Yeah, this post is humorous but Defender is actually a great choice for users who understand what they are clicking on.
Source: https://www.av-comparatives.org/tests/real-world-protection-test-february-june-2018/
I deal with a lot of cable modem configurations. Countless times I've had a tech come in and remove all of my Paladin coax ends and replace them with their PCT ends. As though there is a difference. "These aren't HD" is what I get told.
EDIT: These are what I install (Properly) that the installers always remove https://www.amazon.com/Paladin-Waterproof-Compression-connectors-9612/dp/B00066U3BE/ref=sr_1_1?ie=UTF8&qid=1529513055&sr=8-1&keywords=paladin+rg6
DNS has nothing to do with Wi-Fi, but it actually can have an impact on performance if on the ISP's side they're using a suboptimal route to the CDN.
Source: Comcast got super slow one day, but my friend with Private Internet Access noticed his speed was a lot faster with the VPN connected.
Another option that I'm incredibly fond of is Ninite. Let's you install multiple packages as well. No bloatware included. Fantastic for pushing out to a lot of machines over the network as well. Plus, you only need to generate an installer once as it will download the most recent versions of the packages from the Ninite cloud each time you run the installer. Very nifty.
Edit: Random addendum: for those of you in the MSP business that may or may not use Kaseya, their "Software Deployment" module is Ninite. They charge a shit-ton for their licenses though, so I'd recommend managing Ninite separately. Save some $$$ ;)
It's almost always a bad idea to go on a DLL quest, but if you were doing so responsibly*, this is the tool that helps the most.
* When the software vendor no longer exists, and when no support can be found, and when google searches become ambiguous, and you are running in a secure virtual environment, only then are you blessed to continue.
You made the same mistake as OP, you downloaded the demo when there's a perfectly fine freeware available right here.
It doesn't clone drives, but Macrium Reflect does and it's also free.
Some people don't want to pay for a VPN for one torrent or a one off thing. Windscribe has a great privacy policy as well. Logs are deleted within three minutes of disconnecting and you don't need an email to use the free plan. Just a username and password. IPs aren't stored at all. "We do not store connection logs, IP timestamps, or sites you visit (we are firm believer that one's browsing history should be taken to one's grave)."
Source: https://windscribe.com/privacy
My custom-built CMS:
Cigna:
Worse, I know plenty of other major companies and quite a few banks have comparably shitty password handling to Cigna here.
Ah fair point. I didn't think of that.
Look what I found:
https://www.amazon.com/dp/B014SK2H6W/
https://www.amazon.com/dp/B01199OGK0/
Not quite as small as the picture, but still, this is pretty respectable.
So Foreman is basically an automated provisioning system. You hook it up to DNS servers, DHCP servers, and another configuration management tool called Puppet.
Once a server is connected to Foreman, it manages the state of that server using Puppet (which normally has its own dashboard and own configuration files, except now it's all going through Foreman's web UI).
If you have a system managed by Foreman it comes up on the hosts dashboard. Exactly like the Puppet dashboard.
The difference being, deleting a system from the Puppet dashboard just removes it from Puppet - the next time that system calls in for configuration information, it gets nothing.
Deleting a system from foreman actually deletes the VM. Me, being new to Foreman, didn't realize this. Bricks were shat.
Something like this, except with a wireless mouse.
Would it be hard to create some type of plug and play drivers/software, that allow an option in the 'right-click' drop down menu allowing the user to paste files/folder from a specific location from the built in drive?
This seems like a really dumb idea, but, you know, non-tech savvy people would love it.
Comes PRE-PACKAGED with 25 cable clipes
Probably one of those people who have been fooled into believing computers and such create "dangerous amounts of electromagnetic waves which will definitely cause super cancer". This same person probably bought one these snake oil things.
Dear Client,
The server is currently submerged in roughly 6" of water under a category 4 Hurricane.
Some connectivity issues are expected in these circumstances.
For updates on this issue please see the status page at: https://weather.com/weather/tenday/l/USTX0617:1:US
Thank you,
Support.
I bought it online in India, this is the one. It cost quite a bit less than it's equivalent with OS did.
Our passwords expire every 90 days (So every quarter, or season).
I've found several users whose passwords are <Season><Year>
IE: Spring19
​
So I show them this: https://haveibeenpwned.com/Passwords
Originally it was just this thing that read tens of thousands of random files at startup, most of which weren't needed again for anything, simply because they had been accessed the previous day or so, often automatically by other background services, so prefetching them had little/no user benefit. It was way too aggressive and long-running, and managed to starve other apps despite its low I/O priority. NCQ priority at the hard disk level was new and largely unsupported when Vista came out. That meant normal/high priority I/O would still have to wait on low priority requests already in the hard disks queue.
I haven't noticed the same problems on Windows 7 with recent hardware. I'm guessing they toned it down a lot, also observed in this benchmark. 7's superfetch stopped at around 600mb cached (about 300mb more than without), while Vista's tried to fill up all of ram, over 1.7gb in the test.
I'd argue that endpoint protection is mostly useless, if not harmful nowadays. There's the performance impact, compatibility problems (true story: once spent the better part of a week trying to figure out why SEP was blowing up one of our internally developed apps), and the fact that most antiviruses are poorly-written crap that malware can actually hijack in order to escalate privileges.. and that's before we get into the abysmal detection ratios, false positives, and so forth.
An ad-blocker installed with a centrally managed blocklist, forbidding flash and java, denying execute rights on the default download folder, deepfreeze, religiously following updates, etc would be much more effective in the long run, IMO. Maybe with an on-demand scanner kicked off from a central location on a schedule.
Those of you downvoting this should really look into just how awful modern AV is. You've got a piece of code running with SYSTEM permissions, injecting DLLs into every running process available. (i.e. creating a massive attack surface). This code is often shoddy.
This isn't some crackpot theory I came up with, this is developers and security researchers telling you what this shit is doing in the real world. Mozilla has no reason to lie to you when they tell you that they can't do certain things because shitass security software gets in the way.
Either way it's not a competent enough antivirus to be used on its own. In every performance review, Windows Defender had the poorest protection of all other tested AVs out there, both free and paid.
Yup. I'm a fan of ProduKey, but alas it's utterly dead.
It doesn't always work with laptops, either, since they often seem to be installed with a volume/image key that doesn't match the sticker and usually can't be activated.
Yeah, no. You're not being paid enough for that. Use one of these special couplers (no loss of speed; if you screw up, you can redo the coupling for as much extra slack in the cable as you have; tool-less, save a screwdriver and something to cut the outer sheath of the Cat cabling). On sale at Amazon as well, but it might be a better idea to just order up a few dozen (pricing drops) from the original place, and keep them in a bag on a rack somewhere.
I have used them, and there is no loss of speed. Gig-E is where I am currently sitting.
Pity because I have had some success with scratched discs and safecopy.
Trick it to temporarily fill in the scratches with something of similar refractive index. Clear nail polish can work.
It all really depends on what is on the disc and how much effort you want to put into recovering it.
Scripts that constantly scan all of the address space.
https://www.shodan.io/ will give you an idea of the scary amount of data already available to anyone who wants it.
When ports are found, scripts analyze the services that opened those sockets and try out a few exploits to gain remote execution and, ideally, permission elevation. An unpatched XP box will be owned almost immediately without any human involvement from either side. Seriously, you can spin up a VM and open RDP/RPC/SMB to it to see how fast weird things will start to happen. Or plug in anything that listens to ssh and has root/root credentials, same thing.
It's very easy to be a script kiddy these days. Start Metasploit, type in a couple commands (select target, pick exploit out of a huge library) and there you go. The same stuff is easily automated.
Yes - use transmission. It is the best lightweight bit torrent application I have ever used.
The makers havent offically announced their support for windows yet but if you go here --> https://download.transmissionbt.com/files/ you will find the .msi at the bottom for 32/64bit.
Previously you had to download a fork of it from sourceforge (https://sourceforge.net/projects/trqtw/).
I've been a computer tech for 22 years, been messing with codecs for like 10... I haven't heard of this until today... and not sure why I'd even need to use it if basic mp4 codecs work fine and you can get them for free through DIVX support and my personal favorite: CCCP - Combined Community Codec Pack
[edit] thanks for the replies, I'm less clueless on this matter now
Here are my laptops specs:
Intel Celeron 1037U (int. graphics)
4gb RAM
500gb 5400rpm HDD
Windows 10 Pro N
So yeah, definitely not the best. It runs about the same as 8.1 did. Granted I don't have much on this laptop. Only chrome, steam, skype, and office, but it runs pretty good considering the specs. It makes a fantastic in home streaming device for Steam.
How the CPU stacks against other mobile chips: http://www.cpubenchmark.net/cpu.php?cpu=Intel+Celeron+1037U+%40+1.80GHz
Asus UX31A was on sale at BBY a week ago for $1000 USD (now its 1200). 13.3", 0.7" thick, 1.2kg, full hd, i5 3317u, 4gb ram, 128gb ssd, windows 8. Amazing little laptop.
Re: how it decides, it’s a function of memory usage and cpu time. It looks for short lived and high memory usage, so it should kill the child proc before a parent, but it doesn’t technically differentiate.
https://www.kernel.org/doc/gorman/html/understand/understand016.html
Yeah, sysprep can be interesting sometimes. Here's a link to the guide that I used from start to finish when I was first learning WDS. I used the steps in there to create a custom image, and it worked for me.
I just use WSUS Offline. You can download updates for Vista and up, Server 2008 and up and Office 2007 and up. With languages and x32 x64 versions. Oh and .net updates as well. It has saved me days of waiting for stand-alone machine.
The real fail here is that Windows can't install updates while the OS is running, and abort/rollback if a shutdown is issued.
Windows Vista had a transactional file system that should have made it possible to do this cleanly, but Microsoft apparently bungled it real bad, so the thing is deprecated and was never used for this. /facepalm
There is one operating system I know of that can do this: NixOS. Never used it myself, though.
Can you blame them? I sure as hell don't.
Infrastructure-setup (as in, connected to the home router), and provided you set their IP static on the network, they're just fine.
Reaching that setup is beyond the scope of the vast, vast majority of people. I get a couple every day, and it's always me remoting into their computer, figuring out the login to their router (because they never know it), having them push the WPS button on the printer and triggering it on the router, then instantly setting it static. They don't break after that - but holy shit. Gran-gran can't do that. Your idiot uncle can't. It's entirely magic to these people.
There's better ways; a good router could Fing that it's a printer easily, and static it instantly, that would help. Routers could be made to simply not honor WPS-set requests, or setup a really shitty sub-network just for the printer and knit it in if they're WPSed and Finged.
There's lots of ways I can see to help solve the problem, but they all involve 'smarter' routers that automate it... because printer manufacturers are all horrible, and just the way WiFi networking 'works' is without intelligence.
Give them a Privacy card. Then, even if it's stolen, you're safe. Each card gets locked in to the first vendor to use it.
Otherwise, you can't really guarantee they're not storing your credit card info anyways
Backups are easy enough in that there are plenty of export options. I run an export to a protected volume when a new password is made.
Browser integration, they have plugins for all browsers and most all devices.
https://lastpass.com/misc_download.php?tab=windows
Non browser accounts, they have a Lastpass for applications.
http://helpdesk.lastpass.com/upgrading-to-premium/lastpass-for-applications/
The best part, the price of Lastpass premium per year, 12 bucks.
It's safe to say it's a joke. My favorite detail is that all links but the Node.js one (which goes to another joke article) go to a search in a different search engine.
It did look like it could catch on, and then died when large companies like Google and Facebook stopped supporting it. Even DuckDuckGo closed down their XMPP service recently. (My account died with that :/)
Another issue is that the devs didn't manage to implement modern features like end-to-end encryption and VOIP. Things that matrix aims to solve.
Could you check the switch and find the port number and chase the cable? We all practiced for this once before when we were kids, to see if we were prepared for the battle of the server racks we faced in the far future. You ARE prepared...
More customers = more money to buy/rent more servers or do network improvements. I use Torguard right now, and I get significantly faster speeds than Nord VPN was capable of, usually around 200-300Mbps.
It'll need to be a cut and crimp tool, but I believe the loading bar style uses the same crimper. As long as it has a blade to cut excess cable length from the passthrough slots.
Here's the one I use: Klein Tools VDV226-110
It really is a game changer. You just get the wire order right and shove it through. No making sure theyre the same length so they all hit the metal inserts or messing up the order when inserting the loading bar.
Or I can use ShareX which does whatever I want it to and can bind to Print Screen (or whatever else I want).
I currently have it copy whatever I screenshot to clipboard as well as saving it in a screenshot folder, all automatically. I can also upload it to Imgur automatically too if need be.
uggg
let me think about what was available back then.
Amusingly, I do recall certain software not being compatible with drive compression, corrupting the drive so that it looked like the drive had Galifreyan (Think Tardis) folders: each sub folder was larger on the inside than the parent was.
This was DOS.6 etc.
On a more serious note I did find this
>Robocopy, or "Robust File Copy", is a command-line directory replication command. It has been available as part of the Windows Resource Kit starting with Windows NT 4.0
http://en.wikipedia.org/wiki/Robocopy
http://technet.microsoft.com/en-us/library/cc733145%28WS.10%29.aspx
And I stumbled across this
>I finally found Robocopy which is provided free by Microsoft in their "Windows Resource Kits". In order to get Robocopy to work I created a new directory "JUNK" on the C: dirve with nothing in the directory. The JUNK directory was used as the SOURCE directory for the Robocopy command and the directory I could not delete was used as the "CORRUPT" DESTINATION directory. I entered the following command at the DOS prompt:
> robocopy C:\JUNK C:\CORRUPT /E /PURGE
>Problem solved. Robocopy copied nothing to the DESTINATION folder but it did purge the corrupted folder(s). The /E switch may not be necessary but I used it anyway.
Install Process Explorer, run it, navigate to vmware-vmx.exe, if no lower pane visible, hit Ctrl+L, use the binoculars/Ctrl+F to find the locked file, right click and 'Close handle'.
As always, this is a last resort kind of deal as it prevents the process from being able to write out any as-yet-unwritten information. Loss of data and system instability are both risks. Shouldn't cause too much harm unlocking a lock file for deletion, but this sentence starts with "shouldn't cause too much" and not "will not cause any" for a reason.
It will also try hard to kill processes or even individual threads within processes if you ask it to.
TL;DR I love me some self-referential sentences.
You can use this site to create LaTeX notation from handwriting https://webdemo.myscript.com/views/math/index.html
Then use double subscript method: https://www.overleaf.com/learn/latex/Errors/Double_subscript
It takes a little getting used to with mouse, but latex works everywhere
It's called PowerApps. There are other competitors, you can try alternativeto.net to check out all the options. Enter a software or something and it will give you all the other software that does something similar. I remember there being an open source version of the same sort of thing, but I cannot remember what it is called.
Edit: There is a freemium version called AppSheet: https://solutions.appsheet.com/rapid-development
Never used it, but there are just tons of these "low-code" or "no-code" data-entry and display apps out there.
Edit2: I have heard good things about AirTable: https://airtable.com/
http://dualmonitortool.sourceforge.net/dualwallpaper.html I've always had double/triple monitors of different resolutions, once running 1080p+1440p+1024x768, and that tool always successfully helps to set up a wallpaper.
Download the iso for Linux Mint MATÉ, and get the Rufus USB tool. Use Rufus to make a bootable USB of Mint. Boot off of it and you can try Mint without installing right away. If it looks good, run the installer and let it wipe out XP.
Super messed up that they think that restricting freenet (the bunny icon) is appropriate.
Really actually pretty lightweight on resources and has actual academic value.
I really enjoyed this thread and the ones that followed. I wanted more people to know about it.
I've attempted to do a roundup of the entire story here. Let me know if I've made justice to it.
Fair enough. It may still be worth doing an interim language before diving directly into Java still though. Java is based on C. So doing a little light programming in ANSI C might get you the basics before you dive in completely (and you can do it from the terminal).
The GNU compiler supports ANSI C and is open source.
At this point I can program in probably 15 different languages that have roots in C mainly because I learned C well enough that everything else just became understanding how it was different from C.
That could be matrix. It's like XMPP but better and with more modern features (e.g. end-to-end encryption and voip) and they aim to be compatible with as much chat services as possible. There's working IRC bridge software and Telegram integration is in development.
Came here to say this buy I use a different tool that looks like a screwdriver.
https://starcase.com/product/cage-nut-insertion-tool/
Also available through amazon: https://www.amazon.com/Cage-Insertion-Tool-Square-4HARCNITOOL/dp/B00DL09HPU
I bought this book to study. It's a bit thiccc at 1,318 pages of study content, but it helped me pass. I watched some YouTube videos because I was having a hard time conceptualizing how printers work; and made flashcards for things like port numbers and IP address classes (although the address classes wasn't on the exam at all). I'm sure there's probably shorter books to help cram the important information in; or if you prefer videos, Professor Messer has an A+ Certification series on YouTube.
Wow, I've seen ones that actually work well for $5. Here: Some one from a manufacturer I've never heard of and one from Amazon for $12.
EDIT formatting
i got one too. same exact text, except it was a plain email.
Umaid Jahngeer <> Dec 26 (2 days ago) to me Hello, I hope you’re doing well, I’m Umaid Jahngeer a representative of PureVPN. I’m writing you this email with a scalability proposal.
I understand the time and effort it takes to establish something from scratch, but what's the point if you can’t leverage its full potential or seek benefits that are equal to the efforts you’ve invested.
VPN Industry would be worth $155.6 billion by 2019 and our brand is one of the Top Players in this sector.
We would love to have you onboard as our partner.
Looking forward to hear from you. Regards, Umaid Jahngeer PureVPN Best Regards
i replied with "i am interested. if you guys can help my youtube channel gain popularity, i'm in. what would i have to do?" waiting for a reply
I've used that app, it's quite good.
but the one in OP's picture is this one: https://play.google.com/store/apps/details?id=com.vrem.wifianalyzer&hl=en_GB
I have also used this app and it is also quite good.
Either/or, really.
TP-Link makes their own POE splitters (sorry for the Canadian link) if you have room for an extra brick. Their whole product line could use a bit of lipstick.
here is the top result for refurbished Thinkpads, there are plenty of other options better than this
This is why my cable set has one of these in it
Yeah it's HDMI. This is the white adapter: https://www.amazon.ca/AmazonBasics-Mini-DisplayPort-Thunderbolt-Adapter/dp/B00NH13K8S
I couldn't find an AmazonBasics MDP to DP as a dongle style adapter that looked anything like this
As far as I could find they don't make any that size with backlit keys, they are really large keys. He was a hunt and peck typer with poor accuracy so had awful typing with a regular keyboard.
https://www.amazon.co.uk/gp/product/B004QMAEGS/
I had to keep a cheap regular sized keyboard handy any time I had to sit it front of it because the spacing on his was so much greater than a regular keyboard I couldn't touch type on it at all, it completely broke muscle memory.
If you're going to buy a laser printer, go with Brother. I personally own the Brother MFCL2710DW and love it. It even accepts third party toner which is much cheaper. I think there's a newer model out in the same product line.
Get an app like Specdroid to check if there is actually any whine that only young ears can hear. Quite handy, I used it recently to trace which of our neighboring units made this weird 650 Hz whining noise.
I use these, never for more than a few hours
I just got a pill holder for them
VTAR Pill Box, Stainless Steel... https://www.amazon.com/dp/B075VNT975?ref=ppx_pop_mob_ap_share
the iODD is from Amazon.de
but on Amazon.com it is on and off for a while now.
Let's take the example of a patient file system for a doctor.
Each patient has a small stack of paper for their records. If you took 100 patient records it could cover a desk. However, the doctor wants each patient to have their own vertical file boxes on the shelf ( https://www.amazon.com/dp/B003CP75DK ) for convenience. Each one is 10cm wide, so 100 patients would take at minimum 10m of space. Some patients may take up more than one holder while others have just a few papers in theirs.
One day the doctor moves offices so they take all the files and compress them into big filing boxes that only take up 6m of space. That is a benefit of compression.
The files are about 6m but space on shelf is 10m
I see databases that are 40GB but when backed up and compressed they are only 12GB.
Turing era (2000 series gaming GPU based)
The plastic plug
trueCABLE Cat6/6A RJ45 Pass Through Modular Plugs, Shielded (STP) External Ground Connector, UL Listed, EZ Crimp, Gold Plated 3 Prong 8P8C, 20 Pieces https://www.amazon.com/dp/B088KSW9Z7/ref=cm_sw_r_cp_api_glt_i_M7TTVQDCGZ24ZHEG3GW5?_encoding=UTF8&psc=1
It also reminds me of people who would use those adapters from PS/2 and USB combo mice to try and add a USB port to their computer. Saw that a couple of times back in the day.
spend an hour or two reading the Git internals chapter from the Git book (https://git-scm.com/book/en/v2/Git-Internals-Git-Objects) and you’ll understand git. there’s only like 3 data structures used in git, so once you understand them and how they fit together it clarifies a lot of what appears to be weird and unintuitive if you’re only coming from the commands that are exposed.
>So users are forced to accept their data harvesting,
No. Not only can you disable the telemetry in Win11 OOBE, but if, for some reason, chose not to do that, you can adjust those settings in the settings program or through Winaero Tweaker.
>and of course Microsoft also pushed their accounts more in the setup.
While it really sucks that a msft account is required to use win11 home, you can alwats just use a burner email if you're paranoid.
I haven't personally owned a Mac in a while now, but based on other comments in this this thread Amphetamine might be the the solution. https://lifehacker.com/macos-app-of-the-week-amphetamine-1825108890 Have you given it a go?
Actually, it can. Specifically in Vista, 7, 2008, 2008 R2 and I assume 8 and 2012. The issue though is with disabling the Windows Firewall service instead of turning it off via Security Policy (local or GPO).
http://technet.microsoft.com/en-us/library/cc766337(v=ws.10).aspx
Specifically note the 'Caution' area at the bottom.
I've myself seen it mess up Remote Desktop, Shares, etc.
I'm a big fan of a hot glue gun which would secure it well enough, but give way if pulled hard enough, or even Sugru if you'd prefer something more rubbery https://www.amazon.com/Sugru-I000949-Moldable-Multi-Purpose-Creative/dp/B089WH2Z5L
A vacuum like this. If you have a support contract for your laser printer/copier and something like this happens, call them. Don't touch it if you can help it and definitely do not get it wet.
I got this one on Amazon for $15 bucks a few years ago. Works like a charm for tonning but the tester is clearly crap.
Windows + M sends a minimize commands to every window while Windows + D just goes your windows. I remember D used to bring back all the windows after clicking on something on the desktop but M would keep them gone until you manually brought them back. Also, like the link says, programs can ignore M but not D.
Nope it's not, the most used file system on linux ext 4 throws files randomly on the disk so they have room to expand. Every boot time (or is it shut down) the kernel module for ext4 looks for fragmentation and if there's some it reorders the files to un fragment.
>As long as it has buy in from chrome and firefox, it's all gravy.
No. As long as it has buy-in from Chrome, Firefox, Edge, and Safari, it's all gravy. But if any one of those decides “lol nope fuck you” after IdenTrust pulls out, LE is toast.
>It's more likely that chrome and firefox will drop every other CA and just trust lets encrypt.
Cold. Day. In. Hell.
>Whatever firefox/chrome do, will be quickly followed by safari, and a year later IE/Edge.
The browser support stats on caniuse tell a very different story…
Check out if backups really work, you don't want to end up same as gitlab few years ago - longer version or shorter version
This is why we invented magic packets. :D (And removing all standard users from the interactive login group)
Edit: Implement this http://technet.microsoft.com/en-us/library/ee617162(v=ws.10).aspx
I mean, thats not gonna fix the fact that many educational purpose experiments are written in flash, but I think flashpoint guys would be interested in archiving these too, if they arent already, would contact them (https://bluemaxima.org/flashpoint/).
I mean, thats not gonna fix the fact that many educational purpose experiments are written in flash, but I think flashpoint guys would be interested in archiving these too, if they arent already, would contact them (https://bluemaxima.org/flashpoint/).
Would also like to note that unless you are in developer mode, chromeos basically sandboxes the living daylights out of anything that runs ( and to a similar degree in developer mode). User profiles are individually encrypted (may be wrong there, but either way user data is encrypted), the new(ish) crostini thing uses two containers with extra applications to talk between crostini and chromeos, and best part is, they won't boot unless the boot disk has this wack partition table that makes it difficult to do anything but run chromeos (Unless in dev mode). Chromebooks can't even boot a normal efi executable without developer mode and other modifications because of other restrictions, including the inability to use bios output functions and the inability to do any disk IO. The only exploits that can really occur in chromeos should really only be a bad chrome extension or some dimwit abusing developer mode. EDIT: My sources, the chromeos repo wiki.
The wiki page
And information on depthcharge
The only real way to boot anything other than chromeos on a Chromebook is with u/mrchromebox 's firmwares
Another thing to mention is the mebi (1000^(n)) vs mega (1024^(n)) distinction. One is close to 5% larger than the other, since 1024^(2) does not equal 1000^(2). I addressed this discrepancy in a pull request I sent to a popular open-source speedtesting utility.
I've been switching clients to Linux Lite. It's a Windows 7 interface clone, and has some extra tools to make Windows refugees feel at home. No complaints so far, from the "we'll never go Win10" group.
What he said. It's the old internal version that is no longer updated by Spiceworks. I think you can still download it? https://www.spiceworks.com/free-help-desk-software/#comparison
Looking at the scan results that you posted, a lot of the issues came from PUPs being side-loaded when installing other software. Unchecky would have helped a lot there.
Also, giving him a Premium licence for MBAM so these issues would be picked up in real-time would save you from having to worry a lot about this moving forward.
I use them fairly often but I can see how this annoys some ppl.
You probably know already but you can disable any key on the keyboard in registry or use a tool to remap your keys, e.g.: https://github.com/randyrants/sharpkeys
On a completely serious note, if you are using Windows, Universal USB Installer could have saved you the trouble of burning a disk.
I always keep a copy of Process Explorer in a $PATH directory. That way I can always
[⊞] + [R] "procexp" [Enter]
to get a much better task manager.
Process Hacker is open source and also good.
I've been fortunate enough to not run into any unkillable process hangs on W7/8/10 ... - I use Microsoft Sysinternals' Process Explorer to kill misbehaving apps (or threads)...
What sort of stuff have you seen hang un-kilalbly?
I had one of those cheap Atom tablets that ran Windows 8/8.1/10 with only 2GB of RAM and it was decent for casual use. I could even do Steam In-Home Streaming with it.
I've got 4.5GB of compressed RAM tied up (374MB physical) and I was just running GIMP, Twitter's UWP, three Firefox tabs, one Chrome tab, and DaVinci Resolve.
Windows memory management has come a long way.
NP++ doesn't handle large files terribly well. The official limit is 2GB, but it will choke long before the file gets that big. You want something that streams directly from disk. Glogg does exactly that and has no file size limit. It's made for reading log files, but log files are just text files.
i mean there's plenty of options, also open source.
some i came across are "scrcpy" for android related stuff and "NoMachine"
as for how to use anydesk for free, here is the link to the download page:
https://anydesk.com/en/downloads
Let us not forget the price tag on VirtualBox (free, just to be clear), nor the fact that it's open source (except for the "Extension Pack" which is proprietary and falls under their PUEL).
Though if you already bought the other software, that's not as big of a consideration.
I'll at least give them props for not using one, but two special characters along with a seemingly random string of letters including caps. Even for a guest network, that's a heavy password. Ain't nobody brute forcing that in a night... or week... or month... or year... or probably several hundred years. source