Jump to content

cak46

Members
  • Posts

    1,260
  • Joined

  • Last visited

  • Speed Test

    My Results

Everything posted by cak46

  1. Might be a stupid question, but do you have an auto scan set up for any of your spyware and/or anti-virus programs? This could drag your system down. Auto-Updates for MS and other programs can also cause the same issue..... Hibernate will cause laggyness because the system writes your session to disk then "hibernates". When you bring it back, it reads your session back into memory. If you want, shut off all power saving options to see if that might be part of the problem.
  2. cak46

    ANYONE

    Are you having a problem with "Logon" remotely now, or at the local console (logging onto the machine itself) ?
  3. Yes but there are a number of ways you can do the imaging. It copies everthing on the drive and/or partition you select for ghosting. There are a number of options available for how you save the data. You can create an image of each partition or the whole physical drive (all partitions) at once. The "clone" of a partition can be stored as an image file on another partition, physical disk, or cd-roms. If you clone the whole drive you need to store the image file on another physical disk or cd-roms (You can't create an image file on the same partition, (or disk in the case of a full drive copy), that you are backing up). You also have the option of creating a duplicate of your old drive to a new drive. Very handy if you are replacing your hard drive, or as I do, use it to back the whole drive up. I just find it easier to disconnect/reconnect another hard drive when I want to Ghost my hard drive and use a Ghost boot disk for this. If my drive dies, I just throw the old one out and put the clone in its place. For cd-roms, the older version I use asks if you want to make the first cd-rom bootable. You can use a boot floppy created through the Windows Ghost programs to boot the computer too. I have used it with Win2000 Pro, but not with XP, but assume Norton has updated it to properly clone/image XP drives/partitions as well. I use it at work when I need multiple machines set up with the same configuration. (This Ghosting I do is between machines on the network with Ghost Boot Peer to Peer Disks, instead of removing the HD's and installing them into the donor machine to do the cloning). For NTFS systems (at least win2000), there is another program that comes with Ghost to create and write a new sid for each "clone" of the original. GhostWalker is the program. This is vital if the computers are going to be networked since the SID is used in Domain membership for the machine, etc.. Restoration can be done either by booting with the floppy or the bootable cd-rom created while ghosting to cd-roms. The newer versions has an interface to run Ghost through Windows directly, but I've never used this interface. Hope this helps!
  4. I use Norton Ghost which comes with Norton systemworks professional. It will back up your whole hard drive to cd roms (or dvd now, I suppose). You can do this either partition by partition, or the whole drive (all partitions) at once. I bought a second hard drive and use that for my backup with Ghost. Pretty slick!
  5. Is he on the web or connected to a network while on the road at all? If he isn't, but then connects to the net at home, could be a configuration issue of some sort......
  6. cak46

    Firefox Help

    Try downloading and saving the file instead of running it, if you can. Then, try to view it from your local hard drive instead of thru the net. This could show whether its a problem with media player or not.
  7. I've had a few laptop batteries go bad with machines that were never used on battery for about a year or more. The batteries eventually will develop a memory and charge the same amount of time for the short burst charge during normal operation on AC. These were Inspirions from Dell.
  8. download killbox here http://www.bleepingcomputer.com/files/killbox.php then use it to get rid of the offending files. You may have spyware, mallware, etc so download adaware from www.lavasoft.de and run a scan. If you have anti-virus software, scan with that too.
  9. If you were using a nic to connect to comcast, try disabling the local connection then try to make a new connection using Add a connection in "network Connections". Also, check in Device Manager under modems to see if there might be a conflict with your modem and another piece of hardware (there will be a yellow or red mark beside the modem listing). You could try deleting the modem from Device manager, then reboot to have xp reinstall it then try to make the connection.
  10. I'll give it a try tomorrow night, after a coupla brews....... If I burn, at least I'll go with a smile on my face :haha:
  11. :haha: I'd agree to a certain degree if you're talking about script kiddies. If someone doesn't use "the patch", they should expect some script kiddie to break in. The hackers, breakers, etc. that I'm referring to... the ones that find the breaks, holes, exploits...... the "cutting edge hackers" (for lack of a better term) are the ones that I believe will target a supposedly secure piece of software over an open source, just to show that the producer is FOS. In my view, script kiddies are wussies, the true, real hackers are the ones that find the abovementioned holes, etc.. Edit: Here is an article on hacker psychology from TLC http://tlc.discovery.com/convergence/hackers/articles/psych.html and a discussion with a hacker: http://www.bemuzed.com/elmorian/philosophy/files/DH_Hacking Very interesting reading.
  12. Still have one of the old 8088's around here somewhere....... Been considering contacting the Smithsonian about it......... Scary thing is, it would probably boot if I dared plug it in. :haha:
  13. Macro viruses, such as msoffice users are accustomed to. Not necessarily "hacked", but surely attacked........... You can also look at mail programs, such as Outlook and OE compared to the instances of macro viruses with Netscapes or Pegasus Is it this or is it that because the majority of users run MS products, the majority of users may uses the same products and thus are more familiar with the workings of ms products and find it easier than other op sys's, etc. to work with due to that familiarity..... If its just a matter of targets, I would think that most code breakers would just wait for a good code break to come out then just use that one, instead of finding their own. But, there is no challenge in that. MS had always touted its security as being very good, and of late (within the last 2 years or so) has only just begun to acknowledge the shortcomings of their products and actually put it at the forefront of the services they provide. This happened due to public outcry, not ms being proactive. What would make a better target?....... Open source or Products touted as secure?
  14. May give ms a try but want to figure it out. I have a bit of time so I'm not desperate enough to call them yet. Thanks for your help!
  15. Correct. The system just beeps at me. If I tab, the first item on the list gets highlighted in gray, then no more Tabbing allowed. Kinda frustrating. The Computer Management screen looks just like the one in XP. I tried replacing the msc file but that caused more problems and mmc would not even load the console. Can't do a screenshot, the server is at work. Everything else works gloriously. I may try rolling back sp2 but am hesitant to do this in case of potential impact on sql or ctrix metaframe. Rather take some time and try to fix the issue..........
  16. When I try to run the MMC Computer Management, the MMC console comes up with the Computer Management Script but when I try to click on anything within the window or tab, nothing works. I can access the MMC menus using alt+f (for the File menu), etc. but that is it. It's running SP2, 2003 Server Enterprise Edition as a member Server with Citrix Access Essentials 1.0 and SQL Server SP3a. No log entries are created (Even with auditing on) and no error messages. Tried it in Safe mode and I can access it there. Normal Mode, no go. Any help would be appreciated. Any one have any ideas?
  17. :haha: Doesn't sound like sucha bad idea. I liked the old Gopher sites, downloading uuencoded pics........... with my speedy 2400baud modem.......... :) I think that the reason FF is not attacked nearly as much is the fact that it IS an open source, free system to begin with. MS takes great pains on hiding its "SECRETS". What would offer more allure to a hacker/cracker/code ripper than the need to know said secrets, and exploit them just to show MS that it's FOS when it comes to security for its products. FF would not be a challenge, given that it is an open source software. I haven't heard of exploits for the OpenOffice software. I'm sure there are some, but have not seen anything thus far here or on the net. I'll look around a bit, but it can't be close to that of the MSOffice Suite.
  18. Netmasta: Thanks for the correction, you're right. I've only seen most connection speeds at 10mb and never looked up each modem. JustinOhioRR, what model of modem are you running?
  19. JustinohioRR: The majority of cable modems only have a 10mb connection. That's why it shows as a 10mb lan and it stops functioning when you set it to 100/Full. I'm not aware of any modems that have a 100mb connection on the internal lan side..
  20. cak46

    Connection issue

    TrojanHunter is good,,,,,, Ewido as well, and A-Squared.............. There are others as well.........
  21. I didn't know about the other definitions and groupings. Thanks for the info! I still feel that no matter How they define themselves or are defined by others, if they break into any system that is not their own without the ok from the owner, they should go down for a criminal act. By condoning their actions, we legitimize them. The "hackers", "crackers", should be shunned from the net and not allowed any computer access if they break into anothers computer without the owners say so. By all of the definitions I've seen thus far, the word "hackers" pretty much covers the whole spectrum of users/programmers from the Pentagon insurgents stealing top secret information to the guy down the street that found a new way to connect to the net with WindowsXP without a network connection. Makes for an interesting report, I imagine!
  22. Total Time Spent Online: 11 days, 14 hours and 10 minutes. Total Posts: 894 posts Total Topics Started: 18 topics Number of Polls Created: 0 polls Number of Votes Cast: 11 votes
  23. Have you tried the speakers directly connected to the computer? This may show if its the sub or not. Also, if you have an adapter that matches the one your using for the speaker power, try changing that out.
  24. cak46

    Connection issue

    Go into your network connections, delete the local connection, then reboot. Your system should reinstall the connection on reboot.
×
×
  • Create New...