Wikipedia:Reference desk/Archives/Computing/2007 August 9
From Wikipedia, the free encyclopedia
Computing desk | ||
---|---|---|
< August 8 | << Jul | August | Sep >> | August 10 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
[edit] August 9
[edit] Old Hard Drive Blues: need help.
Hey - So just for kicks, I'm trying to install a second internal drive into a 2000-built Gateway desktop. I finally have figured out how to get everything connected - but now the FIRST internal drive, the one that was in the computer in the first place, isn't working. In fact, it isn't responding at all - when I boot up the system from CD (and manage to get the DOS prompt), every time I try to queue the C:\ drive, I get a "General Failure Error Reading Drive C:\." So is there any hope here? Is there any chance at all the drive isn't completely fragged? Any advice anyone can give me? Thanks. Brasswatchman 00:55, 9 August 2007 (UTC)
- Have you set the additional drive links for slave operation? And have you gone into the computer bios to set it for 2 drives?--SpectrumAnalyser 01:10, 9 August 2007 (UTC)
-
- I believe so. The second drive was salvaged from another system, where it was already a slave drive. And the BIOS seemed to recognize it as such from the moment I installed it. Maybe I need to change the jumper setting on the master drive? Is that generally required in these situations? --Brasswatchman 01:14, 9 August 2007 (UTC)
-
-
- Check the links on both drives. One should be set for master, the other for slave. (Do not set for cable select, just to be safe). If you know the drive manf and the model no, you can look on their website for the link settings. Failing that, disconnect the new drive and reset the bios and see if your old drive still works.--SpectrumAnalyser 01:21, 9 August 2007 (UTC)
-
-
-
-
- Did all of the above. When it still wouldn't boot, I took your advice, disconnected the new drive, and tried it again. And guess what - a new and exciting error message that hadn't been there before:
ERROR | Expansion ROM not initialized - PCI Mass Storage Controller in slot 03 | Bus:00, Device:0F, Function:00
- Did all of the above. When it still wouldn't boot, I took your advice, disconnected the new drive, and tried it again. And guess what - a new and exciting error message that hadn't been there before:
-
-
-
-
-
- In addition - thank you very much for your help. Didn't mean to sound rude in my last post, if I did; I'm just a wee bit frustrated at the moment. :) --Brasswatchman 02:59, 9 August 2007 (UTC)
-
-
-
-
-
-
- Never seen that massage (maybe specific to Gateway computers) Message seems to say that your HDD controller is not working. It may be that in your 'experiments', you have disturbed the seating of one of the plug in boards (or maybe the RAM modules). Make sure all daughter boards are firmly seated esp the one in slot 3!(remove and reinsert). If this dont fix it, it sounds like a new HDD controller board job.--SpectrumAnalyser 14:27, 9 August 2007 (UTC)
-
-
-
[edit] Cannot get internet
There are two computers on my network. One gets internet, the other doesnt. The one that doesnt clames that the network adapters are on and connected. This is what I get when i tell it to repair the network. When I run the diagnostics, I get this. Thanks for your help, the parentals are getting pretty ticked because its the family comp that wont work.
Thanks --Omnipotence407 02:10, 9 August 2007 (UTC)
- What kind of home network do you have? Is it one of those home routers? It appears that the one that doesn't work is expecting DHCP and not getting it. -- Kainaw(what?) 02:15, 9 August 2007 (UTC)
Im afraid I dont follow. As far as im concerned, its cat5 wire hooked to a Linksys Router. --Omnipotence407 02:26, 9 August 2007 (UTC)
- So, you have a Linksys router for your network. Assuming that it hasn't been messed with, is still in DHCP mode, and is working properly, have you checked the network cables. It appears that the computer that does not work is expecting DHCP and not getting it. In other words, the computer that is not working is turning on the network card, screaming out "Hello! Is there anybody out there?", and not hearing anything coming back. What it expects to hear is the router saying "Well hello there! You're cute. I think I'll call you 192.168.1.112. If you need anything off the Internet, just ask and I'll fetch it for you." -- Kainaw(what?) 03:27, 9 August 2007 (UTC)
- You might try Wikihow.com - Pharrar 08:18, 9 August 2007 (UTC)
- More like: "You will be named 192.168.1.112. If you hear me ask of you and your friends 'ok whos 192.168.1.112' you must reply with your hardware address so that I can make a connection for you. If you need anything you can reach me at 192.168.1.1. I'll be your gateway and DNS server. Have a nice day" --frotht 16:26, 9 August 2007 (UTC)
None of the above has really offered any suggestions on how to fix it. Is there a solution? --Omnipotence407 23:53, 9 August 2007 (UTC)
- The message "failed to query TCP/IP settings of the connection" sounds like you need to check the TCP/IP settings of your connection. Right-click on the Local Area Connection icon and click Properties. Make sure Internet Protocol (TCP/IP) is checked, then highlight it and click the Properties button. Make sure it's set to obtain an IP address automatically and obtain a DNS address automatically.
- If that doesn't work, a brief search for the error message turns up mentions of reinstalling TCP/IP or using System Restore to get things working again. This page says "if you are using XP you do not have the option to uninstall TCP/IP so you have to reset it from command prompt: netsh int ip reset."
- --Bavi H 04:59, 10 August 2007 (UTC)
- I just tested on my sister's Windows XP computer. I was able to re-create the error message by unchecking Internet Protocol (TCP/IP) and then trying to Repair, so I'm pretty sure the solution involves checking that box to get it working. --Bavi H 05:14, 10 August 2007 (UTC)
Well, it turns out htat the computer had been flagged by the office, as the account had never been set up, only installed. So we got a little over a week of free internet. Thanks for all your help Omnipotence407 21:50, 10 August 2007 (UTC)
[edit] Error Message
I am getting this error message every couple minutes. I have run CCleaner and that hasn't worked. What can I do to stop this pestilence. (I'm sorry, but its running ME) --Omnipotence407 02:15, 9 August 2007 (UTC)
- Running any app that's trying to access that file? And I would suggest a switch to a Linux distro :P. Splintercellguy 03:19, 9 August 2007 (UTC)
I dont know. Anything besides linux? --Omnipotence407 23:49, 9 August 2007 (UTC)
-
- Open the file in Notepad or edit or something, it MUST start with a string of text that identifies it as a registry file. If it doesn't have that, Regedit will refuse to have anything to do with it. 68.39.174.238 02:00, 10 August 2007 (UTC)
So should I add that string of text? What would it be? Thanks --Omnipotence407 11:25, 10 August 2007 (UTC)
Heres the file. Do I even need it? I dont have McAfee. [User:Omnipotence407|Omnipotence407]] 14:22, 10 August 2007 (UTC)
-
- That's no Registry file, that's a website (Rename it to "common.html" and open it in a browser)! Anyway, for some reason something's trying to add that to the registry. I would check your list of running programs. 68.39.174.238 17:02, 10 August 2007 (UTC)
[edit] What's the secret?
Hello. Inkjet refill stores can always successfully refill my cartridges. However, when I try refilling my cartridges with self inkjet refill kits, I am not so fortunate. What is the inkjet refill store's secret? --Mayfare 02:50, 9 August 2007 (UTC)
- Maybe they're really good at it? --frotht 16:16, 9 August 2007 (UTC)
- This is a wild guess, but maybe they use a vacuum system to distribute the ink better? At home, all you can do is add the ink slooooowly. --Mdwyer 16:53, 9 August 2007 (UTC)
[edit] Mac OS X backup
Does anyone know of any software utilities (preferably free) that backs up all the files on the computer that differ from the default when installed? I'm thinking of reinstalling the OS (because my computer is going really slow (i.e. taking five seconds to minimize a window)). If anyone has any ideas on how to speed it up, those would be appreciated too.
I forgot to sign above, but I do want to confirm that I have Mac OS X Version 10.4.10. Abeg92contribs 12:59, 9 August 2007 (UTC)
- The easiest way to backup your files in OS X is to just copy the Users, Application, and Library folders to an external drive. I don't know of any software that can distinguish between originally install files or not.
- As for the speed, how fast is the processor and how much RAM do you have? The easiest way to speed things up might be to just upgrade the RAM, but if the processor is too slow for 10.4 then that won't help much anyway. I would take a look at the Activity Monitor to figure out what is going on, personally — what programs are hogging the CPU time and the RAM? Should they be? --24.147.86.187 14:50, 9 August 2007 (UTC)
[edit] Wiki
Hi
I want to set up a file sharing wiki for my class for studying from/getting information to study. I'm a bit overwhelmed by the options available. It needs to be easy to use, have a big data allowance and probably almost up to 50 members (and FREE). Any suggestions? Aaadddaaammm 03:15, 9 August 2007 (UTC)
- Yes. Click the "Powered by Mediawiki" button at the bottom of this page. Download and install Mediawiki. It is a Wiki and it allows you to upload/download files (even though Wikipedia is pretty much limited to images - Mediawiki can allow any file type). -- Kainaw(what?) 03:34, 9 August 2007 (UTC)
-
- Thanks for the reply, but I was hoping for a wiki hosted by someone else. I don't want the hassle of setting it up too much - and don't want to leave my computer plugged in all the time. Any suggestions that fit this? Aaadddaaammm 04:13, 9 August 2007 (UTC)
- I had some reasonable success with pbwiki, though I haven't checked any of the alternatives. Anyway, they make it really easy to create a wiki, so you could see how it works. -- Creidieki 08:15, 9 August 2007 (UTC)
-
- I'd be willing to host this for you on my website, if you need. -Wooty [Woot?] [Spam! Spam! Wonderful spam!] 20:25, 9 August 2007 (UTC)
If you can trust everyone in your class not to be jerks (delete files, change the password) then make a gmail account and upload all the files as attachment as send them to the account. The give the username and password out to everyone. Jon513 19:58, 12 August 2007 (UTC)
[edit] necessity of Diffie-Hellman key exchange?
What's the point of all the math and stuff? Why don't the two parties just send each other their public keys in plaintext, use the other persons public key to encrypt outgoing data, and use your own private key to decrypt incoming data? Why do you need a "shared secret key" which sounds like a terrible idea compared to the staggering security of simple asymmetric cryptography? And why do they use g^b^a=g^a^b instead of g*a*b=g*b*a or g+a+b=g+a+b which are equally commutative?
Also in the example that shows what Eve knows, how is 's' hidden from her? Both (8^15 mod 23) and (19^6 mod 23) were sent to the other party.. that's the secret 's' completely out in the open twice.
Finally what exactly is the point of all this? I see that 's' is their shared key (presumably their data exchanges could be XORd with s or shifted s bits or some similar algorithm), but the article repeatedly claims that it's an asymmetric key exchange, with public and private keys... I don't see that at all --frotht 03:32, 9 August 2007 (UTC)
- The point of this is that public/private key encryption/decryption takes longer to process than a simple key. For speed's sake, you agree on a shared key and use a fast form of encryption/decryption. Then, it is not an asymmetric exchange anymore since both sides have the same key. Why the powers functions? Because they work. It isn't simply because they are commutative. This gets into public-key encryption (RSA), not Diffie-Hellman. What it comes down to is that with mod there are an infinite possible set of answers. If I said "What number mod 5 gives you the answer 1?", you could answer, "1, or 6, or 11, or 16, or 21, or 26..." Now, if I said "What number times 5 gives you the answer 15?", you could answer "3". If I asked "What number divided by 5 gives you 3?", you could answer "15". See how commutative properties isn't the issue? Then, you can see that by passing the answer to the mod function isn't handing out the answer because there are so many possible answers. -- Kainaw(what?) 03:45, 9 August 2007 (UTC)
-
- This seems extremely vulnerable to a brute force attack, especially as g and p are known to eve. All she'd have to do is run through all the combinations of a and b. Firstly I don't see how this is such a theoretically difficult problem- if you have enough time or a fast enough guesser, it's cracked with just two runoff nested loops. And secondly I don't understand how cpu performace is that big of an issue here. The D-H exchange takes several hops back and forth across the network, and that's certainly more expensive in terms of time than just swapping precomputed public keys and using a bit more power to process data, which can be done afterwards anyway --frotht 14:29, 9 August 2007 (UTC)
-
-
- In real applications (as opposed to toy examples for illustrating the calculations), the parameters g and p are of such sizes that solving the discrete log problem by exhaustive search is infeasible (and, for that matter, the parameters sizes are chosen such that the solving problem remains infeasible even with the most efficient discrete log algorithms known). We're talking about sizes like 2048 bits in length. --64.236.170.228 15:00, 9 August 2007 (UTC)
-
-
-
- The key-exchange handshake only takes a few KB to complete, while the actual data exchange could be arbitrarily large, so for the common case of the data transfer size exceeding the handshake size, trading keys for symmetric encryption is a win over using the public-key crypto. --Sean 17:23, 9 August 2007 (UTC)
- What does that matter? The actual data exchange is still the same size. So the symmetric handshake takes much longer, is less secure, but is somewhat less cpu-intensive to encrypt/decrypt. Asymmetric is a very simple quick handshake, is rock solid secure, and is somewhat more cpu intensive, but the network is still the bottleneck --frotht 19:43, 9 August 2007 (UTC)
- There are several reasons one may want to use the Diffie-Hellman protocol. One reason is to provide perfect forward secrecy. Another reason is that analogs of D-H can be implemented using groups other than under modular multiplication. One example of an alternative choice of group is the points on an elliptic curve, under point addition. W.r.t. the best known algorithms, the analogous discrete log problem for some groups may have higher computational complexity, which can translates to practical efficiency (both in terms of computation & data size). --64.236.170.228 20:08, 9 August 2007 (UTC)
- Asymmetric encryption can be *thousands* of times slower than symmetric encryption, not just "somewhat" slower. The network can not be assumed to be the bottleneck: imagine an e-commerce site with thousands of concurrent encrypted connections. Using a technique 1000 times slower can be the difference between a request taking 100 milliseconds and 100 seconds. Sorry, but performance matters, and it always will. Systems that can't scale up and down tend to be uninteresting. --Sean 23:03, 9 August 2007 (UTC)
- What does that matter? The actual data exchange is still the same size. So the symmetric handshake takes much longer, is less secure, but is somewhat less cpu-intensive to encrypt/decrypt. Asymmetric is a very simple quick handshake, is rock solid secure, and is somewhat more cpu intensive, but the network is still the bottleneck --frotht 19:43, 9 August 2007 (UTC)
- The key-exchange handshake only takes a few KB to complete, while the actual data exchange could be arbitrarily large, so for the common case of the data transfer size exceeding the handshake size, trading keys for symmetric encryption is a win over using the public-key crypto. --Sean 17:23, 9 August 2007 (UTC)
-
[edit] Downloading Files on XP SP2
Is it possible to download files on WINXP with SP2 from sites such as rapidshare, as an object blocked message appears.59.92.244.178
- You need to be far more specific. Of course you can download files on winxp sp2 from rapidshare. What program are you using and what exactally is the message.--Dacium 05:20, 9 August 2007 (UTC)
- Try using a non-Microsoft browser like Firefox if you are getting annoying security warnings that you can't seem to disable. --24.147.86.187 14:53, 9 August 2007 (UTC)
-
- Well the same seems to be happening with Firefox too.Its just that I cant download a file unless I get the direct link (which I can right click and select "save as")...~~
[edit] Java Programming:Bytecode
What is the difference between bytecode and machine code? I only know bytecode is produced by software and machine code is produced by hardware but what is the difference in the code produced? I have just started learning Java so it would be better if you explain this to me with reference to Java.
- (Duplicate question on bytecode removed) -- SGBailey 05:26, 9 August 2007 (UTC)
- Bytecode runs on a virtual machine, machine code on a real machine. -- SGBailey 05:26, 9 August 2007 (UTC)
- Machine code is not "produced by hardware," it is produced by software, e.g. a compiler. As SGBailey says, it runs on "a real machine", aka hardware. For example, when a program written in C is compiled, the output is a file containing instructions that are processed directly by the CPU. When a Java program is compiled, the output is a file containing instructions that are processed by the virtual machine, which is just another program which has been written to translate the bytecode into machine code. This is why there are different Java packages for PCs, Macs, etc. Operating systems come into play also, since many of the Java functions will ultimately call OS specific libraries, so you'd have different Java implementations for a Windows PC versus a Linux PC. --LarryMac | Talk 14:22, 9 August 2007 (UTC)
-
- Java bytecode is just machine code for a processor which was only implemented in software at the time of its design. There is nothing to prevent hardware implementation of the same instruction set architecture. (I think at one point, Sun Microsystems actually had a Java chip that would execute Java bytecode natively.) On the other hand, machine code for real microprocessors can be executed on software emulators. --64.236.170.228 14:34, 9 August 2007 (UTC)
-
-
- That's interesting- was it just a JVM implemented in hardware and attached to an existing chip, or could it actually natively run java bytecode? I thought java bytecode still had to be pretty heavily processed by the JVM before it's proper simple machine code, and that's why it's so slow.. --frotht 20:00, 9 August 2007 (UTC)
-
-
-
-
- Not having studied the JVM specification, I don't know if there's anything in it that makes bytecode execution inherently slow. The slowness of bytecode execution on software JVM might be the result of simulating a foreign VM on architectures not well-suited for the task. Even for real microprocessors, machine-language instructions may be implemented by microcode. I'm not sure if Java bytecode instructions are worse (in that they require more low-level operations to implement) than the most complex instructions of modern microprocessors with CISC instruction sets. Transmeta's Crusoe processors apparently were able to implement the x86 instruction set quite efficiently. It seems, at least in theory, they should be able to implement Java bytecode efficiently too. --64.236.170.228 20:32, 9 August 2007 (UTC)
-
-
- Machine code consists of instructions fed directly into the processor. This is the computer's native language- things like "move what's in register A to register B" expressed by 'opcodes' that tell the processor what to do. These are typically very simple instructions like add subract multiply divide jump load compare, etc, that add up hopefully to something useful. You can program directly in machine code (or a step away in assembly language, which is machine code but with symbolic names and you can for example use the word JNE instead of 0102 0129 or whatever the opcode for jne is) but it's extremely difficult on full scale computer processors due to high complexity and the prefetch input queue which is usually taken care of by the compiler. Java bytecode is simply an arbitrary language similar to machine code that the Java Runtime Environment reads like a script and executes machine code corresponding to the 'script' it's reading. This makes java highly portable since to port a java program to another platform you don't need to recompile, you just need to have the bytecode read by a JRE written for your destination platform and it should run similarly. --frotht 19:56, 9 August 2007 (UTC)
[edit] Another problem with the Windows Movie Maker...
I am enjoying Windows Movie Maker, without any codecs checked. But there is a nother problem...when I drag down a picture to the timeline or storyboard, the SAME error comes up as the one with any codec checked, and this error appears for pictures with the codecs unchecked! How can I fix the problem?
[edit] Finding out library dependencies of a Windows application
Is there a way to find out, using freely available tools only, the library dependencies of a Windows application? (I'm trying to understand why the Windows version of an open source application does not work on one particular machine. The same application works correctly on most Windows machines but I've been unable to determine what library version and/or configuration differences might have caused the problem.)
- Dependency Walker (depends.exe) Angus Lepper(T, C, D) 14:32, 9 August 2007 (UTC)
[edit] help! lost data!
Hello, I have a memory card that has gone corrupt and I need some free ware means of getting it back. Thank you very mush and I appreciate all solutions... Lmc169 14:46, 9 August 2007 (UTC)
- Have you tried 'Drive Rescue' Its free ware and very powerful. Google it, download (1M), install and run! You can recover most files with it from any drive on your system.--SpectrumAnalyser 15:00, 9 August 2007 (UTC)
- memory cards are still that good old DOS FAT directory structure; all the same utilities that retrieve files on FAT hard drives and floppies work on them. (so i hear; haven't tried it myself)Gzuckier 16:22, 9 August 2007 (UTC)
- Thats correct, but presumably Lmc doesnt have any of these tools?--SpectrumAnalyser 16:49, 9 August 2007 (UTC)
- Try TestDisk? Splintercellguy 17:20, 9 August 2007 (UTC)
-
- Wow. only expecting one response here. Thanks very much everyone but for teh moment Drive Rescue is doing it on albeit locking up its interface. When it does lock up though it still carries on working. ill try out the other methods. Thanks for putting an end to a very stressful day! Lmc169 19:29, 9 August 2007 (UTC)
-
- PhotoRec would probably work better. --cesarb 00:05, 10 August 2007 (UTC)
- Isnt PhotoRec part of TestDisk already?--SpectrumAnalyser 00:47, 10 August 2007 (UTC)
- PhotoRec would probably work better. --cesarb 00:05, 10 August 2007 (UTC)
[edit] Need passive RFID locator system
My Dad is getting senile and loses things right and left. I got a regular key finder system but it was not satisfactory because each tag had a battery in it that quickly went dead. The problem is, once they go dead, you can't locate them to replace the battery ! So, I decided what would be ideal is a passive RFID system with dirt cheap, disposable tags and a base unit that can point to the direction and range to each selected tag. The cost of the base unit is less of an issue (although I probably need to buy a pair of those as he will no doubt lose one), but I'd like one under US$100 if I can find one. I've done some Internet searches but the only passive RFID systems I've found seem set up for large-scale businesses (like clothing retailers). Does anyone have a home system to recommend (or even one for a small warehouse) ? StuRat 18:27, 9 August 2007 (UTC)
-
- I believe they use active RFID tags, which still leaves me with the problem of the batteries in the tags going dead in short order. StuRat 20:02, 9 August 2007 (UTC)
-
-
- I don't the largest range you will find on a batter-less RFID tag is about 8 meters. There are no directional finding systems for this either as far as I know because it is assumed the distance is so small. Your best idea would be to find one that is solar powered or motion powered etc.--Dacium 00:13, 10 August 2007 (UTC)
-
-
-
-
- 8 meters sounds like more than enough for a portable locator, if he could take it from room to room and get a direction and distance when it's in the room. StuRat 07:22, 10 August 2007 (UTC)
-
-
-
- What type of things is he losing? Just his keys? Why not try a low tech solution, like put a small decorative bowl in a strategic position in each room, tell him the ONLY place he is allowed to put his keys down is in one of the bowls, I know it's hard to teach an old dog new tricks, but if he makes a habbit of using the bowls for his keys, if he sticks to the rule, at most he'll only have to search a few bowls. Vespine 00:41, 10 August 2007 (UTC)
-
-
- I've tried that, and no, it doesn't work, he just drops whatever he is holding wherever he is at the time. He loses everything; his keys, wallet, medications, etc., on a daily basis. StuRat 07:22, 10 August 2007 (UTC)
-
-
-
-
- Another low-tech solution idea: attach a broad, bright-colored lanyard to his keychain. This gives it a long "tail" and makes it more difficult to "hide". --71.175.69.118 12:54, 10 August 2007 (UTC)
-
-
-
-
-
-
- In the past we've found stuff down under couch cushions, under a pile of clothes, etc. His ability to bury things is amazing. Also, if he can't fit stuff in his pockets that would make it even more likely he would put it down and lose it. StuRat 14:18, 10 August 2007 (UTC)
-
-
-
-
-
-
-
-
- (sorry, slightly off topic) My late grandmother suffered with alzheimers for many years. She lost many things including important documents and items of great sentimental value. We would often find them in the strangest places, hidden in the back of wardrobes or under the mattress for example, but she never had an explanation as to why she had put her things in such strange places. I always thought the best approach was to simply look for the things she had lost. If I found it, I would say "found it" with no further explanation or questioning as to why the gas bill was inside a pack of frozen food in the freezer. If I couldn't find it, I would suggest that perhaps I could come back another time to look for it again.
- If we were unable to find something, it would either mysteriously show up some time later and she would deny ever having lost it, or she would accuse people (including family members) of breaking into her apartment and stealing it. I guess what I'm getting at here is you need to be aware that the condition is debilitating and can cause a great deal of stress and confusion for sufferers and family members alike.
- 90.240.111.20 03:03, 12 August 2007 (UTC)
-
-
-
-
-
-
-
-
-
-
- But some of this stuff is of critical importance, like his insulin. He could die if we can't find it quickly, when his blood sugar spikes. My usual strategy of getting several backup copies of critical items, like keys, doesn't work here, as docs only prescribe small amounts of many meds, because they expire quickly (insulin) or can be abused (antibiotics) or resold for profit (epoetin). StuRat 14:17, 12 August 2007 (UTC)
-
-
-
-
-
Well, I guess nobody offers what I need. I did find a South African company named Trolley Scan [1], but they want some US$3000 to start and US$4.20 per tag. Also, each tag is too big (credit card size) and the locator seems to give output as text data that still needs to be put into graphics form by a user program. I guess I'll have to buy the crappy active RFID system and replace all the tag batteries once a month (at considerable expense) so they don't get a chance to go dead. StuRat 23:33, 12 August 2007 (UTC)
[edit] Powermac G4 HDD Upgrade
I just purchased a powermac g4 dual 450. I have a larger 80gb drive that I would like to install into it and use it as the MAIN drive. (startup disk) The only problem is that no system disks were included. Is there anyway I can do this. Note: I can have both drives connected to the computer at the same time. BTW I am running 10.4.10
-
- You can use Super Duper or Carbon Clone Copy to duplicate your startup drive to your other drive to make a bootable volume. --24.249.108.133 18:37, 10 August 2007 (UTC)
[edit] Namespaces
I've made a wiki but I don't know how to create new namespaces. If it makes a difference I used EditThis.info to create my wiki.--WikiEarth 21:01, 9 August 2007 (UTC)
When I go to EditThis.info, I get nothing but a "Login required" error that never goes away, but I'm going to assume the idea is that they set up a MediaWiki for you.
Creating a new namespace requires changing things in a configuration file on the server, LocalSettings.php. Assuming that EditThis.info doesn't actually give you access to the server -- which I rather doubt a free service would do -- then you're stuck unless they've given you some other way to make a namespace over the Web. rspeer / ɹəədsɹ 23:07, 9 August 2007 (UTC)
[edit] bots
i would like a person to show me how to make a bot. if you know anybody who can please tell me at my talk page. thanks. Smithcool 22:00, 9 August 2007 (UTC)
- Wikipedia:Creating a bot is a good place to start. --h2g2bob (talk) 02:20, 10 August 2007 (UTC)
- A Wikipedia bot? An IRC bot? A bot that plays first-person-shooter games? --Mdwyer 04:00, 10 August 2007 (UTC)
- Surely he means sexbot. Vespine 04:54, 10 August 2007 (UTC)
- We have an article on that - fembot. Lanfear's Bane
- Surely he means sexbot. Vespine 04:54, 10 August 2007 (UTC)
- A Wikipedia bot? An IRC bot? A bot that plays first-person-shooter games? --Mdwyer 04:00, 10 August 2007 (UTC)