Jump to content

<<< 12Oz Computer Tech Support SuperThread >>>


Mainter

Recommended Posts

Re: «<< 12Oz Computer Tech Support >>>

 

PC Support

Get all your Windows, Hardware, Networking, and software support questions answered here

 

PC Tips and Tricks, Modding

 

Linux/Unix Support

Get all your Linux/Unix questions answered here

 

Linux/Unix Tips and Tricks

 

Mac Support

Get all your mac questions answered here

 

Mac Tips and Tricks

 

Electronics

Get all your questions on MP3 players, Digital Cameras, Digital Video Cameras, TV's, etc. answered here

 

hey for the viewers what the hell do you want to see posted here add yer comments

 

What Do You Want To See Here

 

Computer Graphics

Computer Hardware

Computer Security

Computers

Cyberculture

Databases

Embedded Systems

Encryption

Firefox

Hacking

IT

Instant Messaging

Internet

Internet Tools

Java

Linux/Unix

MacOS

Mobile Computing

Multimedia

Network Security

Online Games

Open Source

Operating systems

P2P

PHP

Peripheral Devices

Perl

Programming

Shareware

Software

Supercomputing

Video Games

Web Development

Webhosting

Weblogs

Windows

Link to comment
Share on other sites

This forum is supported by the 12ozProphet Shop, so go buy a shirt and help support!
This forum is brought to you by the 12ozProphet Shop.
This forum is brought to you by the 12oz Shop.

Re: «<< 12Oz Computer Tech Support >>>

 

This is really neat actually. I just downloaded it and tested it, and it's great! I don't know how long they will keep this thing free.

 

http://share.skype.com/sites/en/2006...dlines_an.html

 

This only works in the US and Canada.

 

www.skype.com

 

When you first download it, don't click on the green phone at the bottem, it will say you need Skype credit to make a call. But instead, click on the "Dial" tab at the top.

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

Expedite TCP/IP troubleshooting with this handy tool

The Windows XP IP Configuration Tool

Description:

When you're troubleshooting TCP/IP connectivity problems, the Ipconfig command can be a handy tool. But using it on the command line is more work than it should be. Here's a simple interface that makes Ipconfig--and its eight switches--much easier to run.

http://techrepublic.com.com/5138-103...ml?tag=nl.e138

Download WinXP_IpconfigTool.zip (46.8Kb

http://techrepublic.com.com/5139-1035-5236364.html

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

johnny its fine when you installed firefox you just left the quality feedback checkmark on its safe all it does is track when firefox goes down and it reports the error code to the webmasters

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

We all do dumb things now and then, and computer users are no exception. Inadvertently pressing the wrong key combination or innocently clicking OK in the wrong dialog box can change important settings that alter a computer's behavior or even crash the system.

Nervous newbies are often fearful that one wrong move might break the computer forever. Luckily, short of taking a sledge hammer to the box, the consequences aren't usually quite that dire. Even so, users often do create problems for their computers and for your network. Here's a description of common missteps you can share with your users to help them steer clear of preventable problems.

#1: Plug into the wall without surge protection

 

 

Here's one that actually can physically destroy your computer equipment, as well as the data it holds. You may think your systems are in danger only during an electrical storm, but anything that interrupts the electrical circuit and then starts the current back again can fry your components. Something as simple as someone turning on an appliance that's plugged into the same circuit (especially a high voltage one such as a hair dryer, electric heater, or air conditioner) can cause a surge, or a surge may be caused by a tree limb touching a power line. If you have a power outage, you may experience a surge when the electricity comes back on.

You can protect your systems against damage from power surges by always using a surge protector, but it's important to be aware that most cheap surge protectors will survive only a single surge and need to be replaced afterward. An Uninterruptible Power Supply (UPS) is better than a surge protector; it has a battery that keeps power flowing smoothly even when there's an outage, to give you time to gracefully shut down.

#2: Surf the Internet without a firewall

 

 

Many home users plug their computers right into their spiffy new cable or DSL modems and hop onto the Internet without realizing that they're putting themselves at risk from viruses and attackers. Every Internet-connected computer should be protected by a firewall; this can be a firewall built into the broadband modem or router, a separate firewall appliance that sits between the modem/router and the computer, a server at the network's edge running firewall software, or personal firewall software installed on the computer (such as ICF/Windows Firewall built into Windows XP or a third-party firewall program like Kerio or ZoneAlarm).

One advantage of personal firewalls on laptop computers is that they're still with you when you take the computer on the road and plug into a hotel's DSL or cable port or connect to a wireless hotspot. Just having a firewall isn't enough, though. You must also be sure it's turned on and configured properly to protect you.

#3: Neglect to run or update antivirus and anti-spyware programs

 

 

Let's face it: Antivirus programs can be a royal pain. They're always blocking some application you want to use, you often have to disable them to install new software, and they have to be updated on a regular basis to do any good. Seems like the subscription is always expiring and prompting you to renew it--for a fee, in many cases. But in today's environment, you can't afford to go without virus protection. The malicious programs that AV software detects--viruses, Trojans, worms, etc.--can not only wreak havoc on your system but can spread via your computer to the rest of the network. In extreme cases, they can bring down the whole network.

Spyware is another growing threat; these are programs that install themselves on your computer (usually without your knowledge) and collect information from your system that is then sent back to the spyware program's author or vendor. Antivirus programs often don't address spyware so it's important to run a dedicated spyware detection and removal program.

#4: Install and uninstall lots of programs, especially betas

 

 

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you'd never do it, but some users even install pirated software or "warez."

The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.

Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.

You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall.

#5: Keep disks full and fragmented

 

 

One of the results of installing and uninstalling lots of programs (or adding and deleting data of any kind) is that it fragments your disk. Disk fragmentation occurs because of the way information is stored on the disk: On a new, clean disk, when you save a file it's stored in contiguous sections called clusters. If you delete a file that takes up, for example, five clusters, and then save a new file that takes eight clusters, the first five clusters' worth of data will be saved in the empty space left by the deletion and the remaining three will be saved in the next empty spaces. That makes the file fragmented, or divided. To access that file, then, the disk's read heads won't find all the parts of the file together but must go to different locations on the disk to retrieve it all. That makes it slower to access. If the file is part of a program, the program will run more slowly. A badly fragmented disk will slow down to a crawl.

You can use the disk defragmenter built into Windows (Programs | Accessories | System Tools) or a third-party defrag program to rearrange these pieces of files so that they're placed contiguously on the disk.

Another common cause of performance problems and application misbehavior is a disk that's too full. Many programs create temporary files and need extra free space on the disk to operate. You can use Windows XP's Disk Cleanup Tool or a third-party program to find and delete rarely used files, or you can manually delete files to clear space on your disk.

#6: Open all attachments

 

 

Some folks just can't help themselves: Getting an e-mail message with an attachment is like getting an unexpected gift. You just have to peek inside to see what it is. But just as that package left on your doorstep could contain a bomb, that file attached to your mail message could contain code that will delete your documents or system folder or send viruses to everyone in your address book.

The most blatantly dangerous attachments are executable files--those that run code--with extensions like .exe, .cmd, and many others (see http://antivirus.about.com/od/securitytips/a/fileextview.htm for a list of file extensions for different types of executables). Files that aren't themselves executables, such as Word .doc files and Excel .xls files, can contain embedded macros. Scripts (Visual Basic, JavaScript, Flash, etc.) aren't directly executed by the computer but are run by other programs.

It used to be that you could assume plain text (.txt) or graphics (.gif, .jpg, .bmp) files were safe, but not anymore. File extensions can be spoofed; attackers take advantage of the Windows default setting that doesn't display common file extensions to name executables something like greatfile.jpg.exe. With the real extension hidden, it shows up as greatfile.jpg. So the recipient thinks it's a graphic, but it's actually a malicious program.

You should open attachments only when they're from trusted sources and only when you're expecting them. Even if the mail with the attachment appears to come from someone you trust, it's possible that someone spoofed their address or that their computer is infected with a virus that sent the attachment to you without their knowledge.

#7: Click on everything

 

 

Opening attachments isn't the only type of mouse click that can get you in trouble. Clicking on hyperlinks in e-mail messages or on Web pages can take you to Web sites that have embedded ActiveX controls or scripts that can perform all sorts of malicious activities, from wiping your hard disk to installing a backdoor program on your computer that a hacker can use to get in and take control of it.

Clicking the wrong link can also take you to inappropriate Web sites that feature pornography, pirated music or software, or other content that can get you in trouble if you're using a computer on the job or even get you in trouble with the law.

Don't give in to "click mania." Think before you click a link. Links can also be disguised in phishing messages or on Web sites to appear to take you to a different site from the ones they really point to. For example, the link might say http://www.safesite.com, but it actually takes you to http://www.gotcha.com. You can often find out the real URL by hovering over the link without clicking it.

#8: Share and share alike

 

 

Your mother taught you that it's nice to share, but when you're on a network, sharing can expose you to dangers. If you have file and printer sharing enabled, others can remotely connect to your computer and access your data. Even if you haven't created any shared folders, by default Windows systems have hidden "administrative" shares for the root of each drive. A savvy hacker may be able to use these shares to get in. One way to prevent that is to turn off file and printer sharing--if you don't need to make any of the files on your computer accessible across the network. This is especially a good idea if you're connecting your laptop to a public wireless hotspot. You can find instructions on how to do so at http://www.pcmag.com/article2/0,1895,1277222,00.asp.

If you do need to make shared folders accessible, it's important that they be protected by both share-level permissions and file-level (NTFS) permissions. Also ensure that your account and the local administrative account have strong passwords.

#9: Pick the wrong passwords

 

 

That brings us to another common mistake that can expose you to attacks: picking the wrong password. Even if you don't belong to a network where the administrator forces you to select strong passwords and change them regularly, you should do so. Don't pick passwords that are easy to guess, such as your birthdate, loved one's name, social security number, etc. Longer passwords are harder to crack, so make your password at least eight characters long; 14 is even better. Popular password-cracking methods use "dictionary" attacks, so don't use words that are in the dictionary. Passwords should contain a combination of alpha, numeric, and symbol characters for best security.

A long string of nonsense characters may create a password that's tough to crack, but if you can't remember it, you'll defeat the purpose by writing it down (where an intruder may be able to find it). Instead, create a phrase you can remember easily and use the first letters of each word, along with logical numbers and symbols. For example: "My cat ate a mouse on the 5th day of June" becomes "Mc8amot5doJ."

#10: Ignore the need for a backup and recovery plan

 

 

Even if you follow all these suggestions, an attacker may crash your system or your data may be corrupted or get wiped out by a hardware problem. That's why it's essential that you always back up your important information and have a plan for recovering from a system failure.

Most computer users know they should back up, but many never get around to it. Or they make an initial backup but don't update it regularly. Use the built-in Windows backup program (Ntbackup.exe in Windows NT, 2000, and XP) or a third-party backup program and schedule backups to occur automatically. Store backed up data on a network server or removable drive in a location away from the computer itself, in case of a natural disaster like flood, fire, or tornado.

Remember that the data is the most important thing on your computer. The operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. (See "10 ways to protect your data" for additional suggestions.)

Nonetheless, you can save time and frustration by backing up your system information too. You can create mirror images of your disks using popular ghost or clone programs. This will allow you to restore the system quickly instead of going through the tedious installation process.

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

8 Megapixels Image Sensor Debuts

73301_matter.jpg

Micron Technology, one of the leading providers of advanced semiconductor solutions, has developed what is being touted as the world's first 8-megapixels image sensor in the standard 1/2.5-inch optical format for main stream digital cameras, using a tiny 1.75-micron pixel design.

 

The new sensor has lots of features and functions that project Micron-equipped cameras into the next generation of digital cameras that feature high-resolution still images, ultra-fast image capture, and vibrant high-definition video.

 

The company has unveiled a sample of an 8-megapixel image sensor with incredible capture rates at full resolution, and stunning high-definition (HD) video capture. Because of its high resolution, the sensor captures large, crisp pictures that are about 11 x 14 inches in size, or can be used to zoom-in and print just a portion of the image without compromising on the image quality.

 

When used in the continuous-shot mode for digital still cameras, the sensor is capable of bursting more than 10 pictures per second at full 8-megapixesl resolution, and more than 30 pictures per second at 2-megapixel resolution. Also because of the high-speed, the sensor allows cameras to have advanced features like image stabilization for reduced effect of blurred images typically caused by jittery hands and fast auto-focus response that results in sharper images.

 

The sensor also enables a digital camera to capture and playback HD video, which equates to shooting video at 30 frames per second (fps) in 720p (progressive) format. This complements Micron's current 5-megapixels image sensor supporting HD video that is being shipped in volume.

 

Steve Appleton, chairman, chief executive officer, and president, Micron, said, "As the world's leading supplier of image sensor solutions, we continue to expand the envelope, bringing new experiences and advanced functionality to digital photography."

 

In addition, Micron has also announced work on a 1.4-micron pixel design. By shrinking pixel size, Micron will bring more resolution to consumer devices such as digital cameras and mobile phones, maintaining the small form factor required for these applications.

 

Micron's 8-megapixels image sensor could revolutionize the camera phones market, where space is at a premium and image quality is usually neglected. The new 1.75-micron pixel design will continue to enable the industrial design of today's popular thin and slim phones, while increasing the resolution.

 

General customer sampling of the new product is planned for the end of 2006, while mass production is expected in the first half of 2007. Pricing will be determined at the time of general customer sampling.

 

 

damn the sensor is capable of bursting more than 10 pictures per second at full 8-megapixesl resolution thats bad ass

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

"#4: Install and uninstall lots of programs, especially betas

 

 

You like to be on the cutting edge, so you often install and try out new software. Beta programs are usually free and give you a chance to sample neat new features before most people. There are also many freeware and shareware programs made available as Internet downloads by their authors. We know you'd never do it, but some users even install pirated software or "warez."

The more programs you install, the more likely you are to run across ones that either include malicious code or that are poorly written and cause your system to behave improperly or crash. The risk is greater with pirated programs.

Even if you install only licensed, final-release commercial software, too many installations and uninstallations can gunk up the registry. Not all uninstall routines completely remove program remnants and at the least, this practice can cause your system to slow down over time.

You should install only the programs that you really need, stick with legitimate software, and try to minimize the number you install and uninstall."

 

if i was pretty bad with this shit a few years back, is there anything i can do to clean up the reg short of formating?

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

24x7x365 Apple

 

1-2.jpg

So the black facades are finally starting to come off. Steve Jobs obviously has some weird affinity towards cubes because NYC's newest flagship store (one that rivals and possibly surpasses the one in London) is a giant glass cube.

I've never heard of a computer store open 24x7 outside of Asia so this is probably a first for America. Those damn Yorkers are lucky to get something so magnificent. I know that thing would never pass building codes here in earthquake territory but I would be just as happy for a giant brushed steel version, or better yet, a transparent plexiglas one.

This store sits there to reinforce the Apple lifestyle and if it wasn't apparent now, let me make it clear, APPLE IS A LIFESTYLE. Just take a gander at the slow but sure reveal as the cube emerges from its cocoon.

more pictures after the jump

2.jpg

3-1.jpg

4.jpg

5.jpg

6-2.jpg

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

Fujitsu Flexible Design

fujitsuflexiblepc_01.jpg

 

The Japanese are getting tired of an American company (cough - Apple) constantly doing them one over when it comes to industrial design. If you remember, it was barely 10 years ago when almost all Japanese electronics made American electronics look like archaic blocky dinosaurs.

 

Now that the tables have turned, a number of Japanese manufacturers have gotten together to try and reinvent Japanese industrial design. 10 years ago, Japanese electronics looked very distinct, but with the rise of Apple and Korean rivals Samsung and LG and soon the Chinese, what are future incarnations of Japanese-ware to look like?

 

There's currently an exhibition called Japan Design that explores that question. The above image is designed by Fujitsu in its vision of a future computer/home media center; designed by Makoto Sawaguchi and Tomohiro Takizawa.

 

I have to say, its quite slick but the mesh speaker grill screams early 90's to me. Somehow the design feels forced; a struggle to be clean and slick like Apple while retaining the intricacies of iconic Japanese electronic design - very industrial and anime like.

 

fujitsuflexiblepc_02.jpg

fujitsuflexiblepc_03.jpg

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

Microsoft Corp. has launched a Web site outlining the minimum hardware requirements for the next version of the Windows OS, Windows Vista. Apple hasn't announced its intentions for Vista and Boot Camp, but preliminary indications suggest that Intel-based Macs will make the cut.

 

The move comes less than a week before the company will host its Windows Hardware Engineering Conference (WinHEC) in Seattle. At the show, which kicks off Tuesday, Microsoft and hardware manufacturers are expected to show how Vista will run on a variety of machines, as well as showcase add-on technology built to enhance the OS.

 

On the Microsoft “Get Ready” Web site, the company has outlined the requirements for running both low-end versions of Vista or higher-end versions that take advantage of the OS’s new Aero graphical user interface capabilities.

 

The company differentiates between the two by calling the former a “Windows Vista Capable PC” and the latter a “Windows Vista Premium Ready PC.”

 

Hardware requirements for a Vista Capable PC are a modern processor with a speed of at least 800MHz, 512MB of system memory and a graphics processor that is DirectX 9 capable.

 

A Windows Vista Premium Ready PC has a good deal more requirements. It must have at least a 1GHz 32-bit (x86) or 64-bit (x64) processor, 1GB of system memory, 128MB of graphics memory, 40GB of hard drive capacity with 15GB free space, a DVD-ROM drive, audio output capabilities and Internet access capability.

 

It also needs a graphics processor that runs Windows Aero, which Microsoft defines as a DirectX 9 class graphics processor that supports a Windows Display Driver Model Driver, Pixel Shader 2.0 in hardware and 32 bits per pixel.

 

The graphics processor for Aero also must meet the following requirements for graphics memory: 64MB of graphics memory to support a single monitor less than 1,310,720 pixels; 128MB of graphics memory to support a single monitor at resolutions from 1,310,720 to 2,304,000 pixels; or 256MB of graphics memory to support a single monitor at resolutions higher than 2,304,000 pixels.

 

Windows Vista system requirements have become a matter of particular interest to Mac users since Apple released Boot Camp, a beta program that enables Intel-based Macs to run Windows XP. Apple has yet to comment on its future plans for Boot Camp, but it’s widely assumed that the software will be updated to run Vista once Microsoft releases the new operating system — enterprising users have already gotten development versions of Vista working on the Mac.

 

The hardware specifications outlined by Microsoft are consistent with Apple’s Intel-based Macs, however. Both ATI and Intel, who manufacture the graphics systems used in the new Intel-based Macs, indicate that their graphics hardware is Windows Vista-compatible. A Mac with upgraded RAM also falls in line with Microsoft’s specifications for a Windows Vista Premium Ready PC. Visit Macworld’s Windows on the Mac: What you need to know for more details about Boot Camp.

 

Microsoft began working with hardware partners several months ago to prepare customers for Vista’s release. In April, PCs with stickers saying “Windows Vista Capable” became available in stores, letting customers know what hardware can be upgraded to Vista once it is available. Microsoft does not plan to do the same with the Windows Vista Premium Ready designation, recommending customers ask a retailer or manufacturer about PCs that meet those requirements.

 

On the Get Ready Web site, Microsoft stressed that purchasing a Windows Vista Capable PC does not mean customers will get discount vouchers for Windows Vista. They still must purchase an edition of the OS for full price when Vista is available.

 

In March, Microsoft said the consumer release of Vista would be delayed until January 2007, though business customers will have access through Microsoft volume licensing to the OS before the end of the year. Since Microsoft is missing the busy Christmas holiday shopping season with Vista’s general release — which had been an important target for selling the new OS — analysts are predicting that the company may release Vista even later than January.

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

I got into an arguement with my IT guy... on configuring a cpu, I thought getting a 256 graphics card was better than getting a 160 gb hard drive ( I suggested an 80). I know 80s small today, but my long term plan is to get all our data onto the server, and prob get more cpus, so info may get spread around... but he said if I do memory intensive work, I'd rather have alot of free hd space for back-up or something... can you explain this since he didn't?

Link to comment
Share on other sites

Re: «<< 12Oz Computer Tech Support >>>

 

I got into an arguement with my IT guy... on configuring a cpu' date=' I thought getting a 256 graphics card was better than getting a 160 gb hard drive ( I suggested an 80). I know 80s small today, but my long term plan is to get all our data onto the server, and prob get more cpus, so info may get spread around... but he said if I do memory intensive work, I'd rather have alot of free hd space for back-up or something... can you explain this since he didn't?[/quote']

 

 

he is right if you are going to do more memory intensive work you do want more harddrive space (

free harddrive space leaves room for virtual memory (virtual memory is a type of hard drive space that mimics actual memory so if you are running low on real RAM it will take some from the harddrive sense its not using it and in theory will run faster

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...