Welcome to the Power Users community on Codidact!
Power Users is a Q&A site for questions about the usage of computer software and hardware. We are still a small site and would like to grow, so please consider joining our community. We are looking forward to your questions and answers; they are the building blocks of a repository of knowledge we are building together.
Activity for Canina
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Answer | — |
A: Best practices for small, internet-critical company's ISP for maximal uptime > [Comcast] said normally small businesses get a plan from a second internet provider, for example AT&T, to reduce the chances of the internet going down. I am wondering if that is actually the best solution, or if it is an inefficient use of money. The typical solution to a situation where you ca... (more) |
— | 2 months ago |
Answer | — |
A: How to create a dump of a complete MariaDB how the data is at a single point in time? I don't have a ready answer to the question in the title, but with regards to > The plan was to disable the MariaDB service so that no new writes to the database can be made (that have a risk of not being included in the dump). This can be achieved without preventing access to the database engi... (more) |
— | 6 months ago |
Answer | — |
A: What does this suspicious URL structure do? I think to some extent, you actually answered your own question, possibly without realizing it. A URL is a specialization of a URI. (Or more technically accurate, a URI is a generalization of a URL.) URIs are required to specify a scheme (`https`, `mailto`, `gopher`, `tel`, ...) but they aren't ne... (more) |
— | 6 months ago |
Question | — |
How to add a file to a >5GB bootable UDF ISO? I have a moderately large ISO image (>5 GB)[^1] to which I want to add a single file[^2], and I want to do that on Linux (preferably using only software which is available in Debian's main and contrib sections). I also need to do so without breaking the bootability of the image. After a lot of web... (more) |
— | 7 months ago |
Answer | — |
A: Determine encoding of text Determining the encoding of binary data representing text is a notoriously difficult problem, which basically comes down to probabilities. UTF-8 is one of the few exceptions that I know of, because even absent a byte order mark or out-of-band metadata about the character set and encoding, UTF-8 ha... (more) |
— | 8 months ago |
Answer | — |
A: Adding option to pandoc call from RStudio I assumed that RStudio would get the path from somewhere, rather than it being hardcoded, and based on the response in a comment thread, that somewhere is `RSTUDIOPANDOC` in `.Rprofile`. So you should be able to adjust the path there, to point RStudio at a wrapper script that adds the parameter yo... (more) |
— | over 1 year ago |
Answer | — |
A: Setting a cookie with a userscript Unfortunately, it doesn't look like Greasemonkey will let you do this, at least not directly. Per GreaseSpot's description of `@run-at document-start`, that value maps to when `document.readyState == 'loading'`. Per MDN, this maps to that "the `document` is still loading". As far as I can tell ... (more) |
— | over 1 year ago |
Answer | — |
A: reduce gzip archive size if files are similar That Wikipedia quote is correct, yet somewhat wrong or at the very least misleading. A key term to understand is the window size (sometimes called the block size) of a data compression flow. By necessity, every compression algorithm works on chunks of data. These chunks of data can be large or ... (more) |
— | almost 2 years ago |
Answer | — |
A: Camera USB device in file explorer - why so slow? I suspect that the camera is presenting itself as a USB PTP or MTP device. The fact that it is identified as a camera and not as a storage device certainly points in this direction. A quick check of the user's guide available online for the EOS 2000D did not reveal any obvious way to turn MTP supp... (more) |
— | over 2 years ago |
Answer | — |
A: Is a local Apache a local web server? Well, it really depends on what you mean by a "web" server. If you mean a piece of software that implements the protocols typically used for (the server aspects of) web browsing, such as HTTP, TLS, OCSP, and so on, then what's important is what the software does, not whether or not it is accessibl... (more) |
— | over 2 years ago |
Answer | — |
A: How can I get my browser to block a specific SVG (Discord server icon)? You don't show enough of the document structure in the question to provide a fully fleshed-out example, but since it appears that you're now able to block based on CSS selectors and simply need help figuring out what CSS selector you should use... CSS supports both attribute substring matching and... (more) |
— | over 2 years ago |
Answer | — |
A: How would you feel about a merger with Linux Systems? I'm posting the same answer on both sites, because the questions are basically the same. Personally, I am in favor of merging Linux Systems Codidact and Power Users Codidact, ideally by transferring the content from Linux Systems to Power Users. The scope of Linux Systems is pretty close to a s... (more) |
— | over 2 years ago |
Question | — |
What should our take be on software recommendation questions? Questions that specifically seek software recommendations (as opposed to asking how to accomplish a specified task) come with their own challenges that are to some extent different from those of other questions. The scope of the site, as it stands, is: > Power Users is a community where compute... (more) |
— | over 2 years ago |
Answer | — |
A: Moved to a new OS version, didn't change project source, and now Datenstrom Yellow project won't build -- how do I debug this? Based on Datenstrom - Troubleshooting, it looks like to turn on debugging, you need to edit `system/extensions/core.php` such that it says <?php define("DEBUG", 1); (The `<?php` may or may not be on the same line as the `define` directive; that's inconsequential here, but make sure to not i... (more) |
— | over 2 years ago |
Answer | — |
A: Connection closed by remote host in Putty with hosting provider says that the problem is not on their side Fault isolation You need to take some basic steps to isolate where the problem actually lies. So far, it seems that you have tried with: one means of connecting to the Internet (presumably your cell phone carrier's data plan) one ISP (presumably your cell phone carrier) one host (you... (more) |
— | over 2 years ago |
Answer | — |
A: Remapping backspace with Karabiner Elements It does look like you have a syntax error in the JSON data. Specifically, you have a comma after the last element of a list on line 11: "from": { "keycode": "deleteorbackspace", parse error: Expected another key-value pair at line 11, column 11 (In the `jq` query syntax, a bare `... (more) |
— | over 2 years ago |
Question | — |
What's the pattern for how on/off sliders work? Okay, this is driving me nuts with modern UIs. Back in the old days, it was easy: Checkboxes were either checked, crossed, starred, filled in, or whatever glyph the particular environment used for the purpose, indicating that whatever was described by the label was on, true, active, selected, ...;... (more) |
— | over 2 years ago |
Answer | — |
A: Application check for updates will never succeed and blocks launch; can I intercept or bypass it? You certainly can use Wireshark to look for DNS traffic. First off, because of caching, I strongly recommend that you reboot the computer, and as quickly as possible start Wireshark, start monitoring network traffic, set up a Wireguard filter, and then start the application in question, while doin... (more) |
— | over 2 years ago |
Answer | — |
A: A term that describes frontend redirects As already stated, of course it's possible to do a redirection in the front end by telling the browser to request a different URL. Using Javascript is one possible method (some companies apparently actually do that); using `` is another. With the Javascript approach, you can even have the client pick... (more) |
— | over 2 years ago |
Answer | — |
A: Why does my HTC Desire 610, running Android v4.4.2 and WiFi connected, falsely allege "your phone is up to date" and "no updates available"? Your phone appears to be telling the truth in stating that there are no updates available for it. Mapping that fact to a statement that "your phone is up to date" in the message title is perhaps unfortunate, but doesn't change the fact that no updates are available and that the phone is plainly te... (more) |
— | over 2 years ago |
Answer | — |
A: Data transfer between computer system ports, as unidirectional or bidirectional > is it common to set firewall rules for ports to transfer data in only one direction (only inwards with incoming data or only outwards with outgoing data)? No. At least not strictly as stated. There is a very simple reason for this: TCP (which is used for much traffic on the Internet, and w... (more) |
— | almost 3 years ago |
Answer | — |
A: How to stop all automatic Windows Update restarts on a Windows 10 Pro machine? You can pause updates for a while, which should be good enough for your use case. The following looks like it'll work on at least Windows 10 21H1 Pro. Go into Settings -> Windows Update, and select Pause updates for [X] days. When the task is complete, it's probably a good idea to manually go b... (more) |
— | almost 3 years ago |
Question | — |
Should we use more specific version tags for software? Some questions, like my own In Windows 10 21H1, how do I remove the weather report in the task bar?, are specific to a given version of a product. Other questions are more generic, or apply to products that don't have version numbers per se (web applications would likely be a major such category). In... (more) |
— | almost 3 years ago |
Question | — |
In Windows 10 21H1, how do I remove the weather report in the task bar? Windows 10 version 21H1 added a weather report to the task bar, next to the system tray area. Since I can just look out the window instead and get accurate, up-to-the-second weather information, I am completely uninterested in this useless-to-me waste of screen real estate. However, I can't seem t... (more) |
— | almost 3 years ago |
Answer | — |
A: What actions should be performed to restore a website after a DDoS attack? A typical DDoS (Distributed Denial of Service; which is a subtype of the broader class of Denial of Service attacks) will simply flood a host, or its network connection, with data. It's not uncommon for the data to be completely meaningless, and for it to never even reach web server software if indee... (more) |
— | almost 3 years ago |