Search:

Type: Posts; User: Aienstaien

Page 1 of 2 1 2

Search: Search took 0.01 seconds; generated 6 minute(s) ago.

  1. Re: What is OC best value and efficiency in Intel i7 980X?

    You should know that the Intel Core i7-980X is an Extreme Edition version, so can easily be overclocked by increasing the multiplier. Given the circumstances, however, we wonder whether it is better...
  2. Re: Should I go for Western Digital Caviar Green WD20EARS?

    Western Digital Caviar Green WD20EARS offered with a power-saving and quiet 3.5-inch desktop hard drive. With only three magnetic disks, the drive 2 TB disk space. The test shows if this is true of...
  3. Re: Bulletstorm: teammates not appear when loading save point (BUG)

    I have not started playing this game yet. But I was facing the similar issue with the Gears of War. Same thing, the teammates didn't appear many times. Later I came to know that there was something...
  4. Replies
    7
    Views
    834

    Re: Using USB for data transfer is risky?

    In many cases, it is particularly in smaller companies a gap overlook the dangers have also increased substantially by the rapid advances in consumer devices: the peripheral devices to each PC, and...
  5. Replies
    10
    Views
    2,266

    Re: Lian Li PC-A77F Full Tower PC Case

    Due to the voltage at full quite quickly, and rotating many fans, the PC-A77F shows both normal and consistently turned down top spots in the system temperatures. Clearly there needs to be beaten,...
  6. Replies
    4
    Views
    9,828

    Re: Magicka crashes at startup

    I don't know whether the following steps will be solution for your problem, but you can give a try. You need to insert some things to report as mentioned below :

    Also be sure that you are having...
  7. Re: Should I go for Asus Ares Radeon HD 5970 Video Card?

    Note that in addition to the radiator overlooking the memory chips of the card, the ARES has a radiator covering the entire history of its PCB back stiffen the assembly but also cool the memory chips...
  8. Re: Access Control in LAN and Wireless Network in 802.1x

    The communication between the RADIUS client and server is secured by the fact that both communication partners can authenticate each other through a shared secret, and encrypt the data transfer....
  9. Replies
    4
    Views
    805

    Re: How to use Google Sync on the iPad?

    Google started as a search engine provider and is still the leader. Piece by piece we have in recent years developed or purchased technologies with a view in Google's vision can be realized by using...
  10. Replies
    4
    Views
    1,086

    Re: Pets in The Sims 3 Outdoor Living

    Yeah, that's true, there are no pets in The Sims 3 Outdoor Living. :no: Since you are still playing the Sims 2, I would like to provide some information about the pets in Sims 2. The advantage in...
  11. Re: Procedure to use JL commander in Blackberry

    Some of the commands in JL commander are as follows. First is the “Device information”, which is used to view the details of the application running in your Blackberries. Then “Screenshot”,...
  12. Replies
    6
    Views
    1,032

    Re: BI and CRM is the perfect combination?

    With Business Intelligence CRM Data to be transformed into high-quality business information that is 1:1. The analysis provides empirically sound basis for decision making for marketing, sales and...
  13. Re: Debugging Web Applications and Web Services

    With good products can not only web applications, but Web services are checked for vulnerabilities. The procedure is similar, but omitted the first step in the crawl, there can be inferred from the...
  14. Replies
    5
    Views
    5,352

    Re: Dead Space 2 Aim bug

    I don't think that its an bug. Might something wrong with your game. Because many users have completed chapter 6 (I am playing the same). Hence, I think that there should be something wrong in your...
  15. Re: Protect VPN using L2TP/IPSec in Windows Server 2003

    Certificate authentication requires the installation of an IPSec certificate on both computers need to communicate. To do this, log on http://name-CA/certsrv, request a certificate and submit an...
  16. Replies
    5
    Views
    1,062

    Re: HTPC audiophile

    Meanwhile, there are some things to point out before proceeding with the selection of components. The first thing I tell you now that I see use 2 PC is perfect, not so much for the sake of silence,...
  17. Re: Microsoft System Center Service Manager 2010 Overview

    In addition, System Center Service Manager 2010 is a central integration point for service management workflows. By default, SCSM is based on frameworks for IT processes, such as Microsoft Operations...
  18. Replies
    3
    Views
    1,700

    Re: ALSA not working with 5.1 SPDIF

    DVDs usually have surround audio encoded in AC3 (Dolby Digital) or DTS (Digital Theater System). Some modern audio equipment is capable of internally decoding these formats. MPlayer can be configured...
  19. Replies
    6
    Views
    1,862

    Re: Specifications of AMD Phenom II X6 1055T

    This technology is very useful, as applications can take advantage of a truly multi-core CPUs are still very few, so have some less core, but with a higher clock cycle, appears to be the winning...
  20. Replies
    4
    Views
    1,573

    Re: Logwatch not working properly

    I'm not sure how strict perl handles validity range, but the script OUTFILE shall, within the functions init print, and I suspect that it is thus to a print outside of init not known. I had thought...
  21. Re: Microsoft Forefront - The Unified Access Gateway 2010

    The publication of the applications is true for web applications and traditional applications. In the current version of the Unified Access Gateway 2010 Microsoft supports the following application...
  22. Replies
    5
    Views
    1,474

    Re: Dictionary attack in PHP

    If you are having trouble (which it should theoretically not be possible), then the problem comes from the design of your site security level, not md5. The protection system by chopping more than...
  23. Replies
    4
    Views
    1,462

    Re: How to manipulate an ISO images

    With the usual mastering tools like mkisofs is a rather tedious and error-prone task. It's as easy as using the graphical isomaster. The program reads an existing image file in ISO format, NRG or...
  24. Replies
    5
    Views
    1,059

    Re: Virtualization and Sandboxing

    In the area of decision-making , beyond the test software, it can also be a question of test data to assess the quality and possible uses, before integrating them into the warehouse, production and...
  25. Re: ATI FireGL Video Card M7820 not supporting AutoCAD

    ATI FirePro to / Mobility FireGL cards, there are not very much to find on the Internet and then only snippets that are not very much part of the state. Based on the naming convention, it should be a...
  26. Re: Ubuntu Privacy Remix good for safe working environment?

    Furthermore, it has a rootkit on a mounted TrueCrypt drive access just like any other storage medium of this computer. Similarly, a keylogger could Sniffing passwords and then send this encrypted...
  27. Re: Photoshop CS - How to integrate graphics with Macromedia Flash

    The layout can be imported into Flash and as a whole picture, either as isolated layout. In the second scenario it is clear that we must "rebuild" or reconstruct all the images into one as the...
  28. Replies
    5
    Views
    832

    Re: Application scalability Javascript

    Although the code mentioned by the Preetish, may seem wordy script, it allows a very high level of abstraction:

    defines a namespace myFunctions unique and comprehensive in order to contain the...
  29. Replies
    4
    Views
    1,271

    Re: How to do texture mapping in Blender

    The slider on the right are used instead to specify how the texture affects some parameters of the mesh. For the wooden top, set Col (which refers to how the texture affects the color of the mesh)...
  30. Replies
    6
    Views
    776

    Re: Site Safety using SQL Server 2005

    A final point concerns the use of data sources. Indeed, by default, the Windows Integrated Security is selected. However, insofar as it can provide access to data by impersonating a user without the...
  31. Re: Noctua NH-D14 CPU Cooler - Technical Specification

    Many users prepare the assembly of the double air around 1,200-gram cars headaches. In general, however, is in direct union with the motherboard even when the housing on the safe side. Nevertheless,...
  32. Re: Transition from IPv4 to IPv6 with Windows Vista

    When IPv6 and IPv4 are enabled, then use the new IPv6 stack of preference. This stack provides better network connectivity to applications using IPv6, without damaging the connections using IPv4. To...
  33. Replies
    4
    Views
    1,283

    Re: VPN and routing tables

    If you make a virtual private network (VPN) connection to certain non-Microsoft VPN servers, you may not be able to send data over the VPN connection. The problem also occurs if you are making a...
  34. Re: nVidia GeForce 8400M GS graphic problem on VAIO VGN-SZ680n

    Since, you have tried all possible ways of troubleshooting your graphic card, now it sounds like a faulty graphics chip / memory. The error that you are getting while updating drivers clearly stats...
  35. Re: Using Boot Camp and VMWare Fusion together

    Virtualization is responsible for creating an external interface that hides an underlying implementation by combining resources at different physical locations, or by simplifying the control system....
  36. Replies
    5
    Views
    1,080

    Re: How to prevent data loss in Outlook?

    To prevent data loss:

    Move only the data in the deleted items that you really want to permanently remove it.
    Place always a backup of all your relevant data.
    Before each change of the system...
  37. How to install Virtual PC drivers on Windows 7

    I did a clean install of Windows Ultimate 7 RTM (32bit) on my P105-S6147. The only driver not found was for the camera card slot, so I used the Vista 32bit driver and it works great. I have Windows...
  38. best way to convert various video extensions to WMV

    I am looking for the best way to convert popular extensions such as .mpg, .flv, etc to be converted to .WMV. I have developed the silverlight player that plays the WMV file. Now, visitors will upload...
  39. How to open port 3101 on my server running on SBS

    I have server setup on Microsoft Small Business Server, but to make connections with the other system I need to secure as port and it ask for 3101 number at its port, but when I try to connect it, it...
  40. What is htaccess? What does it mean in programming language?

    What is htaccess file? and what is the meaning of htaccess in programming language I have seen this file most of the time in the site development does it contain important data inside it? How does it...
  41. lsass.exe related error force to reboot local machine

    I am using my PC since very long time. Recently I had downloaded some application from the internet, With lot of efforts I was able to install on my computer, it was not at all expected. My PC has...
  42. Replies
    3
    Views
    1,456

    Unbearable choppy sound with Aspire one

    When listening to any music file the music skips and lags. My sound is really bad!!1 it's all choppy and stuff or slow.The sound seems to crackle in the background.....I tried to defrag and clear...
  43. Replies
    3
    Views
    799

    How to replace DVD drive in my Laptop

    I have a Sony VIAO laptop PCG-F690K with a dead CD/DVD drive. It is a multi-write drive that writes to DL disks at 2.4x. The problem is that all I get is coasters with the DL media and I have tried...
  44. linksys wrt600n can't connect intel wifi link 5300

    I have Dell Studio 1555 Laptop and having an issue with the wireless card. I wanted to replace the stock card in my Dell studio. I have tried every setting, but it will NOT connect to any type of...
  45. How to write the form values in Database using C#

    How to write the form values in Database using C#, I have a simple form (text fields and pull down menus), I have not keep more customization in my existing form and I want to insert the values from...
  46. Naming convention used for layout of Program

    What naming convention one should use for his layout of a program, because there are many naming convention any of the programing language provide, so provide me basic convention that would be widely...
  47. How and where do I find the .Net source file

    How and where do i find the source file for the downloaded .net application, this is to reference the assembly of the web application, because when i try to find out the source file i found that...
  48. Replies
    3
    Views
    4,806

    VB.Net Picturebox load jpeg file

    I wanted to load a JPEG (.jpeg) picture into a PictureBox and an ImageBox...but when i check for the icon it has diplays but when I delete that i create shortcut on the desktop it can only load the...
  49. Re: How do I find windows updates on my hard-drive

    Then the times I had tried to install it (about 4), it created glb tmp files. Which ate 11gb of the c drive here.. Until I managed to find out where these temp files were, and deleted them.
  50. How do I find windows updates on my hard-drive

    I just installed some update for vista, it was to ensure that all future updates install correctly. How can i find where my pc has saved the updates that it has downloaded from windows updates. This...
Results 1 to 50 of 64
Page 1 of 2 1 2
Page generated in 1,713,493,126.76750 seconds with 19 queries