Posts
 
Reputation
Joined
Last Seen
0 Reputation Points
Unknown Quality Score

No one has voted on any posts yet. Votes from other community members are used to determine a member's reputation amongst their peers.

0 Endorsements
~8K People Reached
PC Specs
1 Mhz, 2Kb Ram, EGA display

13 Posted Topics

Member Avatar for Sphinx'LostNose

So, I've read Microsoft's documentation, and it ends up being a lot of words that don't explain anything. I've seen other places of people using DISM commands, but it doesn't explain what they do. I know DISM is used for working with images before deployment, but people are using it …

Member Avatar for rproffitt
0
422
Member Avatar for toxicandy

You can use a wireless bridge. You can get third party firmware for most old wireless routers (with built in 4 port switches) which will give them bridge capability. In this case, if you have an old wireless router sitting around, then you won't have to buy anything new. Here …

Member Avatar for CimmerianX
0
413
Member Avatar for Sphinx'LostNose

In Linux, what's the difference in a service and a daemon? I know a daemon is a long running process without a terminal, meant for servicing things such as requests from other processes or server type services such as a web server or dns server. I understand that you can …

Member Avatar for rch1231
0
4K
Member Avatar for Sphinx'LostNose

I am running PVST. If I have 2 switches connected to each other over access ports, but they are configured for different VLANs, how does PVST deal with it? [Switch 1] Port 1 Access Mode VLAN 10 [Switch 2] Port 1 Access Mode VLAN 20 I know the traffic leaving …

Member Avatar for CimmerianX
0
164
Member Avatar for Sphinx'LostNose

Normally you can do this and pass the reference type by reference and the new keyword won't make the variables point to different objects: static void Main(string[] args) { Object origObj = new Object(); ExampleMethod(ref origObj); } void ExampleMethod(ref Object newObj) { //origObj will also reference the newly created object …

Member Avatar for ddanbe
0
239
Member Avatar for Sphinx'LostNose

Can 2 identical IPs with different subnet masks be on the same LAN? I know you'd have to route to get between them, but is it acceptable to use the same set of IPs on 2 different subnets?

Member Avatar for master73
0
654
Member Avatar for Sphinx'LostNose

Can you use any compiler, assembler, etc to output code directly for the processor and not for an executable file specific to an OS? How do you determine if you are outputting for an executable for an OS or directly for a processor? Are the instructions/code part in an exe …

Member Avatar for rubberman
0
215
Member Avatar for Sphinx'LostNose

OK, this is specifically regarding Cisco Catalyst 2900s, 4500s, and 6500s. I've always matched my interface VLANs to my VLANs. Lets say I have VLAN 10 on a 2900, and all hosts on it have IP addresses on 192.168.10.0/24. I'd create a VLAN 10 on my 4500 and an Interface …

0
202
Member Avatar for Sphinx'LostNose

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …

Member Avatar for mike_2000_17
0
281
Member Avatar for Ray_2

ULong largest number is 18,446,744,073,709,551,615 Your next number is bigger 19,740,274,219,868,223,167

Member Avatar for Ray_2
0
178
Member Avatar for Sphinx'LostNose

How much of a source language's characteristics and ways of doing things is seen in a compiled executable? Let's say you use C++ and BASIC (compiled) to write 2 programs that functionally do the same thing. You compile them both on the same computer(and OS of course). How different will …

0
68
Member Avatar for Sphinx'LostNose

I am confused about Android user rights. A lot of times you have to root your phone to get access to do things, but some programs run on a non-rooted phone in a way that would seem they have root access. Examples would be AppLockers, Antivirus programs, and Safe Browsing …

Member Avatar for Greg_z
0
152
Member Avatar for Sphinx'LostNose

Hello, I'm having a hard time when thinking about methods that belong to objects. Most documentation tells us that objects contain the data and actions for the data. When running as program though, the methods seem like they are actions that belong to the program (get put on the stack …

Member Avatar for pritaeas
0
329

The End.