2,965 Topics

Member Avatar for
Member Avatar for Whilliam

Hello. I'm not getting the desired output for my program. The problem is specifically in the file. I can get it to save and load but when I try displaying it, its gonna have a General Protection Exception error. Here's my code. Please help [code=c] #include<stdio.h> #include<conio.h> #include<string.h> #include<stdlib.h> #define …

Member Avatar for Tom Gunn
0
151
Member Avatar for Bhavanajoshi

Sir, I have feedback logs generated by systems in txt file for various programs. Given below one example ***************** Feedback Sheet, 50415301 - OME6110&6130 for I&C, date and time - Sat Jun 14 17:00:16 GMT+05:30 2008 Trainer - Xavier Course Duration - June 12-14 2008 TD I = 87.2 : …

Member Avatar for happygeek
0
187
Member Avatar for rstep21

I have a level 2 programming class i have to take for my major, even though i'm on the IT track and not programming. I struggle alot with programming and was looking to get pointed in the right direction. Below is the directions for my assignment but i honestly have …

Member Avatar for wheel
0
118
Member Avatar for happygeek

One third of businesses totally fail to encrypt their sensitive data transfers. That's the conclusion of a new [URL="http://www.computerlinks.co.uk/products/ipswitch/download_library.cfm"]survey[/URL] into file transfer security which noted the huge disparities in attitudes towards data security in general and data security during transfer. According to the 2009 File Transfer Security Survey undertaken by …

0
337
Member Avatar for mainoffender

Hi everyone! My name is Max and I’ve been an ABAP programmer for 6 years now. Since my work is closely connected with SAP I have to face the very same annoying problem pretty often. The thing is, sometimes it is vital important to know the base data model and …

-1
49
Member Avatar for AbiSuren

Hi, The following code works well but the problem is it does noy reads the null values.For Example if csv file contains" Surendar,Java,maths,science,,history,english " Here the program reads the first four strings properly and for fifth string instead of reading null value it reads the next string. Please Correct the …

Member Avatar for roswell67
0
207
Member Avatar for csgirlie

I'm trying to store or arrange three sets of two-dimensional data into three 2xN matrices that are stored as NumPy arrays. [CODE] 1. import os # for file handling functions 2. import numpy as np # for array/matrix processing 3. import matplotlib.pyplot as plt # for general plotting 4. from …

Member Avatar for woooee
0
317
Member Avatar for ellimist14

Sorry about a n00b question but I'm having trouble. I'm messing around with linked list to try to get a good handle on them for the program I have to write. The program below was intended to fill a link list with structures then print out each structure. Instead it …

Member Avatar for ellimist14
0
116
Member Avatar for cybershark

Hi, I'm trying to get the IF\ELSE statement within the foreach to print "keyword," or if it's the last element in the array just to print "keyword" [CODE=php]$key = "mykey"; $url = "http://access.alchemyapi.com/calls/text/TextGetKeywords"; $text = <<<EOD Barrier Logic The barrier logic is a reliable cost effective solution to barrier electronics. …

Member Avatar for cybershark
0
127
Member Avatar for IAMEMINEM

i am developing a website in ASP.NET(VB) and SQL Server my website is basically a product based website in which visitors will come and buy products from my website they will be able to add different products in their carts, could to a good search for products listed in the …

Member Avatar for IAMEMINEM
0
112
Member Avatar for BlackPhoenix

Hi everyone, I have an [U]extremely complex topic[/U] to discuss/ask about. I'm hoping what I have already done is the WRONG way to do it, so that I can implement a more simplistic approach to this issue. To start, here is some background information on my project. I want to …

Member Avatar for BlackPhoenix
0
110
Member Avatar for vivekarora

Hello Friends, I have a huge program having multiple malloc & free. At the end of my program, I wish to print the memory leak which has occured. There are obviously many solutions to this problem. e.g. Simplest one: 1) When you allocate the memory, keep the allocated memory pointer …

Member Avatar for vivekarora
0
283
Member Avatar for incomer

First off, I am kind of new to database design, so please take that into account. I have a project that I am working on for my work place. It's something to make my life easier. I'm a new parts man at a diesel mechanics shop. They have hundreds of …

0
74
Member Avatar for rajuchacha007

Hello all, I am working on a Java project which uses mysql for database. I want to design code for a data loading module which will define database schema and consume actual data. I want to know whether there is any way to run this load data infile command dynamically? …

0
52
Member Avatar for milhero

Hi, I have posted about receiving email before and this is a follow up of my progress. I have only one form and it consists of 2 buttons, one for downloading messages from the server, the other, to disconnect the connection. I also have one listview and one textbox to …

Member Avatar for milhero
0
280
Member Avatar for happygeek

Am I surprised that many 'IT Security Professionals' appear to have had a common-sense bypass when it comes to the security of their own mobile devices? Nah, not really. Look, we already know that [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/11/88-percent-of-web-users-are-morons/"]88 percent of web users are morons[/URL] and [URL="http://happygeeknewmedia.blogspot.com/2009/06/are-you-stupid-it-administrator.html"]93 percent of IT Admins are idiots[/URL] so …

0
124
Member Avatar for GuyClapperton

This is a good idea. Not for the first time the American President is keeping his earlier word. This time he is appointing a [URL="http://news.bbc.co.uk/1/hi/world/americas/8073654.stm"]Cyber Tsar[/URL]. This, it strikes me, is an excellent idea. In the UK we have a data protection commission and a commissioner in charge of that. …

0
222
Member Avatar for khess

I wonder if the [URL="http://www.linuxfoundation.org"]Linux Foundation[/URL] is prepared to go to task for us, the Linux users, the Linux supporters, the Linux developers and the Linux Foundation members? I wonder if they are our [URL="http://www.nra.org"]National Rifle Association[/URL] (NRA)? I wonder if the Linux Foundation is prepared to meet the challenges …

Member Avatar for admoore
0
218
Member Avatar for Lisa Hoover

There's an interesting article over at [URL="http://www.pcworld.com/businesscenter/article/161270/social_networks_risks_for_business_security.html"]PCWorld[/URL] this week suggesting that social networking Web sites are putting businesses at risk for security breaches. Author Howard Price says now that it's possible to link personal accounts like Twitter and Facebook to accounts at career-oriented sites like LinkedIn, a single status message …

0
162
Member Avatar for slfisher

Though it hasn't gotten as much attention, one of the biggest recipients of largesse from President Barack Obama's stimulus package is the health care information technology industry. The bill requires utilization of electronic health care records for everyone in the U.S. by 2014, when only about 28 percent of health …

0
201
Member Avatar for GuyClapperton

It occurs to me that I've been talking a lot on this blog about data going missing here in the UK. I've given our Government and various people a hard time - if they cared what I said it'd hurt. I've said these things are managerial rather than technical. And …

Member Avatar for GuyClapperton
0
194
Member Avatar for GuyClapperton

I shudder when I look at some of the losses there have been in data and then the amount of people who complain that it's all down to computers. Here's a big secret; it isn't. Late last years someone bought a system on eBay which had loads of private information …

Member Avatar for Rashakil Fol
0
150
Member Avatar for happygeek

If you ever wondered just what it takes to look for aliens, then prepare to get informed. Sure, you might imagine it doesn't take much more than hooking up a load of computers to form a gigantic zombie network which, for a change, does not use spare CPU cycles to …

0
185
Member Avatar for GuyClapperton

Forgive the guffaws of uncontrolled laughter from over here. I've just seen that the US Government - January Obama edition - is considering making IT security a matter for its specific attention and put someone in charge of Cybercrime. So why the laughter from the UK? Yes, I can understand …

0
149
Member Avatar for GuyClapperton

I don't know the extent to which this story has crossed the shores to America, but our local friendly far-right political party the British National Party has had details of its members published on the Internet. I'm not going to rehearse their arguments for them - you know the sort …

0
209
Member Avatar for EddieC

Two weeks ago I was asked a question to which, given my occupation, I should have known the answer. The question was: “How many software testers are there?” Being editor of a magazine about software testing, that's a number I should have know cold. At the time, I offered an …

0
513
Member Avatar for newsguy

With the gadgets sadly lacking from the latest James Bond movie, Quantum of Solace, I am glad to report that a British company that specializes in bringing unlikely innovation to market has stood up and been counted to fill the gap. Virtuity has today announced it has developed self-destruct technology …

0
231
Member Avatar for happygeek

Some are feeling the pinch of the credit crunch and cutting their spending accordingly, others continue to spend, spend, spend. Symantec would appear to fall into the latter category as it has announced a definitive agreement to acquire online messaging and Web security specialist MessageLabs for a purchase price of …

0
194
Member Avatar for happygeek

How on earth can you 'lose' the names, addresses, dates of birth, email addresses and, one has to assume, the mobile phone numbers of some 17 million of your customers? It's a good question, and to get the answer you might want to shout it in the direction of T-Mobile …

0
168
Member Avatar for GuyClapperton

I've been doing a piece lately that's involved me talking to a number of IT support types and they're all coming out with similar comments and views: too many managers, they're saying, are declaring that something is an IT issue when actually it's no such thing, it's a management thing. …

Member Avatar for harry4321
0
332
Member Avatar for newsguy

According to VeriSign, more than half of the Internet using people on the planet can get protection from an EV SSL-enabled web browser. Protection, that is, from data and identity theft. According to Net Applications, as revealed in their latest Web browser market share report, a total of 52.8 percent …

Member Avatar for Tim Callan
0
178
Member Avatar for slfisher

In an example of throwing the bathwater out with the baby, a number of ISPs are dropping the alt.* hierarchy, or Usenet altogether, ostensibly to comply with a demand from New York Attorney General Andrew Cuomo that they [URL="http://www.daniweb.com/blogs/entry2584.html"]rid the Internet of child pornography[/URL]. Some observers, including the [URL="http://www.zeropaid.com/news/9638/EFF+-+Blocking+UseNets+Alt+Hierarchy+Would+Violate+First+Amendment"]Electronic Frontier …

Member Avatar for khess
0
188
Member Avatar for happygeek

[URL="http://www.theinquirer.net/gb/inquirer/news/2008/07/04/hundreds-thousands-laptops-left"]According to The Inquirer[/URL] a new report by the Ponemon Institute, rather appropriately sponsored by Dell, has revealed that an astonishing number of laptops are lost at airports across the United States on a weekly basis. Asking questions of 800 business travellers at some 106 major airports in the US, …

Member Avatar for jwenting
0
182
Member Avatar for newsguy

Sometimes I am left almost loss for words, and today is one of them. Judge Louis Stanton gave a ruling in the federal court for the Southern District of New York which has, quite frankly, dismissed the right to privacy of anyone who has ever watched a video clip on …

Member Avatar for casper_wang
0
206
Member Avatar for happygeek

Remember the big fuss that spread all over the world when HM Revenue and Customs, the UK government department that deals with income tax and the like, managed to lose discs containing the financial details of 25 million people? amazingly, the official Independent Police Complaints Commission enquiry into the shameful …

0
162
Member Avatar for Techwriter10

[I]All of us might wish at times that we lived in a more tranquil world, but we don't. And if our times are difficult and perplexing, so are they challenging and filled with opportunity.[/I] ~Robert Kennedy Bobby Kennedy undoubtedly wasn’t thinking about global warming when he made this statement all …

Member Avatar for Techwriter10
0
367
Member Avatar for happygeek

According to the UK government, new proposals within the [URL="http://www.commonsleader.gov.uk/output/page2461.asp"]Communications Data Bill[/URL] are being put forward in order to prevent and detect crime as well as protect national security. The government argues that unless legislation is amended to reflect changes in technology, the ability of public authorities to counter criminal …

Member Avatar for Cybulski
0
361
Member Avatar for happygeek

[URL="http://news.yahoo.com/s/pcworld/20080408/tc_pcworld/144243"]News is breaking[/URL] that the European Commission could push for laws to restrict the personal search data held by search companies to no longer than six months, after which it must be discarded. The EC Article 29 data Protection Working Party seems to be heading for a confrontation with search …

Member Avatar for Maulth
0
161
Member Avatar for happygeek

Last year I [URL="http://www.daniweb.com/blogs/entry1466.html"]exposed[/URL] a security breach involving the online collection of applications for visa documents allowing Indian citizens to visit the UK, an expose that ended up with the [URL="http://www.daniweb.com/blogs/entry1817.html"]UK government itself being found guilty[/URL] of breaking the Data Protection Act and which kick-started something of a sea change …

0
184
Member Avatar for happygeek

It has been estimated that something in the region of 70 percent of the ATMs in current use are based not on the proprietary hardware, software and communication protocol platforms of old but instead on PC/Intel hardware and commodity operating systems, the most popular being Windows XP embedded. In fact, …

Member Avatar for ShaneW
0
1K
Member Avatar for Michael_Knight

For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, …

Member Avatar for kris2000
0
185
Member Avatar for Michael_Knight

[B]A picture may be worth a thousand words, but it could also hide something more treacherous. [/B] Today, businesses wanting to guard against the potentially ultra-serious hazard of vitally important data being deliberately leaked to unauthorised people outside or even inside the organisation, need to get to grips with an …

0
72
Member Avatar for Michael_Knight

[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It …

Member Avatar for Elina Tsai
0
357
Member Avatar for Michael_Knight

If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question …

0
138
Member Avatar for Michael_Knight

In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and …

0
283
Member Avatar for Michael_Knight

What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among …

0
127
Member Avatar for Michael_Knight

Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is …

0
50
Member Avatar for newsguy

It doesn’t really matter where you live in the world, the chances are that your country has been hit by some high profile data loss scandal during the course of the last year or so. Everything from retail operations such as TJ Maxx losing the odd 40 million or so …

0
146
Member Avatar for happygeek

[URL="http://www.nochex.com"]Nochex[/URL] has been providing secure online payment services to small and medium businesses in the UK ever since 2001. It seems to take security seriously, as anyone dealing with your money should, with encrypted data transfers, encrypted data storage and servers at the same highly secure location as used by …

0
194
Member Avatar for happygeek

[URL="http://john.jubjubs.net/2007/11/27/mozilla-firefox-market-share/"]According to John Lilly[/URL], the Firefox web browser has 126 million unique monthly users. A figure extrapolated from an Active Daily Users number of 48 million, itself a massive increase on the 23 million ADU figure from this time last year. So who is John Lilly and why should we …

0
171

The End.