Wikipedia:Reference desk/Archives/Computing/2017 December 8
Computing desk | ||
---|---|---|
< December 7 | << Nov | December | Jan >> | December 9 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
December 8
[edit]how to delete files on my phone
[edit]It's a Samsung Galaxy S6. Today I received a message that I'm running out of space and that some apps might not run as a result. The message said 19 GB of my space was occupied by Pictures, and I decided to delete them all.
In the Samsung folder I found My Files, which showed six categories, including images. When I clicked that, I saw all the images but no way to delete them. There were options to edit, share, sort by, and settings.) When I clicked on one of the pictures, I got the message, "Unable to open Gallery. There is not enough storage space to open Gallery. Go to My Files, then delete some files."
I would love to. Can you help? Thanks, --Halcatalyst (talk) 00:07, 8 December 2017 (UTC)
- A Web search for "samsung galaxy delete file" looks promising. You can also delete (as well as copy to or from the device) files on the phone from a PC if you connect the phone to a PC with a USB cable. --47.157.122.192 (talk) 03:43, 8 December 2017 (UTC)
- Thank you. I found an excellent reference" [1] --Halcatalyst (talk) 15:37, 8 December 2017 (UTC)
VHDL is Sequential or Concurrent/Parallel?
[edit]If VHDL is a concurrent language, then how it handles conditional statements (like if, elsif, case) which proceeds sequentially? The confusion is that how can a concurrent language deal with sequential conditional statements? Sunnynitb (talk) 13:51, 8 December 2017 (UTC)
- VHDL captures both concepts. A process is a sequential operation, but a VHDL design can have multiple (often many) processes, which can operate concurrently. The language has various mechanisms, including process sensitivity and wait statements, which allow the designer to specify how otherwise concurrent operations can interact. -- Finlay McWalter··–·Talk 15:10, 8 December 2017 (UTC)
- If there is any material or link regarding this question, please give me. Thank You. Sunnynitb (talk) 18:19, 8 December 2017 (UTC)
Security question
[edit]I just attempted to visit http://www.allmusic.com/artist/reverend-jim-howie-mn0001168557 but was presented with a huge warning about a worm, and it autoplayed an audio file telling me to call so-and-so about the situation. (1) If you have a really solid antivirus/firewall/whatever, could you visit the page and help me understand what's going on? I'm guessing that it's somewhat of a hoax (warning! virus! call this Microsoft number which actually is our number, and we'll take over your computer, thank you very much), but I'm not clear. (2) AllMusic appears to be a major commercial site; unless someone hacks their databases, how is this possible? If it were user-generated, I'd guess that it's comparable to the GNAA attacks that we've sustained (e.g. Wikipedia:Administrators'_noticeboard/IncidentArchive960#Spam_/_"hack"_(loosest_sense)_edit_needs_followup), but our article doesn't make it sound like a usergenerated site. Nyttend backup (talk) 20:47, 8 December 2017 (UTC)
- For what it's worth, I see an entirely normal site with no scary warnings. -- Finlay McWalter··–·Talk 20:58, 8 December 2017 (UTC)
- Huh. I wonder if I've got something on my computer...I think I'll talk with our IT department about this computer. Nyttend backup (talk) 21:24, 8 December 2017 (UTC)
- You probably have malware on your computer. Allmusic isn't the problem. (((The Quixotic Potato))) (talk) 21:49, 8 December 2017 (UTC)
- Huh. I wonder if I've got something on my computer...I think I'll talk with our IT department about this computer. Nyttend backup (talk) 21:24, 8 December 2017 (UTC)
- https://transparencyreport.google.com/safe-browsing/search?url=allmusic.com It is the reference desk after all. (((The Quixotic Potato))) (talk) 22:41, 8 December 2017 (UTC)
...unless someone hacks their databases...
- mandatory XKCD. Defacing a website is easier than making arbitrary calls to the underlying database (when there is one), and even more so than editing the underlying database. TigraanClick here to contact me 12:41, 9 December 2017 (UTC)
- Didn't know that. "Takes down the website of the CIA" I would understand as being a DDOS or something of the sort, but aside from "merely" crashing a website, I didn't know that it was possible to affect the way that someone viewed it, unless you compromised their servers or you infected the computer being used to view the site. Nyttend backup (talk) 14:22, 9 December 2017 (UTC)
- Well, yeah, denial of service is also easier than getting write access to their web server, and that may well be the meaning of the XKCD. You are correct than (barring a compromise of the client's computer/browser) the attacker needs some ability to change the contents of the setup that displays the website, but that setup is exactly what is usually meant by "database". (Actually, there are network attacks, for instance hijacking the URL-website correspondance - see DNS spoofing, cybersquatting - or man-in-the-middle attacks to intercept and forge traffic between the client and the server; they do not involve write access to the servers)
- Still, the server that the client's browser communicates with is not always the only piece of the setup that is used to display webpages. See [2] for some examples of what can happen behind the front page. If you have a heap of data ("database") from which the reader of your webpage is allowed to read fragments, a proper setup is to have the web server allowed to make read requests to a database server that cannot be accessed directly from the internet (at least without a login). With such a setup, should the web server be compromised (which is more likely since it will listen to stuff that is sent to him via the internet), the attacker will only be able to make requests that are allowed by the database server - hence you have a better chance to avoid the database from been written to ("hacked"), or read in places that are not supposed to be read, than if it was stored on the same environment. TigraanClick here to contact me 12:33, 11 December 2017 (UTC)