5,727 Posted Topics

Member Avatar for Alex Edwards

he can't answer right now, all his fingers have been reduced to bloody stumps by all the typing he's done over the last 3 years and he's still only 20% done with his 6000 page work :)

Member Avatar for KelvinG
0
1K
Member Avatar for spoch

think before you code... how'd you do it if you were given the numbers, a pencil, and a piece of paper? Would you just try random combinations and see if they yield the desired result? Of course not. You'd use logic. For example you'd determine which were the two largest …

Member Avatar for JamesCherrill
0
2K
Member Avatar for Robin_7
Member Avatar for The Dude

[QUOTE=joshSCH;374613]But I don't see how some of those questions relate to psychopaths..[/QUOTE] psychopaths typically don't...

Member Avatar for maydhyam
1
6K
Member Avatar for joshSCH
Member Avatar for stultuske
0
36K
Member Avatar for Jamie_10

if((number % 2) == 0) { // remainder function int even; } else { int odd; } makes no sense anyway... You probably want (number%2==0)?even++:odd++;

Member Avatar for Sean Francis
0
305
Member Avatar for basketmen

the day Alexa disappears with their spyware, malware, and other nasties is a day of joy for the entire internet.

Member Avatar for jwenting
0
200
Member Avatar for Lalit Chattar

Easy. But not the way you think it's done. You can not mix text and binary output in a single http stream, it has to be 2 requests. The JSP displays the text, includes a link to a servlet that serves the image. Of course the JSP doesn't do anything …

Member Avatar for prabhu.cyberway
0
3K
Member Avatar for JOSheaIV

Do NOT try to implement encryption algorithms yourself. You'll fail and your encryption will be dead easy to break by every script kiddie out there. You simply don't know enough to replicate or improve on the work of the generations of specialists who've done the actual work. If you did …

Member Avatar for rubberman
0
437
Member Avatar for IntegratedTweak

No doubt the previous owner was convinced that "Microsoft is evil" and therefore refused to install any Windows updates and couldn't find pirated AV software (or more likely his pirated games refused to install with his pirated AV software active so he deleted it). Have a few acquaintences like that. …

Member Avatar for Noor_7
1
338
Member Avatar for KiraMuller

Not knowing what AV product you're using, I'd trust their software more than the "support" department of some piece of software I don't know. While virus scanners are known to sometimes produce false positives, they do so less often than criminals setting up companies in order to distribute malware that …

Member Avatar for nullptr
0
279
Member Avatar for imagetvr

Do NOT use VB6. It's dead, no longer supported, nobody uses it except idiot schoolkids who think using a 20 year old product is "kewl". Use something that actually has market value, something like C#. As to your excuse for some code, I'd not be surprised at all if "enddoc" …

Member Avatar for jwenting
0
1K
Member Avatar for mohan@nano

1. Learn decent English 2. Use that knowledge to learn Java 3. Use that knowledge to learn about the Java XML parsing APIs this is all quite fundamental. You don't even need to learn libraries external to the core API as everything you need is contained within the core API.

Member Avatar for JamesCherrill
0
192
Member Avatar for dukleatish

whether you can decipher the information in a pdf in any way depends on how the pdf was created. One can create pdf files as documents with paragraphs and tables of text, in which case it is possible (with the right libraries or a lot of work to write them) …

Member Avatar for rproffitt
0
163
Member Avatar for Mr.M

sure it should be possible to figure that out. Most if not all encryption techniques leave recognisable signatures in the content they encrypt. If you can manage to write some code that detects those patterns, you can figure out what encryption was used. Now, in order to find out those …

Member Avatar for Mr.M
0
480
Member Avatar for trishtren

gcj is a linux only tool that isn't Java at all. it recognises only a very small subset of the Java language and core APIs. Never use it, it's garbage. And there's never a need to even try to turn Java class files into native executables, as there are JVMs …

Member Avatar for jwenting
0
224
Member Avatar for Farhan_8

And you're going to need a lot of additional classes and enumerations. Things like blood types, resus types, health history??, employees of both the blood bank and hospital (no doubt you need to track who handles the donation, storage, retrieval, etc. etc.), storage containers (multiple freezers?), etc. etc. etc. And …

Member Avatar for JamesCherrill
0
310
Member Avatar for Violet_82

Best create a separate handler class per button (unless the buttons have very similar functionality). As to the counting, traditional mechanism would use a HashMap<String, Integer>

Member Avatar for Violet_82
0
603
Member Avatar for Dani
Member Avatar for LibraryCode

learn about JDBC, or better yet JPA. And do split your code into multiple classes, makes things so much easier to maintain and debug. Also, keep class fields and methods separate, fields at the top, then constructors, then methods. Organised code is a lot easier to read.

Member Avatar for stultuske
0
303
Member Avatar for castajiz_2

or, much better, ask the people maintaining those sites if they have something like an RSS feed you can get access to and get the data right there in text, uncluttered by tons of advertising, javascript, menus, headers, etc. etc., and of course with their full blessing and no risk …

Member Avatar for jwenting
0
251
Member Avatar for lewashby

AFAIK all such services require you install some software for the purpose. Which is no surprise really. What you'd need is a VPS somewhere with ssh access. You wouldn't need a lot of CPU power, but more than the basic level of storage and maybe bandwidth too.

Member Avatar for eroux
0
319
Member Avatar for christine06

sudo root is wrong. sudo allows you to enter a command with root privileges. To become root you issue the command su. Of course for that you need to know the root password... And on ubuntu at least the root account is disbabled by default, needs to be enabled before …

Member Avatar for eroux
0
376
Member Avatar for Saboor880

and oh, 8.1 was released a few days ago :) https://netbeans.org/downloads/ select either the "Java EE" or "All" version.

Member Avatar for JamesCherrill
0
435
Member Avatar for divinity02

your teacher should be the one to ask. While we can guess what he meant, we can't of course know for sure.

Member Avatar for jwenting
0
91
Member Avatar for Amr.Mohammad87

There is no 'official linux'. Rather, as you've found out, there are hundreds of different variations, each of which is linux. Which of the platitude of options you choose would depend in large part on what you're going to want to use it for.

Member Avatar for jwenting
0
461
Member Avatar for happygeek

Pretty much what I see in my mailbox, though I rarely if ever see malware. I do see a LOT of fake "job offers" and phishing scams for bank account data, the former especially has gone up from a few percent to almost a quarter of all spam I get, …

Member Avatar for datasafe
3
649
Member Avatar for Liam_4

ok, that's not Java code. It's not even close to being Java code. Here's something to get you started though, you'll have to think of how to get it to match your requirements but it at least works. import java.io.File; import java.util.HashMap; import java.util.Map; import java.util.Scanner; public class Test3 { …

Member Avatar for JamesCherrill
0
142
Member Avatar for Dani

having to type in a search string every time I enter the site to look for say Java topics, and then getting not just those but javascript as well (because Java is a substring of Javascript) is doubly irritating. And tag hell is already starting, someone created a "wow" tag …

Member Avatar for Nick Evan
2
1K
Member Avatar for maselguart

in my experience, most often this problem has nothing to do with videocards, RAM, CPU, etc. but is just a matter of a cable that's improperly connected :) Loose cables, always check them first...

Member Avatar for Musthaq_2
0
203
Member Avatar for Saboor880
Member Avatar for jwenting
-1
130
Member Avatar for jkon

Main problem is that there's no penalty for dumping your homework assignments here verbatim. On StackOverflow if you do that the entire thread gets removed, and your account gets locked from posting anything for a period of time (especially if you do it repeatedly). Daniweb needs something like that. Of …

Member Avatar for Dani
3
1K
Member Avatar for Adhya_1

my hourly rate is $150 with a minimum of 40 hours, payable in advance. After payment I'll get on it ASAP.

Member Avatar for Lucaci Andrew
0
259
Member Avatar for kavinsac

and realise that there are more things out there than php and mysql, things that often are a far better option. Things like JSF/JEE and Oracle.

Member Avatar for diafol
0
573
Member Avatar for showman13

any browser worth its name will throw a hissy fit if you have a page where some components are secured and others are not, which is inevitable if you decide to secure only some pages and not others (unless you plan to also keep copies of all your stylesheets, javascript, …

Member Avatar for jwenting
0
266
Member Avatar for Violet_82

What you have there looks like a perfect candidate for a GridLayout for the rows of keys, with each row being a FlowLayout.

Member Avatar for Violet_82
0
5K
Member Avatar for efe.osato.5

what traffic? what control? What scope? A complete traffic management system for any real life scenario is a massively complex piece of software and hardware that requires dozens of people to build over a period of months or years and a similarly large team of full time experts in their …

Member Avatar for Taywin
0
239
Member Avatar for JacobBrown

I've upgraded 4 computers to Windows 10, 2 each from Win7 and Win8.1, no problems with any of them. The files on that disk aren't lost, they're still there. But if they are programs any registry entries they need to run may be lost, especially if you upgraded to a …

Member Avatar for rproffitt
0
223
Member Avatar for SAMMY12345

Windows 10 is fine. Use it on 5 PCs and my phone. Edge could use some more functionality, true, but it's extremely fast and light weight, making it very good for just browsing especially on resource starved systems where firefox or chrome are just too heavy, take up too much …

Member Avatar for jacob81
0
290
Member Avatar for Doogledude123

Swing is built on top of AWT, not all AWT classes are overridden. In fact it's impossible to use Swing without using AWT as Swing relies on a lot of AWT classes under the hood. For example a Swing javax.swing.JComponent IS a java.awt.Component

Member Avatar for JamesCherrill
0
150
Member Avatar for SpottyBlue

and what do you know about private? Private members can ONLY be accessed from within the class they're defined in. You're trying to access them from another class. Either redefine them as protected OR use the getter and setter methods to access them. Which of the two is the prefered …

Member Avatar for jwenting
0
246
Member Avatar for V3N0M

clicking together a website using a tool like that is not web development, it's clicking a website together...

Member Avatar for diafol
0
319
Member Avatar for rmoloruntoba

follow the installation instructions. it's dead easy. http://developer.android.com/sdk/installing/index.html?pkg=studio You MAY have to install an Oracle JDK first, set the global JAVA_HOME environment variable to point to it, add $JAVA_HOME/bin to your global PATH. I assume you know how to do that in Linux.

Member Avatar for jwenting
1
88
Member Avatar for felton

there are places called "libraries" where they have many books to read. There are also places called "bookstores" where you can buy books to read. I suggest you visit some of them...

Member Avatar for rproffitt
0
146
Member Avatar for Makara
Member Avatar for Divyang_1

And any decent one will tell you to not bother unless you have to. Rely on an external authentication system instead. Be if facebook, twitter, google, OpenID, etc. etc. or an existing SSO engine running within your existing environment. All are almost certainly more secure than anything you can come …

Member Avatar for jwenting
0
235
Member Avatar for a_mohsen_t
Member Avatar for rproffitt
0
115
Member Avatar for Reverend Jim

never needed HP support myself, but heard many horror stories about them (unless you're a big corporate account, in which case you pay a lot of money for premium support and that's good). Their computers tend to be somewhat lower quality than Dell (though remember that both brands have a …

Member Avatar for jwenting
0
772
Member Avatar for Doogledude123
Member Avatar for Makara

and do upgrade to the latest release from Oracle. 1.8.0_60 as of writing. 1.7.0_79 is the last 1.7 release, mostly security fixes and some minor stuff.

Member Avatar for jwenting
0
247

The End.