560 Posted Topics
Re: What web browser are you using? Is the browser set up to remember cookies? | |
Re: What's Freds bloodtype? Is he married? How many wisdom teeth did he have removed? Does he play any instruments? Does he speak Esperanto? Does he have a backstory? Can we give him a backstory? Is he a programmer? Hardware technician? Web devleoper? We still have so many important questions about … ![]() | |
Re: Same answer as [here](http://www.daniweb.com/software-development/c/threads/481576/is-c-useful-for-webapps). C and C++ share a lot of the same community, and are often employed to do very simular things. | |
Re: It's simple: Make sure that every character in the string given by the user is greater then or equal to '0' and less then or equal to '9'. The reason this works is because each character in a string is really just represented by a number, and in ASCII (and … | |
Re: Remove all of the goto's and labels. goto should never be used for structuring programs or flow control. It sometimes can be used tactically. There are a few ways you can use a loop to make this cleaner. Here's one (no testing, be aware of typos): while (1) { if … | |
Re: Pascal is still used every so often. For example, Innosetup, is a installer for Windows is scripted in Pascal and written in Delphi. | |
Re: It definatly sounds like (bad) homework. Else you wound't be stuck using terrible 20 year old Turbo-tools. > What I'm looking for is more of how to do a delay function. Your teacher didn't tell you? Well, back in the day, IBM-compatable computers provides int 0x15 AH=0x86 "wait" through the … | |
Re: > Also, where/how is the key itself generated? I'm glad you asked. A stream cipher (like arc4) takes in a key of n bits, and will produce a very long bitstream. The bitstream is then xor'd with the plaintext to produce the ciphertext. The cipher itself has no concept of … | |
Re: > Yes, I was thinking of doing #include "file.cpp", but how would I link those two files together in order to access the other's functions? You should NEVER need to include a .cpp file. Incliding the corresponding .h file has the same effect and is more powerfull, not to mention … | |
Re: The problem is with your code, not ASP.Net. Further more, it is impossible to help you without a clear explination of the problems, or the code itself. | |
Re: If you have an executable for Linux, you'll need to set the executable bit in order to run it. If you're using Ubuntu or the Gnome desktop, you'll usually be able to set it by right clicking on the executable, clicking "Properties" and checking the box for the executable bit. … | |
Re: The idea behind cryptolocker is that encrypts cartian files on the system, not all of them (otherwise the system would be inoperatable). For example, it will search for pictures, music, videos, plaintext files and things like that. It generally won't target executable files, and the malware will not try to … | |
Re: So your essentially making a clone of [KeePass](http://keepass.info/) (in practice I'd probably stick to that; they take several steps to prevent side channel-attacks, and already use strong encryption). Saving passwords in plaintext is never good practice. You can use SQLite to work with the database. It will be less work … | |
Re: They can. But you don't generally see it too often (it's not unusual to see c/c++ called from php though). The problem with using c/c++ for web development is that it doesn't have a community of web developers. | |
Re: At the very least, it's not due to any security flaws. It propigates through the usual social engineering tacticts. Human ignorance is probably one of the more worrying things in computer security. | |
Re: I'm not sure how the SQLite hooks work for encryption. However, it is possible that the entire file is encrypted. If that is the case, then it is impossible to distinguish it from random data (by design). It would be impossible to tell if the password is incorrect, or if … | |
Re: To be honest, I'm not sure if a tutorial is really needed to learn OpenGL or DirectX. You might be able to find a fairly high quality book on the subject, but you should be ok just using the API documentation, and perhaps looking over/changing a few examples. | |
Re: First thing I'll suggest: Add one plugin at a time. Test it out, make sure it works, configure it. Trying to add several plugins at once and getting them all to work at the same time will be a hassle. If you have an issue with a particular plugin, feel … | |
Re: Are you using windows 8? If they're logged into the same Microsoft Account, then they will automatically sync up. | |
Re: Both of these features are mostly for convienience and cleaner code. What I mean by that is that C++ is still turing complete without either of these features. One major reason for including these into C++ was that people comming from other languages often want to use these features, and … | |
| |
Re: From a more computer science prospective, yes and no. Most of the problems I encounter are problems that can be solved by adapting an already explored algorithm (or sometimes it's more of a mathematical therum). I do keep all my Math and Computer Science textbooks, along with a digital collection … | |
Re: What's the compiler related problem (which compiler are you using, which platform are you using it on, whats the small sample code and whats the error (if any) or can you describe the problem)? We can't possibly help you if we have no information. Ask about the log in issue … | |
| |
Re: Let's start at the top. You should be able to figure out line 21 given line 19. After you've figured out line 21, line 30 should be easy (line 17 explains what line 30 needs to do). For lines 39 to 44, "TANK" is not a variable (it's a structure). … | |
Re: In your example, you're writting a wrapper for a static array that adds bounds checking. If that example is from a book, I would probably look for a better book. (for use of globals, for static array size and for some small strange bits of syntax). | |
Re: So you mean you want a function that determines if a word contains all of the specified letters; ie: has_all_letters("x-ray", "xy") would return true. Start by iteration through all of the characters in the "xy" string. For each character. Check if the character exists within the "x-ray" string. If a … | |
Re: NVidia is a company that provides their propietary drivers (which in general work well) and they also help out the Noveau team). Installing the NVidea drivers will install the official propietary version (not Noveau). You should try to install the propietary NVidea drivers for the more reliable support. If you … | |
Re: There is nothing we can possibly do for you with the information provided. | |
| |
Re: They differ when you look at the time/space complexity of the operations. Genenrally, you look at all of the operations you'll be using first, and then you'll choose which container you'll use. For example, if you need random access by index, you're probably going to want to use a vector. … | |
Re: I think using <algorthim> and <function> is a little overkill. The set of all permutations can be set up as a simple tree. The most natural way to iterate through all of the permutations would be a little recursion. If you wanted to, you would be able to optimise it … ![]() | |
Re: Sure. `int _tmain(int argc, _TCHAR* argv[])` is some Microsoft extention and is not part of any C or C++(11) standard. `int main()` or `int main(void)` are both valid ways to declair main such that the program ignores any command line arguments. `int main(int argc, char *argv[])` and `int main(int argc, … | |
Re: [15:0] is always fed into the sign-extend. However, since it's an R-type instruction, we don't really care about the output. If you want to know what the value it, it's [15:0] of whatever the instruction is sign-extended. It's not usually meaningfull though. | |
Re: The word your looking for is "single-core". Single-core proccesors are less commonly produced now (in desktops) because multi-core proccesors almost always provide better performance. In general, it's been "kind-of" decided to have lower clock-rates for better energy efficency, and speed is given by improved instructions, multiple cores and bigger memory … | |
Re: I'm more of a Racket programmer, and I don't usually use macros. I'll try to help though. Is this R5RS? Edit: Nevermind. R6RS. | |
Re: Wrap it in another loop. If the user enter's an incorrect answer (not 'y' or 'n'), thne the loop continues. If the user enter's a correct answer, the loop breaks. | |
Re: I'm taking a shot in the dark, because I'm not sure where line 6 is, but it looks like the problem is this: `$1`. That will not run the program. You should instead use `./$1`. | |
Re: What do you want to know about it? If you want to know how to use it, look into learning how to use openssl. | |
Re: Someone mentioned DOS. Actually, Microsoft released the [source code](http://www.computerhistory.org/atchm/microsoft-ms-dos-early-source-code/) some early versions of dos. It's interesting to read through. (It's actually licenced under a semi-open source licence.) So you can compile it and redistribute it for educational purposes. I'm also going to mention something that might seem a bit silly. … | |
Re: Just keep in mind that the TkInter portion is seperate from the database portion. i.e. TkInter has nothing to do with connecting with the database, even though your program uses both. The reason I'm saying this is that googling "using tkinter with mysql python" probably wouldn't get you as usefull … | |
Re: Use whatever you want. I personally find Vim more productive. I always find it questionable when a company asks you to use one IDE/text editor over another (ESPECIALLY when the person telling to use it isn't even a programmer). They tell you to use it like it effects the final … | |
Re: Haven't really looked into C++11 too seriously yet. Wow! Apperently lambdas also support closures! Now if we can implement continuations (combine that with multi-threading), then we'll get somewhere! | |
Re: Also take a look at your library or bookstore if you have access to them. | |
Re: So you know that each left paren needs to have a matching right paren. You also know that order is important. If you see `{` `(` then you would expect to see `)` `}` eventually in that order. That is to say, the last left paren we see needs to … | |
Re: Try removing all extentions from your browser and restart your browsers settings ([firefox](https://support.mozilla.org/en-US/kb/reset-firefox-fix-most-problems?utm_expid=65912487-41.djHNRQY0RhaLvvtvcd0BQA.3&utm_referrer=https%3A%2F%2Fwww.google.ca%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26ved%3D0CB4QFjAA%26url%3Dhttps%253A%252F%252Fsupport.mozilla.org%252Fen-US%252Fkb%252Freset-firefox-easily-fix-most-problems%26ei%3D8Um_U_j6FejI8wGb9YDYAw%26usg%3DAFQjCNFtaKEVZ_YyFC_12I9TEu28byOooQ%26bvm%3Dbv.70810081%2Cd.b2U) [chrome](https://support.google.com/chrome/answer/3296214?hl=en)) | |
Re: If I'm using Windows 7, then I'll enable the classic theme, and set up my taskbar so it looks like windows 95. I think that aero jazz is ugly. If I'm using Windows 8, then I'll use classic shell to make it look like windows 95, and disable all that … | |
Re: Technically it is illigal (breach of eula, each copy is windows is licensed to be installed on one computer). You might be able to get it to install, but I dout you would be able to activate it (they lock it in by checking it against your hardware). I've heard … | |
Re: Evil side: I like the idea of using Tor to control malware. It's more convieneint then using public wifi, usenet, Pastebay, etc... Good"er" side: Back your stuff up (off site)! Randsomware, harddrive failure, fire, theft, etc... are all dangerous. ![]() |
The End.