Search:

Type: Posts; User: Wilbur

Page 1 of 3 1 2 3

Search: Search took 0.03 seconds.

  1. Replies
    6
    Views
    1,283

    Re: Negative points about Google SEO

    I think that you should have an idea about algorithm to the first results. Google always has organized the pages according to the occurrence or recurrence of a keyword in each site. Then came some...
  2. Replies
    4
    Views
    1,278

    Re: How to choose the right ECM software?

    Still one of the key vendors in the ECM market is EMC, according to Gartner, but only with a market share of 10 percent. EMC covers the entire ECM spectrum and stands out by advanced capabilities...
  3. Re: Leakage and Improper Error Handling in Web applications

    In many web applications missing cryptographic functions or are poorly implemented. Here, the encryption of sensitive data such as access and credit card information, or non-predictability of such...
  4. Re: What are the new features in Internet Explorer 9?

    Add-on Manager

    The appearance of the add-on manager was not further modified. The message and background functions, however, were completely revised. When you first start you will be asked to...
  5. Replies
    7
    Views
    1,715

    Re: utorrent extension for Google Chrome

    You can use the FlashBlock as extension for Google Chrome. With a hard work, Google Chrome is progressing at high speed. Having been acclaimed as Windows is now available for Mac and Linux. Apart...
  6. Re: How to update torrent trackers "The Pirate Bay"

    So if you have a torrent for The Pirate Bay stopped or stalled, you can use the following trackers to date and continue to download :


    http://tracker.openbittorrent.com/announce
    udp: / /...
  7. Replies
    4
    Views
    1,280

    Re: uTorrent without a proxy

    If you want to set your uTorrent with the proxy, then the following link will help you :
    http://forums.techarena.in/technology-internet/1347583.htm
    Otherwise, you can use the pirate bay for...
  8. Replies
    11
    Views
    3,550

    Re: How to hide IP manually?

    There are situations in which we visit a site without leaving a trace on it, you might have wanted to spy on the competition site. Your visit will be recorded in a log file from the server. Frequent...
  9. Replies
    4
    Views
    762

    Re: Problem with Utorrent speed reception

    I have a similar problem. I would first like to say that I really do not understand all the computer jargon .. Here, I use utorrent for a while (wifi connection) and the other day I proposed to...
  10. Replies
    6
    Views
    860

    Re: utorrent & defragmenting

    The more files on your hard disk have this anger every time slower over time, yet there is a way to make faster and fence which is explained below. When you defragment your hard disk it works more...
  11. Replies
    7
    Views
    1,965

    Re: Cache settings (intensive cache usage)

    You can also use the BitSpirit instead of uTorrent, if you are facing some problems. BitSpirit is a customization wizard to configure various aspects of the program. To get started, specify your...
  12. Replies
    4
    Views
    10,113

    Re: Proxy settings in Utorrent

    Have you declared the proxy? You might have declared an HTTP proxy. This means with the intention of the proxy issue will deal simply with HTTP packets only. Therefore, it allows you to surf the web,...
  13. Replies
    9
    Views
    1,636

    Re: Memory leak problems in C++

    With the inclusion of crtdbg.h, you map the functions malloc and free in their versions Debug _malloc_dbg and _free_dbg, who monitor the allocation and deallocation of memory. This mapping only...
  14. Replies
    4
    Views
    1,118

    Re: Ethernet Bridging on Linux

    You will also have to edit the OpenVPN server configuration file to enable a bridging configuration. How out-the-line Which says dev tun and replace it with INSTEAD :

    dev tap0
    How the Line Out...
  15. Replies
    8
    Views
    897

    Re: Windows Home Server Problem

    Windows Home Server allows the creation and management of up to 10 users. These names correspond to user accounts and passwords for identification when you start the computer. These different...
  16. Replies
    9
    Views
    869

    Re: Router is Shutting Down Automatically

    The implementation of IPv6 tunnels allowing multiple configurations to serve as transitional mechanisms when the network migrates to a combination of IPv4 and IPv6. The tunnels allow communication...
  17. Replies
    13
    Views
    2,328

    Re: Peer IPv4 and IPv6 problem

    Without applications that take advantage of what is available on IPv6, but IPv6 is primarily a tool that can use the computer. Nevertheless, we can say the same for all technologies: no application,...
  18. Replies
    4
    Views
    1,445

    Re: Optimizing uTorrent

    What do you have as your connection?


    http://img203.imageshack.us/img203/7413/img11m.jpg

    Except where there is a red box:

    If you have 256 in upload, put 24.
    If you have 128 food 11....
  19. Replies
    6
    Views
    763

    Re: IPsec protocol with IPv6

    When the "layer" Ipsec receives data to send, it starts by looking for database security policies (SPD) on how to handle these data. If this basis he says traffic should be applying security...
  20. Thread: Open VPN GUI

    by Wilbur
    Replies
    8
    Views
    1,653

    Re: Open VPN GUI

    The initial stride in building a configuration OpenVPN 2.0 is to create a PKI (Public Key Infrastructure). OpenVPN supports bidirectional authentication based on certificates, meaning that the client...
  21. Re: How to properly download movies with Limewire?

    LimeWire has evolved over time and through the use of the Java console, the software handles magnet links that allow multiple downloads from multiple sources simultaneously. Besides being able to...
  22. Replies
    8
    Views
    1,366

    Re: Open Source Network of BitTorrent for GNU

    BitTornado is a client BitTorrent. It is considered the most advanced client for this protocol. The interface resembles that of the original BitTorrent, but adds new features. Key Features :

    ...
  23. Re: How to Add Additional Trackers in Mac uTorrent?

    If you want to create a simple Bittorrent tracker, can I propose a software code in php but it is very tough to follow. But do not worry, I could help. This software is called PHPBTTracker-1.5e which...
  24. Replies
    9
    Views
    1,468

    Re: Mac vs. Windows uTorrent speed

    Even I think the same as 'Jamaima' does. :wink: I have also used utorrent in Mac which was giving considerably low speed when compared to the Windows. So it would be better for you to use the Windows...
  25. Replies
    5
    Views
    750

    Re: PEER-TO-PEER in BitTorrent

    The BitTorrent system is not without drawbacks. Besides the fact that he plans to use multiple network ports that are not always allowed by the firewall of the company, the download may be slow to...
  26. Replies
    7
    Views
    1,580

    Re: uTorrent Mac client using 100% CPU

    If you browse with Safari and downloads a file. Torrent this is automatically added to the folder "Downloads." With all this option checked, Transmission, identify these files automatically begin...
  27. Replies
    9
    Views
    1,556

    Re: Properly configuring BitTorrent

    If you attach to the Internet passing through a router, you also need to configure the router to open the suitable port and send it to the IP address of your machine on the network. See your router...
  28. Replies
    5
    Views
    2,488

    Re: What is better - uTorrent or Vuze?

    uTorrent has become for some time in the official bittorrent client, and according to a report by TorrentFreak, the same claims to be the most livin the bittorrent client, is also the fastest.

    ...
  29. Replies
    6
    Views
    939

    Re: Internal download cap based on Upload

    It is true that video streaming is experiencing a considerable growth, and is considered the next generation of P2P. We knew Youtube for videos and music for deeper, here today that the net is...
  30. Re: Can uTorrent download Video sequentially to assist Previewing?

    Very popular in the West, the uTorrent client is particularly appreciated for its low memory usage, its rapid development and ease of use. After the UDP tracker support for version 2.0, developers...
  31. Replies
    5
    Views
    1,119

    Re: Adding unfinished download to utorrent

    I would like to give you an example, which can make you understand the things properly. Say, for example, you are connected with 50 users. This does not mean we're downloading from 50 people. Chances...
  32. Replies
    8
    Views
    2,217

    Re: Create torrent-file via command line

    Bittorrents is a protocol for transferring files over p2p. Users share files between them, connecting with each other through a server (Tracker), once users connected to one another, swap parts of...
  33. Replies
    7
    Views
    1,599

    Re: Maximum Upload rate per Torrent

    You may be able to physically set a per-torrent upload speed, but there is not a setting to limit each torrents upload speed to a limit additional than global upload speed. Nevertheless there is a...
  34. Replies
    11
    Views
    1,660

    Re: Seeding A Torrent On A Mac Version Of Utorrent

    Personally, I use Transmission. It's very simple to configure and it works well. I think that is more commonly used Azureus, but it takes a bit more settings. For you to see based on your skills....
  35. Replies
    15
    Views
    14,571

    Re: Internet Connection Sharing via Bluetooth PAN

    Right click the Bluetooth icon in the system tray (bottom right, for those already lost ), Select "Advanced Setup", then the tab "Local Services" and, in the list, double-click "Network access". A...
  36. Replies
    7
    Views
    2,013

    Re: Web Hosting with MobileMe

    in fact after new load test again the problem persists, the technician made me delete the folder "Sites" button in my "Web" folder on my idisk and also the Sites folder in the root of my idisk. he...
  37. Replies
    6
    Views
    1,831

    Re: Is the iPhone 3G WAAS enabled?

    Private-I is a rather special application available on the App Store recently that will allow you to recover your stolen iPhone. It is very simple (well almost). Once on your iPhone, the application...
  38. Replies
    4
    Views
    1,916

    Remove Trojan.Agent/Gen-WOW

    My system also got infected with Trojan horse and i tried a lot to remove trojan from my computer but it used to come back again when i told my friend about it he told me to use AVG antivirus which...
  39. Replies
    5
    Views
    1,242

    Find and Replace in JavaScript String

    I can update or replace part of a string by another string in c program it is also possible in C++ program but the same logic doesn't work JavaScript. Can any one tell me the function which is used...
  40. Replies
    3
    Views
    2,426

    Corrupt Mouse Cursor Icon

    My windows xp doesn't show the proper shape of mouse icon, whenever i move cursor over any file or folder or any object in my windows it get corrupted. It shows dark horizontal line and sometime...
  41. Windows Modules Installer - Error 1450 Insufficient System Resources

    I got a problem in Windows 7 Enterprise, after installing some graphics program and high application game Windows Modules Installation Service has decided to stop working. It give error "Error 1450...
  42. Replies
    3
    Views
    2,618

    Internet Browser vs. Blackberry Browser

    Does any one know the difference between Internet Browser vs. Blackberry Browser. Is there a way to invoke the "Internet Browser" instead of the "Blackberry Browser" and also wanted to know the...
  43. Replies
    3
    Views
    2,557

    Block Flash on Internet Explorer

    If you want to disable Flash on Internet Explorer then you can do it with the help of Flashblock, where flash block is an extension for Internet Explorer that takes approach when you are dealing with...
  44. Replies
    3
    Views
    1,136

    Cannot login into ebay

    I was also facing similar type of issue i tried to cleared the cache and also allow Cookies from this site is being checked and at the same time try to delete temporary files for that you need to...
  45. Replies
    3
    Views
    729

    Remove New rogue TrustFighter virus

    i would suggest you to install Loaris Trojan Remover which will remove all Trojan virus from your computer, at the same time it will also remove all Trojan Horses, Worms, Adware, Spyware - when...
  46. Replies
    3
    Views
    1,425

    Remove LovSan virus

    LovSan/Blaster is a virus that self-replicate recursively that spread virus to other system and then propagate the virus further. This virus is programmed to scan a random range of IP addresses...
  47. Replies
    3
    Views
    708

    Limitations of a variable

    Here's my problem : entering a whole number by a user through the beta function scanf and I'd like to check if the user enters a number on the interval of values that an integer can hold. Basically,...
  48. Replies
    3
    Views
    864

    How to remove TROJ_FAKEVIME.AG

    if you really want o remove TROJ_FAKEVIME.AG from your computer reboot your computer and login into safe mode by pressing F8 button then click on start, goto run option and type regedit option and...
  49. Replies
    3
    Views
    4,362

    Access Connections Error 031

    I am trying to connect internet through my linksys router but it gives me an error 031: DHCP Server Not Responding. All the computer in my network are running on windows xp.
  50. Replies
    3
    Views
    761

    Remove WORM_ASPXOR.AB

    WORM_ASPXOR.AB is a worm which gets downloaded from remote sites by other malware and at the same time it may drop by other malware, specifically TROJ_DROPPER.JIZ. At the same time its automatic...
Results 1 to 50 of 127
Page 1 of 3 1 2 3
Page generated in 1,713,483,796.40364 seconds with 25 queries