Menu
Menu
DaniWeb
Log In
Sign Up
Read
Contribute
Meet
Search
Search
About 1,000 results for
attack
- Page 1
Re: Online subission forms not sending emails of submitted info
Programming
Web Development
1 Week Ago
by Dani
…. You are leaving yourself wide open to an HTML injection
attack
. Not only that, but you're also leaving yourself open…
Re: Fantastic word game
Community Center
Geeks' Lounge
17 Years Ago
by The Dude
Attack
now!
Re: RPG Battle Algorithms
Programming
Game Development
14 Years Ago
by SlayingSoul
…value assigned to the character himself, an overall
attack
power rating should be found once the option…to be dealt by the player's physical
attack
, the target's overall defense should be taken…as not to give the player a huge
attack
by mistake and instead allows it to … least there's a small bit of the
attack
algorithm for you. Enjoy, if you found …
Re: Word Association Game
Community Center
Geeks' Lounge
17 Years Ago
by mattyd
attack
--> repel
Re: The End of Humanity
Community Center
Geeks' Lounge
14 Years Ago
by vmanes
Attack
of the killer zombies. That's what's gonna do us in.
Re: Weird Python Programming
Programming
Software Development
13 Years Ago
by TrustyTony
Attack
the task line by line in python command line. Don't get confused with define, as python has not definition, you just pick up one small number from your head for the variable After success in command line write the successfull lines to file and prove to run it and to get same results as interactively. Just start it and don't be afraid!
Re: attack function not altering stats
Programming
Software Development
13 Years Ago
by sfuo
…d1, d2; attackPTR( &d1, &d2 ); //using pointer
attack
function cout << "d1: " << d1….getHealth() << endl; attackREF(d1, d2); //using reference
attack
function cout << "d1: " <<… } [/CODE] I put in both pointer and ref
attack
functions to show that they do the exact same thing…
Re: attack function not altering stats
Programming
Software Development
13 Years Ago
by PhysicsExpert
… += 5;}; void setlvl(int level){ lvl = level; }; void
attack
(dragon*, dragon*); }; dragon::dragon(string str,int level) { name…lt; 0) { hp = 0; setout(true); } } void dragon::
attack
(dragon *d1, dragon *d2) { if(d1->getdef() <… = &d1; dragon *pd = &d2; pt->
attack
(pt, pd); cout << "onehp: " &…
Re: attack function not altering stats
Programming
Software Development
13 Years Ago
by PhysicsExpert
The problem is that you copy pasted too much...in the
attack
function void dragon::setatk()...take a look.
Attack
never gets initialized. Also what if the att and def for two dragons are the same? Fix that as well.
attack function not altering stats
Programming
Software Development
13 Years Ago
by writerervin
…. this is the code for the function. [CODE=c]void
attack
(dragon *d1, dragon *d2) { if(d1->getdef() < d2…
Re: attack function not altering stats
Programming
Software Development
13 Years Ago
by writerervin
this is the code to alter the hp. [CODE]void dragon::changehp(int s) { if((hp + s) != hpmax) { hp += s; }else if(hp < 0) { hp = 0; setout(true); } }[/CODE] do you think it would be better to use reference in the
attack
function?
Re: attack function not altering stats
Programming
Software Development
13 Years Ago
by writerervin
i see what your saying. i went back and fixed that. but its still not altering the hp of the dragon. also altered the
attack
function to show which dragon won, the calculations look right but there is still no change in the hp
Introducing the DDDoSA: Disguised DDoS Attack
Hardware and Software
Networking
10 Years Ago
by happygeek
…attacks-and-breaches/bitcoin-password-grab-disguised-as-ddos-
attack
----/d/d-id/1112919) the site was actually targeted…more adversaries just put together a multi faceted compostable
attack
and instead of having to have all this …standard, or panicked, practices to deal with the ongoing
attack
. Things such as disabling their IDS platform for example.…
WARNING: Credit Card Hack Attack
Hardware and Software
Information Security
14 Years Ago
by happygeek
…researchers in question, have apparently tested the 'wedge'
attack
scenario against cards issued by most of the mainstream… description. As I understand it, the wedge
attack
involves attaching a circuit board with a chip/transmitter…that pin verified transactions are secure. Given this
attack
demonstrates a clear method of bypassing the pin system…
Who is behind the Tor relay attack?
Hardware and Software
Networking
9 Years Ago
by happygeek
…org/blog/tor-security-advisory-relay-early-traffic-confirmation-
attack
) which revealed that a group of relays had…to deanonymize users." The advisory states that the
attack
"involved modifying Tor protocol headers to do … regard to users of the TOR network. This
attack
involved manipulating TOR protocol messages to encode information about…
Re: Introducing the DDDoSA: Disguised DDoS Attack
Hardware and Software
Networking
10 Years Ago
by RikTelner
…service (DoS) or distributed denial-of-service (DDoS)
attack
is an attempt to make a machine or network … out, motives for, and targets of a DoS
attack
may vary, it generally consists of efforts to temporarily…reference to CPU resource management. One common method of
attack
involves saturating the target machine with external communications requests…
The 40 Gbps DDoS attack
Hardware and Software
Networking
15 Years Ago
by happygeek
…2001. Even at the lower end of the sustained
attack
scale, some 36 percent of survey respondents have …figures. And, of course, a 1 Gbps sustained DDoS
attack
is damaging enough. Danny McPherson, chief security officer for… Arbor Networks told us "The growth in
attack
size continues to significantly outpace the corresponding increase in…
Re: Introducing the DDDoSA: Disguised DDoS Attack
Hardware and Software
Networking
10 Years Ago
by robert02
Sir can you tell me how a ddos
attack
is done whats the thing behind it how does it happens
Fighting a 25 million packets-per-second DDoS attack
Hardware and Software
Networking
12 Years Ago
by happygeek
…has been targeted by a botnet which launched a DDoS
attack
of unprecedented magnitude. According to Distributed Denial of Service…typically. Now consider that the volume of this DDoS
attack
using TCP SYN Floods and ICMP Floods reached 25… 'scrubbing' network centers. Sop warns that this massive
attack
in Asia could be "an early warning beacon …
Chinese Mac attack aims weaponised files at Apple users. Meh!
Hardware and Software
macOS
11 Years Ago
by happygeek
An ongoing
attack
aimed at users of the Apple Mac platform is being ….jpg "align-right") The researchers suspect that the
attack
stems from the same anti-Tibetan, pro-Chinese, hacking group… how much of a threat this latest in the wild
attack
actually is though, considering that for a start any Mac…
How to disable SIM-killing USSD PUK attack that has spread to all Androids
Programming
Mobile Development
11 Years Ago
by happygeek
…Samsung Galaxy S III that are vulnerable to this particular
attack
, or indeed just Samsung handsets at all as first …. According to several IT security researchers, a new USSD
attack
variant is out there which works on a huge number… are all vulnerable to this new variant USSD SIM PUK
attack
. At the moment, considering that very few Android devices…
Goodwill attack confirmed; 868,000 credit cards could be compromised
Digital Media
Digital Marketing
9 Years Ago
by happygeek
…breached. This follows a previous announcement of a potential
attack
back in July. After an extensive forensic investigation …and an estimated 868,000 payment cards compromised. The
attack
took place between February 10, 2013, and August 14… were not exposed to such a long period of
attack
. Details of those store locations that were impacted,…
How can I prevent a XSS attack but allow user to post iframe and img
Programming
Web Development
10 Years Ago
by woodenduck
How can I prevent a XSS
attack
but allow user to post iframe and img? My page is php based but I allow users to submit text and have allowed only iframes and imgs with strip_tag How do I prevent a user from launching an xss
attack
?
word document virus attack, i suspect
Hardware and Software
Microsoft Windows
10 Years Ago
by gikonyo
when i was saving my word document, it sudenly changed to some languge i cannot understand i guess it is chinese language. I suspect it could be virus
attack
. please help on how to recover my document back to english.
Attack of a " rdriv.sys" virus
Hardware and Software
Information Security
17 Years Ago
by cheong101
… browsing the web today, my anti-virus software detected an
attack
of a " rdriv.sys" virus.It's in…
Re: World Cup Hack Attack
Community Center
Geeks' Lounge
9 Years Ago
by Agilemind
… World Series). I don't understand the point of this
attack
. What are they protesting? If they are protesting the Brazillian…
Internet problems, seemingly caused by DoS attack?
Hardware and Software
Networking
10 Years Ago
by Fireprufe15
…: Down] Tuesday, June 25,2013 03:29:37 [DoS
attack
: ACK Scan] from source: 46.137.99.53:5223, …Internet disconnected] Tuesday, June 25,2013 02:37:31 [DoS
attack
: ACK Scan] from source: 50.22.231.48:443, …: Down] Tuesday, June 25,2013 00:19:36 [DoS
attack
: ACK Scan] from source: 189.69.132.230:60808, …
Re: Internet problems, seemingly caused by DoS attack?
Hardware and Software
Networking
10 Years Ago
by JorgeM
… those packets because they are being flagged as a potential
attack
, and dropping them. I wouldnt worry about it because …your connection. If you were the subject of a DOS
attack
, you would likely be unable to use your internet …connection at all during the
attack
. In addition, rather than seeing these packets one or …
Editing attack.php script to add more items
Programming
Web Development
12 Years Ago
by DarkBerzerk
…($_GET['ID'] == $userid) { print "Only the crazy
attack
themselves."; $h->endpage(); exit; } else if ($ir…attackdmg']=0; } else { print "You can only
attack
someone when you have 50% energy"; $h->… != $odata['location']) { print "You can only
attack
someone in the same location!"; $h->endpage(); …
Game Over: Battlefield 3 DDoS attack
Programming
Game Development
10 Years Ago
by happygeek
… Battlefield 3 was taken offline by a DDoS
attack
earlier this week. ![686769632c0359434ae750190e515bbb](/attachments/large/0/…the motives are unclear, the focus of the
attack
has been interference with network communications preventing access…that the Brobot botnet was being used to
attack
online RPGs rather than the more usual banking…
1
2
3
17
Next
Last
Search
Search
Forum Categories
Hardware/Software
Programming
Digital Media
Community Center
Latest Content
Newest Topics
Latest Topics
Latest Posts
Latest Comments
Top Tags
Topics Feed
Social
Meet People
Forums
Top Members
Community Functions
DaniWeb Premium
Newsletter Archive
Markdown Syntax
Community Rules
Developer APIs
Connect API
Forum API Docs
Tools
SEO Backlink Checker
Legal
Terms of Service
Privacy Policy
FAQ
About Us
Advertise
Contact Us
© 2024 DaniWeb® LLC