rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, if your laptop doesn't have a bluetooth transceiver, then no, you can't. You can purchase a USB bluetooth device (I use one on my workstation for Skype access) for less than $50 USD.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You have to do this as the root (admin) user.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, this is why I run Windows in a Linux VM and snapshot the Windows image before I loan it to someone. Then, when I get it back, I revert to the snapshot, removing any possible infections my friends may have attracted. Also, I provide a guest login for them that automatically loads the Windows vm, SO they never have access to the underlying Linux system.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, I think that you may be SOL unless you embed the graphic directly and not as a hyperlink.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

From what I can tell, dvbtap.exe is a common vector for viruses and most A/V tools recommend removing it. I don't know if it is part of the Win Fast PVR2 DVT1000s product, but you might want to communicate with them about this problem. It has been known for malware to infect commercial products like this... :-(

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Only if you have enabled the PxE boot option (if available) in the remote computer's BIOS. In any case, you will probably still need to enable some sort of watchdog timer in the remote system so if it starts to go wonky it will reboot itself, and that reboot can be either from the network or local hard drive. This is not simple admin stuff and you should really do some in-depth research to determine the process that will work best for you.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Have you restarted Apache? It should read the new configuration then.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You can use any sata drive in any sata port, where the LCD (lowest common denominator) rules. IE, a sata-1 drive in a sata-3 port will run at sata-1 speeds. Obviously, for best performance (drive read/write hardware notwithstanding) you should match the drive with the port controller; however, since it is likely that even a sata-1 interconnect will exceed the read/write speeds of most any CD/DVD drive, I'd have to advise not to worry about it!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is called automatic call distribution software. I had software that would do that back in the 1980's so there must be something now. Try a Google search on the terms "automatic call distribution software" and you will get a lot (over 3.6M) of hits.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you removed it after writing to it without doing the "safely remove" operation, then it may be scrambled to the point that the OS cannot see it to mount it. IE, if the MBR of the disc (1st sector) is not recognizable as an MBR, then you may be SOL. With Linux you could fix that easily, but I'm not so sure with Windoze.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You probably need to change your Excel security settings to a less restrictive mode. I only have Office 2003 and there is nothing I can find in Excel for hyperlink security, but there may be for 2007. In any case, I get the same dialog when I embed a hyperlink. If you just want the picture, then you may want to embed it directly into the spreadsheet instead of hyperlinking it.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

There are 32-bit and 64-bit Adobe flash players available for Linux. Which you use depends upon the browser you have installed. On a 64-bit system, you can have a 32-bit Firefox installed, which would require a 32-bit plugin. A 64-bit version of FF or Chrome would require a 64-bit plugin. FWIW, I run a 64-bit Linux OS (RHEL 6.1 clone) and Chrome browser w/ 64-bit Adobe Flash plugin. It works fine for me.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It is possible that your monitor does not support HDMI audio. I think this is a pretty new capability (could be wrong about that). In any case, as vincent5487 said, check to see that your sound source on the monitor is set to use the HDMI stream, if you can do so.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The probably means that you have a virus on your system. DEP errors generally mean that something is trying to execute data as code, which is one of the ways that a virus uses to pwn your system. One of the things that happens when you open a folder on Windows is that it expands the thumbnail pictures and icons of applications. These are embedded in the files themselves, and as such may contain these types of viruses. Hopefully, you have your important pictures backed up because you will probably need to nuke the folder at the least. In any case, run your AV program (make sure it is up-to-date) and scan your system, preferably after booting into "Safe Mode".

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

There are many ways someone can hijack your gmail account. If they managed to install a keylogger on your system, then they have not only your gmail password, but just about all the others as well. Also, they may have cracked your password if it was the same or similar to that used for some other compromised site, such as happened with The Linux Foundation earlier this year.

1. Do a clean reinstall of the operating system, including a total wipe of the hard drive in case your boot loader has been infected. Note that some new trojans also infect the recovery partition if you have a Windows or dual-boot system, so you really need to wipe the entire disc.
2. Scan ALL of your USB drives - they are a common infection vector.
3. Change ALL of your online passwords, and use new ones for your local system accounts (especially the Administrator/root account).
4. Scan any archived data for viruses and rootkits before you reinstall it on the system.

For Linux systems, you can download the open source AV tool, ClamAV. There are also free Linux versions of commercial products such McAfee.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

AFAIK, Mint is a popular, mature distribution. Download and run the live CD/DVD version and check it out yourself: http://www.linuxmint.com/download.php

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Linux Mint is an Ubuntu/Debian clone. It is reliable, and provides one of the best workstation desktop environments from what I have heard. As far as installing it "around an installed Windows" environment, you should be able to dual boot it with Windows.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, Ubuntu and other Debian-based distributions use the Aptitude package manager. The GUI version for Ubuntu is Synaptic. The command line version is called apt-get. For Red Hat and Suse distributions, they use the YUM package manger, which is built on top of RPM. YUM deals with installing dependencies much better than RPM does. Each accesses local or online repositories to get the packages you want to install. Sometimes you have to install the repository you need to get the packages you want. For Red Hat, there are several optional ones, such as Epel, RPMForge, and atrpms. For example, for Red Hat distributions, VLC is found in the atrpms repository.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

All devices, be they block devices (disc drives etc), character devices (serial devices, modems), or other (network ports, memory, etc) are all represented as special files in /dev/. For example, the "bit bucket" where you can put a command's output that you aren't interested in is /dev/null. If you want to erase a disc, you can read from /dev/zero and write to the physical device. For example, you have a thumb drive that you plug into the system (unmounted) that is registered as /dev/sdx. Then you can wipe the device with the command: dd if=/dev/zero of=/dev/sdx

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Hire a network technician who has experience in wiring offices such as yours. The exact means to do so depends a lot on the physical plant, which only an on-site visit will clarify. And FWIW, I have wired offices with hundreds of users in the past, so I know something of what I speak.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

From this, and your other post about explorer moving back multiple pages with a single click, I think your mouse button is generating multiple click events. It is probably a hardware problem.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What distribution+version of Linux did you install? Each major type has its own package manager that will download and install a package along with any missing dependencies. Also, for an audio/video player for Linux, you will have the best luck with VLC. It handles the widest variety of media formats around.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Suppliers are generally unwilling to provide unlock codes

In the US they are required to by law if you are either changing providers or your contract is up. Don't know about other countries though...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What is the slot type for the board, and what is the slot type you are trying to use? You may have plugged the board into the wrong kind of PCI slot.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You need to set up a secure VPN to anonymize your IP address. There are commercial services for this, such as VyprVPN, and free services such as TOR. Using these services, the remote site sees the IP address assigned by the service, and unless they are logging the linkage between the address your connection has been assigned to your real IP address, the remote system should not be able to determine who you are. You can do a Google search for these services, and here is a link: http://ipinfo.info/html/anonymous-surfing_2.php

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You need to disable the onboard video in the BIOS.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A 128GB disc is pretty decent for most purposes. An external HDD is useful for backups, including system disc images for disaster recovery purposes.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

urgh... run a virtual mac on a mac...
derp?

Well, it does make some sense, in that you can run older/different versions of the OS, or use the virtual machines to isolate applications from each other, or for development and testing of kernel components that may crash the host OS if not run in a VM. I run Linux virtual machines on my Linux system for just such purposes, along with other operating systems such as QNX, Solaris, and Windows.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

yup i knew bout this...but i had my doubts bout the processes... whether the kernel maintains...individual stacks from the kernel's perspective...

From what I read, this is the case, that the kernel maintains these structures.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Each process, user thread, and kernel thread should have its own stack. The kernel will switch between them as necessary and context changes require.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

1. VMware is just now starting to support running Mac OSX in a vmware image. Currently only Lion is supported, but I read today that they will be enabling Snow Leopard support as well.
2. You can only run a Mac OS in a virtual machine that is running on a physical Mac. You can't just run it in a vmware image that is running on a Windows, Linux, or other machine.
3. As you surmised, the guest Mac OS has to be properly licensed.

That said, there are people who have cracked OSX so it can be run in just about any suitable VM environment; however, these are NOT licensed hacks and support is pretty non-existent. If you are interested in that, you might try a Google search.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Ultrabooks are basically small, light-weight laptops that have a bigger footprint (screen/keyboard) than a netbook, as well as the ability to hold more memory and disc space than a netbook. A decent one will probably do you well, though I'd invest a few $$ and get an external display in the 20" or larger category for use on your desk, along with a mouse or trackball. That will be handy for writing those school papers and such, and playing games. Many new systems have hdmi output for the external display, and some no longer have a VGA compatible port, so you will want to make sure the display you get has both vga and dvi/hdmi ports.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I don't know why this is happening, but if the phone has hotspot capabilities (basically a small WiFi access point that using the GSM connection to get to the Internet), and your computer also has WiFi capability, then try that instead of direct tethering. I do that sometimes with my Android phone and laptop, say when I forget to bring the USB cable with me... :-) That way, I also don't have to worry about dragging the cable around.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, if you can tether it in XP, you should be able to tether it with Ubuntu. To Ubuntu, it should just look like a USB broadband modem, using PPOE protocols to communicate. So, how did you create the connection?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You might need to set up the CentOS system to be a network bride. The video in this link may help: http://www.securitytube.net/video/983
And this how-to may also: http://www.linux-tutorial.info/modules.php?name=Howto&pagename=Ethernet-Bridge-netfilter-HOWTO

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What is the make/model and operating system + version of the phone? Does your phone's data account allow tethering? Does the phone's software support tethering?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If burning at a slower speed doesn't work, then the image file is probably corrupted. If this is a downloaded file, see if there is a check sum (usually md5 or sha1) you can verify with the image you have. If you generated it, what software did you use? Also, is this a video file, or just data?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is a dated laptop that probably used an integrated Intel graphics processor (not sure about that). If so, then the video shares system memory with the CPU. If that is the case, then the only thing you can do is to increase the amount of system memory, if you are not already maxed out there, although that probably won't release more RAM to the video sub-system. IE, I think you are SOL. This system wasn't built to the specifications require to run Windows 7 in Aero mode. In fact, I expect you are lucky to run it at all...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Is long long portable?

It is with current compilers. On some 64-bit systems, a long integer is 64-bits and regular is 32-bits, but long long will force it to use a 64-bit integer.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Recursion can be a very elegant solution to a number of problems, but there are times when reverting to a looping construct instead may be preferable from the performance and memory (stack) usage perspective. It all depends upon how deep the recursion is going to get. This is how I would encode this one:

#include <iostream>

using namespace std;

unsigned long long factorial (unsigned long long x)
{
    return (unsigned long long) (( x==0 ) ? 1 : x * factorial(x-1));
}
 
int main(void)
{
     unsigned long long num = 0;

     cout<<"Enter a number "<<endl;
     cin>>num;
     cout << dec << num << "! == " << dec << factorial(num) << endl;

//     system("pause"); - don't use this - not portable.
     return 0;
}
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Also, if you are interested, 50! == 30414093201713378043612608166064768844377641568960512000000000000
and 100! == 9.332621544e+157, or 9,332,621,544 with 148 extra zeros tacked onto the end.

frogboy77 commented: 93326215443944152681699238856266700490715968264381621468592963895217599993229915 608941463976156518286253697920827223758251185210916864000000000000000000000000 +6
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

For something like factorial operations that typically operate on integer values, whether you want to use double precision floating point values depends a lot on what the largest result value is likely to be. If you use 64-bit integers (long long int), then this is not such a problem, but before compilers supported 64-bit integers, where even a long integer would be a 32-bit values, this was often necessary, as a 32-bit signed integer can only represent a range of +-2147483647, or 4,294,967,295 if you are using unsigned integers. So, the factorial of a fairly large number can easily overflow a 32-bit value. An unsigned 64-bit unsigned integer can be up to 18446744073709551615 - or 19+ digits, which is, for integer values, preferable to double precision (64-bit) numbers which are typically limited to about 15 digits of accuracy, and they suffer from intermediate rounding errors that integers will not.

Note that 20! == 2432902008176640000 will almost overflow a 64-bit integer, and cannot be properly represented with a double. New compilers will support long doubles (128 bits), so the march to ever bigger numbers continues... :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Why not use the Synaptic package manager GUI? Mis-spellings are much less likely...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, first of all, this is not a factorial computation. Second, there is no space between #include and <iostream>. Third, you don't indicate what errors you are getting, although you are declaring (incorrectly) factorial(int n) in your local variable declaration list. It is (probably), an external function, and should be declared before main(), as in:

#include <iostream>
using namespace std;
extern int factorial(int); // Unnecessary in the context of this code.
int main(void)
{
    int num, n;
    cout<<"Enter a number "<<endl;
    cin>>num;

    for(n=num; num>1 ;num--)
    {
        n *= (num-1);
        cout << n << endl;
        system("pause"); // Is this necessary?
    }
    printf("Factorial(%d) == %d\n", num, n);
}
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

1. Install cygwin or Windows Services For Unix (SFU)
2. Tar and compress the Windows file system (you can delete the a lot of cruft first, such as the Windows directory, swap file, etc), and store that on a network folder somewhere, or backup archive.

If someone decides they need to restore some data, you can access it easily enough from the stored file system image. No discs require. FWIW, you might want to do the tar/compress actions when the disc is still in the original system, just in case it has been encrypted and/or compressed. That way, the archive will be in unencrypted (but compresseed) form.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I don't know about Windows, but Linux has the iNotify tools/API's to do this. Anyway, a Google search came up with this: http://stackoverflow.com/questions/760904/how-can-i-monitor-a-windows-directory-for-changes

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It appears that you need to read Knuth, "The Art of Computer Programming" vol. 3, "Sorting and Searching", sections 6.2.3 and 6.2.4 on balanced and multi-way trees.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Kind of a "view only in one directory" user? You can use the usermod command to change their login directory to /home/restricted and learn how to use chroot so that when they login, all they can see of the system is that directory

Anyway, that's about all the time I have for helping you with this topic. I think you are more than 1/2 of the way to where you want to get, but you need to do more reading/studying of Linux user administration to accomplish what you need. There are a lot of online documents, FAQ's, and How-To's that will help. Remember, Google is your friend! Also, the Wikipedia.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you want to allow members of the restricted group to edit (but not delete) specific files, then then owner (or root) can change the group file permissions with the g+w option to chmod on the file: chmod g+w filename

In order for a member of the restricted group to delete or create a file, then the containing directory must have the write permission set as well as read+execute.