\', SouthernWolf.net, \' - \', The portal for cognating wolves™, \'
  Login or Register
 • Home • Downloads • Your Account • Forums • 
Site Menu
null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh
 
Site Info
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,459,591
  • Today: 802
Server InfoServer Info
  • Nov 14, 2019
  • 08:58 pm EST
 
 
NukeSentinel™
This is the list of NukeSentinel(tm) banned IP addresses.

  • 84.54.58.*
    • Abuse-Script
  • 5.189.206.*
    • Abuse-Script
  • 194.156.125.*
    • Abuse-Script
  • 95.181.218.*
    • Abuse-Script
  • 5.101.219.*
    • Abuse-Script
  • 95.85.71.*
    • Abuse-Script
  • 5.62.159.*
    • Abuse-Script
  • 185.14.194.*
    • Abuse-Script
  • 5.189.205.*
    • Abuse-Script
  • 85.202.195.*
    • Abuse-Script
  • 46.161.61.*
    • Abuse-Script
  • 5.62.154.*
    • Abuse-Script
  • 193.93.192.*
    • Abuse-Script
  • 91.204.14.*
    • Abuse-Script
  • 81.22.47.*
    • Abuse-Script
  • 83.171.252.*
    • Abuse-Script
  • 2.57.77.*
    • Abuse-Script
  • 79.110.28.*
    • Abuse-Script
  • 194.156.124.*
    • Abuse-Script
  • 188.68.3.*
    • Abuse-Script

 
Trophy

Thank you, Navy SEALs

 
NukeSentinel™
You have been warned!
We have caught 2037 shameful hackers.

 
SouthernWolf.net: Computers

Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 4 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | > | >> ]   

The Easiest, Fastest Way to Update or Install Software Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers
Ninite

 

A Ninite Installer Just pick your apps and click Get Installer. Ninite does the rest — fully automatic.

Ninite

via WinExtra: If Windows users want to give themselves some lovin’ then you need Ninite

Comments
Posted by Southern on Tuesday, November 08, 2011 @ 15:59:29 EST (747 reads)

How Much Data Is That? Score: More about Printer Friendly Send to a Friend Save as PDF Read More... 
Computers

James S. Huggins' Refrigerator Door

Whenever we discuss quantities of data, we tend to do it in the abstract. We speak of a kilobyte, or a megabyte or a gigabyte without really knowing what it represents.

The following table shows various quantities of bytes, in each power of ten. Usually, they are shown with multiples of 2 and 5 also. For example, 1 Kilobyte, 2 Kilobytes, 5 Kilobytes.

All the examples are approximate and are rounded. For example, a computer card has 80 columns. If 50 columns contain data on a card, then two cards will be 100 bytes. Also, a 3-1/2 inch diskette can contain 1.4 Megabytes. Showing it as 1 Megabyte reflects both (a) the diskette not typically being filled and (b) rounding. Finally, a CD-ROM can hold more than 500 Megabytes. However, it is listed at that level as "typical" and as the closest match.

Bytes (8 bits)

    0.1 bytes: A single yes/no decision  (actually 0.125 bytes, but I rounded)
    1 byte: One character
    2 bytes:
    5 bytes
    10 bytes: One word (a word of language, not a computer word)
    20 bytes:
    50 bytes:
    100 bytes: Telegram; two punched computer (Hollerith) cards
    200 bytes:
    500 bytes:

Kilobyte
     1,024 bytes; 210;
     approx. 1,000 or 10 3

    1 Kilobyte: Joke; (very) short story
    2 Kilobytes: Typewritten page
    10 Kilobytes: Page out of an encyclopedia
    20 Kilobytes:
    50 Kilobytes: Image of a document page, compressed
    100 Kilobytes: Photograph, low-resolution
    200 Kilobytes: Two boxes (4000) punched computer (Hollerith) cards
    500 Kilobytes: Five boxes, one case (10,000 of punched computer (Hollerith) cards

Megabyte
     1,048,576 bytes; 220;
     approx 1,000,000 or 10 6

    1 Megabyte: Small novel; 3-1/2 inch diskette
    2 Megabytes: Photograph, high resolution
    5 Megabytes: Complete works of Shakespeare; 30 seconds of broadcast-quality video
    10 Megabytes: Minute of high-fidelity sound; digital chest X-ray; Box of 3-1/2 inch diskettes
    20 Megabytes: Two boxes of 3-1/2 inch diskettes
    50 Megabytes: Digital mammogram
    100 Megabytes: Yard of books on a shelf; two encyclopedia volumes
    200 Megabytes: Reel of 9-track tape; IBM 3480 cartridge tape
    500 Megabytes: CD-ROM

Comments
Posted by Southern on Friday, July 22, 2011 @ 01:07:27 EDT (934 reads)

Almost Every file format in the world! Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

ABK  Corel Draw AutoBackup
ACL  Corel Draw 6 keyboard accelerator
ACM  Used by Windows in the system directory
ACP  Microsoft Office Assistant Preview file
ACT  Microsoft Office Assistant Actor file
ACV  OS/2 drivers that compress and decompress audio data
AD  After Dark screensaver
ADB  Appointment database used by HP 100LX organizer
ADD  OS/2 adapter drivers used in the boot process
ADM  After Dark MultiModule screensaver
ADP  Used by FaxWorks to do setup for fax modem interaction
ADR  After Dark Randomizer screensaver
AFM  Adobe font metrics
AF2  ABC Flowchart file
AF3  ABC Flowchart file
AI  Adobe Illustrator drawing
AIF  Apple Mac AIFF sound
ALB  JASC Image Commander album
ALL  Arts & Letters Library
AMS  Velvert Studio music module (MOD) file
ANC  Canon Computer Pattern Maker file that is a selectable list of pattern colors
ANI  Animated Cursor
ANS  ANSI text
API  Application Program Interface file; used by Adobe Acrobat
APR  Lotus Approach 97 file
APS  Microsoft Visual C++ file
ARC  LH ARC (old version) compressed archive
ARJ  Robert Jung ARJ compressed archive
ART  Xara Studio drawing
ART  Canon Crayola art file
ASA  Microsoft Visual InterDev file
ASC  ASCII text
ASD  WinWord AutoSave
ASM  Assembler language source file
ASP  Active Server Page (an HTML file containing a Microsoft server-processed script)
ASP  Procomm Plus setup and connection script
AST  Claris Works "assistant" file
ATT  AT&T Group 4 bitmap
AVI  Microsoft Video for Windows movie
AWD  FaxView document

more Ace

Comments
Posted by Southern on Friday, July 22, 2011 @ 00:58:43 EDT (909 reads)

Is Your Computer Connecting To Websites Without Your Knowledge Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

If you are worried that some programs on your PC are secretly making connections to websites in the background, here's a quick tip that uses a simple DOS command to detect and prevent such suspicious activity:

1. Type cmd in your Windows Run box.

2. Type "netstat -b 5 > activity.txt" and press enter. After say 2 minutes, press Ctrl+C.

3. Type "activity.txt" on the command line to open the log file in notepad (or your default text editor)

netstat -b 5

The file activity.txt will have a log of all process that made a connection to the Internet in the last two minutes. It will also show which process connected to which website in this time. And not just the web browsers (like iexplore.exe or opera.exe), the log will also show your IM clients, download managers, email programs or any software that requires a net connection.

Scroll though the activity.txt file and look for any process names or website addresses that you are not aware of. If you track one , go to the task manager (or Process Explorer) to find the location of the executable on your computer and eliminate it.

Amit Agarwal

Comments
Posted by Southern on Wednesday, July 20, 2011 @ 01:39:12 EDT (810 reads)

Four Free Tools that every Administrator should Know About Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

Microsoft Network Monitor
Microsoft Network Monitor is a network protocol analyzer that lets you capture, view, and analyze network traffic. Version 3.3 of Network Monitor is available in 32- and 64-bit versions.

Microsoft Baseline Security Analyzer
The Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed to help administrators of small and medium-sized businesses ensure that their Windows-based computers are secure. You can use MBSA to determine the security state of your computers in accordance with Microsoft security recommendations. MBSA also offers specific remediation guidance for security problems it detects, such as misconfigurations and missing security updates.
At the time of writing this, the current version was MBSA 2.1. This version is available in 32- and 64-bit versions, but it does not install on Windows 7. A new version that supports Windows 7 is due to be released sometime in the future. You can download the current version and get information regarding the a version for Windows 7 at microsoft.com/mbsa/.

Microsoft IPsec Diagnostic Tool
The Microsoft IPsec Diagnostic Tool helps network administrators troubleshoot network-related failures, focusing primarily on Internet Protocol security (IPsec).The tool checks for common network problems on the host machine and, if it finds any problems, it suggests re¬pair commands. The tool also collects IPsec policy information on the system and parses the IPsec logs to try to determine why the failure might have happened. The tool also provides trace collection for virtual private network (VPN) connections, the Network Ac¬cess Protection (NAP) client, Windows Firewall, Group Policy updates, and wireless and system events. The diagnostic report generated by the tool is derived from the system logs collected by the tool during its analysis phase.

Windows Sysinternals Suite
The Windows Sysinternals Suite is a set of advanced tools for troubleshooting issues with Windows-based computers. These tools were originally developed by Winternals Software LP, which Microsoft acquired in 2006. Some of the useful and popular tools included in this suite are:

    Autoruns This tool lets you see what programs are configured to start up automati¬cally when your system boots. It also displays the full list of registry and file locations where applications can configure autostart settings.
    BgInfo This tool automatically generates desktop backgrounds that include important information about the system, including IP addresses, computer name, network adapt¬ers, and more.
    Process Explorer This tool lets you find out what files, registry keys, and other objects that your processes have open, which dynamic-link libraries (DLLs) they have loaded, and who owns each process.
    Process Monitor This tool lets you monitor the file system, registry, process, thread, and DLL activity on your computer in real time.
    PsTools This set of command-line tools can be used for listing the processes running on local or remote computers, running processes remotely, rebooting computers, dumping event logs, and performing other tasks.
    RootkitRevealer This tool lets you scan your system for rootkit-based malware.
    ShellRunas This tool allows you to launch programs as a different user using a shell context-menu entry.
    TCPView This tool lets you view active sockets on the computer in real time.

Technet Microsoft

Comments
Posted by Southern on Wednesday, July 20, 2011 @ 01:28:09 EDT (1175 reads)

How to: Make Your USB Drive into a Digital Swiss Army Knife Score: More about Printer Friendly Send to a Friend Save as PDF 
Computers

As any geek can tell you, the smaller and more portable a gadget is, the better that gadget becomes. You can’t get much more portable than USB drives, which can be carried in a pocket, around the neck, or even on a key chain. This, in and of itself, is already a pretty cool and a relatively inexpensive way to carry around a few extra gigs of whatever it is you need to carry around. But there are ways to make your USB drive even more useful, and these processes allow you to take many of the functions of your desktop with you to any computer you might want to use.

You can find numerous programs designed to run specifically from a USB drive. Best of all, almost all these programs are free, so put that Amex back in your wallet. Simply install them on your USB drive and they’re ready to travel with you anywhere. Here’s a list of 55 of the most useful USB programs around.

The Free Geek

Comments
Posted by Southern on Friday, May 20, 2011 @ 16:43:23 EDT (907 reads)



Page 4 of 15 (89 total stories) [ << | < | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | > | >> ]   

Topics
Computers
 
 
Forums

Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Environment
Starships
Microbes
Inverses
Only Down
Question
Hmmm

 
Babes

© ThemeFreaks
 
GCalendar
<< November 2019 >>

S M T W T F S
          12
3456789
10111213141516
17181920212223
24252627282930

11/15
• Southern's birthda...
 
bookmark site

Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


 
Support RavenNuke™
RavenNuke(tm) v2.40.01
 
Proverbs
23:23, Buy the truth, and sell it not; also wisdom, and instruction, and understanding.
 
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months
 
Support Our Troops
Support Our Troops


© ThemeFreaks
 
Honey Pot
Bots in the pot!
We have [252] bots in the pot!

 
 
Page Generation: 1.02 Seconds

:: fisubice phpbb2 style by Daz :: PHP-Nuke theme by www.nukemods.com ::
:: fisubice Theme Recoded To 100% W3C CSS & HTML 4.01 Transitional & XHTML 1.0 Transitional Compliance by RavenNuke™ TEAM ::

:: W3C CSS Compliance Validation :: W3C HTML 4.01 Transitional Compliance Validation :: W3C XHTML 1.0 Transitional Compliance Validation ::