Jump to content

CWB

Honorary Members
  • Posts

    2,386
  • Joined

  • Last visited

Everything posted by CWB

  1. yeah ... to be safe , i would download a copy of the 8.1 OS and burn it to disk ... this is about the easiest way to (re)install windows . very soon you will be able to "upgrade" to W10 for free . for the sake of curiosity ... how does your wife know that the disk she borrowed from her cousin is *hacked-n-cracked* ?
  2. time in grade ... trust ... experience level ... background apply if there are openings . and then you have to pass muster with the *big dogs* .
  3. if the CD was/is a legitimate (aka : real) W8.1 disk from MS (with the holographic label or other similar features) and used with a purchased key , you are good to go . as DL pointed out , it is the activation key that is unique to each computer ... not the OS (keeping in mind the right version) . i have installed several different versions of an OS on different machines with cd/dvd i have burnt from downloaded OSes and then activated them with a purchased key . this requires me to have a few disks on hand as opposed to ordering and waiting for a disk and key combo to arrive . makes customers , family and friends happy too .
  4. heh ... no foolin' ... kinda the same thing that happens with women . i can save those web pages from the self-help removal section to a file/flash drive and show them . that'll work .
  5. a partial list that is not current will work . it is similar to saying "this is the color yellow" and presenting a few swatches of yellow tints . most people understand that there are more than a few tints/shades of "yellow" . (that big box of crayola crayons comes to mind) it will convey the basic premise .
  6. avast is better than MSSE ... that is my personal opinion . the windows firewall does an ok job , but , there are better ones out there . avast has a full security suite (again , not hawking a specific product) . normally , the windows "anti" will be turned off when the new software is installed ... but making sure is important . there are several good tutorials on the 'net about accomplishing this task .
  7. yep ... it is the *wow* factor that i am after ... not something all encompassing . yeah , i could say "google these terms ..." , but a list would be a great adjunct .
  8. just out of curiosity ... is there a "converter" that one could hook to their favorite keyboard and make it wireless ? i do not like the feel of most of the wireless keyboards i have tried .
  9. heh ... it aint my relatives . it is not so much the "why are they bad" but more along the lines of : "look at this ... it is a partial list of all the cutesy and serious looking programs that are , plain and simple , "bad order" . this is intended to graphically drive home the idea of how extensive/pervasive this type of stuff is . hopefully , it will give the person pause to investigate before *downloading* a "oooohhh , i just gotta have that" type of program .
  10. hey all , i find myself , from time to time , having to explaining why certain programs and such are mal/spyware and open backdoors , etc . this ties into the reasons that one does not want to install certain *things* and to be cautious when doing as such . it starts to feel like i have leaned the "gettysburg address" in the sixth grade and am parroting much of it by wrote . not that i mind it ... but ... it seems a little shallow . does anyone know of a comprehensive list that i can print out ? it would be great to cut down the diatribe and present the "manual" .
  11. weeelll , aint that just special ... no big surprises there . they would not want to cut off their own hand .
  12. good luck with andriod on older machines ... i have tried it on two *older* laptops and one desktop . about the only way to tell is to load it on the machine from scratch (no updating a version that is in place) . as for which version of linux ... i have had good luck with "linux mint 9" on older machines . you can try builds through 13 . beware of trying to load any linux build on an older toshiba ... they do not play well together and you could wind up with a door-stop .
  13. "I'm trying to install Windows 7 onto another computer." and you are trying to get the key from the old machine ? is the old machine a "pre fab" (aka : off-the-shelf) or did you build it ? if you built it , did you keep the old software and key around ? if you did build the machine and install the OS , what version of the OS do you have ... full retail or a "builders special" ?
  14. "Vendor Lite-On Technology Corp" i take it that the caps lock functions correctly ... i would hazard that the keyboard is at fault . sub in a known good keyboard ... that should prove the point . "So for that idea I may as well continue to look up as I type ..." i look up and down all the time ...
  15. based on the specifications you have posted (things like the motherboard and such are beneficial) ... i would say that you would not be pleased with the results . a good graphics card and a power supply to run it and the cpu (it is going to be crunching a fair amount of data and so will consume more power for greater duration) is a place to start .
  16. 0554 05JUN ditto on the above post .
  17. what ? do you mean that there is a browser other than firefox ?! i'll give it a try later on .
  18. can you substitute a known good power supply for the current one ? yeah ... it may cost you a little if you can't borrow one . this will eliminate one variable . (and is a relatively easy thing to try) have you checked for a bios update ? cpu temp : 45C = 115F ... not super hot .
  19. in addition to what DD1 wrote ... stopping/leaving a full "malware removal sequence" and using the machine may/will result in re-infection and/or an otherwise improperly working machine . if you go back and request a *reactivation* , you may have to perform and provide logs/results for some initial (re)scans of the machine .
  20. hmmm ... i just tried to connect to the toolbox ... nada . it must be on my end .
  21. "Wow! Listen to me now! This is coming from someone who little over a year ago was adamant that I wouldn't allow myself to become a 'slave to Google" heh ... and they say that heroin is addictive .
  22. "You should not have to go out to use Google to go to the Internet to print to a local printer." i agree ... and i feel that "cloud printing" or any method other than directly wired printers , accessing them directly (as it were) via LAN or a dongle transfer is the most secure way . anytime one uploads *something* from their system to *somewhere* else the risk of data compromise increases . anytime one "broadcasts" information the risk of system/data compromise increases . yeah ... 63 characters is a bit over the top . anyone that really wants to get into or "hack" your system/network is going to have the equipment and wherewithal to do so ... these chaps are far and few between . referencing AS ; 12 characters is enough .
  23. no tailwind ... it was either a density change or a down-draft . there was a steady 5 MPH crosswind (the sock was pretty limp) . the plane is a cessna 310 (not sure what issue) ... it is named "spirit of sky king" (after the tv series) . the military equivalent is/was a T-50 ... or at least very close . and now ... back to your regularly scheduled thread
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.