courtorder Posted August 3, 2005 Share Posted August 3, 2005 for the dude about firefox profiles...a lot of times it will make you start a new profile if an instance of firefox is running inthe background. ctrl+alt+delete, and then go to processes. find firefox.exe and end it. **only do this if you do not see firefox as being open in the toolbar/you cannot get it to close.** Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 3, 2005 Share Posted August 3, 2005 http://www.putfile.com/media.php?n=FPS-Doug MERO, CHECK THAT Quote Link to comment Share on other sites More sharing options...
IHeartFr8s Posted August 3, 2005 Share Posted August 3, 2005 Originally posted by IHeartFr8s@Aug 2 2005, 03:05 PM you talkin about windows updates? I checked it and I have everything...there was no high priority updates... Quoted post now what do I do? Quote Link to comment Share on other sites More sharing options...
effyoo Posted August 5, 2005 Share Posted August 5, 2005 http://tindeck.com/ Tindeck Audio is a free audio hosting service that allows you to upload your original music and audio and share it with people around the world. Quote Link to comment Share on other sites More sharing options...
MEROJUANA Posted August 5, 2005 Share Posted August 5, 2005 Originally posted by casekonly@Aug 3 2005, 07:22 AM http://www.putfile.com/media.php?n=FPS-Doug MERO, CHECK THAT Quoted post GOOD LOOKIN MY NIGGA! MERO CHEA! Quote Link to comment Share on other sites More sharing options...
MEROJUANA Posted August 5, 2005 Share Posted August 5, 2005 ACTUALLY, NAH...I CANT DO IT. THE SHIT MAKES YOU CLICK LINKS AND SHIT LIKE THAT. I JUST WANT MY SHIT TO STRAIGHT PLAY MUSIC WHEN YOU OPEN SHIT UP...FUCK. M E R O E TIZZITE. Quote Link to comment Share on other sites More sharing options...
why write? Posted August 5, 2005 Share Posted August 5, 2005 okay so i've been searching, found a decent dell...but ended up not liking it, how is a gateway laptop? http://www.bestbuy.com/site/olspage.jsp?sk...d=1118839115082 hows this one? worth it? Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 5, 2005 Share Posted August 5, 2005 that gateways specs look really nice. Quote Link to comment Share on other sites More sharing options...
IHeartFr8s Posted August 6, 2005 Share Posted August 6, 2005 so i'm guessin you have no solution to my problem casek? Quote Link to comment Share on other sites More sharing options...
ODS-1 Posted August 6, 2005 Share Posted August 6, 2005 I've got a problem with AD AWARE SE. I tried to do a smart system scan this morning and when it got to HKEY_LOCAL_MACHINE/software/.. (something like that) it quit responding and I had to shut it down. Then I downloaded the new version of ad aware (v 1.06) and I'm having the same problem. Is there anything I can do to get ad aware to work? I need to run a scan but I can't now, and the only other software I have is spybot, which I think is enadequate right now. Somebody help me. Quote Link to comment Share on other sites More sharing options...
Vanity Posted August 6, 2005 Share Posted August 6, 2005 go to lavasoft's site. they ahve boards there and the folks are pretty helpful.. and not a bunch of sarcastic assholes like on here.. assholes :bawling: Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted August 16, 2005 Share Posted August 16, 2005 something is wrong with my camera's memory card, it only shows some of the pictures i took yesterday, and a few of the couple hundred that were already on it. the camera says it has only room for 30 more pictures though. i think it would help if i could get windows to recognize my camera as a drive like it used to instead of as a camera. only one of the programs i've tried recognized the camera, but windows recognizes it. anyone know of a good memory card file recovery program? *anyone know how to make DOS recognize usb devices? i found some instructions here, but they don't make much sense to me Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 16, 2005 Share Posted August 16, 2005 they are adding lines to a config.sys file on a disk, arcel. Quote Link to comment Share on other sites More sharing options...
IHeartFr8s Posted August 16, 2005 Share Posted August 16, 2005 Originally posted by IHeartFr8s@Aug 5 2005, 08:28 PM so i'm guessin you have no solution to my problem casek? Quoted post ??? Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 16, 2005 Share Posted August 16, 2005 not without knowing some mroe or being in front of it Quote Link to comment Share on other sites More sharing options...
Vanity Posted August 17, 2005 Share Posted August 17, 2005 arcel... i think i know what's up.. i though i had the same prob w/ my old cam... your prolly have another directory dull of photos on there Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted August 17, 2005 Share Posted August 17, 2005 i just checked, no such luck. i need to make windows assign a letter to it. i think it used to, because i could cut and paste directly from the memory stick and view a pie chart of the free space. Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 19, 2005 Share Posted August 19, 2005 i was thinking of doing an anonymity section for you guys and girls, but i'll hold off on that stuff. too much to get into. here's a link, though http://tor.eff.org/ and what it does.... Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Your traffic is safer when you use Tor, because communications are bounced around a distributed network of servers, called onion routers. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several servers that cover your tracks so no observer at any single point can tell where the data came from or where it's going. This makes it hard for recipients, observers, and even the onion routers themselves to figure out who and where you are. Tor's technology aims to provide Internet users with protection against "traffic analysis," a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Traffic analysis is used every day by companies, governments, and individuals that want to keep track of where people and organizations go and what they do on the Internet. Instead of looking at the content of your communications, traffic analysis tracks where your data goes and when, as well as how much is sent. For example, online advertising companies like Fastclick and Doubleclick use traffic analysis to record what web pages you've visited, and can build a profile of your interests from that. A pharmaceutical company could use traffic analysis to monitor when the research wing of a competitor visits its website, and track what pages or products that interest the competitor. IBM hosts a searchable patent index, and it could keep a list of every query your company makes. A stalker could use traffic analysis to learn whether you're in a certain Internet cafe. Tor aims to make traffic analysis more difficult by preventing eavesdroppers from finding out where your communications are going online, and by letting you decide whether to identify yourself when you communicate. Tor's security is improved as its user base grows and as more people volunteer to run servers. Please consider installing it and then helping out. Part of the goal of the Tor project is to deploy a public testbed for experimenting with design trade-offs, to teach us how best to provide privacy online. We welcome research into the security of Tor and related anonymity systems, and want to hear about any vulnerabilities you find. Tor is an important piece of building more safety, privacy, and anonymity online, but it is not a complete solution. And remember that this is development code—it's not a good idea to rely on the current Tor network if you really need strong anonymity. Quote Link to comment Share on other sites More sharing options...
Harvey Wallbanger Posted August 19, 2005 Share Posted August 19, 2005 Cheers Casek, great thread. Do you know about Macs as well as PCs? Im looking to buy a powerbook in the next couple of weeks, and I'm wondering what exactly I should be looking for to suit my needs. Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 19, 2005 Share Posted August 19, 2005 thanks. not as up on macs as pc's. there are tons of mac heads around here that can more easily make recommendations. sorry about that. i'd say anything that is fast enough for you... oh, here ya go http://www.macreviewzone.com/html/reviews/.../powerbooks.php http://reviews.zdnet.co.uk/hardware/notebo...10001694,00.htm Quote Link to comment Share on other sites More sharing options...
Pfffffffffft Posted August 19, 2005 Share Posted August 19, 2005 casek.. i just figured out i have a "worm" my avast anti virus picked it up but unable to remove because it is password protected.. its called win32:trojano ive tried tune up utlities and registry fix... what should i do next? Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 19, 2005 Share Posted August 19, 2005 have you tried hijackthis? http://www.snapfiles.com/get/hijackthis.html http://www.pcguide.com/vb/showthread.php?p=242417#post242417 good thread to read on subject Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted August 19, 2005 Share Posted August 19, 2005 run the anti virus program in safe mode Quote Link to comment Share on other sites More sharing options...
Harvey Wallbanger Posted August 19, 2005 Share Posted August 19, 2005 Thanks, Casek, that article was very helpful. Remind me to have my girl bake you some cupcakes. Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 19, 2005 Share Posted August 19, 2005 oh damn! cupcakes? word. Quote Link to comment Share on other sites More sharing options...
courtorder Posted August 19, 2005 Share Posted August 19, 2005 Casek: Do you routinely run Tor? I was reading their FAQ and it seems like somewhat of a shady program..Is it, in a nutshell, a downloadable proxy? Quote Link to comment Share on other sites More sharing options...
Vanity Posted August 20, 2005 Share Posted August 20, 2005 arcel... best bet is to completely reinstall.. drivers and all. might even have to delete some other .dlls as well. w/ my old cam, if the comp crashed while i had the image download/manipulation progam running (which was often since it was crap.. also, no twain support), i had to reinstall all drivers and software... wack. ok, new prob w/ css for me.. made quite a considerable turnaround, but im now having 1 issue: #logo { position:absolute; right:2px; top:0px; z-index:3; white-space : nowrap; } #back { position:absolute; center:0px; top:0px; z-index:0; white-space : nowrap; } #image1 { position:absolute; left:0px; top:0px; z-index:2; white-space : nowrap; } #menu ul{ padding:2px; margin:0; top:50px; left:50px; white-space : nowrap; background-color:#000000; color:#ffffff; float:left; width:70%; z-index:2; white-space : nowrap; } #menu ul li{ display:inline; } #menu ul li a{ color:#ffffff; font-weight:bold; text-decoration:none; padding-left:2em; padding-right:2em; float:left; border-top-color:#a6641; z-index:2; } #menu ul li a:hover{ color:#a52661; z-index:2; } #menu ul li a:active{ color:#c0c0c0; z-index:2; the z-index and positioning attribute don't seem to effect the menu list, it always ends up in back of the back image or image1 and on the top of the page. anyone know how to remedy this? Quote Link to comment Share on other sites More sharing options...
Dick Quickwood Posted August 20, 2005 Share Posted August 20, 2005 i changed a setting on my camera and got the drive letter, got the pictures but they're only 20 percent complete, the rest is gray. first time my camera has done that. Quote Link to comment Share on other sites More sharing options...
Vanity Posted August 20, 2005 Share Posted August 20, 2005 hmmm.. def. try reformatting your memory card.. sounds like the images are a lost cause Quote Link to comment Share on other sites More sharing options...
casekonly Posted August 20, 2005 Share Posted August 20, 2005 Originally posted by courtorder@Aug 19 2005, 06:42 PM Casek: Do you routinely run Tor? I was reading their FAQ and it seems like somewhat of a shady program..Is it, in a nutshell, a downloadable proxy? Quoted post yeah, i use tor. it's safe. sort of a proxy. more like an onion...which enables you to be more private. i ran some test with it and without it, seems my computer is pretty much in stealth mode at all times anyhow. there are some personal reasons why i had to take extra steps, though. here's a camera hack for that damned cvs video camera... now you can save the shit. http://www.i-hacked.com/content/view/182/94/ Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.