2,965 Topics
![]() | |
Hello. I'm not getting the desired output for my program. The problem is specifically in the file. I can get it to save and load but when I try displaying it, its gonna have a General Protection Exception error. Here's my code. Please help [code=c] #include<stdio.h> #include<conio.h> #include<string.h> #include<stdlib.h> #define … | |
Sir, I have feedback logs generated by systems in txt file for various programs. Given below one example ***************** Feedback Sheet, 50415301 - OME6110&6130 for I&C, date and time - Sat Jun 14 17:00:16 GMT+05:30 2008 Trainer - Xavier Course Duration - June 12-14 2008 TD I = 87.2 : … | |
I have a level 2 programming class i have to take for my major, even though i'm on the IT track and not programming. I struggle alot with programming and was looking to get pointed in the right direction. Below is the directions for my assignment but i honestly have … | |
One third of businesses totally fail to encrypt their sensitive data transfers. That's the conclusion of a new [URL="http://www.computerlinks.co.uk/products/ipswitch/download_library.cfm"]survey[/URL] into file transfer security which noted the huge disparities in attitudes towards data security in general and data security during transfer. According to the 2009 File Transfer Security Survey undertaken by … | |
Hi everyone! My name is Max and I’ve been an ABAP programmer for 6 years now. Since my work is closely connected with SAP I have to face the very same annoying problem pretty often. The thing is, sometimes it is vital important to know the base data model and … | |
Hi, The following code works well but the problem is it does noy reads the null values.For Example if csv file contains" Surendar,Java,maths,science,,history,english " Here the program reads the first four strings properly and for fifth string instead of reading null value it reads the next string. Please Correct the … | |
I'm trying to store or arrange three sets of two-dimensional data into three 2xN matrices that are stored as NumPy arrays. [CODE] 1. import os # for file handling functions 2. import numpy as np # for array/matrix processing 3. import matplotlib.pyplot as plt # for general plotting 4. from … | |
Sorry about a n00b question but I'm having trouble. I'm messing around with linked list to try to get a good handle on them for the program I have to write. The program below was intended to fill a link list with structures then print out each structure. Instead it … | |
Hi, I'm trying to get the IF\ELSE statement within the foreach to print "keyword," or if it's the last element in the array just to print "keyword" [CODE=php]$key = "mykey"; $url = "http://access.alchemyapi.com/calls/text/TextGetKeywords"; $text = <<<EOD Barrier Logic The barrier logic is a reliable cost effective solution to barrier electronics. … | |
i am developing a website in ASP.NET(VB) and SQL Server my website is basically a product based website in which visitors will come and buy products from my website they will be able to add different products in their carts, could to a good search for products listed in the … | |
Hi everyone, I have an [U]extremely complex topic[/U] to discuss/ask about. I'm hoping what I have already done is the WRONG way to do it, so that I can implement a more simplistic approach to this issue. To start, here is some background information on my project. I want to … | |
Hello Friends, I have a huge program having multiple malloc & free. At the end of my program, I wish to print the memory leak which has occured. There are obviously many solutions to this problem. e.g. Simplest one: 1) When you allocate the memory, keep the allocated memory pointer … | |
First off, I am kind of new to database design, so please take that into account. I have a project that I am working on for my work place. It's something to make my life easier. I'm a new parts man at a diesel mechanics shop. They have hundreds of … | |
Hello all, I am working on a Java project which uses mysql for database. I want to design code for a data loading module which will define database schema and consume actual data. I want to know whether there is any way to run this load data infile command dynamically? … | |
Hi, I have posted about receiving email before and this is a follow up of my progress. I have only one form and it consists of 2 buttons, one for downloading messages from the server, the other, to disconnect the connection. I also have one listview and one textbox to … | |
Am I surprised that many 'IT Security Professionals' appear to have had a common-sense bypass when it comes to the security of their own mobile devices? Nah, not really. Look, we already know that [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/11/88-percent-of-web-users-are-morons/"]88 percent of web users are morons[/URL] and [URL="http://happygeeknewmedia.blogspot.com/2009/06/are-you-stupid-it-administrator.html"]93 percent of IT Admins are idiots[/URL] so … | |
This is a good idea. Not for the first time the American President is keeping his earlier word. This time he is appointing a [URL="http://news.bbc.co.uk/1/hi/world/americas/8073654.stm"]Cyber Tsar[/URL]. This, it strikes me, is an excellent idea. In the UK we have a data protection commission and a commissioner in charge of that. … | |
I wonder if the [URL="http://www.linuxfoundation.org"]Linux Foundation[/URL] is prepared to go to task for us, the Linux users, the Linux supporters, the Linux developers and the Linux Foundation members? I wonder if they are our [URL="http://www.nra.org"]National Rifle Association[/URL] (NRA)? I wonder if the Linux Foundation is prepared to meet the challenges … | |
There's an interesting article over at [URL="http://www.pcworld.com/businesscenter/article/161270/social_networks_risks_for_business_security.html"]PCWorld[/URL] this week suggesting that social networking Web sites are putting businesses at risk for security breaches. Author Howard Price says now that it's possible to link personal accounts like Twitter and Facebook to accounts at career-oriented sites like LinkedIn, a single status message … | |
Though it hasn't gotten as much attention, one of the biggest recipients of largesse from President Barack Obama's stimulus package is the health care information technology industry. The bill requires utilization of electronic health care records for everyone in the U.S. by 2014, when only about 28 percent of health … | |
It occurs to me that I've been talking a lot on this blog about data going missing here in the UK. I've given our Government and various people a hard time - if they cared what I said it'd hurt. I've said these things are managerial rather than technical. And … | |
I shudder when I look at some of the losses there have been in data and then the amount of people who complain that it's all down to computers. Here's a big secret; it isn't. Late last years someone bought a system on eBay which had loads of private information … | |
If you ever wondered just what it takes to look for aliens, then prepare to get informed. Sure, you might imagine it doesn't take much more than hooking up a load of computers to form a gigantic zombie network which, for a change, does not use spare CPU cycles to … | |
Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand … | |
I don't know the extent to which this story has crossed the shores to America, but our local friendly far-right political party the British National Party has had details of its members published on the Internet. I'm not going to rehearse their arguments for them - you know the sort … | |
Two weeks ago I was asked a question to which, given my occupation, I should have known the answer. The question was: “How many software testers are there?” Being editor of a magazine about software testing, that's a number I should have know cold. At the time, I offered an … | |
With the gadgets sadly lacking from the latest James Bond movie, Quantum of Solace, I am glad to report that a British company that specializes in bringing unlikely innovation to market has stood up and been counted to fill the gap. Virtuity has today announced it has developed self-destruct technology … | |
Some are feeling the pinch of the credit crunch and cutting their spending accordingly, others continue to spend, spend, spend. Symantec would appear to fall into the latter category as it has announced a definitive agreement to acquire online messaging and Web security specialist MessageLabs for a purchase price of … | |
How on earth can you 'lose' the names, addresses, dates of birth, email addresses and, one has to assume, the mobile phone numbers of some 17 million of your customers? It's a good question, and to get the answer you might want to shout it in the direction of T-Mobile … | |
I've been doing a piece lately that's involved me talking to a number of IT support types and they're all coming out with similar comments and views: too many managers, they're saying, are declaring that something is an IT issue when actually it's no such thing, it's a management thing. … | |
According to VeriSign, more than half of the Internet using people on the planet can get protection from an EV SSL-enabled web browser. Protection, that is, from data and identity theft. According to Net Applications, as revealed in their latest Web browser market share report, a total of 52.8 percent … | |
In an example of throwing the bathwater out with the baby, a number of ISPs are dropping the alt.* hierarchy, or Usenet altogether, ostensibly to comply with a demand from New York Attorney General Andrew Cuomo that they [URL="http://www.daniweb.com/blogs/entry2584.html"]rid the Internet of child pornography[/URL]. Some observers, including the [URL="http://www.zeropaid.com/news/9638/EFF+-+Blocking+UseNets+Alt+Hierarchy+Would+Violate+First+Amendment"]Electronic Frontier … | |
[URL="http://www.theinquirer.net/gb/inquirer/news/2008/07/04/hundreds-thousands-laptops-left"]According to The Inquirer[/URL] a new report by the Ponemon Institute, rather appropriately sponsored by Dell, has revealed that an astonishing number of laptops are lost at airports across the United States on a weekly basis. Asking questions of 800 business travellers at some 106 major airports in the US, … | |
Sometimes I am left almost loss for words, and today is one of them. Judge Louis Stanton gave a ruling in the federal court for the Southern District of New York which has, quite frankly, dismissed the right to privacy of anyone who has ever watched a video clip on … | |
Remember the big fuss that spread all over the world when HM Revenue and Customs, the UK government department that deals with income tax and the like, managed to lose discs containing the financial details of 25 million people? amazingly, the official Independent Police Complaints Commission enquiry into the shameful … | |
[I]All of us might wish at times that we lived in a more tranquil world, but we don't. And if our times are difficult and perplexing, so are they challenging and filled with opportunity.[/I] ~Robert Kennedy Bobby Kennedy undoubtedly wasn’t thinking about global warming when he made this statement all … | |
According to the UK government, new proposals within the [URL="http://www.commonsleader.gov.uk/output/page2461.asp"]Communications Data Bill[/URL] are being put forward in order to prevent and detect crime as well as protect national security. The government argues that unless legislation is amended to reflect changes in technology, the ability of public authorities to counter criminal … | |
[URL="http://news.yahoo.com/s/pcworld/20080408/tc_pcworld/144243"]News is breaking[/URL] that the European Commission could push for laws to restrict the personal search data held by search companies to no longer than six months, after which it must be discarded. The EC Article 29 data Protection Working Party seems to be heading for a confrontation with search … | |
Last year I [URL="http://www.daniweb.com/blogs/entry1466.html"]exposed[/URL] a security breach involving the online collection of applications for visa documents allowing Indian citizens to visit the UK, an expose that ended up with the [URL="http://www.daniweb.com/blogs/entry1817.html"]UK government itself being found guilty[/URL] of breaking the Data Protection Act and which kick-started something of a sea change … | |
It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, … | |
For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, … | |
[B]A picture may be worth a thousand words, but it could also hide something more treacherous. [/B] Today, businesses wanting to guard against the potentially ultra-serious hazard of vitally important data being deliberately leaked to unauthorised people outside or even inside the organisation, need to get to grips with an … | |
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … | |
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … | |
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … | |
What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among … | |
Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is … | |
It doesn’t really matter where you live in the world, the chances are that your country has been hit by some high profile data loss scandal during the course of the last year or so. Everything from retail operations such as TJ Maxx losing the odd 40 million or so … | |
[URL="http://www.nochex.com"]Nochex[/URL] has been providing secure online payment services to small and medium businesses in the UK ever since 2001. It seems to take security seriously, as anyone dealing with your money should, with encrypted data transfers, encrypted data storage and servers at the same highly secure location as used by … | |
[URL="http://john.jubjubs.net/2007/11/27/mozilla-firefox-market-share/"]According to John Lilly[/URL], the Firefox web browser has 126 million unique monthly users. A figure extrapolated from an Active Daily Users number of 48 million, itself a massive increase on the 23 million ADU figure from this time last year. So who is John Lilly and why should we … |
The End.