5,331 Posted Topics

Member Avatar for jim3472

If you are running Windows systems, go to the command prompt (cmd.exe) and run the command "ipconfig". If Linux/Unix, go to a command prompt and run the command "ifconfig". These should should your network interfaces, and the address of the router (gateway), along with other stuff.

Member Avatar for CimmerianX
0
201
Member Avatar for Pavan_6

Download the free version of the Cloudera Hadoop management tool. It will nicely do all that cruft for you.

Member Avatar for Pavan_6
0
183
Member Avatar for negru

You aren't providing enough information. In any case, why are you conflating queues with a binary tree? A binary tree is only equivalent to a queue when the tree is degenerate. IE, there are no branches, which can happen if you insert data that is already sorted, which is why …

Member Avatar for rubberman
0
188
Member Avatar for can-mohan

Lines 9 and 10 essentially have the same function signatures, which is why you are getting this error. You need to remove line 9 which is `friend void fun (int a, int b, int c);`. In line 10, the default value for c should be OK. If not for your …

Member Avatar for rubberman
0
290
Member Avatar for sireiz

Respect your app users. They are paying for bandwidth, so if you store videos and photos in the "cloud", they pay for it! Let them store these on their system unless THEY decide to upload to the cloud! Anyway, you don't need to pay for a server, but you WILL …

Member Avatar for peter_budo
0
300
Member Avatar for carmelobeach

The .docx files are xml with some "secret sauce". You might try to use LibreOffice to recover the data. It can handle Word docx files very well. The comment about a "text editor" are appropriate as docx/xml files are just text, but it should be one that can handle xml …

Member Avatar for rubberman
0
209
Member Avatar for davidmoore970

Backups? The data should still be stored in non-encrypted form, so you may be able to use some sort of editor and extract each message to an external file. Very time-consuming and a major PITA, but I have seen where this is the best solution, unless, as you say, you …

Member Avatar for y0f4n
0
164
Member Avatar for Joeltob

So, when you say you changed the case, I assume you put the old motherboard in the new case? Are you sure the powersupply is properly connected? Disc drives? What else did you change?

Member Avatar for rubberman
0
40
Member Avatar for rubberman

PHP is an object-oriented language, based (loosly) upon C++. It has classes, methods, member variables, and all that other good stuff. It runs on your web server, not in the client, but the HTML, JavaScript, and other stuff such as CSS blocks that it emits with its output commands are …

Member Avatar for TexWiller
3
2K
Member Avatar for lewashby

Normally, chown will only affect a real file, not a link. Most of your "files" are soft links. Unless you modify the ownership and/or permissions on the root file, the link will not respond to unauthorized access.

Member Avatar for rch1231
0
335
Member Avatar for sureshshan1292

So, you want us to do your homework for you? :-( Not going to happen! Make an honest effort and if you are still having problems, post the code here and we might decide to help you... DO NOT CHEAT!

Member Avatar for ekambaram
2
3K
Member Avatar for cambalinho

A 2GHz CPU and 256MB of video RAM is pretty minimal these days. What happens when you run videos outside of Firefox? Also, how much RAM does your system have (besides video RAM)? Firefox on my Linux system takes at least 600MB.

Member Avatar for y0f4n
0
219
Member Avatar for skanagaraju

Without details about your application stack, this would be impossible to estimate. Each Heroku application is run in a dyno, which is essentially a Linux container. You really need to read the Heroku reference documentation on their web site: https://devcenter.heroku.com/articles/how-heroku-works

Member Avatar for rubberman
0
112
Member Avatar for asaidi
Member Avatar for asaidi
0
144
Member Avatar for can-mohan

1. Don't throw exceptions from a constructor. 2. See #1. If you do have an exeptional condition inside a constructor, then you need to set a member variable indicating that the construction failed. Remember, your object may be the base of another that will naturally call your constructor. If you …

Member Avatar for can-mohan
0
393
Member Avatar for Manikanta Sharma
Member Avatar for jonfil0130

Please explain what you mean by "black out". Do you just get a black screen? If so, how do you know the battery is ok? How do you know that it is actually booting up?

Member Avatar for rproffitt
0
157
Member Avatar for Yahia Farghaly

Where is your code for the sum_arr() function? Your code as it is makes no sense... Why are you using curly braces for x=(int){1}+(int){2}; etc? Do you have a slightest clue what you are doing?

Member Avatar for Yahia Farghaly
0
86
Member Avatar for udit2511

If you understand the logic, writing the code should be trivial! PLEASE, DO NOT ask us to do your homework for you!

Member Avatar for rubberman
0
88
Member Avatar for hansinimaya

Give me some... what? You provide a link to facebook, but no specific page, so it goes to the user's page. If you are a student, you are definitely failing your class!

Member Avatar for rubberman
-2
62
Member Avatar for sabeenasyed

See this Wikipedia article - Telugu uses the Unicode range U+0C00–U+0C7F: https://en.wikipedia.org/wiki/Telugu_script

Member Avatar for rubberman
0
137
Member Avatar for batoolhussain

Images in an html page are NOT html, but are generally embedded PNG, JPG, or similar format images. If you right click on an image in your web browser, they usually give you an option on saving the image to your system. For example, if I right click on Reverend …

Member Avatar for rubberman
0
123
Member Avatar for jonfil0130

Most so-called diskless devices have some sort of flash memory based device (SSD) to store local data on. Also, they all have USB ports that you can use to attach a thumb drive for external storage. Even my phone has an SD card slot that gives me 32GB or more …

Member Avatar for rubberman
0
106
Member Avatar for deshalb

I found a replacement for my D630 for about $25 at www.rakuten.com (formerly buy.com). Seems as good as the original for a 9 cell battery (extended life). One from Dell is almost $200.

Member Avatar for rubberman
0
148
Member Avatar for sheelakumari
Member Avatar for parvai
0
340
Member Avatar for happygeek

Good post "Geek"... :-) Done right, steganography is hard to detect, especially if the code is encrypted first, and then if the embedding is also ramdomized.

Member Avatar for rubberman
3
508
Member Avatar for kalcio

FTP is useful if you don't want to trust your data to the cloud, but bear in mind that raw FTP is inherently insecure. There are secure FTP versions available. FTP is part of the basic TCP/IP protocol stack. Most cloud storage solutions have decent security and encryption these days, …

Member Avatar for Muhammad_91
0
355
Member Avatar for davijhon

The names pretty much say it all: ARP == Address Resolution Protocol. RARP == Reverse Address Resolution Protocol. This should help: http://www.differencebetween.com/difference-between-arp-and-vs-rarp/

Member Avatar for davijhon
-2
99
Member Avatar for mgt
Member Avatar for william85

What version of Office are you running? If other Office 2007 clients can view these, then something went wrong with your installation and you might want to remove it and reinstall it as an experiment.

Member Avatar for john76
0
876
Member Avatar for aravindm

As per Moschops. In my opinion, this is a textbook exercise to teach you the perils in performing evaluations (functions) on arguments in another function. This problem, caused by others, has caused me many sleepless nights living inside a debugger! In any case, some compilers will evaluate arguments left-to-right, and …

Member Avatar for Moschops
0
202
Member Avatar for happygeek

Many people have perfectly functional computers with WinXP that are not capable of running newer operating systems (from Microsoft at least - Linux not considered here), yet do not have the financial wherewithall to purchase new computers with Win7 or Win8, let alone upgrade all their applications (those that are …

Member Avatar for XP78USER
6
10K
Member Avatar for pravinkumar1

Send it back to HP for repair. As gerbil mentioned, it could be an overheating problem, but the random time to failure makes me doubt that. I suspect you have a solder/connection problem on the motherboard or in the power supply.

Member Avatar for MidiMagic
0
647
Member Avatar for can-mohan

I think your use of a double-quoted string is the problem. IE, the order_type in (:dest), should be order_type in ('30','31','32'). The double quotes are likely the cause of your issue. Your string "dest[20]" can't be used this way. Try using this: dest[3][3] = {"30","31","32"}. Also, how are you binding …

Member Avatar for can-mohan
0
334
Member Avatar for adnan_6

If you want to do this in Qt, then check out the QtCreator tool. Qt is NOT OpenGL, even if it may use it under the covers.

Member Avatar for adnan_6
-1
208
Member Avatar for XP78USER

It sounds like your computer is having networking issues in connecting to the school's server (your H: drive). Are you using WiFi to connect, or wired ethernet?

Member Avatar for XP78USER
0
228
Member Avatar for Nebil

@ what ddanbe said. You need to show your code, or at least describe what your are doing more completely.

Member Avatar for tarunap
0
243
Member Avatar for bhaltulpule

Multiply - shift left. Divide - shift right. Add and subtract are more complicated. This may help: https://en.wikipedia.org/wiki/Binary_number

Member Avatar for rubberman
0
243
Member Avatar for thaifoodlover

If Linux is OK with you, then go to www.zareason.com for great Linux laptops! Toshiba and Fujitsu laptops are good, mechanically speaking, but I don't know about support. The folks at zareason will take good care of you!

Member Avatar for rubberman
0
176
Member Avatar for desmondo

This is often caused by a bad DNS server. ISP servers sometimes go down and then you cannot access the internet because names cannot be resolved to IP addresses, which are required for connectivity. I sometimes add a TLD (top-level domain) DNS server address to my network configuration to deal …

Member Avatar for rubberman
0
248
Member Avatar for ZER09

Since the DDR3-1600 CAS 11 worked, my guess is that it is compatible with the DDR-3 1066/1333, but it will only run at the 1066 speed of the memory bus that the computer provides. IE, you can use a faster RAM, but it won't run any faster than the computer …

Member Avatar for rubberman
0
691
Member Avatar for Hardin_1
Member Avatar for fernando.sawyer.98

My wife is a staff physicist in the computing division of Fermi National Laboratory, doing serious software development for high-energy physics research. Her development systems are Macs, but the code she writes has to be cross-platform to Linux and Unix as well. The GNU compiler, Clang, and such are all …

Member Avatar for Richard_25
0
253
Member Avatar for happygeek

In the case of either on-premises or in-cloud systems, following the "rules" is the only way to get real security (relatively speaking). Amazon is pretty good about security, but you can still leave yourself open to exploit if you don't dot your i's and cross your t's. That said, I …

Member Avatar for dlhale
1
451
Member Avatar for danibootstrap

This is not a trivial subject. You are getting the raw data, which I assume you have captured in Windows. How is the data encoded?

Member Avatar for Mayukh_1
0
198
Member Avatar for Gabriel_6

Sorry. We don't do your homework for you. Show the work, and we will help. No work - no help...

Member Avatar for rubberman
0
44
Member Avatar for Mark_39

You need to check your printer settings, as well as that of the editor. If the editor has set the margines to 1", but the printer settings has also, then you may get this 2" effect.

Member Avatar for rubberman
0
132
Member Avatar for alexx006

So, you are using other people's code? Have you tried implementing it yourself? Do that, and we can help you. Also, you will learn a lot more about what you are doing. An RPN calculator is effectively a stack machine. You can use the singly-linked list pattern in either C …

Member Avatar for Schol-R-LEA
0
297
Member Avatar for lewashby

What OS are you using? There are tools on most that will do this. MS Windows ones are usually commercial. Linux ones, even the paid-for professional ones have free versions that can do this. Check out Cinellara and similar tools on Linux. You can also use ffmpeg for this purpose, …

Member Avatar for rubberman
0
315
Member Avatar for Norbert_2

The typical way this sort of trivial "encryption" is done is to have an alpha-numeric key of some reasonable length. You then walk the key and use each character in turn to xor with a target character in the file. Example: void encrypt(char* filedata, const char* key) { do { …

Member Avatar for Norbert_2
0
754

The End.