This is me venting Community Center Meta DaniWeb by Dani This is definitely not a targeted attack at *anyone*. Please take it just as me having a … Re: This is me venting Community Center Meta DaniWeb by Reverend Jim It's hard for me to imagine that all of the pleasure I've gotten out of Daniweb, the challenges, the insights, the friendships since I joined in 2010, are all dependent on the largesse of just one very talented person. I, for one, appreciate all you have done, particularly considering your current health issues. If you feel unappreciated then … Re: This is me venting Community Center Meta DaniWeb by Reverend Jim Also, in non-computing over the years I have heard comments like "if only I hadn't stopped for coffee I would have missed that accident, or several other variations. The thing is you never know what would have happened if you had made different decisions. Certainly making a different decision may have resulted in things being better. Or they … Re: This is me venting Community Center Meta DaniWeb by jkon Dani , yes I also believe that you are responsible for the decline of DaniWeb .... BUUUT that was many years ago. We all foreseen the decline of "forums" back in early 2010's , there were many alternatives of what to do , and I strongly believe that you choose the wrong one. I will not repeat what you did or what you could be done … Re: This is me venting Community Center Meta DaniWeb by Dani > what was missing was a programming hub of news / forum / interviews I have always been a strong proponent of having editorial (news, tutorials, interviews, etc.) complement the user-generated forum discussions. In the past, well over 50% of our gross revenue from advertising went straight into paying for staff writers. IMHO we used to have … Re: Online subission forms not sending emails of submitted info Programming Web Development by Dani …. You are leaving yourself wide open to an HTML injection attack. Not only that, but you're also leaving yourself open… Re: attack function not altering stats Programming Software Development by sfuo …d1, d2; attackPTR( &d1, &d2 ); //using pointer attack function cout << "d1: " << d1….getHealth() << endl; attackREF(d1, d2); //using reference attack function cout << "d1: " <<… } [/CODE] I put in both pointer and ref attack functions to show that they do the exact same thing… Re: attack function not altering stats Programming Software Development by PhysicsExpert … += 5;}; void setlvl(int level){ lvl = level; }; void attack(dragon*, dragon*); }; dragon::dragon(string str,int level) { name…lt; 0) { hp = 0; setout(true); } } void dragon::attack(dragon *d1, dragon *d2) { if(d1->getdef() <… = &d1; dragon *pd = &d2; pt->attack(pt, pd); cout << "onehp: " &… Re: attack function not altering stats Programming Software Development by PhysicsExpert The problem is that you copy pasted too much...in the attack function void dragon::setatk()...take a look. Attack never gets initialized. Also what if the att and def for two dragons are the same? Fix that as well. attack function not altering stats Programming Software Development by writerervin …. this is the code for the function. [CODE=c]void attack(dragon *d1, dragon *d2) { if(d1->getdef() < d2… Re: attack function not altering stats Programming Software Development by writerervin this is the code to alter the hp. [CODE]void dragon::changehp(int s) { if((hp + s) != hpmax) { hp += s; }else if(hp < 0) { hp = 0; setout(true); } }[/CODE] do you think it would be better to use reference in the attack function? Re: attack function not altering stats Programming Software Development by writerervin i see what your saying. i went back and fixed that. but its still not altering the hp of the dragon. also altered the attack function to show which dragon won, the calculations look right but there is still no change in the hp Attack of a " rdriv.sys" virus Hardware and Software Information Security by cheong101 … browsing the web today, my anti-virus software detected an attack of a " rdriv.sys" virus.It's in… Introducing the DDDoSA: Disguised DDoS Attack Hardware and Software Networking by happygeek …attacks-and-breaches/bitcoin-password-grab-disguised-as-ddos-attack----/d/d-id/1112919) the site was actually targeted…more adversaries just put together a multi faceted compostable attack and instead of having to have all this …standard, or panicked, practices to deal with the ongoing attack. Things such as disabling their IDS platform for example.… WARNING: Credit Card Hack Attack Hardware and Software Information Security by happygeek …researchers in question, have apparently tested the 'wedge' attack scenario against cards issued by most of the mainstream… description. As I understand it, the wedge attack involves attaching a circuit board with a chip/transmitter…that pin verified transactions are secure. Given this attack demonstrates a clear method of bypassing the pin system… Who is behind the Tor relay attack? Hardware and Software Networking by happygeek …org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack) which revealed that a group of relays had…to deanonymize users." The advisory states that the attack "involved modifying Tor protocol headers to do … regard to users of the TOR network. This attack involved manipulating TOR protocol messages to encode information about… Re: Introducing the DDDoSA: Disguised DDoS Attack Hardware and Software Networking by RikTelner …service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network … out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily…reference to CPU resource management. One common method of attack involves saturating the target machine with external communications requests… The 40 Gbps DDoS attack Hardware and Software Networking by happygeek …2001. Even at the lower end of the sustained attack scale, some 36 percent of survey respondents have …figures. And, of course, a 1 Gbps sustained DDoS attack is damaging enough. Danny McPherson, chief security officer for… Arbor Networks told us "The growth in attack size continues to significantly outpace the corresponding increase in… Re: Introducing the DDDoSA: Disguised DDoS Attack Hardware and Software Networking by robert02 Sir can you tell me how a ddos attack is done whats the thing behind it how does it happens Fighting a 25 million packets-per-second DDoS attack Hardware and Software Networking by happygeek …has been targeted by a botnet which launched a DDoS attack of unprecedented magnitude. According to Distributed Denial of Service…typically. Now consider that the volume of this DDoS attack using TCP SYN Floods and ICMP Floods reached 25… 'scrubbing' network centers. Sop warns that this massive attack in Asia could be "an early warning beacon … Chinese Mac attack aims weaponised files at Apple users. Meh! Hardware and Software macOS by happygeek An ongoing attack aimed at users of the Apple Mac platform is being ….jpg "align-right") The researchers suspect that the attack stems from the same anti-Tibetan, pro-Chinese, hacking group… how much of a threat this latest in the wild attack actually is though, considering that for a start any Mac… How to disable SIM-killing USSD PUK attack that has spread to all Androids Programming Mobile Development by happygeek …Samsung Galaxy S III that are vulnerable to this particular attack, or indeed just Samsung handsets at all as first …. According to several IT security researchers, a new USSD attack variant is out there which works on a huge number… are all vulnerable to this new variant USSD SIM PUK attack. At the moment, considering that very few Android devices… Goodwill attack confirmed; 868,000 credit cards could be compromised Digital Media Digital Marketing by happygeek …breached. This follows a previous announcement of a potential attack back in July. After an extensive forensic investigation …and an estimated 868,000 payment cards compromised. The attack took place between February 10, 2013, and August 14… were not exposed to such a long period of attack. Details of those store locations that were impacted,… How can I prevent a XSS attack but allow user to post iframe and img Programming Web Development by woodenduck How can I prevent a XSS attack but allow user to post iframe and img? My page is php based but I allow users to submit text and have allowed only iframes and imgs with strip_tag How do I prevent a user from launching an xss attack? word document virus attack, i suspect Hardware and Software Microsoft Windows by gikonyo when i was saving my word document, it sudenly changed to some languge i cannot understand i guess it is chinese language. I suspect it could be virus attack. please help on how to recover my document back to english. Re: attack function not altering stats Programming Software Development by WaltP To change something you need an equal sign. Re: attack function not altering stats Programming Software Development by mike_2000_17 The only function that matters here is the changehp() function, and you didn't post it. Please do. Re: attack function not altering stats Programming Software Development by pseudorandom21 Any reason for passing by pointer instead of by reference? Re: attack function not altering stats Programming Software Development by PhysicsExpert Everything bigger than a wchar_t is usually passed by reference (Unless there is a good reason not to do so, but these are exceptions and as you didnt use it I presume you would not benefit from knowing any exceptions). Also please post the constructor. And also whats this: void sethpmax(){hpmax = [B]lvlhp[/B][lvl - 1];}; void setexpmax(){expmax … Re: attack function not altering stats Programming Software Development by sfuo [QUOTE]void sethpmax(){hpmax = lvlhp[lvl - 1];}; void setexpmax(){expmax = lvlexp[lvl - 1];}; Random arrays assigned to int? This should not even compile. [/QUOTE] This looks fine to me. Hes assigning the units health to whatever is at lvlhp[lvl-1] is. So if the guy is level 5 it would be lvlhp[5-1] or lvlhp[4]. That makes perfect sense.