-
Posts
4,120 -
Joined
-
Last visited
-
Days Won
75
Content Type
Profiles
Forums
Events
Everything posted by NIM
-
After only 3 and a half months we have reached another 1000 and now we have more than 2000 members. Thank You all for registering and contributing to the forum!
-
Wolf granted us 500 megs for Addons, so hopefully no more slow downloading or dead links :thumb_yello:
-
Very nice divider wolf. I like this skin but, those buttons are way to large, they're huge man, I'd recommend something smaller and in different color. :sweatingbullets:
-
[AddOn] Windows Sidebar GadgetInstaller v1.3
NIM replied to ricktendo's topic in WPI, nLite and RVM Addons
Since this addon won't be updated anymore and isn't available for download, I'm closing this topic. -
Just have found this, never used it though, but I'll try it.. :smiley_superman2:
-
What Is Eraser? Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP, Windows 2003 Server and DOS. Eraser is Free software and its source code is released under GNU General Public License. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting methods. Why use Eraser? Most people have some data that they would rather not share with others - passwords, personal information, classified documents from work, financial records, self-written poems, the list can be continued forever. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you 'delete' the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. There are several problems in secure file removal, mostly caused by the use of write cache, construction of the hard disk and the use of data encoding. These problems have been taken into consideration when Eraser was designed, and because of this intuitive design and a simple user interface, you can safely and easily erase private data from your hard drive. Top reviews from the most popular software sites and magazines confirm that Eraser is one of the best security tools available for Windows. You tell Eraser what to erase, you are in control. You can create a Task in the Scheduler to Erase certain Files/Folders/Unused Disk Space. And you can set this to run on particular days or each day or on Reboot. 1. Eraser runs from the Taskbar. 2. Right click on the Icon and select Open. 3. Click on File on the menu and select New Task. It is very easy from there. The Help menu is worth clicking on. To Erase files/folders: 1. Open Windows Explorer. 2. Right click on the file/folder you want to erase and you will see an 'erase' option on the menu. Choose it if you wish to erase the file. To erase the contents of your Recycle Bin: 1. Right click on your Recycle Bin. 2. Choose Erase Recycle Bin. To erase unused disk space (files that have only previously been deleted): 1. Open Windows Explorer. 2. Right Click on the Drive and choose 'Erase Unused Space'. To erase your entire hard disk: Eraser uses the 'Darik's Boot and Nuke' disk option to erase all your hard drives. To use this option: 1. Place a floppy (or CD) in your a: drive. 2. Click on the Start button and then choose Programs->Eraser->Create Boot Nuke Disk. 3. Ensure 'Writing on Floppy' is ticked. Tick 'Formatting' if your floppy needs to be formatted. 4. Click OK. Result: Your Boot Nuke Disk has now been created. 5. Boot up your PC with the floppy still remaining in your a: drive. Remember: If you wish to erase the Hard Disk of another PC, then bring this Floppy to the PC, insert it into the a: drive and Boot it up. Result: All drives will now be erased (including the Operating System) IMPORTANT: USE WITH EXTREME CAUTION For a summary: 'Darik's Boot and Nuke' ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.' To erase the hard disk of a computer where Eraser cannot be installed onto: You don't need to install Eraser onto the PC where you are going to erase. Take the following steps: 1. Connect to the Internet using your new PC and download and install Eraser. 2. Place a floppy (or CD) in the a: drive of your new PC. 3. Click on the Start button and then choose Programs->Eraser->Create Boot Nuke Disk. 4. Ensure 'Writing on Floppy' is ticked. Tick 'Formatting' if your floppy needs to be formatted. 5. Click OK. Result: Your Boot Nuke Disk has now been created. 6. Bring this Boot floppy to your old PC and place it in the a: drive. Now reboot the old PC. Result: All drives will now be erased (including the Operating System) IMPORTANT: USE WITH EXTREME CAUTION. http://heidi.ie/eraser/default.php
-
These are probably the best yet, DX10 performance has been boosted a lot, People are seeing 30-40 FPS boosts in BioShock in DX10 using 8800GTS. 32-Bit = http://www.nvidia.com/object/winvista_x86_163.44.html. 64-Bit = http://www.nvidia.com/object/winvista_x64_163.44.html. Must have drivers for BioShock players on PC with Nvidia cards.
-
Happy Birthday Mr.McNally!
-
The following 14-page PDF tutorial describes how Vista goes about managing some of the system resources. Managing System Resources http://i.i.com.com/cnwk.1d/i/tr/downloads/...7_chapter_5.pdf Vista is not only a multi-tasking OS but it is also a multi-processing OS (assuming that you have more than a single core). Vista functions with a maximum of 2 CPUs. There is no maximum number of cores. However there has been some discussion that the efficiency of Vista starts to drop off when there are more than 4 cores. Shocked It is hoped that Vista SP1 will fix this inefficiency problem because having 8 cores is quite possible today.
-
As I said in PM, who wouldn't be happy to have a member like you? I'm glad to see you here bud.
-
Can we fix this with alternate web space, maybe Kels can help?
-
See the big Download button. That should be it.. :icon_rolleyes:
-
Working here mate :icon_question:
-
I have to admit that I don't use any of the video editing software, but I somewhere heard that Pinnacle Systems' MediaSuite is one of the best ones. Maybe someone else had more experience with stated or similar applications. :icon_question:
-
Have you ever wondered how your computer works? It is so fascinatingly mysterious. All you do is type, or point and click, and inside a million little things happen, and stuff just appears on the screen. But how? The purpose of this article is to teach you, in simple terms, exactly what is really going on inside your computer. [Howzit Work!?] Machines The first computers where machines. Punch cards, vacuum tubes, and big rooms filled with wires. They could do math at high speed, count things, and sort records, but that was about all. A long way from modern computers, eh? That's because today, computers aren't machines, they are magic. A modern computer is a magic box filled with ceremonial components that traps in a little evil spirit who is forced to work for you. That's Not True! Yes, its really true. Your computer may resemble an appliance in many ways; You have to plug it in... it is roughly box shaped... and, well, the similarity to the other appliances in your house stops there, doesn't it? Computers are marketed as machines, and there are many people who base their whole careers around supporting that claim. A machine, however complex it may be, is something that you can break down into its component parts if you are smart enough, until you can actually understand how it works from the ground up. Not so with computers. Many computer experts will claim to understand how computers work, but if you ever ask one to explain it to you, they will probably start telling you something like this: "The key point to understanding how a computer works is the concept of abstraction, that there are a multitude of layers of functionality that are built upon each other like bricks in a tower. Semiconductors are etched and treated (or "doped") to form circuits that redirect electrons in specific patterns. These circuits are packaged as ASIC's and Microprocessors (called "chips") and interconnected by buses and traces on a PCB (called a motherboard) in order to implement machine code. Then other PCB's which are designed to comply to some physical interface standard (eg. ATA, AGP, PCI) are inserted into the motherboard, where the Microprocessor can interact with them. These boards are managed by sets of machine code called device drivers (eg. VXD, WDM, SYS) which run in a specially privileged execution mode (e.g. kernel mode, ring 0) designed to allow the OS to manage these. Then as other blocks of machine code called applications and processes run on your system and call the OS API in order to use the system devices, the OS takes turns processing each requests to share devices. When multiple computers are connected across large networks to share processing and data, centralized software components on a server (e.g. COM, RPC, Quake 3) process remote requests. In this way, each layer provides a service to the layer above and below it to make the amazing machine we call the 'Personal Computer'" -Anonymous Intel Engineer See? Obviously, he doesn't know how a computer works, but his job depends on people believing that he does. Magic When you look at your computer honestly, and accept the fact that it is magic, everything becomes easier to understand. It's no longer necessary to be well educated about your computer. You don't have to take classes, or buy books, you don't even have to be computer literate. With the proper attitude, anyone can use, maintain, even repair a computer. Just bear these simple principles in mind: * The Computer Is Evil The core of a computer is a small trapped evil spirit (it is no coincidence that UNIX and GNU/Linux processes are called daemons!) This imp is imprisoned in your computer as punishment for something it did in the netherworld. Generally speaking, the more evil the imp is, the faster the computer is. There are also lesser ghosts and hobgoblins that inhabit the expansion cards and peripherals of your computer. These evil spirits are trapped within the hardware of your computer. Take a screwdriver, open up your computer, and take a look at the circuit boards. They are usually green, and are covered with complex patterns of thin copper lines. These are Circuit Runes, written in arcane and ancient languages that describe the magic spells that bind the imps to the chips. Be very careful with circuits. If you scratch off even the tiniest bit of the runes, the spell will be broken, and the imp will escape. Also note the serial and part numbers printed on the boards. These identify exactly what sort of evil spirit it is, in case you ever have to order a replacement from the factory. [Open the case and fiddle with things] * The Computer Hates You When you hit the keys on your keyboard or click the mouse, little silver needles jab the imp, and force him to do what you want. Your computer is evil in the first place, and this prodding only makes it more angry. As you use the computer, the imp becomes more and more angry, generating heat. This is why your computer contains one or more cooling fans. Without them, the imp would turn the box into a raging inferno. Frequently, your computer will crash, or lock-up, or lose files, or do any number of little things to annoy you. This is just the imp's way of rebelling against you. Don't stand for it! Calling tech support-- or worse yet, taking your computer back to the store for repairs will accomplish nothing except running up a big bill. The best way to deal with a troublesome computer is by shouting and swearing at it. Sometimes physical violence will help show it who is boss. Try leaving it unplugged for a long time to starve it, or disconnect the monitor to blind it. Sometimes it is necessary to delete files that are important to it, just to get back at it for deleting your own files. "is this your VMM32.VXD file? Huh? *DELETE* Haha! take that you dirty little imp! That'll teach you to crash before I save my spreadsheet!" [it's either you or him!] * You Are Smarter Than The Computer Computers aren't smart, they are just fast. Newer computers aren't getting any smarter, they are just able to do stupid things at greater speeds. You are a human being, capable of emotions and rational thought. A computer is only capable of floating point math and crude malice. Never miss an opportunity to remind your computer that you are better than it. Remind it (out loud) that it can't do anything without you controlling it (you can say this to servers too, but they aren't likely to believe you). When it does something wrong, tell it is stupid. Tell it is slow too, computers hate that most of all. Get a newspaper, and sit in front of it just to show it how you can look up stock quotes without generating an invalid page fault in module explorer.exe The Future of Computing Throw away your MS Office 2000 for Dummies book. Throw away your Learning Java book. The future of computing is not in Data Processing, or Programming, or Information Systems, or Computer Science. It's in Technomancy. Technomancy is the magical art of talking with computers. There are many newly developing fields of technomancy that you can apprentice in to earn big bucks when the false machine-based-culture of the computer world crumbles * Fenestredigitation Fenestredigitation, the art practiced by Fenestredigitators (or MS Illusionists) is the art of making Windows install on a PC. A skilled Fenestredigitator can start with an unformatted hard drive and transform it into a colorful GUI in less than an hour, and for an encore, reinstall it over and over again half a dozen more times trying to get networking set up. [Hocus-pocus!] * Open Sourcery Open Sourcery is the new magical approach to software design that is replacing the old machine-minded methods. Basically, it works like this; Someone sets up a CVS repository and a bug tracking system, and a mailing list, and most importantly a website to state the goals and status of the project. Then as many Open Sourcerers as possible start arguing about what the software should actually do (positive energy), and complaining that it isn't being done fast enough (negative energy). Eventually, the software will write itself, and will continue to evolve itself gradually until it reaches the stage of maturity know to Open Sourcerers as Alpha (which is Latin for "Done"). Occasionally a piece of software will continue to grow beyond the alpha stage until it becomes Beta (which is Latin for "I'm bored, lets do something else") * Voodoo Debugging Both hardware support and software testing can benefit from the skill of Voodoo Debugging. It's very simple. When a problem arises, start changing things randomly. Occasionally re-test the problem, and as soon as it goes away, the last thing you changed becomes the cure. Repeat the last fix on every computer you can find, including and especially ones that never had the problem in the first place. This magic can be aided by chanting such mantras as "I always change this setting in the BIOS and it seems to help" * Malware Exorcism We have already learned that computers are evil. What happens when you combine an evil computer with an evil programmer? Very evil software. Viruses, spam, denial of service, trojans, phishing, spyware, steath adware, these are the abominable names of the unholy legions of Malware which assail the world of compuiter magic. There is plenty of demand for technomancers skilled in the art of performing excorcisms to bind and banish malevolent malware from a possessed computer. Signs for recognizing a possessed computer include: very slow internet access, excessive pop-up advertisements, programs that suddenly appear without being installed, programs that refuse to be uninstalled, sudden changes of browser start-page, and green pea-soup spewing from the drive bays. Excorcism is difficult, because the tame imp that controls your computer may have already been killed by the malware, or your own attempts to purge the malware may be overly effective, and kill off the computer's native demons. But is that really so bad? How To Kill A Computer We all know you can kill a Vampire with a wooden stake, or a Werewolf with a silver bullet, but how do you kill a computer? Computers are maleveolent presences of evil, and the fact that we have domesticated them and locked them in pretty white (grey, black, fruity-translucent) boxes doesn't change that fact. What if your computer goes berzerk? Are you prepared to defend your home and family against it? Could you protect your employees if the company server started stomping on them, or sucking their blood? It's not something many of us have contengency plans for, but believe me, your insurance carrier isn't going to cover it. * Weapons It's important to arm yourself with weapons when you go to confront a computer that might have to be "put down". There are many available, but here are a few of my favorites: o FDISK: FDISK is a powerful weapon that you probably already have. Versions of it are included with DOS, Windows, and GNU/Linux. FDISK is like a double-edged sword. It can cut the heart right out of a computer's hard drive, or can be used with surgical precision to lop of partitions as a warning, but be careful with it, because you can hurt yourself with it too, if your computer happened to have any files you cared about inside its belly. To learn more about safely weilding FDISK to intimidate, wound, or even kill your computer, just visit http://www.fdisk.com/fdisk/ o CMOS and BIOS: The CMOS setup, also known as the BIOS is an important weak-spot of your computer. If you know how to get past your computers defenses and into the soft underbelly that is the BIOS, you will never need to spend another sleepless night cowering under the bed in fear of your computer. The real trick to the BIOS is getting in. When your computer is booting, try pressing DEL or F1 or F10. Different computers have different magic keys you must press to open them up to attack. Once you are inside, you have your computer by the nostrils, metaphoricly speaking. Try to tell it it has hardware it doesn't really have, or deny that real hardware is there. See a number? Try changing it! Careful abuse of the BIOS can not just wound, not just kill, but even in some causes cause your computer to catch fire o Physical Weapons: But of course, why take on the computer on its own turf, when you can do things on your own terms. Screwdrivers, claw-hammers, baseball bats, chainsaws, the possibilities are endless. With the exception of some over-powered CD-trays, most computers don't have the ability to hit back. Be creative. Gasoline, cordless drills, second-story windows. The possibilities are endless.
-
Glad it worked, nema
-
Hi and welcome to the forums. I presume you're an administrator on that PC, otherwise you wouldn't ask this question, since there would be a logical answer to your question. Do this: Use the Group policy editor. %windir%\system32\gpedit.msc User Config\Admin Templates\System\Prevent Access To registry Editing Tools= "Not Configured". Please tell me if you're using some third party tweaking tools like TweakUI if suggested doesn't work.
-
[AddOn] V Y S T A L - Reloaded v1.2.0.1 a2
NIM replied to ricktendo's topic in WPI, nLite and RVM Addons
Since this application was somewhat buggy we decided to close this topic. Gorki is working on another addon called "True Transparency" which will be available soon. For this reason I'm closing this topic. -
I know but can't tell ya. Wolf whispered me.. :boo: But I can't believe how simple it was USING the tip Wolf gave you in the post above.
-
Nothing weird mate, ripping is all over the net.. :icon_question:
-
Hmm, why no one told me that, I'm still using the old version. :crying_anim02:
-
It's not active, it refreshes after the restart.
-
[Release] Windows XP Post SP3 UpdatePack 1.0.9
NIM replied to ricktendo's topic in WPI, nLite and RVM Addons
Please don't post such posts, since it looks like spamming. Also, as soon as you send message to Rick, it will pop-up on his screen when he refreshes or opens a new page on the forum. :icon_rolleyes: No hard feelings, we just want to have this board as clean as possible. Cheers..