-
Content Count
4,977 -
Joined
-
Last visited
Posts posted by Elmo
-
-
Je présume que c'est juste la structure ;-) .... Nice ;-) ...
-
Mes cours de soudure sont loin, mais chu vraiment pas sur que c'est possible de souder l'alu au torche !!!!
Mig minimum (Tu peux avoir du fil "Gasless", donc pas besoin de bombone), Tig c'est mieux, mais coute plus chère ....
Pis tout dépendant de l'épaisseur, ça peux être tricky .....
Une petite soudeuse au mig, c'est genre - de 200$ (120V, attend toit pas a faire 6 pied de soudure d'une traite ;-) ) ....
-
Tu serais mieux de souder, l'époxy devient éventuellement cassant, et les propriété change si c'est exposé au U.V .....
A la limite, riveté/coller peux faire du sens, mais si ta accès a une soudeuse au mig, c'est l'idéal (Et si tu connais un soudeur professionnel, c'est encore mieux ;-) )
J'ai monter des enclosure en tube carré d'alu pour les montant, avec des 90 degré (Demi tube carré si tu veux) , riveté comme du monde c'est solide, pas solide au point de supporter le poid d'une personne mais assez solide pour un PC ....
-
Upgrade Teamviewer 8 a 9 - 209$ .
-
2 Toner pour ma Brother MFC-7860DW chez Etoner.ca - 78$
-
Commande DX.com
Protective TPU + PC Case w/ Holder for LG Nexus 5 - Black + Orange
YSD-807 Electroplated Iron Multifunction Can / Bottle Opener - Black
High Elastic Anti-vibration Rubber Ball Dual-Head for Gimbal FPV PTZ - Black (10 PCS)
ZnDiy-BRY Mini-LED Sunflower Effect 8W 48-LED RGB Voice-Activated Stage Party Light (US Plug)
ENKAY Universal Anti-dust Plugs for Lenovo / HP / Dell / Acer / Asus Laptop - Black (13 PCS)
-
Commande Amazon.ca
-Big Mouth Toys The Prescription Coffee Mug
Ginger People Ginger beer,
Big Mouth Toys The Retro Ray Gun Rocket Mug
Petmate B000H72HD4 Pet Taxi Fashion Kennel, Intermediate (Wheat/Coffee Grounds Brown)
Big Mouth Toys Prescription / Pill Bottle Drink Kooler
SPIGEN Google Nexus 5 Case Slim [slim Armor] [infinity White] Air Cushioned Protective Case with Dual Layer for Nexus 5 - Infinity White -
Mais quand tu dit, que ta besoin de l'écran, faudrais donner les dimensions.... Pis un moment donner faut pas trop rêver, même un écran ben cheap c'est +- 1/5 de ton budget, c'est une grosse différence quand même ....
Moi a ta place je le travaillerais pour qui pense un peux plus a long terme, une machine complète, de qualité, a 500-600$, qui est moindrement valable, c'est pas évident, avec ou sans écran .... Moi la grosse majorité des machine que je fais monté, même pour faire de l'administration, c'est +- 1500$, 2 écran 24 pouce de qualité (Qui vont duré plus longtemp que la machine), carde video basic (Asus 210 Fanless de Nvidia pour le dual screen), I5, 16 go de ram, 1 TO, bon boitier (Généralement a +-100$), bon power supplie, UPS 1000Va (Cyberpower sont pas pire, pas chère, sinon APC, mais les bon sont chère), Windows 7 pro, clavier/sourie de moyenne qualité.
J'ai même entrer mes première machine "Basic" d'administration avec des SSD, avant c'étais juste mes "Monstre" a +- 3-4000$ (Majoritairement pour le dessin), qu'on en mettais, maintenant avec le prix du GO sur SSD, un petit 240 go et c'est une vrais mini bombe ;-) ....
-
Absolument, c'est un des bon soft Québecois, pour les tech .... Tout mes RDP de serveur/station sont dedans, j'ai même ajouter certaine connexion a Teamviewer (Genre serveur et compangie si le VPN fuck), et même Screenconnect (Que certain de mes client utilise), vraiment complet..... Je met même mes compte FTP, mes lien vers les interface web ( genre routeur, switch, etc etc), mes connexion SSH/Telnet .....
Vraiment un must si vous faite la gestion d'un parc informatique, particulièrement si y'é éclectique (Comme moi, puisque j'ai plusieurs clients) .
-
File Name: FixExec
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Système
Auteur : BleepingComputer
Site Web: http://www.bleepingcomputer.com/FixExec is a program that is designed to fix executable file associations for the .bat, .exe, and .com file extensions. If the program detects any of these associations are missing, changed, or hijacked, the settings will be set back to the original Windows defaults. When file associations for batch, executable, or COM files are changed it could cause your executables to no longer start. For example, when you double-click on a .bat, .exe, and .com file the programs will not start and Windows will ask what you would like to start the program with. FixExec is designed to resolve these issues by rebuilding the executable file association Windows Registry keys that have become damaged.
-
File Name: Farbar MiniToolbox
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Sécurité
Auteur : Farbar
Site Web: http://www.bleepingcomputer.com/download/minitoolbox/MiniToolBox detects Internet connection issues due to broken or hijacked LSP, proxy settings, and problems with network adapters. It can also be used to detecte search redirections and router hijackings.
The tool has some additional feature like flushing DNS cache, listing installed programs, listing devices in the Devices Manager, enumerating the last 10 Event Viewer errors, enumerating drives, and content of Hosts file.
-
File Name: PhotoRec
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Récupération
Auteur : Christophe GRENIER
Site Web: http://www.cgsecurity.org/PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory. PhotoRec ignores the file system and goes after the underlying data, so it will still work even if your media's file system has been severely damaged or reformatted.
-
File Name: TestDisk
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Récupération
Auteur : Christophe GRENIER
Site Web: http://www.cgsecurity.org/TestDisk is powerful free data recovery software! It was primarily designed to help recover lost partitions and/or make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting a Partition Table). Partition table recovery using TestDisk is really easy.
-
File Name: Driver Fusion
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Système
Auteur : Treexy
Site Web: http://treexy.com/Driver Fusion is the complete device and driver solution for your PC that can manage and monitor your devices and their drivers. You can uninstall, backup and restore drivers and also disable, enable and restart devices while Windows is running. With our cloud-powered removal engine you can delete the driver entries that are left behind by the normal uninstallers, which is especially useful when you are updating a driver or changing a device.
-
File Name: Secunia Personal Software Inspector
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Sécurité
Auteur : Secunia
Site Web: http://secunia.com/The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in non-Microsoft (third-party) programs which can leave your PC open to attacks.
-
File Name: The PC Decrapifier
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Système
Auteur : PC Decrapifier
Site Web: http://pcdecrapifier.com/Is your PC running slowly? Even brand new PCs often come with LOTS of pre-installed software that can cause that new machine to come to a crawl. Not to mention all of the annoying pop-ups! Others may have a PC that's a couple years old and we're the ones that installed a bunch of junk! It happens to the best of us. We try a bunch of programs over time and forget to remove them.
-
File Name: RogueKiller
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Sécurité
Auteur : Adlice Software
Site Web: http://www.adlice.com/RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …
Based on generic ways to find malwares by their behaviour (heuristics), on classic anti-malware analysis (signature finding) and onundocumented hacks, RogueKiller can find/remove most of the basic malwares (rogues, trojans, …) and some advanced threats like ZeroAccess or TDSS that behave more like rootkits.
-
File Name: WinDirStat
File Submitter: Elmo
File Submitted: 13 nov. 2013
File Category: Système
Auteur : WinDirStat
Site Web: http://windirstat.info/WinDirStat is a disk usage statistics viewer and cleanup tool for various versions of Microsoft Windows.
-
File Name: Malwarebytes Anti-Rootkit BETA
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Sécurité
Auteur : Malwarebytes
Site Web: http://www.malwarebytes.org/Malwarebytes Anti-Rootkit BETA is cutting edge technology for detecting and removing the nastiest malicious rootkits.
-
File Name: Shortcut Cleaner
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Sécurité
Auteur : BleepingComputer
Site Web: http://www.bleepingcomputer.comShortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software. When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs.
When run, Shortcut Cleaner will scan various locations on your computer for Windows shortcuts. When a shortcut is detected it will check properties for a possible hijacking. If one is detected, it will automatically clean the shortcut so that it no longer opens the offending program or web site. When the Shortcut Cleaner has finished scanning your hard drive it will create a log file on your desktop called sc-cleaner.txt and then display it. This log file will contains a list of all the shortcuts that were detected and cleaned.
-
File Name: Malwarebytes Anti-Exploit BETA
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Sécurité
Auteur : Malwarebytes
Site Web: http://www.malwarebytes.org/Feeling exploited? We have you covered.
Malwarebytes Anti-Exploit BETA protects you from zero-day exploits targeting browser and application vulnerabilities. Its proprietary technology protects you in that critical period between the release of a new exploit and its subsequent security patch. And, unlike antivirus products, Malwarebytes Anti-Exploit BETA proactively prevents the exploit from installing its payload. Before it can do damage.
-
File Name: Recuva
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Récupération
Auteur : Piriform
Site Web: http://www.piriform.com/Accidentally deleted an important file? Lost something important when your computer crashed? No problem! Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3 player. And it's free!
-
File Name: Junkware Removal Tool
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Sécurité
Auteur : thisisudax
Site Web: http://thisisudax.org/Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.
A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. This tool will help you remove these types of programs.
Junkware Removal Tool has the ability to remove the following types of programs:
Ask Toolbar
Babylon
Blekko
Claro / iSearch
Conduit
Crossrider
DealPly
Delta
Facemoods / Funmoods
Findgala
Globasearch
Hao123
iLivid
Iminent
IncrediBar
MocaFlix
MyPC Backup
MyWebSearch
PerformerSoft
Privitize
Qvo6
Searchqu
Snap Do
Swag Bucks
Wajam
Web Assistant
WhiteSmoke
Zugo
and many more…
-
File Name: TDSSKiller Rootkit Removal Utility
File Submitter: Elmo
File Submitted: 12 nov. 2013
File Category: Sécurité
Auteur : Kaspersky
Site Web: http://usa.kaspersky.com/Kaspersky Lab has developed the TDSSKiller utility for removing malicious rootkits.
A rootkit is a program or a program kit that hides the presence of malware in the system.
A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”).
petit preview d'un projet en cour ;)
in Tuning PC, DIY
Posted
Même au "Stick" c'est dur, donc ça m'aurais surpris ..... Donc Mig ou Tig .....