• Content count

  • Joined

  • Last visited

Community Reputation

25 Neutral

About Ohm

  • Rank
    I could have written a book with all of these posts
  • Birthday 06/06/1966

Profile Information

  • Gender
  • Location
    Maine, USA

Contact Methods

  • Website URL
  • ICQ
  1. Hello. I'm new here, and I'm just trying to figure out how the site works. What exactly is the reputation (what is it for, and how do you get it). I'm asking you, because in my limited experience on this site, yours is the highest I've seen.

  2. That all depends on the game. Sometimes, games work on a single TCP port that can be wrapped in an HTTP or SOCKS proxy either transparently through the network, or with a "proxifier" that will intercept any calls to make TCP connections and make them through a proxy. More often, games rely on UDP and this makes it a lot harder to use through a proxy. Also, a proxy will add significant latency issues, making any games like first person shooters a lot less enjoyable. So you'll need more information about your game first.
  3. Write a program to use HFS+? Hardly the most efficient way of going about things. Boot up a Linux live CD on the machine and do this: mkdir /mac mount -t hfsplus /dev/sda1 /mac
  4. That's true. With POP, you can download your mail once and store it on your hard drive. You can also do this from trusted networks, and have a copy of it to bring with you to untrusted networks. Though, if you have to check your mail on an untrusted network, that's not very useful.
  5. Well.. that does sound exactly like my Uniden.
  6. There's all kinds of things you can do on a badly configured system. But I think in some cases (high school being one of them), it's best to leave them alone. Admins of high school computer systems are woefully underpaid and overworked. Yes, it would be pretty easy to poke holes in their system and say how utterly insecure it is, but what would be the point? Pile on top of that the reactionary staff and possible involvement of law enforcement, and there's another big reason not to touch school networks. And finally, you might break something. If you break something, you're depriving yourself and your classmates an education. So it might seem like an interesting computer system to explore, but you probably shouldn't touch it. But on the technical side, you could probably access these drives the whole time. If Windows search can find them, they're accessible. Just open up Windows Explorer (hit Win+e) and type C:\ or F:\ or whatever drive you want to access in the address bar. Ideally, these drives should only be mapped if you actually have access to them, and should be behind some kind of authentication. Maybe your admin isn't quite so good with Active Directory.
  7. Oh, of course, I use KeePass and KeePassX.
  8. I guess the only encryption app I really use is Enigmail and GPG. I also have some encrypted LVM volumes, if that counts.
  9. I'd probably want to install BT4 instead. It's not technically done, but it's done enough. There are a lot of changes in BT4, and all the new stuff is in there. I installed in on VirtualBox, and the install was so easy, I don't even remember it
  10. Well if a password is set, there's not much anyone can do to help. The only feasible way of getting past it is to clear the BIOS configuration, resetting the password entirely.
  11. You want to run Visual Studio... on Linux? I have to ask why you would want to do that. Linux has a C/C++ compiler (GCC), as well as a C# compiler (Mono). Doing things natively is always preferable to trying to run the Windows programs on Linux, which doesn't always work very well. There's always VirtualBox. Using VirtualBox, you can run Windows inside of Linux, and any Windows programs will run as just fine (except games). It's free too, except for the price of Windows.
  12. Antivirus software can clean files that are compressed using known compression formats. Every compression format (zip, rar, gzip streams, etc) have headers, which can be seen by the antivirus and it will decompress and check the files within. I know it's found things in my zip files before. They wouldn't be very useful if all it took to hide your malware was sticking it in a compressed archive.
  13. First, a 2 year degree doesn't really mean much. I mean, the first year is all core classes and pretty low-level introductory courses, that leaves just the second year (also core-class laden) to get to the meat. Then you promptly forget most of that and graduate. A 2 year degree is something, but it's not exactly revered. Second, get it all done at once! You won't have the time or the energy later in life. If you do land a job with that 2 year degree, you can't just take a break in a few years to go back and finish your degree. Employers usually expect you to be working, not going to school. It's like a band-aid, get it over quick and all at once.
  14. The battery you're referring to is not the main battery, it's a small battery on the motherboard. Otherwise you'd lose your settings every time you switched to a backup battery. This requires disassembling the machine to get to, not an option in this case.
  15. Right, the advantage of USB is persistence. I suppose it'll run a bit slow (especially with writing) on USB, but it'll work. If you want to go all out, see if you can get an external hard drive to boot from. Yes, it is their hardware. But at the same time, running another OS isn't going to hurt it any and what you do on your own time is your business. One obstacle I see is a BIOS password. If a BIOS password is set and you can't alter the boot order, you might be out of luck. Without making modifications to the BIOS and possibly disassembling the machine (which is a crossing a pretty big line, remember this isn't your hardware), you might not be able to boot from USB. You could always try talking to whoever is in charge of these laptops. Explain what you want to do. If they don't understand, explain harder. Make sure they understand that it can't hurt the computer, nor can it harm the operating system on the hard drive (as long as you don't mount it or mount it read-only). Explain that Linux is very educational, that you need it to study computers. Hacking isn't always the answer, sometimes just asking will work.