remote server not responding on my nokia 208

Member Avatar
Member Avatar
+0 forum 2

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's own metrics]([https://developer.apple.com/support/app-store/) some 79% of Apple mobile devices are using the latest iOS 10. Pretty good rates of adoption considering this version of the OS is only six months old. Now compare that to [Google's official figures](https://developer.android.com/about/dashboards/index.html) which reveal that as of March 2017 just 0.3% of Android devices are …

Member Avatar
Member Avatar
+4 forum 2

My van was built 15 years ago by Mazda in Japan as a multi-purpose 'people carrier' vehicle with the unlikely name of a Bongo. It has survived the years well, and I have now converted it into a camper van. Another 15 year old that travelled across the globe has not survived the passage time, and we can be thankful for that because I'm talking about the Love Bug. No, not Herbie the talking VW Beetle from those candy-sweet Disney films but rather a computer worm that spread like wildfire in May 2000. Also known as 'ILOVEYOU' thanks to the …

Member Avatar
Member Avatar
+3 forum 5

Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the usage of the lower export strength cipher without the user being aware and which impacts something like eight per cent of the top one million web domains and all the major web browser clients. Well almost, because Internet Explorer has already been patched (nice one Microsoft) with Firefox expected to …

Member Avatar
+2 forum 0

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser have moved one step closer to an Internet that encrypts all the world's traffic with a new feature that can cryptographically protect connections even when servers don't support HTTPS. The 'Opportunistic Encryption' (OE) feature essentially acts as a bridge between non-compliant plaintext HTTP connections and fully compliant and secure HTTPS …

Member Avatar
+1 forum 0

codes helpful

Member Avatar
Member Avatar
+0 forum 1

Suppose i have a 4 queens problem then i know what state space tree means but i am not able to get what does** solution space** mean?Also what is** difference between brute force and backtracking technique**s.I know that in backtracking if you don't get to a state whose bounded function is true ,we backtrack and that's how we build a solution and it requires much less states to reach to the problem.But we have to store the entire state space tree somewhere then inspite it takes less states to get to the solution what's the advantage comparing it with brute …

Member Avatar
Member Avatar
+0 forum 1

At the moment I am trying to decide which book to buy, there are many that I think would be very interesting, but some are most likely beyond me. The books in my list, along with my thoughts on them are: Concrete Mathematics (I believe this is probably too advanced for me at the moment, however I am revising mathematics and will want to pick this up in a few months) The art of computer programming volumes 1-4 (I have read many times that one should be familiar with the concepts in Concrete Mathematics before attempting to consume this book, …

Member Avatar
Member Avatar
+0 forum 13

I've been using these SEO tools lately for website analyses. SearchMetrics for its visibility features including graphics for clients, Ahrefs for backlinks info, Forecheck from cyberpromote for URL and content analysis, and Moz (formerly SEOMoz) for URL analysis. SEOlytics as well. All of these have free versions. I suggest to those of you looking for solutions, try these out. Any suggestions on favorite tools not in this list?

Member Avatar
Member Avatar
+0 forum 2

With no actual Halloween-based security threats to report, it looks like the security vendors have had no choice but to start reporting scary stuff that might happen to your data instead. While I have no qualms about genuine warnings to 'be careful out there' this Halloween, a little reminder about not clicking like an idiot on something stupid just because it is seasonally apt is never a bad thing, I do have a bit of a beef when that advice is wrapped up in a press release in order to get some column inches for the vendor concerned. I will …

Member Avatar
Member Avatar
+1 forum 1

All right stop, collaborate, and listen. A new variant of the ZeuS financial malware platform known as Ice. This baby Trojan spawned from the original Ice IX is targeting bank customers on both sides of the pond. Here in the UK the 'big three' telecommunications providers are where it is flowing like a harpoon, daily and nightly. One thing is for sure, this ain't no vanilla ice attack. [ATTACH=RIGHT]23731[/ATTACH]OK, rubbish pop rap references apart, this is actually quite a serious deal. The new Ice TX configurations are apparently not only stealing bank account data, as if that weren't bad enough. …

Member Avatar
Member Avatar
+0 forum 1

I have to create a system design for a cashier system. Most of the transactions would be payments for fees in a student account. Fees like Tuition, Books, Enrollment Fees. The problem with these fees are their special characteristics like Tuition fees being staggered in MONTHLY itemization (if that's a correct term), Books can also be staggered but payable throughout a year without itemization, and Enrollment Fees which consist of the Reg Fee and the Misc Fee (which is broken down into a bunch of items) both of these Enrollment Fees required for payed during enrollment. Other fees would be …

Member Avatar
Member Avatar
+0 forum 5

First we had the news that [URL="http://www.daniweb.com/news/story276878.html"]IBM was helping clean up crime[/URL] in the US and UK, now it seems that Sweden is getting a touch of the Big Blue Brother effect. The city of Stockholm is launching a project using IBM's streaming analytics technology in order to gather real-time information on, well, pretty much everything that moves. Working in collaboration with the [URL="http://www.kth.se/?l=en_UK"]KTH Royal Institute of Technology[/URL] the project is already gathering real-time data from the GPS devices installed in some 1500 taxi cabs and will soon add delivery trucks, traffic cameras, traffic light sensors, rail systems and weather …

Member Avatar
Member Avatar
+0 forum 1

new to I.T. need help about the problem analysis ,algorithm design, formatting the output package gasolinestation; import javax.swing.JOptionPane; public class GasolineStation { public static void main(String[] args) { float total, money; String yesno; JOptionPane.showMessageDialog(null, "Welcome to Gasoline Station!"); do { String select = JOptionPane.showInputDialog(null, "1 = Diesel .................... $ 39.00\n" + "2 = Unleaded .................... $ 49.95\n" + "3 = Extreme ................ $ 51.95\n" + "4 = Kerosene ................ $ 00.00\n\n" + "Enter the number of your choice:"); if("1".equals(select)) { String liter = JOptionPane.showInputDialog(null, "How many liters of Diesel?"); total = (float)(39.00*Float.parseFloat(liter)); JOptionPane.showMessageDialog(null, "Total price: $ "+total); String pera = …

Member Avatar
Member Avatar
+0 forum 3

Hi, I'm having trouble to filter a Customer Set by the date of his first buy(First Activity). I've tried this two ways: 1. Returns all customers, even with FirstActivity Null SELECT { [Measures].[Valor Item], [Measures].[First Activity] } ON 0, { Filter( { [CLIENTE].[Cliente].[Cliente].Members }, ( [Measures].[First Activity], [Time].[Year].&[2012-01-01T00:00:00] ).Count > 2 ) } ON 1 FROM [SCA] 2. Return customers that FirstActivity is not null but is outside the Year specified(In this case 2012). SELECT { [Measures].[Valor Item], [Measures].[First Activity] } ON 0, { NonEmpty( { [CLIENTE].[Cliente].[Cliente].Members }, ( [Measures].[First Activity], [Time].[Year].&[2012-01-01T00:00:00] ) ) } ON 1 FROM [SCA] Any …

Member Avatar
Member Avatar
+0 forum 1

Over the last couple of days the online media seems to have gone crazy for the news that the Google Chrome web browser client has overtaken Microsoft Internet Explorer to become the most popular browser on the planet. This based entirely upon the fact that, for a single week, and according to figures from the StatCounter service, Chrome reached a 32.76% share against the 31.94% share enjoyed by Internet Explorer. But does this really mean that Chrome is now the number one client, and should web developers be giving more design love to it than Internet Explorer as a result? …

Member Avatar
Member Avatar
+0 forum 5

For each part (A) (D) below, clearly indicate whether the runtime is O(log n) or O(n). Can someone please explain how this works? public class Q9f { public static void main(String[] args) { int n = ...; int[] a = new int[n]; // (A) for (int index = 0; index < a.length; ++index) a[index] = index; // (B) int index = 1; while (index < n) { a[index] = a[index] + a[index-1]; index *= 2; // index is doubled } // (C) for (int value: a) System.out.println(value); // (D) index = n-1; while (index > 0) { a[index] += 1; …

Member Avatar
Member Avatar
+0 forum 3

I have created a cube in visual studio, when i want to deploy it i get the following error: Error : The project could not be deployed to the 'USER-PC\SQLEXPRESSR2' server because of the following connectivity problems : A connection cannot be made to redirector. Ensure that 'SQL Browser' service is running. Can it be an analysis services problem, becouse i have it in the program files, but not in the sql configuration manager. Please help !!

Member Avatar
Member Avatar
+0 forum 2

[ATTACH=RIGHT]22544[/ATTACH]Three and a half years ago, DaniWeb was reporting how [URL="http://www.daniweb.com/hardware-and-software/networking/news/218954"]stolen credit cards could be purchased online[/URL] for as little as $10 per card, complete with a guarantee that the accounts behind the cards were active, when purchased in larger volumes. So how has the market changed since the start of 2008? It should come as no real surprise, given the number of high profile data breaches which have resulted in the loss of credit card information from online databases, that the underground cybercrime marketplace has become pretty saturated with credit cards for sale. And whenever a market gets saturated …

Member Avatar
Member Avatar
+1 forum 9

I started using Python a few weeks ago, something finally clicked and I started writing tools for my personal use. I started writing something with a GUI using GTK and the code lines started multiplying rapidly, so I thought to myself "Am I commenting my source to death? How many comments do I have?". Since I'm new to the language I wasn't really sure if I was going about everything the right way. At the time I had never heard of pycount or CLOC, I just found out about those two today after a google search. I think the authors …

Member Avatar
Member Avatar
+2 forum 9

Hi there, I am having trouble understand how they derive these running times for the code in the image below. [http://i.imgur.com/usK9U.jpg](null) I am having trouble especally with log n running times, how are they derived? especially the bottom left slide. If someone can shed some light on this, I would gladly appreciate it!!! Thanks in advance.

Member Avatar
Member Avatar
+0 forum 1

Hi all, I'm looking for a good tool for analysing Windows Server Event Logs. Basicaly, I want to be able to filter by types of entries or content, and search. If it has some smarts built in for things like highlighting suspicious behaviour that would be great too. I need to be able to monitor/review IIS activity and Active Directory access. Any recommendations? cheers /H

Member Avatar
Member Avatar
+1 forum 6

Hi, everybody I need to conduct a large amount of data analysis on database. Could anyone recommend an interactive application for data analysis? The requirements are: 1. Able to cope with the unexpected requirement rapidly. 2. Able to perform further computations on results interactively. 3. Easy to confront even a large amount of complex computations I tried SQL in the beginning but give up now because SQL does not provide the stepwise analysis capability like Excel. And Excel, It's too rough to solve the my problem.( should I give a discussible example ?) What would you great expert recommend? Thanks …

Member Avatar
Member Avatar
+0 forum 5

Hi, everybody I need to conduct a large amount of data analysis on database. Could anyone recommend an interactive application for data analysis? The requirements are: 1. Able to cope with the unexpected requirement rapidly. 2. Able to perform further computations on results interactively. 3. Easy to confront even a large amount of complex computations What would you great expert recommend? Thanks in advance.

Member Avatar
Member Avatar
+0 forum 5

Hi all, I have a project where I need to read in an image of a maze and use a graph data structure to find certain points in the maze to place nodes and trace edges. I plan to have the maze be in only two different colors. The walls/background as red and the maze path as white. My Problem: I'm not sure what I can do about parsing an image to find intersections, dead-ends, and turns to place nodes. If I recall, you can place each pixel of the image into a 2D array and search through the image …

Member Avatar
Member Avatar
+0 forum 2

Hi I’m analyzing keywords for my ad words campaign; this is the first time I’m running ad words for my site. So I’m a little bit confused with keywords selection, I’m using the Google keyword tool for keyword analyzing. In this tool which match type should I choose? In order to get better result Broad, Exact, Phrase.

Member Avatar
Member Avatar
+0 forum 5

Hi everyone This year i have to develop my final year project. Actually I'm thinking about a software that help people with music. it has several different parts as well as a "Testing" part. For this one I want to have sound input from the user via microphone and then analyze it, to find out info like which note it is and how long it lasted... Can someone please tell me what programming language does support sound analysis or what library I can use for it (for java for example).. I have done lots of searching but I could not …

Member Avatar
Member Avatar
+1 forum 3

I think it's just ging to be something stupid that I've missed since the program itself runs, though doesn't solve the decrypted text. I've included the text from the decrypted file below the code and any help would be great. [CODE]using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Frequency_Analysis { class Program { static void Main(string[] args) { //array to hold the english language letters char[] aLetter = { 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z' }; //variable that holds …

Member Avatar
Member Avatar
+0 forum 13

Assume that we have a mergesort algorithm which takes 2 series as an input and returns 1 after the merge each time. So that if we want to count say memory blocks we would need 2 blocks for the input and 1 for the output accordingly, total size of 3 blocks (3B). My question is whether this algorithm could run if the memory size is 2B + O(1)?

Member Avatar
Member Avatar
+0 forum 3

I see that there are many questions here regarding complexity analysis, specifically regarding the Big-O notation of algorithms. I will attempt to shed some light on the subject. I will start with an introduction, after which I will go over some common complexities and last we will solve a few simple examples for practice. [U][B]1. Introduction[/B][/U] When looking at the Algorithm, we want to know its order of growth regarding the input size given to it. Consider two simple algorithms that sort an array of [TEX]n[/TEX] cells. The first algorithm is doing [TEX]n[/TEX] operations in order to complete the sort, …

Member Avatar
Member Avatar
+13 forum 11

The End.