Slavi 94 Master Poster Featured Poster

Ubuntu is Linux.
Kubuntu is Linux.
Debian is Linux.
Arch is Linux.
the list goes on and on and on ...

It's all built on Linux just different distributions. If you're all new, I adivise you to definitely go after Ubuntu(variations like Elementary OS/Kubuntu etc) until you get more familiar with it before moving on into a more specific distribution to fullfil your needs if necessary

Slavi 94 Master Poster Featured Poster

Yeah correct, it has to be done before the time .. Well I guess you could try the way you and James were going for though, just out of curiosity why having start up programs in differnet drives?

Slavi 94 Master Poster Featured Poster

Just out of curriocity ... what is the startup method used by the ones that don't start by default? You could also just delay them to start after 30 secs or a minute(I've got conky on my unix system to start 20 secs after user log in for example) when the drive is unlocked, cant you?

BTW in my case, I have a bash script that is executed upon start and the first line in it is a delay

Slavi 94 Master Poster Featured Poster

Hey Fuze,
I've experienced a different issue with a microsoft windows os which was occuring when it wasnt being charged. Just to confirm that it is from the os and not anything else, is it possible for you to run live usb of ubuntu and check whether the problem appears in there?

Slavi 94 Master Poster Featured Poster
String x= JOptionPane.showInputDialog("Please input x: ");
int xCorFromUser = Integer.parseInt(x);
Slavi 94 Master Poster Featured Poster

By erasing them from bash_history, but if you want to delete a folder called "myFolder" and everything in it, just use sudo rm -rf myFolder then even if you recall the command later on, it will just give an error that the folder was not found

hefaz commented: Thanks! +2
Slavi 94 Master Poster Featured Poster

Whatever is in the ram should be on the image afterwards unless a corruption of some kind has occured(which is not that uncommon). You seem interested in volatile memory as you've asked stuff about volatility and now ram images. I would suggest you to take a look at a book called "The Art of Memory Forensics". It is by the developers of volatility, so the tool is used throughout the book. Moreover, the book covers ram images of different Windows operating systems, Linux and Mac as well. It is an incredable read and I am pretty sure if you want to get deeper in the field you would love it

Slavi 94 Master Poster Featured Poster

I would use RamCapturer from belkasoft or FTKImager, think it has an option ot extract ram as dd image as well

Slavi 94 Master Poster Featured Poster
  • No reason for it not to be able to work with 8TB one

  • what do u mean by transfer memory? Speed with which you can write to a hard drive?

Slavi 94 Master Poster Featured Poster

It is wrong to say that there is no way to find the key, in reallity it is just practically impossible(Currently) to do so.Just be aware for next time, randomware has significantly increased as cyber criminals see it as an easy payday because quite some people would actually pay the ransom to decrypt their personal files. A way around is to have everything back up'd , so if that happens just do a pure reinstall

Slavi 94 Master Poster Featured Poster

Could be dependnt on quite some things .. even Man In the Middle attack. The red thing basically says this identity with the provided public key associated with it could not be verified or does not have public audic records. I've neve heard of Bitdefender, I would advice you to try Avast or AVG
Not even sure if that is a legitamate antivirus really or if it is you could have also downloaded an infected binary executable ... really many posibilities

Slavi 94 Master Poster Featured Poster

You should get on to Click Here and test your connection. If you get 60-70 mbps/down and 10mbps up, won't really require you to change it. But try it once with wifi, try it then again with an ethernet cable and comapre the results. Pretty sure you can judge by yourself on it whether it would be worth it or not

Slavi 94 Master Poster Featured Poster

I've never installed that but looking into 'incorrect function' makes me think that there is something wrong with the installation file itself, well the integrity of it. Try checking MD5 checksum of the file on your pc and the server that you downloaded it from(They must've provided one there)

Slavi 94 Master Poster Featured Poster

What I've done is install unix commands to CMD, i think the packet is called gnu commands for windows or something similiar, and as far as I remember I actually made a post about it in the geeks lounge some time ago(I am a terminal kind of guy, that pack came as a miracle to me for those times when I have to go to windows)

Although cygwin is the ultimate solution so to speak, I've been trying to avoid it

EDIT: Found the link Click Here

Slavi 94 Master Poster Featured Poster

Separate each line by spaces into words, then run each word against english dictionary

Slavi 94 Master Poster Featured Poster

Out of the blue my guess would be manage-bde -status (Drive Letter): , this should include bitlocker version in the response (don't have windows nearby to test it right now but you can and get back if doesn't work)

Example: manage-bde -status C:

Slavi 94 Master Poster Featured Poster

tar.gz

Slavi 94 Master Poster Featured Poster

I am just wondering why do you want to do that, truecrypt is already pre-installed on kali?

Slavi 94 Master Poster Featured Poster

That is python 2 by the way as ZZucker mentioned, in python 3 it is input() instead of raw_input, and print statements require brackets as well anyway,
as Dave stated loop through to ask a user if he wants to try again

Slavi 94 Master Poster Featured Poster

arrayList.get(0) + arrayList.get(arrayList.size() -1)

Slavi 94 Master Poster Featured Poster

Is there a significant distance between your laptop's physical location and your wife's one? The signal gets weaker the further you are .. also, try with a cable as suggested, if the cable doesn't provide more than what your wifi has then it could the issue with the card

Slavi 94 Master Poster Featured Poster

I do agree with Rubber and Mike, we cannot choose for you but if you really want to dive into this study, you can really get as much as you can from both. Daniweb is a great place to start at, trust me you can learn A LOT in here

Slavi 94 Master Poster Featured Poster

They are different instances, they have their own memory location.An example in real life would be 2 people with the same name and age. Also you could tell that they are different in BlueJ as it creates 2 different graphical objects that you can call their methods on. For example if you implement a method changeName(String name) and you call it to one of your objects, it won't have affect over the other

Slavi 94 Master Poster Featured Poster

Go to google and check around for google python class babynames, they have a solution presented as well. The idea is to extract people names from a table from a webpage. Seems kind of the same thing, so check it out

Slavi 94 Master Poster Featured Poster

The problem is that your html variable is just a string containing this value
https://www.daniweb.com/software-development/python/threads/492669/how-to-print-only-the-content-of-all-tags-from-a-url-page
and not the actual HTML code ... the library that you have imported urllib2 .. use it to get the code from that page
Read urllib2
and also the example from there ..

import urllib2
response = urllib2.urlopen('http://python.org/')
html = response.read()

also.. should this >>> re.findall(r'<p>(.+),/p>', html)
be >>> re.findall(r'<p>(.+)</p>', html)?
and I am not sure if you read the link I gave you earlier about regular expression but the . matches any character including space. The + stands for that get all character that match the pattern stated which in our case was the . representing any character between <li></li> as in get all characters that match the pattern, as if it was only . without + it will simply return a single character that matches the pattern

Slavi 94 Master Poster Featured Poster

Use regular expressions Click Here

Here's quick example ..

>>> import re
>>> html = 'randomstuff<li>I am some text 12345</li>randomstuff'
>>> re.findall(r'<li>(.+)</li>',html)
['I am some text 12345']
Slavi 94 Master Poster Featured Poster

Yes we do! - > Click Here

Slavi 94 Master Poster Featured Poster

like this?

>>> aList
[[2.2, 1.1, 3.1], [4.1, 8.2, 3.6]]
>>> newList = []
>>> for row in aList:
...     newList.append(sum(row)/len(row))
>>> newList
[2.1333333333333333, 5.3]
Slavi 94 Master Poster Featured Poster

Um, you are trying to sort a list of floas?

>>> aList = [5.5 , 4.1 , 7.6 , 2.9]
>>> sorted(aList, reverse = True)
[7.6, 5.5, 4.1, 2.9]

Or if your list is a list of lists and you want to sort each of the lists individually

>>> aList = [[2.2,1.1,3.1],[4.1,8.2,3.6]]
>>> newList = []
>>> for row in aList:
...     newList.append(sorted(row))
>>> newList
[[1.1, 2.2, 3.1], [3.6, 4.1, 8.2]]
Slavi 94 Master Poster Featured Poster

Oh, forgot to mention that this

>>> sorted(student_tuples, key=itemgetter(2))
[('dave', 'B', 10), ('jane', 'B', 12), ('john', 'A', 15)]

they are sorting with key=itemgetter(2), I assume your sorting should be itemgetter(1)

Slavi 94 Master Poster Featured Poster

Consider the following example from Click Here

>>> from operator import itemgetter, attrgetter, methodcaller

>>> sorted(student_tuples, key=itemgetter(2))
[('dave', 'B', 10), ('jane', 'B', 12), ('john', 'A', 15)]

>>> sorted(student_objects, key=attrgetter('age'))
[('dave', 'B', 10), ('jane', 'B', 12), ('john', 'A', 15)]

you can do the same with Reversed=True will sort it opposite order

Slavi 94 Master Poster Featured Poster

4, if others are able to print it is quite likely that the user's settings are different or he is trying to print it out on a different printer

Slavi 94 Master Poster Featured Poster

left to right but it's increasing upwards :P

print '\n'.join(" "*ix + c for ix, c in reversed(list(enumerate("Hello World"))))
pyTony's version backwards vertically

print('\n'.join("Hello World"))[::-1]

Slavi 94 Master Poster Featured Poster

I'd advice you to split the sentance to words and save the words into an array. Then just print the first char of each string that is in the array

This is an example of splitting

Slavi 94 Master Poster Featured Poster

Byte of python and hacking ciphers with python is what I used, and I pretty much loved them. However, This is a great starting point and it is online, good examples and detailed explanations

Slavi 94 Master Poster Featured Poster

Try this:

re.findall('[\d.]+','2123.32321%')

outputs:
'2123.32321'

re is regular expressions module so you have to import re

Slavi 94 Master Poster Featured Poster

You can use an IDE as #djjeavons mentioned or a text editor(sublime is my favorite). If you do use IDE (such as eclipse) you can compile the code and run it from within there, while with a text editor you can compile the code from the terminal using 'javac filename.java' and run it using 'java filename' - note no extension at the 'java' command

Slavi 94 Master Poster Featured Poster

Nice 1 Mike, but it still stands strong and I definitely agree that universities are part of the problem, for example I am forced to do my projects in java. I've seen increase of jobs for c# developpers lately

Slavi 94 Master Poster Featured Poster

What is the name of the folder? Do you have "show hidden files" and show "system files" enabled? As if its a system folder you probably won't be able to, such as those that windows creates say on usb drives. If the folder has a hidden or something file that is still being in use, it won't let you either but if that is the case, a restart of your system will be enough to be able to delete it afterwards as I doubt it will be a start up application.
By the way, are you able to locate it using "cmd"? If so try deleting it from there

If those above don't help, well
As in the case of a computer virus, as on a windows system I highly suggest you using an antivirus program Avast or AVG, and scan your computer. If those don't work it might be nice to do some packet analysis using wireshark or a similiar tool to see whether the virus/a botnet zombie or any of the sort is being communicated to through a command and control server but if this is the case I think we could do into it later on

Slavi 94 Master Poster Featured Poster

well, I'd state my opinion as well "It's too big" >.>

Slavi 94 Master Poster Featured Poster

did you manage to connect to anything at all?

Slavi 94 Master Poster Featured Poster

oh, rand is an object of type Random,
and that int that you just decleared called rand, rename it
Random rand = new Random()
also import it

Slavi 94 Master Poster Featured Poster

instead of using that for loop to generate the number use this
int randomNum = rand.nextInt((max - min) + 1) + min;

Slavi 94 Master Poster Featured Poster

You should probably type SELECT not secelt

Slavi 94 Master Poster Featured Poster

I am no expert or even being close to one in GUI design but what I would do quickly on that set up is make a jframe, you could probably use jlabels and set their background to those pictures and then a gridview with textfields in it where you can append your data to.
Guess James will confirm whether this is actually used like that in a working environment with real life applications

Slavi 94 Master Poster Featured Poster

Looks pretty nice, thanks for sharing

Slavi 94 Master Poster Featured Poster

In your class SmartPhone, you pass the mobileOS to the constructor but you never set it to your field so inside the constructor you should add:
this.mobileOS = mobileOS;

Slavi 94 Master Poster Featured Poster

the original description even 32 bit win8 is going to bug the shit out of it, if you open chrome with 2 tabs it will most likely shut down due to reaching 100% ram usage, the celeron one might be able to handle it but then again its celeron cpu

Slavi 94 Master Poster Featured Poster

Exactly, as rubben said tcp assures you that the information will be delivered, and no guarantees at all with udp, it just fires out packets. Streaming/skype etc find use of it

Slavi 94 Master Poster Featured Poster

oh did u mean to be able to call them separately