-
Content Count
558 -
Joined
-
Last visited
Community Reputation
10 NeutralAbout Edd
-
Rank
Registered User
-
It sounds like this to me also - had a few over the years. CHeck out the capacitors near to the main processor - see if any of them look like this: http://4.bp.blogspot.com/_qXgGaISUk9I/R1Mno5lHm4I/AAAAAAAAANw/mpPNdDnX864/s800/bad-caps-1-dec07.jpg
-
New to Web Design, help with cross browser compliancy
Edd replied to office's topic in Computer & Tech Chat
It should be possible to do it, but youre going to be on a learning curve - it shouldn't be this way of course, all browsers should render the same html/css in the same way. Unfortunately, theres some fundamental differences in the way IE and FireFox render the same css (and Opera too). In general Opera and FF are more "standards compliant" then IE. The easiest way ive found is to check using both browsers as you build. But failing that I think its easiest to fix it so it works in FF, then put in the hacks and work-arounds you need to get it looking OK in IE. (Also the version of IE will make a difference! V7 isnt as bad as earlier ones, but theres a HELL of alot of people out there on V6 (and some on earlier ones!). Use a css validator to check your css is in order too - theres one at W3C (http://validator.w3.org/) - pay attention to your DOCTYPE declaration - it changes how different browsers render your page! (see wikipedia for a nice description of quirks mode and a guide to how it works with browsers and doctypes: http://en.wikipedia.org/wiki/Quirks_mode ) Hope that helps -
OO is pretty impressive - i use it alot, although i do struggle to break free of MS Excel. Sadly, if you need to be MS Office compatible, use MS Office. Its a sorry state of affairs when the best reason to use a piece of software is "because thats what everyone else uses" but there you go...
-
I don't believe its a 'loophole' - as far as im aware (and im certainly no expert in these things) the law explicity states that its not permitted to use an intermediary to make a donation.
-
Relocate "My Documents" or whatever is taking up all that space onto the D: partition...
-
How do I find out whether my windows version is 32bit or 64?
Edd replied to ps201acm's topic in Computer & Tech Chat
Right click on "My Computer" and select "properties" the OS version is there on the main section. If its 64-bit, it will say so. -
Well done for all your hard work Joe - you'll be very sorely missed!
-
Sheffield City Centre Situation - merged thread
Edd replied to Lady_Cat's topic in Sheffield News & Discussions
Sounds like scaremongering to me too. There was a suggestion that power in S1 was going to go off between 12-12:30 but hasnt done so far. (see here: http://www.sheffieldforum.co.uk/showthread.php?t=230689 for more information re: power cuts) -
Im sure once you send Geoff enough money to support the forum, he'll look more favourably on your suggestion
-
I think theyre stopping new licenses in 2008 - at least to the big boys ( http://news.bbc.co.uk/1/hi/technology/6551429.stm ). The "support" should last a bit longer though...
-
I noticed that too and i think combined with their recent announcement concerning linux operating systems on dell machines (http://news.bbc.co.uk/1/hi/technology/6506027.stm) its going to challenge microsofts domination of the OS market. I think home users now genuinely have a choice over their operating system, where perhaps they didnt five or so years ago. Im not suggesting that this is the end of MS, but i think they'll have to start working a little harder for their money now.
-
I dont think thats true. They have a DB9 connector, but the amiga mouse is not the same as a serial mouse. Have a google around - i think you can build an 'interface' to run a standard serial mouse. Ebays probably your best bet though... [EDIT] Apparently you can buy an interface: http://www.elbox.com/products/mroocheck.html dunno if they work tho
-
I can imagine that a ddos would increase load on a physical drive, but thats not necesarily a direct cause. As others have said, ddos attacks work by using up system resources (most often bandwidth, but could also be processor, memory or even disc capacity). This seems quite an arm-wavey kind of thing to say. If you wanted to infiltrate a system, then during a genuine ddos i would have thought would be the worst time. If backups are done properly, they shouldnt be accessible or corruptable (as others have said). Maybe this is "code" for "we only had local backups on the same physical drive" Id be quite surprised if a ddos attack turned out to be this 'sophisticated' because generally they're anything but.
-
Any salad that includes a scotch egg is fine by me!