Which of their SDKs are you using? Note that SecuSearch SDK Pro for Windows features 1:N matching.

rproffitt commented: +1 matching. +8

A way to match fingerprints is already provided with the SDK, apparently...

"SecuGen SDKs make it quick and easy to integrate SecuGen fingerprint scanning, template generation (minutiae extraction), and template matching functions (both one-to-one and one-to-many) into almost any type of sotware application.", Source: http://www.secugen.com/products/sdk.htm

Does the documentation not include some example code?

savedlema commented: the SDK sample code do not talk about 1:M identification. +2

You won't catch me saying this often but may I suggest you Google it?

My reasoning is this: any SEO expert with a greater understanding of ranking factors than another is more likely to out rank them in search results. Q.E.D. So the best SEO tools are among those found at the top of Google's search results. Have you tried the first page?

Google's Webmaster Guidelines is usually a good starting point.

So, Google Fetch returned an HTTP 404 error?

You can rule out issues with robots.txt. The file tells bots which resources it should not request. You simply would not receive an HTTP response (or error) because a well-behaved bot will not make requests for blocked resources.

The robots meta tag can also be ruled out. The tag is embedded in an HTML document, and it can only be read if the page is retrieved, which would mean an HTTP 2xx error, document found.

It's probably not a firewall issue because other pages on the site can be accessed, or a permissions issue as that would result in an HTTP 403 Forbidden error.

Sitemaps tell bots where to find resources on a host. If the sitemap contains errors, such as bad URLs, it will cause the web server to return an HTTP 404 Not Found when a bot attempts to download the resource.

I'd take a closer look at the URLs in your sitemap. Watch out for any unusual characters that might cause bots to truncate URLs. For example I have known GoogleBot to read URLs like http://example.com/page[1]/ as http://example.com/page , unless the square brackets were encoded as %5B and %5D.

Another possibility is a misconfigured redirect, but then why would that affect search engines and not all visitors to your site? If you do find a redirect is responsible it's probably safer to remove it. Search engines expect to see exactly the same content as shown to human visitors of ...

Search for SMS gateway.

You'll discover there are many services offering SMS messaging, which you can connect to through their APIs. I bet most of these will be documented for PHP.

Alternatively you can connect directly to a network with either dedicated hardware or just a mobile phone.

Unfortunately I don't yet have access to Windows 10, but here are a couple of things you might want to try that worked for earlier versions...

To change the 'registered owner', open the registry editor (regedit) and navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
Look for the 'RegisteredOwner' key.

To change an account name, instead of going through 'User Accounts' in the control panel, try opening a command prompt and typing control userpasswords2. With a bit of luck a more advanced user account dialog will appear.

Rendering in the browser occurs after an image has downloaded. Usually it's the downloading of the image that takes time. If you wish to reduce the amount of image data transferred on your site here are a few things you can try:

  • Resample images to reduce their resolution (recommend 72 DPI).
  • Resample images to reduce their dimensions.
  • Try different file formats. Generally JPEG for photos, GIF for line drawings, PNG for both.
  • Try different levels of compression.
  • Reduced color palettes.
  • Try graphic file optimizers, e.g. JPEG optimizer, tiny png, and others.
  • Use a content delivery network (CDN).

For general performance advice see Yahoo's "Best Practices for Speeding Up Your Web Site". I haven't checked whether the article has been updated for HTTP 2.0 yet, which will make some recommendations perhaps less relevant when it's enabled on your server, but still worth a read.

diafol commented: Great +15

Try changing the event listener on line 7 to something like...

openCtrl.addEventListener( 'click', function(ev) {
   if (classie.has(el, 'services--active')) {
         classie.remove(el, 'services--active');
    else {
         classie.add( el, 'services--active' );
  } );

You should find your open services button will now toggle. The event listener for the close services button, lines 12-15, can be removed.

... not to mention unit testing.

Way too much violence on the screens these days. Bring back the A-team. Those guys fired thousands of rounds of ammunition and never hit anyone. Now that was entertainment!

In keeping with the current trend of using Roman numerals, Microsoft is pleased to announce the next generation of Windows will be named 'Windows X'. And this time there will be only two editions, Standard and Professional (abbreviated to S and P). The circle is now complete. There will be no more confusion. Anyone searching the web for Windows XP will find only the latest version.

Request denied.

I wish PI was an integer.

Keystoke, in an earlier post you've stated you are a link seller. If you have fallen foul of Google's policy on link schemes you are going to find it extraordinarily difficult to get page rank with them again.

Thinking about it. I'm still doubtful that HTTPS is suitable for everywhere and everything, as Google would like us to believe. For example we have some fairly hefty downloadables on our site - one of our products being roughly 50 MB in size. As caching proxy servers are generally unable to handle HTTPS traffic, clients would need to request this resource directly from our servers, and I'm not sure what impact this might have on site performance. We might try working around it by splitting the downloadables off to a separate domain, that we'd continue to serve using HTTP. One of Google's arguments for using HTTPS is that we should be ensuing what our clients receive is exactly the same as we are serving, but is it really an issue if our software is already signed?

Your profile links to a site about the software in question, so it seems like you are actually the vendor. If that's the case I doubt we will be able fix your product. Have I misunderstood? Please do clarify your connection with the product.

Something went missing from my last post...

Use a USB to IDE/SATA cable, such as this:

This one supports 2.5 and 3.5 inch IDE drives (PATA), SATA devices, and includes a separate power supply. Once connected it's no more difficult than using a USB thumb drive.

Use a USB to IDE/SATA cable, such as this:

This one supports 2.5 and 3.5 inch IDE drives (PATA), SATA devices, and includes a separate power supply. Once connected it's no more difficult than using a USB thumb drive.

For more info try searching the web for USB to IDE/SATA cables....

Alternatively, to make use of the SATA cable you have already...

Start by opening your computer case and invalidating your warranty. Rummage a round for a spare SATA slot, taking care not to dislodge anything too important, and plug-in the SATA cable.

Attach the other end to the hard drive, assuming it has a SATA interface. If the drive is more than ten years old it'll probably have a PATA interface. Unfortunately PATA and SATA are totally incompatible no matter how far you bend pins.

The drive will also need power. Computer manufacturers know just how useful a spare power connector can be for users looking to upgrade their systems instead of purchasing new ones, so you might just get lucky. If not purchase a power cable splitter, or borrow the one from the CD/DVD drive.

On booting the system you may need to change the SATA configuration or BIOS settings to specify a drive letter for the disk. Choose a letter that is higher than any current drives. Refrain from changing the boot order.

Oh, and don't forget to switch your computer off before trying the above. Perhaps I should have mentioned that ...

Get swell soon.

<M/> commented: Idk why, i see a happy face on your foot +0

Grey hat is acutally the combination of both black hat and white hat.

It's not like mixing paint you know. SEO methods either violate guidelines or they do not. If you disagree, please feel welcome to prove me wrong. Could you show us an example of a combined technique?

Try setting the CSS style to clear: left for the DIV elements on lines 1, 11, and the other one not shown in your snippet, i.e. the DIVs that are the immediate ancestors of the image tags.

It's usually a good idea to check a distro's Hardware Compatibility List before installing Linux to see which devices are supported. Something you may want to do before ordering your laptop.

For Ubuntu the information you need is possibly found in their forums.

As a general rule though, the more popular your hardware is the more likely it is to be supported. Newer laptop models seem to be fairly well supported, especially those from big brand names.

Ubuntu has one of the largest community of users for a distro, so should anything go awry with your install, someone else may already have found a solution. Give it a shot!

The load method is asynchronous, is it not? Although it needs time to retrieve serverstats.php, the call itself should return almost immediately.

So how long does it take to call lines 5, 6 and 7? I suspect it's just a few milliseconds, and then your blank message displays for the remainder of two seconds.

The load method accepts a callback function as an optional parameter, which is executed after the task completes. What happens if you move line 7 to inside the callback?

cjohnweb commented: The suggestion to call line 7 as a callback from the load function on line 6 did the trick. Good intuition on how to make this work! +2

Microsoft Security Bulletin MS11-083 - Critical
A vulnerability in TCP/IP can allow remote execution if an attacker sends a continuous flow of specially crafted UDP packets to a closed port on a target system.

Still feeling secure?

Firewalls cannot protect you from this type of attack. And remote execution can enable the attacker to take full control of your system, disable your anti-virus or anti-malware software, and steal your credentials, etc.

This is possibly why Microsoft suggest only running Windows XP disconnected from the Internet from now on. I also suspect they don't want to be held responsible for enabling the worlds largest bot net, given that 1/3 of computers are still running XP.

Thankfully the vulnerability was patched in later editions of Windows and doesn't affect Windows XP SP3. But the point I want to make really clear is that vulnerabilities like MS11-083 can and do exist, and it is only a matter of time before another exploit is discovered. Only next time Microsoft will not patch it.

Anyone who still believes Windows XP can be made secure definitely has (as another member kindly suggested) their heads buried in the sand. It's time to ditch XP!

They should be available on python.org. Look for the x86 MSI installers.


Results we get from this are permanent.

How can the benefits of SEO be permanent? Search engines periodically change their algorithms. Can you be sure what works today will still provide a benefit six months from now? Take keyword stuffing for example - if you applied that old SEO technique today it would do more harm than good.

Goaway would be a great name for a tour company. What do you think?

Taking ownership of a file owned by SYSTEM isn't normally a problem. Perhaps something is holding the file open? Have you tried booting into safe mode and attempting to take ownership?

If you succeed I expect you'll then need to assign some permissions, to allow you to delete the file, otherwise you would see an access denied error.

Did Gerbil's suggestion work out?

You might need to take ownership of the file before you can delete it. Log in to a command prompt as administrator and type takeown /? to get more help.

The output of grep and other commands can be saved to a file by using a greater-than '>' symbol to redirect the standard output stream. Try something like...

grep "some pattern" some-file-to-search.txt > the-results.txt

To double space the resulting file, you might want to try 'sed', the steam editor. See if this works...

sed G your-file.txt