Wednesday, February 20, 2013

Start menu and shutdown pc - Windows Server 2012 - Windows 8

I installed a trial version of Windows Server 2012, the start menu does not exist anymore. I tried couple of hours without the start menu but after a while it felt very primitive.
So what is the solution, well to use Classic Shell which brings back the old start menu.


This is the start menu in Windows Server 2012 and Windows 8, it needs a own full window.
instructions: drag mouse cursor to the right upper corner and it will bring this sidebar, then choose Start



Shutdown Windows Server 2012 or Win 8 Step #1 
instructions: drag mouse cursor to the right upper corner and it will bring this sidebar, then choose settings


Shutdown Windows Server 2012 or Win 8 Step #2
Instructions: choose power and click - shutdown



*** Classic Shell ***



Windows Server 2012 using classic shell, start menu is back and you can easy access the applications or settings instead of switching to a new window (start menu) ala Win8 Windows Server 2012


Shutdown (using classic shell) - Start - Shutdown


Classic Shell is a free, open-source Start menu replacement. It includes skins that can mimic the Windows 7/Vista, Windows XP, or Windows 2000/98 start menus and is extremely configurable.

Classic Shell Website

Tuesday, February 19, 2013

hash a file, folder or device (cd-rom, dvd, usb memory stick)

cryptographic hashing - JUHAX HASH Beta version 1.0
1. File hashing
2. Folder hashing
3. Device hashing (CD-ROM, DVD, USB memory stick)

Hash a file, folder or device. Built in support for filesystems NTFS, FAT32, CDFS etc using JUHAX JX2 algorithm different devices/folders/files located on different filesystems can be compared. such as CD-rom compare to USB memory stick

Example if you burn a copy of your USB memory stick to a cd-rom/DVD, you can compare if they are equal with md5 or sha1


Video (change quality to 720p when watching):
Video #1



Video #2


Monday, February 18, 2013

Get a Hashcode of a CD-ROM ( MD5 - SHA1 - SHA512 - RIPEMD - HAVAL) **** ...

HASH CODE OF A CD-ROM (Hash of a CD)

Forensic techniques and expert knowledge are used to explain the current state of a digital artifact; such as a computer system, storage medium (e.g. hard disk or CD-ROM)

HASH A CD-ROM ! JUHAX technology.
Digital Foresics :
The hash process is normally used during acquisition of the evidence, during verification of the forensic image (duplicate of the evidence), and again at the end of the examination to ensure the integrity of the data and forensic processing.

Calculate a Hashcode of a CD-ROM ( MD5 - SHA1 - SHA512 - RIPEMD - HAVAL) **** Amazing

VIDEO:




Hash Folder - Hash Folders - Hashfolder (only product in the world able to produce true folder hash codes)

JUHAX HASH Beta Version 1.0

New Feature: true hash code of a Folder.
You can produce a single hash code for a total folder and its subfolders and files.
You can produce a single hash code for a CD, DVD or USB memory stick.


Tags: Folder hashing, hash of a folder, hash directory, hash directories, single hashcode, md5, sha1, breakthrough technology, only product in the world able to produce true folder hash codes

Question: How do I get the MD5 sum of a directory's contents as one sum?

Answer: look below

Videos (change quality to 720p when watching):






Screenshot #1:


Screenshot #2




Wednesday, February 13, 2013

Video - hashing a folder (amazing)

Folder : C:\Documents and Settings\admin\Mina dokument\Battlefield 2
File :
Size : 33278656
TAG :
Hashcode : DC1CFCC9F2B150B2A2A695D882AF7515
Info : JX1 HASH
Ext : (DIR)
Algo : md5
Date Created : 2010-05-29 18:31:19
Date Last Access : 2013-02-13 16:41:04
Date Last Write : 2010-05-29 18:33:14
USize : 31,74 Mb
--------------------------------





How can I generate a hash value for a folder, cd, dvd etc?


Questions many people ask
Q1. Can anyone recommend a program / utility that I can point to a folder and it generates a SHA-1 hash of all contents?

Q2. The md5sum program does not provide checksums for directories. I want to get a single MD5 checksum for the entire contents of a directory, including files in sub-directories. That is, one combined checksum made out of all the files. Is there a way to do this?

Q3. How can I generate a hash value for a file or folder?

Q4. I want to point to a folder and generate hash of all contents. I'm familiar with using md5 folder enumerator which works very well with single files but not folders.

Q5.Anyone know of a decent freeware or donateware hashing program that can hash at the DVD or CD level?

Q6. There are LOTS of ways to hash individual files, even hashing all the files in the folder, but the result still requires you compare individual file hashes to check data integrity. Ideally what I'm looking for gives me a single hash number for an entire disc or folder (and its sub-folders) and does it relatively quickly.

Q7. How to do a HASH check of a Windows dvd.

Summary:
many people are asking for to get a single hash of the folder and its contents, not just individual file hashes or recursive listings of files in a folder which is the same as file hash.

Read further and look at the screenshots for evidence of this new technology

*JUHAX Announce HASHING Technology Breakthrough*
This new technology called JUHAX "Juxtapose unknown homomorphic A(synchronous) X". JUHAX allows you to create a single so called hash code of millions of files. It can check the contents of CDs, DVDs, hard drives, and other types of media and create a single cryptographical hash code. JUHAX technology can also be used for comparing folders and files which is a useful feature if you want to compare the files written to disc with the source files (normally stored on your hard drive). Comparison of DVDs, CDS, USB memory sticks is possible using the technology. The JUHAX technology is built around a search engine which can be used to create search hash codes from random files from different folders. Currently the feature of hashing folders, drives, usb memory sticks, cd/dvds comes in two versions, an asynchronous version allowing up to 3 000 000 files inside a folder to be calculated into a single hash code or JX1 which is synchronous allowing unlimited numbers of file objects. The Asynchronous version differ from the synchronous version by calculating the total by calculating Hashcodes while the synchronous takes input in the order it finds data. The technology is currently under development and beta testing. It is planned to have a low price tag of 20 dollars.


Example #1 my documents folder hashed
-----------------------------------------------------------------
Folder : C:\Documents and Settings\admin\Mina dokument
File :
Size : 5498405683
TAG :
Hashcode : 1BAA8FA1944A3608CAC873F9CABF039D
Info : JX1 HASH
Ext : (DIR)
Algo : md5
Date Created : 2010-05-27 14:45:07
Date Last Access : 2013-02-13 15:32:34
Date Last Write : 2013-02-13 15:32:33
USize : 5,12 Gb
---------------------------------------------------------------

Video example # hashing battlefield folder







How to disable check for new version of Opera?

OPERA UPDATES

Situation: Opera checks for update every week and notifies you when there is an update.
Question: How to Disable check for new Opera version?
Solution: Opera -> Tools > Preferences > Advanced > Security > Auto-update > Do not check for updates


Monday, February 4, 2013

JUHAX PAD



Overview

JUHAX PAD is easy-to-use texteditor and password manager with encryption for personal and professional security. It allows you to protect the privacy of sensitive information, by encrypting them with a AES256 strong encryption algorithm. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network -like the Internet- and still remain secret. Later, the information can be decrypted into its original form. JUHAX PAD includes a pseudorandom number generator (PRNG) engine which is compliant with FIPS-140-2 and X9.31/X9.17. The cryptographic hashing algorithms are SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5 and RIPEMD message digest hash algorithms.
Supported Systems

JUHAX PAD software requires only 4 MB of available hard disk space and supports the following Windows operating systems: * Windows© XP, Server 2003, Vista, Server 2008, Server 2008 R2, and Windows 7. (All editions, both 32 and 64-bit versions)

JUHAX.COM
-------------------------------------------------------------------------------------------------------------
JUHAX PAD ist einfach zu bedienende Texteditor und Passwort-Manager mit Verschlüsselung für die persönliche und berufliche Sicherheit. Es ermöglicht Ihnen, die Privatsphäre von sensiblen Informationen zu schützen, durch Verschlüsselung mit einem AES256 starken Verschlüsselungsalgorithmus. Sobald die Informationen verschlüsselt wurde, kann es auf unsichere Medien gespeichert oder übertragen werden kann auf einem unsicheren netzartige das Internet-und noch geheim bleiben. Später können die Informationen in ihrer ursprünglichen Form entschlüsselt werden.

JUHAX PAD eine Pseudo-Zufallszahlen-Generator (PRNG) Engine, die kompatibel mit FIPS-140-2 und X9.31/X9.17 ist. Die kryptografischen Hash-Algorithmen SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5 und RIPEMD Message Digest Hash-Algorithmen.  Unterstützte Systeme  JUHAX PAD Software benötigt nur 4 MB freier Speicherplatz auf der Festplatte und unterstützt die folgenden Windows-Betriebssysteme: * Windows © XP, Server 2003, Vista, Server 2008, Server 2008 R2 und Windows 7. (Alle Ausgaben, die beide 32 und 64-Bit-Versionen)
JUHAX.COM
--------------------------------------------------------------------------------------------------------------
JUHAX PAD est facile à utiliser éditeur de texte et gestionnaire de mot de passe avec cryptage pour la sécurité personnelle et professionnelle. Il vous permet de protéger la confidentialité des informations sensibles, en les chiffrant avec un algorithme de cryptage fort AES 256. Une fois que l'information a été chiffré, il peut être stocké sur un support d'insécurité ou transmis sur un réseau non sécurisé, comme Internet et restent secrètes. Plus tard, l'information peut être déchiffré dans sa forme originale. JUHAX PAD comprend un générateur de nombres pseudo-aléatoires (PRNG) du moteur qui est conforme à la norme FIPS-140-2 et X9.31/X9.17. Les algorithmes de hachage cryptographiques SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5 et RIPEMD messages algorithmes d'empreinte de hachage.  Systèmes pris en charge  JUHAX PAD logiciel ne nécessite que 4 Mo d'espace disponible sur le disque dur et prend en charge les systèmes d'exploitation Windows suivants: * Windows © XP, Server 2003, Vista, Server 2008, Server 2008 R2 et Windows 7. (Toutes les éditions, 32 et 64-bit versions)
JUHAX.COM
--------------------------------------------------------------------------------------------------------------
JUHAX PADは使いやすい個人的な、専門のセキュリティのために暗号化を使用したtexteditorとパスワードマネージャです。それはあなたのAES256の強力な暗号化アルゴリズムを使用して、それらを暗号化することにより、機密情報のプライバシーを保護することができます。情報は暗号化されていると、それは安全でないメディアに保存したり、インターネットを利用しても、秘密のままでネットワーク状の不安定な上に送信することができます。その後、情報が元の形式に復号化することができます。 JUHAX PADは、FIPS-140-2とX9.31/X9.17に準拠している擬似乱数生成器(PRNG)エンジンを搭載しています。暗号ハッシュアルゴリズムはSHA-1、SHA-224、SHA-256、SHA-384、SHA-512、MD5、およびRIPEMDメッセージダイジェストハッシュアルゴリズムです。 サポートされるシステム JUHAX PADのソフトウェアは、ハードディスクの空き容量のわずか4 MBを必要とし、以下のWindowsオペレーティングシステムをサポートします:* Windowsの©XP、Server 2003では、Vistaでは、Server 2008では、Server 2008 R2、およびWindows 7の。 (すべてのエディション、32ビットおよび64ビット版の両方)
JUHAX.COM

JUHAX Announce HASHING Technology Breakthrough

Questions - most wanted feature within cryptographical hashing!
Q1. Can anyone recommend a program / utility that I can point to a folder and it generates a SHA-1 hash of all contents?

Q2. The md5sum program does not provide checksums for directories. I want to get a single MD5 checksum for the entire contents of a directory, including files in sub-directories. That is, one combined checksum made out of all the files. Is there a way to do this?

Q3. How can I generate a hash value for a file or folder?

Q4. I want to point to a folder and generate hash of all contents. I'm familiar with using md5 folder enumerator which works very well with single files but not folders.

Q5.Anyone know of a decent freeware or donateware hashing program that can hash at the DVD or CD level?

Q6.  There are LOTS of ways to hash individual files, even hashing all the files in the folder, but the result still requires you compare individual file hashes to check data integrity. Ideally what I'm looking for gives me a single hash number for an entire disc or folder (and its sub-folders) and does it relatively quickly.

Q7. How to do a HASH check of a Windows dvd.

Summary:
many people are asking for to get a single hash of the folder and its contents, not just individual file hashes or recursive listings of files in a folder which is the same as file hash.

Read further and look at the screenshots for evidence of this new technology

*JUHAX Announce HASHING Technology Breakthrough*
This new technology called JUHAX "Juxtapose unknown homomorphic A(synchronous) X". JUHAX allows you to create a single so called hash code of millions of files. It can check the contents of CDs, DVDs, hard drives, and other types of media and create a single cryptographical hash code. JUHAX technology can also be used for comparing folders and files which is a useful feature if you want to compare the files written to disc with the source files (normally stored on your hard drive). Comparison of DVDs, CDS, USB memory sticks is possible using the technology. The JUHAX technology is built around a search engine which can be used to create search hash codes from random files from different folders. Currently the feature of hashing folders, drives, usb memory sticks, cd/dvds comes in two versions, an asynchronous version allowing up to 3 000 000 files inside a folder to be calculated into a single hash code or JX1 which is synchronous allowing unlimited numbers of file objects. The Asynchronous version differ from the synchronous version by calculating the total by calculating Hashcodes while the synchronous takes input in the order it finds data. The technology is currently under development and beta testing. It is planned to have a low price tag of 20 dollars.
-----------------------------------------------------------
Folder : C:\Documents and Settings\admin\Mina dokument\
File : AnyCount7_Quick_Start_Guide.pdf
Size : 78687
TAG :
Hashcode : B3F2FB70D918DE06D8697E0D71F2B5AB
Info : File HASH
Ext : pdf
Algo : md5
Date Created : 2011-05-21 19:55:53
Date Last Access : 2013-02-04 15:59:54
Date Last Write : 2011-05-21 19:55:53
USize : 76,84 Kb
------------------------------------------------------------
Folder : C:\Documents and Settings\admin\Mina dokument\00csv
File :
Size : 839839447
TAG :
Hashcode : E3682CA117C223CC5EB69D23CE3424D7
Info : JX2 HASH
Ext : (DIR)
Algo : md5
Date Created : 2011-04-16 10:10:17
Date Last Access : 2013-02-04 15:59:08
Date Last Write : 2013-01-11 19:44:18
USize : 800,93 Mb
--------------------------------------------------------------
JX1 = Synchronous JUHAX JX2 = Asynchronous JUHAX
JUHAX Algo + your favorite hash algo
SCREENSHOT one file and one folder hashed example




NOTES: filesystems NTFS, CDFS, UDF are alphabetical meaning it is suitable to use JX1 synchronous mode and if FAT16 or FAT32 filesystems (usually usb stick use fat32) use JX2 asynchronous which is filesystem independent. Example comparing a folder c:\myusbmemory and f:\ (usb memory stick) you must use JX2 and if they are equal hashes are the same ofcourse.

Currently developement of JX2 is able to create hash code of folders containing up to 3 000 000 files and unlimited subfolders. Since JX2 calculation use RAM and it is designed as a 32 bit 64 bit compatible application the memory is limited to 2 gigabyte as usually most programs are. Testing been done possible to get a hashcode of folders up to 3 000 000 sub files using JX2. File name and folder support unicode chinese,japanese,russia etc. unlimited filesize. Largest file hash test is 700 000 Gigabyte(0,7 terabyte) large file successfully hashed.

Screenshot #2
various directories hashed with different algos, hash folder(s) no problem




This application simplifies the comparison / verification / synchronization status of two different directories on any media (local drives, network drives, writable CD's, Compact Flash and electronic media, any drive/disk or device managed as valid windows pathnames).

Supports drag and drop directly from and integrated fileexplorer, drag files and folders
support for network unc paths are planned, you can drag and drop a folder if you have mapped it ofcourse.





Example japanese folder, kopia (swedish for copy) is the copy of that directory, look same HASH code JX1 MD5!

Folder : F:\精密模\dir_japan_模
File :
Size : 43222
TAG :
Hashcode : A307F8DC8801018F71047A30FC2A38E6
Info : JX1 HASH
Ext : (DIR)
Algo : md5
Date Created : 2011-12-15 12:54:31
Date Last Access : 2013-02-04 17:17:42
Date Last Write : 2013-02-01 17:07:21
USize : 42,21 Kb
--------------------------------
Folder : F:\精密模\Kopia av dir_japan_模
File :
Size : 43222
TAG :
Hashcode : A307F8DC8801018F71047A30FC2A38E6
Info : JX1 HASH
Ext : (DIR)
Algo : md5
Date Created : 2013-02-01 17:07:32
Date Last Access : 2013-02-04 17:17:43
Date Last Write : 2013-02-01 17:07:32
USize : 42,21 Kb
--------------------------------
SEARCH HASH

JUHAX technology do also support creating a hashcode of a unique search of files forexample searching for all .mp3 files on a cd it can calculate a Asynchoronous JX2 or Synchronous JX1 hashcode for that current search. IF you search for a*.mp3 files on CD number 1 you will get a hashcode for that search result and you then can compare CD number 2 if you get the same search hashcode for a*.mp3.

Folder hashing can be done either on root level, recursive or particular files and there will be a hashcode generated for that search.

JX1 and JX2 technology is implemented to support following hashing algos:
MD5,SHA1,SHA256,SHA384,SHA512, RIPEMD128, RIPEMD160, RIPEMD256, RIPEMD320,HAVAL128,HAVAL160,HAVAL192,HAVAL224,HAVAL256

FILESYSTEM INFORMATION
The order in which this function returns the file names is dependent on the file system type. With the NTFS file system and CDFS file systems, the names are usually returned in alphabetical order. With FAT file systems, the names are usually returned in the order the files were written to the disk, which may or may not be in alphabetical order. However, as stated previously, these behaviors are not guaranteed.

JUHAX JX1 is synchronous and uses FindNextFile function built in WINDOWS WIN32API DLL   Kernel32.dll this means that folders are feed as it find the file alphabetical if using NTFS but to be safe use JUHAX JX2 which is totally filesystem independent, you can compare a folder on a memory stick formatted with FAT32 and a folder on you harddisk using NTFS filesystem, also comparisons with UDF, CDFS for cd and dvd. But test using JX1 synchronous have been successfully comparing CD and a folder on harddisk with same data as the CD-disc, cdfs and ntfs work the same way therefore JX1 can be used.

Note that JX1 and JX2 hashed ofcourse are different since the logic hashing is different, i would recommend only use JX1 for extremely large directories containing more than 3 000 000 files.

Definitions:
short version: a cryptographic hash is, "a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value".

A cryptographic hash function is a hash function; that is, an algorithm that takes an arbitrary block of data and returns a fixed-size bit string, the (cryptographic) hash value, such that any (accidental or intentional) change to the data will (with very high probability) change the hash value. The data to be encoded are often called the "message," and the hash value is sometimes called the message digest or simply digest.

The ideal cryptographic hash function has four main properties:
it is easy to compute the hash value for any given message
it is infeasible to generate a message that has a given hash
it is infeasible to modify a message without changing the hash
it is infeasible to find two different messages with the same hash

Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes (MACs), and other forms of authentication. They can also be used as ordinary hash functions, to index data in hash tables, for fingerprinting, to detect duplicate data or uniquely identify files, and as checksums to detect accidental data corruption. Indeed, in information security contexts, cryptographic hash values are sometimes called (digital) fingerprints, checksums, or just hash values, even though all these terms stand for functions with rather different properties and purposes.
(source:wikipedia)

Keywords:
implementations of Homomorphic Hashing, hash folders, homomorphic hashing algebra,verifiable computing,Fountain Codes, a clever probabilistic algorithm that allows you break a large file up into a virtually infinite number of small chunks, such that you can collect any subset of those chunks - as long as you collect a few more than the volume of the original file - and be able to reconstruct the original file. JUHAX does the same with files (chunk) by using homomorphic algebra instead of summing files identity (which are inside folders) there is no need to record which order they were combined (JX2 asynchoronous) also note that JX2 takes care of the problem of sum or multiplication by using homomorphic algebra)

TEST
a test using a folder with 30 000 files inside several subfolders, calculating the JX2 hash code, then changing filenames and subfolder names inside the root folder, the again calculating JX2 hash and this was able to produce the same hash again (asynchronous) it does calculate in realtime the identity (content) of the folder (and the files inside)

*********************************************************************************
 JUHAX annoncent hachage * Breakthrough Technology  Cette nouvelle technologie appelée JUHAX "Juxtapose homomorphique inconnu Un X (synchrone)". JUHAX vous permet de créer un seul code afin dite de hachage des millions de fichiers. Il permet de vérifier le contenu des CD, des DVD, des disques durs et d'autres types de médias et de créer un seul code de hachage cryptographique. JUHAX technologie peut également être utilisée pour comparer des dossiers et des fichiers qui est une fonction utile si vous voulez comparer les fichiers écrits sur le disque avec les fichiers sources (normalement stockés sur votre disque dur). Comparaison des DVD, CD, clés USB est possible avec la technologie. La technologie JUHAX est construit autour d'un moteur de recherche qui peut être utilisé pour créer des codes de hachage de recherche de fichiers aléatoires provenant de différents dossiers. Actuellement, la fonction de hachage de dossiers, lecteurs, clés USB, CD / DVD est disponible en deux versions, une version asynchrone permettant jusqu'à 1 000 000 fichiers dans un dossier doit être calculée en un seul code de hachage ou de la version 2 qui est synchrone permettant illimité nombre d'objets de fichiers. La version asynchrone différer de la version synchrone en calculant le total en calculant les codes de hachage alors que la synchronisation prend en entrée dans l'ordre qu'il trouve des données. La technologie est actuellement en cours de développement et de test bêta. Il est prévu d'avoir une étiquette de prix bas de 20 dollars.

* JUHAX Kündigen Hashing Technologie-Durchbruch *  Diese neue Technologie namens JUHAX "Juxtapose unbekannten homomorphen A (synchron) X". JUHAX können Sie einen einzelnen so genannten Hash-Code von Millionen von Dateien zu erstellen. Es kann den Inhalt von CDs, DVDs, Festplatten und andere Arten von Medien und erstellt eine einzelne kryptographische Hash-Code. JUHAX Technologie kann auch für den Vergleich von Ordnern und Dateien, die eine nützliche Funktion, wenn Sie die Dateien geschrieben, um Disc mit den Quelldateien (normalerweise auf Ihrer Festplatte gespeichert) vergleichen wollen verwendet werden. Vergleich von DVDs, CDs, USB-Sticks ist möglich mit der Technologie. Die JUHAX Technologie ist um eine Suchmaschine, die verwendet werden, um die Suche Hash-Codes von zufälligen Dateien aus verschiedenen Ordnern erstellt werden können gebaut. Derzeit ist die Funktion der Hash-Ordner, Laufwerke, USB-Speicher-Sticks, CDs / DVDs kommt in zwei Versionen, eine asynchrone Version ermöglicht bis zu 1 000 000 Dateien in einem Ordner zu einem einzigen Hash-Code oder Version 2 berechnet werden, die synchron ermöglicht unbegrenzt ist Anzahl der Datei-Objekte. Die asynchrone Version von der synchronen Version unterscheiden sich durch die Berechnung der insgesamt durch die Berechnung Hashcodes während die synchrone nimmt die Eingabe in der Reihenfolge findet Daten. Die Technologie ist derzeit in Entwicklung und Beta-Testphase. Es ist geplant, einen niedrigen Preis von 20 Dollar zu haben.

* JUHAXは、ハッシング技術のブレークスルー※を発表 この新技術は、JUHAXが "未知の準同型の(同期)Xを並列する"と呼ばれる。 JUHAXは、数百万のファイルの単一いわゆるハッシュコードを作成することができます。それは、CDやDVD、ハードディスクドライブ、および他のタイプのメディアの内容をチェックして、単一cryptographicalハッシュコードを作成することができます。 JUHAX技術はまた、ソースファイル(通常はハードドライブに格納されている)を使ってディスクに書き込まれたファイルを比較したい場合に便利な機能ですフォルダとファイルを比較するために使用することができます。 DVDやCD、USBメモリスティックの比較が可能な技術を使用しています。 JUHAX技術は、異なるフォルダからランダムファイルから検索ハッシュコードを作成するために使用できる検索エンジンを中心に構築されます。現在ハッシングフォルダ、ドライブ、USBメモリスティック、CD / DVDの機能が無制限許可同期している二つのバージョンは、単一のハッシュコードまたはバージョン2に計算されるフォルダ内の1 000 000ファイルまで可能非同期バージョンで来るファイルオブジェクトの数。非同期バージョンは、同期がデータを見つけるために、入力を受け取りながら、ハッシュコードを計算することにより、合計を計算することにより、同期バージョンとは異なります。技術が発展し、ベータテスト中です。それは20ドルの低価格のタグを持つことが計画されています。
**********************************************************************************

(C) 2010-2013 JUHAX.com

Thursday, January 31, 2013

There might be a problem with the driver for the Wireless Network

I bought TP-link wifi network card usb, it worked on a Win xp computer so i could connect to WIFI network and to internet. The problem was on my Windows 7 machine, i installed WIFI NETWORK drivers and it showed up in the device manager and everything looked fine. Then i could not connect since it could find any wifi networks, i reinstalled everything again, restarted services related to network etc. I even bought a another wifi (wireless) USB network card TL-WN725N. Same with this TP-link network card. Nothing worked, shutdown zonealarm firewall, reinstall drivers, no wifi networks to be found. THE SOLUTION: 1. uninstall ZoneAlarm 2. reinstall zonealarm.3. Restart computer to be really safe. 4. Voila, the wireless networks could be found. ANALYSIS: Zonealarm does something with drivers on the operating system level, so it is not enough to just close zonealarm it needed to be uninstalled. SOLVED: there might be a problem with the driver for the wireless network connection

SPANISH
Compré TP-Link Tarjeta de red wifi usb, trabajó en un equipo Win xp para que yo pudiera conectarse a la red Wi-Fi y de Internet. El problema estaba en mi máquina de Windows 7, he instalado los drivers de red WiFi y que apareció en el administrador de dispositivos y todo se veía bien. Entonces no pude conectar, ya que se han encontrado redes wifi, i volver a instalar todo de nuevo, reinicie los servicios relacionados con la red, etc Incluso compré un otro wifi (inalámbrica) Tarjeta de red USB TL-WN725N. Lo mismo con esta tarjeta de red TP-Link. Nada funcionaba, apagado zonealarm firewall, reinstalar los controladores, no hay redes Wi-Fi que se encuentran. LA SOLUCIÓN: 1. desinstalar ZoneAlarm 2. reinstalar zonealarm.3. Reinicie el equipo para estar realmente seguro. 4. Voila, las redes inalámbricas se pudo encontrar. ANÁLISIS: ZoneAlarm hace algo con los controladores en el sistema operativo, por lo que no es suficiente para cerrar zonealarm sólo necesitaba ser desinstalado. SOLVED: puede haber un problema con el controlador para la conexión de red inalámbrica

FRENCH
J'ai acheté wifi TP-link carte réseau usb, il a travaillé sur un ordinateur Windows XP pour que je puisse se connecter au réseau Wi-Fi et à Internet. Le problème était sur ma machine Windows 7, j'ai installé les pilotes réseau WiFi et il est apparu dans le gestionnaire de périphérique et tout se passait bien. Ensuite, je ne pouvais pas se connecter car il pourrait trouver des réseaux wifi, j'ai réinstallé tout nouveau redémarré les services liés au réseau etc J'ai même acheté un autre wifi (sans fil) USB carte réseau TL-WN725N. Même avec cette carte réseau TP-link. Rien n'a fonctionné, arrêt pare-feu ZoneAlarm, réinstallez les pilotes, pas de réseaux Wifi à trouver. LA SOLUTION: 1. désinstaller ZoneAlarm 2. zonealarm.3 réinstaller. Redémarrez l'ordinateur pour être vraiment sûr. 4. Voila, les réseaux sans fil n'a pu être trouvée. ANALYSE: Zonealarm fait quelque chose avec les pilotes au niveau du système d'exploitation, il ne suffit pas de simplement fermer zonealarm il avait besoin d'être désinstallé. Résolu: il pourrait y avoir un problème avec le pilote pour la connexion réseau sans fil

GERMAN
Ich kaufte TP-Link WLAN-Netzwerkkarte usb, es funktionierte auf einem Win XP Rechner, so dass ich WIFI Netzwerk und Internet verbinden konnte. Das Problem war, auf meinem Windows 7 Rechner installiert, i WIFI Netzwerk-Treiber und es zeigte sich in den Geräte-Manager, und alles sah gut aus. Dann konnte ich nicht herstellen, da es keine WLAN-Netze finden konnte, habe ich alles neu installiert erneut gestartet Dienstleistungen rund um Netzwerk etc. Ich kaufte mir sogar einen anderen Wi-Fi (WLAN) USB-Netzwerkkarte TL-WN725N. Gleiche mit diesem TP-Link Netzwerkkarte. Nichts funktionierte, shutdown ZoneAlarm Firewall, Treiber neu installieren, keine WiFi-Netzwerke gefunden werden. DIE LÖSUNG: 1. deinstallieren ZoneAlarm 2. Neuinstallation zonealarm.3. Starten Sie den Computer, um wirklich sicher sein. 4. Voila, konnten die drahtlosen Netzwerke gefunden werden. ANALYSE: Zonealarm macht etwas mit Fahrer auf der Betriebssystem-Ebene, so ist es nicht genug, nur zu schließen zonealarm es musste deinstalliert werden. GELÖST: Es könnte ein Problem mit dem Treiber für die drahtlose Netzwerkverbindung

RUSSIAN
Я купил TP-Link WiFi сетевая карта USB, он работал на компьютере Win XP, так что я смог подключиться к Wi-Fi сети и интернету.Проблема была на моей машине Windows 7, я установил драйвера беспроводной сети, и она показала в диспетчере устройств, и все выглядело прекрасно. Тогда я не мог подключиться, поскольку она может найти любой Wi-Fi сети, я переустановил все заново, перезапуск услуг, связанных с сетью и т.д. Я даже купил другую WiFi (беспроводной) USB сетевая карта TL-WN725N. То же самое с этим TP-LINK сетевой карты. Ничего не помогало, отключение брандмауэра ZoneAlarm, переустановить драйвера, не Wi-Fi сетей можно найти.РЕШЕНИЕ: 1. удалить ZoneAlarm 2. переустановить zonealarm.3. Перезагрузите компьютер, чтобы быть действительно безопасными. 4. Вуаля, беспроводных сетей может быть найдено. АНАЛИЗ: Zonealarm делает что-то с драйверами на уровне операционной системы, так что это не достаточно просто закрыть ZoneAlarm ее необходимо удалить. Решено: там могут быть проблемы с драйверами для подключения к беспроводной сети

JAPANESE
私は、Wi-Fiネットワークに、インターネットに接続できましたので、私はTP-LINK WiFiネットワークカードのUSBを買って、それはWin XPコンピュータ上で働いていました。問題は私のWindows 7のマシン上にあった、私は、WiFiネットワークドライバをインストールして、デバイスマネージャで現れ、すべてがうまく見えた。それは、任意のWiFiネットワークを見つけることができるので、その後、私は接続できませんでした、私は再び、すべてを再インストールし、ネットワークへの等私が関連するサービスがあっても、別の無線LAN(ワイヤレス)USBネットワークカード、TL-WN725Nを買って再開しました。このTP-Linkネットワークカードと同じ。何も、シャットダウンZoneAlarmファイアウォールを働いていない、ドライバー、発見されるのないWiFiネットワークを再インストールします。 【解決手段】1。 ZoneAlarmの2をアンインストールします。 zonealarm.3を再インストールします。本当に安全であるために、コンピュータを再起動します。 4。出来上がりは、ワイヤレスネットワークが見つかりませんでした。分析:ZoneAlarmは、オペレーティング·システム·レベルのドライバで何かので、それはそれはアンインストールする必要ZoneAlarmを閉めるのに十分ではありません。 SOLVED:ワイヤレスネットワーク接続用のドライバに問題があるかもしれません

CHINESE(traditional)
我買了TP-LINK無線網卡USB,它的工作,所以我在WIN XP電腦可以連接到WIFI網絡和互聯網。問題是我的Windows 7機器上,我安裝了WIFI網絡驅動程序,它顯示了在設備管理器,一切似乎都很正常。然後,我無法連接,因為它可以找到任何有WIFI網絡,我又重新安裝了一切,重新啟動相關的網絡服務等。我什至買了一個又一個的wifi(無線)USB網卡TL-WN725N。 TP-LINK網絡卡相同。沒有工作,關閉ZoneAlarm防火牆,重新安裝驅動程序,沒有被發現的WiFi網絡。解決方案:1。卸載ZoneAlarm的2。重新安裝zonealarm.3。重新啟動計算機,是真正的安全。 4。瞧,無線網絡可以找到。分析:ZoneAlarm的做一些事情的驅動程序在操作系統級別上的,所以它是不足夠的,只是關閉ZoneAlarm的,它需要將其卸載。解決:可能是有問題的驅動程序的無線網絡連接

Friday, December 21, 2012

MJAU64 - MUZZAX #1

MJAU64.com Old school demoscene group MJAU64 proudly present MUZZAX #1. It is a music collection. (Wikipedia) The demoscene is a computer art subculture that specializes in producing demos, which are audio-visual presentations that run in real-time on a computer. The main goal of a demo is to show off programming, artistic, and musical skills.

DUTCH
MJAU64.com Old school demoscene groep MJAU64 trots presenteren MUZZAX # 1. Het is een muziek collectie. (Wikipedia) Het demoscene is een computer kunst subcultuur die gespecialiseerd is in het produceren van demo's, die audio-visuele presentaties die in real-time uitgevoerd op een computer. Het belangrijkste doel van een demo is om te pronken met de programmering, artistieke en muzikale vaardigheden.

FRENCH
MJAU64.com Old school demoscene groupe MJAU64 fièrement MUZZAX present # 1. Il s'agit d'une collection de musique. (Wikipedia) La demoscene est une sous-culture art informatique qui se spécialise dans les démos de production, qui sont des présentations audiovisuelles qui s'exécutent en temps réel sur un ordinateur. L'objectif principal d'une démonstration est de montrer programmation, artistique et compétences musicales.

FINNISH
MJAU64.com Old school demoscene ryhmä MJAU64 ylpeästi esillä MUZZAX # 1. Se on musiikkikokoelma. (Wikipedia) demoscene on tietokone taidetta alakulttuuri, joka on erikoistunut tuottamaan demot, jotka ovat AV-esityksiä, jotka toimivat reaaliajassa tietokoneella.Päätavoitteena demo on keuliminen ohjelmointi, taiteellinen, ja musiikillisia taitoja.

GERMAN
MJAU64.com Old school Demoszene Gruppe MJAU64 proudly present MUZZAX # 1. Es ist eine Musik-Sammlung. (Wikipedia) Die Demoszene ist ein Computer-Kunst Subkultur, die in der Herstellung von Demos, die audio-visuelle Präsentationen, die in Echtzeit auf einem Computer sind spezialisiert. Das Hauptziel einer Demo ist zu zeigen, Programmierung, künstlerischen und musikalischen Fähigkeiten.

ITALIAN
MJAU64.com Vecchia scuola demoscene gruppo MJAU64 orgoglio MUZZAX present # 1. Si tratta di una collezione di musica. (Wikipedia) Il demoscene è una sottocultura computer art che si specializza nella produzione di demo, che sono presentazioni audiovisive che vengono eseguiti in tempo reale su un computer. L'obiettivo principale di una demo è quello di mostrare la programmazione, artistico, e le competenze musicali.

POLISH
MJAU64.com Staromodne demosceny grupa MJAU64 dumą prezentujemy MUZZAX # 1. Jest to zbiór muzyki. (Wikipedia) demosceny jest subkulturą sztuki komputerowej, która specjalizuje się w produkcji dema, które są prezentacje audio-wizualne, które działają w czasie rzeczywistym na komputerze.Głównym celem demo ma pokazać programowania, artystycznym i umiejętności muzyczne.

SPANISH
MJAU64.com Vieja escuela demoscene grupo MJAU64 orgullo MUZZAX actual # 1. Se trata de una colección de música. (Wikipedia) La demoscene es una subcultura arte digital que se especializa en la producción de demos, que son presentaciones audiovisuales que se ejecutan en tiempo real en un ordenador. El objetivo principal de una demostración es mostrar la programación, artísticas y habilidades musicales.

SERBIAN
MJAU64.com Стара школа демосцене група МЈАУ64 поносно присутан МУЗЗАКС # 1. То је музичка колекција. (Википедиа) демосцене је компјутерска уметност субкултуру која је специјализована за производњу демоса, који су аудио-визуелне презентације које раде у реалном времену на рачунару.Главни циљ је да се демо покаже програмирање, умјетничке и музичке способности.

SWEDISH
MJAU64.com Old school demoscene grupp MJAU64 presenterar stolt MUZZAX # 1. Det är en musiksamling. (Wikipedia) demoscene är en datorkonst subkultur som specialiserat sig på produktion demos, som är audiovisuella presentationer som körs i realtid på en dator. Det huvudsakliga målet med en demo är att visa upp programmering, konstnärligt och musikaliska färdigheter.

RUSSIAN
MJAU64.com Старая школа демосцене группы MJAU64 гордостью представляем MUZZAX № 1. Это музыкальной коллекции. (Wikipedia) демосцене является субкультурой компьютерного искусства, которое специализируется на производстве демонстраций, которые являются аудио-визуальных презентаций, которые работают в реальном времени на компьютере. Основная цель демо, чтобы показать программированию, художественные и музыкальные навыки.

JAPANESE
MJAU64.comオールドスクールデモシーングループMJAU64は誇らしげに存在MUZZAX第1位。それは、音楽のコレクションです。 (ウィキペディア)デモシーンは、コンピュータ上でリアルタイムに実行するオーディオ·ビジュアルプレゼンテーションです産デモ、に特化したコンピュータ·アートのサブカルチャーである。デモの主な目的は、プログラミング、芸術、音楽のスキルを誇示することである。

CHINESE(TRADITIONAL)
舊學校demoscene組MJAU64.com MJAU64自豪地MUZZAX#1。這是一個音樂收藏。 (維基百科)demoscene是一個計算機專業的視聽演示文稿的計算機上運行的實時演示,藝術亞文化。演示的主要目的是為了炫耀編程,藝術,和音樂技能。

Friday, June 8, 2012

IQ

I did couple of new IQ test, i manage to get 120 So it is really difficult when it comes > 120 this one i forget but i did take this couple of years ago http://www.iqtestet.se/juha-IQ_415184.html ---------------------------------------------------------- update 2013 january ResultsYour IQ is estimated to be126 or more Congratulations! This is the highest score that can be achieved on the sample test. Only 4% of the population has an IQ of 126 or more.

Thursday, September 16, 2010

Change background/foreground color of Progressbar - this is possible - win32api

some more old school vb6 code:

Change background/foreground color of Progressbar

win32 api




'**************************************
' Name: Change background/foreground color of Progressbar
' Description:Change background/foreground color of Progressbar.
using SENDMESSAGE/win32API
' By: Juha Soderqvist
'
'This code is copyrighted and has' limited warranties.Please see http://www.Planet-Source-Code.com/vb/scripts/ShowCode.asp?txtCodeId=33694&lngWId=1'for details.'**************************************

' -------------- module code --------------
Public Declare Function SendMessage Lib _
"user32" Alias "SendMessageA" _
(ByVal hwnd As Long, _
ByVal wMsg As Long, _
ByVal wParam As Long, _
lParam As Any) As Long
Public Const CCM_FIRST = &H2000
Public Const CCM_SETBKCOLOR = (CCM_FIRST + 1)
Public Const PBM_SETBKCOLOR = CCM_SETBKCOLOR
Public Const WM_USER = &H400
Public Const PBM_SETBARCOLOR = (WM_USER + 9)
' to change progressbarcolor
Public Sub colortoprogress(prog As Long, bgr As Integer, bgg As Integer, bgb As Integer, fgr As Integer, fgg As Integer, fgb As Integer)
SendMessage prog, PBM_SETBKCOLOR, 0, ByVal RGB(bgr, bgg, bgb)
SendMessage prog, PBM_SETBARCOLOR, 0, ByVal RGB(fgr, fgg, fgb)
End Sub

' -------------- form code --------------
Private Sub Form_Load()
Me.ProgressBar1.Scrolling = ccScrollingSmooth
Me.ProgressBar1.Min = 0
Me.ProgressBar1.Max = 100
colortoprogress Me.ProgressBar1.hwnd, 255, 255, 255, 0, 0, 0
Timer1.Interval = 10
Timer1.Enabled = True
End Sub
Private Sub Timer1_Timer()
Me.ProgressBar1.visible = True
If Me.ProgressBar1.Value = 100 Then Me.ProgressBar1.Value = 1
Me.ProgressBar1.Value = Me.ProgressBar1.Value + 1
End Sub

link to the post i did 2002

http://pellesoft.se/communicate/forum/view.aspx?msgid=32414&forumid=2&sum=0

oh and it is in swedish
regards
Juha söderqvist

Toolbar - skumma grejer

old school 2002 stuff i found
----------------------
Toolbar - skumma grejer
2002-03-13 03:59:57 - Juha Söderqvist



0. nytt vb projekt -standard exe
1. lägg till en Toolbar komponent (ms win common controls 6.0 (sp4)
1.1 högerklick och properties och ändra "appearance" och "style" = Flat
2. lägg till några knappar "buttons" med captions ex knapp1, knapp2 etc..
3. kompilera
4. stäng vb och testa exe filen

5. tryck ner shift och vänstermusknapp och dra knappar (buttons) i toolbaren och släpp(drop) efter sista knappen..

resultat : jag får en knapp som heter HackAlert ??? i vissa fall har den inte skapat denna knapp, men det här verkar skumt som f_



vb6 + sp5

************** this is english translation

Toolbar - dodgy stuff
2002-03-13 03:59:57 - Juha Söderqvist



create a new vb6 project standard exe
1st add a Toolbar component (ms win Common Controls 6.0 (sp4)
1.1 Right click and properties and change the "appearance" and "style" = Flat
2nd add a few buttons "buttons" with captions as Key 1, button2 etc..
3rd compile
4th close vb and test exe file

5th press down shift and left mouse button and drag the buttons (buttons) in the toolbar and drop (drop) after the last button ..

Results: I have a button called hackalert? in some cases, it has not created the key, but this seems really strange, is this somekind of easter EGG stuff??


VB6 + SP5

Wednesday, September 1, 2010

Health profile and intelligence - Juha Söderqvist

todays test:
Weight: 88kg
length: 188 CM
resting hearth rate: 35 bpm
IQ: 110
http://www.iqtestet.se/juha-IQ_415184.html

Wednesday, August 18, 2010

progressbar colors vertical and horizontal

Gradient picturebox as Progressbars vertical and horizontl + placement in statusbar

http://www.planetsourcecode.com/vb/scripts/ShowCode.asp?txtCodeId=33694&lngWId=1