rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, you can also run Windows as a client VM inside a Windows host. Just do all of your Internet browsing in the VM! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Major virus / rootkit infection I think! Time to save your data, re-install Windows, scan your data for infections, and then restore it and your applications. This crud is why I run an enterprise class of Linux, and run Windows only in a virtual machine. I can take regular snapshots, and when the VM gets infected, I just revert to the last snapshot. Virus be gone!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

As what CimmerianX said. Also, what you did was just the same as executing the command "service networking stop" as root. As are most services, the networking services will be restarted on boot, or runlevel change (see the man pages for init or telinit).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good question! Probably only Microsoft can tell you what those errors refere to. They are memory addresses, and I expect that the 3rd hex code (0x00000000) is a null-pointer violation. Best guess? You got hacked with a virus. Time to re-install the OS I think.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Have you tried "select '1' as flag,* from ..." ?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

So little experience, yet you are writing ATM code? Please let me know what bank this is for so I can make sure to avoid their kiosks!

Mr.M commented: lol. Well with this code I have it easy to read as a person who has experience in programming and it also helped me to just see how I will go about writing these features that I want to add so you don't worry that much and if I get some problems I will po +0
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Please show your code. Just telling us that you have a problem is not very helpful.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

And FWIW, I HAVE written safety-critical real-time system software, so this is something I am very conscious of. My signature says it all! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Re. What Stuugie said. We don't do peoples' homework for them. We will help once they make an honest attempt at it. Let's not help people cheat. Can you imagine what might happen if someone got through their degree courses that way, and then got a job in a safety-critical position? Can you spell "nuclear core meltdown", or "oh my god, that plane just fell out of the sky!"... ?

Stuugie commented: LMAO, "That plane just fell out of the sky!" +2
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, some of the headers included in this code are Windows ones, so you will need a Windows system and Windows compiler, such as (was suggested by the venerable Ancient Dragon) Visual Studio Express. One comment in line 15, you don't terminate or flush the line, and output to cout, just like stdout for C, won't flush to the display until either the output buffer is full, or there is some other event to cause it to flush. So, do this: cout << "Product is : " << p << flush;

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, here is a link to an OEM Samsung battery for the GT-i9000 - all of $12USD, including free shipping! :-) http://www.rakuten.com/prod/oem-battery-for-samsung-galaxy-s-ii-t989-international-galaxy-s-gt/228115358.html

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Check with a site like buy.com (now rakuten.com). I got batteries for my Android phone from them some time ago (2 extras) that are OEM units (same manufacturer, just not branded for the phone) with the same power ratings, at a fraction of the manufacturer's price. Absolutely zero problems: www.rakuten.com - I have been purchasing most of my computer and electronics cruft from them for almost 10 years now, and they have always been responsive in dealing with DOA's and other problems.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Have you contacted Dell tech support about this? If you beat on them hard enough (I've had Dell systems for many years, so this is something I know about), they will usually fix the problem. The fact that there may have been a problem with delivery originally should have been communicated with them, but I have had them replace stuff that was out of warranty when I had indicated (in no uncertain terms) that the problem started before the warranty ran out.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What folks here are saying is "don't ask us to do your homework for you"... Make an attempt first, and we can help you clean it up. This does not qualify.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sigh... I see that your first problem is that you don't understand C syntax, especially with regard to pointer arithmetic... Where did you get this code and if you wrote it yourself, where did you get the algorithm? Start with that.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Stand on the shoulders of giants! Get the source code for ffmpeg (www.ffmpeg.org) and study that: http://www.ffmpeg.org/releases/ffmpeg-snapshot.tar.bz2

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The text is the code. Logic is how you apply algorithms (patterns for processing data) to data. This latter part is the difficult part. Image processing is VERY difficult. There are a gazillion factors to take into account, such as pixel depth (number of bits per pixel), size of image (x pixels vs. y pixels), shading, rendering, ray-tracing (if you are doing synthetic image generation), etc. My advice (after 30+ years doing this stuff) is to study well-written tools that do this. There are a plethora of tools in the FOSS (Free and Open Source Software) domain that do it. One great example is GNU's Gimp package. Study that. Understand that. And you may be ready to start writing some of this stuff on your own.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Mungo, please do not hijack the threads of others. Start your own. Do that and I'll be happy to give you some advice.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Better while loop, avoiding breaks... :-)

    bool done = false;
    while (!done)
    {
        //First column
        infile>>num;
        if(!infile.good() || infile.eof())
        {
            done = true;
        }
        else
        {
            test1.push_back(num); //Back of the line for you, mister!
            //Second column
            infile>>num;
            if(!infile.good() || infile.eof())
            {
                done = true;
            }
            else
            {
                test2.push_back(num); //Back of the line for you, mister!
                i++; //And one more row please.
            }
        }
    }
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I know this thread was last posted to a year ago, but just a comment to cdea06 - my wife is a PhD paricle physicist who mostly does computational physics at Fermi National Laboratory here in Illinois! I wish you the best in your chosen career! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

My most useful class in college for my software engineering career was my required philosophy class, for which I took Formal Logic! Go figure! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A lot of systems store the encrypted password in non-volatile memory, and cannot be reset without replacing the chip, or getting a master password from the manufacturer. Go to the manufacturer's web site to see. I have this problem with a Toshiba laptop I am trying to unlock for my grandson. It is a real PITA!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

One end is a usb device end. The others look like fire-wire ends. So, my guess is that it is a usb+fire-wire cable, capable of making a fire-wire to fire-wire device, or fire-wire to usb device connection. It definitely does not look like a USB to fire-wire cable, on the other hand. IE, it should work to connect an Apple system to a USB device (printer, drive, etc), or Apple to other fire-wire device.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Ok. After some research (a few minutes reading articles google brought up), I don't see that you can do what I mentioned above regarding KVM or other virtual machine tools... Doesn't mean it isn't possible, but I does mean that it would not be easy I suspect.

Anyway, here is an article about doing something like that with Hyper-V: http://msdn.microsoft.com/en-us/library/windows/hardware/hh440250(v=vs.85).aspx

Ok. Just finished searching the www.linux-kvm.org site and find this about PCI hotplug support, so it may be possible to use KVM on a Linux host to provide access to PCI devices to guest operating systems: http://www.linux-kvm.org/page/Hotadd_pci_devices

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Most VM's cannot access hardware directly except through the host OS, although this is not necessarily true if you are using hardware level virtualization such as kvm, and all operating systems are running virtually. Then I think you can expose different hardware devices such as this to each operating system as needed. Unfortunately I have not had the time to play with that so I am only going on what I THINK, not what I KNOW... :-)

That said, you might be able to run a Linux host OS with this hardware, and then run your Windows 7 OS in a VM under the Linux host. I do that quite nicely on my system. I run a version of Red Hat Enterprise Linux 6 (Scientific Linux) and Oracle's VirtualBox works a treat!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I was going to ask Rik's question, but need to also ask if you might be using the same host name for both systems?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Like declaring global variables as extern, you can do that with functions as well. Here is an example from a header file in my current work project:

extern int setup_notify_events();

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Line 21, if(amt<=100){ is testing an uninitialized variable for a specific range. What value it (amt) contains is indeterminate - just whatever was in that stack memory location when the function was called. You need to rework the ComputeAmount() function.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You are comparing a number with a string. Try Until num=-1 or something like that.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

One of the best texts on the subject is Comer and Stevens "Internetworking with TCP/IP". There are 3 or 4 volumes to the set, and they aren't cheap (running $30-100USD each these days - low price is for used volumes), but I refer to them regularly in my job as a systems engineer for a major network development organization.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I agree with mattster. A good start on a Linux blog.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Usually this is a head/sensor mis-alignment issue. That usually requires replacing the drive, which is cheaper to do than repair if the drive is out of warranty. Given that they can be had for $10-35 USD these days (for dvd burners), save your pennies and get a new one!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Go to the audio tool in the dock, right click, and go to sound preferences. There you should have access to the output tab and can set the balance accordingly.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Huh? There is no such animal(s) in SQL. What exactly are you trying to do? Give an example of your schema and the data it contains, and what you want to do for correlating that data to "category/sub-category".

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

So, given the clear guidelines provided, what is your problem? If you are unclear about how to code this in C, then talk with your professor.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
do
{
    buffer[0] = 0;
    strm.getline(buffer, BUF_SIZE);
    if (::strlen(buffer) > 0)
    {
        // Process buffer.
    }
}
while (!strm.eof() && !strm.bad());
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Just stating the problem is not enough to help you. Please post your code and algorithms that you are using for the collision detection.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sorry, but we don't do your homework for you! Do the research and write up your paper and we may help with some pointers, but YOU have to do the work!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

WiFi does not have such a range normally. In any case, you will need a number of bridges/repeaters. You can send from one repeater to another over a long distance using a Yagi-Uda directional antenna. I've used them in the past to bridge local WiFi transmitters over a distance of 100's of yards to over a kilometer. Bear in mind that you may well violate federal (FCC) power limits using this technology!

rch1231 commented: Short and to the point. +9
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You are talking about the network PXE boot capability? Yes, it uses tftp to download the system image to boot.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Linux automatically reserves about 10% of available space for root, so when users fill up the file system(s), the admin can still get things re-arranged (backups, remove old/stale files, etc).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sorry, but I'm not familiar with Tiny7, but bootcamp is ONLY for Apple hardware, which yours is not, apparently. I would suggest that you install a small Linux OS on the laptop. There are a number of which will work with this old hardware, such as Debian, Puppy, DSL (Damn Small Linux), etc.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

So, what precisely is your problem?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This would be a good configuration, and a 5-6 year life-span is not unreasonable. However, I would change the Seagate 1TB disc for a Western-Digital or Samsung drive. My experience with the Seagate Barracuda drives in the 1TB and higher capacity range is that they run hot, and hence have reliability problems. I used to get them exclusively, but have switched over the past couple of years because of this.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A lot of this sort of stuff is entirely dependent upon the operating system and development tools and api's you are using. So, answering your question is not possible without knowing a lot more about those things, as well as about whether the application is a GUI-based one, or a service-type application with no direct interface to the system's GUI window manager. If the latter, then we also need to know what window manager you are using, if the system is not an MS Windows one.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You want to build processor (CPU), or a computer system? The former requires an in-depth knowledge of semiconductor processes, electrical engineering, and computer software. The latter can be done with parts you can purchases at Fry's, Best Buy, NewEgg, et al. The former requires specialized equipment that can be found in universities with semiconductor engineering or solid-state physics departments, or in semi-conductor manufacturing plants. The latter you can find instructions online, youtube, or in "dummies" books you can purchase at Barnes & Noble or Amazon.com.

So, which is it? FWIW, one of my best friends was one of the two principal designers of the 8086/8087 chip set at Intel back in the 1970's. The 8086 had about 20,000 transistors and could be laid out using standard hand drafting tools. My friend, Bruce Ravenel, has an MS and ABD (all but PhD disertation) in computer science and electrical engineering. So I guess if you have the knowledge and capabilities, you COULD design a buildable processor chip of that sort of complexity, but getting access to the chip construction hardware is another thing entirely.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good link. As noted, Apple really wants to lock you into Objective-C instead of a real standards-based language like C++. The paradigms are similar (object-oriented programming), but the syntax and implementation are different. IE, you can't just take your Objective-C applications and migrate them to another system, without a suitable compiler. Fortunately, there are Objective-C compilers for Linux and (possibly) Windows, such as Clang. How well they support the Cocoa API's is an entirely different question, however! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Like C, C++ lets you get very close to the "bare metal" of your processor. Java is typically run through a virtual machine, which puts you one more level above the hardware - until you JIT (Just In Time) compile it to machine code! :-) As for "secure", well that is all relative (common for performance reasons). Java has many known security issues that make it possible (even easy) to subvert for malevolent purposes.

My personal opinion is that Java is really C++ with training wheels. It is easier for newbies to write code that is not directly exploitable, but it comes with a very high price. I write C, C++, and Java code for a living that impacts over 100 million users. I can do the same thing with C++ as Java, but the runtime overhead (memory and system overhead) of C++ (not speaking about performance or throughput - a debatable subject) is a LOT lower, and I don't have to worry about the JVM garbage collection performance impact (which can be mitigated somewhat, but at a very high development cost). If I need automatic heap reclamation of allocated objects, then I can use auto-pointers, or my own garbage-collecting smart-pointer classes. FWIW, I have been doing serious research in reference-counting garbage collectors for 20 years, and algorithms/code I invented and implemented runs most semiconductor manufacturing fabs on a 365x24 basis - over 10 million lines of code with no application-level deletes, and no memory leaks! If your device has …

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It is likely that either your code is malformed, or that security protections prevent this from executing. IE, the string is in "string" space, but you are trying to exectute as though it is in executable code/text space. I'm not sure what you would need to do in that case. Is this for security research? Have you studied the appropriate processor and operating system documentation on how to do this? Have you tried changing the typing of your code[] array to const char* code = ...;?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You might also want to use the endl operator instead of "\n" in your output code since that also has the affect of flushing the output buffer. IE: std::cout<<std::hex<<LH<<std::endl;