452 Posted Topics

Member Avatar for Slavi

Hey guys, I've got an AES encrypted file that my task is to decrypt knowing that it used gcc PRNG to generate the key and I know in which week it happened ... So I made a script and it works great except for that fact that .. well there's …

Member Avatar for Gribouillis
0
195
Member Avatar for Dani
Member Avatar for Saran_1

Hey Grib, I was actually looking into json files a couple of days ago and I came across a problem that I really was looking forward to address to you. The file that I was generating was bigger than my memory so loading it all at once is basically a …

Member Avatar for Saran_1
0
18K
Member Avatar for happygeek
Member Avatar for mike_2000_17
Member Avatar for laguardian

You can use a hashmap, where you have pairs of key->value For example, you can set the key to be the nickname and because key's cannot exist more than once, that will restrict users to have unique nicknames( as you'd expect it to be). Here's an example of what it …

Member Avatar for jwenting
0
205
Member Avatar for Start4me

String x= JOptionPane.showInputDialog("Please input x: "); int xCorFromUser = Integer.parseInt(x);

Member Avatar for mKorbel
0
1K
Member Avatar for hefaz

By erasing them from bash_history, but if you want to delete a folder called "myFolder" and everything in it, just use sudo `rm -rf myFolder` then even if you recall the command later on, it will just give an error that the folder was not found

Member Avatar for hefaz
0
365
Member Avatar for Slavi

[Google's new look](https://com.google/) Microsoft announced that they are making their own Linux OS [MSDOS mobile](http://www.windowsphone.com/en-gb/store/app/ms-dos-mobile/8573c4a8-b9df-4409-90a6-dad2dc0b6b26)

Member Avatar for Slavi
0
494
Member Avatar for iamthwee

About the design? I can't afford a mac so I have elementary os on my home pc, kind of gives me the feeling of having a mac but at the same time is Linux, win win :D

Member Avatar for RobertHDD
0
298
Member Avatar for alex0220

What exactly is your question, how to calculate numbers that have a percentage? Here's an example Decrease the salary by 25% salary = salary - (salary * (25/100)) It would evaluate to: (for the example say that the salary is 100 salary = 100 - (100*0.25) salary = 100 - …

Member Avatar for Schol-R-LEA
0
450
Member Avatar for Slavi

Hey guys, I am debugging some random files trying to get into gdb and I came accross a question how many machine instructions are used for this : `double x, dx, ans;` I guess I could see based on memory addresses and the size of double that 3 variables are …

Member Avatar for Slavi
0
130
Member Avatar for dddomodossola

Seems nice but it only has generic widges available. Are you planning on adding further stuff?

Member Avatar for dddomodossola
0
460
Member Avatar for m.rahman1
Member Avatar for Toni_3
Member Avatar for Slavi
1
204
Member Avatar for Slavi

Hey guys, I am making a few gui programs and I was wondering on this code .. class PaintChart(wx.Panel): def __init__(self, parent, data): self.data = data.split() wx.Panel.__init__(self, parent) self.SetBackgroundColour('BLACK') self.Bind(wx.EVT_PAINT, self.drawChart) def drawChart(self, e): dc = wx.PaintDC(self) dc.SetDeviceOrigin(30, 240) dc.SetAxisOrientation(True, True) dc.SetPen(wx.Pen('RED')) dc.DrawRectangle(1, 1, 300, 200) Here I set the …

Member Avatar for Slavi
0
417
Member Avatar for hemant_r9

the temporary file is in memory (RAM) so that you can make modifications of. Once the file is closed (saved) the new version will be written on the hard disk and the temporary file will be removed as in the memory that was occupied by it will be free'd

Member Avatar for hemant_r9
0
290
Member Avatar for blueguy777

base64 although that one doesn't mean anything.(first guess on those is always base64 as its using '=' as padding value). It should be 6 characters becahse base64 is 6 bits, ascii are 8 bits. Thus your 8 characters are equal to 48 bits, putting that in ascii(8 bits each) ends …

Member Avatar for diafol
0
256
Member Avatar for Slavi
Member Avatar for hwoarang69

I haven't been into Android for awhile but I am pretty sure [Click Here](https://github.com/Trinea/android-open-project/tree/master/English%20Version) will be able to help you out

Member Avatar for Slavi
0
271
Member Avatar for Tcll

xp has so many exploits out there .. many of which are freely available. If you still use XP as your OS you deserve to be punished and banned from the internet :D

Member Avatar for Tcll
2
395
Member Avatar for vegaseat

Oh, this is a good one. I remember it when my high school teacher was telling us the story!

Member Avatar for vegaseat
2
8K
Member Avatar for Slavi

Hey guys, not sure how but my conky manager pretty much just dissapeared earlier today and I had to download the package and reinstall it again. However upon installation some dependancies were not met .. //I had apparently fixed this issue in the passed but I can't find nor remember …

Member Avatar for craftsmanofmich
0
682
Member Avatar for Aeonix

- No reason for it not to be able to work with 8TB one - what do u mean by transfer memory? Speed with which you can write to a hard drive?

Member Avatar for rubberman
0
313
Member Avatar for joshl_1995

You should get on to [Click Here](http://www.speedtest.net/) and test your connection. If you get 60-70 mbps/down and 10mbps up, won't really require you to change it. But try it once with wifi, try it then again with an ethernet cable and comapre the results. Pretty sure you can judge by …

Member Avatar for joshl_1995
0
453
Member Avatar for K. Chris

@Reverend , IP addresses in 2015 ... least thing they could do is use Tor if they wanted to be keep anonimity against the ABUSIVE mods !!

Member Avatar for Reverend Jim
-1
629
Member Avatar for ehpratah

It is wrong to say that there is no way to find the key, in reallity it is just practically impossible(Currently) to do so.Just be aware for next time, randomware has significantly increased as cyber criminals see it as an easy payday because quite some people would actually pay the …

Member Avatar for Slavi
0
340
Member Avatar for joshl_1995

Could be dependnt on quite some things .. even Man In the Middle attack. The red thing basically says this identity with the provided public key associated with it could not be verified or does not have public audic records. I've neve heard of Bitdefender, I would advice you to …

Member Avatar for joshl_1995
0
270
Member Avatar for turntomyleft

My choice for python is Sublime Text 3 with additional plugins such as Anaconda, it all makes the text editor a complete IDE for python, nice highlihting and its highly customizable, love it

Member Avatar for vegaseat
0
784
Member Avatar for killza

Have you tried with a different browser? Also when you tried with your phone, was it from the same IP address?-> this will give info whether it is IP issue or something related to that specific device that you are using

Member Avatar for zomgmike
0
322
Member Avatar for sirlink99

Can you give an example of the text or if you want to split it by every occurance of "?" then you can use the split method of String

Member Avatar for sirlink99
0
423
Member Avatar for haven_u
Member Avatar for Reverend Jim

I've never installed that but looking into 'incorrect function' makes me think that there is something wrong with the installation file itself, well the integrity of it. Try checking MD5 checksum of the file on your pc and the server that you downloaded it from(They must've provided one there)

Member Avatar for Slavi
0
301
Member Avatar for jimfive
Member Avatar for ddanbe

What I've done is install unix commands to CMD, i think the packet is called gnu commands for windows or something similiar, and as far as I remember I actually made a post about it in the geeks lounge some time ago(I am a terminal kind of guy, that pack …

Member Avatar for rubberman
0
335
Member Avatar for jim3472

Technically what he said ^ is one of the reasons why 64 bit computing is needed, in increases the linear space, systems such as Windows XP cannot address more than 4GB ram 2^32, although that was increased by using a 'hack' on 32 bit systems of the following operating systems …

Member Avatar for Slavi
0
209
Member Avatar for Dom_1

`int average = ((sum of Numbers)/lengthOfNumbers) ` Example: (1+2+3+4+5)/5 = 15/5 = 3

Member Avatar for vegaseat
0
113
Member Avatar for randal booker

I wouldn't say Linux doesn't get such stuff but the probability of that happening is significantly lower. Although, if you think about it userland 'nasties' would definitely increase if the amount of Linux users increases xD

Member Avatar for XP78USER
0
173
Member Avatar for RikTelner

I think what Rubben said will work out, and just to add, if you are not comfortable with `dd` , boot from live Linux like ubuntu and run gparted, it is a graphical tool for formatting etc

Member Avatar for RikTelner
0
482
Member Avatar for jamesjohnson25
Member Avatar for jamesjohnson25
0
440
Member Avatar for happygeek
Member Avatar for tony75

Out of the blue my guess would be `manage-bde -status (Drive Letter):` , this should include bitlocker version in the response (don't have windows nearby to test it right now but you can and get back if doesn't work) Example: `manage-bde -status C:`

Member Avatar for tony75
0
160
Member Avatar for Abubakar sani
Member Avatar for ShouldAt3
0
139
Member Avatar for Brandon_7

I do agree with Rubber and Mike, we cannot choose for you but if you really want to dive into this study, you can really get as much as you can from both. Daniweb is a great place to start at, trust me you can learn A LOT in here

Member Avatar for rubberman
0
553
Member Avatar for Slavi

Hey guys, It's not exactly trouble with coding that I am facing more like trouble with understanding what I have to implement .. Quick background .. I am trying to implement statistical-saturation attack on block ciphers. The piper that describes the attack has the following algorithm that is used against …

0
123
Member Avatar for iamthwee
Member Avatar for tony75
Member Avatar for Timothy_4

I think you just print out all the keys in the dictionary and not those with lowest occurance in your display results

Member Avatar for Timothy_4
0
274
Member Avatar for happygeek

They either don't understand the risks or they just don't care about protecting sensitive data. Think heartbleed is ranked #1 critical flaw for 2014 followed by shellshocker

Member Avatar for Slavi
2
374
Member Avatar for tony75

I am just wondering why do you want to do that, truecrypt is already pre-installed on kali?

Member Avatar for rubberman
0
994

The End.