45 Topics
| |
remote server not responding on my nokia 208 | |
Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's … | |
My van was built 15 years ago by Mazda in Japan as a multi-purpose 'people carrier' vehicle with the unlikely name of a Bongo. It has survived the years well, and I have now converted it into a camper van. Another 15 year old that travelled across the globe has … | |
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the … | |
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser … | |
Suppose i have a 4 queens problem then i know what state space tree means but i am not able to get what does** solution space** mean?Also what is** difference between brute force and backtracking technique**s.I know that in backtracking if you don't get to a state whose bounded function … | |
At the moment I am trying to decide which book to buy, there are many that I think would be very interesting, but some are most likely beyond me. The books in my list, along with my thoughts on them are: Concrete Mathematics (I believe this is probably too advanced … | |
I've been using these SEO tools lately for website analyses. SearchMetrics for its visibility features including graphics for clients, Ahrefs for backlinks info, Forecheck from cyberpromote for URL and content analysis, and Moz (formerly SEOMoz) for URL analysis. SEOlytics as well. All of these have free versions. I suggest to … | |
With no actual Halloween-based security threats to report, it looks like the security vendors have had no choice but to start reporting scary stuff that might happen to your data instead. While I have no qualms about genuine warnings to 'be careful out there' this Halloween, a little reminder about … | |
All right stop, collaborate, and listen. A new variant of the ZeuS financial malware platform known as Ice. This baby Trojan spawned from the original Ice IX is targeting bank customers on both sides of the pond. Here in the UK the 'big three' telecommunications providers are where it is … | |
I have to create a system design for a cashier system. Most of the transactions would be payments for fees in a student account. Fees like Tuition, Books, Enrollment Fees. The problem with these fees are their special characteristics like Tuition fees being staggered in MONTHLY itemization (if that's a … | |
First we had the news that [URL="http://www.daniweb.com/news/story276878.html"]IBM was helping clean up crime[/URL] in the US and UK, now it seems that Sweden is getting a touch of the Big Blue Brother effect. The city of Stockholm is launching a project using IBM's streaming analytics technology in order to gather real-time … | |
new to I.T. need help about the problem analysis ,algorithm design, formatting the output package gasolinestation; import javax.swing.JOptionPane; public class GasolineStation { public static void main(String[] args) { float total, money; String yesno; JOptionPane.showMessageDialog(null, "Welcome to Gasoline Station!"); do { String select = JOptionPane.showInputDialog(null, "1 = Diesel .................... $ 39.00\n" … | |
Hi, I'm having trouble to filter a Customer Set by the date of his first buy(First Activity). I've tried this two ways: 1. Returns all customers, even with FirstActivity Null SELECT { [Measures].[Valor Item], [Measures].[First Activity] } ON 0, { Filter( { [CLIENTE].[Cliente].[Cliente].Members }, ( [Measures].[First Activity], [Time].[Year].&[2012-01-01T00:00:00] ).Count > … | |
Over the last couple of days the online media seems to have gone crazy for the news that the Google Chrome web browser client has overtaken Microsoft Internet Explorer to become the most popular browser on the planet. This based entirely upon the fact that, for a single week, and … | |
For each part (A) (D) below, clearly indicate whether the runtime is O(log n) or O(n). Can someone please explain how this works? public class Q9f { public static void main(String[] args) { int n = ...; int[] a = new int[n]; // (A) for (int index = 0; index … | |
I have created a cube in visual studio, when i want to deploy it i get the following error: Error : The project could not be deployed to the 'USER-PC\SQLEXPRESSR2' server because of the following connectivity problems : A connection cannot be made to redirector. Ensure that 'SQL Browser' service … | |
[ATTACH=RIGHT]22544[/ATTACH]Three and a half years ago, DaniWeb was reporting how [URL="http://www.daniweb.com/hardware-and-software/networking/news/218954"]stolen credit cards could be purchased online[/URL] for as little as $10 per card, complete with a guarantee that the accounts behind the cards were active, when purchased in larger volumes. So how has the market changed since the start … | |
I started using Python a few weeks ago, something finally clicked and I started writing tools for my personal use. I started writing something with a GUI using GTK and the code lines started multiplying rapidly, so I thought to myself "Am I commenting my source to death? How many … | |
Hi there, I am having trouble understand how they derive these running times for the code in the image below. [http://i.imgur.com/usK9U.jpg](null) I am having trouble especally with log n running times, how are they derived? especially the bottom left slide. If someone can shed some light on this, I would … | |
Hi all, I'm looking for a good tool for analysing Windows Server Event Logs. Basicaly, I want to be able to filter by types of entries or content, and search. If it has some smarts built in for things like highlighting suspicious behaviour that would be great too. I need … | |
Hi, everybody I need to conduct a large amount of data analysis on database. Could anyone recommend an interactive application for data analysis? The requirements are: 1. Able to cope with the unexpected requirement rapidly. 2. Able to perform further computations on results interactively. 3. Easy to confront even a … | |
Hi, everybody I need to conduct a large amount of data analysis on database. Could anyone recommend an interactive application for data analysis? The requirements are: 1. Able to cope with the unexpected requirement rapidly. 2. Able to perform further computations on results interactively. 3. Easy to confront even a … | |
Hi all, I have a project where I need to read in an image of a maze and use a graph data structure to find certain points in the maze to place nodes and trace edges. I plan to have the maze be in only two different colors. The walls/background … | |
Hi I’m analyzing keywords for my ad words campaign; this is the first time I’m running ad words for my site. So I’m a little bit confused with keywords selection, I’m using the Google keyword tool for keyword analyzing. In this tool which match type should I choose? In order … | |
Hi everyone This year i have to develop my final year project. Actually I'm thinking about a software that help people with music. it has several different parts as well as a "Testing" part. For this one I want to have sound input from the user via microphone and then … | |
I think it's just ging to be something stupid that I've missed since the program itself runs, though doesn't solve the decrypted text. I've included the text from the decrypted file below the code and any help would be great. [CODE]using System; using System.Collections.Generic; using System.Linq; using System.Text; namespace Frequency_Analysis … | |
Assume that we have a mergesort algorithm which takes 2 series as an input and returns 1 after the merge each time. So that if we want to count say memory blocks we would need 2 blocks for the input and 1 for the output accordingly, total size of 3 … | |
I see that there are many questions here regarding complexity analysis, specifically regarding the Big-O notation of algorithms. I will attempt to shed some light on the subject. I will start with an introduction, after which I will go over some common complexities and last we will solve a few … |
The End.