452 Posted Topics
Hey guys, I was just looking into LinkedList and I came accross couple of methods. I quickly made a linkedlist and added numbers from 0 to 9 in the list then tried different methods such as pop poll, removeFirst and they all returned the same answer from 0 to 9. … | |
[Click Here](http://thehackernews.com/2014/08/worldview-3-satellite-that-could-allow_12.html) I've really seen some documentaries of what is coming in the future and it kinda scares me. Also, I hear often that google tracks and records all data they get such as browsing history, gmail uses, phone gps tracking etc, and they give information to agencies if asked … | |
Re: You could've told us what errors you get but from a first look, a/b/c are not deficed in the readData method | |
Re: So basically you enter first number 5, second 20 and you are trying to find which multiple it is? how about 20/5 = 4? | |
Re: That example doesnt make much sense to me either but perhaps this will give you more look into the big O notation, it is part of a book "Data structures and algorithms in Java" You might think that in comparing algorithms you would say things like “Algorithm A is twice … | |
Re: I am not sure how to help you out but as you mentioned you've checked out about text editors, I am using SublimeText 3 , I found it really REALLY good, it highlights great, supports possibly 90% of all existing languages, it has AI involved and autofills every existing variable/method/like … | |
Re: Not sure if @laah would work for you but if it doesn't perhaps you could give us some more information, if you could "ipconfig" and present us with the results and also "ping google.com" and also show that | |
Re: Unless you are going for an engine, cool graphics and things, wouldn't that be similiar to a maze solver? If so, you can start from there | |
Metasploit was meant to be one of the things to go through of my course Practical Network Security, that took place in June this year. However, the course was ruined a bit as a company that was meant to teach us didn't show up and the teachers had to do … | |
Re: Microsoft announced that support for windows 7 will stop in 2015, so if you are into windows os, it will probably be better go to after windows 8, as for new applications and additional features exist for it. Also, it comes to a personal point of view which of those … | |
Re: Are you using a DNS assigned by your ISP? Did you get a static IP by your ISP or is it dynamic? And you answer your question, nop haven't experienced that before, in fact never had any DNS issues | |
Re: And if you decide to go for keylogger in java, read [this](https://www.daniweb.com/software-development/java/threads/482999/is-it-possible-to-make-global-key-logger-in-java) I'd go for C instead if I had to, although spying is not a good thing! :D | |
Re: I find it pretty easy to navigate through although I am not a windows fan. I barely use it mainly because I can't make eclipse luna to run on my linux but windows button + "S", makes life easier, you can just search for everything you need and all the … | |
Re: How about after each element added to the list check its size, if the size says it has 3 elements print it and set the list back to empty. Once all elements from the original big string/array are passed through, stop execution | |
Re: Run linux on bootable flash drive and use GParted to see your actual partitions. You can use GParted to create a partition for Linux only or anything you want, a separated one | |
Hey guys, I made the game Rock Paper Scissors where 2 players can play against each other. Here is my client's GUI ( The server doesn't need 1) and I was wondering what else to do to make it better looking/more "advanced". Any feedback is appreciated - The entire GUI … | |
Re: Did you make a new user and it doesn't have sudo permissions? | |
Uh, just woke up and for breakfast I got to run into a Linux problem .. I turned on my pc (Kali Linux) and it has no sound? Ik weird .. used to work until I went to bed ... I have xfce DE. The error I get when I … | |
Not sure if vulnerability or just a bug but this guy passed over 7000 points on the activity stream lol  | |
Re: Did you try extracting your rar file? It is possible that the ISO image is inside as rar is a compression format | |
Re: extends keyword is part of the syntax showing that you are inheriting from a class. Why would you do that? Although you can go without it, once a smart person said, don't reinvate the wheel once it has been. With that said, no point of rewriting an existing code while … | |
Re: You can start by looking at data types, and Scanner class used for interactions with users. If you have further questions, don't hesitate to ask. Would by nice to show what you have done so far | |
Re: When I had a static IP back in the days, I had to call the ISP to locate my connection before they activate it. If it's a static IP you have to enter the details manually, otherwise with dynamic should be just plug and go but make sure you have … | |
Re: It sounds more of a hardware problem rather than software to me. Is it a new laptop or has it worked before? If we follow logic, if it doesnt turn on either from the battery nor the plug, then the problem should be located after the power supply and not … | |
| |
Re: The articles says that organisations don't always protect passwords as they should such as salting etc but if you get compromised in such way, wouldn't hackers be able to obtain the salt anyway? | |
Re: Have in mind that c++ is used for all platforms, you have access to memory using pointers. C# is used for making applications for Windows OS, newest .NET versions are really easy to use with or without much experience for creating graphics or animations. Python is a scripting language, as … | |
Re: [Click Here](http://www.r-statistics.com/2011/11/edimax-ew-7811un-usb-wireless-connecting-to-a-network-on-ubuntu-11-10/) Let me know if it worked EDIT: Something that might come handy is this found it on comments where couple of people had solved the issue following that link it says to blacklist the rtl8192cu (or approximate) driver which is the driver I have currently functioning (same model … | |
| |
Re: Try to make a maze solver, will keep you busy for a bit and you'll get quite some experience with it I hope ( Should be able to do after watching those vids) such as , S = start position, G = goal , X = no wall , W … | |
Re: you can start by asking the user to enter 5 letters not only 1. To do so you can use a [for loop](http://www.cprogramming.com/tutorial/c/lesson3.html) and save it into an array of chars | |
Re: I used [Click Here](http://code.makery.ch/java/javafx-2-tutorial-intro/) as my first tutorial of JavaFX, gave me basic understanding of it | |
Re: I think this question will find its proper answer according to what exactly are you required to know for a certain job. It is a common misbehave in our seciety where a university diploma means you are actually good or know something to a good extent, while in the meanwhile … | |
It's been a few days since I had the time to dig into java, now I went to eclipse and all I see is errors .. Here is a picture. Any ideas how to fix it? That is just weird because it says no build path was found while i've … | |
Re: Pretty cool tbh, web pages really need to be more secure and shouldnt communicate in plain text(sending passwords/usernames) | |
Re: What exactly is your troube? No sound through loadspeakers? | |
So earlier today I found a course in wireshark, downloaded a .bin image and decided to install powerISO to run the file and see what is inside. As soon as I installed powerISO, I noticed a new software program "Seach project" was installed as well, my immediate action was to … | |
Re: You are trying to declear methods inside the main method. After you declare what you want to have in the main, make sure you close it `}`. Also its a good practice to always declear your methods public/private instead of leaving them with a default public one | |
Hey guys, I have some questions about the structure of KSA. The way that I find it being explained is as follows: The first step of this algorithm consist in initializing the S table with the identity permutation: the values in the array are equal to their index. Once the … | |
Re: I think what Mike is trying to explain is that if you have a file that contains 10000 functions inside and you use only 1 or 2 of them, it will be pointless to include the file and compile all functions all the time when they are not needed. yes, … | |
Re: Or you could download an ISO image(for free for all linux distros) and burn it to a usb stick, known as bootable usb stick. Ubuntu has a full, detailed guide on how to make a bootable usb stick with ubuntu(should be the same for other distributions) | |
Re: I have my Bachelors in Electronics and computer engineering. It will be really hard for you to do some of the projects as we were given, provided with most of the hardware we needed for our projects such as robot, line follower, where you start at the very begining and … | |
Re: [this?](http://www.cplusplus.com/forum/beginner/33656/) assuming windows is used for the executable files | |
Re: how about `if (yon == "yes")||(yon =="no")||(yon=="Yes")||(yon =="No")` | |
Re: and if you are still confused after that ^ very detailed explanation, 1 byte = 8 bits, thats how you get 8 numbers 0s or 1s | |
I came accross [this article](http://thehackernews.com/2014/08/CryptoLocker-Decryption-Keys-Tool.html). And I am wondering now, how would you upload a file from your system if all files have been encrypted? I have 0 experience with randomwares but as far as I've heard your desctop is showing only a pop up window asking you to pay … | |
In the past couple of days, I've been practicing with JavaFX and I made myself an app, which I am planning to use in the future. It is supposed to keep track of web pages and the passwords I use for them, usernames as well of course. The program itself … | |
Please before you answer NOTE , I am not trying to implement a keylogger, this is just a QUESTION. So, It just randomly happened that I started thinking about this and I figured that in java if you want to have a keyEventListener the key should be entered in a … |
The End.