Comatose 290 Taboo Programmer Team Colleague

I'm pretty sure the problem is this:

VB has an internal command, called "Rate", I don't remember if it is a function or a class (that requires you to make an instance of it)... but if you rename the textbox from Rate to ... say, tmpRate, or CurrentRate, or something of that nature... it may solve the problem.

I also would only times the interval by 1000, but, it's your code ;)

Comatose 290 Taboo Programmer Team Colleague

The Pleasure is Mine.

Comatose 290 Taboo Programmer Team Colleague

I'm not 100% sure what you mean by "Lock The Computer"

I don't have an option for that on my system.... so do you mean like, a screen saver password?

Comatose 290 Taboo Programmer Team Colleague

Yeah...

I can do that for you. Some of the things that you request, are going to require something more than a registry tweak... but I'm sure it's something that can be done.

Comatose 290 Taboo Programmer Team Colleague

Yeah, Don't close the program.... use a timer control .... you can even use a form to set the "refresh rate" of the timer control. have a box on the form (a textbox) and a button on the form (set rate) and make it in seconds.... then in the code for the set rate button, do a:

timer1.interval = val(text1.text) * 1000

Obviously Rename Timer1 to whatever you name it, and rename text1 to whatever you name the textbox.... that will set the interval (you are multiplying by 1000 because the timer control works in milliseconds...not seconds. Also, Keep in mind that you can not exceed 60000 (1 minute, 60 seconds) with the timer control's duration.

In the timer control... you would do something to refresh the grid... I'm guessing it's going to be a bit of a payload, but if it only happens now and again, say, 15 or 20 seconds... maybe even less, the toll won't be too deadly. Anyway, I'd suggest, in the timer control to REDO your code. An Example would be to erase everything in the grid control, and redo your computations. Then perhaps use the .refresh method, and it should update just fine.

Comatose 290 Taboo Programmer Team Colleague

Well,

It would go a little something like this:

Dim strURL As String
Dim bData() As Byte      ' Data variable

Dim intFile As Integer   ' FreeFile variable
strURL = "http://yourserver.com/yourpdf.pdf"

intFile = FreeFile()      ' Set intFile to an unused
                        ' file.
' The result of the OpenURL method goes into the Byte 
' array, and the Byte array is then saved to disk.

bData() = Inet1.OpenURL(strURL, icByteArray)

Open "C:\Temp\yourpdf.pdf" For Binary Access Write As #intFile
	Put #intFile, , bData()
Close #intFile
Comatose 290 Taboo Programmer Team Colleague

I understand what ; does on a command prompt and what not. What I DON'T understand, is how you were able to pass the password to SU with multiple commands (using ; )? So how'd you do it?

Comatose 290 Taboo Programmer Team Colleague

Yes. Truth is, it's already done, and he's already using it. I coded it, and commented it line by line, so he could learn from and modify it for future needs.

Comatose 290 Taboo Programmer Team Colleague

To Easy... when I get out of work, I'll let you know.

Comatose 290 Taboo Programmer Team Colleague

Use the Microsoft Internet Transfer control.... You Pass it the URL, and tell it what you want to do with it, and it will do it. You can then save the information to a file, of the same name, or with a temporary name, and then do your printing. HOW exactly to print the PDF file from a VB App is going to be the hard part. The only method I know of, is really (Really) Tacky.

Comatose 290 Taboo Programmer Team Colleague

Truth is,

I see a moderator closing thread based on it's content in relationship to what this site is all about. I'll give you my answer, but honestly, I don't expect this thread to live long.

I'm a Christian.

Comatose 290 Taboo Programmer Team Colleague

And With That,

(And my undying Disdain for malware), I not only thank you for using the software to help battle the malware non-sense.... but I'm never happier to see that you were pretty much clean of it.

By They Way, Is Harvy The one leaving carrot trails? :)

Comatose 290 Taboo Programmer Team Colleague

It has been my experience, that while anti-virus software works great for viruses... they leave a lot to be desired on the end of malware. The reason being, because even though they are pests, and an epidemic that is reaching enormous proportions, they don't operate as a virus does. They may use exploits, and they may be installed unknowingly to the user... but they don't replicate and spread like traditional viruses do. Basically, to some degree, they are just normal programs (like people use every day, like word, or excel), it's just that their function annoys people. Because they are basically "normal" programs, an anti-virus software isn't going to recognize, or protect you from them. This is why there has been so much debate as to the subject of "should malware be included with anti-virus programs?". Microsoft's release of anti-spyware has a very comprehensive database of spyware and adware signatures.

While it's possible that you are 100% free of malware, I still strongly encourage you to download it from: http://www.microsoft.com/athome/security/spyware/software/default.mspx
just to be on the safe side. It found spyware installed on my system that didn't even affect the system (From what I could tell).

Comatose 290 Taboo Programmer Team Colleague

That is complicated. I would start by narrowing down the list in your database by file size.... and then looping through the list of files with the same size, and comparing those to what you have. I imagine this process to take a long time, but the next step, would be to read in the first image file, byte by byte (maybe into a byte array, or something), and then compare the respective bytes of the uploaded file, with the bytes in the current file of the same size... if all the bytes are the same, the image is obviously the same.

A possibility to speeding up this process, would be to read a couple of bytes from different locations within the file, and compare those couple of bytes to the corresponding bytes. This isn't easy.... but it can most certainly be done.

Comatose 290 Taboo Programmer Team Colleague

In Fact,

According to http://www.php.net, (http://us2.php.net/manual/en/function.echo.php)
you'll see that it shows both examples. It seems that it's a matter of whatever the programmer feels more comfortable with. Let me know if you find any further information on it though please.

Comatose 290 Taboo Programmer Team Colleague

I'm not 100% Sure that one form is "more proper" than the other. I do realize that one form is more readable.... but I don't know if one is better syntax than the other?

Comatose 290 Taboo Programmer Team Colleague

I'm pretty certain that you'll to mount those manually at a prompt....
I'm not familiar with YOUR particular system, so, it could be any number of device names. Commonly, Partitions are categorized as hda1, hda2, etc. Also, hdb1, hdb2, etc. The particularities depend on your system and version. Also, the mount command recieves options in order to determine what type of partition to load. I believe it's -t

so it might be something like: mount -t ntfs /dev/hda2 /mnt/hd

The /mnt/hd is the directory in which to mount the partition. Not sure if this is helpful, but there you have it. Don't forget, you can do a: man mount

Comatose 290 Taboo Programmer Team Colleague

It's VERY possible that it's NOT from a website. There could be a program of some kind that is making these popup's happen. You should download microsoft's anti-spyware program from microsoft's web page. This isn't the best software for fighting malware, but it helps a lot. There is also hijack this, and spybot.

Comatose 290 Taboo Programmer Team Colleague

Umn, Yes.

Control Panel, Edit Options, Messaging and Notification Heading:

Default Thread Subscription Mode
and change it to Instant E-mail Notification

Comatose 290 Taboo Programmer Team Colleague

I think anyone who makes an operating system that requires all these tools for protection and security has no business making tools that help aid in protection and security.

*flips a nickle*

Comatose 290 Taboo Programmer Team Colleague

When They click "submit" the page is supposed to pass that information to another program. That program can be a CGI, it can be an ASP file, it can even be another web page. What You need to know, is to who or what that information is going to go to? Is it going to be sent as an e-mail to someone? If so, how is it going to get to him?

Comatose 290 Taboo Programmer Team Colleague

Ok,

My question to you is this: when they click "submit" what is supposed to happen?


note: Thanks.

Comatose 290 Taboo Programmer Team Colleague

To my knowledge, This isn't a very easy task. The Reason is that programs don't always keep all their files in one folder. They put stuff in system and system32, and sometimes a couple of other places. IF, however, you can find all the dependancy files (files needed for the program to run) and save all those, and then save everything in the programs folder as a backup, then you are on your way. However, Then you have to make sure that you copy all the registry Entries that apply to the software you backing up. Sometimes, Those have their own classid's and everything else. I'm not 100% sure if there is software out there that actually does this, but if there is, please, let me know.

Comatose 290 Taboo Programmer Team Colleague

That's the first part of learning actually ;)
Next part (which you seem ready for) is getting a solid theoretical foundation beneath that knowledge you have.

{ Removed }

Skip anything that says "teach yourself in XXX", "for dummies", etc. (but not anything by O'Reilly, their books are almost always well worth the investment).

Now THAT is words of wisdom

Comatose 290 Taboo Programmer Team Colleague

However The Form i set up to set it up as email is the way to do it.... the thing is this: the form name (where it says <FORM NAME="datafrm"> MUST be in there for the javascript to work correctly. The thing is, it needs an ACTION so it knows who or what to contact with the information in the Form. Action should point to your 3rd party (most likely)

Comatose 290 Taboo Programmer Team Colleague

I need more information, exactly on what you want... like... what you have access to all. Let me put it this way, if you want to give me the paths to the log files, and the paths to where you want them saved, I'll build it for you. I'm not 100% sure about the zipping.... I know I could tar them, but tarring individual files? I am sure I could bzip it or something..... let me know, my e-mail is available on this site by clicking my name, and following the menus.

Comatose 290 Taboo Programmer Team Colleague

http://www.aftermath.net/~coma/ex.html

Go There, Right Click on the page, and view source. That will give you all the code to do the javascript for validating the email (making sure the box is not empty, and it has an @ sign, etc). It also validates all the other fields, EXCEPT for the comments box... but you can just remove those if's and it will still work fine.

Comatose 290 Taboo Programmer Team Colleague

Post The Code, And I can help

Comatose 290 Taboo Programmer Team Colleague

I Told You I was gonna start an argument.

Comatose 290 Taboo Programmer Team Colleague

Ok With all fairness I hate VB too, but it doesn't make it easy to learn a loop, or an if block?

Comatose 290 Taboo Programmer Team Colleague

Yes it should. It might be ONLY ONE of those DLL's... but if you load Internet Explorer's, EXE file, and scan it with an module viewer (I built one to do that...basically, it shows all the dll's and stuff that are loaded with a particular program, or are being used by it). That is the list of .dll's. Also, though, the registry under HKLM/software/microsoft/internet explorer, has those other 2 dll's listed as something that IE uses. When I regsvr32'd all those files, it was happy, and worked normally.

Let me know how it turns out.

Comatose 290 Taboo Programmer Team Colleague

Ooooooops, I forgot:

regsvr32 mshtml.dll
regsvr32 inetcplc.dll

Sorry :(

And Don't forget that you MIGHT have to reboot before it works.

Comatose 290 Taboo Programmer Team Colleague

Ok,

start, run, and type in:

regsvr32 shlwapi.dll

then hit enter, and do this repeatedly for all these:

regsvr32 SHDOCVW.dll
regsvr32 BROWSEUI.dll
regsvr32 browselc.dll
regsvr32 wininet.dll
regsvr32 secur32.dll
regsvr32 urlmon.dll
regsvr32 shdoclc.dll
regsvr32 DNSapi.dll

*Wipes His Forehead*
Give that a shot.

Comatose 290 Taboo Programmer Team Colleague

There are a list of .dll's that are no longer registered.... this EXACT same problem happened to me when I went in and removed the whole internet explorer registry key. The solution was posted by someone, but I don't remember who. I'll search for the thread, and repost.

Comatose 290 Taboo Programmer Team Colleague

I'm going to start an argument here (there have been posts regarding this already)... but most of the people will say C or C++ (something that gives you C like syntax). I personally, however, would say that you should start with an easy language, to learn the simple things... like loops, subs, functions, and all the like. So, with that said, I'm going to suggest Visual Basic, in just about any form (I suggest vb6, or vb.net).

There's my 2 cents.

Comatose 290 Taboo Programmer Team Colleague

Be careful about posting things in regards to "hacking" Even if you mean it one way, it may be taken the wrong way by someone who doesn't split hairs.

Comatose 290 Taboo Programmer Team Colleague

I'm Keeping My 2 cents to myself on this one

Comatose 290 Taboo Programmer Team Colleague

You can READ the files, but I'm pretty darn sure you can't delete or over-write, or anything like that to the files. But You make sure the hard drive is in the computer, (as a slave or something) and boot to fedora. Then you mount the NTFS partion (With mount) and give it the file system time. Even if it's the same hard drive, the concept is the same... you mount the partition that has the NTFS file system on it... but you can only read (copy from, etc) the NTFS file system. If it were FAT or FAT32... You could Modify It, but NTFS is read only.

Comatose 290 Taboo Programmer Team Colleague

Always Glad To Help

Comatose 290 Taboo Programmer Team Colleague

You're Very Welcome, and Good Luck To You With That.

Comatose 290 Taboo Programmer Team Colleague

Well, Sounds like a messed up httpd.conf file.... maybe post it?

Comatose 290 Taboo Programmer Team Colleague

I don't know about "good" popup blockers and firewalls. I know that you could use "zone alarm" as a firewall, and there are a number of others that a google search would come up with it. Windows XP Service Pack 2, Is supposed to come with a firewall also. Popup blockers is a whole different topic, because it could be based off of the page (the page you are visiting pops up the site) OR it could be due to adware and spyware on the system. Yahoo and MSN have "Internet Explorer Toolbars" that have these popup blockers for the browser, but I question their usability. You could take a look at using the web browser firefox (http://www.mozilla.org/products/firefox), which has a built in popup blocker.

If You are getting popups based on spyware / Adware, then you might need a tool to stop popups. You can take a look at Adaware, Hijack This, or Microsoft's Release (Bought from GIANT) of Anti-Spyware.

I Don't know if this helps, but I hope so.

Comatose 290 Taboo Programmer Team Colleague

Ah, False Positives :)

Comatose 290 Taboo Programmer Team Colleague

False Positives?

Comatose 290 Taboo Programmer Team Colleague

you need to type
expand rundll32.ex_

at a command prompt, or from start/run (expand filename) without the ()

Basically, Expand takes a compressed file and makes it uncompressed for the purposes of installation. So, Expand the file, and then copy to %windir%\system32

Comatose 290 Taboo Programmer Team Colleague

No No, It's not like a plugin or anything. It's just a seperate EXE that I built that protects my process list while MS's program is running to clean malware. Besides, I'm way to open source for all that. lol.

Comatose 290 Taboo Programmer Team Colleague

Look up reshack (or reshacker), it stands for "resource hacker" which basically allows you to view and modify certain main keypoints to programs (strings, images, etc)

Comatose 290 Taboo Programmer Team Colleague

Yeah,

I Knew MS bought GIANT's program and slapped a label on it. I was hoping they would have done a better job of protecting the system while they are cleaning it.... but that's why I built my own personal protector to work in junction with MS's. *shrug*

Comatose 290 Taboo Programmer Team Colleague

I'm using it....

but in my personal and humble opinion, it sucks really bad. It has a huge library of signatures, but it's been my experience that's it's live shield really is no good. I also found that while it's trying to remove a lot of BHO's and other crudware, it allows others to install. Almost like their OS... it gives the appearance of multi-tasking :)

Comatose 290 Taboo Programmer Team Colleague

use javascript, give the picture a name, and then change it's .src property?