Jump to content

Nuttycomputer

+Premium Members
  • Posts

    20
  • Joined

  • Last visited

Everything posted by Nuttycomputer

  1. Hi, This used to be a fairly easy thing to do as I remember having done it before. I would like to purchase a Premium Membership for a friend as a gift. Before you would go through the membership process then put in the account you would like updated. This appears to no longer be the case. Now you need to log into the Username to purchase the membership for. Obviously I don't want to go asking my friend for his password. Not only will he rightfully not give it to me if I told him why it would spoil the suprise. Is there still a way to do this???
  2. This works for the Tom Tom on Palm but I'm using the TomTom 910 which is an independant unit. I believe for POI's it uses cab files.
  3. Hey guys I used to have a Garmin Streetpilot in which you could load POI directly into the Streetpilot with the gpx format. Does anyone know if you can do the same thing with the TomTom Go 910? If So How?
  4. Thanks for the Work around! However the multi's don't work. Theyshow up as "X"s
  5. I like the idea..... but to make it even geeker If you set up a seperate computer (doesn't have to be fancy, even a small low end system would work) to your wireless network theres some networking tools that allow people to leave messages. "NetSend" and "WinPopup" are two that come with most computers. Netsend does not work with Windows 95/98 though... recieving wise. Also doing a search there are a few free commercial software programs that you can download that set's it up specifically for recieving/sending. Most of these should be Netsend, WinPopup compatible so you don't need to purchase them in order to hunt the cache. *Note: Other than Netsend I havn't tried experimenting with any of these as my network consists of 3 computers... 2 of which are right next to eachother Also most only work if your connected to the same workgroup so this would have to be published on the cache page. As being with the same workgroup experienced crackers could probably do some damage I recommend not using a computer with any files you would want to keep. This would be an effective log as they would have to be connected and know how to send a message. Adding to the "Geekiness"
  6. I would be all for the Thumbdrive TB, as long as it makes it's way here And as for the PC vs Mac thing.... Well I'm a PC man myself, howver where I work we use macs for everything. I don't ever believe the "They don't lock up story" I swear I've had those Mac's quite/crash/lock-up on me more than I've ever had my PC do. As for viruses... the only reason Mac's don't get as many as PC's is the fact that they are designed for large scale. Design a virus for macs and you get a smaller percentage of people vs. PC's And yes... my PC decision does rely heavily on gaming. It's what I do, and with consoles... they upgrade their games.... you have to buy their new console. Computer games upgrade... download the updated software or buy just a new video card... easier and cheaper.
  7. Ganlet: Not a bad idea either. I was thinking right after I posted this that integrity comes into play for those FTF's Going on the original concept, in order to really confirm a FTF, since with text someone could just delete it and e-mail doesn't mean the FTF hasn't logged it yet, create a third "FTF" text file with a number, passphrase etc. That could then be deleted by the FTF'er I'm liking these ideas guys, since this is my main focus in school right now, and I have yet to do a multi-cache. I think it would be awesome to create one encompassing all my hobbies.
  8. I would recommend a small SD Card (afterall your only using text files) and mention you need a reader in case your coming with a laptop. Better yet provide a reader at a close but different location, making it a nice little multicache. Everyone is suggesting elaborate confirmation techniques such as images and what not. May I suggest an easier and less files size technique. Go to your favorite free e-mail account and create an e-mail address using whatever. Suggesting perhaps the name of the geocache. Then... Create 2 text files, "Log" and "Cache Description" the first can be where people sign. The second can be used for description and to provide the "secret" address where people need to send their confirmations to. This allows you a simple method of comparing who, without complex images and someone perhaps forgetting to delete. Also if someone obtains the e-mail from another cacher periodically check the "Log" text file for a double check. I really like the idea of this one, I don't know where you live. However, now I have an inclination to hide one of these myself... perhaps by a CyberCafe.... or computer store.
  9. I came in contact with one that should have been in the main description... Especially since it was talking about safety concerns... What we need is a guidline and some rules that reviewers could possibly stop the cache for getting published.
  10. I would like something like this... although I understand the reason you would want to decrypt it in the field. My last few finds have all had useless hints that I've sat down and spent the time decoding.
  11. I just had a quick question, when you need a more specific hint for a cache you've been to quite a bit; Is it better to e-mail someone who barely logged it or the owner for a broader hint.
  12. Do they take even neighborhood caches. The reason I ask is if you had time you could always place one outside your residence grab a cup of coffee and sit. See if anyone takes it..... Or for the expensive option buy a tracking device.... Other than those two I don't know how you would actually go about seeing who takes them.
  13. Being a teen myself me and my sister are usually at eachothers necks. All I have to do is tell her I'll take her geocaching and she's nice for a day.... ah peaceful hour.
  14. I don't see a problem with this feature, with or without user permission. If someone really wanted to get logs from other users the easy way would to have the logs e-mailed via the watchlist. The hard way which achieves the same effect would be to search caches found by username, then go to the cache page and see their find logs. The only thing the hard way does not achieve is the ability to quickly find DNF logs or Notes which would be nice.
×
×
  • Create New...