5,331 Posted Topics

Member Avatar for Reverend Jim

255.255.255.255 is the global broadcast address. Your lan needs that to run. The other (starting with 239) may be the multicast address for a network printer. You should be able to configure your router to block any broadcast messages outside of your LAN. You may also be able to block …

Member Avatar for Reverend Jim
0
507
Member Avatar for IMPRESSIVE

Another option (though I generally recommend the virtual machine method mentioned by Mike2k) is to use the tool unetbootin to create a bootable live thumb drive of various distributions and try them out. It will let you boot/run a live Linux system from USB, and not take up any system …

Member Avatar for rubberman
-5
207
Member Avatar for sudipta.mml

What here2serve said. Most systems these days disable stuff like rsh because it is insecure. You can run scripts with ssh much like rsh, but it is much more controllable and secure. See the ssh man page for more information.

Member Avatar for rubberman
0
304
Member Avatar for neha.jubair

Linux/Unix/Posix - the latter is the key. QNX (now the Blackberry OS) is also a Posix operating system. Posix defines a set of common APIs and services that a posix-compliant OS has to support. Software written to the standard will compile/build on any posix-compliant system. I write software for all …

Member Avatar for rubberman
-1
299
Member Avatar for xtrick

As what CimmerianX said. Also, what you did was just the same as executing the command "service networking stop" as root. As are most services, the networking services will be restarted on boot, or runlevel change (see the man pages for init or telinit).

Member Avatar for here2serve
0
178
Member Avatar for Tcll5850

I would agree with JorgeM. There are rootkits out there that hide in RAM and cannot be detected by current malware scanners.

Member Avatar for Tcll5850
0
162
Member Avatar for mdfaisalamin

I think the hardware is already interrupt driven (most likely). Some example of your code would be helpful as to how you determine when there is data to read and/or write.

Member Avatar for mdfaisalamin
0
427
Member Avatar for SpottyBlue

Also, besides the == operator as mentioned by ddanbe, you want to use conditional logic, or a switch statement. IE, // Conditional logic if (operator1 == '+') { result = num1 + num2; } else if (operator1 == '-') { result = num1 - num2; } else if (operator1 == …

Member Avatar for sepp2k
0
264
Member Avatar for Venter

Mostly, this sort of problem exists because the application is checking the permissions of the files/directories they use to be sure that they have not been "hacked". Change the permissions back to the defaults, and either switch to the root account (su - root) to view them, or set up …

Member Avatar for itpixie
0
154
Member Avatar for CloudZELL91

Speak with your advisor if you can't come up with a suitable subject on your own. Part of the educational process is learning how to explore the domain you are interested in, and choosing a thesis project is part of that. This is not the place to ask this question …

Member Avatar for rubberman
-1
159
Member Avatar for jesskavidja

Finite-state machines are your friends for parsing data like this! IE: 1. first '<' == "start tag" event - transition to "reading tag_name" state. 2. handler == "read data until '/' or '>' found". 3. if '/' found, peek at next char. If next char is '>', then skip and …

Member Avatar for rubberman
0
296
Member Avatar for admin-pc
Member Avatar for salahelsafiiom

Google is your friend! You need to understand the structure of TCP/IP packets - this information is widely available, and I'm sure there are good Wikipedia articles on the subject that will lay it out for you. Then, you create a structure to contain the information, and populate it accordingly.

Member Avatar for rubberman
-1
91
Member Avatar for Moe Lamothe

What file system type is on this array? Have you tried replacing the bad drive and letting the array rebuild it?

Member Avatar for rubberman
0
191
Member Avatar for padam.khanal.965

1. Visit the Brother web site for support on this - it is unlikely that anyone here can help you. 2. See #1. 3. Web site and link to support page for this device: http://www.brother-usa.com/SiteSearch.aspx?sk=DCP7030#.Ube48nVDuYl

Member Avatar for rubberman
0
27
Member Avatar for arslan.maqsood1
Re: c++

If this is a school exercise, please make an effort to solve the problem yourself before posting here. We DO NOT do your homework for you, but will help you with problems once you have made an honest effort to solve them.

Member Avatar for rubberman
0
145
Member Avatar for OshkoshJohn

This is not enough information. Please explain exactly what you did to install the "upgrades", and was it the operating system itself, or just some applications, you tried to upgrade? What errors did you get? Can you post the output here?

Member Avatar for rubberman
0
104
Member Avatar for cool_zephyr

This has nothing to do with RAM or CPU speeds. There are some significant differences between 2.3.10 and earlier versions of Gingerbread (android 2.3.x). Try building it with an earlier version, such as 2.3.6.

Member Avatar for cool_zephyr
0
190
Member Avatar for blob84

How are your building/linking this? The errors indicate that you are trying to link multiple versions (or copies) of the named functions, resulting in the "multiple definition" errors.

Member Avatar for blob84
0
328
Member Avatar for Harjinder_Singh

Have you configured the backup tool? That's what the errors seem to indicate, that you have either not configured it, or do not have a suitable device to hold the backup data attached to the system, such as an external USB/Sata drive. What about using some other backup tool?

Member Avatar for Reverend Jim
0
161
Member Avatar for isha.dakhara

Remember, we don't do your school projects for you. Show your work, and we can help you fix them, critique them, or resolve issues you are stumped on.

Member Avatar for rubberman
0
164
Member Avatar for shadyreal

Just stating the problem is not enough to help you. Please post your code and algorithms that you are using for the collision detection.

Member Avatar for shadyreal
0
269
Member Avatar for yashdeshmukh

First of all, the question is so amorphous that I'd not even want to become employed at that company. Without a specification of what they want to store (besides employee data), there is no way to define a polymorphic class structure. So, basically, this is not an answerable question. What …

Member Avatar for rubberman
0
138
Member Avatar for silent lover

That's not accessing sftp... If you were using the ftp protocols, the URL would have been something like "ftp://posting...." and not "http://posting....".

Member Avatar for roseta
0
119
Member Avatar for prathiyus
Member Avatar for Violet_82

Check with a site like buy.com (now rakuten.com). I got batteries for my Android phone from them some time ago (2 extras) that are OEM units (same manufacturer, just not branded for the phone) with the same power ratings, at a fraction of the manufacturer's price. Absolutely zero problems: www.rakuten.com …

Member Avatar for Violet_82
0
233
Member Avatar for emjuan

Major virus / rootkit infection I think! Time to save your data, re-install Windows, scan your data for infections, and then restore it and your applications. This crud is why I run an enterprise class of Linux, and run Windows only in a virtual machine. I can take regular snapshots, …

Member Avatar for tigerbright
0
182
Member Avatar for Fred70

What RIK said. Most such issues are power-supply related. Either you aren't feeding the card the right power (and in the proper amperages), or your power supply is inadequate.

Member Avatar for stu223
0
122
Member Avatar for HelpWanted2115

You are comparing a number with a string. Try `Until num=-1` or something like that.

Member Avatar for kalo150
0
213
Member Avatar for salomonsk8

:-) Yeah, asking us to analyze almost a thousand lines of code is a BIT excessive... :lol: Try to apply the KISS principal first, and then after you restructure your code, post again. :-) That said, you are, to my mind at least, making good progress for a newbie at …

Member Avatar for salomonsk8
0
517
Member Avatar for Mr.M

So little experience, yet you are writing ATM code? Please let me know what bank this is for so I can make sure to avoid their kiosks!

Member Avatar for stultuske
0
225
Member Avatar for wahid.rahman.3114

Good question! Probably only Microsoft can tell you what those errors refere to. They are memory addresses, and I expect that the 3rd hex code (0x00000000) is a null-pointer violation. Best guess? You got hacked with a virus. Time to re-install the OS I think.

Member Avatar for Rik_
0
156
Member Avatar for abu taher

Singing "So Long, It's Been Good to Know You"... No backup? Consider the file as gone.

Member Avatar for rubberman
0
69
Member Avatar for uzziel

Re. What Stuugie said. We don't do peoples' homework for them. We will help once they make an honest attempt at it. Let's not help people cheat. Can you imagine what might happen if someone got through their degree courses that way, and then got a job in a safety-critical …

Member Avatar for new_developer
0
339
Member Avatar for javanoob101

Please show your code. Just telling us that you have a problem is not very helpful.

Member Avatar for javanoob101
0
284
Member Avatar for ggeoff

Have you contacted Dell tech support about this? If you beat on them hard enough (I've had Dell systems for many years, so this is something I know about), they will usually fix the problem. The fact that there may have been a problem with delivery originally should have been …

Member Avatar for ggeoff
0
459
Member Avatar for Hemanth.Satkuri
Member Avatar for Briki

Well, some of the headers included in this code are Windows ones, so you will need a Windows system and Windows compiler, such as (was suggested by the venerable Ancient Dragon) Visual Studio Express. One comment in line 15, you don't terminate or flush the line, and output to cout, …

Member Avatar for Schol-R-LEA
0
127
Member Avatar for jt1250champ

do { buffer[0] = 0; strm.getline(buffer, BUF_SIZE); if (::strlen(buffer) > 0) { // Process buffer. } } while (!strm.eof() && !strm.bad());

Member Avatar for new_developer
0
844
Member Avatar for napninjanx

The text is the code. Logic is how you apply algorithms (patterns for processing data) to data. This latter part is the difficult part. Image processing is VERY difficult. There are a gazillion factors to take into account, such as pixel depth (number of bits per pixel), size of image …

Member Avatar for Schol-R-LEA
0
322
Member Avatar for Doze_4u

What folks here are saying is "don't ask us to do your homework for you"... Make an attempt first, and we can help you clean it up. This does not qualify.

Member Avatar for joshua.klaser
0
351
Member Avatar for str91

Sigh... I see that your first problem is that you don't understand C syntax, especially with regard to pointer arithmetic... Where did you get this code and if you wrote it yourself, where did you get the algorithm? Start with that.

Member Avatar for rubberman
0
124
Member Avatar for napninjanx

Stand on the shoulders of giants! Get the source code for ffmpeg (www.ffmpeg.org) and study that: http://www.ffmpeg.org/releases/ffmpeg-snapshot.tar.bz2

Member Avatar for rubberman
0
63
Member Avatar for Tinnin

While Linux is not Unix, it is a Posix-compliant operating system, so most of what you learn about Unix is relevant. I have used both Unix and Linux (and related systems such as QNX) for many years. This is a good book - probably worth getting for general background information …

Member Avatar for rubberman
0
173
Member Avatar for siddiquedu

Better while loop, avoiding breaks... :-) bool done = false; while (!done) { //First column infile>>num; if(!infile.good() || infile.eof()) { done = true; } else { test1.push_back(num); //Back of the line for you, mister! //Second column infile>>num; if(!infile.good() || infile.eof()) { done = true; } else { test2.push_back(num); //Back of …

Member Avatar for siddiquedu
0
409
Member Avatar for ganges

A lot of systems store the encrypted password in non-volatile memory, and cannot be reset without replacing the chip, or getting a master password from the manufacturer. Go to the manufacturer's web site to see. I have this problem with a Toshiba laptop I am trying to unlock for my …

Member Avatar for Ritesh_4
0
2K
Member Avatar for lemslurp

One end is a usb device end. The others look like fire-wire ends. So, my guess is that it is a usb+fire-wire cable, capable of making a fire-wire to fire-wire device, or fire-wire to usb device connection. It definitely does not look like a USB to fire-wire cable, on the …

Member Avatar for lemslurp
0
276
Member Avatar for cdea06

The rule of thumb is... EVERYONE over complicates their C code! Applying the KISS principal to code, especially C and C++ code is critical in building reliable and understandable programs/systems. Anyway, I will look at your code and comment again in another message.

Member Avatar for rubberman
0
300
Member Avatar for Anark10n

`if ((courses < 4) && (courses > 6))` is wrong. You want to verify if the courses variable is between 4 and 6, inclusive, so it should be `if ((courses < 4) || (courses > 6))`. IE, use the OR, not the AND boolean operator.

Member Avatar for rubberman
0
325
Member Avatar for billy.umpel

You are talking about the network PXE boot capability? Yes, it uses tftp to download the system image to boot.

Member Avatar for rch1231
0
70

The End.