davidchilders 8 Junior Poster in Training Team Colleague

@Daave
Are you referring to this book?
http://simplebits.com/publications/bulletproof/

davidchilders 8 Junior Poster in Training Team Colleague

Just because something has not been proven illegal doesn't make it right.

I am not declaring it illegal - but what people do with it often is - and it is a prime vector for malware.

I understand what you're saying and what you're doing and I make no judgement on you personally.

I simply choose to not promote the creation of this kind of network.

Thank you very much and good luck.

davidchilders 8 Junior Poster in Training Team Colleague

Wow. Well. Many of these terms are beyond my vocabulary . . . I'm sure that the fundamental concepts are there somewhere in my mind - but to be honest with you, this sounds more like a leeching, file sharing, peer to peer network something like Gnutella - enabling people to share files illegally.

Peer to peer across a LAN is one thing - peer to peer across the Internet discovering people you don't even know is quite another.

At this point I would like to say that I am sorry. I will no longer help you with a peer to peer network across the Internet. It is not morally correct (in my personal opinion) to do this.

Best of luck with your project.

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

Hello, Afoolery -

Unfortunately, the symptoms you describe indicate that the battery is on its last legs. It's almost dead. Soon, the system will not start up with the battery installed at all because all of the voltage is going to recharge the battery.

You will need a new battery.

Fortunately, there are companies selling replacement batteries at reasonable rates. Here's a search for your particular computer at amazon:

http://www.amazon.com/s/ref=nb_sb_noss?url=search-alias%3Delectronics&field-keywords=everex+SA2050T+laptop+battery&x=17&y=21

I don't know if any of those look like your battery. It's normally good to remove the battery and find the battery model number to get an exact match.

I hope this helps.

davidchilders 8 Junior Poster in Training Team Colleague

Hello, Urataru -

Where are you storing the results of your join? If you are storing them in a new table, you should be able to query that table directly and produce the report you are seeking.

But to answer your question directly, yes. You can have a single report from two (or more) tables.

The simplest way to achieve this is to store the query results in a new table.

I hope this helps.

davidchilders 8 Junior Poster in Training Team Colleague

Your question is too general. We need more details about your project. Visual BASIC has more 'front end' capability than almost any other language I've seen. C++ code is normally used with VB to handle computationally intensive portions of the application.

Please let us know more details about your application and we may be able to help.

Thank you for your question -

debasisdas commented: good suggestion. +8
davidchilders 8 Junior Poster in Training Team Colleague

Could you post a screen shot of the existing layout with sensitive information blanked out?

Dynamic sizing of both rows and columns usually produces the most pleasing results.

davidchilders 8 Junior Poster in Training Team Colleague

Hello, Edith -

Twitter is what is known as a 'Social Networking Site'. This means that individuals can choose to 'subscribe to' or 'follow' other users and what they write on their accounts.

What a person writes on their account is able to be seen by the world, but only those people who are 'following' that person automatically receive those writings.

Please let me know your native language and I can explain in your language.

OR - write your question in your native language and translate it to American English at: translate.google.com

Thank you very much! I hope this helps.

davidchilders 8 Junior Poster in Training Team Colleague

You can find a very simple, small switch for less than $30

http://tinyurl.com/6c3x9m8

Do you have two computers to use?

davidchilders 8 Junior Poster in Training Team Colleague

The simplest peer to peer network consists of two computers, both with their network ports connected to the same switch. (A switch is a hardware device that enables communication between two or more computers or other devices.)

Do you have a budget for your project? Are you going to be using an existing facility?

davidchilders 8 Junior Poster in Training Team Colleague

Even the lightest of programs can cause an error.

Try uninstalling TuneUp 2011 Program Deactivator then test to see if the error persists. If it does not, then contact the vendor for TuneUp 2011 Program Deactivator.

davidchilders 8 Junior Poster in Training Team Colleague

Yes - but be very careful that the SSL certificate is issued for exactly the text string that matches your URL -

Congratulations!

davidchilders 8 Junior Poster in Training Team Colleague

That's why I prefaced my comment about with things like "I may be off base here" and other diminutives to indicate that I have no idea if this is the case or not - however I also presented my personal opinion. No big deal - simply observing a reason why your post languished for two days before I picked it up.

The handling of your particular issue (end user support) is one that Microsoft officially delegates to be handled by the retailer. If you purchased from Costco, then they contractually, with Microsoft, must provide end user support for that copy of Windows.

At the Costco.com web site . . .

http://www.costco.com

Near the top of the page, if you hover over the "Computers" button, the last item listed in the drop down is "Free Technical Support".

I would also have presumed that technical support would be unavailable through Costco, but knowing of the requirement by Microsoft that retailers support the end user . . . I thought it would be worth a look-see . . .

and there it is.

Assume nothing.
Be ready for anything.

I hope all of this has helped - thank you!

davidchilders 8 Junior Poster in Training Team Colleague

AND . . .

I just now lost my Next background image menu item!

I switched back to my default background that has only a single static image. Because it is the only background image available within that scheme the menu item has gone away.

Changing back to one of the Aero themes restores the Next background image menu item.

Now that we know what causes the menu item to go missing, all we have to do is figure out how the theme is getting changed back to a static, single image theme without your consent.

I hope this helps.

davidchilders 8 Junior Poster in Training Team Colleague

Ah! OK - thank you for that information. Now that I'm back at my home computer, I can see exactly what you're doing.

Very interesting. I had no idea that a person could do that.

I also believe that I know why no one answered your post for two days.

Let me start by suggesting that you contact the company that sold you your copy of Windows 7. That's really always the best route to go for advice on how to use Windows 7 and minor problems like this that crop up. If it came on your computer, that would be Dell. Here's a page with all of your contact options for Dell:

http://support.dell.com/support/topics/global.aspx/support/dellcare/contact_technical_support?c=us&cs=19&l=en&s=dhs&~ck=anavml

They most likely have something in their knowledge database that has the answer to your question.

Next, even though it's really simple to choose that menu item, it's not really what it was designed for. And since it's not working for you consistently - you may want to start up Windows Media Player and open the folder that contains all the pictures you want to display. Then it's a simple matter to go to the next picture by clicking the next button (right next to the play/pause button in the center).

I appreciate people who want to participate. And I certainly don't know what the 'rules' or 'norms' are around here - but I thought this was an "IT Discussion Community". To me, personally, the term IT …

davidchilders 8 Junior Poster in Training Team Colleague

Another thought is that menu items sometimes are not presented or 'go missing' depending on the context of what you are doing. What are you normally doing when the menu item disappears?

davidchilders 8 Junior Poster in Training Team Colleague

Why does the number of results returned bother you if the first few results may be relevant to your problem?

There's nothing that says you have to search through every single one for your answer . . .

davidchilders 8 Junior Poster in Training Team Colleague

OK - why would file permissions not work to achieve your goal?

davidchilders 8 Junior Poster in Training Team Colleague

Here's a good one - what is your color pallete set to?

http://support.microsoft.com/kb/935265

davidchilders 8 Junior Poster in Training Team Colleague

Try reducing your search to desktop background

davidchilders 8 Junior Poster in Training Team Colleague

Which operating system is this running on? You could simply set file permissions based on the user account executing the file . . . how to do that depends on the operating system.

davidchilders 8 Junior Poster in Training Team Colleague

I would call that 'White Hat Hacking' and it happens all the time in commercial situations.

Here's a link to something that may be what you're looking for -
http://www.flukenetworks.com/fnet/en-us/products/OptiView+Series+III+Integrated+Network+Analyzer/Datasheets

I hope this helps -

davidchilders 8 Junior Poster in Training Team Colleague

I have no idea because I don't use this at home. I will try to enable it tonight and see what happens. While you wait for that to happen, have you tried searching the Microsoft help site?

http://support.microsoft.com/search/

davidchilders 8 Junior Poster in Training Team Colleague

Your question deals with a very complicated subject. We need more information in order to help.

Who has the authority to answer DNS lookups for your domain 'mysite.com' ?

Who has the authority to answer DNS lookups for your client's domains 'test.com' ?

Where ever these domains are point, that is where the changes / additions will need to be made.

If your domain 'mysite.com' can be reached at public IP address 1.1.1.1 then your client will need to map their domain 'test.com' to the same public IP address.

Then, the web server that answers at that address will need to be configured to respond to 'test.com' in addition to 'mysite.com'.

But these are just the basics - if you could let us know more details, such as the exact domains, we can answer with more details.

Thank you!

davidchilders 8 Junior Poster in Training Team Colleague

We will need some more details to try to help you.

Do you have disk quotas turned on? Is this device on a domain? Are any other programs complaining of hitting quota restrictions when attempting to save anything else?

Please let us know some more details and we can see if we can help.

Thanks!

davidchilders 8 Junior Poster in Training Team Colleague

It would help to have more details about your peer to peer network plans.

Are all the devices of one operating system?

Are all the devices on the same physical network? (LAN)

Are you planning on sharing file? Files and printers? Streaming media between them?

Please answer these questions and we can get to work . . .

Thanks!

davidchilders 8 Junior Poster in Training Team Colleague

That's interesting - and a very similar method to WiFi tethering.

However, one small detail that the article is missing is to tell you that your computer (presumably a laptop) must also have a BlueTooth adapter installed in order to communicate with your phone.

Other than that small but important detail, it's a good tutorial . . .

thanks for sharing!

davidchilders 8 Junior Poster in Training Team Colleague

Keep in mind that the users in MySQL are different and totally separate from the operating system users, even if they are named the same. So, when you are logged into the mysql command line system with the first account user ''@'localhost' you are starting the command line system without declaring a user. Try this:

shell> mysql -u root -p

Since you most likely have not set a password for the MySQL root user, simply press the enter key.

When you are failing to start the mysql command line system as the operating system root user, you still need to pass MySQL a username (as seen above).

The reason you can access the test datbase is that any databases or tables or anything that you are allowed to create as a particular user will be available to that user. And EVERYONE has access to the test database. That's why it's a good idea to drop that database as soon as you can.

There are lots of good resources out there on the Internet regarding getting started with MySQL. Here's one that I use every day:

http://dev.mysql.com/doc/refman/5.1/en/index.html

Remember to start at the beginning, go slow and have patience. MySQL is not something you can learn in a day and be effective at using it. No real DBMS is.

I hope this helps -

davidchilders 8 Junior Poster in Training Team Colleague

I think we need more details in order to help.

For example - you initialize your variable to the of 4

Is there an entry for idProduct that matches the value of 4?

Also - and perhaps most importantly - what is the exact error message you are receiving? A copy and paste of that message would be most helpful.

Thanks!

davidchilders 8 Junior Poster in Training Team Colleague

Cool. Thanks for the review -

davidchilders 8 Junior Poster in Training Team Colleague

We need more details and information in order to answer your question.

Legally? I would have to ask the folks at Google about that. I know that technically, it should be possible to copy and paste the information . . . but yeah - I'd check with Google to see what they say. If this is a purely educational project (high school, university, etc.) then I believe even copyrighted information is fair use.

So, please provide more details and we may be able to answer your question better.

Thank you!

davidchilders 8 Junior Poster in Training Team Colleague

The only document that I am familiar with is the PCI data audit guide. It's supposed to relate to cardholder data, but the audit covers really good basic security details.

Maybe you could look at the organization of the audit elements to help focus your organization of the data you're gathering.

Hope this helps.

https://www.pcisecuritystandards.org/pdfs/pci_audit_procedures_v1-1.pdf

davidchilders 8 Junior Poster in Training Team Colleague

Typically, the entity that has responsibility for the public IP address space that you're using would set up the PTR record in their DNS for you. This is most often an ISP or telco carrier.

You can set up your own PTR record, but since your name server isn't authoritative for that IP range, it would most likely not provide the confirmation that other mail servers are looking to receive. They are going to trace down from the root name servers to the assigned entity for your IP space. You can find that by doing a whois lookup at this web site:

https://www.arin.net/

Search whois is in the upper right corner.

Enter your router's public IP and you will be able to see who has responsibility for that address. Contact them to submit your request for the PTR record.

Not sure about the Webmin interface - I've never used it myself. Sorry about that.

I hope this helps -

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

That sounds highly unusual. Have you contacted Sony's tech support for this?

It may be a driver issue. One thing I've found on my netbook running Windows 7 is that if I don't have a component connected to the netbook at boot time, it won't work right if I plug it in after boot time.

Try connecting your headphones to the netbook when it is powered down. Then start the netbook and see if the headphones and left touchpad click work correctly. If they do, then it would seem to be this strange anomaly that I've seen on mine.

I hope this helps -

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

I think the reason that no one has replied to this message is that just about any laptop with enough memory and processor power will do.

Which operating system are you running? Is there a version of your programming and web development tools that run on Linux? I've found that Linux is much less of a drain on system resources. However, some tools run only on certain platforms so you may be limited as to which OS you can run.

Windows 7 has been such a huge improvement over previous versions of Windows - it's worth considering as well.

So, really, just about any computer you can afford that represents the best value in memory and processor speed should work just fine.

I hope this helps -

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

It's very difficult to tell without more information.

When I am troubleshooting email problems, I like to test each link of the process individually. That way I can eventually arrive - at least - where the problem is located. That way I can apply my attention to the proper component instead of having to consider the entire chain at once.

First of all, let's have a look at your domain name and how it stacks up at www.dnsstuff.com:
http://www.dnsstuff.com/tools/dnsreport?domain=wattzup.com&format=raw&loadresults=true&token=15211bcd8a853d343097ca1b2f18e016
(link valid for 7 days)

As you can see, there may be a problem with remote mail servers connecting to your email server.

Check your firewall settings to ensure that there is a rule allowing traffic (only) from the public IP of your firewall to the internal IP address of your mail server on port 25. (For additional security you can also configure your mail server to use an alternate port and shift the port from 25 on the public side of your router to the alternate port on your mail server's internal IP address.)

THEN - the really bad part is - if your sender's mail server is configured properly, they will never ever even attempt to connect to your email server because your public IP address does not have a reverse lookup entry at your IP address provider. (ISP)

This is normally used when accepting connections from your mail server . . . but a lot of mail servers are …

davidchilders 8 Junior Poster in Training Team Colleague

I'm not sure exactly what's going on here - but the first thing I would try is connecting both USB flash drives to the system at the same time. Backups write what is called a 'catalog' file that keeps track of what was backed up and which device was used to backup your stuff.

Another (less happy) thought is that, if you removed your USB flash drives from your old computer without dismounting them using the 'Safely Remove USB Device' tool tray application, you may have caused some file corruption to your backup. In this case, you may never be able to restore your files and settings.

But try connecting both USB flash drives first and see how that goes.

I hope this helps -

davidchilders 8 Junior Poster in Training Team Colleague

I could use some more information - when you say "Tune Up Process Manager" are you referring to the Performance Troubleshooter? Or is this a third party application?

Thanks!

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

A dead battery is the only thing I can think of that would reset the system clock each time that it is rebooted.

Just because you bought the computer three to four years ago doesn't mean the battery didn't sit around on a shelf waiting to be installed in the computer. Also, there may have been a manufacturing defect in the battery that caused it to lose charge over time.

Don't waste your time wondering why - replace the battery and get on with your computer using happiness! :-)

I hope this helps!

davidchilders 8 Junior Poster in Training Team Colleague

There should be an item on your menu bar at the top of your screen that says "Finder".

There should be a menu item under the Finder menu that says "Preferences".

There should be an "Advanced" item and under there should be a check box to "Show all file extensions".

With that selected, you should now be able to see the complete filename of all the files.

When you empty the trash, all files in all of the .Trash folders will be emptied.

I hope this helps -

davidchilders 8 Junior Poster in Training Team Colleague

Hi Sally -

If I were in your shoes, I would take the external drive to another Mac and see if it can be mounted there. IF it can be mounted, I would then IMMEDIATELY copy the student's projects onto another drive before doing anything else.

I can't believe how many people still fail to make backups of their backups.

If the information you are storing is valuable, then make more than one extra copy of it. The question is not IF your hard drive will fail - it's WHEN will your hard drive fail.

No matter what you wind up doing, do NOT format the disk.

Typically when this error message is encountered, it is because there are files that are 'open' on the disk. The state of a file being 'open' or 'closed' is actually a series of bits that the computer uses to identify the current 'state' of the file.

If a file is flagged as 'open' then the drive cannot be unmounted.

Sometimes, restarting the computer can cause the operating system to 'close' the 'open' files and things can get back to normal.

If restarting the computer still results in files that are marked as 'open' then you may need to start your computer from your MacOS X Install disk and run the Disk Utility from there to repair the drives.

I hope this helps - and best of luck recovering your students' work -

davidchilders 8 Junior Poster in Training Team Colleague

Have you scanned your computer for malware lately, Roy? Just sayin' . . .

It's still there for me -

davidchilders 8 Junior Poster in Training Team Colleague

OK - that's helpful. Thank you.

If you set your variable $search to be equal to test (which you did in line 1. above)
then indicating that you want MySQL to search for the keyword like '%$search%' . . .

well, that would return both results.

Why? Because when you encapsulate $search (which you set to test) with % at the beginning and % at the end - it will match ANY form of the string text with anything before it and anything after it.

%test% = test1, test2, test3, test, test9, zebratestjayhawk, sillystringtestmessy, testiment, testing . . . etc.

ALL of those (and infinitely more!) = %test%

So, your query is working just fine. You just aren't getting the results you're after.

1) Why are you setting the variable $search to "test" ?
2) Why are you assigning the value "test" to entities that you want to return discreet values?

Thanks!

I hope this helps -

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

Hmm. That's strange, Roy. I was able to see the graphic by following the link:

http://img524.imageshack.us/img524/6939/problemafontsistema.jpg

It's just that I could not read the error, even after zooming all the way in.

davidchilders 8 Junior Poster in Training Team Colleague

Have you posted this question in the C programming forum?

This really has very little to do with MySQL (your MySQL syntax "select Name from table8 where id = %d" seems correct). Your problem lies with how C is handling the character type that is returned.

I hope this helps!

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

I'm not familiar with the implementation at the godaddy.com site -

however -

the most common problem with stored procedures that I see are when the USER ACCOUNT that you're using to call the stored procedure does not have EXECUTE privileges for the resource(s) related to running that procedure.

This gets especially sticky when nesting stored procedures as you need to evaluate privilege grants for ALL resources involved.

I hope this gives you a clue as to where to check next -

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

We need more information to be able to help you in a specific manner, but the query statement would generally look something like:

mysql> SELECT * FROM <database_name.table_name> WHERE <column_name> LIKE 'test1';

This is basic SQL query structure and will apply to any database management system.

Presuming that you are using MySQL, there is a TON of very helpful, basic information available at the MySQL Community web site. Here's a decent starting point for you:

http://dev.mysql.com/doc/refman/5.1/en/index.html

I hope this helps!

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

Good question!

You should be able to use your disk utility that comes with your mac to create -- and then mount an image of your disk using the same utility.

In disk utility, go to File then choose New. Select Disk Image From and then save it out to a file. You should be prompted to mount the new disk image if you want as part of the process or simply start over at File then Mount Disk Image.

I hope this helps!

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

The image you provided in the link is too small to read.

Please either take the screen shot again, or simply type the error message into the thread.

Thanks!

/David C.

davidchilders 8 Junior Poster in Training Team Colleague

Once you get booted to your desktop, open your computer location and look at the folders. I'd be willing to bet that you see more than one System folder.

You probably installed a new 'instance' of MacOS in addition to the one that is already there with all your files.

Here's an excellent article at the Apple support site that covers the step-by-step procedure for 'pointing' your operating system back to the original System folder:

http://support.apple.com/kb/TA21672?viewlocale=en_US

I hope this helps!

/David C.