Computing desk | ||
---|---|---|
< October 30 | << Sep | October | Nov >> | November 1 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
I'm trying to test out a page in IE6 and Firefox, both running on a Windows XP virtual machine running on Parallels Desktop in Mac OS X (whew!). Firefox has no trouble accessing the internet in this setup; Internet Explorer however gives me a "403 Forbidden" error:
I included the message to show that it gives the same error no matter what crazy, non-existant site you put in (including, of course, realistic ones). It thinks everything is an Apache server and every Apache server rejects it. So, uh, what's up? Again, Firefox connects fine (yay), so it isn't the connection. Note that "just use Firefox" is not a useful answer; I don't normally use IE but I need to test out to make sure a page I am working on renders reasonably correctly in it, since it has, you know, +90% of the marketshare. Note that I'd rather use IE6 here (not IE7) for the purposes of testing the page. -- 24.147.86.187 00:06, 31 October 2007 (UTC)
I'm having a bit of a problem booting Windows. About a week ago, my computer was really having trouble getting going - it said "keyboard error" for some reason, but it was just Windows not wanting to load. After restarting it a couple times, I finally got it to load, with the intent of buying an external hardrive, moving all my files there, and then re-installing Windows. Well, the computer got turned off by accident, and I can't for the life of me get the stupid thing to start again. All the files are still there - I can see them via an Ubuntu live disk, although I do not have the privileges to access them - and the hard drive itself is fine. It just won't boot. Every time I start the computer, it says that there are no active partitions. I've looked them over through Ubuntu, but I can't manually activate my main NTFS thingie.
Any idea of what to do? I've gone through the whole "setup" thing with Dell, but it hasn't done any good. Am I supposed to be booting directly from the NTFS section, or is there something I'm missing? Can I fix this on my own? (I really don't want to pay Computer Geex twenty bucks to fix it...)
Any help would be greatly appreciated. -- 69.144.233.96 03:11, 31 October 2007 (UTC)
If I remember correctly I think a knoppix live disk will let you access your files. So I'd try that before you make any attempt to fix windows. Theresa Knott | The otter sank 10:00, 31 October 2007 (UTC)
When I had trouble getting my computer to boot because of a flawed windows program, I simple slaved the not working hard drive to another working hard drive that had a good copy of windows on it, moved everything I wanted to keep to the working hard drive, reformated the flawed disk and reinstalled windows. Or you could simply wipe windows off the flawed disk and keep it working as a slave with all your files still on it. These things worked for me, don't know if they would be much help to you but good luck. -- NannySamdi 20:07, 31 October 2007 (UTC)
Is there any way to alter the traffic shaping of pfSense so that my ping on TF2 doesn't go to 500+ instead of the ~100 range when there's other traffic on there? I've gone through the wizards and put all steam ports into priority 6 queues, and the traffic are showing up there while the other traffic is in a priority 1 queue. However my ping still goes to an unacceptable level. Is there any way I can improve this? -- antilived T | C | G 07:45, 31 October 2007 (UTC)
I have a old 66mhz 486DX that's been sitting around for a very long time (obviously!). Turbo button, 5 1/2 floppy drive, the works. I used it when I was a kid then deserted it for a brand new 800mhz Pentium III (oh my god!) quite a few years later. Does anyone have any suggestions for creative uses of such old hardware? I can't turn it into a file server or anything for obvious reasons. Also, the ubiquitous question: can it run Linux? I've got Win 3.1 on there now, not sure if such an old machine can keep up no matter what distro I use. Is there one suited to really, really old computers? Or does the refdesk in its infinite wisdom have some other ideas? - Woo ty Woot? [Spam! Spam! Wonderful spam! 10:25, 31 October 2007 (UTC)
I think the first thing you should think of is how you want to use your computer. Does anyone have some ideas on how and where this computer can be used? -- Kushal t 05:46, 1 November 2007 (UTC)
I have a website which i wish to register a domain name for. The particular domain name in question is already registered, but is not being actually used, ie "parked". (???) I tried to contact the owners of the domain by the email provided (it does say its for sale) and ive gotten no response... this was probably a year ago.
Is there any way that the domain can be opened up on the basis that the owner seems to have no intent to actually put the domain to use? I want to be clear and say that i dont own any sort of trademark that is being violated, but it makes sense to me that if a domain is registered it should be put in use if there is any demand by others to have the name... Ive looked around at ICANN for a few mins but havent found anything yet.
Can anyone help? :)
137.81.112.140 13:59, 31 October 2007 (UTC)
"Expires on: 26-Jan-08"
however, of course, this doesnt mean that the contract will end then, its only the end of the term. Ive watched it expire last februrary and they obviously renewed. 137.81.112.140 15:09, 31 October 2007 (UTC)
I realize that i can register another.... possibly similar TLD... thing is the one thats taken is the actual name of the organization i lead, so it would be nice to have the same name. Elsewise i would have to add something to the name that makes it different, but not harder to remember. :o hum......
137.81.112.140 21:13, 31 October 2007 (UTC)
It takes 1 minute to download a 7.5 MB data file. At what bit rate (to 2 significant figures) is the data being transferred? Weare2good 14:56, 31 October 2007 (UTC)
Can anyone help me with teh following. I am the editor of a charitable magazine and we wish to set up an texting service whereby people can send short messages to be printed. At the moment it's simply a mobile phone with no credit, it picks everything up OK but that's about it.
What sort of software / hardware would be needed to send an automated text back saying something like 'thank you for submitting your text, your message will be printed in next month's issue'.
I have a feeling this is one of those simple ideas that is going to be way outside our non existent budget! I've seen lots of free texting websites and wonder if there is anything free or for a small subscription that may be useful to us. Thanks —Preceding unsigned comment added by 88.144.30.22 ( talk • contribs) 11:30, 31 October 2007
Art gallery problem says that there exist simple polyhedra with interior points to which every line from a vertex crosses a facet. Anyone have an example of this (to add to the article)? I have thoughts about a "room" with trapezoidal side walls that manage to obscure the corners of the ceiling and floor and yet have their own corners concealed by the ceiling and floor, but I can't seem to make it work out. -- Tardis 17:48, 31 October 2007 (UTC)
Actually, I think I can see how to construct such a polyhedron. It will be rather ugly, but I see no reason why it wouldn't be possible. The construction I have in mind relies on two facts:
So, start with a fairly round convex polyhedron — a dodecahedron or an icosahedron should do — and cut off all the corners. You now have a polyhedron with small holes, surrounded by a few closely spaced vertices, where each original vertex used to be. Now plug the holes by gluing truncated pyramids, as described above, to the holes; if you do this right, this step will not increase the number of visible vertices. You now have a polyhedron with "bags" attached to each corner. (The bags don't have to be pyramidal, you just have to shape them so that no internal vertex is visible through the hole connecting them to the main polyhedron.)
Finally, add some long, thin prisms, each with one end hidden inside one "bag" and the other in a different one, arranged such that they hide all the vertices around the bag mouths from view when seen from the center of the main polyhedron. Note that you don't have to worry about the prisms intersecting: where that would otherwise happen, you can always add a slight bend to one prism in such a way that it's hidden behind the other. Since the ends of the prisms are hidden from view inside the bags, you're also free to arrange for them to be connected to the surface of the polyhedron any way you like.
Actually, while writing this description I managed to come up with a prettier and more elegant construction based on slightly tweaking the the edges and vertices of a tetrahedron (or any polyhedron, really), but I haven't come up with a clear way to describe that yet... — Ilmari Karonen ( talk) 22:55, 31 October 2007 (UTC)
Okay, I finally got around to modeling and rendering a simple polyhedron satisfying the requirements, shown on the right. POV-Ray source code is available on the image description page. Feel free to use it in the article if you like. — Ilmari Karonen ( talk) 04:18, 6 November 2007 (UTC)
How would one go about making a program which is run directly on the processor, instead of in an operating system? And as an aside, what operating system did Linus Torvalds use to write his first experimentary kernel? JIP | Talk 17:54, 31 October 2007 (UTC)
#include <linux/init.h> #include <linux/module.h> #include <linux/kernel.h> static int take_over(void) { cli(); // turn off interrupts // at this point, you can do whatever you want with the system, // such as ... warm up the room! for (;;) ; return 0; } module_init(take_over); // arrange to call take_over() on insmod
Hi all,
I'm looking for a good piece of software that will display my photos in a timeline (using the photo's own metadata). My dream software would feel something like the roll-over effect on the Mac Dock -- the photos would be small and get larger as you mouse-over them. Does anything like this exist? Thanks! — Sam 18:40, 31 October 2007 (UTC)
Doesn't Google's Picassa do this? —Preceding unsigned comment added by 88.144.30.22 ( talk) 18:48, 31 October 2007 (UTC)
Is there any practical difference between the "To:" field and the "CC:" field? If I put your email address into either field, and send a message:
- you will receive a copy of the message
- you will receive a reply from anyone else who chooses "Reply to All"
- you will not receive a reply from anyone else who chooses "Reply"
- your email address will be visible to all recipients (unlike BCC)
Is the only difference, then, a social rather than technical one: to distinguish who the letter is really written "to"?
jeffjon
19:54, 31 October 2007 (UTC)
Hello everyone, I just read recently the article Transport Layer Security, HTTPS and AES
I wondered what would happen if you happen to know part of the message if not the message itself that is being transmitted and you got the capability to be a man in the middle. And how this protocole defend against that.
Here is an example :
Bob the hacker connect to the mybank website where he got an account, and connect to his own account. That way he knows how much https request he must send before coming on the screen where the vital information permiting him to transfer monney reside, and his html code.
Now Bob go to the isp of Alice Themilionaire, shoot the technical administrator with a shotgun and place a tap on the line of Alice. Go home and light up his computer.
Alice connect to the mybank website, get on the log in screen, type her password, and get on that vital screen.
Can bob when he intercept the reply packet from the server which contain the reply from the server containing "the golden web page" try randomly to XOR part of the packet with the data :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
Until he find that the xor output will be not a random output but a cyclic 256 bit number (the doctype is bigger than 256bit especially if the webpage is encoded in UTF-8) which happen to be the key that repeat itself, permiting him toi crack the rest of the packet and find his golden information.
Is it "possible" to do that way ? I got inspired by the way you can "crack" the Vigenère cipher if you happen to know part of the document, then do a guesswork on the rest with the information you have discovered on a long message. — Esurnir 20:17, 31 October 2007 (UTC)
I am trying to install some Mac programs, for use in my school (e.g.openoffice) on my flash drive, but since I'm a PC user at home, I cant open the .dmg files. The Macs at school will not open dmg files due to admin blocking. How can I install these programs? -- Omnipotence407 22:01, 31 October 2007 (UTC)
I am not trying to install them to the computers, I want to install them to my flash drive. I want to do this in order to show my Impress Presentations w/o having to convert them to Powerpoint. -- Omnipotence407 22:37, 31 October 2007 (UTC)
What is the best way to use Audacity as a dB meter? Basically, I am looking for a way to measure the maximum dB level. Thanks -- Omnipotence407 22:23, 31 October 2007 (UTC)
Computing desk | ||
---|---|---|
< October 30 | << Sep | October | Nov >> | November 1 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
I'm trying to test out a page in IE6 and Firefox, both running on a Windows XP virtual machine running on Parallels Desktop in Mac OS X (whew!). Firefox has no trouble accessing the internet in this setup; Internet Explorer however gives me a "403 Forbidden" error:
I included the message to show that it gives the same error no matter what crazy, non-existant site you put in (including, of course, realistic ones). It thinks everything is an Apache server and every Apache server rejects it. So, uh, what's up? Again, Firefox connects fine (yay), so it isn't the connection. Note that "just use Firefox" is not a useful answer; I don't normally use IE but I need to test out to make sure a page I am working on renders reasonably correctly in it, since it has, you know, +90% of the marketshare. Note that I'd rather use IE6 here (not IE7) for the purposes of testing the page. -- 24.147.86.187 00:06, 31 October 2007 (UTC)
I'm having a bit of a problem booting Windows. About a week ago, my computer was really having trouble getting going - it said "keyboard error" for some reason, but it was just Windows not wanting to load. After restarting it a couple times, I finally got it to load, with the intent of buying an external hardrive, moving all my files there, and then re-installing Windows. Well, the computer got turned off by accident, and I can't for the life of me get the stupid thing to start again. All the files are still there - I can see them via an Ubuntu live disk, although I do not have the privileges to access them - and the hard drive itself is fine. It just won't boot. Every time I start the computer, it says that there are no active partitions. I've looked them over through Ubuntu, but I can't manually activate my main NTFS thingie.
Any idea of what to do? I've gone through the whole "setup" thing with Dell, but it hasn't done any good. Am I supposed to be booting directly from the NTFS section, or is there something I'm missing? Can I fix this on my own? (I really don't want to pay Computer Geex twenty bucks to fix it...)
Any help would be greatly appreciated. -- 69.144.233.96 03:11, 31 October 2007 (UTC)
If I remember correctly I think a knoppix live disk will let you access your files. So I'd try that before you make any attempt to fix windows. Theresa Knott | The otter sank 10:00, 31 October 2007 (UTC)
When I had trouble getting my computer to boot because of a flawed windows program, I simple slaved the not working hard drive to another working hard drive that had a good copy of windows on it, moved everything I wanted to keep to the working hard drive, reformated the flawed disk and reinstalled windows. Or you could simply wipe windows off the flawed disk and keep it working as a slave with all your files still on it. These things worked for me, don't know if they would be much help to you but good luck. -- NannySamdi 20:07, 31 October 2007 (UTC)
Is there any way to alter the traffic shaping of pfSense so that my ping on TF2 doesn't go to 500+ instead of the ~100 range when there's other traffic on there? I've gone through the wizards and put all steam ports into priority 6 queues, and the traffic are showing up there while the other traffic is in a priority 1 queue. However my ping still goes to an unacceptable level. Is there any way I can improve this? -- antilived T | C | G 07:45, 31 October 2007 (UTC)
I have a old 66mhz 486DX that's been sitting around for a very long time (obviously!). Turbo button, 5 1/2 floppy drive, the works. I used it when I was a kid then deserted it for a brand new 800mhz Pentium III (oh my god!) quite a few years later. Does anyone have any suggestions for creative uses of such old hardware? I can't turn it into a file server or anything for obvious reasons. Also, the ubiquitous question: can it run Linux? I've got Win 3.1 on there now, not sure if such an old machine can keep up no matter what distro I use. Is there one suited to really, really old computers? Or does the refdesk in its infinite wisdom have some other ideas? - Woo ty Woot? [Spam! Spam! Wonderful spam! 10:25, 31 October 2007 (UTC)
I think the first thing you should think of is how you want to use your computer. Does anyone have some ideas on how and where this computer can be used? -- Kushal t 05:46, 1 November 2007 (UTC)
I have a website which i wish to register a domain name for. The particular domain name in question is already registered, but is not being actually used, ie "parked". (???) I tried to contact the owners of the domain by the email provided (it does say its for sale) and ive gotten no response... this was probably a year ago.
Is there any way that the domain can be opened up on the basis that the owner seems to have no intent to actually put the domain to use? I want to be clear and say that i dont own any sort of trademark that is being violated, but it makes sense to me that if a domain is registered it should be put in use if there is any demand by others to have the name... Ive looked around at ICANN for a few mins but havent found anything yet.
Can anyone help? :)
137.81.112.140 13:59, 31 October 2007 (UTC)
"Expires on: 26-Jan-08"
however, of course, this doesnt mean that the contract will end then, its only the end of the term. Ive watched it expire last februrary and they obviously renewed. 137.81.112.140 15:09, 31 October 2007 (UTC)
I realize that i can register another.... possibly similar TLD... thing is the one thats taken is the actual name of the organization i lead, so it would be nice to have the same name. Elsewise i would have to add something to the name that makes it different, but not harder to remember. :o hum......
137.81.112.140 21:13, 31 October 2007 (UTC)
It takes 1 minute to download a 7.5 MB data file. At what bit rate (to 2 significant figures) is the data being transferred? Weare2good 14:56, 31 October 2007 (UTC)
Can anyone help me with teh following. I am the editor of a charitable magazine and we wish to set up an texting service whereby people can send short messages to be printed. At the moment it's simply a mobile phone with no credit, it picks everything up OK but that's about it.
What sort of software / hardware would be needed to send an automated text back saying something like 'thank you for submitting your text, your message will be printed in next month's issue'.
I have a feeling this is one of those simple ideas that is going to be way outside our non existent budget! I've seen lots of free texting websites and wonder if there is anything free or for a small subscription that may be useful to us. Thanks —Preceding unsigned comment added by 88.144.30.22 ( talk • contribs) 11:30, 31 October 2007
Art gallery problem says that there exist simple polyhedra with interior points to which every line from a vertex crosses a facet. Anyone have an example of this (to add to the article)? I have thoughts about a "room" with trapezoidal side walls that manage to obscure the corners of the ceiling and floor and yet have their own corners concealed by the ceiling and floor, but I can't seem to make it work out. -- Tardis 17:48, 31 October 2007 (UTC)
Actually, I think I can see how to construct such a polyhedron. It will be rather ugly, but I see no reason why it wouldn't be possible. The construction I have in mind relies on two facts:
So, start with a fairly round convex polyhedron — a dodecahedron or an icosahedron should do — and cut off all the corners. You now have a polyhedron with small holes, surrounded by a few closely spaced vertices, where each original vertex used to be. Now plug the holes by gluing truncated pyramids, as described above, to the holes; if you do this right, this step will not increase the number of visible vertices. You now have a polyhedron with "bags" attached to each corner. (The bags don't have to be pyramidal, you just have to shape them so that no internal vertex is visible through the hole connecting them to the main polyhedron.)
Finally, add some long, thin prisms, each with one end hidden inside one "bag" and the other in a different one, arranged such that they hide all the vertices around the bag mouths from view when seen from the center of the main polyhedron. Note that you don't have to worry about the prisms intersecting: where that would otherwise happen, you can always add a slight bend to one prism in such a way that it's hidden behind the other. Since the ends of the prisms are hidden from view inside the bags, you're also free to arrange for them to be connected to the surface of the polyhedron any way you like.
Actually, while writing this description I managed to come up with a prettier and more elegant construction based on slightly tweaking the the edges and vertices of a tetrahedron (or any polyhedron, really), but I haven't come up with a clear way to describe that yet... — Ilmari Karonen ( talk) 22:55, 31 October 2007 (UTC)
Okay, I finally got around to modeling and rendering a simple polyhedron satisfying the requirements, shown on the right. POV-Ray source code is available on the image description page. Feel free to use it in the article if you like. — Ilmari Karonen ( talk) 04:18, 6 November 2007 (UTC)
How would one go about making a program which is run directly on the processor, instead of in an operating system? And as an aside, what operating system did Linus Torvalds use to write his first experimentary kernel? JIP | Talk 17:54, 31 October 2007 (UTC)
#include <linux/init.h> #include <linux/module.h> #include <linux/kernel.h> static int take_over(void) { cli(); // turn off interrupts // at this point, you can do whatever you want with the system, // such as ... warm up the room! for (;;) ; return 0; } module_init(take_over); // arrange to call take_over() on insmod
Hi all,
I'm looking for a good piece of software that will display my photos in a timeline (using the photo's own metadata). My dream software would feel something like the roll-over effect on the Mac Dock -- the photos would be small and get larger as you mouse-over them. Does anything like this exist? Thanks! — Sam 18:40, 31 October 2007 (UTC)
Doesn't Google's Picassa do this? —Preceding unsigned comment added by 88.144.30.22 ( talk) 18:48, 31 October 2007 (UTC)
Is there any practical difference between the "To:" field and the "CC:" field? If I put your email address into either field, and send a message:
- you will receive a copy of the message
- you will receive a reply from anyone else who chooses "Reply to All"
- you will not receive a reply from anyone else who chooses "Reply"
- your email address will be visible to all recipients (unlike BCC)
Is the only difference, then, a social rather than technical one: to distinguish who the letter is really written "to"?
jeffjon
19:54, 31 October 2007 (UTC)
Hello everyone, I just read recently the article Transport Layer Security, HTTPS and AES
I wondered what would happen if you happen to know part of the message if not the message itself that is being transmitted and you got the capability to be a man in the middle. And how this protocole defend against that.
Here is an example :
Bob the hacker connect to the mybank website where he got an account, and connect to his own account. That way he knows how much https request he must send before coming on the screen where the vital information permiting him to transfer monney reside, and his html code.
Now Bob go to the isp of Alice Themilionaire, shoot the technical administrator with a shotgun and place a tap on the line of Alice. Go home and light up his computer.
Alice connect to the mybank website, get on the log in screen, type her password, and get on that vital screen.
Can bob when he intercept the reply packet from the server which contain the reply from the server containing "the golden web page" try randomly to XOR part of the packet with the data :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "
http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
Until he find that the xor output will be not a random output but a cyclic 256 bit number (the doctype is bigger than 256bit especially if the webpage is encoded in UTF-8) which happen to be the key that repeat itself, permiting him toi crack the rest of the packet and find his golden information.
Is it "possible" to do that way ? I got inspired by the way you can "crack" the Vigenère cipher if you happen to know part of the document, then do a guesswork on the rest with the information you have discovered on a long message. — Esurnir 20:17, 31 October 2007 (UTC)
I am trying to install some Mac programs, for use in my school (e.g.openoffice) on my flash drive, but since I'm a PC user at home, I cant open the .dmg files. The Macs at school will not open dmg files due to admin blocking. How can I install these programs? -- Omnipotence407 22:01, 31 October 2007 (UTC)
I am not trying to install them to the computers, I want to install them to my flash drive. I want to do this in order to show my Impress Presentations w/o having to convert them to Powerpoint. -- Omnipotence407 22:37, 31 October 2007 (UTC)
What is the best way to use Audacity as a dB meter? Basically, I am looking for a way to measure the maximum dB level. Thanks -- Omnipotence407 22:23, 31 October 2007 (UTC)