Posts
 
Reputation
Joined
Last Seen
0 Reputation Points
Unknown Quality Score

No one has voted on any posts yet. Votes from other community members are used to determine a member's reputation amongst their peers.

0 Endorsements
~8K People Reached
PC Specs
1 Mhz, 2Kb Ram, EGA display
Member Avatar for Sphinx'LostNose

So, I've read Microsoft's documentation, and it ends up being a lot of words that don't explain anything. I've seen other places of people using DISM commands, but it doesn't explain what they do. I know DISM is used for working with images before deployment, but people are using it …

Member Avatar for rproffitt
0
405
Member Avatar for toxicandy

So I am really not sure what the name of this device is as I have been trying to find out for some time now, basically in my home I have terrible connect in my room to my router and would like to get a wifi repeater similar to the …

Member Avatar for CimmerianX
0
410
Member Avatar for Sphinx'LostNose

In Linux, what's the difference in a service and a daemon? I know a daemon is a long running process without a terminal, meant for servicing things such as requests from other processes or server type services such as a web server or dns server. I understand that you can …

Member Avatar for rch1231
0
4K
Member Avatar for Sphinx'LostNose

I am running PVST. If I have 2 switches connected to each other over access ports, but they are configured for different VLANs, how does PVST deal with it? [Switch 1] Port 1 Access Mode VLAN 10 [Switch 2] Port 1 Access Mode VLAN 20 I know the traffic leaving …

Member Avatar for CimmerianX
0
163
Member Avatar for Sphinx'LostNose

Normally you can do this and pass the reference type by reference and the new keyword won't make the variables point to different objects: static void Main(string[] args) { Object origObj = new Object(); ExampleMethod(ref origObj); } void ExampleMethod(ref Object newObj) { //origObj will also reference the newly created object …

Member Avatar for ddanbe
0
235
Member Avatar for Sphinx'LostNose

Can 2 identical IPs with different subnet masks be on the same LAN? I know you'd have to route to get between them, but is it acceptable to use the same set of IPs on 2 different subnets?

Member Avatar for master73
0
651
Member Avatar for Sphinx'LostNose

Can you use any compiler, assembler, etc to output code directly for the processor and not for an executable file specific to an OS? How do you determine if you are outputting for an executable for an OS or directly for a processor? Are the instructions/code part in an exe …

Member Avatar for rubberman
0
201
Member Avatar for Sphinx'LostNose

OK, this is specifically regarding Cisco Catalyst 2900s, 4500s, and 6500s. I've always matched my interface VLANs to my VLANs. Lets say I have VLAN 10 on a 2900, and all hosts on it have IP addresses on 192.168.10.0/24. I'd create a VLAN 10 on my 4500 and an Interface …

0
189
Member Avatar for Sphinx'LostNose

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …

Member Avatar for mike_2000_17
0
279
Member Avatar for Ray_2

I'm trying to write Fibonacci code for the first 100 numbers. It works until I get to number 94. 93 12200160415121876738 ok 94 1293530146158671551 mine 94 19740274219868223167 should be this I'm stumped as to why it doesn't work after 93. Can someone point me in the right direction? The code …

Member Avatar for Ray_2
0
175
Member Avatar for Sphinx'LostNose

How much of a source language's characteristics and ways of doing things is seen in a compiled executable? Let's say you use C++ and BASIC (compiled) to write 2 programs that functionally do the same thing. You compile them both on the same computer(and OS of course). How different will …

0
67
Member Avatar for Sphinx'LostNose

I am confused about Android user rights. A lot of times you have to root your phone to get access to do things, but some programs run on a non-rooted phone in a way that would seem they have root access. Examples would be AppLockers, Antivirus programs, and Safe Browsing …

Member Avatar for Greg_z
0
149
Member Avatar for Sphinx'LostNose

Hello, I'm having a hard time when thinking about methods that belong to objects. Most documentation tells us that objects contain the data and actions for the data. When running as program though, the methods seem like they are actions that belong to the program (get put on the stack …

Member Avatar for pritaeas
0
325