Slavi 94 Master Poster Featured Poster

Would this amplification actually be better than using DNS amplification?

Slavi 94 Master Poster Featured Poster

I don't think wireshark can help you with that at all, it is used to analyse packets. What you could start up with is do the following in cmd and get back to us with the results
ping www.google.com -t
let it run for about 10-15 seconds then use ctrl+C and paste the results here

Further, go to Click Here and post the results back to us as well.I can give you further explanation of what they are if you want me to(unless you already know)

Slavi 94 Master Poster Featured Poster

just to make sure ctrl+alt won't work correct?

Slavi 94 Master Poster Featured Poster

4, if others are able to print it is quite likely that the user's settings are different or he is trying to print it out on a different printer

Slavi 94 Master Poster Featured Poster

You need to understand the syntax of Java really well, and the concept of Object-Oriented Programming (OOP). This is essential to create applications using java and once you are knowledgable of this, you'll have to install android-sdk and play around there to get used to actually putting up code with interactions from mobile users to it

Slavi 94 Master Poster Featured Poster

Well, I'll give you a quick example using list of numbers and a structure called "set", that does not contain the same object multiple times so if it has 3 elements inside, that means 3 different grades have been processed

grades = [5,4,4,5,5,5,3,1,2,3,5,7,1]
aSet = set()
SortedGrades = sorted(grades, reverse = True)
for grade in SortedGrades:
    if len(aSet) >= 3 and grade not in aSet:
        break
    aSet.add(grade)
    print "Student's grade is %s" %(grade)

Output is:

Student's grade is 7
Student's grade is 5
Student's grade is 5
Student's grade is 5
Student's grade is 5
Student's grade is 5
Student's grade is 4
Student's grade is 4
Slavi 94 Master Poster Featured Poster

Well, it is kind of the same concept but what you could do is actually save your data in a dictionary {StudentName : Grade} then used sorted to sort it by values in a reversed order so the first element will be the highest.
Then when outputting them make a function get the best 3 grades, where you loop through the values of the dictionary, and save {student : grade} in a new dictionary that you will return before exiting the function. Your looping condition will be that there are 3 different values in the new dictionary that will be returned

Slavi 94 Master Poster Featured Poster

Do you mean like this?

a = [5,4,4]
i = 0
while(i<len(a)):
        if (i + 1) <= len(a):
                if a[i] == (a[i+1]):
                        print "Equal grades %s and %s" % (a[i], (a[i+1]))
                i = i + 2
                else:
                        print "Grade %s" % (a[i])
            i = i + 1
        else:
        print "Last item in the list %s" % (a[i])
        i = i + 1

Output:
Grade 5
Equal grades 4 and 4

Slavi 94 Master Poster Featured Poster

If you are able to connect to youtube that means that you had already connected to your router wirelessly correct? Could you show pictures of your configuration as well as what appears when you connect the network icon on the right corner

Slavi 94 Master Poster Featured Poster

left to right but it's increasing upwards :P

print '\n'.join(" "*ix + c for ix, c in reversed(list(enumerate("Hello World"))))
pyTony's version backwards vertically

print('\n'.join("Hello World"))[::-1]

Slavi 94 Master Poster Featured Poster

Happy Valentine's guys, hope you have a nice one!

Slavi 94 Master Poster Featured Poster

By coincidence(or not :p) they are the same, just took a day for them to email me about the transaction, thanks guys =)

Slavi 94 Master Poster Featured Poster

I'd advice you to split the sentance to words and save the words into an array. Then just print the first char of each string that is in the array

This is an example of splitting

Slavi 94 Master Poster Featured Poster

print 'Sup'

Slavi 94 Master Poster Featured Poster

I just received it on my paypal, didn't have to do anything, kind of weird but oh well =)

Slavi 94 Master Poster Featured Poster

I actually had to make a line follower robot few years ago and for the design I made a circuit board which is 'literally' what andruino is except that the microcontroller I used was ATmega32 instead of ATmega(not even sure what they use on Andruino now xD)
but then I used c to program it and it was pretty cool to play around with. Indeed having Andruino and their own language and IDE is faster way to develop embedded software and yea #Vega, I think you are required to use their language but it has barely any difference compared to C and their tutorials are pretty easy to understand as in how to control the board. It literally comes down to setting pins as either input/output and playing with the values on them, lots of inbuilt functions etc

I am not very familiar with raspberry PI but it seems like it has a high potential, hopefully I'll get my hands on one of these later on

Slavi 94 Master Poster Featured Poster

The only game I played pretty much was Runescape, but none anymore only coding now =)

Slavi 94 Master Poster Featured Poster
public class awesomeStuff{
    public static void main(String[] args){
        System.out.println("*");
        System.out.println("**");
        System.out.println("***");
        System.out.println("****");
        System.out.println("*****");
    }
}

Stultuske will appreciate. =D

Slavi 94 Master Poster Featured Poster

Kind of ^ but the SAM file can be accessed by the system 'only', so if you need to retrieve the file you'd have to use a different OS such as live usb of linux, as you won't be able to copy/open or any operation with the SAM file if the pertition it is on is working. It will be completely locked. Also, in order to read the hashes from the SAM file you need to get the bootkey, which is stored in the SYSTEM file, no extension. Cain & Abel can help you crack the hash but if the password is longer than 8 chars, it is just not really worth it to try to brute force as it would take weeks/months/years/decades. A dictionary attack is what could be performed and if that doesn't solve the issue might as well just stop there unless you have computational power such as cloud(there are alternatives but they are expensive as well)

Slavi 94 Master Poster Featured Poster

Hey guys,
I just tried to cash out the reward points I had earned and once I clicked "Paypal cash out", the reward points got set to 0.Now I got a message "Last cash out, pending for $$", is there anything additional to do or does the cashing out happens at the end of the month?

Slavi 94 Master Poster Featured Poster

Byte of python and hacking ciphers with python is what I used, and I pretty much loved them. However, This is a great starting point and it is online, good examples and detailed explanations

Slavi 94 Master Poster Featured Poster

You're welcome

Slavi 94 Master Poster Featured Poster

My guess would be he means Client/Server applications, having a vps to place the server on and developing some kind of a TCP client connecting to it. Perhaps you should provide more information on what exactly are you trying to achieve

Slavi 94 Master Poster Featured Poster

Try this:

re.findall('[\d.]+','2123.32321%')

outputs:
'2123.32321'

re is regular expressions module so you have to import re

Slavi 94 Master Poster Featured Poster

You can use an IDE as #djjeavons mentioned or a text editor(sublime is my favorite). If you do use IDE (such as eclipse) you can compile the code and run it from within there, while with a text editor you can compile the code from the terminal using 'javac filename.java' and run it using 'java filename' - note no extension at the 'java' command

Slavi 94 Master Poster Featured Poster

before I can comment on your code I need to get your logic behind it. You get user's details and then the user enters a char that you want to find out whether it is 'f'/'c' or 'h', correct? If so, you shouldn't ask for a new char after each if/else if statement but just proceed with the one you got before the if/else statement. Further
if(Character.toUpperCase(inputChar) ==('F') || Character.toLowerCase(inputChar) ==('f')) - do you understand what is the meaning of this? it is basically the same operation thus it is not relevant as the first part of the statement is enough to achieve your idea behind 'no matter what character is entered, get it to uppercase and compare to 'F'' if this fails to evaluate to true, the second will fail too as you are simply doing the same thing comparing to the same character

So all in all, remove line 36 and 48

Slavi 94 Master Poster Featured Poster

I am not sure what do you mean or understand by 'cloud' but you can run say a server written in java on a VPS(vurtual private server) and then connect to it. Such an example is say you implement a chatting program using java sockets, and you run the server on a vps with an IP "100.100.100.100"(just example IP address) and port 1337. Once the server is up and running, you can use a client program to connect to that IP address and the port that the server is listening on. Sockets are just a tcp connection and you don't have to worry about it as they take care of it.
Another approach to reach the same goal is using Java RMI(Remote object invocation), where I would think it might be better for your specific problem. What you could do there is implement all your methods on the server side and then just send flags as authenticated/permission approved/permission denied back to the client. If its not just a school project, you should consider implementing the traffic from a client to the server using SSL/TLS as the communication will be encrypted thus credentials being sent to the server won't be visible in plain text

Slavi 94 Master Poster Featured Poster

or Java RMI, where you can invoke methods implemented on the server from the client

Slavi 94 Master Poster Featured Poster

Nice 1 Mike, but it still stands strong and I definitely agree that universities are part of the problem, for example I am forced to do my projects in java. I've seen increase of jobs for c# developpers lately

Slavi 94 Master Poster Featured Poster

Thanks #Geek

Slavi 94 Master Poster Featured Poster

Interesting, do they mention any real names or peoples' private data of the exposed ISIS members or it will be kept confidential if the manage to 'kill the virus' ?

Slavi 94 Master Poster Featured Poster

I think that knowledge needs to be shared among everyone willing to learn new things, I am nowhere nearly as good as some of the guys around here but I am trying to learn and improve myself and while doing it I do the same thing if I can share what I've learn so far. And by any means, it really isn't embarrassing, we are humans, we have been born with no knowledge other than basic instict for survival and we must go through that step of learning

ddanbe commented: Indeed! +0
Slavi 94 Master Poster Featured Poster

What is the name of the folder? Do you have "show hidden files" and show "system files" enabled? As if its a system folder you probably won't be able to, such as those that windows creates say on usb drives. If the folder has a hidden or something file that is still being in use, it won't let you either but if that is the case, a restart of your system will be enough to be able to delete it afterwards as I doubt it will be a start up application.
By the way, are you able to locate it using "cmd"? If so try deleting it from there

If those above don't help, well
As in the case of a computer virus, as on a windows system I highly suggest you using an antivirus program Avast or AVG, and scan your computer. If those don't work it might be nice to do some packet analysis using wireshark or a similiar tool to see whether the virus/a botnet zombie or any of the sort is being communicated to through a command and control server but if this is the case I think we could do into it later on

Slavi 94 Master Poster Featured Poster

well, I'd state my opinion as well "It's too big" >.>

Slavi 94 Master Poster Featured Poster

It seems like that your SD card hasn't been assigned a letter. You' ll have to do it manually in the device manager (say you want to assign it 'f' but I think windows requires you to use unused character). Another option would be to get liveusb of ubuntu or similiar and format your sdcard using gparted from within ubuntu

Slavi 94 Master Poster Featured Poster

among the clients but I assume that your router is connected to ethernet cable, which's bandwidth is limited to 100mbps so, well

Slavi 94 Master Poster Featured Poster

didn't you mean to have it as if number is less than the smallest then smallest is changed to number?

Slavi 94 Master Poster Featured Poster

did you manage to connect to anything at all?

Slavi 94 Master Poster Featured Poster

oh, rand is an object of type Random,
and that int that you just decleared called rand, rename it
Random rand = new Random()
also import it

Slavi 94 Master Poster Featured Poster

shouldnt line 108 be
if(action.equals("Encryption")) instead of if(ae.equals("Encryption"))

Slavi 94 Master Poster Featured Poster

instead of using that for loop to generate the number use this
int randomNum = rand.nextInt((max - min) + 1) + min;

Slavi 94 Master Poster Featured Poster

You should probably type SELECT not secelt

Slavi 94 Master Poster Featured Poster

I am no expert or even being close to one in GUI design but what I would do quickly on that set up is make a jframe, you could probably use jlabels and set their background to those pictures and then a gridview with textfields in it where you can append your data to.
Guess James will confirm whether this is actually used like that in a working environment with real life applications

Slavi 94 Master Poster Featured Poster

there is a semicolumn on line 33, the code won't compile

Slavi 94 Master Poster Featured Poster

Looks pretty nice, thanks for sharing

Slavi 94 Master Poster Featured Poster

You could print any item that you desire from the array simply by supplying an array index. Perhaps you could add a field that is say for example phone owner, which is a String and represents the name of the owner. When the program is ran, you could print only the owner names to the user such as:
Press the number of whom's information you would like to see
1. Matthew
2. Slavi
3 ...
4 ....

And then the user is expected to enter a number and then pass that number decremented by 1 (Because arrays are 0 based) to the array and print the object's fields.

An improvement to your program would be to create a method print(), so that you just call that method to print someone's information instead of calling print statements all over the code. In your case you print it only once but in general that's a good practice.

Slavi 94 Master Poster Featured Poster

In your class SmartPhone, you pass the mobileOS to the constructor but you never set it to your field so inside the constructor you should add:
this.mobileOS = mobileOS;

Slavi 94 Master Poster Featured Poster

Pretty much what Lardmeister said however, if you want a strong encryption you shouldn't try to implement an encrypting algorithm yourself but use an already existing and known implementation. If it's for a test purpose, you can try and implement the Ceaser cipher your self, it is one of the most basics one

Slavi 94 Master Poster Featured Poster

well, technically you are using the same keyboard, I would assume that a keylogger running on the host will be able to catch key strokes even if they were made within the guest OS, as far as Tails, it warns as much as it can cos it's made to hide identity and kind of hide activity by using TOR as much as it can so warnings such as that are not uncommon

Slavi 94 Master Poster Featured Poster

The story of Linux is contained within a single video, where on top of what rubben said, long story short, Linus had created the kernel in his spare time and a multiple individuals have developed "GNU's not unix" (GNU),lead by Richard Stallman, when those two were combined, Linux was born