Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by Dignan

  1. My guess is that with Knoppix as it looks like you are running, there is a RAM requirement for KDE on Knoppix. Requirements are as follows. Intel-compatible CPU (i486 or later), 32 MB of RAM for text mode, at least 96 MB for graphics mode with KDE (at least 128 MB of RAM is recommended to use the various office products), bootable CD-ROM drive, or a boot floppy and standard CD-ROM (IDE/ATAPI or SCSI), standard SVGA-compatible graphics card, serial or PS/2 standard mouse or IMPS/2-compatible USB-mouse. If the comp you are using doesn't have 96 MB of RAM KDE won't even load. The thing you see is a basic window system. This might be coming up since it is now trying to encode and send screen shots for something as heavy as KDE can be. Have you tried swithing to run level 3 before trying a VNC connection? VNC is very heavy on computers and it needs a little head room to run.
  2. My words out of your mouth. I'm guessing anyone here felt awkward around his age in life, but the only difference is it seems that he has used google to find a cop out to childish behavior. You act sometimes as if it's an excuse for something. If you want people to care and respect you in a normal way, try to act normal. Regardless if you have aspergers or not I still see you using it as an excuse to grab attention or find ways to act out for attention... then once you are supposed to be held accountable for your actions the aspergers thing comes up to save the day, no blame for KB. You act like the boy who cried wolf, it's played out. So long. And let me remind you, that if you do come back, all the people that somehow still feel pity will realize what the rest of us have.
  3. I also have the free d/l version from them and I have every single feature listed too. The only difference is the IBP copyright removal box if you register. SQL toolbox works and so does the PHP mass mailer and Language editor. Pretty much I don't have 5000 Posts 1000 Topics 1000 Personal Messages 200 Members to test that, but it seems it isn't that limited at all. so seems like asus is right it doesn't limit you at all.
  4. Sam Spade: http://www.samspade.org/ssw/ Any online info gathering and network diagnostic tools. Ping, traceroute, whois, dig, finger are all available with an easy to use interface. FAH Logstats: http://sourceforge.net/projects/fahstats/ This is another mointoring program much like electron microscope. Monitors progress showing points per day, hour, week and averages.
  5. Dignan


    my first post ever in dvorak, it's sad, I am still switching between the two and still using qwerty on the dvorak layout. I guess I can still keyboard better then I thought I could. The problem is some of the keys aren't exactily the same size so I am starting to use feel cues for were the keys are. Your fingers don't extend nearly as much on this layout wierd feeling to type without hardly any hand movement.
  6. Another major factor is that the end price of Linux is cheaper in an all Linux environment. They don't mention that until the very last part of the article with the foot notes. Migration problems are mostly on the MS end anyway, trying to downplay the ability to move to an open source linux based server setup is technically a smart play because they have less people moving over because of conversion costs. But it's one thing I do like to see is that a majority of places they interviewed said that they were or plan on integrating and converting to open source software. It's not an argument over if Linux is a cheaper product to buy, but with TCO total cost of ownership, things like support and training are included. So in the end as slighted as it sounds, it may be true for now, but with demand, comes supply and I think open source is having enough demand to carry itself well into the mainstream.
  7. sent... There is no need for real name to be attached I guess. Plus I didn't say who I was in the e-mail, but the e-mail address its sent from is a dead give away.
  8. You may have not uninstalled the driver but the software might not be there. I would check out the newest software to see anyway. http://www.ati.com/support/products/pc/rem...=9&submit=GO%21 Also it may be some conflict with SP2... I don't know, but if that doesn't work at least let me know if the taskbar icon for the remote is coming up.
  9. The quiz this links should work
  10. Dignan

    OCC Logon Screen

    No I didn't I said you needed this prog The stardock prog is needed to insert the logon screen
  11. Dignan

    OCC Logon Screen

    OverclockersCult.com is what we should call this place. I think we are nuts, or bored, or both...
  12. Mitch Hedburg, Dane Cook (also see his cameo in mystery men, superhero tryouts), and David Cross if I'm in the mood for that kind of humor.
  13. Dignan

    OCC Logon Screen

    Please forgive the crudeness of this one, but I am trying to make a viable login screen via http://www.stardock.com/products/logonstudio/download.html Here is what I have so far and here is the exported file to mess with, please feel free to edit as you want and thanks for any comments and helpful hints. Please also realize the quality sucks on the jpeg, it looks a lot cleaner when loaded in. Also note you need the software to do anything with this.
  14. I don't know how to make the themes themselves, but if there is a good guide or you need some specific graphics done let me know. Give me file type, dimensions and use and I should be able to make it happen.
  15. Though the idea is great, fuel station attendants need to be able to move between Safeways and be able to know all the paperwork and other ways of business. It would take more training and be quite expensive to "teach an old dog new tricks". There cannot be different standards and setups for every single safeway. Though I can definately see that the idea is good, a heck of a lot more efficient, and easier overall. I would reccomend talking to someone higher up and see who will listen, I don't know if you company allows employees to dictate a change in policy, but if the reason is legitamit and the gains are there, they will be smart enough to change it. As for manager #3, probably a peon on a power trip, talk to the next guy up and if he likes it not only will you look good but if explained the right way #3 will look like an . too. Initiative is rewarded only when the right person listens and unserstands.
  16. I'm guessing it was the crazy two drum set and bongo musical interlude. They played an awsome set in seattle. They did the entire thing without playing pardon me which was great. I really like there stuff and they put on an awesome show.
  17. I have a fire-gl x1 with dual DVI. But in your case a second dvi would work with the 5200 PCI version. I ran my TI-4200 and a GF-2 MX PCI togeather, the only problem I had was when I tried to mix ATI and Nvidia cards. but I know for a fact I got a AGP and PCI card to work, I think Bishop did the same thing.
  18. After enabling wep and all the router resets I was doing, I just disable SSID broadcast and enable mac address filtering. You can't see it and unless you know exactily what to do, you can't connect either once you see it. I'm like road-runner, if you needed that much protection, they will still get in if you like it or not. There are plenty of open hotspots that keep people from getting into my network.
  19. And everyone else posted this wrong, this is the memory they tested. Not the cheapest, but the performance is great for the price. http://www.newegg.com/app/ViewProductDesc....-141-148&depa=1 You can tell because the review says This is the 3200 with 2-2-2-5 timings that they tested, the others will have different modules.
  20. ^ It's real, seen it with my own eyes.
  21. Yah I don't know what they deal is with those boards, even MBM whon't support them. BTW, I tried calling you, I need some info on the name servers pete uses or how his is setup.
  22. sometimes some stupid script kiddy tries to send out exploit attacks to IP ranges, my web server gets hit with them all the time. They try to execute things like cmd.exe and some other crap that can install tracking and exploit progs on your comp. They usually scan port ranges on each IP too which can look like an attack. No worries, if the firewall sees them, at least they aren't working against you.
  23. They aren't monitoring her computer specifically, they monitor the ip adress assigned by the ISP, the external IP. They can montitor the info on the last hop, or check the ip from the packet destination from any managed switch or router they control. The only thing a domain could do was make a secutiry policy so she couldn't access the internet past her bedtime. <_< Just do what they say and try to comply as much as possible, the ball is in your court, don't throw it back in there face. In this case they are the pissed off bully and you don't have the ball anymore. Either way enough with the vague analogies. Stop using bit-torrent and comply with the request. Research more options, but be careful.
  • Create New...