Jump to content

ROM-DOS

Inactive Moderator
  • Posts

    1,599
  • Joined

  • Last visited

    Never
  • Days Won

    1
  • Speed Test

    My Results

Everything posted by ROM-DOS

  1. Intel faces more chipset shortages HILLSBORO, Ore.
  2. Firefox flaw highlighted The Mozilla Foundation may have just released its latest update to the popular Firefox browser, but some users say their patience with the software's flaws is beginning to wear thin. One issue that has been getting attention since the Wednesday release of Firefox 1.5 is a bug that causes Mac OS X systems to use 100 percent of available processor resources in some cases, such as when scrolling in some Web-based applications (such as Google Maps) and holding down the mouse button. The bug has been known since before the release of Firefox 1.0, but has never been fixed, critics noted. (The Mozilla project has assigned the issue bug no. 141710.) Another specific gripe is the lack of Acid2 compliance. Acid2 is a test from the Web Standards Project (WaSP) designed to test a browser's support for W3C standards such as CSS1, HTML4 and PNG. Most browsers - including IE and Opera - admit they won't pass Acid2 for some time; for example Microsoft has said IE 7 won't pass. Others said Firefox 1.5 introduced new glitches. Issues mentioned by users after their first few hours with Firefox 1.5 included the "reload" button disappearing, a bug with selected text, problems with cookie management, keyboard shortcuts being randomly disabled, and a Mac-specific problem with the URL window. Firefox has had increasingly serious issues with security as its user base has exploded. Among this year's flaws was a highly dangerous one ironically leaving Windows and IE untouched while affecting Firefox and Linux. Another flaw involving IDN parsing required a patch to be rushed out. A report from Symantec revealed that nearly twice as many flaws had been discovered in Firefox as in Explorer over the first six months of this year.
  3. JustinOhioRR ~ you are addicted to the "machine", but your wife doesn't hate 'it'. ~ she just wants equal time on it.
  4. Can we drink in therapy? yes water ~ in group we call that 'sharing'
  5. LOL . . .ouch!! ~ now that almost brought a tear to my eye ~ resopalrabotnick
  6. Aggr3 ~ discrimination by any other name is just a false sense of 'powerlessness' What you will learn in your first 'make up' lesson is "How do I retain my power by not giving it away" My ex-lawyer friend says ~ "not to worry, lawyers only have a licence to pratice something they will never really be." I believe him ~ so lawyers don't scare me. . . .see, that's part of not giving your power away. . . .and congratualations water ~ you took the first step of many to come. . .thank you for sitting down.
  7. Robin Williams Sean Connery Tom Hanks Robert DeNiro Goldie Hawn Gene Hackman Morgan Freeman Al Pacino John Travolta Denzel Washington . . .all for different reasons, but most of all ~ they're convincing ~ they don't look like they're acting.
  8. . . .and now for something completely different Microsoft holds weirdest press conference ever IT'S ST ANDREW'S DAY yesterday so what does Microsoft do? It holds a wake at an Irish bar. Nothing wrong with wakes, but this time Microsoft is celebrating the death of Exchange Server 5.5, an eight year old product which the executives described as a "she". The event, for British journalists, also involved Microsoft doling out arm bands obviously intended to be the sort of armbands that people wear when someone dies. One of the problems is that they weren't plain black armbands but instead were emblazoned with Microsoft Exchange Server in white. People who wore these armbands didn't look like they were at a wake - they looked like they were at some kind of mass rally. You'd think that any self respecting member of Her Majesty's Press would eschew wearing such armbands but we are compelled to report that a large percentage of the hacks that were there were not only wearing these things but toasting the faux death of an old Microsoft product. There wasn't even a coffin or a casket. At 9PM, most of the hacks decamped to a Sony party round the corner. We made our excuses and left, trying to get our head around 21st Century Microsoft. All the Microsoft people and their spinners were very nice, but what was that all about?
  9. Net addicts turn to professionals REDMOND, Wash.--The waiting room for Hilarie Cash's practice has the look and feel of many a therapist's office, with soothing classical music, paintings of gentle swans and colorful flowers, and stacks of brochures on how to get help. But Cash, who runs Internet/Computer Addiction Services here in the city that is home to Microsoft, is a pioneer in a growing niche in mental health care and addiction recovery. Her patients, including Mike, 34, are what Cash and other mental health professionals call onlineaholics. They even have a diagnosis: Internet Addiction Disorder. These specialists estimate that 6 percent to 10 percent of the approximately 189 million Internet users in this country have a dependency that can be as destructive as alcoholism and drug addiction, and they are rushing to treat it. Yet some in the field remain skeptical that heavy use of the Internet qualifies as a legitimate addiction, and one academic expert called it a fad illness. And others have a broader dependency and spend hours online each day, surfing the Web, trading stocks, instant messaging or blogging. A fast-rising number are becoming addicted to Internet video games as well. Cash and other professionals say that people who abuse the Internet are typically struggling with other problems, like depression and anxiety. But, they say, the Internet's affordability, accessibility, anonymity and omnipresent escape from reality can also lure otherwise healthy people into an addiction. . . .I'll be starting a new many-step program for those who think they may have a problem ~ free of charge.
  10. Intel to drop the Pentium brand? First Netburst goes out the window, and now it may be that the venerable "Pentium" name is headed for retirement, as well. The Inquirer is reporting on a Japanese PC Watch article which claims that the Pentium brand name will not be used for Merom and Conroe when they launch. Instead, Intel will apply the term "Intel Core" to the new architecture, much like Netburst was the name of the Pentium 4 architecture. The "Intel Core" name isn't likely to be the one that consumers will be most familiar with, however, since platform-centric brands like Centrino will be more heavily emphasized. I can't confirm the PC Watch report, but I will say that I find it highly convincing. If this isn't what Intel is doing, then it's what they should be doing. There's no point to a "processor" brand like Pentium, now that you have to specify if you mean a single-core or multi-core "processor," with hyperthreading or without, 64-bit or not, and so on. You can brand the architecture, you can brand different products based on that architecture (e.g. the rumored "Solo" brand for single-core and "Duo" brand for dual-core), and you can brand platforms like Centrino or Viiv. But the currently confusing Intel Pentium branding situation, where the "Pentium" name is followed by half a dozen options (Extreme Edition Dual-Core Low Power Hyperthreaded EM64T...), will be greatly simplified by just getting rid of the now vestigial Pentium brand altogether and branding the products based on chip- and platform-specific feature sets. http://www.channelregister.co.uk/2005/11/30/intel_to_drop_pentium_name/
  11. Microsoft OneCares about you In a bold attempt to rid itself of the impaired security image that a string of Internet Explorer problems have caused, Microsoft has released a beta of its upcoming personal security system into the wild. Microsoft OneCare Live is freely available to anyone for a 30-day trial period, and even though the application sports a large "Purchase now" button, there is no way to actually buy a license yet. Pricing will be forthcoming, but I'd be surprised if it turns out to be expensive. The app is clearly targeted at Joe Sixpack, who knows he should protect his computer but doesn't quite know how. The Live name may sound like a web service along the lines of Trend Micro House Call, and there is a matching Microsoft Live Safety Center web site that reinforces that idea. However, for the actual work of cleaning and protecting your computer, that site calls upon a rather large OneCare application that you must first install on your system. The installation will only work through IE because of a reliance on ActiveX, and of course there is a reboot involved. It just wouldn't be cricket otherwise. So what does OneCare do for the intrepid beta user? First of all, it more or less forces you to enable Automatic Updates, as OneCare will show a scary red status light in the system tray if this is not on. Various other system deficiencies will set off alarms as well, but that was the only warning for me. There is also a built-in firewall, different from the good old Windows firewall that SP2 brought in. You also get a console from which you can launch various services and bask in the warm, green glow of your system status indicator. The main application window lets you start a full tune-up or perform various individual maintenance tasks on their own. While providing easy access to backup and restore functions is commendable, the only function most users will ever use is the System Tune-up. With one click, you set off a hard drive cleanup and defrag, full virus scan, a backup check and a system update, with no messy configuration, detailed progress reports, or bothersome user input to deal with. Just one click, and you can go put on a pot of coffee while your computer is working
  12. Maybe, but Microsoft ~ with all their. . .resources ~ have known of this since MAY . . .and they still haven't been able to patch it, yet!! Must be one heck of a super security bug!!
  13. Connection Problems Sorry, SMF was unable to connect to the database. This may be caused by the server being busy. Please try again later. . . .why? Pentagon Expanding Its Domestic Surveillance Activity . . .is it me they're looking for?
  14. . . .water ~ maybe there are just some things women will never understand about the male mentality ~ and visa-versa, I'm sure. ~ lol ~ ~ but it's cool your here ~ just don't testiculate too much.
  15. Trojan horse rides on unpatched IE flaw Attackers are taking advantage of an unpatched vulnerability in Internet Explorer to target users of the ubiquitous Web browser, Microsoft warned late Tuesday. Malicious software that exploits the security flaw to download a Trojan horse to vulnerable computers has been found on the Internet, according to Microsoft. Detection and removal capabilities for the "TrojanDownloader:Win32/Delf.DH" have been added to Microsoft's recently launched online security-scanning tool. "Customers can visit Windows Live Safety Center and are encouraged to use the Complete Scan option to check for and remove this malicious software and future variants," Microsoft said in its updated security advisory on the issue. http://safety.live.com/Template/home.aspx?NRMODE=Published&NRORIGINALURL=%2fsite%2fen-US%2fdefault.htm&NRNODEGUID=%7bC0902729-5DC9-4154-8C03-ABA23DD4421E%7d&NRCACHEHINT=Guest&jgmsuid=true&newguid=69d7f58eab784cd581a728a722634d05 The security bug, exploited by the Trojan downloader, was originally reported in May. The bug was thought to only allow for a denial-of-service attack, which would cause IE to close. However, experts last week raised an alarm on the issue because it was discovered that it could be used to remotely run code on a vulnerable computer. Microsoft has yet to provide a fix for the vulnerability, but is working on a patch, according to the security advisory. Security-monitoring company Secunia deems the problem "extremely critical," its rarely given highest rating. The vulnerability puts computers running Windows 98, Windows Millennium Edition, Windows 2000 and Windows XP at risk. An attacker could gain complete control of vulnerable systems by hosting malicious code on a Web site. Once an IE user visits the site, the malicious program would run without any user interaction. Microsoft offers several workarounds to deflect attacks. These include changing IE settings to disable active scripting or prompt the user before running such scripts. [edit] I made this a sticky because this looks like a serious exploit (extremely critical). Three critical flaws found in Java 29 November 2005 Sun's Java Runtime Environment (JRE) contains serious security flaws that could allow remote attackers to execute applications on a system, the company has warned. The bugs, patched in a new release yesterday, affect Windows, Unix and Linux platforms. The Java Software Development Kit (SDK) is also affected. Sun outlined three separate vulnerabilities, each of which could independently allow a specially crafted Java applet, for example embedded in a Web page, to escalate its privileges. That could allow the applet to read and write local files and execute applications accessible to the user running the applet, with the user's privileges. Ordinarily, Java applets are restricted from reading and writing files and executing applications by the Java "sandbox". The JRE is the code used to execute Java applets on a local system, and is one of the most widely distributed client-side software products. Versions of the JRE are also found in unconventional systems such as mobile phones. Secunia and FrSIRT, which maintain vulnerabilities databases, gave the vulnerabilities serious ratings - "highly critical" and "critical" respectively. Sun(sm) Alert Notification http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1
  16. Indestructable ~ right click My Computer > Properties > under Hardware Tab open Device Manager > click on View and Resourses by type click on Interrupt request (IRQ) I have 22 IRQ's. In [HKEY_LOCAL_MACHINE System CurrentControlSet Control PriorityControl] the only Priority (1) setting I have is set to IRQ17Priority IRQ 17 is my Modem. Also Win32PrioritySeperation is set to 26 (hexadecimal), there. I feel comfortable with this. As Ars Technica says, "You can give several IRQs priority, but I am not entirely certain how the system interacts when several IRQs are given priority
  17. This topic has been moved to Off Topic Discussion. [iurl]http://www.testmy.net/forum/index.php?topic=9989.0[/iurl]
  18. . . .OH NO!! . . .not again!! Connection Problems Sorry, SMF was unable to connect to the database. This may be caused by the server being busy. Please try again later. [move]Somebody call the CA3LE Guy!!![/move]
  19. tonyswhirl ~ are you implying I'm the man in the Window? biker9075 ~ let us know what you think of the new version. [i've got three browsers already (well four, but I don't use that one), but when I'm sure all the bugs are out of Firefox ~ I just might give it a shot, too.]
  20. The making and remaking of a worm For those of you with some memory of high school biology, the Planaria should be familiar. It's a flat worm with a couple of eyespots; an unremarkable creature in most ways. Until you try to kill it, that is. Cut off a part, and it grows back. Slice it in half, and you eventually get two complete Planaria. Slice it most of the way down its main axis and you get the two headed beastlet.
  21. What are you still waiting for? . . .be gone with your bad self. . .run!! The much-anticipated release of Firefox 1.5 has finally been posted on Mozilla's FTP site.
  22. . . .I just keep wondering why this guy (Jon Jacobs) makes me feel stupider and stupider? Has anyone here played Project Entropia?
  23. The Chinese are mad as hell and they aren't going to take it any more. What aren't they going to take? Why, DVD licensing fees, of course. Xinhua, the country's official news source, describes the problem this way: "China produced about 70 percent to 80 percent of the world's DVD players. However, Chinese manufacturers need to pay licensing fee[sic] to overseas patent holders in the DVD industry." To keep the People's yuan from flowing into the pockets of Western capitalists, the government of the Middle Kingdom has launched their own salvo into the next-gen DVD format wars. The People's One True Format (not its real name) will allegedly feature better sound, better picture, and better content protection than either Blu-Ray or HD-DVD. That's a lot of "better" for an unnamed, undeveloped technology, but with the weight of the Chinese government behind it, who knows? We at the Orbiting HQ want to believe, but China's track record in these matters ain't so hot. Who remembers WAPI, China's homegrown Wi-Fi spec? Or EVD, the Red alternative to DVD? Yeah, that's what we thought. Both technologies have floundered and all but disappeared (WAPI is on indefinite hold, while almost no EVD players were ever produced). On the other hand, this time around the Chinese are working with the DVD Forum to have their new system blessed as an official next-gen technology in the same league as Blu-Ray or HD-DVD. The Forum has given them the go-ahead to begin preliminary work on a feasability study of the new format, which is based on HD-DVD but is incompatible with it. The plan is to produce disc and players in 2008. With HD-DVD and Blu-Ray on the horizon next year, this makes China's proposal look more like a "next next generation" system. By the time it appears, will it still be relevant? The $64,000 question, of course, is whether the studios will support another, Chinese-only format? Given China's track record with piracy and IP issues, it seems doubtful unless the new format truly is locked down tight. On the other hand, given the possibility of making no money (by not releasing any discs) or the possibility of making some money (even with an insecure platform), studios might very well choose the latter route. China to develop own DVD format
×
×
  • Create New...