Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by paultwang

  1. I managed to pry open one of the cases today. They are actually SATA drives. I guess this completely changed my search direction.
  2. I have four 250 GB USB 2.5" external hard drives. The hard drives require about 700 mA to spin (which most computers will provide, if plugged in directly). I am looking for a device that can take two, three, or four of these drives and make them appear as one drive to any computer. The device would then connect to a single USB port on a computer running Windows XP. Alternatively, the device would connect to the local area network as a SMB-like share. The access control list of such share must be customizable. I would rather not pry the cases open for the internal drives. However, I would imagine that the internal drive interface is PATA since they are notebook drives. I also wouldn't mind getting 2.5" to 3.5" adapters. The solution needs to be relatively cheap, otherwise I could just buy one bigger drive.
  3. My family and I are moving from Texas to California in a few months. Driving is probably not an option in summer, so we will move by air, and the things will have to be moved separately. We have accumulated several items in our apartment. There are light items such as personal electronics and heavy items such as computer, printer, TV, and UPS. Other furniture would have to stay. I am wondering how much does it cost to transport all those, and if I should just throw away/ donate/ recycle/ or sell some things first to reduce the cargo. In your opinion or experience, what things are best "just buy it again when you get there" ? I am looking for the name of service for this kind of shipping. It is not really Fedex type of service, but something slower and cheaper for bulk volume. Also, what about transporting cars? Thanks.
  4. 406 Not Acceptable is a HTTP error which is not caused by the forum scripts. Interestingly, many legitimate problems with 406 error are related to forums, blogs, and scripts using PHP. I think the cause of this 406 error is: The security module thinks that your web browser cannot understand the content to be delivered to you, because your browser has specified a certain content-type. In the forum/blog case, it thinks that the content (which is usually your topic post/reply) contains something that your browser will not understand. I believe the original intention of this feature/bug is to filter out dangerous script codes. If you disable the scan, make sure your forum/blog/other PHP scripts properly disallow/filter dangerous codes.
  5. If you are the web master, add a new text file ~/public_html/forums/.htaccess Content: ><IfModule mod_security.c> SecFilterEngine Off SecFilterScanPOST Off </IfModule>
  6. paultwang

    Won't Post

    any beeps? if not, check the capacitors on the board. they are usually the first to fail.
  7. Convar PC Inspector Smart Recovery. Free. Note: Use Intensive mode in the Settings right away, or it usually won't detect anything.
  8. If I don't want the cron daemon to send me e-mails everytime it runs my cron job, should put the e-mail as /dev/null or :blackhole: ?
  9. As same for for all major operations, back up before doing it. Do a DIR \ /S /A>listing.txt first to create a list. If your OS starts complaining about missing dir/files, you know what names to put back.
  10. They are all open-source freeware programs. TrueCrypt by TrueCrypt Foundation. Summary: Creates an on-the-fly encrypted virtual partition out of a normal file, out of a normal partition, or out of an entire data storage. Encryption can be based on one or more key file(s), password, or both. Algorithms include AES, Blowfish, etc.. The virtual partition looks like a real partition to all non-system programs. Note: Once the virtual partition is mounted, it acts like a normal partition. Thus, a proper access control (i.e. chmod, NTFS, etc) on the virtual partition is suggested. Platforms: Windows XP/2000/2003, Linux, and any platform if you can compile the source code. Blowfish Advanced CS by Lasse Kolb. Summary: Encrypt, Decrypt, Wipe file/free space (1x, 3x, 35x). Encryption can be based on key(s), password(s). The order that you enter multiple sets, if chosen, of them will matter! Encryption algorithms include AES, Blowfish, etc.. Compression algorithms include BZIP2 (recommended), Deflate, and LZSS. File names can be munged during encryption. After encrypting file/folder, the original is wiped. Note: You have to remember to re-encrypt your plain file after you are done working with it. Platforms: All 32-bit Windows so far.
  11. If you keep your sensitive data well-encrypted, it is statistically impossible to read your data without the key.
  12. It seems that this program is no longer maintained. I haven't found any serious bugs in it.
  13. PowerOff is a freeware program allowing you to shutdown, reboot, log off, standby, hibernate, WOL, and lock local or remote computers immediately or on a schedule. It can also be run from a command line. Category: System Utility Author: Jorgen Bosman Version: 3.0 Cost/License: Freeware
  14. One never knows... (Results are not typical. Individual experience may vary.) A 3.5" floppy disk that I have totally forgotten for 6 years, still works. All of my old CD archives (4-7 years) still work. (They have been recopied though) I hope USB is still supported many years from now.
  15. Oubliette is a password management program just like AnyPassword but uses Public License and works under WINE as well. The last feature was important to me because my hard drive crashed last summer and I had to use Knoppix for a while.
  16. GNU grep works just fine for me. Windows FINDSTR might too.
  17. paultwang


    Apparently the POP retrieval only downloads whatever is in your "Inbox". That's why I don't put any email into folders.
  18. You're right. It's a flyback transformer. My previous CRT monitor also had this problem. I was uncertain whether it was the refresh rate or the resolution. It only squeaked at 640x480 but not 800x600 nor 1024x768. Sometimes a whack would fix it.
  19. If you want to back up the entire hard drive, I would go for a drive imaging software like Acronis True Image. Why? Because you are not restricted to a particular hardware to store your back up. You can use DVD-R, CD-R, or any disc that your drive can write. If you use any backup product, make sure you have at least a bootable recovery CD so you can at least restore your backup from bare metal state. Comparison to follow... Drive imaging Pro: Everything is backed up. If your hard drive dies, buy an identical model of hard drive, plug it in, and restore the image. Everything will be exactly the same as before. Con: Large number of storage media (DVD-R, CD-R, etc), or a hard drive with equivalent size is required. Direct restoration will not work if you change computer. However, most modern imaging software allow you to pick files to restore. Note: Do not forget the bootable recovery CD (sometimes embedded in the first disc of your actual backup)! If you don't have it, you can't work with your backups. File backup Pro: Everything you choose is backed up. Does not require as many storage media. This can be as simple as backing up "My Documents" into a compressed file and put it in a DVD-R. Con: You almost always have to reinstall Windows (or another OS) first before you can do anything with your backups. This method cannot easily backup your Windows system registry and your User registry. Restoration requires more attention because you have to reinstall Windows, drivers, programs, and have to go through all the software activation/registration again. Note: Do not forget the backup program itself! Your backups are useless without it.
  20. What are the typical shelf lifes of consumer-grade storage device/media such as CD-R, DVD-R, internal hard disk drive, and flash drive? I store my digital archives in DVD-Rs and a large capacity hard drive. I am wondering how long they will last before I have to buy new hard drives and discs to recopy. To be more specific, this is how I "shelf" those archive devices: Archive hard drive: Stored in stat bag, air tight bag, bubble cushion, and a fire safe. Taken out once a month to add new data. Archive DVD-Rs: Stored in a CD bag. No other protections.
  21. SmartFTP and Filezilla. I have both in my USB drive, too.
  22. Problem: I want to enable remote desktop and/or other applications. However, tunnelling through SSH is too slow due to encryption overhead. Forwarding the ports without restrictions opens too big a hole.
  23. I am new to linux and I am already ambitious on what I want it to do I want to accomplish the following with port forwarding and firewall in linux. I don't know if either is feasible with iptables. Ideas? Option (1): Accept tcp port 3389 from IPmask1/Subnet1 Accept tcp port 3389 from IPmask2/Subnet2 Deny tcp port 3389 from anyone else TCP Port forward from to Option 1 limits the accepted hosts to reduce possible break-in. Option (2): If <username> has an active ssh session, accept tcp port 3389 from <username>'s ssh client IP address, deny from anyone else, activate tcp port forwarding from to Option 2 has a similar effect of ssh tunneling except it is not encrypted in option 2.
  24. Problem solved. My modem was dying. I swapped it with an even older modem
  25. I don't know. I have not used Level3 or Netzero as my ISP for quite a while. That's why I do not use any ISP that requires more than three things (username, password, and phone /gateway number) to connect.
  • Create New...