Search Results

Search found 5 results on 1 pages for 'phoshi'.

Page 1/1 | 1 

  • Connection issues with Linksys WRT54GL / Tomato

    - by Phoshi
    So I recently purchased a new router, and decided to put Tomato on it for some of the fancy features, like graphs. Only problem is, now I've installed it I can't connect to the internet any more! What I've done so far is plug the router in, connect to it wirelessly, and upgrade the firmware to the right version for my router. This went swimmingly, the router restarted, and everything's Tomatoey. Except it won't, now, connect to the internet, and I'm entirely unsure what I've missed. My old router was a BT Homehub, my ISP is BT (British Telecommunications). I'm a bit lost, this is the first time I've done any of this 3rd party firmware stuff.

    Read the article

  • How do anti-viruses work?

    - by Phoshi
    So I was thinking about viruses recently, and wondering how exactly antiviruses keep up? Considering anybody who'd been coding for a few weeks could hack together something do do nasty, nasty things to somebody's PC, the quantity alone would make a simple list of hashes prohibitive, so how do antiviruses do it? Do they monitor process activity and have a 3 strikes rule for doing virus-like things? And if so, what's stopping it from triggering on perfectly harmless things (like me moving files around in \system32)? I did a bit of googling, but the regular places didn't particularly help, and I couldn't find a dupe here, so I thought it'd be good to ask :)

    Read the article

  • How does file compression work?

    - by Phoshi
    So, I realised today I take file compression for granted. The ability to bundle a few files together into one, and have it come out smaller than any of them, is something I just accept as a fact, but how does it actually work? I have a limited knowledge of it that includes something to do with replacing all the duplicate entries with pointers, to shrink that way, but beyond that I'm fairly clueless! As I'm always open to new knowledge, as I imagine most of us here are, I thought I'd ask. So, SuperUser, how does compression actually work?

    Read the article

  • iTunes' clandestine proxy settings

    - by pilcrow
    Problem: One user's iTunes consults a defunct HTTP proxy, but only for iTunes Store HTTP requests -- other iTunes web requests are unproxied. How do I dismiss this spurious proxy setting? Background: It's not as easy as Internet Options. Years ago my network had a mandatory HTTP proxy at 172.31.1.1:8080. When we switched to the 192.168.1/24 space and eliminated the proxy, this user's iTunes -- the only iTunes user at the time -- could no longer contact the iTunes Store, an operation which fails with "unknown error -9808". This has been the case through several iTunes.exe upgrades over the years and prevents, among other things, activation of a new or newly upgraded iPhone. wireshark and TCPView confirm that this user's iTunes.exe is attempting to contact the long-defunct http proxy when attempting to reach the iTunes Store, but is otherwise unproxied. Curious details: No other iTunes.exe HTTP traffic for this user is affected -- iTunes can successfully make HTTP chatter at Apple's servers. No other web traffic at all is proxied, whether this user or others, iTunes or browser, etc. I cannot find the spurious proxy setting anywhere in the registry nor on disk, though perhaps I haven't thought of every place to look and every format to look for. Other users who have experienced the same error code all seem to have unrelated web configuration problems (certificate validation, for example). UPDATE in response to Phoshi's excellent suggestion, reinstallation hasn't done the trick.

    Read the article

1