Computing desk | ||
---|---|---|
< August 15 | << Jul | August | Sep >> | August 17 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
As far as I know, there are three types of mobile browsers. 1)Wap browser (ones found in low end colour phones) 2)mobile browser (ones found in smartphones) 3)mini browsers (like opera mini)
My question is 1)Is there any other type of browser? 2)I have used opera mini and mobile browser in my moto ming. But where do I get a wap browser for motoming? what wap browser?
I need to put a black ink cartridge and a color ink cartrige into my Compaq inkjet printer. Does it matter which one goes and the left and which one goes on the right?
This is driving me nuts....does anyone know where I can find a list of the top Israeli IT cos? The type of classification (ie, by size, by revenue, etc.) isn't that important - I'm just wondering if this info even exists...?—Wasabe3543 13:48, 16 August 2007 (UTC)
I am looking into purchasing a laptop computer, and I was wondering...
At my home, we have a Linksys wireless-g router. If I get a laptop with a wireless-n card, will I still be able to access the wireless-g network at my home?
Thanks for the help...69.205.180.123 17:16, 16 August 2007 (UTC)
I have a DVD (that I'm legally authorized by the creator and publisher to copy) that I need to extract a clip from. What (free) programs can do this? I need to convert it to Quicktime, MPG, or Flash. -- Zanimum 18:45, 16 August 2007 (UTC)
Using regex or grep or something else, how would one do the following advanced find and replace:
If I have a document that contains this code:
* foo * bar * apple
how could I tell the computer to find everything between the bullet (space) and the line break and put it into a format like
* This sentence is new: foo. * This sentence is new: bar. * This sentence is new: apple.
Cheers. --MZMcBride 18:46, 16 August 2007 (UTC)
sed 's/\(^\*\)/\1 This sentence is new;/' yourfile.txt
-- Kainaw(what?) 19:07, 16 August 2007 (UTC)
sed 's/^\* /&This sentence is new: /' yourfile.txt
--Anon, August 17, 04:08 (UTC).
sed 's/^\* /&This sentence is new: /' yourfile.txt > tmpfile.txt
mv tmpfile.txt yourfile.txt
sed 's/^\* /&This sentence is new: /' yourfile.txt > yourfile.txt
open "file" for input as #1 open "result" for output as #2 do until eof(1) line input a$ if left$(a$,2)="* " then print#2, "* This sentence is new: ";mid$(a$,3) else print#2, a$ endif loop close
But this is actually a lot less simple that the sed script. -- SGBailey 21:38, 16 August 2007 (UTC)
Vim has versions available for most platforms. Just go to command mode and enter and enter Kainaw's regexp preceded by a % (percent sign means execute the following command on every line) -- Diletante 00:05, 17 August 2007 (UTC)
Just for fun, I threw together a proof-of-concept of a web-based sed. See http://www.eskimo.com/~scs/cgi-bin/sed.cgi. (Note: I'll be taking it back down in a week or so, as it's not production-quality code, and probably isn't even adequately secure.) —Steve Summit (talk) 16:17, 18 August 2007 (UTC)
well i asked a question a while back about a FortiGate F60 firewall and i wanted to know how to do load balancing and fail safe type things with the 2 wan ports it has
i am working with windows 2000/server 2003 which are the 2 computers that are basically directly connected to it or can be i have been looking for 3rd party software to do this..but i have no domain server nor central server (the servers we have are used for other purposes) our schematic is 2 LANS-->SWITCHES-->FIREWALL-->INTERNET i want to use the 2 WAN ports not to make it faster, but to asign per say, 1 LAN to 1 WAN and 1 LAN to the other WAN...
any way to do this with the firewall itself and not using a server.?
THx in advance
Roger @ IntraRed 19:11, 16 August 2007 (UTC)
I own a PS3, and sometimes, when I am bored, I just scan the wireless environment around me to see if any new networks have been put up. Each time, the PS3 detects our family's router, and each time the PS3 puts a different strength for our signal. It has, on occasion, been as low as 47%, or all the way up to 100%, even though it is normally around 74% (steel floors...). Before you make all your comments about doors and such, there is only one door between the PS3 and the router, and it is always open. Why would there be such a huge fluctuation even though neither the router nor the PS3 have been moved, and no new obstructions (or thunderstorms) have been put in the way?69.205.180.123 21:16, 16 August 2007 (UTC)
EDIT Maybe I should move this to the science desk? 69.205.180.123 21:17, 16 August 2007 (UTC)
When I print an email from Thunderbird, I get vast quantities of header dross. What do I have to do to make it only print Subject, From, To, Cc, Date and the message? I have asked this on Thunderbird's suppport forum and never gotten a useful reply. Several replies said "It prints what you see on the screen, collapse the data on the screen" - but this isn't the case. I get the dross no matter what I display. -- SGBailey 21:42, 16 August 2007 (UTC)
Is there any free software for the mac that will take video input from a camera, and stream it live over a network? Preferably open source.
VLC for mac can't use live video from a camera though...
Infurated at vista for not letting me replace a mysteriously-changed ntoskrnl.exe with a backup, I just ran
takeown /F c:\ /R
It got caught in a loop around Application Data since c:\documents and settings\*\application data\application data\application data\application data ... ad infinitum all redirect to the real application data directory. I'm worried that since I let this run for quite awhile, I have a gigabyte sized permissions file somewhere filled with useless information. So how does NTFS work- is the metadata stored right in the file (which would be good for my case since it's just chowning the same folder over and over) or is there a list somewhere? And is it a bad idea to 'takeown' the entire filesystem? Only system level code has access to protected files, but the only difference is that now I can give myself access whereas before it was impossible to even change the permissions. --frotht 23:52, 16 August 2007 (UTC)