Posts
 
Reputation
Joined
Last Seen
Ranked #91
Strength to Increase Rep
+11
Strength to Decrease Rep
-2
96% Quality Score
Upvotes Received
231
Posts with Upvotes
184
Upvoting Members
102
Downvotes Received
7
Posts with Downvotes
7
Downvoting Members
7
53 Commented Posts
~335.74K People Reached
Favorite Tags

560 Posted Topics

Member Avatar for Slavi

Modern web browsers will employ encryption, though it isn't really helpfull withiout a master password. See your web browsers specific documentation for details.

Member Avatar for Dani
0
119
Member Avatar for Reverend Jim

I don't understand how it could be so hard to hire someone who atleast understands a little terminology. Every. Line. of this hurt. http://www.youtube.com/watch?v=O2rGTXHvPCQ

Member Avatar for Reverend Jim
10
3K
Member Avatar for Duki
Member Avatar for Dani
22
17K
Member Avatar for sylvia.roymccormick

In my opinion, understanding how attacks work is more important then the software used to protect yourself with. For higher security, understanding how to implement attacks of all kinds (from social engineering, to exploiting weak cryptography) and being adept at inventing new attacks will vastly improve your security over what …

Member Avatar for Reverend Jim
0
659
Member Avatar for jozz3
Member Avatar for Thomas_21

As much as I hate taking dreams apart peice by peice, I feel like I need to serve the truth. > My theory is that ternary computers are infintely better than binary and will last longer Scientists would back it up, and would not use the phrase "infinetly better". So …

Member Avatar for david_158
0
1K
Member Avatar for Kaushalya15

If you'd like to share code, consider using the sites "snippits" system. If you have a question, then recreate the problem with a few lines of code, and ask a question (and include the input and the output).

Member Avatar for Yashwanth_1
0
8K
Member Avatar for pato wlmc

Hi abako4. Please start a new thread rather then hijacking someone elses. If you just want to get straight into making software, then there are definatly a lot of possibilities. I would guess that C, Java, C++, Python and C# are some of the most popular (in that order-ish). However, …

Member Avatar for Reverend Jim
0
10K
Member Avatar for ckide

Well, "careers" would know several languages well and be able to pick up most practical languages on the spot. If you're an employer, and you see someone who only programs in C++ vs. someone who programs in serveral languages and has experience in various feilds of computing, then you probably …

Member Avatar for rubberman
0
483
Member Avatar for Nikhar

Try cheating. More fun. [CODE]cout<<"This is an example to print \\n and "<<(char)34<<(char)32<<(char)34;[/CODE]

Member Avatar for rubberman
0
2K
Member Avatar for Saluki

Also, If you encrypt a partition/system, you will: 1) Decrpyt volume with Truecrypt. 2) Encrypt volume with Veracrypt. Veracrypt uses a huge number of iteration in thr KDF. While it's secure, it's inconvienient for the person starting the computer (I estimate about 30-40) seconds on my laptop. The KDF in …

Member Avatar for pritaeas
0
500
Member Avatar for devccompiler

Don't run g++ as administrator if it doesn't need it (I highly dout it will run faster). This isn't a problem I normally hear about, and lots of people seem to be running it fine. So I have a feeling it's more to do with your particular setup. Is anything …

Member Avatar for Eren_1
0
1K
Member Avatar for vegaseat

61 pages... I hope this wasn't mentioned already. In 1939, Ernest Vincent Wright wrote a book called [URL="http://www.spinelessbooks.com/gadsby/"]Gadsby[/URL] without using the letter 'e'. He didn't cheat by using '*' instead of 'e'. He never used a word with 'e' in it once, and the book (for it's time) made sence. …

Member Avatar for vegaseat
11
9K
Member Avatar for vijaykrishnabor

In procedural languages, using a temp is probably best. I actually can think of one way that does not require any extra variables, works for any datatype and is also very natural. It also doesn't involve any "dirty tricks," or even extra memory over what would be used for not …

Member Avatar for Mayukh_1
-1
7K
Member Avatar for mgold

> Python's too slow to use for anything very big Stop right there. Yes, implementing the algorithms used in pure python is not a good idea, but thats not how the scientific community uses python. For scientific and numerical computation, python is really more of a 'glue' language and components …

Member Avatar for thaifoodlover
0
346
Member Avatar for tapananand

> So, I'm in my final year of my B.Tech. in computer science programme You're in your final year, but you haven't found something you might be interested in? The problem with the 3 things you listed is that they don't have much do to with *computer science* at all. …

Member Avatar for q-_-p
0
524
Member Avatar for eskalemberg00

I'm currently a 3rd year Mathematics and Computer Science. My recommendation is to take your time (make sure you allocate enough time) in understanding your OWN answers to assignments. "Getting an answer" or "it works, its good enough" is completly useless if you don't understand what's going on. In fact, …

Member Avatar for HiHe
0
244
Member Avatar for eskalemberg00
Member Avatar for HiHe
0
153
Member Avatar for gyno
Member Avatar for XP78USER
0
392
Member Avatar for sham

Well, to be completly accurate. On an x86 (including x86-64) IBM compatible system: When the computer FIRST starts up, the BIOS cannot use the RAM immediatly. The BIOS's first task is usually to detect the RAM so it can continue to perform it's other functions. For this, the BIOS uses …

Member Avatar for RikTelner
-1
2K
Member Avatar for geolotry
Member Avatar for Christopher_11
0
340
Member Avatar for joshl_1995

This is a little more strong handed, but it's simple. [Refresh or reset](http://windows.microsoft.com/en-ca/windows-8/restore-refresh-reset-pc) your computer.

Member Avatar for Little Relhok1
0
507
Member Avatar for mcortino

Try this (assuming your on windows): Open up "Computer Management", and click on "Disk Management" on the left pane. Do you see your external there? If you do see it, then right click on itm click on "Change Letter and path..." and go ahead and give it a letter to …

Member Avatar for RobertHDD
0
641
Member Avatar for itsnauman

What kind of things are you interested in? Graphical things, puzzle solving things, interactive things, computational things?

Member Avatar for vegaseat
0
147
Member Avatar for Chem_1
Re: IDE

It's been asked before. My vote goes to vim.You don't need much mroe then a text editor your comfortable with for python.

Member Avatar for sneekula
0
679
Member Avatar for ITPT

You'll probably need to implement your own mechanism for looking at hardware changes. You'll want to look at various incrmental backup solutions, or implement your own. Are you storing the backups on an hdd? A tape? Optical disks? Do you need encryption? Compression?

Member Avatar for Viola71
0
369
Member Avatar for Slavi

I like Ubuntu and Red Hat. The reasons are simple: They're commercially supported and developed, have good free support and the community is big.

Member Avatar for Slavi
0
507
Member Avatar for happygeek

"64% expecting to be targeted in the next 12 months." I'm curious as to how they got that statistic. Do you have a link to the study?

Member Avatar for MidiMagic
3
2K
Member Avatar for awesomelemonade
Member Avatar for Slavi
1
2K
Member Avatar for Michael_SB

> DDS.scr says it "Will not run in compatibility mode" and closes. This might sound like a silly question, but is running in compatibility mode? If it is, try turning it off. Also, try running malwarebytes in safe mode. If that works, then have a close look at what starts …

Member Avatar for RobertHDD
0
2K
Member Avatar for MasterHacker110

As mentioned, you first need to be using an operating system who's kernal calls are guerenteed to work in real time. Then there are a few problems with the JVM itself (garbage collection, JIT, threading) that don't guerentee real-timeness. You'll need to find a real-time replacement JVM, for example JamaicaVM-PE. …

Member Avatar for MasterHacker110
0
228
Member Avatar for mattster
Member Avatar for mgold

Well, here are a few internet resources first that you might have missed. Here's a bunch: https://github.com/vhf/free-programming-books/blob/master/free-programming-books.md#professional-development . Also, I would take a look at MIT press, as well as resources other universities have posted online. This is more focused on structures, but heres someones notes from my class: http://notes.cthomson.ca/dl/latest/cs240.pdf …

Member Avatar for StefanijaV93
0
451
Member Avatar for expertmagician

It looks cool. I'm not sure how practical it is though. Let us know how you like it.

Member Avatar for Daniel_30
0
450
Member Avatar for Wandaga1

Programming really has two parts. One is programming langages, and another is problem solving. If you know a few practical languages, your fine. Idially, you should be able to pick up most languages on the spot if you need too. Problem solving is going to be a lot more important …

Member Avatar for vegaseat
0
250
Member Avatar for DavidB

I don't know the machanics either. You could look through the ISO standard (drafts are released freely if you look around). But there are only so many possiblities it could be. Why not make an identity array with 10 elements (0-9), and see what happens when you index it as …

Member Avatar for taichichuan
0
239
Member Avatar for mouaadable

Is there a particular reason you need so much storage? - the answer to that will determine what kind of storage you should use. Most modern PC's do not have a pratical limit to the disk size. They also usually support multiple disks. The tree main types of storage are …

Member Avatar for mouaadable
0
485
Member Avatar for zachattack05

First, lets look at how (simple) symetric encryption works. 1. If Alice wants to send a message to Bob. 2. Alice tells Bob the password beforehand. 3. When Alice sends the message, she encrypts the message with the password. encrypt(plaintext, password) -> ciphertext. 4. Then Bob uses the passeord to …

Member Avatar for RichardGalaviz
1
454
Member Avatar for DragonMastur

That question is asked too much. Random: Write a program that renames and organizes music based on there tags.

Member Avatar for RichardGalaviz
0
142
Member Avatar for Chris_19

If your doing heavy graphics, and your workflow is memoery inefficient, then you might want to consider 16gb. However, 8gb will do just fine if you adjust your workflow such that all of your programs arn't "randomly accessing" everything all the time (giving several open programs a chance to page). …

Member Avatar for benmar
0
693
Member Avatar for Clif40RD

I'm sure you'll at least find a few other interesting subjects around here that you might be able to "branch off" into if you stick around for a bit.

Member Avatar for servent123
0
236
Member Avatar for christinetom

There are a lot of [ways](https://en.wikipedia.org/wiki/Software_development_process). For user programs I generally use incremental-like development myself. For more API-like things, I plan the interface out (headers and studs) before going into a more incremental-like development mode. This worked fairly well in teams I've worked with. I'm not saying it's supirior though. …

Member Avatar for Bunny Slimer
0
260
Member Avatar for Ravi_15

What did you try in Knoppix? Trying to recover the password is going to be much harder then reseting the password. I beleive the [Ultimate Boot CD](http://www.ultimatebootcd.com/) has a fairly easy to use NT password reset tool.

Member Avatar for humorousone
0
274
Member Avatar for Violet_82

> hi guys, I have a dell xps 17 and I am thinking to purchase an extra Hard Drive - as I have an extra slot available Well how much does your first HD have? Do you have a lot of files? Why do you need the extra volume? I …

Member Avatar for Violet_82
0
149
Member Avatar for Sahilsikka

In a compiler without signifigant optimizations, `int a; a = 10;` might take extra intructions. Even in optimized compilers, if you have `int a; <code block>; a = 10;` it might not pick up on the fact that a was not modified until you assign it a value depending on …

Member Avatar for DonnSchwartz
0
196
Member Avatar for ogsirus

Given some non-portable assumptions, I beleive the answer is "yes". I'm not sure how this is usefull though.

Member Avatar for humorousone
0
202
Member Avatar for ash daisal

This could also be a file association problem (description of the problem is non-existant). Open LibreOffice and open the file from the menu within LibreOffice.

Member Avatar for Hiroshe
0
139
Member Avatar for Bhavesh Nariya

You're still introducing a new space in ram. Also, you're doing extra instuctions making it more inefficient if optimizations don't pick up on it (I feel like most probably wont). Not to mention it's harder to read. It's a cute party trick I suppose.

Member Avatar for Hiroshe
0
100
Member Avatar for sujith1038
Member Avatar for german.michel.142

It probably has to do with how you wired it up. It is unlikely that it's the fault of the CPU or RAM.

Member Avatar for psx2001
0
120

The End.