|
Hi..
Expansion slot is not fix to system
Regards
Sunny
|
|
|
|
|
Ummm...let's try this again. The maximum number of NIC cards you can have in the machine is limited by the number of expansion slots in the machine. That's all.
I currently have 4 in the machine I'm on right now...
|
|
|
|
|
I am trying to implement a software layer to handle Decklink card IO.
According to SDK provided with the card, all the decklink filters implements IDecklinkIOControl Interface. My query is that can we able to query that interface without adding any of the Decklink filters in the graph
|
|
|
|
|
If you have the SDK, you should also have a help-file or contact information for support. Even though most people on CP are willing to help if they can, your chance of finding someone in the know are pretty slim around here.
That being said, you are referring to an interface, which is just a posh way for the filters to state "this is how you can talk to me". There is no useable implementation behind your IDecklinkIOControl interface. You either need to write your own or use one of those provided by the supplier. Which means that "NO" probably is the answer you'll get from Decklink.
Cheers,
Sebastian
--
"If it was two men, the non-driver would have challenged the driver to simply crash through the gates. The macho image thing, you know." - Marc Clifton
|
|
|
|
|
¿Cuál es más eficiente en el uso de los megahertz: El AMD K9 o el lntel Core 2?
Wich one is more efficient in the megahertz use: the AMD K9 or the lntel Core 2?
|
|
|
|
|
That's not even an academic question as you can't buy K9.
|
|
|
|
|
This question is part of a homework from the university. I know that you can't buy one and I'm not sure what efficiency means in this case, but if you can give me and answer about it, I'll be grateful.
|
|
|
|
|
See here.[^]
Today's lesson is brought to you by the word "niggardly". Remember kids, don't attribute to racism what can be explained by Scandinavian language roots.
-- Robert Royall
|
|
|
|
|
Efficient? As in, "uses the lowest possible amount of energy"?
Or do you want a link to a benchmark, comparing both and giving a hint at which might be faster under the circumstances of the test?
I are troll
|
|
|
|
|
If anyone have the code of CSMA/CD protocol pls send me on my email id i.e. rajat2006aad@yahoo.com
|
|
|
|
|
Do you even know what CSMA/CD is??
|
|
|
|
|
Probably not
Cheers,
Sebastian
--
"If it was two men, the non-driver would have challenged the driver to simply crash through the gates. The macho image thing, you know." - Marc Clifton
|
|
|
|
|
csma/cd is a protocol for multiple access first pick up a book on computer networks try understanding the algorithm them u can write the code in any language u want u can even implement it using digital logic gate alone provided u understand the protocol
|
|
|
|
|
I've a wireless router with a very high range but the damn thing is that I want to reduce its range 'coz I do not want that someone break into my network and steal ma data.
Any idea guys ?
TVMU^P[[IGIOQHG^JSH`A#@`RFJ\c^JPL>;"[,*/|+&WLEZGc`AFXc!L
%^]*IRXD#@GKCQ`R\^SF_WcHbORY87֦ʻ6ϣN8ȤBcRAV\Z^&SU~%CSWQ@#2
W_AD`EPABIKRDFVS)EVLQK)JKQUFK[M`UKs*$GwU#QDXBER@CBN%
R0~53%eYrd8mt^7Z6]iTF+(EWfJ9zaK-iTV.C\y<pjxsg-b$f4ia>
-----------------------------------------------
128 bit encrypted signature, crack if you can
|
|
|
|
|
In the settings of some routers you can set transmit power from 100% down to something that covers your area. Don't forget to do this on clients using the WLAN too (though not all NICs support it...).
//Johannes
|
|
|
|
|
gotcha...
Wireless LAN :: Advanced setting
Beacon Interval The Beacon Interval value indicates the frequency interval of the beacon. Enter a value between 20 and 1000. A beacon is a packet broadcast by the Router to synchronize the wireless network.
RTS Threshold The RTS (Request To Send) threshold (number of bytes) for enabling RTS/CTS handshake. Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to zero turns on the RTS/CTS handshake. Enter a value between 0 and 2432.
Fragment Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter a value between 256 and 2432.
DTIM This value, between 1 and 255, indicates the interval of the Delivery Traffic Indication Message (DTIM).
802.11b/g
I didnt think that its inside my router...is that what I need ?
edit:
damn, I think this isnt what I needed. I just read some text in hurry
TVMU^P[[IGIOQHG^JSH`A#@`RFJ\c^JPL>;"[,*/|+&WLEZGc`AFXc!L
%^]*IRXD#@GKCQ`R\^SF_WcHbORY87֦ʻ6ϣN8ȤBcRAV\Z^&SU~%CSWQ@#2
W_AD`EPABIKRDFVS)EVLQK)JKQUFK[M`UKs*$GwU#QDXBER@CBN%
R0~53%eYrd8mt^7Z6]iTF+(EWfJ9zaK-iTV.C\y<pjxsg-b$f4ia>
-----------------------------------------------
128 bit encrypted signature, crack if you can
|
|
|
|
|
That appears to only adjust how frequently a beacon packet is sent. Something to consider, as you reduce the power of your tranmitter the maximum speed your network will operate at will also go down. Faster signals require a higher signal to noise level (db) than slower ones, so as you reduce the size of your signal the SNR will drop and your performance will suffer as a result.
Today's lesson is brought to you by the word "niggardly". Remember kids, don't attribute to racism what can be explained by Scandinavian language roots.
-- Robert Royall
|
|
|
|
|
then what should I do to reduce the range, my friend gave me advise once that If you place the aluminum or tin foil around the antenna then your range will boost up. But I want different.
TVMU^P[[IGIOQHG^JSH`A#@`RFJ\c^JPL>;"[,*/|+&WLEZGc`AFXc!L
%^]*IRXD#@GKCQ`R\^SF_WcHbORY87֦ʻ6ϣN8ȤBcRAV\Z^&SU~%CSWQ@#2
W_AD`EPABIKRDFVS)EVLQK)JKQUFK[M`UKs*$GwU#QDXBER@CBN%
R0~53%eYrd8mt^7Z6]iTF+(EWfJ9zaK-iTV.C\y<pjxsg-b$f4ia>
-----------------------------------------------
128 bit encrypted signature, crack if you can
|
|
|
|
|
Aluminum or tin foil is for building hats[^].
The only proper way to keep people out of your wireless network is to use encryption.
Most routers/gateways today support WPA or WPA2 which is good enough for normal usage.
|
|
|
|
|
Wapping the antenna with foil to make an approximation of a parabolic dish (cantenna[^]) makes your signal more directional. ie you've got s much stringer signal and consequently greater range in the direction it's pointing and much less in any other direction. If you did this and aimed into the ground/sky you'd significantly reduce your power/range/speed in all horizontal directions. Removing/completely warping the antenna in foil would attenuate your signal in all directions.
If your router is compatible with them you could flash with the Tomato or DD-WRT firmwares which would give you control your transmission strength. What you can't do is to reduce your broadcast range without reducing your maximum speed; both of them are directly dependent on signal strength. Also, as long as you're using WPA2 encryption you've got nothing to worry about; you can't be hacked. If you're using WEP/idiot protection only (no SSID broadcast, MAC filtering); there's nothing you can do to stop someone from breaking into your network. WPA1 is currently inbetween, there's one known attack but it doesn't really let the attacker get in far enough to actually do anything other than earning "first WPA1 bragging rights".
Today's lesson is brought to you by the word "niggardly". Remember kids, don't attribute to racism what can be explained by Scandinavian language roots.
-- Robert Royall
|
|
|
|
|
dan neely wrote: Also, as long as you're using WPA2 encryption you've got nothing to worry about; you can't be hacked.
I'm using WPA 2 but I didn't forget an article where it was written that do not depend on this encryption. It can be cracked too. The way they told was just keep change the router UserName and Password and the Key. But that is BS. I want permanent solution. If there isnt any then I would like to use the wired router, at least better than fearing that someone is copying my data or sending bad mails using my net. Is that a bad idea ?
TVMU^P[[IGIOQHG^JSH`A#@`RFJ\c^JPL>;"[,*/|+&WLEZGc`AFXc!L
%^]*IRXD#@GKCQ`R\^SF_WcHbORY87֦ʻ6ϣN8ȤBcRAV\Z^&SU~%CSWQ@#2
W_AD`EPABIKRDFVS)EVLQK)JKQUFK[M`UKs*$GwU#QDXBER@CBN%
R0~53%eYrd8mt^7Z6]iTF+(EWfJ9zaK-iTV.C\y<pjxsg-b$f4ia>
-----------------------------------------------
128 bit encrypted signature, crack if you can
|
|
|
|
|
If you're paranoid enough not to trust an encryption scheme that's never been broken (excepting possible idiot password choices) then just throw your router and modem out and keep your PC's off the internet entirely. You're at far greater risk of being hacked over the internet while using a wired network.
Today's lesson is brought to you by the word "niggardly". Remember kids, don't attribute to racism what can be explained by Scandinavian language roots.
-- Robert Royall
|
|
|
|
|
I call BS. WPA2 has not been cracked. The only known WPA1 exploit won't actually let the attacker do anything useful. Having an attacker enter your WPA2 network because he guessed that you used "password" (or anything else from the idiot list) as your PW doesn't count as breaking the system. If you use something like: "!uWP$2$dtib!apn!ltwptwifp" you're safe.
PS the "good" password is an encrypted message to you.
Today's lesson is brought to you by the word "niggardly". Remember kids, don't attribute to racism what can be explained by Scandinavian language roots.
-- Robert Royall
|
|
|
|
|
dan neely wrote: WPA2 has not been cracked.
oh really...click me[^]
dan neely wrote: If you use something like: "!uWP$2$dtib!apn!ltwptwifp" you're safe.
I'm using more wierd than this one
TVMU^P[[IGIOQHG^JSH`A#@`RFJ\c^JPL>;"[,*/|+&WLEZGc`AFXc!L
%^]*IRXD#@GKCQ`R\^SF_WcHbORY87֦ʻ6ϣN8ȤBcRAV\Z^&SU~%CSWQ@#2
W_AD`EPABIKRDFVS)EVLQK)JKQUFK[M`UKs*$GwU#QDXBER@CBN%
R0~53%eYrd8mt^7Z6]iTF+(EWfJ9zaK-iTV.C\y<pjxsg-b$f4ia>
-----------------------------------------------
128 bit encrypted signature, crack if you can
|
|
|
|
|
Reducing the range is not a solution; that will badly affect the performance. A good solution is to encrypt the messages, but the stronger the encryption, the more the performance will suffer; it takes many CPU cycles to encrypt/decrypt the packets. A better solution it to filter out unwanted users by using MAC filtering. I know a MAC can be spoofed, but it's rare, and few people know how to do it.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
|
|
|
|