My laptop is an Acer Extensa 5630Z that currently has 3GB of RAM. That page says I can only uprade to 4GB, but I wonder if that was just a hypothetical maximum, perhaps based on the largest RAM modules available when I bought my laptop. My question is if I could install, say, two of these 4GB sticks for a total of 8GB. My laptop is 64-bit capable, and that RAM is the proper type, so I don't see why there would be an arbitrary limit of 4GB (assuming I install Windows 7 64-bit).
I first tried to ask Acer over a chat if this would be possible, but let's just say I don't have much confidence in the support person's knowledge (he indicated 4GB is the max). Here is the shortened conversation for your review and amusement:
Me: I was considering buying some RAM for my Acer Extensa 5630Z. I was curious if there were any limitations of the size I could install. For example, could I get 2 PC-5300 DIMMs that are each 4GB (for a total of 8GB)? Me: Just as an example, I found some RAM on NewEgg with the description "G.SKILL 4GB 200-Pin DDR2 SO-DIMM DDR2 667 (PC2 5300) Laptop Memory". I was thinking of buying 2 of those. Him: You can upgrade up to maximum of 4 GB. Him: Up to 2 GB of DDR2 667 MHz memory, upgradable to 4 GB using two soDIMM modules. Me: Is that a limitation of the other hardware in the laptop, or was that just the largest amount of memory that was tested, or is that a software limitation? Him: It will tested with maximum memory, and the system performance will affect, if you exceed the maximum memory. Him: You can upgrade up to 4 GB RAM. Me: OK, I just want to be sure there's no chance I could upgrade to 6GB or 8GB. I thought perhaps this type of RAM may not have been available when my laptop was made. Do you know that level of detail? Him: I am sure, your system will compatible up to 4 GB up gradation only.
Have any idea of whether or not I should be able to do more than a "4 GB up gradation"?
Good news and bad news. According to this, the chipset supports 8GB. However, it also says "256-Mb, 512-Mb, 1-Gb, and 2-Gb memory technologies supported". So if the motherboard had 4 RAM slots, maybe it would allow for 8GB, but since there are only 2 slots, maybe it only allows for 4GB. Though, again, I run into the possibility that the largest RAM of this type may have been 2GB when this document was created.
Anyone know how to properly declutter a window 7 laptop. Ive done the Disk Cleanup (inclduing former restore points), defragged and run Piriform CCleaner.
I've found one directory online that got a few meg, but all I can free up is 12.5 G on an 80G disk.
Now I do have the RC for Visual Studio 2012 installed along side VS2008, but that would account for no more than 10G. One or other may have to go but I would prefer to retain 08 until 12 settles in. If pushed 12 gets it!
Looking over the drive using Winzip Utilities, the real perpetrators are thousands of small files that appear to be related to various automatic updates. I tried removing some of them but that caused chaos. The machine is over 4 years old, and was upgraded from Vista to 7 about 15 months ago.
you can use tools like WinDirStats to find where the bulk of you storage is being used. That is always a good starting point. I would also recommend checking to see what processes are running and what programs are installed. Then ask yourself if you still use the programs and if not, remove them. Maybe more your documents and music and such to an external drive.
I would love to change the world, but they won't give me the sourcecode....
Hello all. We developed an app that interacts with Facebook, by posting data to a specific account. This is done by establishing an HTTP request. In my server, this works perfectly. However, when I go to out customer's, it simply won't work.
I know that this guys have very tight security measures. One of those consist on blocking anything to do with Facebook. Now, we requested that for that server and a specific account to be free of such policies. They did so, and when opening the IE, they can connect to Facebook's main page. However, our program still throws a 400 Bad Request.
So I'm wondering if there is anything else blocking such connections. To that end, I downloaded Microsoft Network Monitor 3 and SysInternals TCPView. However, neither shred a light on the situation, other than showing which connections are made.
Thus my question: is there any tool out there that can be used to trace an HTTP connection and then detect where it is being blocked either by a policy or by a firewall? Or a clue on to what could be happening?
Wireshark[^] will show you what's happening "on the wire". If it's local policy, you won't see anything. If it's a firewall, you'll see the 400 coming back. A clue to where it came from would be in the response time - the faster the response, the closer the rejection.
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
Previously I thought that the difference between pressing the [Del] key alone and the combination [Shift][Del] is that the former one puts the file to the recycle bin, and that's all of the differences.
But no, there is more: I changed the access rights to a file programmatically such that only SYSTEM can access it (OK, there is an inconsistency left: I am still the owner of that file). When I look at its properties, only SYSTEM is shown on the Security tab. When I press the [Enter] key, Notepad is started and tries to open the file, and shows an Access Denied message. When I press [Del], the Access Denied message is shown after a few seconds. But when I press [Shift][Del], the file gets deleted immediately. Happens both in Windows XP and Windows 7.
How can that be explained?
Ok, maybe some cleverer people than myself can help with this one. We have a business-critical application which runs with a MSSQL backend and generates a lot of documents (letters, etc., in Word and PDF format). At present the documents are just stored in a share on the same server as the database, with the filenames stored in a table and the documents called directly from the application on client computers when requested (I didn't design this, by the way!).
A little while ago, due to storage space issues on the server, I decided to move the documents off the server and onto a dedicated NAS (Netgear ReadyNAS 2100) with lots of capacity rather than just beef up the server's disk space. My reasoning was that the network load would be spread between the server and the NAS, instead of the server's NIC handling both database and document traffic. In practice, the performance of opening documents actually decreased dramatically for those departments which I migrated to the NAS, to the point where I halted the migration. Sometimes documents on the NAS open perfectly quickly, and a user will have no speed issues for several minutes or hours. Then, suddenly, one file will take literally a minute or more to open. These are only small Word documents and I'm only talking about a few dozen users who have been migrated.
ANYWAY, what I'm getting to is that it's time to replace all of this hardware anyway. I'm about to purchase a very powerful, fast server to replace the DB server. Reviews suggest that its I/O performance is exceptional. But I was also going to purchase a new, high-performance NAS and stick with the topology I've already described. My theory is that the speed issues are being caused by some deep-level communication problem between the Netgear ReadyNAS and the clients, which neither they nor I have been able to get to the bottom of. It still seems like sound reasoning to me that separating database and documents will result in a spread network load and increased performance. Am I wrong?
I don't know the technicalities involved in opening a document in a network share. Is it perhaps the case that the process of establishing a connection to the share and opening a file, at least the first time in a session, is much slower than opening the same file stored on the database server, to which a 'connection' is already established due to the user having been using the database?
Any discussion or advice on this topic would be greatly appreciated. If stuffing the database server full of disks and keeping the files on there is going to be the fastest solution, I'll save a whole lot of money!
i am going to use Wayne nucleus point of sale machine and i am developing my own back office system to manage data from this POS. is there any documentation on how do i configure my back office system with Wayne nucleus point of sale or it will be more convenient if someone can give me a link to Wayne nucleus technical support team via any email address or phone number.
Yesterday I ran into a oddity that might be handy for some folks.
Recently a SCADA system PC crashed on me, one which we purchased fully integrated and with no documentation. I bought a new Win7 box to replace it, recovered the hard drive, and copied all the files I thought looked related to the SCADA system. I called the manufacturer, but they refused to talk to me, and insisted that the licensing and configuration had to be done by the company that integrated the thing for us. After much haggling, I finally got that outfit to consent to 30 minutes of telephone support.
In the course of setting things up, one of the tasks required was to add a System DSN used to establish ODBC connections to the .mdb database used by the SCADA product, so I opened up the usual ODBC Sources applet in Control Panel. Surprisingly, only SQL Server was installed and available for use - no other drivers were listed. I've never seen that in a Windows system before.
After much gnashing of teeth and rending of clothing, the support guy stumbled on a link somewhere that suggested running an obscure program located at C:\Windows\SysWOW64\odbcad32.exe. I don't know where he found it, but running it produces a ODBC Sources applet identical to the one reached through Control Panel, but containing all the usual sources. From that point on, it was an easy setup, but I would never in many years have found that ridiculous hidden tool.
No I have to wonder, what other missing functionality is hidden in this folder? Any other hints?
I remember reading an article about it a few years back. There were some more examples besides ODBC that was hidden the same way, can't remember which ones though.
It seems that when Microsoft drops support for a product (in this case ODBC) they don't actually drop it immediately, they just make it "invisible" for developers so that they won't use it for new products. But they remain available, with some tweaking, for a couple of versions so that they don't lose sales to people in exactly your situation.
Ahh, that's the 32 bit ODBC manager. Basically, on a 64 bit machine, you can have 64 bit and 32 bit ODBC drivers installed. The normal place to look for the drivers is in the 32 bit version, but the actual ODBC applet that runs is the 64 bit one. This is why I have a shortcut to odbcad32 on my desktop.
*pre-emptive celebratory nipple tassle jiggle* - Sean Ewington
Can someone help me to interpret what's going on here?
My Junk Mail folder is filling up rapidly with email rejection notices. This has been going on sporadically for a couple of weeks, with a flurry of several hundred such messages, then a trickle, then none for a day or two before it starts again. A typical message is:
This message was created automatically by mail delivery software.
A message that you sent could not be delivered to one or more of its recipients. This is a permanent error. The following address(es) failed:
SMTP error from remote mail server after end of data:
host mta5.am0.yahoodns.net [22.214.171.124]: 554 Message not allowed - 
------ This is a copy of the message's headers. ------
Received: from bosmailscan10.eigbox.net ([10.20.15.10])
by bosmailout03.eigbox.net with esmtp (Exim)
for email@example.com; Fri, 06 Apr 2012 01:19:38 -0400
Received: from bosimpout01.eigbox.net ([10.20.55.1])
by bosmailscan10.eigbox.net with esmtp (Exim)
for firstname.lastname@example.org; Fri, 06 Apr 2012 01:19:37 -0400
Received: from bosauthsmtp01.eigbox.net ([10.20.18.1])
by bosimpout01.eigbox.net with NO UCE
id uVKd1i00301P9Sa01VKddX; Fri, 06 Apr 2012 01:19:37 -0400
X-Authority-Analysis: v=2.0 cv=eq1oOPVX c=1 sm=1
a=z5zA2GEyXHX4FYSAKYr2NA==:17 a=7UmD-tR_JRgA:10 a=VG0OwtqChsEA:10
a=8AlaD7fTCjEA:10 a=8nJEP1OIZ-IA:10 a=Sh_hsHRGdUoA:10 a=qrrI46oVAAAA:8
a=IIUmFY3D8pfpmdMjRkQA:9 a=gBDzBF7yGH2_iO3muJQA:7 a=wPNLvfGTeEIA:10
a=NTIIGRmZMWAA:10 a=P3BRNhQXk_0A:10 a=gYNu_iXhhMS5DrdM:21
Received: from 126.96.36.199.dynamic.mundo-r.com ([188.8.131.52] helo=Servidor)
by bosauthsmtp01.eigbox.net with esmtpsa (TLSv1:RC4-MD5:128)
for email@example.com; Fri, 06 Apr 2012 01:19:37 -0400
Date: Fri, 06 Apr 2012 07:19:33 +0200
X-Priority: 3 (Normal)
X-Mailer: The Bat! (v2.00.3) Personal
Subject: eyes," is caused now."Astute build raised its Carvers' to Lord idea or tell "Someone cried, "But ritual emptiness marring the foolish of this endless uncles,
The only constant is the reference to "bosxxxxxxx.eigbox.net" in the middle portion of the message header. Everything else in the message changes at random, and the IP addresses associated with my email address don't match anything I've ever used. What is doing this, and which server is compromised? Should I notify the admin for the eigbox.net domain that this is going on, or is that being spoofed, too?
My concern here is that some of the dumber blacklist algorithms might block me widely because they use the spoofed email address instead of examining the IP address. This small flood is a sign to me of a much larger iceberg melting (global warming, perhaps?) with only the tip showing up in my mailbox. Should I be concerned?
It looks like someone in northern Spain is sending out bulk e-mails and the Yahoo server is rejecting them. The mails are most likely originating from an innocent individual infected with a botnet mailer.
There is a little more to it than that... based on the mail header you posted... it appears that the mail server at bosauthsmtp01.eigbox.net is a misconfigured mail server. It looks like the assigned ip block where the mail server lives is 184.108.40.206/24 and is owned by 'Endurance International Group' according to the records[^]. The registered AS number for that IP block is AS29873[^] and you could attempt to contact them. In my experience... nobody every responds to abuse complaints unless there is a warrant attached.
The reason nobody responds to complaints probably has something to do with the fact that poor little Brian appears to be responsible for 79,461[^] domains within that ip range. And thats just one of the 51 ip blocks he appears to be responsible for.
Roger Wright wrote:
Should I be concerned?
There isn't much you can do about it... the SMTP protocols were not very well designed and the protocol allows spoofing. It is up to the mail server software to prevent this. Your ISP or web hosting provider should be diligent with keeping the mail servers properly configured.
By the way you should probably remove your rawright.net[^] e-mail address from the mail header you posted. But because you left it there... I was able to determine that your domain name rawright.net at 220.127.116.11 is on the 18.104.22.168/18 ip block[^] which poor little Brian is responsible for[^]. I hope you don't mind... I hacked, probed and prodded your box a little bit... and it appears to be running IIS/6.0 on windows server.
I was able to connect to your rawright.net SMTP port 25 and forge my origin domain. The SMTP server did not complain. A well configured an e-mail server will perform a reverse DNS here and make sure my IP address matches the domain from the HELO command. I connected multiple times and each time I was routed through a different *.eigbox.net smtp authorization server. It looks like your service provider is using some sort of round robin BGP/GLBP routing.
I spent a few minutes manually testing your mail server via raw TCP socket but always recieved the error: 550 bosauthsmtp: Host x.x.x.x: No unauthenticated relaying permitted (I used all of the tricks I know about and was unable to trick the server into allowing me to relay mail. This is what we want). So maybe its already fixed. But maybe it is not fixed... if you look closely at the mail header you posted... it says the spam came via ESMTPSA which means the spam was sent over an encrypted TLS[^]. Although I would probably continue testing via TLSWrap[^]... I think I'll not test any further. It may be that their plain text SMTP server is well protected... but the encrypted SMTP is vulnerable.
Anyway we could speculate about this all day... but the best person to handle this would be a systems administrator from your rawright.net hosting provider.
I'm quite impressed by the amount of information you were able to glean. FYI, I don't control the SMTP server - webhost4life.com does that. Perhaps it's time for another move, painful as the last one was.
I am coming from the business side rather than from the IT side, but I have been asked to solve a business problem that I think is totally common nowadays, and I hope you can help me with some system admin solutions.
I need to know if my idea will work and it would be very helpful if you could point out some problems areas that I need to consider.
We are a large international organization with a Microsoft infrastructure and about 200 staff who travel frequently. They typically use laptops we provide, but also they want to use their own devices (Bring Your Own Device = BYOD) such as iPads, Macintosh laptops, smartphones, Android tablets, you name it.
What I would like to say to our staff is this:
"Your work computer will be a laptop that you can take home with you or take abroad on your travels.
When you receive this computer it will come with a set of standard software installed, including anti-virus software. Thereafter you have admin rights over this laptop, you are completely responsible for everything on this computer, including backups, just as if it were your personal property. When you leave our organization, you turn your computer in.
"You store your work on your own computer, so you are responsible for backups. If you finish something that should be shared with your colleagues, you upload it to our corporate intranet online, and you let people know it’s there.
"When you come to the office, you will be able to plug your laptop into a docking station with a large-screen monitor and a keyboard. You can log into our network on your office computer, but not on any personal device.
"If you want to access the Internet or printers with any device other than your office laptop you can do so wirelessly."
What do you experienced System Administrators think of this approach. I know our staff would love me for it because they have some big problems with the security of our network, because they can't BYOD, they can install personal software on their laptops, getting software updates is a big hassle with the IT department, etc.
And I suspect your IT department and company lawyers would hate you. IT security is a very serious business and in any corporate organisation it is important to keep good control in order to protect your financial and intellectual property. If you open up your corporate network so people can hook their own systems into it whenever they like, then you are likely to face some serious issues. However many promises people make and however many rules you ask them to follow, the system will be abused.
My advice, don't do it.
Unrequited desire is character building. OriginalGriff
I'm sitting here giving you a standing ovation - Len Goodman
Last Visit: 31-Dec-99 18:00 Last Update: 27-Aug-14 6:30