|
The HP P2015 Laserjet is a trooper. As a professional computer support cat, I can truly attest to this. We and many businesses we support lean on them daily and beat the livin crap out of them. They have usb and Ethernet connectivity. It as old fashioned as a good old Laserjet 4 but smaller and much faster.
|
|
|
|
|
I agree 100% with this. We've got a small fleet of them that are used where we can't justify a MFD. They work in a shopfloor environment, being hammered every day for 4+ years now and we haven't had to replace or repair one of them. Easy to set up, networkable and reasonable on consumables too.
Andy B
|
|
|
|
|
I've been very happy with my DCP-L2540DW[^]. I imagine their "just a printer" models are also good. They're pretty much on perpetual sale at Best Buy and other places as well.
TTFN - Kent
|
|
|
|
|
Make sure that it works with Windows 10 (or whatever your current OS of choice is). I bought a terrific laser printer a few years ago for a few dollars and found that it worked with all versions of Windows up to Windows XP. My system at the time was Vista.
I'm retired. There's a nap for that...
- Harvey
|
|
|
|
|
|
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
I'very had very good luck with Brother products. I bought their Ethernet-connected CN-4030 colour laser printer a few years back, and it's working very nicely. My father has a 20-year-old Brother laser printer which is also still working.
As someone mentioned, check whether drivers are available for Win7/Win10. You may also want to buy an Ethernet-to-USB plug, so you can network the printer.
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
I'd recommend anything from the old HP 4000 series. If you do the maintenance required (It'll tell you), it just keeps going.
|
|
|
|
|
Has any of the wax printers for home use survived in the market?
At work, we leased a huge, high capacity Xerox copier / scanner / printer / ... using wax technology, giving beautiful photo output. Our capacity requirements dropped ("the paperless office", you know) so it was replaced with another model, a third the size of the old one, although still a floor model. This new one has crappy colors, greens in particular.
I have been in for a new printer for a long time, and was almost decided to go for wax technology ... until the printer at work was replaced. Now I have seen really great as well as really crappy colors from wax printers (and note that they are both from Xerox - you can't draw any conclusions from brand name alone).
If anyone has experience with personal wax printers, would you care to stand up?
|
|
|
|
|
C-P-User-3 wrote: It requires a USB cable; maybe I would live with that for the price.
Add another few dozen bucks and make it ethernet-capable:
A Rasp Pi Print Server » Raspberry Pi Geek[^]
For this, of course, the printer needs to support GhostScript or the like.
I only have a signature in order to let @DalekDave follow my posts.
|
|
|
|
|
I bought a color laser printer (HP LaserJet CP1025) for $100 years ago. At that price, I wouldn't bother with a refurb.
I don't print much, so I'm still on the original set of cartridges, and it still prints just fine. But I'll never go inkjet ever again, as the lesson I learned the hard way is that unused inkjet cartridges will simply dry up. Not so with a laser's toner.
|
|
|
|
|
I have to admit, for a small office, ink jets work just fine. I currently use an Epson WorkForce ET-4550 EcoTank All-in-One Printer. It easily handles all of the ranch paperwork, including printing, copying and faxing, plus my three college students' paperwork. A bottle of black ink (Yes, you have to pour the ink into the tank. ) lasts us eight or nine months.
We used to use Hewlett-Packard printers, but our workload was a little too demanding with three college students, causing the plastic gears to wear out. Also, the ink cartridges only lasted a month or so.
Before you flame me for my criticism of HP, saying I should have bought heavier duty models, realize that for philosophical reasons, we source our supplies and equipment locally. We each support our neighbors' businesses. Getting something which our neighborhood store does not stock means a "$$pecial order" and no bargaining room.
__________________
Lord, grant me the serenity to accept that there are some things I just can’t keep up with, the determination to keep up with the things I must keep up with, and the wisdom to find a good RSS feed from someone who keeps up with what I’d like to, but just don’t have the damn bandwidth to handle right now.
© 2009, Rex Hammock
|
|
|
|
|
In the latest boxing round with the mother of my children, she has accused me of accessing her phone remotely, and reported me to the police.
Details are sketchy as I've only had her and a friend shouting abuse at me down the phone about it, but apparently I accessed her messages, her health data app and videos and pics.
I was actually cooking lasagne at the time and my current girlfriend is a witness to this. But my question is, is this even possible?trying to work out if it's a blatant lie or someone did and it's a case of mistaken identity. Don't want to google it for obvious reasons!
|
|
|
|
|
Everything is hackable. Just saying.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
Yeah but easily? If I gave you my phone number and you had knowledge of email passwords I used 2 years ago, could you gain full access to my phone?
|
|
|
|
|
Pom Pey wrote: If I gave you my phone number and you had knowledge of email passwords I used 2 years ago, could you gain full access to my phone? Possibly, but I don't know anything about iPhone. I was just answering your question, a little too literally, apparently.
And sorry about the ex-wife stuff. That can be a pain.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
Not directly...
If the iPhone has been configured for it - it's location can be tracked.
If the iPhone is configured to upload videos and photos to iCloud (or some other cloud storage system) they can be accessed on another device provided the name / password in known.
If the iPhone is using iMessage this can be accessed by another device (iPhone, iPad, iPod or Mac) that is logged into the same account.
No idea about the health data stuff.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
Thanks. Roughly what I thought.
|
|
|
|
|
Your question matches just in time. Yesterday I recognized an unsecured WLan in my neiborhood, showing the router's providor
Ok, Google for the router Default user/pwd... and yes it works
Now I see there are three Units connected
1. a Windows phone
2. a Android
3. a PC
How should I go Forward to get some detailed Information?
It is not a joke, but I can feel with the "owners" of the Connection if you are not edjucated in this field!
Only to say: We should be allowed here at CP to discuss about "hacking". Knowledge is the only way for defense....
... because same can happen to me on an other Level...
modified 19-Jan-21 21:04pm.
|
|
|
|
|
0x01AA wrote: Only to say: We should be allowed here at CP to discuss about "hacking". Knowledge is the only way for defense.... It is allowed to discuss about it.
It is not allowed to explicitelly ask for or to show how to do it.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Nelek wrote: to show how to do it. Except for sql injection.
There are two kinds of people in the world: those who can extrapolate from incomplete data.
There are only 10 types of people in the world, those who understand binary and those who don't.
|
|
|
|
|
mandatory[^]
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: It is allowed to discuss about it.
My experience here is: No it is not!
Quote: It is not allowed to explicitelly ask for or to show how to do it.
Q/A will be downvoted/removed if not exactly enough. How you will get some knowledge without explicitelly discuss about it?
[Edit]
If we can discuss this open and this includes also how to attack we can also discuss about how to defend!
Statements like "this is dangerous" Looks like "we don't know" anything about it! And this "we don't know anything/not really much" is I think the truth.
Why should we leave this field to the opponents?
...when copy paste here on CP still not works
modified 19-Jan-21 21:04pm.
|
|
|
|
|
In the latest boxing round with the mother of my children, she has accused me of accessing her phone remotely, and reported me to the police.
I completely sympathize with you, as this is something my ex would do as well. What the police could do is all going to depend on custody, but not placement; as well as the ages involved
Details are sketchy as I've only had her and a friend shouting abuse at me down the phone about it, but apparently I accessed her messages, her health data app and videos and pics.
I was actually cooking lasagne at the time and my current girlfriend is a witness to this. But my question is, is this even possible?trying to work out if it's a blatant lie or someone did and it's a case of mistaken identity. Don't want to google it for obvious reasons!
I suppose if you had access to her iTunes/iCloud account you could access the cloud saved data, and possibly lock/secure the phone.
FitBit, Facebook, and that would be separate accounts; however they could use the same credentials.
Director of Transmogrification Services
Shinobi of Query Language
Master of Yoda Conditional
|
|
|
|
|
I wonder if she has the iCloud enabled and maybe she or child did something on her macbook then it changed the phone. Someone at work enbled Parental controls and it changed all of his iDevices because iCloud syncs everything, so it seems.
|
|
|
|