of a specific Truecrypt volume (others work as expected) I do not get a desktop link (in Ubuntu) after I mount it. The problem is certainly not THAT important, but I'm curious. Where can this be set? 88.9.210.149 (talk) 00:00, 11 December 2011 (UTC)
Apache on AWS/ what am I doing wrong?
Hi. Just recently discovered Amazon Web Services.
Here's my situation:
I have a Fedora Core AMI running in a Micro Instance. It has Apache running in it, and there is an elastic IP address attached to it. The security group that the instance is in, is open on SSH and HTTP. I can SSH in no problem with the elastic ip, and inside the instance when I type http://localhost or http://localhost/test.php the contents of my /etc/var/www shows up just fine. Back here on my local machine, when I enter the elastic ip address in firefox it immediately tells me that it can't find the server at xx.xx.xx.xx (if the instance is running) or it times out (when the instance is not running).
What might I be doing wrong/missing?
Thanks in advance
Duomillia (talk) 03:59, 11 December 2011 (UTC)
- Something is wrong either with the security group or with its association to the instance. I think you need to stop an instance to meaningfully change it security group settings; maybe you did that for ssh, but not for http? 84.93.151.83 (talk) 11:33, 11 December 2011 (UTC)
- No, I'm afraid that's not it. The security group was changed while the instance was stopped. Duomillia (talk) 14:17, 11 December 2011 (UTC)
Tablet PCs Christmas sales
Hello. I'd like to buy a tablet PC, Im thinking MotorolaXoom, and was wondering if that is the sort of product that will go down massively in the Xmas sales, ie. between Xmas and early January? Or do such technologies not tend to be discounted? Thanks. --anon
- Since sales practices vary between countries, you're likely to have to tell people where you live before you can get anything close to a meaningful answer. Nil Einne (talk) 14:15, 11 December 2011 (UTC)
- Im in Birmingham, UK. --anon
- I would expect them to go on sale if they have surpluses left over, just like any other product. This is even more true with technology, since they can't just let them sit in a warehouse until they sell, as the technology rapidly becomes obsolete and they decrease in value. StuRat (talk) 15:39, 11 December 2011 (UTC)
- Those kinds of reductions are often timed to the release of new models though, not the holidays. Tablets are not a seasonal item, they sell year around, so often there's no incentive to clear out the stock until right before the replacement for that model is on the market. APL (talk) 05:47, 13 December 2011 (UTC)
Given the reported shortage of disk drives due to the floods in Thailand, manufacturers might struggle to meet demand for the next few months, so I wouldn't count on major price drops in that time frame. Looie496 (talk) 05:59, 13 December 2011 (UTC)
Previewing Large Libraries
So I have several large collections of music and I have been looking for a utility/media player which will let me preview all of it automatically. I want something where I can just load all the songs and it'll play only the first 30 seconds or something and then move on to the next file and so on so that I don't have to keep clicking next. I imagine everybody has huge libraries nowadays but its amazingly hard to find something like this anywhere. Any good suggestions? Does VLC have that functionality (I couldn't find it anywhere)? Thanks! - Looking for Wisdom and Insight! (talk) 20:29, 11 December 2011 (UTC)
- You've not said which platform you're running on; if it's Linux, you can do this find /home/kaiser/music -type f -iname "*.mp3" -exec play {} trim 0 30 \; (where /home/kaiser/music is where your music library is, change as appropriate). If you don't have a play executable, install the sox package. -- Finlay McWalterჷTalk 20:42, 11 December 2011 (UTC)
Working on Windows...is there any hope? - Looking for Wisdom and Insight! (talk) 22:35, 11 December 2011 (UTC)
- Yes, transfer all data files to an external hard drive, then overwrite windows with Linux.--Aspro (talk) 22:56, 11 December 2011 (UTC)
- ??? -- BenRG (talk) 23:10, 11 December 2011 (UTC)
- Sure there's hope. You could try the gen_intro plugin for WinAmp. Or you could install Cygwin and then run Finlay McWalter's command. Or you could install Python and I'll write you a short Python program to do the same thing (which could be a lot more versatile with respect to song ordering, etc.). -- BenRG (talk) 23:10, 11 December 2011 (UTC)
- A Python program (which uses Pygame and thus Simple DirectMedia Layer) follows; I've not tested it on Windows, but it should work:
#!/usr/bin/python
import pygame,time,os
pygame.mixer.init()
for root,dirs,files in os.walk('.'): # change '.' to the folder that contains the root of your music
for f in files:
if os.path.splitext(f)[1].lower()=='.mp3':
print os.path.join(root,f)
pygame.mixer.music.load(os.path.join(root,f))
pygame.mixer.music.play()
time.sleep(30)
pygame.mixer.music.stop()
Wow guys. Thanks! The winamp plug-in was exactly what I was looking for. - Looking for Wisdom and Insight! (talk) 00:01, 12 December 2011 (UTC)
December 12
Perl pie
Why would someone use perl -p -i -e
over sed? Would it only be when they're writing a Perl script and want to remain in Perl or are there other reasons? Dismas|(talk) 09:52, 12 December 2011 (UTC)
- Some people simply haven't used sed and, therefore, don't use it. If they hear about it, but see no examples, they don't know how to use it. If they are already a perl programmer, why not use what works? -- kainaw™ 15:16, 12 December 2011 (UTC)
- Perl is also, generally speaking, more powerful than sed. If you suddenly realize that the problem is a little more complicated than you thought, Perl is more likely to provide you with an easy way to solve it. Paul (Stansifer) 15:58, 12 December 2011 (UTC)
- Also, although GNU sed has a -i option now, that is a recent addition (relative to the total history of unix which has had a sed command for over 30 years), and it was inspired by perl. It only exists in the GNU and FreeBSD versions of sed. So if you intend to write a portable script, you have do the tempfile handling yourself, and you'll have to run sed once per input file so you'll have to write a for loop. A random unix box is more likely to have perl installed than GNU sed, so use of perl could be seen as a compromise, more portable than "sed -i" but less verbose (therefore harder to screw up) than the fully portable sed equivalent.
- And even if portability isn't a concern, there are a lot of people who formed their habits between the late-1980's release of perl and the early-2000's invention of "sed -i".
- If you're relatively new to unix and your intro was a GNUish system, "sed -i" might look like a natural part of the landscape. For those who used unix in the last millennium, it's conspicuously non-standard.
- The same goes for anything that uses "perl-compatible regular expressions" and isn't perl. We actually had to live with just the 2 varieties of POSIX regular expressions for a long time and we liked it! 68.60.252.82 (talk) 21:40, 12 December 2011 (UTC)
- I'm one of these people too who started using perl -p -e over sed as soon as I found out about it. My info may be out of date, but I don't think sed (or the version I learned on) supported nongreedy expressions, some types of negative lookaheads, and some of the character classes that I find convenient in perl. Also, and this is probably the biggest thing, I don't have to escape out some very useful meta characters with perl but I do with sed. For instance, if I want to do a group I have to escape () in sed, but not in perl. Same with + or ?. But not with []. Trying to keep all of that straight is a pain, so I settled on the one I'm going to be using anyway.
- The flipside, however, is that sed is presumably much faster than perl (at least according to this article I read once). Shadowjams (talk) 00:20, 13 December 2011 (UTC)
- I'll admit that
-i
is superhandy, but by the old Unix philosophy tenet of "each tool should do one job and do it well", it's a feature that arguably should not be provided by perl and sed. Should every filter laboriously provide its own reimplementation of-i
? But if not, is every user compelled to "write afor
loop"? Of course not. Like almost any task, this one can be encapsulated. For example, see here for a shell script I wrote that lets me easily run any filter on any set of files, in place:filter sort *.txt
filter 'tr a-z n-za-m' *
filter 'sed "s/foo/bar/g"' *.c
- —Steve Summit (talk) 14:16, 13 December 2011 (UTC)
- I'll admit that
PRoblem with System Restore
I am using Windows XP, and I am attempting to use System Restore after a long series of glitches, lags, and freezes. But it seems that even the system restore process is affected by this as well; it would commonly freeze during its "Copying Files" phase of the recovery. Is it just because that my computer is too old and is already damaged beyond repair, or is it possible to fix such a problem? When it runs normally, before I tried the System Restore, it would freeze then jump back to the startup logo on occassion, but soon opens up normally given a few minutes. Afterwards, it would start to lag and later freeze up if I use it for too long. It would be sad to see my computer go though, I've had it since elementary school. 72.235.221.120 (talk) 14:56, 12 December 2011 (UTC)
Graph theory
What is the difference between Path and walk? What is the difference between graph and network?--Intr199 (talk) 15:05, 12 December 2011 (UTC)
- A network can be represented by a graph, but not every graph is a network. Think about path as a possibility, and walk as actually performing a search in a graph or network. 80.39.16.11 (talk) 17:33, 12 December 2011 (UTC)
- This doesn't fully explain what the difference between a graph and a network is. I know what a graph is, and your answer sounds like a network is a subconcept of a graph, but it doesn't include a definition of what kind of subconcept. JIP | Talk 21:55, 12 December 2011 (UTC)
- Network is another name for a graph, at least in all of the contexts I've come across it. If you are seeing the two side by side in the same work, then network may be being used in a special sense defined by the author; maybe to refer to the physical network the graph abstracts. If you look up walk in wikipedia, it should give you all the information you need. Phoenixia1177 (talk) 05:27, 13 December 2011 (UTC)
- Glossary of graph theory attempts to explain the difference between a "path" and a "walk"; it says that a path is a walk whose terminal vertices are distinct, as opposed to a cycle, which is a walk that starts and ends at the same vertex. I would guess that the term "network" is usually used to decribe a graph with additional properties or structure e.g. capacities or lengths assigned to its edges. As other editors have said, the precise usage of the terms probably depends on context. Gandalf61 (talk) 10:21, 13 December 2011 (UTC)
December 13
reboot?
if a computer supposedly turns itself off when you tell it to reboot, but turns itself back on, does that mean that some part of the computer stays active and reboots the rest, making it not a total reboot, just a reboot of the main stuff? 99.43.78.36 (talk) 04:00, 13 December 2011 (UTC)
- Called a Soft_reboot. In most cases everything significant is cycled, but you're right, the power remains on to at least some components. The software doesn't actually stay in control of the machine the whole time, the hardware is designed so that once the operating system is done unloading, it can trigger a reboot, and the hardware will handle the actual reboot process. APL (talk) 05:08, 13 December 2011 (UTC)
ssh problem
Hi. I am trying to log in to my work computer from my linux box at home and make X work properly. I have two machines, say, A and B at work. I want to log in to machine B, but cannot log in directly from outside; I can only log in to machine A. When I am at home I can log in to machine A with "ssh -X " fine, and then "xeyes", for example, shows up on my screen at home. But if I then log into machine B, again with "ssh -X", I expected that "xeyes" will work and show up on my screen at home, but it doesn't. I get a "can't open display: " error. How can I make ssh -X follow through? Robinh (talk) 08:02, 13 December 2011 (UTC)
- I don't know what's going wrong, but a possible workaround is to ssh into machine A with a port from your home machine forwarded to B:22, and then ssh -X through the forwarded port. Before trying this you should check to make sure port forwarding is permitted, though I don't see any reason why they would forbid it.
- You could also try tunneling VNC or NX instead of X, since they work over a single TCP link -- but again you'd better check that they're permitted. -- BenRG (talk) 03:19, 14 December 2011 (UTC)
- By default in many Linux distributions, X forwarding is disabled in SSH. In your sshd config file (/etc/ssh/sshd_config on my machine), you will find the X11Forwarding option. If it is set to "no", you cannot forward X from the machine even if -X is requested. It must be set to "yes" and then the sshd server must be restarted. -- kainaw™ 03:36, 14 December 2011 (UTC)
- (OP) thanks for these, guys. I am afraid that my technical knowledge is not up to much. I don't really understand how ports work. Could you give me a quick 'hello world' example of forwarding to port B22? Kainaw, VNC seems to be a good suggestion, but would I need to install it on all three machines? cheers, Robinh (talk) 07:43, 14 December 2011 (UTC)
- You shouldn't need to set up ports or VNC. I regularly ssh -Y (similar to -X) into one machine, then ssh -Y into another machine and the display on the furthest machine appears on my local machine. But, I had to allow X11Forwarding on the machines that I ssh'd into. Going about it another way is just adding a headache to the problem. They should allow simple X11 forwarding. If they don't, you haven't fixed the problem and trying to work around it will likely hit the same problem again from another angle. -- kainaw™ 14:15, 14 December 2011 (UTC)
- Great. I've checked the ssh_config file and there is a line that says "ForwardX11Trusted yes", which tells me that either my home machine or machine B isn't trusted. Thanks again, Robinh (talk) 19:49, 14 December 2011 (UTC)
- It is better to use trusted forwarding. Instead of using "ssh -X" (untrusted), use "ssh -Y" (trusted). -- kainaw™ 20:15, 14 December 2011 (UTC)
MCA or MCS
I am a BSc(Computer Science) final year student.i am not very good in coding.i am confused about doing masters in Computer Application(MCA) or MCS.I want to know which degree is suitable for getting into testing field after masters, MCA or MCS i.e MSc in Computer Science.i am really confused as some people say MCA is good if you want to go into testing and some say the reverse.please help me. — Preceding unsigned comment added by Srichabagchi (talk • contribs) 09:25, 13 December 2011 (UTC)
- It will depend on the syllabuses of the degrees and what precise field you want to work in. Don't worry as much about the title of the degree as what they actually teach. Decide what area you want to work in (desktop apps, server/web apps, games, low-level, embedded, smartphone, etc), and see which degree has a syllabus that most closely matches your needs; also if the degree requires a project think what you might do and see if that fits with the course and the interests of the teachers; and see if they offer work experience or placements in industry. A general Computer Science masters should be good for many areas of work, but for the best career possibilities you need to seek relevant experience through placements, the topics you study, and the tools (operating systems, development tools, applications like databases, etc) you use. --Colapeninsula (talk) 11:30, 13 December 2011 (UTC)
- A masters for testing? Testing is often the starting position for software developers, I'm not sure why a masters degree is suitable for someone pursuing a test position. If I were you I would try to get a testing position at at a company and use your current skills to get paid to learn as you go. TheGrimme (talk) 16:25, 13 December 2011 (UTC)
MediaWiki extension for drop-down search suggestions
How does Wikipedia implement the search suggestions that drop down when one begins typing in the search bar? Is it through an extension to MediaWiki? If so, what is the name of the extension? If not, is it something that can be easily ported to other wikis? Cheers, 182.239.212.112 (talk) 11:41, 13 December 2011 (UTC)
open source prohibited in app stores?
This article says that the new Windows 8 store will "allow open source apps", and that this is a distinguishing feature with respect to the Mac and other app stores. The clear implication is that the others somehow disallow open source apps. Is that true? And if so, on what basis? (That is, what sort of app store suitability clause disallows open source apps?) —Steve Summit (talk) 12:21, 13 December 2011 (UTC)
- Various sources like [1] [2] [3] and Mac App Store mention the GPL conflicts with the TOS Apple imposes on their app stores (both the Mac one and the iTunes one, I guess both are relevant when it comes to Windows 8). Of course, other open source licences like the BSD one may not have this problem. Also this doesn't seem to be the same for Google's Android Market. E.g. [4] where someone who's part of the FSF suggests the TOS are unfair to consumers but aren't fundamentally incompatible with it. I know a number of apps which AFAIK are released under the GPL and some of them are in the Market. (To be fair, I don't know if they are re-using code or accepted contribs from others, obviously the copyright holder can additional release it under whatever licence they want.) I don't know about other Android, or other platform (including Chrome), app stores, like the Amazon one. Nil Einne (talk) 12:48, 13 December 2011 (UTC)
- Aha. So the headline I quoted is doubly misleading. It's not open source apps that are at issue here, but rather GPLed ones. And it's not that the app store's terms of service explicitly prohibit the GPL (or open source), it's that there's a lurking incompatibility in the TOS that conflicts with the GPL. If anything, it's the GPL that prohibits distribution through the app store(s) in question, not the store's TOS. Makes sense. Thanks. —Steve Summit (talk) 14:27, 13 December 2011 (UTC)
- Actually, I think the implication is that Microsoft having anything to do with open source is newsworthy. --LarryMac | Talk 12:56, 13 December 2011 (UTC)
- Microsoft, Sony, and Nintendo all prohibit copyleft licensed software to be part of any console game on their systems. Comet Tuttle (talk) 17:50, 13 December 2011 (UTC)
- Ah, I guess they would, due to the razor and blades business model that underlies those consoles and the games that run on them. —Steve Summit (talk) 18:08, 13 December 2011 (UTC)
- Do they disallow all copyleft, or only products that are fully copyleft? Because content and engine are usually licensed separately. APL (talk) 03:15, 15 December 2011 (UTC)
MATLAB Question
Anyone out there know how to select a particular digit from an at least two digit number in MATLAB? Specifically, I want to convert a number m from decimal to binary and then recover m as the sum of powers of two, which I will know from the binary expansion. Thanks. 92.19.253.37 (talk) 21:02, 13 December 2011 (UTC)
- In general, you can use something like rem(fix(x/b^n),b) to get the nth digit of x, base b. Since you're working in binary, bitand is potentially a better way to go.
x = 42; bit = 1; list = []; while x >= bit if bitand(x,bit) ~= 0 list(end+1) = bit; end bit = bit + bit; end
- Or you can turn the number into a string and work with it that way.
- >> s = dec2bin(42)
- s = 101010
- >> s(1)
- ans = 1
- >> s(2)
- ans = 0
- 130.76.64.120 (talk) 18:23, 14 December 2011 (UTC)
- If you want to express a number as a sum of powers of two, that's essentially the same problem as converting it to base two. But you don't have to "convert it from base ten to base two" first, because it's not really meaningful to say that a number stored in a computer is in base ten, or in base two -- it's a number. (Internally, probably, it's stored in base two anyway, but you can't really see that.)
- If you want to express a number as a sum of powers of two, first find out if it's even or odd. You can do that using a modulo operator. If it's odd, add 1×20 to your sum.
- Then, divide it by two, discarding any remainder. Then, determine again if this new number is even or odd -- if it's odd, add 1×21 to your sum.
- Continue this process until dividing by two results in 0.
- I don't know MATLAB, but here's a quick implementation in C, which illustrates the algorithm I'm talking about, and shouldn't be too hard to express in MATLAB, either. The number to be decomposed is
n
, and it should be declared as an integer, or whatever it takes to ensure that when you divide it by 2, the remainder is discarded.
- I don't know MATLAB, but here's a quick implementation in C, which illustrates the algorithm I'm talking about, and shouldn't be too hard to express in MATLAB, either. The number to be decomposed is
int i = 0;
while(n > 0)
{
if(n % 2 == 1) printf("1 x 2^%d\n", i);
n /= 2;
i++;
}
}
Thanks all, that's been very helpful. 92.19.250.34 (talk) 20:32, 15 December 2011 (UTC)
December 14
Need some ideas
I am helping a relative with a small business logo. How could I create a logo that involves an original picture on the internet, for free, but still w/good quality? 65.31.168.213 (talk) 00:06, 14 December 2011 (UTC)
- What exactly are you needing help with? Do you already have a picture you want to incorporate into a logo? If you want free picture editing software Gimp (software) is the usual recommendation. If you want to create your own logo not based on an existing photo, you can also use free vector drawing software like Alchemy (software) that lets you create a logo that can be scaled up and down. Are you wanting help in finding a photo? If you're looking for general logo-designing advice I can't help, but I'm sure there are websites/other people. --Colapeninsula (talk) 10:09, 14 December 2011 (UTC)
- If you tell us what the business is, perhaps we can suggest a logo. Note that logos need to be simple, so 3D computer graphics are probably out anyway (although you could have a 3D version and a simplified 2D version, too). StuRat (talk) 06:08, 15 December 2011 (UTC)
- I guess logo was a bad choice of word to describe this. The business is a sole-proprietor bait and lure company operating out of a town in the northern Midwest. The picture will be needed for the front of the bait bag. 65.31.168.213 (talk) 01:14, 16 December 2011 (UTC)
- Well, you could have a happy worm smiling from a hook as a huge smiling fish breaches the water surface and gulps at it. StuRat (talk) 03:55, 16 December 2011 (UTC)
Deleting previously-visited sites from search bar in Firefox
It should be so easy to do; I think I can't work it out because I don't know the correct terms to put into Help; whenever I start typing in the url bar, I get a menu of suggestions from previously visited sites, which is sometimes helpful, sometimes, frankly, embarrassing. How do I delete them, or stop Firefox from doing this? I'm on a Mac.
Ta Adambrowne666 (talk) 09:09, 14 December 2011 (UTC)
- There's some advice on how to disable or configure it here. However instructions vary for different versions, so if it doesn't work tell us what version of Firefox you're using (from Help -> About Mozilla Firefox). There are other ideas about how to disable it for earlier versions of Firefox 3 here and here.
- You can delete individual items in the suggestions by highlighting them and pressing delete on your keyboard (either use the up/down cursor keys to navigate the list when it appears, or put the mouse over an entry to select it). --Colapeninsula (talk) 10:03, 14 December 2011 (UTC)
- If you are planning on doing some "embarrassing" browsing, you can start a private browsing session. --LarryMac | Talk 12:47, 14 December 2011 (UTC)
- Worked a treat - thanks all for the informative answers. Adambrowne666 (talk) 18:59, 14 December 2011 (UTC)
Dumb memory
What is Dumb memory?--Intr199 (talk) 13:18, 14 December 2011 (UTC)
- It would depend on the context, but it could refer to memory chips (or RAM within a semiconductor) lacking any memory controller, DRAM controller, refresh logic, or other interface logic. This sense of the word "dumb" (and the opposite "smart") is common in computing, as in dumb terminal, dumb printer. --Colapeninsula (talk) 14:49, 14 December 2011 (UTC)
Report bug in Windows 7
Where can I report a bug in Windows 7 to? --178.208.197.76 (talk) 19:10, 14 December 2011 (UTC)
- That will depend on several factors. Did you experience a program crash? If so, you should have seen a Windows Error Reporting dialog box, and you can use that interface to report the crash.
- If you want to provide feedback in a more general way, you should go to http://connect.microsoft.com to provide feedback or bug reports.
- Developers of new software usually head straight to the support forums at http://msdn.microsoft.com - but in general, developers know more specifically where the appropriate report should be filed. Nimur (talk) 19:17, 14 December 2011 (UTC)
Open a variable URL with HTML without Javascript
Hi,
I want to read the content of a field of a HTML form and then open a URL containing the text I read from the field. Is this possible in plain HTML, without using a scripting (client- or server-side) language?
Thanks. Apokrif (talk) 20:56, 14 December 2011 (UTC)
- You must use scripting of some kind. HTML is a markup language, not a scripting language. -- kainaw™ 21:01, 14 December 2011 (UTC)
- And note that it would be really quite trivial to do it in Javascript. --Mr.98 (talk) 22:41, 14 December 2011 (UTC)
December 15
Kernel headers
What are they exactly? The article that should be about them redirects to Linux kernel, which does not explain what they are. Is there any Windows equivalent? Are there other elements which are equally important for compiling in Linux? 88.8.78.13 (talk) 02:12, 15 December 2011 (UTC)
- I see that the redirect was created on 6 May 2008 by user:Mac, who then added a section titled "Kernel Headers" which is missing from the article in its current state. Here is the old version of the article. Card Zero (talk) 08:15, 15 December 2011 (UTC)
- Kernel headers are header files that describe the C language interface exposed by the kernel. They serve the same purpose as the headers accompanying any library.
- The headers are needed to compile software running on top of the kernel. In Linux distributions, they are normally distributed as part of the development package for the standard C library, which programs use instead of calling the kernel directly.
- Every kernel written in C/C++ has headers. However, depending on the degree to which the C library encapsulates kernel functionality, they might not be made available to application developers, but they exist. Bomazi (talk) 09:17, 15 December 2011 (UTC)
Where are the cheapest electronics?
Which country has the cheapest desktops, notebooks, etc. (not considering the salary of its inhabitants). I suppose if a country did no levy sales taxes on them, does have own factories, PCs could be very cheap. I was thinking at something about Japan, Singapore or Hong Kong. 88.8.78.13 (talk) 02:14, 15 December 2011 (UTC)
- I'd think China proper would be the cheapest, since they have the lowest wages. StuRat (talk) 06:04, 15 December 2011 (UTC)
- And what about the cheapest by country/brand? Can I be sure that Toshibas are cheaper in Japan, ASUS in China non-proper, Samsung in Korea? 88.8.78.13 (talk) 14:49, 15 December 2011 (UTC)
- In general a product is cheaper in the nation that creates it, yes, but not always. Some nations engage in "dumping", meaning they sell items at a loss to other nations. Why do this ? They might want to drive the target nation's own producers out of business, with the hope of increasing profits later, or the export companies might get subsidies from their government. This is not allowed under most trade agreements, but it happens anyway. Differential supply-and-demand and exchange rates might also cause unexpected prices. StuRat (talk) 03:49, 16 December 2011 (UTC)
Speeding up Windows XP
Is there a genuine product that will speed up Windows XP.
Hamish 84. — Preceding unsigned comment added by Hamish84 (talk • contribs) 04:00, 15 December 2011 (UTC)
- To speed up any version of Windows, or any other O/S for that matter, you generally want to remove things, not add them. However, there are programs which will remove some of the crap that accumulates over time, such as adware. Is this what you mean ? Also, have as little as possible running at once and reboot often. StuRat (talk) 06:00, 15 December 2011 (UTC)
- Yes, your Windows XP installation disks. In my experience, all Windows installations seem to slow down with age. Back up your personal data (documents, photos, music, emails, etc), make a list of the programs you actually use and locate their install disks or download URLs, take note of the passwords you might have forgotten, and put all this on an external drive or optical disk(s). You are then in a position to reinstall Windows. It might also be a good time to look into adding more memory and getting a larger capacity hard drive. After reinstalling Windows you will be amazed at how much faster your PC seems to be. You will then need to reinstall your programs and put your personal data back. If that doesn't satisfy you, maybe it is time to get a new PC. Astronaut (talk) 11:51, 15 December 2011 (UTC)
- I agree with Astronaut — unfortunately, Windows systems do seem to slow down with age, at least for me, which I have always assumed was because I install a lot of software on my systems. Erasing the whole hard disk and reinstalling everything from scratch usually helps. Of course it's terribly inconvenient. Comet Tuttle (talk) 18:55, 15 December 2011 (UTC)
- I have a computer running Windows XP which was installed in 2009, it has been on 24/7 since then and its last restart was 160 days ago according to net stats srv. I have not noticed it slowing down over time. This seems to support the theory that installing a load of junk onto a computer is the cause of these slowdowns, and not a design fault with Windows itself. 82.43.90.142 (talk) 01:23, 16 December 2011 (UTC)
- Perhaps, but you could also argue that a design that slows to a crawl if it runs anything beyond the operating system is faulty, just like a car that only runs well with no cargo or passengers. StuRat (talk) 03:44, 16 December 2011 (UTC)
- Windows may slow down if you install software and then uninstall it. Eg you install some software, use it, maybe don't like it, so uninstall it. Now the PC runs slower than it did before you installed it. This can be because the "uninstall" may leave stuff behind - which is (IMO) bad design. For you car analogy, it's like I load the car with passengers and/or cargo, drive them somewhere (perhaps using more fuel than usual because of the extra load, but that's OK) then all my passengers get out and I unload all the cargo - and now my car runs less efficiently than it did before they got in! Mitch Ames (talk) 10:20, 16 December 2011 (UTC)
- Wouldn't it be more like you are trusting someone to unload your car and they leave some of the cargo behind? I blame the uninstallers for the problem, Microsoft did not write them. Also, people install/get hijacked by horrid programs all the time, not every last bit of damage they do is cleaned up spyware removers; but, again, this is not Microsoft's fault, nor is it the antispyware programs fault, it is the user's fault and the spyware programmers fault (more the latter's really) Phoenixia1177 (talk) 10:52, 16 December 2011 (UTC)
- A decent operating system would isolate any download so it all goes in one folder, then delete that folder and all of it's contents on an uninstall. Things like registry entries could be placed in the same folder, with links accessing them from the registry. Also, whenever the registry finds a dead link, it should ask you if you want to remove it. Leaving it up to apps to clean up after themselves will inevitably lead to problems. StuRat (talk) 19:38, 16 December 2011 (UTC)
Logged out of facebook on my PC ,GRAND SON LOGGED IN
I 'moved' this question from the help desk [5] Chzz ► 10:24, 15 December 2011 (UTC)
My grand son used my PC and is loged into my facebook. How do I remove him off my PC and re-log into my face book ON MY PC HAVE ALSO FORGOTTEN MY PASSWORD -this Granny needs help- Mrs Christine Erasmus Many thanks ,much appreciated — Preceding unsigned comment added by 41.177.50.118 (talk) 10:21, 15 December 2011 (UTC)
- Go to the Facebook page. At the top there is a blue bar, and to the right of the bar you will see (from left to right) your grandson's picture, then his name, then the word 'Home', then a downwards-pointing arrow. Click the arrow, then choose 'log out' from the menu that appears. Now you will arrive at the Facebook 'login' screen. At the top right of this page there are two boxes, labelled 'Email' and 'Password'. If you remember both of these things, you can enter them and log in. If not, you will need to click 'Forgotten your password', which is just under the password box. This will take you to another page where you can enter various pieces of information to recover your password. I hope these instructions explain things ok, but if you have any trouble along the way, feel free to post here again so we can guide you through. - Cucumber Mike (talk) 12:15, 15 December 2011 (UTC)
Do "find your phone" services work?
Family member has left Iphone in a cab. It's being reported to lost property, police and we can use the Orange number to immobilise it and block calls. It has GPS in it, so can we use that to find out where it is? Is there any point in using something like mobilelocate.co.uk? Itsmejudith (talk) 12:25, 15 December 2011 (UTC)
- These services may be useful, but don't guarantee you'll get your phone back. You can read a bit about mobilelocate on their website; they use GSM network-based tracking which tells you the area to a few hundred metres; other systems use GPS which is more accurate (at least outdoors) but require an app on the phone. Mobile phone tracking has a bit of info on the different methods, or read this. All services require the phone to be turned on (they may record the last position it was used if it was switched off) which is a limitation. Many of these services, like mobilelocate, are intended for tracking legitimate phone users (children or employees) rather than stolen phones. Most services allow legitimate users to stop the service (so someone who steals it may be able to disable the service if the phone isn't passworded), and it may be possible to circumvent it if you can jailbreak the phone, re-flash it, change the sim card, etc, so a determined thief who's planning to sell the phone on could probably get around it. But if you leave it in a bar it could tell you which bar, etc. --Colapeninsula (talk) 12:47, 15 December 2011 (UTC)
- I read the links, thanks very much, but am not sure what I can do next. We are waiting to hear from lost property whether it has been handed in, and if it hasn't then will contact the police. If not prompted, they are unlikely to do anything to track it, but if we could say "it's at this location" then they might follow that up. Itsmejudith (talk) 13:09, 15 December 2011 (UTC)
- There are many phone tracking services (many free ones too, like Latitude). The problem that most people have is that they decide they want to install it on their phone AFTER they lose the phone. Obviously, you can't do that. So, it is good idea to install it ahead of time. My wife and I have Latitude running on our phones. She lost her phone. I used it and went straight to the store where it was. She left it on the counter, and a worker put it behind the counter. I found it because I tracked it and, once nearby, called it and heard it ring. If we had waiting until her phone was lost to worry about installing a tracking service, we'd most likely never have found it again. -- kainaw™ 13:57, 15 December 2011 (UTC)
- Thanks Kainaw. If only... Does anyone know if there is any possibility that an iPhone contracted to Orange would have had such software installed as standard? I don't think the owner installed anything. Itsmejudith (talk) 15:42, 15 December 2011 (UTC)
- How new is the iPhone. The newest ones are supposed to come with "Find My iPhone" installed. That is a subscription service from Apple. You have to sign up with MobileMe to use it. I do not know if you can subscribe to MobileMe after losing the phone and get the phone to be tracked by it (big security issue there - what if you sign up and have it track your ex-girlfriend's phone). So, if it isn't already set up on MobileMe, it probable cannot be tracked. The main issue is that if you don't have the phone in your possession, setting up software to track it is hard. It is intentionally hard because nobody wants you to be able to set up a service to track someone else's phone without their knowledge. -- kainaw™ 15:51, 15 December 2011 (UTC)
- With Android phones, it's possible to install locating software AFTER you lose the phone. See Plan B. I just tried it out with my phone and it works pretty well. It located my phone (which was sitting next to me) within a minute. - Akamad (talk) 22:47, 15 December 2011 (UTC)
- Have you tried the obvious ? That is, have you called the number to see if anybody answers ? If so, perhaps they would then return it to you for a small reward. StuRat (talk) 03:41, 16 December 2011 (UTC)
- Yes, unfortunately. Apparently on first attempts it kept ringing but then appeared to be switched off. It was fully charged. Should have heard from the cabs' Lost Property by now, but will chase them up, as that seems to be only real hope. Itsmejudith (talk) 09:46, 16 December 2011 (UTC)
- Somebody taking the trouble to turn it off is a good sign. Probably the ringing annoyed the cabbie, who dug it out from under the seat, turned it off, and later turned it in to lost property. StuRat (talk) 19:32, 16 December 2011 (UTC)
Huffington Post and sign on with Google
You can sign on anywhere from anywhere these days it seems. So I tried to use Google for Huffington Post....
Huffingtonpost.com is asking for some information from your Google Account XXX@gmail.com
- Email address: Richard Farmbrough (XXX@gmail.com)
- Language: English
- Google Contacts
Er.. does that really mean they are asking for my contacts? Is this Phone hacking scandal all over again? Or am I just out of touch with the technology?
Rich Farmbrough, 21:47, 15 December 2011 (UTC).
- You're of course not obligated to help Google share your private information with any other website. I would decline any such request, but I would also know that it is technically possible that Google might choose to share any of your private information it already has, even without your consent.
- I'm curious which website you were viewing when you saw that request: Google or Huffington Post?
- I wouldn't call yourself "out of touch with technology," simply because you're reluctant to collude with major advertisers seeking to surveillance your online activities. The less consent you give, the more recourse you will have, should anything illicit ever be shared by a web company. Nimur (talk) 22:19, 15 December 2011 (UTC)
- Yes I was planning on commenting on a Huffington Post column. They will be denied my sagacity. I did decline the request, while I doubt it is sinister, it does look at least misleading and at worst a blunder. Incidentally I recommend Ghostery as an anti-major-advertiser-surveillance tool. Some sites have half a dozen or more tracking bugs on each web page. Rich Farmbrough, 23:07, 15 December 2011 (UTC).
- Yes I was planning on commenting on a Huffington Post column. They will be denied my sagacity. I did decline the request, while I doubt it is sinister, it does look at least misleading and at worst a blunder. Incidentally I recommend Ghostery as an anti-major-advertiser-surveillance tool. Some sites have half a dozen or more tracking bugs on each web page. Rich Farmbrough, 23:07, 15 December 2011 (UTC).
- Is this Google+'s equivalent of Facebook Connect? So you can see what all your friends are doing everywhere on the internet and vice versa. (How fascinating for everyone to see.) --Colapeninsula (talk) 10:27, 16 December 2011 (UTC)
December 16
Quicktime media soundfile
Hello, I need help in determining if a quicktime media soundfile can be broken down to find information about when the file was recorded and/or information on the recording device such as cell phone or other. The file in question is a text mms sent through a smart phone. Any help will be greatly appreciated. :)
Thank you,
AJ — Preceding unsigned comment added by 184.79.110.134 (talk) 00:24, 16 December 2011 (UTC)
- Maybe. The Quicktime container format does have support for metadata. Apple's documentation for that says there are optional metadata types for location (see the "location" secton) and creation date (see the "QuickTime Metadata Keys" section). A program called Metadata Hootenanny (which I haven't used, so can't speak for its safety or quality) claims to be able to read this metadata. None if this means that the given quicktime file you have will actually have that metadata, or that it will be accurate. -- Finlay McWalterჷTalk 00:35, 16 December 2011 (UTC)
Can the government find who is behind my username?
Hi, suppose I live in a nice place that has been taken over by an Unpleasantocracy. Can the government find who I am from my edits on Wikipedia if I never edit under an IP? Let us assume they have complete control over the infrastructure within the country, but nothing outside, ie. no spies among the Wikipedia bureaucrats. On the other hand, if I do edit under an IP, I assume it would be easy for them. Am I right here? Thanks in advance. IBE (talk) 02:59, 16 December 2011 (UTC)
- If you edit under the IP, then they can find out which ISP or Telco (or whoever) supplied the IP to you, and if they can access the company's records (and if the company keeps sufficient records) then they can tell which subscriber line used the IP at any time. The Unpleasantocracy probably have a law requiring ISP within their borders to store & divulge such info. Under your user name with wikipedia as a black box: they would not be able to identify you from historic edits. But, if they could do some sort of deep packet inspection on all internet packets going across their border, they could presumably catch you in action (e.g. by user name) and get the IP from the packet(s). That would be a monumental effort. --Tagishsimon (talk) 03:12, 16 December 2011 (UTC)
- So as I understand it, if they check everything, the moment they find a post under my username, when it's in transmission, they have the IP pretty much in front of them. Can they monitor all posts for certain keywords (eg. bomb, attack, "I hate the government") and then catch them? The article deep packet inspection you linked seems to suggest this, but I just want to check. Is that how they catch bloggers etc.? IBE (talk) 03:42, 16 December 2011 (UTC)
- Not in direct answer to your question, but you may find our article on Echelon interesting. Vespine (talk) 04:30, 16 December 2011 (UTC)
- So as I understand it, if they check everything, the moment they find a post under my username, when it's in transmission, they have the IP pretty much in front of them. Can they monitor all posts for certain keywords (eg. bomb, attack, "I hate the government") and then catch them? The article deep packet inspection you linked seems to suggest this, but I just want to check. Is that how they catch bloggers etc.? IBE (talk) 03:42, 16 December 2011 (UTC)
- Because of how packet-based transmissions work, it is very difficult to monitor all the Internet traffic and just put it back together to monitor usage. How bloggers (and idiots who call themselves "hacktivists") get caught is by sharing their information to the public on the Internet. They do things like go on Twitter and post their home town, make comments about where they go to school, make comments about where they work, and then make comments about how cool their latest blog entry or hack attempt was. Add to that the photos and it is far too easy for the government to track them down. -- kainaw™ 04:43, 16 December 2011 (UTC)
- Thanks, I think I get this now. The critical factor in packet-based transmission seems to be the maximum transmission unit, which on the Internet appears to be very small. It would seem that if they had billions of dollars at their disposal just for surveillance of Internet traffic, they might have a chance, but I doubt anyone does. If anyone knows how Echelon gets around this, I would be very curious. IBE (talk) 05:27, 16 December 2011 (UTC)
- The NSA budget for 1997-1998 has been disclosed as $27 billion per year, and it has probably increased considerably after 9/11. I am sure they have no problem funding their multiple internet surveillance programs. There have also been sporadic news about network surveillance by intelligence services in other countries. 130.233.228.9 (talk) 09:51, 16 December 2011 (UTC)
- On the NSA's post-9/11 efforts, see the Trailblazer Project. --Mr.98 (talk) 14:02, 16 December 2011 (UTC)
- The NSA budget for 1997-1998 has been disclosed as $27 billion per year, and it has probably increased considerably after 9/11. I am sure they have no problem funding their multiple internet surveillance programs. There have also been sporadic news about network surveillance by intelligence services in other countries. 130.233.228.9 (talk) 09:51, 16 December 2011 (UTC)
- Thanks, I think I get this now. The critical factor in packet-based transmission seems to be the maximum transmission unit, which on the Internet appears to be very small. It would seem that if they had billions of dollars at their disposal just for surveillance of Internet traffic, they might have a chance, but I doubt anyone does. If anyone knows how Echelon gets around this, I would be very curious. IBE (talk) 05:27, 16 December 2011 (UTC)
- Using Wikipedia:Secure server (which uses HTTPS) would help protect your identity. --Colapeninsula (talk) 10:29, 16 December 2011 (UTC)
Since it seems that there may be a risk, even given the technical obstacles, I should mention that I was of course thinking of countries like Iran and China. I kept it anonymous to avoid any trace of politics, but as there seems to be no single, general answer, I thought I should lift the veil, even if it was not exactly obscure. If anyone knows anything specific, I would be curious. Thanks for the answers so far. IBE (talk) 10:48, 16 December 2011 (UTC)
Also, this may sound paranoid, but could they tell that you are using the https server, and start targeting just you, to see what else you might be up to? Then they wouldn't have to spot you over the whole internet - they could just eavesdrop on your IP, and wait for you to send one non-encrypted message, and they would have something. Or they could just get you on trumped-up charges if they decide they don't like https. IBE (talk) 10:54, 16 December 2011 (UTC)
- Most governments assign people to find people who are doing bad things, including using Internet to do bad things. Definitions of "bad" may include pornography, apostasy, racism, sabotoge, espionage, fraud, drugrunning, terrorism and many others, all of whose definitions vary. Methods and countermeasures also vary, thus have become a vast area for study including secret study, thus are not answerable in a forum like this one. Jim.henderson (talk) 14:55, 16 December 2011 (UTC)
Question about upgrading from XP 32 bit OEM to Windows 7 64 bit in entirely new system
Hey guys and gals,
So my sister's HP desktop bought the farm the other day. I suspect motherboard failure. Since I had spare parts lying around from a recent upgrade, I decided that I would build her a system from scratch, new case, new parts, new everything; but transfer her data to the new PC. My plan is to clone her HDD from the HP computer (with an OEM version of Windows XP Home Edition 32 bit) to the new SDD, put that SDD in the new build, and then upgrade to Windows 7 64 bit) by booting from an upgrade disk to do a clean install. Will this work? The only issue I anticipate is that Windows might have an issue with the new components, but does that even matter? I'm not very tech savvy, so I'm not sure, but if I booted from the CD I should avoid any potential "activation" problems, correct?
Thank you in advance! Mtzen (talk) 05:41, 16 December 2011 (UTC)
- Well, make sure that the new system is powerful enough to run Windows 7 and that the processor is an x86_64. If you can, provide the specs here so we can all see what hardware you'll be working on. Other than that if all components work together you're good to go. What do you mean by 'an issue with the new components'? If you are referring to problems with drivers or compatibility, then you are running the risk that the system might just not work (properly). --Ouro (blah blah) 08:46, 16 December 2011 (UTC)
- I don't think this plan will work. I doubt that an old XP install will take too kindly to being cloned to radically different hardware, and it looks like you can't do an upgrade install of XP to 7 (I'm also pretty sure you can't upgrade 32 bit Windows to 64 bit). Why not just put the old HDD aside for the moment, build the new PC with a fresh copy of Windows 7 and get it all set up, then connect the old HDD up and copy off all the data you need? CaptainVindaloo t c e 23:49, 16 December 2011 (UTC)
- I've already copied all the data, etc. Since I have an upgrade disk, I wanted to use that to do a completely clean install of Windows 7 64 bit instead of shelling out $100-200 for a retail copy of Windows 7 or sticking with the old 32 bit XP. Essentially, this is a brand new computer, but I was wondering if I could take advantage of the fact that I have a legal Windows XP license, instead of paying the full price for Windows 7. My only concern is that XP, since its OEM, could refuse to work with the new mobo/ components and not "activate". However, I don't know if that matters when I boot off the disk. Mtzen (talk) 00:35, 17 December 2011 (UTC)
How can I download 40,000 web pages while re-pooling open connections?
Hi, for a research project I need to download ~40,000 static web pages from a research site. I don't want to inadvertently DOS the site, so I want to make sure that my script uses http-keep-alive so it can re-use the TCP connection. I'm planning on using wget like so:
for VARIABLE in 1 2 ... 40000
do
wget http:my_url done
According to the --no-http-keep-alive section here:
http://www.gnu.org/software/wget/manual/html_node/HTTP-Options.html
It seems that wget does that. But I'm not sure how wget remembers the last connection since it runs and exits during each iteration of the for loop. Could someone explain if it will work or if there might be a better way to do this? — Preceding unsigned comment added by Rain titan (talk • contribs) 12:42, 16 December 2011 (UTC)
- keep-alive is a property of the HTTP connection, which persists only as long as the underlying TCP socket does. When a process ends, its sockets are disconnected. So, in your proposed scheme, the keep-alive will be futile, not (just) because wget can't remember the keep-alive info, but because the underlying connection has already been destroyed. The keep-alive is meaningful when you make multiple downloads from the same server in the same invocation of wget; you might choose to build a list of URLs and pass them to wget -i, for example. But an altogether better way to do this is to not use wget, but to write your own download script in something like perl or python (using say pycURL) - that way the HTTP sockets are explicit objects that persist until you destroy them - and it's easier to control what gets sent. -- Finlay McWalterჷTalk 12:59, 16 December 2011 (UTC)
- If you still want to use wget see Wget#Advanced examples section. It does not explain keeping the connection alive, but gives example of defining the whole set of URLs for one wget call and of avoiding DoS both on client and server side by randomizing download delays and by bandwidth throttling. --CiaPan (talk) 13:10, 16 December 2011 (UTC)
Passwords?
Any tips for making strong passwords? Heck froze over (talk) 19:23, 16 December 2011 (UTC)
- Combine uppercase letters, lowercase letters, and numbers, with no English words. Use a mnemonic to remember it. For example, "my 2 cats names are Smokey and Alamo" becomes "m2cnaSaA". StuRat (talk) 19:26, 16 December 2011 (UTC)
- Use a long password that is not specifically made of words, like "this is my password" uses only common words, and toss in a few symbols. An example is "my 100% ultra-strong password". I find that by remembering four words, I can create long passwords that I don't forget. When I'm forced to use something like 10 characters with at least two numbers and one symbol, I forget the password in about 30 seconds. -- kainaw™ 19:30, 16 December 2011 (UTC)
- An anecdote: Because of the high concern of security in health data, my password for my health data password is an entire lyric from a song that I like. It takes a long time to type in. When someone asks me for something, I purposely type it one word at a time with pauses between each word. They get very annoyed and rarely return to ask me to do more of the work they should be doing. -- kainaw™ 19:32, 16 December 2011 (UTC)
- A relevant XKCD comic on this which weighs heavily towards the Kainaw approach than the StuRat approach, which is, indeed, what security experts of note advise these days. In general, passphrases are more secure than convoluted passwords. Unfortunately most secure sites of note do not support them, in my experience. (My bank won't let me make a password longer than 11 characters, and requires me to insert all sorts of difficult-to-remember stuff into it. I find this highly irritating, and I think it leads towards worse and worse practices, like using lots of the same, small, difficult-to-remember passwords on multiple sites.) For the stuff I really care about, and where I can use passphrases (e.g. with TrueCrypt containers), I pick random sentence fragments out of books I have on the shelves. I slyly dog-ear the page in case I forget it (there are enough books, and enough dog-eared pages, that retracing this would be prohibitively hard, much less figuring out which sentence fragment it was — in any case, I'm not worried about people in my house finding out my passwords). An example (not an actual passphrase of mine, but it might as well be): "it was also correct in the sense of agreeing with experiments". Long, very difficult for a computer to guess (lots of entropy), but very easy to remember, once I've written it out a few times. Even if I forget the exact phrasing, it's easy to find which sentence it was just by glancing at the page of the book in question, if I can remember even part of it. --Mr.98 (talk) 19:54, 16 December 2011 (UTC)
- A standard piece of advice is to turn a passphrase into an initialism. So, if a memorable phrase to you is "I am now a perfectly safe penguin, and my colleague here is rapidly running out of limbs!", you get "ianapspamchirrool", which is a reasonably strong password, seeing as there's little relationship between one first letter and the next. Paul (Stansifer) 20:29, 16 December 2011 (UTC)
- But isn't that even orders of magnitude less entropy than the amount in the first XKCD example? My understanding is that these days, that is not very hard to brute force — a few days of processing or so. --Mr.98 (talk) 21:18, 16 December 2011 (UTC)
- A relevant XKCD comic on this which weighs heavily towards the Kainaw approach than the StuRat approach, which is, indeed, what security experts of note advise these days. In general, passphrases are more secure than convoluted passwords. Unfortunately most secure sites of note do not support them, in my experience. (My bank won't let me make a password longer than 11 characters, and requires me to insert all sorts of difficult-to-remember stuff into it. I find this highly irritating, and I think it leads towards worse and worse practices, like using lots of the same, small, difficult-to-remember passwords on multiple sites.) For the stuff I really care about, and where I can use passphrases (e.g. with TrueCrypt containers), I pick random sentence fragments out of books I have on the shelves. I slyly dog-ear the page in case I forget it (there are enough books, and enough dog-eared pages, that retracing this would be prohibitively hard, much less figuring out which sentence fragment it was — in any case, I'm not worried about people in my house finding out my passwords). An example (not an actual passphrase of mine, but it might as well be): "it was also correct in the sense of agreeing with experiments". Long, very difficult for a computer to guess (lots of entropy), but very easy to remember, once I've written it out a few times. Even if I forget the exact phrasing, it's easy to find which sentence it was just by glancing at the page of the book in question, if I can remember even part of it. --Mr.98 (talk) 19:54, 16 December 2011 (UTC)
- That depends a hell of a lot on who you talk to. Some people still claim that the best computers will take ages to brute-force a 10-character password that may have any of all the printable characters on the keyboard. Others have claimed to set up password hacking machines using multiple multi-GPU cards and parallelizing the whole thing. I saw one paper (wish I could dig it up right now) where a guy spent under $3000 on his password hacking box, used a GPU version of john in parallel mode, and was getting 8-character passwords in a matter of hours (not weeks, months, or years). While I don't remember the paper much, I remember bringing it up at a security conference and the experts claimed that even with 100 parallel processors, it would take months to crack the average 8-character password. So, you are left with a monstrous variance between what one expert claims and what another expert claims. -- kainaw™ 21:23, 16 December 2011 (UTC)
- A coworker just jogged my memory. The GPU password cracker came out of Georgia Tech research last year. They can do anything up to 11-characters in a reasonable amount of time (8-characters in minutes). -- kainaw™ 21:31, 16 December 2011 (UTC)
- When I have to general passwords for other people, who demand they be memorable, I usually use the following rubric: word number word number, where word is something I get from hitting the Wikipedia random page button and picking a word with my eyes closed, and number is from a random integer (0..99) generator (you could use random.org, but obviously it's best not to use an online source that theoretically could be intercepted). That yields stuff like christopher90bronson43, which people complain about but which they very quickly discover they can remember. That's a scheme fairly similar to the XKCD one - it's not perfect, but people do actually get reasonably strong passwords that don't appear in credible rainbow tables and that they actually can, and do, remember. For myself, especially for secure things, I use Keepass's password generator - which gives very secure passwords, but which I'm relying on a single (pretty strong) password to protect the whole lot (because storing in Keepass is a fancy way of writing passwords down, if I'm honest). -- Finlay McWalterჷTalk 20:04, 16 December 2011 (UTC)
wii ip?
just curious, (i noticed my friend's wii has an IP address), do the ip addresses of nintendo wiis change? don't regular computers do this too? Heck froze over (talk) 19:47, 16 December 2011 (UTC)
- It depends on the Internet Service Provider, who is in charge of assigning the IP addresses to subscriber devices. Some ISPs rotate IPs pretty frequently, some keep them static for years. --Mr.98 (talk) 19:50, 16 December 2011 (UTC)
- The Wii will most likely have gotten its IP address using a DHCP request to your friend's router. That IP address will be local to your friend's home network. Computers often do the same, however computers can also be more directly connected to the outside world, so may get their IPs from the ISP. Both Wiis and computers can also be configured with a static IP on the home network, meaning it does not change. This can be more challenging to maintain, but does allow for additional configuration options in the router, such as allowing (or blocking) certain ports for specific IPs. --LarryMac | Talk 19:56, 16 December 2011 (UTC)
Jumbo frames and non-jumbo frame devices together?
I have a small network of computers that are connected via gigabit ethernet to a switch that has jumbo frames support enabled. Most of these computers support jumbo frames also, but there are a few that don't. Is there any overall impact on the network of having non-jumbo frame computers connected? Any modern switch is smart enough to handle both type of frames at once, yes? I assume jumbo frame computers will be able to communicate with non-jumbo computers (and vice versa) — much like gigabit devices can communicate with 100Base-T and 10Base-T devices (and vice versa), right? --76.79.70.18 (talk) 21:29, 16 December 2011 (UTC)
bsddb with regards to Unix and Python
I haven't heard of bsddb till recently. I'm assuming the links below are referring to the same thing.
<http://docs.python.org/library/anydbm.html#module-anydbm>
<http://docs.python.org/library/bsddb.html#module-bsddb>
<http://www.oracle.com/us/products/database/berkeley-db/index.html>
<http://en.wikipedia.org/wiki/Berkeley_DB>
I haven't been able to figure out what exactly it is. bsddb seems to be installed on my Mac but I definitely didn't install it. Is that because bsddb comes installed by default? Is that true on all Unix machines? Is the library on my machine Oracle's distribution? (I tried which bsddb but that didn't work).
Could anyone just generally explain bsddb both in the the context of why it's in my machine and also in terms of the Python libraries provided (anydbm and bsddb). — Preceding unsigned comment added by Rain titan (talk • contribs) 23:31, 16 December 2011 (UTC)