5,727 Posted Topics

Member Avatar for Violet_82

toString() gives you a string representation of your object. But you have to define that string representation if you want it to be anything meaningful and human readable. The default implementation just gives you a hashcode for the object in memory, useful to distinguish between 2 instances but no more. …

Member Avatar for jwenting
0
3K
Member Avatar for SimonVic

you've never seen one because making one in VB6 is the worst idea you could ever come across. Terrible security features, vulnerable to just about any hacking strategy known to man and then some, outdated and out of support before online banking even existed. Leave real programs to real professionals, …

Member Avatar for rproffitt
0
231
Member Avatar for 76342ck

do your own homework, kiddo. If you've specific detail questions people will be happy to help, but we're not here to help you cheat and get a passing grade on your course by doing your work for you.

Member Avatar for JamesCherrill
-1
2K
Member Avatar for jdpjtp910

> So many ... dead threads ... now ... being resuscitated? happens every new semester when programming courses start in certain countries where the majority of kids aren't interested in learning, only in getting the paperwork so they can get hired by firms that then sell them to other companies …

Member Avatar for David W
0
2K
Member Avatar for cakka

I hope not. It's the only way to get rid of the flood of highly annoying adbanners with fake download buttons and redirects to phishing sites.

Member Avatar for midastouchwebs
0
142
Member Avatar for SAMMY12345

I think he's trying to spam. All his posts are seemingly random phrases posted to seemingly random forums.

Member Avatar for happygeek
-2
217
Member Avatar for erniestl

he probably means physical connections :) Can only plug in so many cables after all. And yes, you can plug in a switch or router into your DSL modem/router.

Member Avatar for rubberman
0
232
Member Avatar for Evan_3

As a programmer, don't "study" operating systems, study programming paradigms. But if you're asking whether there's more money in programming for Windows or iOS, it all depends on what you're interested in selling. If you're into "hip" "apps" and games for teenagers and gadget addicts, Apple's your thing. All those …

Member Avatar for Ripster
0
142
Member Avatar for JoseL7

even better, put it all inside a method and just call that in your loop. Much easier to read...

Member Avatar for jwenting
0
253
Member Avatar for compuser

do you really think some kid asking to get their homework done for them is going to come back years later and give you their homework they never got done in the first place because nobody did it for them? <insult snipped>, you don't deserve even a failing grade, you …

Member Avatar for happygeek
0
820
Member Avatar for alaad

Typically, you'd just have a method in the main class that does that stuff, or in a class where you launch it from the main class. A single entry in a properties file can then be used to determine whether that initialisation method runs or not.

Member Avatar for alaad
0
319
Member Avatar for Latrell_vie

Android Studio is the fastest IDE around. You can of course do things the hard way and write all your code in a text editor like VI or Notepad and then use commandline compilers. Most likely if it's slow on your machine there's something else wrong with your machine. I'm …

Member Avatar for jwenting
0
241
Member Avatar for SpHawk - Destiny videos

yeah, create an installation DVD or USB pen drive using the media creation tool. Then (or while doing that, it takes a while) save all your data and stuff you want to retain from the old PC to an external hard drive. When both are done, put in the installation …

Member Avatar for jwenting
0
269
Member Avatar for iarpana

http://www.javaworld.com/article/2071275/core-java/when-runtime-exec---won-t.html read and shiver.

Member Avatar for jwenting
0
243
Member Avatar for SAMMY12345

https://www.daniweb.com/hardware-and-software/mac-os-x/threads/499996/best-and-free-software-for-mac-os-x gosh...

Member Avatar for jwenting
-1
128
Member Avatar for Anusuya S
Member Avatar for Anusuya S
0
241
Member Avatar for samuelmathews

correct. The problem statetement merely tells to solve the problem, not how to solve it :) And for this kind of thing a spreadsheet is the easiest way to go, it's exactly what spreadsheets were designed to do...

Member Avatar for jwenting
-4
213
Member Avatar for kavinsac

being able to do that would be (and was) a major security risk. If you can do it, so can a mallicious site...

Member Avatar for almostbob
0
320
Member Avatar for jamesjohnson25

don't use executeUpdate for select statements, use executeQuery. executeUpdate will never result in a ResultSet. According to the javadoc for getResultSet: > returns the current result as a ResultSet object or null if the result is an update count or there are no more results

Member Avatar for jwenting
0
356
Member Avatar for Natheesh

post your problems here, don't just link us to some other site and expect us to work it out for you.

Member Avatar for jwenting
0
61
Member Avatar for Aeonix

yes, your reputation haunts you. Welcome to the real world. Just as there is no "lifetime hosting" unless your life is very short, so there is no "100% guaranteed" way to prevent black hats from getting into your systems. All you can do is make their life harder. And how …

Member Avatar for diafol
1
274
Member Avatar for Porady
Member Avatar for Reverend Jim
0
100
Member Avatar for RikTelner

> Rule number 1 - don't let anyone do your thinking for you. including people who state rule number 1... That's the paradox, isn't it :) It's true though. Trust, but verify. If it sounds too good to be true it probably is. Carpe Diem Live like there is no …

Member Avatar for diafol
0
431
Member Avatar for Aditya0025
Member Avatar for Dani

the MySQL syntax may be slightly different (my main experience is with Oracle) but this is how you'd do it in Oracle: `ALTER TABLE POSTS ADD CONSTRAINT POSTS_MEMBERS_FK FOREIGN KEY (MEMBER_ID) REFERENCES MEMBER(ID) ENABLE;

Member Avatar for cereal
1
327
Member Avatar for kunal135

hmm, tbh I'd go a few rungs up the ladder and use something like JMS to handle most of the nitty gritty details for me...

Member Avatar for stultuske
0
204
Member Avatar for rproffitt

if you look at what really happened, VW did nothing wrong. Some flunky broke a non-story as a major "evil corporations breaking the law with software to cheat" when that's not what happened at all. Bosch created the software which controls the engine performance tuning of VW diesel engines (and …

Member Avatar for rproffitt
-1
177
Member Avatar for Reverend Jim

it's indeed gotten way way harder to find anything specific. Not only do you have to scroll through all the dozens of collated pinned posts (while it may have been 2-3 per forum, if you combine 20 forums into 1 that leaves you with 40-60 of them), but there's no …

Member Avatar for diafol
2
571
Member Avatar for Ghost0s

That's an extremely broad topic... Without programming there's no software. Without algorithms there's no programming. Of course implementing an algorithm in a computer program requires programming. But you can envision an algorithm and describe it in other contexts as well, without writing any need at all. For example a sorting …

Member Avatar for vegaseat
0
311
Member Avatar for Dani

looks good, but without a menu it's going to be a nightmare to navigate.

Member Avatar for Reverend Jim
6
684
Member Avatar for overwraith

you NEVER debug production code. Rather you analyse the log files (those should of course exist and be designed to have useful information), then try to recreate the scenario on another machine (which should be as close to the production environment in all respects as you can get it, including …

Member Avatar for jwenting
0
578
Member Avatar for diafol

I'm all for condensing the signatures :) Doesn't mean mods can't be identified though. There's room next to the rep count (or is that rap sheet?), or use a different colour font for their names.

Member Avatar for ~s.o.s~
1
359
Member Avatar for jeya1562

open source does not mean no cost. There can certainly be a cost involved, but generally that cost will be no more than the cost of delivering the code to you (e.g. a company I used to work for had an open source project, the source would however be distributed …

Member Avatar for jwenting
0
188
Member Avatar for screenedcreamy

yes, add it to the WEB-INF/lib folder. That's the classpath for a web application, everything else is ignored except those classes provided implicitly by the application server (the JEE and standard libraries, and sometimes things in an ext lib directory as defined by the application server (which would be specific …

Member Avatar for screenedcreamy
0
245
Member Avatar for apekodonkorjewel

no need to draw anything out of the boxes. Just open them and look inside... Yes, that's a trick answer to a trick question.

Member Avatar for jwenting
0
324
Member Avatar for Tierra

read your inner loop carefully. j starts at 1, then is decreased until it is smaller than i. i starts at 6, then is increased. So your inner loop never terminates, as it starts smaller than i, and then is made ever smaller and smaller. Of course eventually it will …

Member Avatar for jwenting
0
236
Member Avatar for kermie

Read your warranty carefully... Depending on brand and sometimes even product it can vary wildly. I KNOW Nikon USA for example does not honour any warranty for any Nikon product that's not sold by them, and the rest of the world does not honour warranty on anything sold by Nikon …

Member Avatar for jwenting
0
101
Member Avatar for pooran.c

WTH are you trying to submit a 30MB http request in one bit? Multipart mime requests have been with us for over a decade.

Member Avatar for pooran.c
0
198
Member Avatar for Varunkrishna

Java does not give you direct memory access, that's one of the main reasons they designed the language in the first place, do away with all that messy malloc, calloc, etc. etc. you're stuck with in C. And no, your program doesn't allocate any memory at all. It requests storage …

Member Avatar for Varunkrishna
0
286
Member Avatar for ajit.nayak

why should we help you leech data from other peoples' websites without their permission? Contact the site owners and ask them if they can supply you with the data. If the data is supposed to be available to other applications, they'll have a system in place you can subscribe to …

Member Avatar for jwenting
0
184
Member Avatar for directorabbey

you don't want to do any of that. https://crackstation.net/hashing-security.htm Do NOT try to store passwords unless you have to, and then only do it if you really know what you're doing (and if you're asking this, you don't).

Member Avatar for jwenting
0
80
Member Avatar for laguardian

main observation here: don't do this. NEVER create SQL statements this way, ALWAYS use PreparedStatements or better yet JPA. Prevents a lot of problems.

Member Avatar for jwenting
0
2K
Member Avatar for overwraith

porting usually means getting something to work on a different operating system and/or hardware. This is largely a manual process (though I'm sure there are tools that can help identify common areas of interest). Transpiling is the move of one language to another. While there are tools that can help …

Member Avatar for deceptikon
0
255
Member Avatar for anand01

an instance of an inner class exists only within the context of an instance of its outer class, UNLESS it's static. Result is that an inner class of a non-serializable outer class is not serializable, even if it is marked as serializable itself.

Member Avatar for anand01
0
145
Member Avatar for Dani

signatures are way too big and prominent. Tag clouds appearing only at the far bottom are a pain, place them in the side bar instead.

Member Avatar for happygeek
0
436
Member Avatar for Dani

Overall, very nicely done. Clean and modern, professional look. Some points though: 1. the white margins on the left and right are rather big, costing a lot of room on screen. Make the main pane wider, so people need to scroll less. 2. Font could be a tad smaller (1-2 …

Member Avatar for Dani
4
640
Member Avatar for infoitmanoj

you NEVER, EVER want to store plain text passwords. It's an invitation to getting your users' accounts stolen, and most people use the same username and password in a lot of places... You also NEVER, EVER, want to use MD5 as it's not secure at all. https://crackstation.net/hashing-security.htm read this as …

Member Avatar for Taywin
0
227
Member Avatar for karthick_3

never heard of thymeleaf, JSP is way outdated. Use JSF instead. Spring MVC of course doesn't force you into a specific view technology in the first place. Decoupling is the name of the game after all.

Member Avatar for jwenting
0
112
Member Avatar for Suzie999

why scary? Any logout from any website is just a link you click. Which submits a request to a webserver somewhere. Javascript can submit requests to webservers, so can a lot of other things. Of course it's possible to write a logout system that requires active cooperation from the user, …

Member Avatar for nullptr
0
233
Member Avatar for hari_10

The End.