On Tue, 9 Oct 2007 17:01:50 -0500, Tom Piwowar [EMAIL PROTECTED] said:
I thought it was a bit creepy too. On the other hand, a domain is a
valuable thing to be given for just a few dollars. With this should come
some accountability.
I can see having some of the info. public to avoid the
Further to the problem of locking the screen of a Mac:
This article
http://www.macworld.com/weblogs/macosxhints/2006/01/lockscreen/index.php
discusses various methods, some with quite a bit
of jiggery-pokery. But a very simple solution
that I overlooked is this:
But what if you don¹t want
I would rather that, say, my home address and phone # not be plastered in a
public database in the first place. If someone did post this or other
harmful material about myself should still be possible to go to whoever
manages the site and have them track down who did it, just as, say, Yahoo
FYI, I tried powering up both router and modem simultaneously and they
booted up ok. I guess the router did wait for the modem to get going
first. Thanks for the feedback from all parties; it's always a good
learning environment.
Richard P.
Tom Piwowar wrote:
Actually, this isn't *strictly*
Nothing, I suppose, unless you were to be caught if they check. This is
what GoDaddy indicated. I would use a real address; maybe not my personal
home address, but a real one ( and one not belonging to a current resident
of a home).
Randall
- Original Message -
From: db [EMAIL
If you can't see that then you haven't got a sense of basic fairness, which
I got from the start.
I think you are exhibiting an RIAA-like exaggerated notion of ownership.
Are you going to sue Wikipedia if they post your *unauthorized*
biography? Will you demand that people seek a waiver before
IMVHO, complaining that a Mac does not work exactly like a PC is a
silly
exercise.
That's a given, but I keep coming upon issues on the Mac that are nothing
but hoop jumping, compared to administering a PC. Change the admin name on
a PC? That takes seconds.
That is why those of us who
[input] [input] [input] [input]
Can I boot a PM G4 from a USB2 flash or micro drive? How about an Intel
Mac? Or a Gen 4 iPod with FW?
Betty
-
Sé un Mejor Amante del Cine
¿Quieres saber cómo? ¡Deja
Unless you can tell me some legitimate purpose for
registering and maybe using someone else's name without permission, there
are too many ways this could exploit or hurt the person (as someone said,
post things in the name of that person that would be embarrassing or worse).
Happens all the
IMVHO, complaining that a Mac does not work exactly like a PC is a silly
exercise.
change the short name of the root admin...
*40* steps to do this. 40. If you don't make things worse doing it.
That is why those of us who know what we are doing use a widely-available
script. The general rule
Unless he is harmed, in which case he could expect remedy (if he pays
a lawyer to bring suit, fight the case and wins).
So if the other guy named Tom Piwowar does something that I think
reflects badly on our name can I sue him for damages?
On 10/12/07, Tom Piwowar [EMAIL PROTECTED] wrote:
If you can't see that then you haven't got a sense of basic fairness,
which
I got from the start.
I think you are exhibiting an RIAA-like exaggerated notion of ownership.
Are you going to sue Wikipedia if they post your *unauthorized*
Not being expert, I do recall having had some time back an app that would
change the time/date stamp of any file/folder and I assume that would
include emails. When such an app does so, would it not be wise to design
such files/folders/emails such that editing of the headers leaves an
invisible
Remember that email headers are just text. And there are no checks on those
headers, practically speaking.
If someone spoofs your mail server, everything in that message could be
false.
If you have verified that the message came from your real mail server, then
there is a reasonably good chance
At 7:28 PM -0400 10/11/07, Jeff Wright wrote:
Yeah, I saw that, but no native shortcut. Heck, there are no less than 2
ways of doing this on a PC without waiting for the screensaver to kick in.
Just illustrating that Windows does this simple, yet very valuable, thing
out of the box and on a
At 6:54 PM +0200 10/12/07, b s-w wrote:
[input] [input] [input]
[input]
Can I boot a PM G4 from a USB2 flash or micro drive? How about an Intel
Mac? Or a Gen 4 iPod with FW?
http://www.macosxhints.com/article.php?story=20061017084322177
Yup,
Yep, and these all have in common the fact that they are not living or never
existed. Could see making that distinction.
Randall
- Original Message -
From: Tom Piwowar [EMAIL PROTECTED]
To: COMPUTERGUYS-L@LISTSERV.AOL.COM
Sent: Friday, October 12, 2007 10:21 AM
Subject: Re: [CGUYS]
How can I invoke the screen saver on Windows
without finding the actual module and creating a
shortcut on the desktop?
-Set up the screensaver. Start Control Panel Display Screen saver
(or right click on the desktop properties screensaver)
-Keyboard shortcut: Windows key+L (if fast
Using your logic we would all be wearing hoods or a chador when walking
down the street.
Don't you think you might have less of a problem with your privacy being
invaded if you were able to readily discover who was doing the invading?
Just the opposite of what you propose.
Suppose making such
Latest email from GoDaddy announces that they have a new GoDaddy girl.
* == QUICK LIST-COMMAND REFERENCE - Put the following commands in ==
* == the body of an email send 'em to: [EMAIL PROTECTED] ==
* Join the list:
On 10/12/07, rlsimon [EMAIL PROTECTED] wrote:
Not being expert, I do recall having had some time back an app that would
change the time/date stamp of any file/folder and I assume that would
include emails. When such an app does so, would it not be wise to design
such files/folders/emails
You should be using NIS (http://www.bresink.com/osx/nis.html) or something
similar to manage user security (I am familiar with NIS but this article
suggests there may be more appropriate solutions for a all-Apple network).
Users should be authenticating to a nameserver and should be able to
At 7:53 AM -0400 10/12/07, Jeff Wright wrote:
How can I invoke the screen saver on Windows
without finding the actual module and creating a
shortcut on the desktop?
-Set up the screensaver. Start Control Panel Display Screen saver
(or right click on the desktop properties
On 10/12/07, Jeff Wright [EMAIL PROTECTED] wrote:
We use ADmitMac, since our network is a Windows Active Directory domain.
Not the most reliable of apps, but it allows the Mac users to authenticate
to the network and Windows servers transparently.
If there is a way to access a Mac over the
Uncle Ben?
I do a mean Darth Vader impression; maybe I should set up a Darth Vader
podcast, if name isn't taken or protected by Lucas or others.
Randall
- Original Message -
From: Tom Piwowar [EMAIL PROTECTED]
To: COMPUTERGUYS-L@LISTSERV.AOL.COM
Sent: Friday, October 12, 2007 2:09
Clearly, we could legislate that everyone at birth be given a UUID/GUID
(Universally Unique ID/Globally Unique ID) and prevent anyone but that
person from using that ID in a web site.
Simple, just apply an RFID implant shortly after birth.
What about the tompiwowarsucks.biz web site? We should
That's a given, but I keep coming upon issues on the Mac that are nothing
but hoop jumping, compared to administering a PC. Change the admin name on
a PC? That takes seconds.
This is not just a name written in a box on the screen. You also must
take care of things like file access permissions
While we are at it, shouldn't guns send off little messages with GPS
locations and time stamps, with fingerprints collected off the handle, to
law enforcement, every time someone fires a gun?
Wow! You may just have something there. A plan that can keep us safe and
keep the NRA happy too. I sent
We have a winner!
On 10/12/07, Michael Fernando [EMAIL PROTECTED] wrote:
On 10/12/07, John DeCarlo [EMAIL PROTECTED] wrote:
[OT quiz - what was the first registered domain name with a numeral as
the
first character in it? BTW, the RFC documenting it allowed it, but none
of
the
Nothing, I suppose, unless you were to be caught if they check. This is
what GoDaddy indicated. I would use a real address; maybe not my personal
home address, but a real one ( and one not belonging to a current resident
of a home).
You are going to register the a site named after a person
No, a residential address of a building I happen to know is unihabited;
either that or take my chance with a fictitious address (unless someone can
give me a good reason why they need a real home address, AND for this to be
available to the public). I'm not going to use that other person's
Has anyone tried writing software to create Flash apps with the above listed
software? I couldn't find any ming-related software in any Fedora
repositories. If anyone could provide guidance I'd be greatly appreciative.
Are you going to sue Wikipedia if they post your *unauthorized*
biography?
Maybe. If it's not factual information from public records and isn't
incredibly complimentary and uplifting, ha ha.
Will you demand that people seek a waiver before uttering your
name in a public place?
Of course
When you log onto a computer, you need to authenticate yourself (so the
computer system can know who you are) and establish credentials (so the
computer system can enforce the appropriate access controls, give out
the
right privileges, etc.). Even Windows sort of works like that. It is
a
This is not just a name written in a box on the screen. You also must
take care of things like file access permissions and the keychain. I
guess since the Windows system is inherently insecure there is less
involved in changing a username.
No, Windows just takes care of these housekeeping
That is what I was thinking. But, Nothing happens when I press F6.
-- Original message --
From: Tony B [EMAIL PROTECTED]
No, you don't want a bootable floppy. XP prompts you to insert a floppy when
you press F6 and reads the drivers from there.
On 10/10/07,
I finally decided to see what all the hoopla was about, so I did a
little Googling
myself. The horrendous 40 step process for changing the admin name on
a Mac turns out to be an Apple support document with instructions for
changing
the admin name, and even with this method you could have
What the heck is an AHA-39320? I know you don't expect us to take the time
to look it up, so how is that 'simple'? Anyway, chances are it will need
drivers from a floppy drive - one of the first prompts during the XP setup.
disappeared from the BIOS, XP Pro still recognized it. I decided, I
...but did register another domain for myself, which I will have
a site, do already have a site (though still under construction).
I for one would be interested to see that. Please post a URL
when it is ready.
* ==
39 matches
Mail list logo