Slavi 94 Master Poster Featured Poster

Ubuntu is Linux.
Kubuntu is Linux.
Debian is Linux.
Arch is Linux.
the list goes on and on and on ...

It's all built on Linux just different distributions. If you're all new, I adivise you to definitely go after Ubuntu(variations like Elementary OS/Kubuntu etc) until you get more familiar with it before moving on into a more specific distribution to fullfil your needs if necessary

Slavi 94 Master Poster Featured Poster

Should be no issue at all to do using VBA. Go for macro and ask any questions if you encounter while developing it :)

Slavi 94 Master Poster Featured Poster

Doing projects together would be nice and fun, one way or another would benefit the majority of people involved in it

Slavi 94 Master Poster Featured Poster

This smells like gcat implant but UPX for obfuscation ..
For the password, you can AES encrypt it and only decrypt during runtime in memory so whatever touches disk will awalys be encrypted. Add anti-debug techniques otherwise using ollydbg would take 10 seconds to run ur executable and get to the point where the password is decrypted

Slavi 94 Master Poster Featured Poster
effortAndDedication
Slavi 94 Master Poster Featured Poster

Excel 2013, apprently microsoft just decided to get rid of that folder
Found the solution here ...

Slavi 94 Master Poster Featured Poster

Speaking of this (from this week)!!
I made a python script to start multiple excel macros (located in different excel files), manipulate some of the data and finally upload it to an elasticsearch database running on one of the servers at work. All good and great .. made a batch file to start the script and scheduled it to run every morning. At that point thing's just got really really .. i mean REALLY nasty .. because when the batch file was ran as a scheduled task it wouldn't start the excel macros. After spending insanely lots of time on this i found the following:
Please make this folder. C:\Windows\SysWOW64\config\systemprofile\Desktop
On microsoft forums. Like are you kidding me???? By default the folder 'Desktop' doesn't exist in that location since server2k8 ..
Yep, windows.

Slavi 94 Master Poster Featured Poster

I think you might want to read up on The F sequence! :D to understand what's the sequence actually meaning and not random variables multiplied with integers ..

Slavi 94 Master Poster Featured Poster

DaniWeb is a public forum, you can ask in here where even more professionalists will try to help you out

Slavi 94 Master Poster Featured Poster

int(s) ?

Slavi 94 Master Poster Featured Poster

Thanks for share =]

Slavi 94 Master Poster Featured Poster

How to fix it? #1 rule, don't install flash player, just don't ..
and if you do use flash control on your browser ..

Slavi 94 Master Poster Featured Poster

Wouldn't the toString method of linkedlist convert it to string?

Slavi 94 Master Poster Featured Poster

It's most likely a one time issue that occured when you tried it, the server must've been off. Pings fine now

Slavi 94 Master Poster Featured Poster

You declare metters in here but you don't set it to anything. Then you pass it as a parameter to setRadius. Basically you pass nothing in here? I think this is where James points out that you need a numeric value

SettingsActivity sa = new SettingsActivity();
        int metters;
        sa.setRadius(metters);
        // Creating circle around marker
        circle = mMap.addCircle(new CircleOptions()
            .center(latLng)
            .radius(sa.apply()) // Not alowed like this
            .strokeColor(Color.RED)
            .fillColor(Color.GREEN)
        );
Slavi 94 Master Poster Featured Poster

He has obviously forbidden this topic.
I bet he doesnt have MS office and thinks it's made by office 2010 cos of the extension.

Anyway, for those who don't have ms office and need to open point points, you can import them to google drive and convert to google slides. Then you'll have it and be able to edit it as well

Slavi 94 Master Poster Featured Poster

Hey,
that's great ,thanks for the link!
Although I seem to be unable to read the docs, they won't load/open, is that the case for you too?

Or .. do you by any chance have an example, such as how would you parse an xbrl document and extract a field "startDate" ?

Slavi 94 Master Poster Featured Poster

Awesome, although lolwindows10, here's a quick overview of it from a privacy/security point of view

Click Here

Slavi 94 Master Poster Featured Poster

My guess is that a malicious file has been injected to the real msiexec.exe and now is trying to send information about your system to a domain in russia, which a real microsoft process would have no intention in doing so. To prove that, check the checksum of the file on your system and the one provided by microsoft(or on a clean system). If there is difference in that, it is indeed malicous. I would recommend you using SHA1 or better, don't use MD5 or any of the family for computing the checksum

Slavi 94 Master Poster Featured Poster

Takes a range and copies it transposed

Worksheets("Sheet1").Range("A1:A5").Copy
Worksheets("Sheet2").Range("A1").PasteSpecial Transpose:=True
Slavi 94 Master Poster Featured Poster

Hey guys,

I am looking into xbrl files and I need to extract certain data from each of them however, I can't find much information on the existing python-xbrl library, perhaps someone in here has an experience with it?
Here's an xbrl file example
Click Here
Any ideas/solutions on how to parse a certain field and get it's value?

or maybe I should implement my own parser using "re"?

I did this now though just to test it out ...

xmlContent = (requests.get("http://regnskaber.virk.dk/14502803/eGJybHN0b3JlOi8vWC1GMDk4RkNDNi0yMDE0MTIzMV8wOTE2MjFfMDk1L3hicmw.xml").content)

print "Date: " +re.findall(r">(.+)<", re.findall(r"gsd:ReportingPeriodStartDate.+", xmlContent)[0])[0]

and it works though I am not sure how efficient it is because I need to parse thousands of documents

Thanks in advance =]

Slavi 94 Master Poster Featured Poster

Hey snip, thank you for looking into my issue =]

That is actually the first thing I thought of and did as well =]

The issue that I faced was that if I search a number, the search query is different and also depending on the number (I guess the length is what identifies it) it has another different query. At this point I thought I would ask in here and see if anyone has an idea that i could try out as well. But I think, the solution I came to was to just validate each entry and then parse it to the current url. I am sorry for not closing the thread, I just got the time to get online again
Thank you again, great answer!

Slavi 94 Master Poster Featured Poster

Hey guys, how is it going?

I am wondering whether this my idea is possible to achieve .. I am looking at this search engine
https://datacvr.virk.dk/data/

and it can take names,cvr number, address etc as input and return a facinating output. I think they are using elasticsearch to do all the background work and I've had some experience with it, it's quite amazing. Anyway, I was wondering if I have a list of say 100 or 1000 things that I want to search for, how should I proceed(Automate it by script)?

Slavi 94 Master Poster Featured Poster

Some people will find out that "outside" exists, computer will become boring and I will be out of a job :(

Slavi 94 Master Poster Featured Poster

Use Eclipse, it is a Java IDE, generally adapted to Android and has everything that you'd need. There's long guides on how to set up your environment and start creating apps and in case you don't have an android device, you can test them on a virtual simulator which Eclipse can start as well

Slavi 94 Master Poster Featured Poster

If you consider an antivirus program an important one(I don't xD), I would highly advice you to get a tool called PeStudio. It has a direct link to virustotal, therefore if you can perform a quick static analysis of any file that you might have suspiciouns on(if you don't know what virtustotal is, it is where you can test a file against 56 different AV vendors simultaniously whether some of them has the file in there databases as malicious, I think it is all checksum based detection)

If checking PE files, pestudio shows quite some additional information suhc as information about the headers of the file and more ..

I would say that, it is a good practice to check any file before opening/running it through there

Slavi 94 Master Poster Featured Poster

Yeah correct, it has to be done before the time .. Well I guess you could try the way you and James were going for though, just out of curiosity why having start up programs in differnet drives?

Slavi 94 Master Poster Featured Poster

Just out of curriocity ... what is the startup method used by the ones that don't start by default? You could also just delay them to start after 30 secs or a minute(I've got conky on my unix system to start 20 secs after user log in for example) when the drive is unlocked, cant you?

BTW in my case, I have a bash script that is executed upon start and the first line in it is a delay

Slavi 94 Master Poster Featured Poster

What james said ^ , check out speedtest.net

Slavi 94 Master Poster Featured Poster

Hey Fuze,
I've experienced a different issue with a microsoft windows os which was occuring when it wasnt being charged. Just to confirm that it is from the os and not anything else, is it possible for you to run live usb of ubuntu and check whether the problem appears in there?

Slavi 94 Master Poster Featured Poster

either that ^ or save your configuration in a file then copy/paste rather than typing it but I also think going for dynamic at home would be the best solution

Slavi 94 Master Poster Featured Poster

you don't need . before Cells or before row, also my suggestion to you is to do it more robust by automatically detecting which is the last used column and just populate the one after that one with the current time

If you always want to have it at column 4 just make a loop

for i to numberOfRows
    Cells(i,4) = the time now ...

If you can't figure it out let me know I can do it when home later ..

Slavi 94 Master Poster Featured Poster

Internet explorer is a browser, what do you refer to when saying a browser? Google Chrome?

Slavi 94 Master Poster Featured Poster

Pretty much only by getting a new one. Dual cores nowadays are getting outdated pretty quick .. I still have an old pc(8-9 years) with a dual core intel. I've experienced exactly the same thing as you and out of curiousity I tried running different operating systems on it and even with lightweight ones like elementaryOS i still experienced high cpu usage performance, unlike my laptop has i7 processor and idle is 0% usage constantly

Slavi 94 Master Poster Featured Poster

Hey guys,
i am wondering, if you load a file in basically any language, how much memory does the file occupy. Like there's the case that usually more memory is used rather than the actual size of the file because the data of the file is mapped to data types for example if a file has 3 numbers that are 1,2 and 3, it will end up being 4 bytes file but if you load them in a program, they will be stored as ints resulting in each being 4 bytes(32 bits), correct?

But um ... what if you load a file say 100 MB size, and you read the content as a string. Is the memory occupied 100 MB as well because maybe everything is represented in the form of chars 1 byte each?

Slavi 94 Master Poster Featured Poster

If you are using a Dual core processor, there's nothing to wonder about

Slavi 94 Master Poster Featured Poster

Hey guys,
I've got an AES encrypted file that my task is to decrypt knowing that it used gcc PRNG to generate the key and I know in which week it happened ...
So I made a script and it works great except for that fact that .. well there's a fake EOF in the encrypted file so when I read it, I read only a small portion of it.

How can I avoid reading it? I've had a suggestion to read the file bit by bit but what I've found so far is read a file per each byte which is then converted to bits and I am not sure if this would work as the EOF will be read again .. any ideas/solutions?

Slavi 94 Master Poster Featured Poster

What's with map_key/end_map/null?

Slavi 94 Master Poster Featured Poster

Hey Grib,
I was actually looking into json files a couple of days ago and I came across a problem that I really was looking forward to address to you. The file that I was generating was bigger than my memory so loading it all at once is basically a bad idea, especially that when loaded it actually occupies more memory than the actual size of the file. Perhaps an example of the data would be a good idea, it was a general dictionary, each key having multiple values. Is there a way to handle such big files, say 10GB, because if I think of a normal text file, readline() reads a single line at a time and is a good solution in a way but I couldn't really find anything about json format. Any ideas?

Slavi 94 Master Poster Featured Poster

Would be sweet if there was volatility#2, that contains scripts per malware family

Slavi 94 Master Poster Featured Poster
String x= JOptionPane.showInputDialog("Please input x: ");
int xCorFromUser = Integer.parseInt(x);
Slavi 94 Master Poster Featured Poster

You can use a hashmap, where you have pairs of key->value

For example, you can set the key to be the nickname and because key's cannot exist more than once, that will restrict users to have unique nicknames( as you'd expect it to be). Here's an example of what it would look like:
{Nickname : (name, lastname, other info)}

example
{Slavi : (Slavi , SlavisLastName, welovejava)}
etc ...

then what you do is, you search someone by the nickname and you get the values stored to that nickname

or ... if you insist on using arraylists .. you could create a class that stores all the information and then create object for each customer and store the objects in an array list.

Though I think hashmap is the way to do it as look ups require significantlly less time(As far as I remember)

Slavi 94 Master Poster Featured Poster

By erasing them from bash_history, but if you want to delete a folder called "myFolder" and everything in it, just use sudo rm -rf myFolder then even if you recall the command later on, it will just give an error that the folder was not found

hefaz commented: Thanks! +2
Slavi 94 Master Poster Featured Poster

"Three can keep a secret, if two of them are dead." - Benjamin Franklin

Slavi 94 Master Poster Featured Poster

lol =p

Slavi 94 Master Poster Featured Poster

What exactly is your question, how to calculate numbers that have a percentage?
Here's an example

Decrease the salary by 25%

salary = salary - (salary * (25/100))

It would evaluate to: (for the example say that the salary is 100

salary = 100 - (100*0.25)
salary = 100 - 25
salary = 75

Slavi 94 Master Poster Featured Poster

Could've been a corrupted(for example during the creation of that copy) .iso image

Slavi 94 Master Poster Featured Poster

Sweet =)

Slavi 94 Master Poster Featured Poster

for those looking into some machine code , use for example:
disas /m main -> will give you dissasembly of main line by line ..

Slavi 94 Master Poster Featured Poster

In Denmark you can do bachelors and masters together, that is 5 years. Though, what I did was I did a 'diploma' engineer, which was 3 and a half years (highly practical + a whole semester internship in a company) and then master's degree that is 2 years