452 Posted Topics

Member Avatar for Slavi

Hey guys, I was just looking into LinkedList and I came accross couple of methods. I quickly made a linkedlist and added numbers from 0 to 9 in the list then tried different methods such as pop poll, removeFirst and they all returned the same answer from 0 to 9. …

Member Avatar for Slavi
0
146
Member Avatar for Slavi

[Click Here](http://thehackernews.com/2014/08/worldview-3-satellite-that-could-allow_12.html) I've really seen some documentaries of what is coming in the future and it kinda scares me. Also, I hear often that google tracks and records all data they get such as browsing history, gmail uses, phone gps tracking etc, and they give information to agencies if asked …

Member Avatar for vegaseat
0
402
Member Avatar for jasonj2248

You could've told us what errors you get but from a first look, a/b/c are not deficed in the readData method

Member Avatar for Slavi
0
134
Member Avatar for puk.akhimien

So basically you enter first number 5, second 20 and you are trying to find which multiple it is? how about 20/5 = 4?

Member Avatar for Puk_1
0
154
Member Avatar for Mike Askew

That example doesnt make much sense to me either but perhaps this will give you more look into the big O notation, it is part of a book "Data structures and algorithms in Java" You might think that in comparing algorithms you would say things like “Algorithm A is twice …

Member Avatar for Hiroshe
0
265
Member Avatar for Labdabeta

I am not sure how to help you out but as you mentioned you've checked out about text editors, I am using SublimeText 3 , I found it really REALLY good, it highlights great, supports possibly 90% of all existing languages, it has AI involved and autofills every existing variable/method/like …

Member Avatar for Hiroshe
0
299
Member Avatar for achadecafs

Not sure if @laah would work for you but if it doesn't perhaps you could give us some more information, if you could "ipconfig" and present us with the results and also "ping google.com" and also show that

Member Avatar for Slavi
0
149
Member Avatar for bro3886

Unless you are going for an engine, cool graphics and things, wouldn't that be similiar to a maze solver? If so, you can start from there

Member Avatar for stultuske
0
755
Member Avatar for Slavi

Metasploit was meant to be one of the things to go through of my course Practical Network Security, that took place in June this year. However, the course was ruined a bit as a company that was meant to teach us didn't show up and the teachers had to do …

Member Avatar for Hiroshe
0
160
Member Avatar for codeks

Microsoft announced that support for windows 7 will stop in 2015, so if you are into windows os, it will probably be better go to after windows 8, as for new applications and additional features exist for it. Also, it comes to a personal point of view which of those …

Member Avatar for Reverend Jim
0
126
Member Avatar for Meonia

Are you using a DNS assigned by your ISP? Did you get a static IP by your ISP or is it dynamic? And you answer your question, nop haven't experienced that before, in fact never had any DNS issues

Member Avatar for Meonia
0
177
Member Avatar for ADETUNJI_2

And if you decide to go for keylogger in java, read [this](https://www.daniweb.com/software-development/java/threads/482999/is-it-possible-to-make-global-key-logger-in-java) I'd go for C instead if I had to, although spying is not a good thing! :D

Member Avatar for Slavi
0
192
Member Avatar for Erick02
Member Avatar for Evoke IT

I find it pretty easy to navigate through although I am not a windows fan. I barely use it mainly because I can't make eclipse luna to run on my linux but windows button + "S", makes life easier, you can just search for everything you need and all the …

Member Avatar for Scotthiggins
0
317
Member Avatar for sneekula

How about after each element added to the list check its size, if the size says it has 3 elements print it and set the list back to empty. Once all elements from the original big string/array are passed through, stop execution

Member Avatar for sneekula
0
260
Member Avatar for RikTelner

Run linux on bootable flash drive and use GParted to see your actual partitions. You can use GParted to create a partition for Linux only or anything you want, a separated one

Member Avatar for Gribouillis
0
867
Member Avatar for Slavi

Hey guys, I made the game Rock Paper Scissors where 2 players can play against each other. Here is my client's GUI ( The server doesn't need 1) and I was wondering what else to do to make it better looking/more "advanced". Any feedback is appreciated - The entire GUI …

Member Avatar for Slavi
0
122
Member Avatar for asaidi
Member Avatar for Gribouillis
0
862
Member Avatar for Slavi

Uh, just woke up and for breakfast I got to run into a Linux problem .. I turned on my pc (Kali Linux) and it has no sound? Ik weird .. used to work until I went to bed ... I have xfce DE. The error I get when I …

Member Avatar for rubberman
0
580
Member Avatar for Slavi

Not sure if vulnerability or just a bug but this guy passed over 7000 points on the activity stream lol ![c6be4f5bc91fa7c125939e9b01f1a062](/attachments/large/4/c6be4f5bc91fa7c125939e9b01f1a062.png "c6be4f5bc91fa7c125939e9b01f1a062")

Member Avatar for pritaeas
0
76
Member Avatar for Chem_1

Did you try extracting your rar file? It is possible that the ISO image is inside as rar is a compression format

Member Avatar for Chem_1
0
110
Member Avatar for surya55

extends keyword is part of the syntax showing that you are inheriting from a class. Why would you do that? Although you can go without it, once a smart person said, don't reinvate the wheel once it has been. With that said, no point of rewriting an existing code while …

Member Avatar for stultuske
0
180
Member Avatar for aone.gaiemoabi

You can start by looking at data types, and Scanner class used for interactions with users. If you have further questions, don't hesitate to ask. Would by nice to show what you have done so far

Member Avatar for Slavi
0
152
Member Avatar for thobo35

When I had a static IP back in the days, I had to call the ISP to locate my connection before they activate it. If it's a static IP you have to enter the details manually, otherwise with dynamic should be just plug and go but make sure you have …

Member Avatar for Nathanaelneal
0
230
Member Avatar for porschaz

It sounds more of a hardware problem rather than software to me. Is it a new laptop or has it worked before? If we follow logic, if it doesnt turn on either from the battery nor the plug, then the problem should be located after the power supply and not …

Member Avatar for anirudh.soni.7
0
220
Member Avatar for Clif40RD
Member Avatar for Clif40RD
0
248
Member Avatar for happygeek

The articles says that organisations don't always protect passwords as they should such as salting etc but if you get compromised in such way, wouldn't hackers be able to obtain the salt anyway?

Member Avatar for F-3000
2
352
Member Avatar for qulu.quliyev.58

Have in mind that c++ is used for all platforms, you have access to memory using pointers. C# is used for making applications for Windows OS, newest .NET versions are really easy to use with or without much experience for creating graphics or animations. Python is a scripting language, as …

Member Avatar for shimanto.khan.758
0
154
Member Avatar for pwolf

[Click Here](http://www.r-statistics.com/2011/11/edimax-ew-7811un-usb-wireless-connecting-to-a-network-on-ubuntu-11-10/) Let me know if it worked EDIT: Something that might come handy is this found it on comments where couple of people had solved the issue following that link it says to blacklist the rtl8192cu (or approximate) driver which is the driver I have currently functioning (same model …

Member Avatar for jah666
0
656
Member Avatar for Cypher Yaw
Member Avatar for Hiroshe
0
171
Member Avatar for Kris_3

Try to make a maze solver, will keep you busy for a bit and you'll get quite some experience with it I hope ( Should be able to do after watching those vids) such as , S = start position, G = goal , X = no wall , W …

Member Avatar for Kris_3
0
239
Member Avatar for new2code

you can start by asking the user to enter 5 letters not only 1. To do so you can use a [for loop](http://www.cprogramming.com/tutorial/c/lesson3.html) and save it into an array of chars

Member Avatar for David W
0
377
Member Avatar for devgit2810

I used [Click Here](http://code.makery.ch/java/javafx-2-tutorial-intro/) as my first tutorial of JavaFX, gave me basic understanding of it

Member Avatar for llaspina
0
1K
Member Avatar for iConqueror

I think this question will find its proper answer according to what exactly are you required to know for a certain job. It is a common misbehave in our seciety where a university diploma means you are actually good or know something to a good extent, while in the meanwhile …

Member Avatar for heidi.dum
1
482
Member Avatar for Slavi

It's been a few days since I had the time to dig into java, now I went to eclipse and all I see is errors .. Here is a picture. Any ideas how to fix it? That is just weird because it says no build path was found while i've …

Member Avatar for Wei_3
0
118
Member Avatar for Reverend Jim

Pretty cool tbh, web pages really need to be more secure and shouldnt communicate in plain text(sending passwords/usernames)

Member Avatar for PixelatedKarma
0
594
Member Avatar for ddanbe
Member Avatar for cab_driver
Member Avatar for Slavi

So earlier today I found a course in wireshark, downloaded a .bin image and decided to install powerISO to run the file and see what is inside. As soon as I installed powerISO, I noticed a new software program "Seach project" was installed as well, my immediate action was to …

Member Avatar for Reverend Jim
0
209
Member Avatar for gua543

You are trying to declear methods inside the main method. After you declare what you want to have in the main, make sure you close it `}`. Also its a good practice to always declear your methods public/private instead of leaving them with a default public one

Member Avatar for gua543
0
439
Member Avatar for Slavi

Hey guys, I have some questions about the structure of KSA. The way that I find it being explained is as follows: The first step of this algorithm consist in initializing the S table with the identity permutation: the values in the array are equal to their index. Once the …

Member Avatar for Slavi
0
805
Member Avatar for nathan.pavlovsky

I think what Mike is trying to explain is that if you have a file that contains 10000 functions inside and you use only 1 or 2 of them, it will be pointless to include the file and compile all functions all the time when they are not needed. yes, …

Member Avatar for nathan.pavlovsky
0
471
Member Avatar for madhu225

Or you could download an ISO image(for free for all linux distros) and burn it to a usb stick, known as bootable usb stick. Ubuntu has a full, detailed guide on how to make a bootable usb stick with ubuntu(should be the same for other distributions)

Member Avatar for Slavi
0
127
Member Avatar for Ghost0s

I have my Bachelors in Electronics and computer engineering. It will be really hard for you to do some of the projects as we were given, provided with most of the hardware we needed for our projects such as robot, line follower, where you start at the very begining and …

Member Avatar for Taywin
0
259
Member Avatar for Kris_3

[this?](http://www.cplusplus.com/forum/beginner/33656/) assuming windows is used for the executable files

Member Avatar for Kris_3
0
128
Member Avatar for Kris_3
Member Avatar for Kris_3
0
222
Member Avatar for new_developer

and if you are still confused after that ^ very detailed explanation, 1 byte = 8 bits, thats how you get 8 numbers 0s or 1s

Member Avatar for Slavi
0
263
Member Avatar for Slavi

I came accross [this article](http://thehackernews.com/2014/08/CryptoLocker-Decryption-Keys-Tool.html). And I am wondering now, how would you upload a file from your system if all files have been encrypted? I have 0 experience with randomwares but as far as I've heard your desctop is showing only a pop up window asking you to pay …

Member Avatar for Slavi
0
184
Member Avatar for Slavi

In the past couple of days, I've been practicing with JavaFX and I made myself an app, which I am planning to use in the future. It is supposed to keep track of web pages and the passwords I use for them, usernames as well of course. The program itself …

Member Avatar for Slavi
0
245
Member Avatar for Slavi

Please before you answer NOTE , I am not trying to implement a keylogger, this is just a QUESTION. So, It just randomly happened that I started thinking about this and I figured that in java if you want to have a keyEventListener the key should be entered in a …

Member Avatar for Slavi
0
295

The End.