rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Lines 9 and 10 essentially have the same function signatures, which is why you are getting this error. You need to remove line 9 which is friend void fun (int a, int b, int c);. In line 10, the default value for c should be OK. If not for your use, you need to explain your usage further.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Can you get into the BIOS? If not, then the computer likely has a physical defect and needs professional care, or replacement. However, since you say you can boot into Ubuntu from a USB drive, then the system is still alive. Have you tried replacing the hard drive? Can you boot from CD/DVD?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You might want to drop iptables and use pcap to capture network traffic in "promiscuous" mode, and then wireshark to filter and analyze it. That has worked well for me in the past.

FWIW, to convert KBytes to Bytes, multiply by 1024. Also, this line "The actual value is : 943 * 1024 = 965632" should be "The actual value is : 934 * 1024 = 956416". The nice thing about math is that everyone has a different answer, unless they agree on specific terms at the beginning... Also, the 934KBytes may be (and probably is) rounded off - up or down? Perhaps the awk answer is correct. In any case, Wireshark and pcap will give you exact answers if you need.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The .docx files are xml with some "secret sauce". You might try to use LibreOffice to recover the data. It can handle Word docx files very well.

The comment about a "text editor" are appropriate as docx/xml files are just text, but it should be one that can handle xml formats, tags, labels, etc. That's why I suggest LibreOffice.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Respect your app users. They are paying for bandwidth, so if you store videos and photos in the "cloud", they pay for it! Let them store these on their system unless THEY decide to upload to the cloud! Anyway, you don't need to pay for a server, but you WILL piss of your users if they suddenly discover they have huge bills to pay to their cell providers!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

So, when you say you changed the case, I assume you put the old motherboard in the new case? Are you sure the powersupply is properly connected? Disc drives? What else did you change?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Backups? The data should still be stored in non-encrypted form, so you may be able to use some sort of editor and extract each message to an external file. Very time-consuming and a major PITA, but I have seen where this is the best solution, unless, as you say, you want to pay for a tool to do this for you.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good luck! I had a Seagate consumer external drive that died after a short while. I have found that these are usually manufacturing seconds, and are unreliable. Now, I only purchase "enterprise" external drives (no cases) with a 3 year warranty, and then put them in a case that I get separately. Slightly more expensive, but 100x more reliable! The extended warranty has served me well in the past, although I find Seagate drives over 1TB to run very hot, and fail quicker than similar drives from Western Digital or Hitachi. Too bad. I did consulting work for Seagate for a couple of years and they were good people to work for. Unfortunately, their engineering seems to need some work... :-(

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good question that I can't answer since I haven't used it. I understand that Heroku is based upon a Debian/Ubuntu distribution however. There is a lot of useful information on their web site and the documentation seems pretty thorough to me.

Disadvantages: would mostly be whether or not it will survive in the "long" term - long being relative in the Internet era.

Advantages: it was purchased by Salesforce.com in 2010, so that may be a good sign.

Go to www.heroku.com for full information.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Without details about your application stack, this would be impossible to estimate. Each Heroku application is run in a dyno, which is essentially a Linux container. You really need to read the Heroku reference documentation on their web site: https://devcenter.heroku.com/articles/how-heroku-works

skanagaraju commented: Thank you.,..will read about it... +0
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Uploaded to? Or do you mean downloaded from the google play store?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Is this a school exercise, or a work-related issue?

Manikanta Sharma commented: Work Realted +0
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

And your problem is? What is the forward slash in the "find" command? You are specifying the BEL directory with the find command. The slash is extraneous and may cause a parsing error, unless you have multiple directories at the same level that start with BEL.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you understand the logic, writing the code should be trivial! PLEASE, DO NOT ask us to do your homework for you!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Give me some... what? You provide a link to facebook, but no specific page, so it goes to the user's page. If you are a student, you are definitely failing your class!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Where is your code for the sum_arr() function? Your code as it is makes no sense... Why are you using curly braces for x=(int){1}+(int){2}; etc? Do you have a slightest clue what you are doing?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

See this Wikipedia article - Telugu uses the Unicode range U+0C00–U+0C7F: https://en.wikipedia.org/wiki/Telugu_script

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
  1. Don't throw exceptions from a constructor.
  2. See #1.

If you do have an exeptional condition inside a constructor, then you need to set a member variable indicating that the construction failed. Remember, your object may be the base of another that will naturally call your constructor. If you throw an exception, the derived class object will never see it, though the constructing code should be able to catch the exception, but it can also check the base class exception variable to determine that the object construction failed at some level.

  1. Test, test, test!
  2. See above.

Make sure your unit tests force such conditions to see how well they are handled and that you can handle them sanely. Is your code running a nuclear power plant? A plane in flight? Don't let "good enough" be your philosophy!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Images in an html page are NOT html, but are generally embedded PNG, JPG, or similar format images. If you right click on an image in your web browser, they usually give you an option on saving the image to your system. For example, if I right click on Reverend Jim's image above, my Firefox browser gives me, amongst other options, the ability to "Save image as...".

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Please explain what you mean by "black out". Do you just get a black screen? If so, how do you know the battery is ok? How do you know that it is actually booting up?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Most so-called diskless devices have some sort of flash memory based device (SSD) to store local data on. Also, they all have USB ports that you can use to attach a thumb drive for external storage. Even my phone has an SD card slot that gives me 32GB or more of local storage for pictures, documents, emails, etc.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I found a replacement for my D630 for about $25 at www.rakuten.com (formerly buy.com). Seems as good as the original for a 9 cell battery (extended life). One from Dell is almost $200.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good post "Geek"... :-) Done right, steganography is hard to detect, especially if the code is encrypted first, and then if the embedding is also ramdomized.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Normally, chown will only affect a real file, not a link. Most of your "files" are soft links. Unless you modify the ownership and/or permissions on the root file, the link will not respond to unauthorized access.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The names pretty much say it all: ARP == Address Resolution Protocol. RARP == Reverse Address Resolution Protocol.

This should help: http://www.differencebetween.com/difference-between-arp-and-vs-rarp/

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A 2GHz CPU and 256MB of video RAM is pretty minimal these days. What happens when you run videos outside of Firefox? Also, how much RAM does your system have (besides video RAM)? Firefox on my Linux system takes at least 600MB.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Using Windows? ASP.net is ok. Want something more neutral? Use PHP.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I think your use of a double-quoted string is the problem. IE, the order_type in (:dest), should be order_type in ('30','31','32'). The double quotes are likely the cause of your issue. Your string "dest[20]" can't be used this way. Try using this: dest[3][3] = {"30","31","32"}. Also, how are you binding the data to the placeholder :dest?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Multiply - shift left. Divide - shift right. Add and subtract are more complicated. This may help: https://en.wikipedia.org/wiki/Binary_number

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you want to do this in Qt, then check out the QtCreator tool. Qt is NOT OpenGL, even if it may use it under the covers.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If Linux is OK with you, then go to www.zareason.com for great Linux laptops! Toshiba and Fujitsu laptops are good, mechanically speaking, but I don't know about support. The folks at zareason will take good care of you!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It sounds like your computer is having networking issues in connecting to the school's server (your H: drive). Are you using WiFi to connect, or wired ethernet?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is often caused by a bad DNS server. ISP servers sometimes go down and then you cannot access the internet because names cannot be resolved to IP addresses, which are required for connectivity. I sometimes add a TLD (top-level domain) DNS server address to my network configuration to deal with such issues. You can find their addresses on the internet, such as for bell-atlantic, etc.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

"BTW one more question are the max memory bandwidth of the processor and peak transfer rate of the RAM is related?"

The short answer is yes. Also, the CAS is related. That indicates the number of wait states that the memory will apply in order to properly handle the load. This wikipedia article explains it pretty well: https://en.wikipedia.org/wiki/CAS_latency

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The salient question is "Why do you need this?".

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What version of Office are you running? If other Office 2007 clients can view these, then something went wrong with your installation and you might want to remove it and reinstall it as an experiment.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Since the DDR3-1600 CAS 11 worked, my guess is that it is compatible with the DDR-3 1066/1333, but it will only run at the 1066 speed of the memory bus that the computer provides. IE, you can use a faster RAM, but it won't run any faster than the computer does.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sorry. We don't do your homework for you. Show the work, and we will help. No work - no help...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

As per Moschops. In my opinion, this is a textbook exercise to teach you the perils in performing evaluations (functions) on arguments in another function. This problem, caused by others, has caused me many sleepless nights living inside a debugger!

In any case, some compilers will evaluate arguments left-to-right, and others right-to-left. IE, this is one of those "we left it up to the compiler writers to decide" things that the C/C++ standards committees agreed on. IE, they couldn't decide to agree, so they left it up to someone else! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You need to check your printer settings, as well as that of the editor. If the editor has set the margines to 1", but the printer settings has also, then you may get this 2" effect.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is not a trivial subject. You are getting the raw data, which I assume you have captured in Windows. How is the data encoded?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What OS are you using? There are tools on most that will do this. MS Windows ones are usually commercial. Linux ones, even the paid-for professional ones have free versions that can do this. Check out Cinellara and similar tools on Linux. You can also use ffmpeg for this purpose, though it is a command-line tool and will require some experimentation to get it right.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The typical way this sort of trivial "encryption" is done is to have an alpha-numeric key of some reasonable length. You then walk the key and use each character in turn to xor with a target character in the file. Example:

void encrypt(char* filedata, const char* key)
{
    do
    {
        for (int i = 0, j = strlen(key); i < j && *filedata != '\0'; i++, filedata++)
        {
            *filedata ^= key[i];
        }
    } while (*filedata != '\0');
}

void decrypt(char* filedata, const char* key)
{
    encrypt(filedata, key);
}

Note a couple of things. One is that decrypt() calls encrypt because the second pass of xor on the file data will revert the data back to its original state. Next is that the main loop in the encrypt() function will cycle over the key until the filedata element is fully encrypted. This will encrypt/decrypt the entire .ini file. You will need to make multiple calls to encrypt and decrypt if you just want to encode/decode the value data.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

@ what ddanbe said. You need to show your code, or at least describe what your are doing more completely.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A messenger? Please be explicit what you mean. This is a common term for message passing systems, such as Kafka. However, it may mean something else to you.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Have you really analyzed the original qsort algorithm? Read Knuth's volume 3, Sorting and Searching? If you haven't adsorbed that, then you don't know what the fark you are doing!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I will always be suspicious of vendor-written and distrubted programming languages. Lock-in is the least of the issues. Open standards exist for a reason. This is why I don't like Java - it isn't open, and sucks for a variety of reasons!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

There are many for audio and video. They range from co-ax audio connectors to hdmi and lightning connectors for audio and video, and a plethora of stuff in between including midi connectors for things like piano keyboards, etc.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
  1. Don't use C#.
  2. See #1.
  3. See #2...

Snark aside, I don't use C# and .NET tools because MS can change the rules for them any time they want.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This entire block is bad:

                   for(num=0;;)
      {
         a=getch();
         if((a>='a' && a<='z')||(a>='A' && a<='Z')||(a>='1' && a<='9'))
         {
               ph[num]=a;
               cout<<"*";
               ++num;
               }
         if(a=='\r')
         {
           ph[num]='\0';
           break;
           }      
           }
           if(pass=='input')
            {
                  cout<<"PASSWORD ACCEPTED"<<endl;
            }
 if(pass=='else') 
 {
    cout<<"Login rejected"<<endl;
 }

At the least, you are not terminating when the password is rejected, but are falling through to the rest of the program. This may be better:

      for(num=0;num < 20;num++)
      {
         a=getch();
         if((a>='a' && a<='z')||(a>='A' && a<='Z')||(a>='1' && a<='9'))
         {
               ph[num]=a;
               cout<<"*";
         }
         else if(a=='\r')
         {
           ph[num]='\0';
           break;
         }
      }
      if(strcmp(ph,"input") == 0)
      {
         cout<<"PASSWORD ACCEPTED"<<endl;
      }
      else
      {
         cout<<"Login rejected"<<endl;
         exit(-1);
      }

Note that the pass variable is a single character. You need to test ph instead of pass for pass/fail. Also, you are writing most of this in C code, not C++... Not good for a passing grade I think.