Revision as of 20:47, 4 January 2014 editAboutFace 22 (talk | contribs)Extended confirmed users2,128 edits →Downloading in WinServ 2008.← Previous edit | Latest revision as of 00:05, 24 January 2025 edit undoScsbot (talk | contribs)Bots240,614 edits edited by robot: adding date header(s) | ||
Line 1: | Line 1: | ||
<noinclude>{{Misplaced Pages:Reference desk/header|WP:RD/C |
<noinclude>{{Misplaced Pages:Reference desk/header|WP:RD/C|WP:CHD}} | ||
] | ] | ||
] | ] | ||
] | ] | ||
] | ] | ||
] | |||
] | |||
</noinclude> | </noinclude> | ||
= January 13 = | |||
{{Misplaced Pages:Reference_desk/Archives/Computing/2013 December 30}} | |||
== Absolute value inequality == | |||
{{Misplaced Pages:Reference_desk/Archives/Computing/2013 December 31}} | |||
A meteorite is 600ft from a satellite and travelling toward the satellite at 42ft/sec. At what times will the meteorite be less than 50ft away from the satellite? Write an appropriate absolute value inequality for the given situation and solve: | |||
{{Misplaced Pages:Reference_desk/Archives/Computing/2014 January 1}} | |||
Let|42t-600|<50 and 42t-600<50 and 42t-600>-50. Thus, 13.10<t<15.48. ] (]) 22:21, 13 January 2025 (UTC) | |||
:What is the question? | |||
= January 2 = | |||
:The given data do not specify where the meteorite is at time {{nowrap|1=t = 0}}, and also not with which speed the satellite is moving. Your solution is based on the (not unreasonable) assumptions that the person who drew up this assignment meant {{nowrap|1=t = 0}} to be the initial moment when the meteorite is 600ft away from the satellite, and that the speed of 42ft/s is the speed of the meteorite relative to the satellite. Your solution assumes that the meteorite will not hit the satellite, but pass by it. Under these assumptions, the derived inequations are correct, as is your solution, although not with exact values but with numeric values rounded to two decimals. | |||
:If the meteorite hits the satellite, we don't know what happens after {{nowrap|1=t = 14.29}}. If the satellite disintegrates, the notion of the distance between the bodies becomes meaningless. --] 23:59, 13 January 2025 (UTC) | |||
:] '''Please ].''' | |||
:Welcome to {{#ifeq:{{BASEPAGENAME}}|Help desk|]|{{#ifeq:{{BASEPAGENAME}}|Reference desk|]|Misplaced Pages}}}}. Your question appears to be a homework question. I apologize if this is a misinterpretation, but it is ] not to do people's homework for them, but to merely aid them in doing it themselves. Letting someone else do your homework does not help you learn nearly as much as doing it yourself. Please attempt to solve the problem or answer the question yourself first. If you need help with a specific part of your homework, feel free to tell us where you are stuck and ask for help. If you need help grasping the concept of a problem, by all means let us know.<!--Template:Dyoh--> | |||
:This is additionally the Reference desk for computing and electronics-related topics, not mathematics. --] (]) 06:11, 15 January 2025 (UTC) | |||
::But is it homework? Homework formulates an exercise, often in the form of a problem, asking for its solution. It is not usual for homework to contain the detailed solution to a stated problem. What is then the exercise? --] 10:32, 15 January 2025 (UTC) | |||
:::Maybe they forgot the rest of the problem? Or maybe it's just someone/somebot sloppily copy-pasting stuff from the Web to try and waste people's time. --] (]) 05:18, 16 January 2025 (UTC) | |||
::::I think it's not homework. They might be sending stuff into space. ] (]) 12:22, 16 January 2025 (UTC) | |||
:::::📐 ] (]) 21:31, 17 January 2025 (UTC) | |||
::::📐 ] (]) 21:33, 17 January 2025 (UTC) | |||
:::📐 ] (]) 21:35, 17 January 2025 (UTC) | |||
::The inequality problem was not school homework. I apologize for the mix-up. I was only checking my answer. ] (]) 21:40, 17 January 2025 (UTC) | |||
:::Yeah, thank me for saving you. Someone got confused. 🪐🛰 ] (]) 09:43, 18 January 2025 (UTC) | |||
= January 15 = | |||
== Misplaced Pages's SSL certificate wierdness == | |||
== What is this character? == | |||
Dear Wikipedians: | |||
] has several characters that my computer renders as little boxes. For example: | |||
How come https://en.mobile.wikipedia.org would trigger a certificate warning. Whereas https://mobile.wikipedia.org and https://en.m.wikipedia.org would not. | |||
*''a'' <⃥͏ ''a'' (]) — '''after the first italic a''' | |||
* if ''a'' < ''b'', then ''b'' <⃥͏ ''a'' (]) — '''after the second italic b''' | |||
What are they? In both cases that I copied, the box is seemingly the same character as the lesser-than sign, since I can't highlight one without the other. I figured I could get the answer from Google (there are enough Unicode charts online), but I get just four results for the combined lesser-than-and-box: the inequality article, two Reddit pages, and something in Thai. When I put the combined lesser-than-and-box into the URL, I'm shown ], which makes sense for a title containing a standalone < character, but not for one where the < elements are part of a special character. ] (]) 20:29, 15 January 2025 (UTC) | |||
: A less-than with two combining codes: | |||
I know that a wildcard certificate is used: *.wikipedia.org. My logic goes as follows: | |||
index chr codepoint utf8 cat name | |||
0 < U+003c 3c Sm LESS-THAN SIGN | |||
1 ⃥ U+20e5 e283a5 Mn COMBINING REVERSE SOLIDUS OVERLAY | |||
2 ͏ U+034f cd8f Mn COMBINING GRAPHEME JOINER | |||
: -- ]'''··–·'''] 22:56, 15 January 2025 (UTC) | |||
<ol> | |||
<li>If the wildcard is used in the same sense as the UNIX wildcard, then https://en.mobile.wikipedia.org should be allowed. | |||
<li>If the wildcard does not permit further dots inside its representation, then https://en.m.wikipedia.org should be disallowed, yet it is allowed. | |||
<li>If mobile is somehow excepted, then https://mobile.wikipedia.org should be disallowed, yet it is allowed. | |||
</ol> | |||
::In other words, it's a "not less than" sign. Unicode's single character for that is hex 226E or ≮, although it uses a slash rather than a backslash ("reverse solidus") to overstrike the < sign. --] (]) 02:47, 16 January 2025 (UTC) | |||
Much appreciated if someone can elucidate this situation. | |||
:::Latex also uses <math>\,\nless\,.</math> The use of a forward slash, as in <math>\,a\!\not{\!\text{R}}~b\,,</math> to mean <math>\neg(a~\text{R}~b),</math> is standard. I can't think of a reason for using the backslashed symbol <math>\,<\!\!\!\!\!\setminus~</math> instead and have replaced <\ by ≮. --] 09:27, 16 January 2025 (UTC) | |||
= January 16 = | |||
Thanks, | |||
== Miraheze Stuff == | |||
] (]) 20:23, 2 January 2014 (UTC) | |||
] What should I do if my wiki is approved on Miraheze? ] (]) 12:21, 16 January 2025 (UTC) | |||
: I don't have time right now to thoroughly dig into your interesting question, but take a look at ], wherein you'll be dismayed to discover that the meaning of wildcards is somewhat, er, wild. -- ]'''ჷ'''] 22:32, 2 January 2014 (UTC) | |||
:This has nothing to do with DNS. The wildcard in the common name does not permit dots. A certificate has an optional "Subject Alternative Name" field, which is where additional hostnames for which the certificate is valid can be added. This field lists *.m.wikipedia.org, which is why it's accepted. ] (]) 14:55, 4 January 2014 (UTC) | |||
:That should depend on the scope and goals of the wiki you have requested, which we don't know. Do you already have a small team of dedicated volunteers who will supply a non-trivial amount of relevant content? An empty wiki is not conducive to attracting new contributors. --] 23:56, 16 January 2025 (UTC) | |||
== Need low-level tool for sending HTTP requests == | |||
:Does it have to do with ]? --] 00:12, 17 January 2025 (UTC) | |||
::No, my friend in interested in YBS. It's not me. He told me from a distant place that he wants a wiki. And I have another wiki personally on my kernel. ] (]) 12:55, 17 January 2025 (UTC) | |||
== Temp Files on C: Drive == | |||
I'm looking for a tool for sending HTTP requests. Something that runs on Windows. Specifically, I'm looking for something that will let me send an HTTP 1.0 request ''without a host header''. Every tool I've tried forces me to include a host header. I've tried Fiddler and several others. I even tried writing my own tool using .NET but the .NET Framework adds host header even if you remove it. Can anyone recommend anything? ] (]) 20:40, 2 January 2014 (UTC) | |||
: ] -- ]'''ჷ'''] 21:13, 2 January 2014 (UTC) | |||
I have a Dell Inspiron 3910 running Windows 11. It has a C: drive with what is shown as either 216 GB or 232,783,867,904 bytes. (So those are 216 binary gigabytes, of 2**30 bytes each.) Anyway, This PC usually shows that it has between 20 GB and 45 GB free. If the free storage becomes less than 10%, it displays a red bar in This PC. One parameter that I am familiar with that changes is the size of pagefile.sys, which starts as 12 GB and often increases as it runs up to 24 GB or even 28 GB. I sometimes see the free storage on the C: drive drop to as low as 16 GB, which doesn't bother me, even if it bothers This PC. I don't need unlimited free storage on my C: drive; I need enough free storage on my C: drive. What happened yesterday is that it began displaying that about 5.5 GB was free, much less than I have seen before. I hadn't done anything that should have filled up the C: drive, such as importing video clips from my phone. (I know that video clips are large because they are three-dimensional because time is the third dimension.) I found a few folders on my C: drive that were at least 1 GB and I wasn't using, and I moved them to the E: drive, which is a great monster of a 4TB solid-state device. I thought that might free up a few gigabytes, and it didn't change anything. At about this point Windows Update told me that operating system updates were ready to install, and so I needed to schedule a time for a system restart. After the restart, my C: drive shows as having 44.9 GB free. That is, approximately 39 GB was reclaimed during the restart. I know that approximately 10 GB of that was pagefile.sys. Where did it get more than 25GB of free disk storage from? Is there a way that I can free up this disk storage other than by a restart? I know that some of this was temporary files created by Google Chrome and Microsoft Edge and a few other standard programs. Is there a utility that I can use that frees up temporary storage without restarting Windows? | |||
: You'd build the request in e.g. <tt>foo.txt</tt> and then do <tt>nc 192.168.0.20 < foo.txt</tt> -- ]'''ჷ'''] 21:25, 2 January 2014 (UTC) | |||
] (]) 18:10, 16 January 2025 (UTC) | |||
:@] I don't know of any program that finds temp files, but a good guideline I have in general is to use something like WinDirStat or WizTree (preferably the latter), as both show a graphical display of the biggest files on your drive, and may help in this case. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 21:44, 16 January 2025 (UTC) | |||
: But given that you seem to already be coding in .NET, I think you can solve this in that environment too. I imagine you're using .NET's http facilities (perhaps ). Because it knows about HTTP, it's taking it upon itself to "fix" your request. You can avoid this if you avoid the httpclient library and use TCP directly (with e.g. . You have to build the request yourself (but that sounds like what you want anyway) and handle the headers in the response anyway (which isn't very hard). -- ]'''ჷ'''] 22:26, 2 January 2014 (UTC) | |||
::Thank you, ]. I had already been using Disk Space Analyzer Max, which showed me the directories that were using a lot of space, and that didn't help much. What I saw was that Google Chrome had a large amount of data, for instance, but I didn't know what Google Chrome data was useful to it and what was temporary. As I said, I tried moving a few directories, each of which was about 1 GB, from C: to tertiary storage, and that didn't help. I thought it would make about 3 GB free, but maybe it took Windows a while to catch on. Obviously the restart found and freed up a lot of storage. So I am asking whether there is some way other than restarting the system to get it to find and free up the storage. Maybe I am looking for something that either does not exist or is buried somewhere, like treasure. ] (]) 22:19, 16 January 2025 (UTC) | |||
:::If it's Google Chrome that's the culprit, have you tried clearing your cache and browsing history? For me, caching and history have led to many GiBs being used in Chrome in the past. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 23:07, 16 January 2025 (UTC) | |||
::::Whoops forgot ping @] <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 03:01, 17 January 2025 (UTC) | |||
::::Thank you, ] - That is useful advice. If I see that Google Chrome is using a lot of SSD space, I will purge its cache and browsing history. I assume that advice also applies to any other web browser. More generally, I infer that if any application is using a lot of temporary space, it can be nuked if there is an option in the application to nuke the temp storage, and, if not, it can always be restarted. Apparently a lot of applications clean up their own litter boxes when they start up. In this respect they are unlike cats. ] (]) 17:25, 17 January 2025 (UTC) | |||
:Install (free), boom, gives you an overview of everything stored on your storage volumes. Also lets you manage said stuff. | |||
:Anything called "]" or "temp" can be safely nuked. A cache is just copies of things stored for speeding things up and can always be regenerated. In fact I suggest just making your browser shut off disk caching, which is largely unneeded these days unless you're on a slow connection, and eats away at the lifetime of ]s, which it sounds like your primary drive is. Web search "<name of browser> disable disk caching" | |||
:{{tpq|So I am asking whether there is some way other than restarting the system to get it to find and free up the storage.}} It's hard to give a useful general answer to this without knowing what is taking up said storage to begin with. Remember we're not there with you looking at your computer screen; we can't see what's on your drives. The most generic answer is "sure there is as long as the things taking up space aren't locked Windows system files, which require a restart in order to modify/delete them." Software can always be configured to run periodically to go through deleting stuff "in the background". | |||
:For one you mentioned ]—the Windows ], which you probably have Windows "managing" the size of on its own (the default). Windows likes to be generous with its size and reserve more than you probably need, which then sits there taking up space. If you have no plans to use ], on a typical modern PC you can usually get away with just disabling it altogether, though you might want to leave a bit of margin and set it to half your RAM size. For this Web search: "Windows change page file size". --] (]) 04:12, 17 January 2025 (UTC) | |||
:::Thank you, ]. I have a disk analyzer, but will also try the one you recommend, and see which one gives me more what I want. When you say that you infer that my primary drive is an ], I think that you mean that my secondary storage is an , because my primary storage is my 12 GB of RAM, and my secondary storage on the C: is a 216 GB SSD, which is what was getting full. ] (]) 17:25, 17 January 2025 (UTC) | |||
::::Yeah. In computer-ese "storage", unqualified, is usually referring to ], stuff that keeps what's there without needing continual power, which excludes "]". And 12 GB is definitely a healthy amount; unless you're doing intensive things like ] design or playing graphics-intense 3D video games, you can get away with just disabling the page file entirely if you want. ] (]) 01:30, 18 January 2025 (UTC) | |||
:::::Yeah, I was about to ask how they use their computer with just 12 GB RAM. For web browsing/emails, that's more than enough. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 02:09, 18 January 2025 (UTC) | |||
== install a specific version of OSX == | |||
: I presume you're doing this as part of some kind of debugging. Normally, of course, you really, really do always want the <code>Host:</code> header (and of course it causes no harm even if the webserver you're hitting isn't hosting multiple domains). —] (]) 23:22, 3 January 2014 (UTC) | |||
Hi. I am trying to replicate the steps described here: https://stackoverflow.com/questions/71241711/is-there-a-way-to-access-your-own-airtag-data-via-api | |||
== Using search engine == | |||
The instructions specify: "You need macOS 14.3.1 or earlier for this to work. Items.data is encrypted in 14.4 and later." | |||
Apparently Google no longer thinks I should have full control over my searches. Is there any way to enforce that what is put between quotation marks is included in the search? For example I'm looking for a particular road safety video that was part of the "Think!" campaigns. Google thinks they know better and will also accept "think" but I inserted the exclamation point for a reason. --] (]) 21:30, 2 January 2014 (UTC) | |||
I currently do not have any Apple hardware, so I plan to purchase a "mac mini, m1, 2020" machine. After I receive the machine, I plan to factory reset it for security. | |||
:Unfortunately, Google doesn't seem to actually index most punctuation and only cares about a select few (e.g. '@', '#'). Google's documentation can be found here: https://support.google.com/websearch/answer/2466433. ] (]) 21:42, 2 January 2014 (UTC) | |||
After a factory reset, is it possible to install a specific version, such as 14.3.1 onto the machine? | |||
::Even if it's not indexed, they could still do the search. They would first need to retrieve everything indexed with "think" in it, then filter out those without the following exclamation mark. This would take quite a bit longer, of course, and they may refuse, due to the system load doing these type of searches would create. If the system load is the issue, it would be nice if they would allow you to do the filtering using your own PC, on the records they provide. ] (]) 18:43, 4 January 2014 (UTC) | |||
(My understanding that if I just use the regular "system update" path, it would it me directly to the latest OSX, which is currently 15.2.) ] (]) 21:42, 16 January 2025 (UTC) | |||
== Default settings in Word 2010 == | |||
:I would presume so. Thing is though, if you give the system Internet access it'll probably keep "trying" to update you to the latest OS X version. ] If you're already willing to spend money on the problem, why not just buy some different tracking device not from Apple that lets you talk to it however you want? What's the ultimate goal you're trying to accomplish here? --] (]) 04:22, 17 January 2025 (UTC) | |||
::Hi. Thank you for the help. | |||
::I haven't spent a dollar on this project yet, so I'm very flexible. I'm also pretty open-minded and will choose any brand or solution that fits my needs. I'm basically looking for a tracker to put in my bag so that I don't lose it. | |||
::I checked out the existing tracker networks and there's basically only two major ones: Apple AirTag and Google Find My Device. The former network is much larger than the latter, at least in 2025. The size of Apple's network (number of Apple smartphones in the wild) enables my bag to be tracked accurately, without me having to ever carry an Apple smartphone. | |||
::I'm usually not a fan of closed and propriety systems, but in this case it could take years before Google's (slightly more) open system catch up in network size unfortunately. ] (]) 17:48, 17 January 2025 (UTC) | |||
:::Along with {{ping|Slowking Man}}, I'm still very confused why you're dead set on OSX 13 and AirTags. If this is only for your personal use why does it matter how big the tracker network is? <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 18:34, 17 January 2025 (UTC) | |||
::::Solution A: If I put an airtag on my bag, then I can know where it is at all times, with 2 minute updates 24/7. (Regardless of where I physically am, or what phone I'm using.) This is because there are Apple devices blanketing the NA city that I live in, and they are willing to report the location of my bag to the Apple servers, without any payment or involvement from me. | |||
::::Solution B: If I buy a similar device from another manufacturer, let's say Google or Samsung, then their location service would report my bag as being in my house, but with minimal location updates in the future. This is because there aren't any Google or Samsung devices in my city willing to report the location of my bag to the Google/Samsung servers for free. To improve the accuracy of the location updates, I would have to maintain a Google/Samsung device near my bag, which kinda defeats the whole point. | |||
::::I hope I'm explaining it correctly. ] (]) 00:48, 18 January 2025 (UTC) | |||
:::There are plenty of options, such as ], ... You could throw in a cheapo device like a ] with a cellular module and battery. If you want to splurge, you can get something with a GPS and satellite comms connection that will work basically anywhere on Earth. | |||
:::Alternately if you think the Airtag is a good fit for your purpose why not just just get a cheap used iDevice™, if all you want is the Apple Find thing? I will point out that two things here are at odds: wanting to do things on-the-cheap, vs wanting constant real-time location updates. If you can relax one or the other that makes it a lot easier. Perhaps you don't really need 120-second interval location updates? --] (]) 01:24, 18 January 2025 (UTC) | |||
:::::I don't know Epideurus's specific reasons, but one I could understand would be a desire not to reward Apple for its walled-garden business model. That's why I've passed on Apple TV in spite of some reportedly good content. (That may be a little behind the times; I think it may now be possible to get some of those shows without Apple hardware, but I'm foggy on the details.) --] (]) 19:56, 20 January 2025 (UTC) | |||
::::That said, in my observations, fast tracking is not really anything that's really the case much with Find My anymore as sometimes my device's locations will be reported as their location from 2-5 days ago with Find My refusing to update. (Note: I'm still on iOS 18.2 so it might be fixed in 18.2.1.) Even when it used to be fast, it would only ping when you opened Find My, and would not auto-update for 5-7 mins. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 05:51, 18 January 2025 (UTC) | |||
== duplicate tab in Firefox == | |||
Whenever I create a brand new file in Word 2010, the following two settings are set as the default: (a) the font is set at Calibri; and (b) the paragraph setting has the item "Don't add space between paragraphs of the same style" with ''no'' check mark in front of it (and, hence, there ''is'' added space between paragraphs). Every time that I create a document, I change these two settings to: (a) Times New Roman font; and (b) a check mark added to the paragraph setting. Is there some way to set up as a default the settings that I want, rather than the pre-set Microsoft default settings? I looked around at "options", but that didn't seem to have the things I was looking for. Thanks. ] (]) 23:47, 2 January 2014 (UTC) | |||
In Firefox (on MacOS) I sometimes accidentally hit a combination of keys that makes a new tab, same as the current tab, appear at the right. Naturally I have not been able to reproduce this behavior intentionally, nor find it in a list of Firefox keyboard shortcuts. Am I dreaming? ] (]) 21:54, 16 January 2025 (UTC) | |||
: You can apply style changes to the default stylesheet, as described . -- ]'''ჷ'''] 00:08, 3 January 2014 (UTC) | |||
:Right click tab, select "Duplicate Tab"? <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 22:50, 16 January 2025 (UTC) | |||
:: Thank you. I will check that out. Thanks a lot. ] (]) 17:23, 4 January 2014 (UTC) | |||
: {{keypress|ctrl}} and drag on the tab will duplicate it; I've done that by accident; I can't see a non-mouse way of doing it. -- ]'''··–·'''] 22:51, 16 January 2025 (UTC) | |||
= January 4 = | |||
: And it is not which apparently means delete page to Misplaced Pages! ] (]) 23:46, 16 January 2025 (UTC) | |||
: {{keypress|Alt}}-{{keypress|Enter}} with the address bar highlighted will open its contents in a new tab, which is often functionally a tab duplication. So maybe you wrangled a {{keypress|Ctrl}}-{{keypress|L}}, {{keypress|Alt}}-{{keypress|Enter}}? (Sorry, not exactly sure what these map to on MacOS.) ] (]) 09:08, 17 January 2025 (UTC) | |||
= January 17 = | |||
== ] == | |||
== Opera == | |||
This is the situation: we made a system for pharmacies that only needs a username and a password to gain access to very sensitive data. National standards, etc, now require the system to have a "two-factor authentication". For real proof of identity, you'd also need for instance a chipcard or an SMS. Both have disadvantages which I'd like to avoid. Also, I think these rules were made thinking of a system that is available via Internet for which obviously just a username and password do not provide enough security. | |||
Any tips or tricks recommended? ] ] 18:42, 17 January 2025 (UTC) | |||
However, to gain access to our system you do need 2 factors. The first being able to guess a username and password; the second being that you need ''physical'' access to a PC in a pharmacy because you cannot reach the system via Internet. Even if you give someone your username and password, he'd have a hard time finding out what medication Ms. X is using. (Also, as soon as someone has access to a PC in a pharmacy, there's not much need to access a computer anyway because he could just look in the bags to see what medication people are taking.) | |||
:Avoid? -- Seriously, what do want to know? --] (]) 18:53, 17 January 2025 (UTC) | |||
:Isn't Opera run by a Chinese company now? <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 19:32, 17 January 2025 (UTC) | |||
::{{small|]? --] 23:36, 17 January 2025 (UTC)}} | |||
:::No, they are owned by Kunlun Tech Co., Ltd. Which should already raise privacy bells. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 23:39, 17 January 2025 (UTC) | |||
::::Meh. So, worse comes to the worse, the Central Committee get to see my browsing history. In a few days, your government gets owned by Putin. Swings and roundabouts, komrade. ] ] 23:48, 17 January 2025 (UTC) | |||
:::::You can't say I didn't warn you. You didn't have to bring US politics into this. This is the computing reference desk, not politics. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 23:53, 17 January 2025 (UTC) | |||
:::::Then feel free to answer the questions without editorializing, if you can; your time will be spent far more productively, I assure you. ] ] 11:41, 19 January 2025 (UTC) | |||
= January 19 = | |||
To make the case that we don't need extra security measures besides a username and password because the people having access to the system also must have managed to unlock the door, switch of the alarm, etc, I need an "offical" standard that acknowledges "physical access" being a "second factor" needed to gain access to a system. Does anyone know such a standard? ] (]) 02:11, 4 January 2014 (UTC) | |||
:When in doubt, I always consult the ]: . Title 21, Chapter II, 1311.100 through 1311.110 look relevant: it appears that there are actually very clear definitions for pharmacies (1300.03). "Two factor authentication" is required for certain activities, like servicing certain types of prescriptions. And, a security system only counts as "two factor authentication" (1311.105, for the purposes of these regulatory requirements) if it meets very specific standards defined in those regulations and their references. The CFR also references this ] publication: , so that also seems to be a relevant national standard (in the United States). Of course, I have no idea if you're subject to these or any other US regulations; interpreting that question is probably legal ''and'' medical advice... but it seems to me that a successful pharmacy business depends on very strict adherence to law and strict compliance with applicable regulations. Why don't you hire an attorney to help you navigate this issue? ] (]) 05:29, 4 January 2014 (UTC) | |||
== Twenty Year Society of Misplaced Pages editors == | |||
: One of the reasons for the rise in popularity of two-factor authentication is that, these days, there's just about no such thing as "not reachable via the Internet". Most computers ''are'' accessible remotely, either deliberately or by accident, and those that aren't may find themselves accessible tomorrow. So insisting on a separate, physical authentication factor really can improve security. (But, yes, at a cost in money and inconvenience. It's a sad truth in security that convenience and security are often mutually exclusive.) —] (]) 14:55, 4 January 2014 (UTC) | |||
::It's also worth remembering that looking in Ms. X's bag requires you to be present when Ms. X is picking up her medication. Beyond the possibility of breaking in when the store was closed which was mentioned, there's also the possibility of accessing the system at any time when staff are distracted to obtain the records not just of Ms. X, but Ms A, B, C, D, E, F, G,.... | |||
::I presume any pharmacy who find someone repeatedly looking in customers bags is going to kick them out (not to mention I'm not sure how looking in their bags necessarily helps to obtain their home address, telephone number, medical conditions and what ever other private details are stored in the system). | |||
::If staff catch someone on the computer, they may call the police, but that's if they catch them (remembering you only need one successful attempt for all those details). And even then, the pharmacy staff probably can't detain them so you'd need to hope the police find them. And actually a little social engineering may mean people can easily get themselves out of such a situation without a call to the police, although they probably won't try it at the same pharmacy again. | |||
::There's also other risks like someone physically connecting something to the machine although these may still apply even with two factor and I assume there are additional requirements to reduce the risk from them. | |||
::All in all, although some may use physical access to a trusted computer as a form of 2 factor authentication, you may have less lucky convincing the regulators to accept that in a case where highly private information is involved. | |||
::P.S. Of course, all this assumes that the staff involved follow proper practice and don't do stupid stuff like leave their phone/smartcard/token/whatever next to the machine unattended. If they do, then there's little difference between the two in terms of physical access. (Remote access both that mentioned by scs and where they attached something to the system is still different.) But I don't know how much success you'll have in convincing the regulators that your system is just as good because people most behave poorly. You'll probably need a better system if you want to convince them of that. | |||
::P.P.S. It's perhaps also worth remembering that in a case like yours where physical access to a machine is ideally needed anyway, it may be intended that there's actually effectively 3 factor authentication at play. | |||
::P.P.P.S. Of course I'm assuming that such systems are as bad as most system I see reported and lack any data limit protections. If they aren't then maybe adversaries won't get so many people in one go presuming they don't find a way around them, but still likely more than people are comfortable with or that are plausible from looking in bags. | |||
::] (]) 18:24, 4 January 2014 (UTC) | |||
How accurate a reflection is ] of the number of editors ''still active'' who have been here for 20 years or more? | |||
:I can think of some flaws: | |||
Is there a better way to measure editors who either: | |||
:1) A hacker may be able to spoof their location to make it look like they are using a pharmacy PC. | |||
# Made edits at least 20 years apart | |||
:2) The hacker may well use a worker at the pharmacy to insert a program that will extract large quantities of patient data. Let's say it's the ] "church" and they want to know everyone who is taking ] meds, so they can burn their houses down. | |||
# First edited over 20 years ago and are still (for some value, say: edited in the last three months) active? | |||
---- <span class="vcard"><span class="fn">]</span> (<span class="nickname">Pigsonthewing</span>); ]; ]</span> 11:37, 19 January 2025 (UTC) | |||
:3) The hacker might be able to gain control of the pharmacy PC remotely, without inside help, using the internet, then use that PC to access the database. ] (]) 18:37, 4 January 2014 (UTC) | |||
:I believe you have to do some database querying to get the report you want. See ]: if you have some SQL chops you can do it yourself, otherwise people there might be helpful. You might be interested in ]. (If the query is too "intensive" and times out you'll have to run it on ] or else ] and query it locally.) --] (]) 23:53, 19 January 2025 (UTC) | |||
::<small>Maybe I misunderstood, but my assumption from the OPs comments is we were referring to a situation where the database is stored on a local PC or network which theoretically isn't supposed to be internet accessible, so spoofing the location or pretending to be the pharmacy PC doesn't help. As scs highlighted, assuming the PC or network is never internet accessible is likely a mistake. But when that does happen, I'm not sure if it was intended to suggest that the physical PC requirement offered any protection. ] (]) 19:04, 4 January 2014 (UTC)</small> | |||
= January 20 = | |||
:As ] says in the lede, the factors are usually limited to "something you know", "something you have", and "something you are". Even if "somewhere you are" makes sense for authentication in your situation, it's not on that list, and you're unlikely to find a standard that includes it or lets you make up your own factors. But you may find a standard that doesn't require two-factor authentication for physically secure terminals. -- ] (]) 20:19, 4 January 2014 (UTC) | |||
== ttps// == | |||
== Monitoring and logging software == | |||
I have received a spam that has links to ttps://is.gd . What is ttps: ? It isn't the same as https: . | |||
I'm looking for some suggestions on software to monitor and log what has been happening on our work computer running Windows XP. Once an hour we send out the weather by modem and it almost always goes OK. Sometimes though the computer will freeze up and a reboot is in order. So we are trying to identify the problem. It would need to log not only the keystrokes and mouse gestures but also other actions that the computer performed. I've been searching for software but all I can find is stuff that assumes I want to spy on the staff. Of course the cheapest solution would be best and keyloggers can be had for nothing but I had trouble finding anything that would show what buttons were clicked with the mouse. Software to record and automate mouse clicking is available but not really helpful. Thanks. ] (]) 02:39, 4 January 2014 (UTC) | |||
I see that is.gd is an address-shortener. | |||
:If you haven't tried it, you might be able to get useful information from the event logger that runs automatically (I think). See http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/snap_event_viewer.mspx?mfr=true. ] (]) 02:53, 4 January 2014 (UTC) | |||
I read, analyze, and report a fair amount of email spam, and I don't think that I have seen a link with ttps. What is it? | |||
::Sorry I should have mentioned that I did look through the event viewer. It gives some information but not enough. I was able to tell from it that the last claimed occurrence of the computer freezing up was actually the user forgetting to send the weather out. If the computer had shut down and been rebooted there should have been a "The Event log service was started." entry. The last claimed problem before that is no longer in the log. ] (]) 08:59, 4 January 2014 (UTC) | |||
] (]) 02:44, 20 January 2025 (UTC) | |||
:I would assume probably a typo. ] (] • ]) 03:22, 20 January 2025 (UTC) | |||
:::It seems to me that as long as you are dependent on somebody doing something every hour to send the weather report out, you are bound to have frequent failures. Can't this process be automated ? ] (]) 20:37, 4 January 2014 (UTC) | |||
::Thank you, ]. If so, that is stupid, and we know that spammers are stupid. ] (]) 03:59, 20 January 2025 (UTC) | |||
:::{{small|That may be the case for most spammers, but I wouldn't rely on it. --] 13:37, 20 January 2025 (UTC)}} | |||
::::<small>No. Some of them are smart enough and devious enough to fool intelligent people. ] (]) 19:32, 20 January 2025 (UTC)</small> | |||
:::::is.gd is usually a shortened link generated by Apple Shortcuts. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 23:58, 20 January 2025 (UTC) | |||
:{{Outdent}} | |||
:Also, ttps is probably a dumb typo by the scammer. <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:1.15em"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 00:00, 21 January 2025 (UTC) | |||
== Detailed expertise on TCP active close? == | |||
With respect to ]: Does anybody here know if there is an ACK expected on the transition from "Closing" to "Time Wait" when a TCP connection is being actively terminated? --] (]) 11:35, 4 January 2014 (UTC) | |||
:Looking at , page 23, Figure 6 "TCP Connection State Diagram", seems to me like the ACKs are expected (there is a second ACK between LAST-ACK and CLOSED). Seems to me that the picture in the RFC is the source for the .svg image, so reliable-source-wise there are grounds for having the ACKs. ] (]) 16:45, 4 January 2014 (UTC) | |||
::Agree. That seems like an impeccable source to me. Thanks! --] (]) 19:47, 4 January 2014 (UTC) | |||
== Mobile version of Wordpress website / Dudamobile / GoDaddy - Why do I need this? == | |||
= January 24 = | |||
Okay, this is I am sure the dumbest n00best question ever, but here goes - I'm going to try to be very clear : Recently I decided to have my own blog - an actual non-blogger blog, with hosting, so that I could keep the files on my computer and mess with the code etc. But I am sort of busy and lazy and not the best coder, so I decided on a hosting package from GoDaddy that was bundled with Wordpress. (Yes, I hate the elephant poaching, but I also want something that is not going ot disappear and that is cheap, and I, like alot of people, don't really know much about these things). So I made my little test-stage blog and am using a "responsive theme" from Wordpress, meaning that it is supposed to automatically resize depending on the device on which it is being viewed - laptop, montior, ipad, various phones, etc. | |||
Now my first question then is - why did I need to activate the ] mobile site? There was a button I was require to push in order to make my mobile site "go live". I thought the Internet was just the Internet and that things would be available to phones if they were available on the Internet proper, no matter what. I assumed that some things would look crappy on the phone because the formatting was iffy, but I thought that anything that was on the Internet was also available to mobile devices. Are there whole areas of the Internet (Flash issues aside) that are just not available? (So that's Q1) | |||
Q2 is - when I finally made my mobile site "go live" it looked great online. Even my friend in London (I'm in California) who saw it on his different phone said so. It looked just like the actual online version of the site. But then there was this tool I was subsequently supposed to use from Dudamobile and I thought I had to use it - it asked me all sort of stuff about my color scheme and layout and changed everything so now the layout doesn't even seem to work if you turn the phone. This despite the fact that the original theme was "responsive". Add to this that the new color scheme is problematic because you can only have one background color on the phone, and so I have to choose something light enough for text and dark enough not to be plain white. The mobile site also looks kind of ... empty. | |||
Q3 : When the site first went "live" and my boyfriend could see it in London, it looked great on his phone and on mine here in Oakland, because it was just honeyrococo.com, but then I guess something somewhere in the system "updated" to now always refer it to something like mobile.honeyrococo.com which is where all the ugliness transpires. Is it not somehow possible to just have the honeyrococo.com responsive site load as honeyrococo.com on phones? Why do I need to have this intermediary "mobile" version? Is Dudamobile actually providing me a needed service? Or is it some kind of gatekeeper? Or worse, a parasite? Is it only there to make sites that aren't "responsive" look good? Is there anyway to get back to that Edenic moment of having just my normal site display on phones? | |||
Thank you in advance for any help. I am sure that I am asking the dumbest most obvious question(s) of all. ] 13:42, 4 January 2014 (UTC) | |||
: Ugh. I can't tell you how to turn the gunky, mobile-"optimized" rendering off, but I can tell you that, yes, you're right, you shouldn't need it. (And don't worry, these are not dumb questions; IMO the only dumb thing here is the situation you've been put in, by experts who ought to know better.) | |||
: What you're up against is one of the great, eternal divides in web programming (and, for that matter, computing at large): generality versus specificity. One faction would argue that if HTML has no inherent screen size or resolution baked into it (which of course it doesn't), and if it has lots of mechanisms to support tailoring of a page's rendering based on the capabilities of the browser (which of course it does), then the obviously Right thing to do is to have one general-purpose version of your page that loads and works great on any browser, from the largest desktop to the tiniest smartphone screen. And your first experience proves that this is indeed possible. | |||
: '''''BUT''''', there's this other faction that's just constitutionally incapable of accepting this situation. They come up with one little thing that looks bad on the biggest or the littlest screens, or that they want to do differently on the biggest or the littlest screens. (They might even be right; you obviously do want significantly different interaction styles on little touchscreens versus big screens with mice and keyboards.) But instead of rolling up their sleeves and figuring out a way of achieving their goal within the generic framework, they declare that for the "best possible", "optimized" user experience, we're all going to have to go with two wholly separate schemes, ponderously maintained in parallel. And you've seen the result. | |||
: Until you can figure out a way to turn the alternate gunk off, there might be a workaround: many "mobile optimized" schemes contain a little link somewhere to get back to the "desktop" version, for those die-hards who want to do it that way. See if you can find one of those lurking at the top or bottom of the page. (Or see if you can find a way to enable the mode-switching links, if they're available but off by default.) —] (]) 14:38, 4 January 2014 (UTC) | |||
: <small>P.S. Even Misplaced Pages has a separate, mobile-optimized version, and I have to say it's not bad. Thankfully, it's not "ponderously maintained in parallel", at least not on the content side.</small> | |||
: <small>P.P.S. It's not just in computing, either; this tension between ] is pretty much universal. But as some evolutionary biologist said, "change favors the generalist". But the inverse is also true: in times of stability, the specialists are gonna win. 14:47, 4 January 2014 (UTC)</small> | |||
:: Thanks ] for the sympathy and the link suggestions. I was trying to just put the http://honeyrococo.com/?no_redirect=true thing somewhere and see if that worked, but I will look into these other things that you suggest. I'm really sort of clueless so I will go google about and see what I come up with. :-) ] 16:17, 4 January 2014 (UTC) | |||
::: I seem to have fixed it - rather unbelievably - by simply "turning off mobile site" - before I guess there was a redirect to the mobile site, but not there isn't? Actually not sure what I did but happier. Wouldn't have discovered that without your help and encouragement to go fight the power and sniff around some more. Thanks Again Steve. ] 16:41, 4 January 2014 (UTC) | |||
== Downloading in WinServ 2008. == | |||
Well, it is the time again for me to ask stupid questions :-) This is what happened. I reinstalled my old Windows Server 2008, ran all updates, etc and now I want to download Hyper V and quite possibly other software. I found a microsoft website that offers the downloads and ran into a small problem: I have to download first '''Microsoft Download manager'''. I actually has done it many times before but in other OS. Now my Firewall blocks the download "Security Alert: Your current security settings do not allow this file to be downloaded. " - this is what I get in a small pop-up. I am kind of afraid to turn the firewall off even for a single download so I tried to set up an exception. In "Windows Firewall" I clicked on "Change Settings." A window "Windows Firewall Settings" comes up. I added TCP port 25, called it "Inbound Port 25." and nothing happened. The download is stil blocked. What is wrong? What would be the other way to run safe downloads? Thanks, --] (]) 18:57, 4 January 2014 (UTC) | |||
:Rather than not allowing any downloads, you can set it to prompt you each time. ] (]) 20:25, 4 January 2014 (UTC) | |||
:You don't need Microsoft Download Manager. They may recommend it, but you can download their files without it. | |||
:Why do you think the message came from Windows Firewall? suggests that the "Your current security settings..." message is from Internet Explorer and you need to change the settings there. And why do you want to unblock port 25? That's the ] port. It seems like you're trying things completely at random... -- ] (]) 20:31, 4 January 2014 (UTC) | |||
Port 25 is SMTP port for some, inbound port for . Well, anyhow I could not find so far how to prompt for the download every time (answering StuRat's suggestion). WinSer is a peculiar environment. Microsoft Download manager is '''NEEDED''' for downloading large files whereas it can download portions of a single file piecemeal and also it keeps track of all downloads which is very convenient. Thanks for contributions. I suggest to '''BenRG''' you either abstain from your inappropriate comments ("doing things at random") or stay clear off my posts. It is a WARNING!!! And it is the last one. --] (]) 20:47, 4 January 2014 (UTC) |
Latest revision as of 00:05, 24 January 2025
Welcome to the computing sectionof the Misplaced Pages reference desk. skip to bottom Select a section: Shortcut Want a faster answer?
Main page: Help searching Misplaced Pages
How can I get my question answered?
- Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
- Post your question to only one section, providing a short header that gives the topic of your question.
- Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
- Don't post personal contact information – it will be removed. Any answers will be provided here.
- Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
- Note:
- We don't answer (and may remove) questions that require medical diagnosis or legal advice.
- We don't answer requests for opinions, predictions or debate.
- We don't do your homework for you, though we'll help you past the stuck point.
- We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.
How do I answer a question?
Main page: Misplaced Pages:Reference desk/Guidelines
- The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
January 13
Absolute value inequality
A meteorite is 600ft from a satellite and travelling toward the satellite at 42ft/sec. At what times will the meteorite be less than 50ft away from the satellite? Write an appropriate absolute value inequality for the given situation and solve: Let|42t-600|<50 and 42t-600<50 and 42t-600>-50. Thus, 13.10<t<15.48. Afrazer123 (talk) 22:21, 13 January 2025 (UTC)
- What is the question?
- The given data do not specify where the meteorite is at time t = 0, and also not with which speed the satellite is moving. Your solution is based on the (not unreasonable) assumptions that the person who drew up this assignment meant t = 0 to be the initial moment when the meteorite is 600ft away from the satellite, and that the speed of 42ft/s is the speed of the meteorite relative to the satellite. Your solution assumes that the meteorite will not hit the satellite, but pass by it. Under these assumptions, the derived inequations are correct, as is your solution, although not with exact values but with numeric values rounded to two decimals.
- If the meteorite hits the satellite, we don't know what happens after t = 14.29. If the satellite disintegrates, the notion of the distance between the bodies becomes meaningless. --Lambiam 23:59, 13 January 2025 (UTC)
- Please do your own homework.
- Welcome to the Misplaced Pages Reference Desk. Your question appears to be a homework question. I apologize if this is a misinterpretation, but it is our aim here not to do people's homework for them, but to merely aid them in doing it themselves. Letting someone else do your homework does not help you learn nearly as much as doing it yourself. Please attempt to solve the problem or answer the question yourself first. If you need help with a specific part of your homework, feel free to tell us where you are stuck and ask for help. If you need help grasping the concept of a problem, by all means let us know.
- This is additionally the Reference desk for computing and electronics-related topics, not mathematics. --Slowking Man (talk) 06:11, 15 January 2025 (UTC)
- But is it homework? Homework formulates an exercise, often in the form of a problem, asking for its solution. It is not usual for homework to contain the detailed solution to a stated problem. What is then the exercise? --Lambiam 10:32, 15 January 2025 (UTC)
- Maybe they forgot the rest of the problem? Or maybe it's just someone/somebot sloppily copy-pasting stuff from the Web to try and waste people's time. --Slowking Man (talk) 05:18, 16 January 2025 (UTC)
- I think it's not homework. They might be sending stuff into space. Gnu779 (talk) 12:22, 16 January 2025 (UTC)
- 📐 Afrazer123 (talk) 21:33, 17 January 2025 (UTC)
- 📐 Afrazer123 (talk) 21:35, 17 January 2025 (UTC)
- Maybe they forgot the rest of the problem? Or maybe it's just someone/somebot sloppily copy-pasting stuff from the Web to try and waste people's time. --Slowking Man (talk) 05:18, 16 January 2025 (UTC)
- The inequality problem was not school homework. I apologize for the mix-up. I was only checking my answer. Afrazer123 (talk) 21:40, 17 January 2025 (UTC)
- Yeah, thank me for saving you. Someone got confused. 🪐🛰 Gnu779 (talk) 09:43, 18 January 2025 (UTC)
- But is it homework? Homework formulates an exercise, often in the form of a problem, asking for its solution. It is not usual for homework to contain the detailed solution to a stated problem. What is then the exercise? --Lambiam 10:32, 15 January 2025 (UTC)
January 15
What is this character?
Inequality (mathematics) has several characters that my computer renders as little boxes. For example:
- a <⃥͏ a (irreflexivity) — after the first italic a
- if a < b, then b <⃥͏ a (asymmetry) — after the second italic b
What are they? In both cases that I copied, the box is seemingly the same character as the lesser-than sign, since I can't highlight one without the other. I figured I could get the answer from Google (there are enough Unicode charts online), but I get just four results for the combined lesser-than-and-box: the inequality article, two Reddit pages, and something in Thai. When I put the combined lesser-than-and-box into the URL, I'm shown MediaWiki:Badtitletext, which makes sense for a title containing a standalone < character, but not for one where the < elements are part of a special character. Nyttend (talk) 20:29, 15 January 2025 (UTC)
- A less-than with two combining codes:
index chr codepoint utf8 cat name 0 < U+003c 3c Sm LESS-THAN SIGN 1 ⃥ U+20e5 e283a5 Mn COMBINING REVERSE SOLIDUS OVERLAY 2 ͏ U+034f cd8f Mn COMBINING GRAPHEME JOINER
- In other words, it's a "not less than" sign. Unicode's single character for that is hex 226E or ≮, although it uses a slash rather than a backslash ("reverse solidus") to overstrike the < sign. --142.112.149.206 (talk) 02:47, 16 January 2025 (UTC)
- Latex also uses The use of a forward slash, as in to mean is standard. I can't think of a reason for using the backslashed symbol instead and have replaced <\ by ≮. --Lambiam 09:27, 16 January 2025 (UTC)
- In other words, it's a "not less than" sign. Unicode's single character for that is hex 226E or ≮, although it uses a slash rather than a backslash ("reverse solidus") to overstrike the < sign. --142.112.149.206 (talk) 02:47, 16 January 2025 (UTC)
January 16
Miraheze Stuff
What should I do if my wiki is approved on Miraheze? Gnu779 (talk) 12:21, 16 January 2025 (UTC)
- That should depend on the scope and goals of the wiki you have requested, which we don't know. Do you already have a small team of dedicated volunteers who will supply a non-trivial amount of relevant content? An empty wiki is not conducive to attracting new contributors. --Lambiam 23:56, 16 January 2025 (UTC)
- Does it have to do with Yangon Bus Service? --Lambiam 00:12, 17 January 2025 (UTC)
- No, my friend in interested in YBS. It's not me. He told me from a distant place that he wants a wiki. And I have another wiki personally on my kernel. Gnu779 (talk) 12:55, 17 January 2025 (UTC)
Temp Files on C: Drive
I have a Dell Inspiron 3910 running Windows 11. It has a C: drive with what is shown as either 216 GB or 232,783,867,904 bytes. (So those are 216 binary gigabytes, of 2**30 bytes each.) Anyway, This PC usually shows that it has between 20 GB and 45 GB free. If the free storage becomes less than 10%, it displays a red bar in This PC. One parameter that I am familiar with that changes is the size of pagefile.sys, which starts as 12 GB and often increases as it runs up to 24 GB or even 28 GB. I sometimes see the free storage on the C: drive drop to as low as 16 GB, which doesn't bother me, even if it bothers This PC. I don't need unlimited free storage on my C: drive; I need enough free storage on my C: drive. What happened yesterday is that it began displaying that about 5.5 GB was free, much less than I have seen before. I hadn't done anything that should have filled up the C: drive, such as importing video clips from my phone. (I know that video clips are large because they are three-dimensional because time is the third dimension.) I found a few folders on my C: drive that were at least 1 GB and I wasn't using, and I moved them to the E: drive, which is a great monster of a 4TB solid-state device. I thought that might free up a few gigabytes, and it didn't change anything. At about this point Windows Update told me that operating system updates were ready to install, and so I needed to schedule a time for a system restart. After the restart, my C: drive shows as having 44.9 GB free. That is, approximately 39 GB was reclaimed during the restart. I know that approximately 10 GB of that was pagefile.sys. Where did it get more than 25GB of free disk storage from? Is there a way that I can free up this disk storage other than by a restart? I know that some of this was temporary files created by Google Chrome and Microsoft Edge and a few other standard programs. Is there a utility that I can use that frees up temporary storage without restarting Windows? Robert McClenon (talk) 18:10, 16 January 2025 (UTC)
- @Robert McClenon I don't know of any program that finds temp files, but a good guideline I have in general is to use something like WinDirStat or WizTree (preferably the latter), as both show a graphical display of the biggest files on your drive, and may help in this case. TheTechie@enwiki (she/they | talk) 21:44, 16 January 2025 (UTC)
- Thank you, User:TheTechie. I had already been using Disk Space Analyzer Max, which showed me the directories that were using a lot of space, and that didn't help much. What I saw was that Google Chrome had a large amount of data, for instance, but I didn't know what Google Chrome data was useful to it and what was temporary. As I said, I tried moving a few directories, each of which was about 1 GB, from C: to tertiary storage, and that didn't help. I thought it would make about 3 GB free, but maybe it took Windows a while to catch on. Obviously the restart found and freed up a lot of storage. So I am asking whether there is some way other than restarting the system to get it to find and free up the storage. Maybe I am looking for something that either does not exist or is buried somewhere, like treasure. Robert McClenon (talk) 22:19, 16 January 2025 (UTC)
- If it's Google Chrome that's the culprit, have you tried clearing your cache and browsing history? For me, caching and history have led to many GiBs being used in Chrome in the past. TheTechie@enwiki (she/they | talk) 23:07, 16 January 2025 (UTC)
- Whoops forgot ping @Robert McClenon TheTechie@enwiki (she/they | talk) 03:01, 17 January 2025 (UTC)
- Thank you, User:TheTechie - That is useful advice. If I see that Google Chrome is using a lot of SSD space, I will purge its cache and browsing history. I assume that advice also applies to any other web browser. More generally, I infer that if any application is using a lot of temporary space, it can be nuked if there is an option in the application to nuke the temp storage, and, if not, it can always be restarted. Apparently a lot of applications clean up their own litter boxes when they start up. In this respect they are unlike cats. Robert McClenon (talk) 17:25, 17 January 2025 (UTC)
- If it's Google Chrome that's the culprit, have you tried clearing your cache and browsing history? For me, caching and history have led to many GiBs being used in Chrome in the past. TheTechie@enwiki (she/they | talk) 23:07, 16 January 2025 (UTC)
- Thank you, User:TheTechie. I had already been using Disk Space Analyzer Max, which showed me the directories that were using a lot of space, and that didn't help much. What I saw was that Google Chrome had a large amount of data, for instance, but I didn't know what Google Chrome data was useful to it and what was temporary. As I said, I tried moving a few directories, each of which was about 1 GB, from C: to tertiary storage, and that didn't help. I thought it would make about 3 GB free, but maybe it took Windows a while to catch on. Obviously the restart found and freed up a lot of storage. So I am asking whether there is some way other than restarting the system to get it to find and free up the storage. Maybe I am looking for something that either does not exist or is buried somewhere, like treasure. Robert McClenon (talk) 22:19, 16 January 2025 (UTC)
- Install WizTree (free), boom, gives you an overview of everything stored on your storage volumes. Also lets you manage said stuff.
- Anything called "cache" or "temp" can be safely nuked. A cache is just copies of things stored for speeding things up and can always be regenerated. In fact I suggest just making your browser shut off disk caching, which is largely unneeded these days unless you're on a slow connection, and eats away at the lifetime of SSDs, which it sounds like your primary drive is. Web search "<name of browser> disable disk caching"
So I am asking whether there is some way other than restarting the system to get it to find and free up the storage.
It's hard to give a useful general answer to this without knowing what is taking up said storage to begin with. Remember we're not there with you looking at your computer screen; we can't see what's on your drives. The most generic answer is "sure there is as long as the things taking up space aren't locked Windows system files, which require a restart in order to modify/delete them." Software can always be configured to run periodically to go through deleting stuff "in the background".- For one you mentioned pagefile.sys—the Windows page file, which you probably have Windows "managing" the size of on its own (the default). Windows likes to be generous with its size and reserve more than you probably need, which then sits there taking up space. If you have no plans to use hibernation, on a typical modern PC you can usually get away with just disabling it altogether, though you might want to leave a bit of margin and set it to half your RAM size. For this Web search: "Windows change page file size". --Slowking Man (talk) 04:12, 17 January 2025 (UTC)
- Thank you, User:Slowking Man. I have a disk analyzer, but will also try the one you recommend, and see which one gives me more what I want. When you say that you infer that my primary drive is an SSD, I think that you mean that my secondary storage is an , because my primary storage is my 12 GB of RAM, and my secondary storage on the C: is a 216 GB SSD, which is what was getting full. Robert McClenon (talk) 17:25, 17 January 2025 (UTC)
- Yeah. In computer-ese "storage", unqualified, is usually referring to persistent storage, stuff that keeps what's there without needing continual power, which excludes "RAM". And 12 GB is definitely a healthy amount; unless you're doing intensive things like 3D graphics design or playing graphics-intense 3D video games, you can get away with just disabling the page file entirely if you want. Slowking Man (talk) 01:30, 18 January 2025 (UTC)
- Yeah, I was about to ask how they use their computer with just 12 GB RAM. For web browsing/emails, that's more than enough. TheTechie@enwiki (she/they | talk) 02:09, 18 January 2025 (UTC)
- Yeah. In computer-ese "storage", unqualified, is usually referring to persistent storage, stuff that keeps what's there without needing continual power, which excludes "RAM". And 12 GB is definitely a healthy amount; unless you're doing intensive things like 3D graphics design or playing graphics-intense 3D video games, you can get away with just disabling the page file entirely if you want. Slowking Man (talk) 01:30, 18 January 2025 (UTC)
- Thank you, User:Slowking Man. I have a disk analyzer, but will also try the one you recommend, and see which one gives me more what I want. When you say that you infer that my primary drive is an SSD, I think that you mean that my secondary storage is an , because my primary storage is my 12 GB of RAM, and my secondary storage on the C: is a 216 GB SSD, which is what was getting full. Robert McClenon (talk) 17:25, 17 January 2025 (UTC)
install a specific version of OSX
Hi. I am trying to replicate the steps described here: https://stackoverflow.com/questions/71241711/is-there-a-way-to-access-your-own-airtag-data-via-api
The instructions specify: "You need macOS 14.3.1 or earlier for this to work. Items.data is encrypted in 14.4 and later."
I currently do not have any Apple hardware, so I plan to purchase a "mac mini, m1, 2020" machine. After I receive the machine, I plan to factory reset it for security.
After a factory reset, is it possible to install a specific version, such as 14.3.1 onto the machine?
(My understanding that if I just use the regular "system update" path, it would it me directly to the latest OSX, which is currently 15.2.) Epideurus (talk) 21:42, 16 January 2025 (UTC)
- I would presume so. Thing is though, if you give the system Internet access it'll probably keep "trying" to update you to the latest OS X version. Are you sure pursuing this line of action is the best way to go about accomplishing what you want? If you're already willing to spend money on the problem, why not just buy some different tracking device not from Apple that lets you talk to it however you want? What's the ultimate goal you're trying to accomplish here? --Slowking Man (talk) 04:22, 17 January 2025 (UTC)
- Hi. Thank you for the help.
- I haven't spent a dollar on this project yet, so I'm very flexible. I'm also pretty open-minded and will choose any brand or solution that fits my needs. I'm basically looking for a tracker to put in my bag so that I don't lose it.
- I checked out the existing tracker networks and there's basically only two major ones: Apple AirTag and Google Find My Device. The former network is much larger than the latter, at least in 2025. The size of Apple's network (number of Apple smartphones in the wild) enables my bag to be tracked accurately, without me having to ever carry an Apple smartphone.
- I'm usually not a fan of closed and propriety systems, but in this case it could take years before Google's (slightly more) open system catch up in network size unfortunately. Epideurus (talk) 17:48, 17 January 2025 (UTC)
- Along with @Slowking Man:, I'm still very confused why you're dead set on OSX 13 and AirTags. If this is only for your personal use why does it matter how big the tracker network is? TheTechie@enwiki (she/they | talk) 18:34, 17 January 2025 (UTC)
- Solution A: If I put an airtag on my bag, then I can know where it is at all times, with 2 minute updates 24/7. (Regardless of where I physically am, or what phone I'm using.) This is because there are Apple devices blanketing the NA city that I live in, and they are willing to report the location of my bag to the Apple servers, without any payment or involvement from me.
- Solution B: If I buy a similar device from another manufacturer, let's say Google or Samsung, then their location service would report my bag as being in my house, but with minimal location updates in the future. This is because there aren't any Google or Samsung devices in my city willing to report the location of my bag to the Google/Samsung servers for free. To improve the accuracy of the location updates, I would have to maintain a Google/Samsung device near my bag, which kinda defeats the whole point.
- I hope I'm explaining it correctly. Epideurus (talk) 00:48, 18 January 2025 (UTC)
- There are plenty of options, such as Tile, Marco Polo Tracking... You could throw in a cheapo device like a Raspberry Pi with a cellular module and battery. If you want to splurge, you can get something with a GPS and satellite comms connection that will work basically anywhere on Earth.
- Alternately if you think the Airtag is a good fit for your purpose why not just just get a cheap used iDevice™, if all you want is the Apple Find thing? I will point out that two things here are at odds: wanting to do things on-the-cheap, vs wanting constant real-time location updates. If you can relax one or the other that makes it a lot easier. Perhaps you don't really need 120-second interval location updates? --Slowking Man (talk) 01:24, 18 January 2025 (UTC)
- I don't know Epideurus's specific reasons, but one I could understand would be a desire not to reward Apple for its walled-garden business model. That's why I've passed on Apple TV in spite of some reportedly good content. (That may be a little behind the times; I think it may now be possible to get some of those shows without Apple hardware, but I'm foggy on the details.) --Trovatore (talk) 19:56, 20 January 2025 (UTC)
- That said, in my observations, fast tracking is not really anything that's really the case much with Find My anymore as sometimes my device's locations will be reported as their location from 2-5 days ago with Find My refusing to update. (Note: I'm still on iOS 18.2 so it might be fixed in 18.2.1.) Even when it used to be fast, it would only ping when you opened Find My, and would not auto-update for 5-7 mins. TheTechie@enwiki (she/they | talk) 05:51, 18 January 2025 (UTC)
- Along with @Slowking Man:, I'm still very confused why you're dead set on OSX 13 and AirTags. If this is only for your personal use why does it matter how big the tracker network is? TheTechie@enwiki (she/they | talk) 18:34, 17 January 2025 (UTC)
duplicate tab in Firefox
In Firefox (on MacOS) I sometimes accidentally hit a combination of keys that makes a new tab, same as the current tab, appear at the right. Naturally I have not been able to reproduce this behavior intentionally, nor find it in a list of Firefox keyboard shortcuts. Am I dreaming? —Tamfang (talk) 21:54, 16 January 2025 (UTC)
- Right click tab, select "Duplicate Tab"? TheTechie@enwiki (she/they | talk) 22:50, 16 January 2025 (UTC)
- ctrl and drag on the tab will duplicate it; I've done that by accident; I can't see a non-mouse way of doing it. -- Finlay McWalter··–·Talk 22:51, 16 January 2025 (UTC)
- And it is not which apparently means delete page to Misplaced Pages! Graeme Bartlett (talk) 23:46, 16 January 2025 (UTC)
- Alt-↵ Enter with the address bar highlighted will open its contents in a new tab, which is often functionally a tab duplication. So maybe you wrangled a Ctrl-L, Alt-↵ Enter? (Sorry, not exactly sure what these map to on MacOS.) Emberfiend (talk) 09:08, 17 January 2025 (UTC)
January 17
Opera
Any tips or tricks recommended? Serial (speculates here) 18:42, 17 January 2025 (UTC)
- Avoid? -- Seriously, what do want to know? --Wrongfilter (talk) 18:53, 17 January 2025 (UTC)
- Isn't Opera run by a Chinese company now? TheTechie@enwiki (she/they | talk) 19:32, 17 January 2025 (UTC)
- Chinese Opera? --Lambiam 23:36, 17 January 2025 (UTC)
- No, they are owned by Kunlun Tech Co., Ltd. Which should already raise privacy bells. TheTechie@enwiki (she/they | talk) 23:39, 17 January 2025 (UTC)
- Meh. So, worse comes to the worse, the Central Committee get to see my browsing history. In a few days, your government gets owned by Putin. Swings and roundabouts, komrade. Serial (speculates here) 23:48, 17 January 2025 (UTC)
- You can't say I didn't warn you. You didn't have to bring US politics into this. This is the computing reference desk, not politics. TheTechie@enwiki (she/they | talk) 23:53, 17 January 2025 (UTC)
- Then feel free to answer the questions without editorializing, if you can; your time will be spent far more productively, I assure you. Serial (speculates here) 11:41, 19 January 2025 (UTC)
- Meh. So, worse comes to the worse, the Central Committee get to see my browsing history. In a few days, your government gets owned by Putin. Swings and roundabouts, komrade. Serial (speculates here) 23:48, 17 January 2025 (UTC)
- No, they are owned by Kunlun Tech Co., Ltd. Which should already raise privacy bells. TheTechie@enwiki (she/they | talk) 23:39, 17 January 2025 (UTC)
- Chinese Opera? --Lambiam 23:36, 17 January 2025 (UTC)
January 19
Twenty Year Society of Misplaced Pages editors
How accurate a reflection is Category:Members of the Twenty Year Society of Misplaced Pages editors of the number of editors still active who have been here for 20 years or more?
Is there a better way to measure editors who either:
- Made edits at least 20 years apart
- First edited over 20 years ago and are still (for some value, say: edited in the last three months) active?
Andy Mabbett (Pigsonthewing); Talk to Andy; Andy's edits 11:37, 19 January 2025 (UTC)
- I believe you have to do some database querying to get the report you want. See WP:Quarry: if you have some SQL chops you can do it yourself, otherwise people there might be helpful. You might be interested in mw:Manual:Database schema. (If the query is too "intensive" and times out you'll have to run it on Labs or else download the database and query it locally.) --Slowking Man (talk) 23:53, 19 January 2025 (UTC)
January 20
ttps//
I have received a spam that has links to ttps://is.gd . What is ttps: ? It isn't the same as https: .
I see that is.gd is an address-shortener.
I read, analyze, and report a fair amount of email spam, and I don't think that I have seen a link with ttps. What is it? Robert McClenon (talk) 02:44, 20 January 2025 (UTC)
- I would assume probably a typo. Alpha3031 (t • c) 03:22, 20 January 2025 (UTC)
- Thank you, User:Alpha3031. If so, that is stupid, and we know that spammers are stupid. Robert McClenon (talk) 03:59, 20 January 2025 (UTC)
- That may be the case for most spammers, but I wouldn't rely on it. --Lambiam 13:37, 20 January 2025 (UTC)
- No. Some of them are smart enough and devious enough to fool intelligent people. Robert McClenon (talk) 19:32, 20 January 2025 (UTC)
- is.gd is usually a shortened link generated by Apple Shortcuts. TheTechie@enwiki (she/they | talk) 23:58, 20 January 2025 (UTC)
- No. Some of them are smart enough and devious enough to fool intelligent people. Robert McClenon (talk) 19:32, 20 January 2025 (UTC)
- That may be the case for most spammers, but I wouldn't rely on it. --Lambiam 13:37, 20 January 2025 (UTC)
- Thank you, User:Alpha3031. If so, that is stupid, and we know that spammers are stupid. Robert McClenon (talk) 03:59, 20 January 2025 (UTC)
- Also, ttps is probably a dumb typo by the scammer. TheTechie@enwiki (she/they | talk) 00:00, 21 January 2025 (UTC)