Jump to content
View in the app

A better way to browse. Learn more.

300ZX Owners Club

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

AndyP

Standard Member
  • Joined

  • Last visited

Everything posted by AndyP

  1. Point your browser to the internal router address. It's usually 192.168.1.1 or 192.168.0.1 If that doesn't work then open a Dos window on the computer, eg by Run CMD and the type ipconfig Look for the line which shows the default gateway and that will be the internal IP address of your router.
  2. AndyP replied to lisaf's topic in Events - UK
    Thinking about it ...
  3. It's 50/50 whether I'm here at weekends, so who knows ....
  4. Check the connection for the yellow one. Temp would normally be about 84 deg C, 70 is low. Maybe it'd not warmed up yet ?
  5. Standard GPS alone isn't accurate enough to do this properly. Remember that it's only accurate to within 3-5 metres.
  6. Yep, basic flow control.
  7. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cyber Security Tip ST05-003 Securing Wireless Networks Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information. How do wireless networks work? As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you can access the network from anywhere that is within that wireless area. Wireless networks rely on radio waves rather than wires to connect computers to the internet. A transmitter, known as a wireless access point or gateway, is wired into an internet connection. This provides a "hotspot" that transmits the connectivity over radio waves. Hotspots have identifying information, including an item called an SSID (service set identifier), that allow computers to locate them. Computers that have a wireless card and have permission to access the wireless frequency can take advantage of the network connection. Some computers may automatically identify open wireless networks in a given area, while others may require that you locate and manually enter information such as the SSID. What security threats are associated with wireless networks? Because wireless networks do not require a wire between a computer and the internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection. A practice known as wardriving involves individuals equipped with a computer, a wireless card, and a GPS device driving through areas in search of wireless networks and identifying the specific coordinates of a network location. This information is then usually posted online. Some individuals who participate in or take advantage of wardriving have malicious intent and could use this information to hijack your home wireless network or intercept the connection between your computer and a particular hotspot. What can you do to minimize the risks to your wireless network? * Change default passwords - Most network devices, including wireless access points, are pre-configured with default administrator passwords to simplify setup. These default passwords are easily found online, so they don't provide any protection. Changing default passwords makes it harder for attackers to take control of the device (see Choosing and Protecting Passwords for more information). * Restrict access - Only allow authorized users to access your network. Each piece of hardware connected to a network has a MAC (media access control) address. You can restrict or allow access to your network by filtering MAC addresses. Consult your user documentation to get specific information about enabling these features. There are also several technologies available that require wireless users to authenticate before accessing the network. * Encrypt the data on your network - WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) both encrypt information on wireless devices. However, WEP has a number of security issues that make it less effective than WPA, so you should specifically look for gear that supports encryption via WPA. Encrypting the data would prevent anyone who might be able to access your network from viewing your data (see Understanding Encryption for more information). * Protect your SSID - To avoid outsiders easily accessing your network, avoid publicizing your SSID. Consult your user documentation to see if you can change the default SSID to make it more difficult to guess. * Install a firewall - While it is a good security practice to install a firewall on your network, you should also install a firewall directly on your wireless devices (a host-based firewall). Attackers who can directly tap into your wireless network may be able to circumvent your network firewall--a host-based firewall will add a layer of protection to the data on your computer (see Understanding Firewalls for more information). * Maintain anti-virus software - You can reduce the damage attackers may be able to inflict on your network and wireless computer by installing anti-virus software and keeping your virus definitions up to date (see Understanding Anti-Virus Software for more information). Many of these programs also have additional features that may protect against or detect spyware and Trojan horses (see Recognizing and Avoiding Spyware and Why is Cyber Security a Problem? for more information). _________________________________________________________________ Authors: Mindi McDowell, Allen Householder, Matt Lytle _________________________________________________________________ Produced 2005 by US-CERT, a government organization. Note: This tip was previously published and is being re-distributed to increase awareness. Terms of use This document can also be found at For instructions on subscribing to or unsubscribing from this mailing list, visit . -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR6oM7vRFkHkM87XOAQJuzAf/ZCSOGQFDv2OTLxbsMBuS4wEZb0yLTMkq 5OqjObGHFD/8LJBnNfB2QgGRXEB5AjH9OHeeyCn7Ys8BqpDQf0O8E3hMK0bOKXEa 2ULAy+uYeW1TQFoiSuvgf1SOmYIW36p8qYtKQHTSKxAdpg14X3F1VLHCcEwVPLLV ISIYtY8GY1Nhn84j18SpjpEm9pXhdOg0i3unRs6n2TuRliQvCJccYY919gANksOk w+EXsUhsq/V6kGMTRCZgzrLh/k7KI9SRnmQloANV1NA5yB0SosqbPeFS+0Q3JQgO 3xgoUqcTaDg6+48N8oe+1JCdgNv/x0qQtA1aNKg+PxJbagOJrlKd+g== =wENE -----END PGP SIGNATURE-----
  8. It's a gland problem and generally the gland located just below the nose !
  9. Not sure but that would be a Capital Gains Tax I suspect. Anyway, like was said, you just get the best tax advisor and he'd sort it out. I know someone who works in this area and he is one of those people who is able to ensure that people who get £20-30M bonuses only pay 4-10% tax. Sadly he isn't one of the people who gets those bonuses ...
  10. Yes, you do. IIRC you are only allowed to give away £6K per year without tax getting paid somewhere.
  11. Me too and I'd change a few other peoples lives as well. Like paying off their mortgages etc and stuff like that.
  12. I expect it'll be a one day only jobbie for me, probably whichever one the weather looks best and when I fit it around other commitments.
  13. It's the distance between the caliper bolt holes. Search my posts, I have posted the pics a couple of times - it'll be very obvious then.
  14. Yes, but you need to cut off the dust shields (or wherever they're supposed to be) and modify the hub to mount the wider caliper mounting points.
  15. That is a very serious looking car !
  16. I like Buffalo routers, easy to set-up reliable and easy to flash to DD-WRT when you want more sophisticated s/w. However, I doubt whether it's your router that's slowing the connection, far more likely to be line problems. Log on to it and check the error codes etc to see if it's trying to tell you anything.
  17. From memory I think you need a 20K resistor, but if you search for "speedo resistor" I'm sure you'll find a few results.
  18. As far as I know the prop is balanced off the car, so the best you can hope for is putting it back in the same position as before, where hopefully it was OK. You could undo the bolts and move it a 1/4 turn at a time until you find a point that is good (or at least better). Is your centre bearing support in good condition ?
  19. Yes, they would definitely be an MOT failure. As long as the windscreen has some good curvature then they will be great, not sure about the Z though - it's quite flat.
  20. I just bought some of these for my beamer an they don't fit right. Basically they have a stronger curve to the blade than the springforce of the wiper arm can straighten. Result is that on the flat section of the screen (ie right smack in the middle), the blade doesn't touch the screen. Sending them back tomorrow.
  21. Received and updated. Thanks.
  22. You need to chemically neutralise it. There are loads of products out there that claim to do this but I can't say any of the ones I've tried in the past have really worked.
  23. I just searched on Google and there are heaps of places that sell those wheels. I'm sure they will sell them individually, that's what must happen when someone damages one.

Important Information

Terms of Use

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.