It is never too late to be what you might have been.

― George Eliot

 Public FORUM  Ask Question             Skip Navigation Links
FROUM - Unanswered Questions
  # 1
General Life & Law

Kath Sze

I am the Legal wife but why do I feel that I am the other woman? Omg.... 
Reply
  # 2
Travel & Vacation

Kath Sze

Reply
  # 3
Travel & Vacation

Kath Sze

Reply
  # 4
Family & Relationships

Kath Sze


Reply
  # 5
Home & Garden

Bob Taylor

One of my neighbors just spent thousand dollars to fix his house because of termite intrusion. Actually, termite problem can be avoided if he know how to handle it properly in the beginning.

First, he saw that termites/ants lined up around his house for years but he just did not pay any attention to it. He never realizes that the little things would cause a disaster to his house later. Second, his roof got a small dripping when there is a rain. Again, he did not fix it. As a result, his leaking home becomes a perfect place for the termites.

As we know that termites love wet woods and wet places. They must live near the source of water. If the place is dry then unlikely it will attract the bugs. To dismantle termites is very easy in the beginning when we see the termites in first time. We just need to lay down several termites baits on the routes where they move in to the house. Those baits are really good to trap the termites/ ants. It can be purchased from home depot and any grocery stores. See the picture below. If my neighbor did that things before I believe that he would not get in such hateful situation. 




Reply
  # 6
Education & Learning

Terry Cohen

When shall we use named and called?

As I know, the world “called” is more popular than “named” in regular books. But, most programmers are preferring the world named than called because the called is often referred to a function call in programming world.

Eg. The person called David is my brother.  


The person named David is my brother.


The function named ABC123 is calling a method in a class.
Reply
  # 7
Media & News

Kevin Lee

Is it even a news? It is an open secret. Colleges prefer  rich kids and politicians’ kids. We heard these things many years ago. 

You guys just found it out recently? Oh Man.
Reply
  # 8
Travel & Vacation

Meriah Kalvin Linden

Aurora Station, the world’s first in-orbit hotel. You can spend 12 days in space. It will cost you 9.5m per person. That is almost 800k per day. :)

Maybe...,


You can call it - the rich man’a hotel. 
Reply
  # 9
Family & Relationships

Meriah Kalvin Linden

This slogan is impressive and touching. My old lady threw her gun in the trash can. LOL 
Reply
  # 10
Media & News

Kevin Lee

Mr Manafort is believed to be sentensed up to 19 years or longer on Thursday trial. He received millions of dollars from Ukrainian political consulting but he did not declare it as income. 
Reply
  # 11
IT & Computer & AI

Stefan SZE

Maximum request length exceeded exception

Error:

[HttpException (0x80004005): Maximum request length exceeded.]

   System.Web.HttpRequest.GetEntireRawContent() +11140903



solution:




Reply
  # 12
Media & News

News and Alerts

A Pennsylvania woman died at the Dominican resort complex with similar circumstances as Maryland couple. 
Reply
  # 13
IT & Computer & AI

News and Alerts

The windows 7 and all earlier versions are affected by “bluekeep” attack. 
Reply
  # 14
Media & News

Terry Cohen

Robert Mueller send a letter to William Barr and asked him to go back to school to study again because Barr has been failed his Professionalism - Mr Barr completely misinterpreted the report of Mr Mueller. LOL 
Reply
  # 15
Citizen Society & Culture

Stefan SZE

My mailbox was being bombed by spam mails for many years.  Now, Spam calls are bombing my cell after I get the iphone. Some of them are phishing calls. As I know I am not the only one who has this issue. It is a privacy  problem Likely for everyone .

According to the sources of newspapers, Americans got billions spam calls every year. What the hell! Seriously! It is billions !

Those cheaters/spammers are really abusing the phone network system. It must be stopped because it is like an invasion! :(

Questions: 

1. How do they get my phone number from?

2. Why do I get many junk calls after I get iPhone? 

3. Why are most spam calls from overseas India?

4. How does Apple / google protect my privacy? Do they really guard the databases?   

5. How can the government do to stop these abuses ?



Reply
  # 16
Home & Garden

Kevin Pifa SISCO

Termites need water. They love the wet woods. If you house has no leaking problem then the termites should not be there or any where that is dry. If your house is leaking then you should fix it as soon as possible. You really don’t want to wait for the last minute. 
Reply
  # 17
IT & Computer & AI

Kevin Pifa SISCO

These two Email Servers consume 20% of total CPU and at least 800MB memory. That sounds crazy insane.  It caused a lag issue on my computer. Have they ever seriously tested their Edge browser? Is it a memory leak?
Or , is it a page loading issue? I really don’t like that. 


Reply
  # 18
Citizen Society & Culture

John Green

Last month I heard of that a young student killed himeself because of school bullying. I was shocked. This week, we lost three more lives. I never thought schools could be such dangerous places nowadays. 

I always believe that we have a solution when we get a problem. But, in these kind of problems, it seems like we are just helpless. Does anyone care about them? Yes, of course they do. All they do is to put these news on the top pages for several days then they will totally forget about them soon. It repeats the same process again and again. 

If we ask lawmakers, they would say this is about the constitution and rights.

If we ask NRA, they would say we should buy more guns - what the hell!?

If we ask the politicians , they would say they are totally with you always, but .........and but......so and so.


So, these problems will never be solved. Sorry kids.


Reply
  # 19
IT & Computer & AI

Jimmy Browny

The https should be security for transport level protection over the network. Yes. It is. But,in some situations it could ignore the security protection on sub domains if some https providers have not considered the protection on sub domains or it has a flaw on network agreements. 

For instance, the “www.your_domain_name.com” is encrypted, but the “subdomain.your_domain_name.com” is not encrypted. 


Reply
  # 20
IT & Computer & AI

Stefan SZE

According to our network security analysis report, many mobile applications are less of privacy protection and security monitoring. 

We would suggest users to use [web browser] to access those services through their websites instead of downloading and installing the app itself. This is the only way of safty access. (Remember to remove cookies and history once awhile on the browser)


If you really need to install the app in your phone, make sure you read the privacy policies and service terms. The phone firewall will not help much on this issue. Some firewall companies may collect user privacy info too. If you don’t want to share your privacy, you must use internet browser for network communication. 





Reply

Page:  / 3