- Strength to Increase Rep
- +0
- Strength to Decrease Rep
- -0
- Upvotes Received
- 6
- Posts with Upvotes
- 5
- Upvoting Members
- 4
- Downvotes Received
- 1
- Posts with Downvotes
- 1
- Downvoting Members
- 1
Ive had all the Knight Rider jokes about black cars, talking into my watch and going out crime fighting... so please don't flood my inbox with KR jokes lol Am a previous MSN (Microsoft) Technical Support Professional, now working for my self as a Forensic…
- Interests
- Movies, Music, Walking, Reading scary books / Tech manuals, Computer Forensics.
169 Posted Topics
Re: You can configure VNC to work through ports 80 or 8080 or even set up port forwarding. | |
Re: What does your server run? Windows or Linux? | |
Re: Open Firefox - Close all tabs. Set your homepage, e.g [url]http://www.google.com[/url] then click Tools > Options > Use Current Pages. Click OK. Close Firefox and reopen. | |
Re: This password will be the password for that computer or user. All Network passwords are based on user groups and permissions. You will need to create a user group and add users to this group. Then assign the C:\ drive or whatever folder you want permission for that particular user … | |
Re: System Mechanic uses IE's engine to render its dialog boxes. Close System Mechanic (might have to end task in Task Manager) Now, open up IE, Click [B]Tools [/B]> [B]Internet Options[/B] > [B]Advanced Tab[/B]. Look through the list and take the checks out of [B]Disable Script Debugging (Internet Explorer)[/B] and also … | |
![]() | Re: Before you start your merge, do the following: 1. Right click any white space in your document and select [B]Paragraph[/B] 2 The Paragraph properties will pop up. 3. Select “[B]Don’t add space between paragraphs of the same style[/B]” 4. Click [B]OK[/B], Continue your merge. |
Re: Not quite WOW but entertaining: [url]http://www.miniclip.com[/url] | |
Re: I think the problem is that Outlook 2007 (and office) uses the Calibri font. When you uninstalled 2007, it may have removed this font, and set Outlook 2003 to use plain text, also Outlook 2007 has different settings, so uninstalling it has set 2003 to plain txt. To fix this … | |
Hey everyone. It seem's this is the place to post anything we want (within reason) so I thought I would start a thread to find out what your favorite quotes are. I'll start with one of mine (though I have loads more): [B]People always turn away from the eyes of … | |
Re: Hi Rerun Hijack this and remove the following entries: C:\WINDOWS\system32\gdi++\gditray.exe C:\Program Files\RK Launcher\RK Launcher 0.41 Beta Nightly\RKLauncher.exe D:\Apps\ObjectBar\ObjectBar.exe D:\Y'z Shadow\YzShadow.exe O2 - BHO: (no name) - {AA58ED58-01DD-4d91-8333-CF10577473F7} - (no file) O2 - BHO: Google Update Class - {ADD57508-1A52-4FAA-A7B3-A3ADE8FAEFEC} - C:\Program Files\Google\Update\1.1.17.0\GoopdateBho.dll O3 - Toolbar: QT TabBar - {d2bf470e-ed1c-487f-a333-2bd8835eb6ce} - mscoree.dll … | |
Re: Try this: [CODE]Set objExcel = CreateObject("Excel.Application") objExcel.Visible = True objExcel.Workbooks.Add objExcel.Cells(1, 1).Value = "Test value"[/CODE] Just alter the objExcel.Cells[B](1.1) [/B]with the cell you want. Test value can be anything you like. | |
Re: The best version is 2007, as it has extra features when installed on a Vista machine. Older versions will work too, but as soon as you install, go and do a [B]Windows Update[/B] to ensure full compatibility. | |
Re: Have you got more than 1 operating system on this PC, like Windows XP? or Just Vista? Also, do you have any removable USB storage/hard drives connected? | |
Re: Hi Close Windows Defender from system tray, Right click the little icon next to the clock and select [B]Exit[/B]. If you delete the old update, checking for new updates will work. To do this, Press [B]Start [/B]> [B]Run [/B]and type [B]Msiexec /x {A5CC2A09-E9D3-49EC-923D-03874BBD4C2C}[/B] and click [B]OK [/B](you can copy and … | |
The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this … | |
How long before [URL="http://www.skype.com"]Skype Ltd[/URL]. ends up as an item for bid on eBay? Ever since its acquisition by the Internet auction site, Skype has been a rudderless boat — and without a captain, following the departure of cofounder Niklas Zennstrom, who took £2.8 billion of Skype’s £5.2 billion value … | |
Every year sees a fresh crop of security breaches. Most go unreported, unless they involve consumers' personal data, at which point companies are required to give timely public notice of security breaches. The following list of 2007's worst security breaches consists mainly of such reportable incidents. The incidents are sorted … | |
For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, … | |
[B]A picture may be worth a thousand words, but it could also hide something more treacherous. [/B] Today, businesses wanting to guard against the potentially ultra-serious hazard of vitally important data being deliberately leaked to unauthorised people outside or even inside the organisation, need to get to grips with an … | |
[B]Rumors and speculation about why five undersea cables to the Middle East have been severed — and what it means for IT security[/B]. Since [B]Jan. 30, 2008,[/B] there has been a troubling pattern of underwater anarchy. At first, it was reported that two, then three, then five undersea [URL="http://en.wikipedia.org/wiki/Fiber-optic"]fiber-optic[/URL] cables … | |
When you think of security, it's a good bet that some of your thinking drifts to hackers and crackers. These are both security threats that you have to take into account. But do you know the difference? Well, some people do, and although many of them don't want their names … | |
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … | |
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … | |
[B]The Problem[/B] With the availability of chat rooms and groups on Internet Web sites, the temptation to meet new people online increases, according to research. Online relationships provide individuals with an outlet to tell secrets and express themselves to a stranger anonymously, while allowing for the creation of another persona. … | |
Over time, spammers have changed their spamming tactics in their bid to gain access to people's mailboxes. The latest tactic is to use the common [B]PDF [/B]file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, … | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among … | |
[B]Overview[/B]: The lack of sensory information on the Internet (like too many teenagers and younger kids with a [URL="http://www.facebook.com"]Facebook[/URL] or [URL="http://www.myspace.com"]Myspace[/URL] page) may have a significant impact on cyberstalkers, as described by Meloy ("The Psychology of Stalking," Meloy, J.R) "The absence of sensory-perceptual stimuli from a real person means that … | |
Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is … | |
Re: You should find a driver here: [url]http://www.cmedia.com.tw/?q=en/driver[/url] If your's is not listed, theres an earlier universal driver here: [url]http://driverzone.com/device.php?id=7647[/url] | |
Re: Go to Windows Update and click [B]Check for updates[/B]. Look in the list and there should be a VB6 Update for Vista. Tick it and click [B]Install Updates[/B]. Then reboot. | |
Re: If you bought it, you can contact the manufacturer and they will give you a new key. If the PC is asking for the key, then its no longer stored on the system, in the registry, or in a activation file. | |
Re: [QUOTE=invisal;514244]Since no one has mentioned about SMF(Simple Machine Forum Software), I will be the first person to recommend you to use SMF if you are looking for a free software. It has rich features and simple interface. [url]http://www.simplemachines.org/[/url][/QUOTE] I would recommend SMF too, Its a great little forum. | |
Re: If this deal goes through, it wont happen until the second quarter of this year, and remember, Microsoft and Yahoo have had these talks before. Yes, there will be a dominance, the Mobile/Cell phone market for example. If this merger goes ahead, the tools and technology is already in place, … | |
Re: [B]Show Super hidden files[/B]: Even if you turn on show hidden files in Windows Explorer some files will remain hidden. These files are super hidden. Set the registry value below to [B]1[/B]. [COLOR="Green"][HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "SuperHidden" = 1[/COLOR] Then reboot. [B]Delete a System or Locked File[/B] 1. First you need to take … | |
Re: Id say yes, its defiantly worth doing. There are loads of people out there that pretend to have these qualifications in order to get jobs, or to make themselves look good. So i'd say go for it. You will have to take the [B][URL="http://www.microsoft.com/learning/mcp/mcp/default.mspx"]MCP [/URL][/B]exam first though. | |
Re: You can also encrypt the folders, they will see the contents, but not be able to open them. | |
Re: Which address book? Outlook, Outlook Express, Windows Mail or another program? Try and post as much info as possible. | |
Re: Are you using Windows Vista or XP or another Operating System? If suggest going to the manufacturers website and download the latest drivers for your Mouse and Keyboard. These get updated frequently. | |
Re: HI. Rerun Hijack this and fix the following entries: R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Program Files\Common Files\Microsoft Shared\Stationery\Blank.htm O8 - Extra context menu item: &Search - ?p=ZUxdm082YYUS Then reboot. | |
Re: Hi Run HijackThis again and remove the following: [COLOR="Red"]O3[/COLOR] - Toolbar: Zango - {90B8B761-DF2B-48AC-BBE0-BCC03A819B3B} - C:\Program Files\Zango\bin\10.2.191.0\HostIE.dll [COLOR="Red"]O4[/COLOR] - HKCU\..\Run: [LowTek CopyFaster] "C:\Program Files\LowTek CopyFaster\copyfast.exe" /startup [COLOR="red"]O9[/COLOR] - Extra button: ShopperReports - Compare product prices - {C5428486-50A0-4a02-9D20-520B59A9F9B2} - C:\Program Files\ShoppingReport\Bin\2.5.0\ShoppingReport.dll [COLOR="Red"]O9[/COLOR] - Extra button: ShopperReports - Compare travel rates - … | |
Re: After the Laptop beeps, press the F8 key (keep taping it) till you get the boot menu. Select [B]Last Known Good Configuration[/B] from the list. See if that helps. | |
Re: A couple of solutions. The files on your friends PC are either hidden, encrypted or are FAT32 files instead of NTFS. | |
Re: A good site that has millions of free excellent quality images is [url]http://www.sxc.hu[/url] They also have a premium service too. One of the best paid sites for stock images is [url]www.istockphoto.com/[/url] or Photodisc. Sorry, didn't see this was already posted. My Bad... | |
Ok, I know its old, but I wanted to know if this worked on Vista... First the (quick) story. We had to fix a clients PC, was riddled with crap, so we called the customer and told her that it would be better to back up all her data, and … | |
Re: What's the make and model of your bluetooth Adaptor? |
The End.