Search:
Type: Posts; User: jerryctx
Search:
Search took 0.12 seconds; generated 26 minute(s) ago.
-
September 2nd, 2010, 09:56 PM
Congratulations! For anyone else reading this, be aware there is a slight chance of ink spills when turning an ink printer upside down or on its side. Be careful. :)
-
September 2nd, 2010, 10:38 AM
Knowledge about what? I didn't ask a question. I'm confused. Not that that is unusual. :)
-
August 30th, 2010, 11:06 PM
http://gallery.rr.com/gallery/Newly_Discovered_Species?image_id=06jW4xgb8a28G
-
August 30th, 2010, 06:48 PM
I have no idea how feasible this is but the MIT association is encouraging:
http://senseable.mit.edu/seaswarm/
Watch the video to the end.
-
August 30th, 2010, 06:40 AM
Enter "misfeed" in the search box, then click on the entry that best describes your symptoms:
http://www.usa.canon.com/cusa/sna/consumer/printers_multifunction/i_series/i475d#ServiceAndSupport
-
August 28th, 2010, 07:54 PM
Try the test described here:
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&taskId=110&prodSeriesId=43059&prodTypeId=18972&prodSeriesId=43059&objectID=bpa00224
...
-
August 26th, 2010, 04:26 PM
This thread is from 2007. Perhaps he still visits but hasn't posted since.
-
August 24th, 2010, 02:12 PM
I don't know if this link will work but its worth a try:
http://gallery.rr.com/gallery/Baby_animals#image=0dvq30p8zzeCd&view=filmstrip
-
August 24th, 2010, 12:25 AM
Four digit PINs are used for debit/credit transactions at ATMs and POS terminals. They are reasonably secure because the card issuer locks out access after three consecutive incorrect PIN entries....
-
August 23rd, 2010, 10:36 AM
The article I linked to in a previous post is not about the "best" security but about "practical" security. For example, if VDr required a 12 character password I would never have joined. According...
-
August 20th, 2010, 09:09 PM
Anyone who really cares about psw security should read:
http://weis2010.econinfosec.org/papers/session3/weis2010_bonneau.pdf
For those who don't take the time to read it, here is a "gotcha" I...
-
August 19th, 2010, 03:49 PM
Thanks Nick. The "See Also" links at the bottom of that page are also interesting. I don't recommend trying the do-it-yourself Daguerrotypes. The process is dangerous.
-
August 18th, 2010, 12:39 PM
Sometimes a wagon stopped long enough to partially register leaving a ghostly image. Portrait studios looked like torture chambers with devices to hold the head rigid during the long exposure.
-
August 17th, 2010, 09:00 AM
JDC -Thanks.
I noted one lens had a max aperture of f15; very poor light gathering ability but easier to maintain a quality image.
-
August 16th, 2010, 04:01 PM
Resolution also depends on the image produced by the lens. Any photo process, traditional or digital, can only record the detail in the image generated by the lens.
I am astounded that a lens of...
-
August 15th, 2010, 04:57 PM
I'll bet this is a loss-leader for Target. They are selling it at close to what they paid Epson. When you add in the cost of advertising/promotion they may be losing money on each sale. For...
-
August 15th, 2010, 02:01 PM
All vendors sell low end ink jets for little profit. They make money on the ink.
However, this model is also a special deal between Epson and Target. It is not available at other retailers.
Re...
-
August 15th, 2010, 01:40 PM
Dude, we've already debated your belief that the world is out to get you so I'll only add that you really should stop reading this sort of article.
-
August 15th, 2010, 08:42 AM
Amen. I spent years working security for a large firm. 90% of our time was spent assisting users who forgot their password.
Of course, that doesn't mean writing it on a yellow sticky and affixing...
-
August 14th, 2010, 02:59 PM
Brute force attacks try every possible combination of values. Use of symbols offers no additional protection against brute force. Use of symbols not on your keyboard makes typing very error prone.
-
August 13th, 2010, 06:51 PM
Philip M makes a good point. Brute force attacks are often impractical. There are exceptions. For example, if your computer is stolen, brute force could be used to break the encryption key you used...
-
August 13th, 2010, 02:22 PM
Some password systems convert all letters to the same (usually upper) case. I wouldn't rely on mixed case to add complexity.
Some systems don't allow symbols. Even if allowed, their use can be...
-
August 8th, 2010, 03:05 AM
Foxy - Thanks for your post. Once again the pictures seem more meaningful than all the czarist photos and stories I have seen in the past.
Also enjoyed the technical info, having worked with...
-
August 5th, 2010, 10:35 PM
It was a different world and just one human lifetime ago. It is the first collection of "home front" pictures I've seen and somehow made the war real in a way that combat photos don't. Thanks for a...
-
August 5th, 2010, 11:34 AM
BTW - Are you sure this program will reduce PDF size? As far as I can tell it only converts other file formats to PDF.
|
|