5,331 Posted Topics
Re: Alan, you are on a roll here! See my other reply to your posting about shell programming. Once again, we don't do your homework for you, but will help you once you have made some progress in writing the program. FWIW, this problem is not trivial. Complete the other one … | |
Re: If you have backup copies of all of your web pages and application files, then run a checksum (cksum, md5sum, etc) on both the backups and the ones that are active in your web server directories, and then compare them. My guess is that you have been infected with a … | |
Re: As moschops said. Also, in modern compilers you would use either stdout, or stderr. One other thing. It is good practice to initialize external variables such as page and line where they are declared. IE: int line = 1; int page = 0; Uninitialized variables tend to cause many sleepless … | |
Re: "STATEMENTS IN THE FUNCTION ARE SUBSTITUTED WHENEVER THE FUNCTION IS CALLED." This is very true, but the only thing on the stack would be automatic variables in the function. The function itself is turned into machine (or intermediate) code when compiled. It can expand the size of the translation unit's … | |
Re: Topics - there is not just one. 1. Cloud computing 2. Large scale distributed systems and computations 3. Big Data and complex analytics 4. Mobile computing 5. Computer and network security 6. IoT (Internet of Things, such as sensor arrays, smart appliances, etc). I'm sure the list goes on, but … | |
Re: On most current 64-bit systems, a long int is 64 bits and an int is 32 bits. However, as AD said, look in /usr/include/limits.h (Unix/Linux), or wherever limits.h is found on your system. You can also use the sizeof(int) and sizeof(long int) in your code to determine what they are … | |
Re: Google Maps, Nokia Here, etc. Google Maps is pretty ubiquitous. Nokia maps are more for the mobile domain such as cell phones, GPS devices, and automotive navigation systems. FWIW, Nokia maps were able to navigate me to some pretty obscure places in foreign countries where Google was clueless! They have … | |
Re: What Moschops said, for C++, but you CAN use a C construct, const char* for the variables, and then assign a new string to them. Example: const char* FileToInject = "File_Name.xxx"; const char* ProcessName = "Process_Name.exe"; // Do stuff with file and process names, and now change them. FileToInject = … | |
Re: Why the backslash? Linux file names can have spaces in them. However, when you invoke the name, place double quotes around the $SCHOOL variable. IE: SCHOOL="/home/stephen/Steve's Stuff/School" mkdir "$SCHOOL" cd "$SCHOOL" If you don't use the double quotes when you create the directory, the single quote will make bash take … | |
Re: That port may be blocked by your company's firewall. Check with your network operations people. You may need to go through a proxy server to get to it, and they will need to white-list it with the proxy server. | |
| |
Re: Good luck! This is a non-trivial problem, and requires significant pattern analysis and statistical skills to solve. You can never say with 100% certainty that a particular fingerprint matches a specific person - only that there is some % of probability that it does. IE, if the pattern has a … | |
Re: Don't bother with the expense of building your own gear. Rent time on a large Amazon cloud system to do the analysis. When you are don't, you shut it down and aren't being charged for resources you don't need. If this is an occasional need, then it can be a … | |
Re: @richieking is being sarcastic. What he is saying, in plain English, is that we do not do your homework for you. We will help you, point out obvious errors, and such. Make an attempt to solve the problem, post the code here (if it isn't working), and if it isn't … | |
Re: What operating system are you running? This is critical because each has functions to do this, but they are very different in approach. What you would do with Windows is NOT what you would do with Linux. | |
![]() | Re: I hope you have a good (great) attorney. If you sold an app that does A to Google (or whoever) for a gazillion $$, then write one that does something entirely different! If it is as great as the first one, then Google (or whoever) will probably pay you 2 … ![]() |
Re: SQL Server is basically Sybase with warts. Please provide examples - input and subsequent output. Also, provide information about the API's that your are using, language (C, C++, C#, whatever), and the functions you are using to store the data. | |
Re: Seems clear to me. Set up array of 3 files to read. Fork 3 child processes (see fork/exec man pages), each of which reads one of the files. Each sleeps for 3-10 seconds (random time I would assume), at which point they send 50 characters (are they 8-bit, or 16-bit … | |
Re: Ok. We don't do your homework for you. Do you understand C++ passing function arguments by value vs. passing them by reference? If not, let's start there. If you do, tell me what YOU think they mean (with illustration code), so if you are falling into the deep end I … | |
Re: Besides having compatible frequencies, they also need to support the same protocols, such as 802.11a (5.2GHz), 802.11n (both 2.4 and 5.2 GHz), 802.11b (2.4GHz), etc. Most 802.11n products also support a/b protocols. 802.11a-only devices don't support b/n protocols. | |
Re: Your example gets those that start with an even number, not the ones that have an even number at the end of the number string. IE, it will properly return "cp2*.enc" as well as "cp4*.enc", "cp6*.enc", etc. So, that would include "cp211.enc" and such. | |
Re: You mean their IP addresses? You can use the nslookup tool to do that, such as "nslookup att.net". | |
Re: Looks sort of like Windows DOS shell code. Gah... | |
Re: Don't purchase anything. Either get Apache (FOSS - free, open source), Tomcat (ditto), or Nginx (also FOSS). Also, run your server on Linux - it is much more secure for this sort of purpose than Windows of any sort. | |
Re: What deceptikon said. Don't ask us to do your homework for you. If we were to solve it for you, what would you learn? How to cheat? :-( | |
Re: Agile, in my opinion, is just the hot process of the day. Not much more useful than the outdated waterfall technique. We use it at my company, but it doesn't get any more work done than the less "structured" methods we used in my previous position (principal engineer in a … | |
Re: PHP is good for web applications - it is similar to C++ in terms of classes, inheritance, etc; however, it also allows embedded html code. It is also a web server-side tool. Unless you run a 5.5.x or later version, it cannot be run as a server on its own. … ![]() | |
Re: Another option is to not use Windows for this... :rolleyes: Sorry, sarcastic genes showing here. | |
Re: Google is your friend! Also, we don't do your homework for you! If this isn't homework, then re-read the first sentence... | |
Re: If you have a static IP address and that is associated with a registered domain name, then it is available 24x7, assuming the system is running and visible to the internet. I have had friends who provided hosting services to rural towns in Massachusetts in the past doing this - … | |
Re: Send it into Dell for repair. If it is under warranty, you can request a pre-paid shipping box for it. When you get it (takes a day usually) then send the computer back to Dell for repair. If it isn't under warrany, you can box and ship it yourself (your … | |
Re: If you want to understand this stuff, you need to study formal logic! Boolean predicate logic for sure! In my engineering studies in the mid-1960's I had to take a philosophy class as a requirement. I took the formal logic course (part of the philosophy dept), which has stood me … | |
Re: Not enough information... You say that IE works, but not other browsers. What about other stuff? | |
Re: You can also use symmetric encryption, where the same key is used to decrypt the message as is used to encrypt it. Depending upon the encryption algorithm used, this can be more secure than public key encryption when JorgeM talks about. The major issue with this is how to securely … | |
Re: Do some research (google search) on Eliza! Here is a link to get you started: http://en.wikipedia.org/wiki/ELIZA Natural language processing is very difficult - companies like Google, Microsoft, and others are doing serious work on these problems, but they are PhD-level ones. Here is another link to ACM articles and papers … | |
Re: If you have a 230v main power and the system was switched to 115v, then the increased amperage required to deliver the required load can have caused serious damage to the system, although many power supplies have limiter circuitry (fuse or circuit breaker) that can limit the damage to the … | |
Re: See my reply to D Ray about his power problem. Likely similar situation. | |
Re: What about header files? They declare the functions that are in the shared libraries. If this is linux (which I assume since you say you are using .so files), then you need the developer package for the library, which will install the headers for you. Then, as AD asked, are … | |
Re: Well, I was going to suggest a VM, like VirtualBox, that can run old 16bit versions of MS-DOS and Windows (3.x). | |
Re: Not enough information. What kind of "certificates"? How are they formatted? Is this a public/private key certificate? Are you using PGP keys? Show your work. | |
Re: Gah! If you are getting that far along in your "education" and can't think of a project that gets your juices flowing, then you don't deserve to graduate! Just my humble opinion... :-( So, what do you know or have done with web design? What about working with Android (Dalvik/Java)? … | |
Re: The power circuitry in the laptop may be bad. Often it is caused by damaged capacitors. See if you can see any that seem swollen or leaking electrolyte. This is the most common cause of this sort of failure. Repair isn't hard, but you need really good soldering skills to … | |
Re: There is also (on some systems) a long double which should be 128 bits (16 bytes) in size. In a C or C++ program, you can tell how big each type is by using the sizeof(type) function/macro. It will return the number of bytes the type occupies. | |
Re: I haven't installed php on an ubuntu system, but have on my redhat, centos, and scientific linux (all RHEL 6.4 based) systems. I needed php 5.5+ and those systems are still at 5.3.3, so I had to install from source. I am not necessarily saying that you will have to … | |
Re: Not enough information. What database API's are you using? What functions? Is this a command-line program, or GUI? FWIW, SQL is its own language, and is passed to a database front-end to be parsed and executed. For example: select * from table_name where column=value; | |
Re: Myself, when processing textual data I usually read a complete line, and then parse it for tokens of interest using string functions such as strstr(). I process lots of log files efficiently this way. | |
Re: Most systems have some sort of I/O ports, and pi is certainly likely to have such. You should be able to write software to monitor the port(s) that the switch is connected to (how are your soldering skills?) and trigger an interrupt handler as needed. This is not "junior grade" … | |
Re: If this is a 64-bit machine, why install a 32-bit OS? In any case, the installation was probably a failure, hence the cyclical reboot symptom. Try re-installing the OS at the least. | |
Re: Which OS is it running? If Windows 8, then you may be out of luck as yet. If Windows 7, then you are more likely to find a suitable driver on the drive manufacturer's web site. |
The End.