213 Topics

Member Avatar for
Member Avatar for ggadweb
Member Avatar for Yao889956

Greedy algorithm is an algorithm based on the greedy approach, which is commonly used to find the globally optimal solution by selecting the locally optimal solution at each step, considering the given constraints. The application of the greedy algorithm in computer monitoring software can include several aspects: File scanning: When …

Member Avatar for Dani
0
132
Member Avatar for amol88

Virtual assistants can cut your costs by doing a variety of tasks on your behalf, and they are often highly efficient. You can even outsource clerical tasks like answering phone calls to them. As they are not employees, they do not have equity in your business, so you can save …

0
77
Member Avatar for trayalex812

The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving …

0
319
Member Avatar for benmoz

Hi I need some help! We are a small business with around 15 people in the sales/ marketing/ customer service teams. We are looking to gain more visibility on what is happening from a social media perspective as we have a large number of sales coming direct from forums Currently …

Member Avatar for Scarlett_1
1
506
Member Avatar for fins88

Hi everyone, fins, Im 24 I currently work as an IT and marketing consultant for a Indonesia company that develops employee monitoring software. Wish everyone a good day!

Member Avatar for Dani
0
38
Member Avatar for Lesley_2

Hi everyone, I'm Lesley, Im 25 I currently work as an IT and marketing consultant for a Canadian company that develops employee monitoring software. Wish everyone a good day!

Member Avatar for rproffitt
0
34
Member Avatar for Dolphin0

Hi, I have been searching for freelance software developer on different websites for a while but failed to find him for the software I need. Been studying and researching a lot how could i come as close as possible to the solution i am looking for: what needs to be …

Member Avatar for rproffitt
0
315
Member Avatar for happygeek

I take security and privacy issues seriously, but sometimes I despair when news stories such as that regarding Samsung TVs eavesdropping on private conversation explode across the media as happened last week. The reason for my despondency has less to do with the data privacy debate and more to do …

Member Avatar for happygeek
3
1K
Member Avatar for overwraith

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started …

Member Avatar for rproffitt
0
445
Member Avatar for Reverend Jim

A quick recap on a Dell Inspiron I bought in December 2014. So far I have had a video problem that was caused by the Dell Tech installing a bad driver while trying to fix a bad USB 3 port problem. I had to send the unit back to Dell …

Member Avatar for CimmerianX
0
560
Member Avatar for b10hzrd

[ATTACH=RIGHT]18455[/ATTACH]Today we look at an often forgotten and overlooked component of the PC ecosystem, the Uninterruptable Power System (UPS). In general UPS’s do not tend to get a lot of attention, they are not sexy gadgets, have limited activity and much like insurance. No one really cares about it until …

Member Avatar for Nicolas_2
2
1K
Member Avatar for jLamp

I am looking for a centralized monitoring system for monitor the internet usage of the users in our network. My requirements are, 1. Get the Uploaded & Downloaded MB/GB of each user. 2. Allocate x number of GB for each user for month. Please give your suggest a software for …

Member Avatar for Darragh_1
0
647
Member Avatar for happygeek

As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he …

Member Avatar for jwenting
2
463
Member Avatar for happygeek

According to new research from Venafi, apparently some 74 percent of 'Forbes Global 2000 organizations' (or the big boys of business if you prefer) have yet to properly secure their public facing servers against the Heartbleed OpenSSL threat. That's a year after the thing broke for goodness sake! Venafi found …

Member Avatar for Slavi
2
374
Member Avatar for GGGraham

This tutorial is meant to be a helpful guide in order to successfully **create a tripwire application in C# which can be used for security purposes.** At the beginning you can find the background information to be fully familiar of the subject of this implementation. After this, we will put …

0
291
Member Avatar for mouaadable

Hi Everyone, i asked about maximuim internal size can my computer handle in this Topic : https://www.daniweb.com/hardware-and-software/pc-hardware/threads/480225/the-maximuim-internal-size-can-my-computer-handle- the guys said it's 2tb/4tb . looks like when testing it in real Life , this pc can't handle more than 1TB i tested 2 HArd drive , each one 2 Tera Byte …

Member Avatar for RobertHDD
0
3K
Member Avatar for cobra16

Hi I use Firefox as my browser and whenever I enter a search on the "search the web" box I'm diverted momentarily to [url]www.goonsearch.com[/url] then to [url]www.plusnetwork.com[/url] I have tried to eradicate the virus using many tools without success. I have completed all 8 steps in the sticky and included …

Member Avatar for RobertHDD
0
378
Member Avatar for happygeek

Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '[Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development](http://research.microsoft.com/apps/pubs/default.aspx?id=209878)' was published which Begel …

Member Avatar for Hiroshe
1
299
Member Avatar for marco1497

What open source software for PDAs/smart phones (like Blackberry )is best for student attendance monitoring/tracking? Any specific/brand of software? Or any possible specific hardware for that software?

Member Avatar for josetha
-1
303
Member Avatar for khess

The world's largest technical support, software and hardware companies use Linux on a daily basis for a variety of tasks and solutions. This post gives you an overview of all the ways in which large companies use Linux. Most don't use Linux on the desktop but do use it in …

Member Avatar for rubberman
0
4K
Member Avatar for zahnsoftware

I'd like to write a file monitoring tool that (1) Generates a report on how much time was spent on which file (2) Generates a timeline of file age. The need for this application is to track time for all programming projects. If the app would automatically track the time …

Member Avatar for lydia.aram.9
0
181
Member Avatar for WASDted

[ATTACH=RIGHT]15727[/ATTACH]Green is in these days, and so is saving money. The EcoStrip 2.0 looks like a common power strip with built-in surge protection but it actually works to save you money while reducing your carbon footprint. The EcoStrip 2.0 comes with a USB connector that you plug into your PC …

Member Avatar for Keil
1
482
Member Avatar for happygeek

Almost exactly a year ago I was writing about [the development of Google Glass](http://www.daniweb.com/hardware-and-software/pc-hardware/monitors-displays-and-video-cards/news/426788/no-google-glass-for-most-developers-until-2014) here at DaniWeb. In the meantime, the project has turned into a reality and [actual product has got into the hands of reviewers](http://www.pcpro.co.uk/features/380401/before-iwatch-and-google-glass-wearable-computing-milestones-and-failures/2) and some lucky users with $1,500 to spare. This would all be much …

Member Avatar for LastMitch
1
644
Member Avatar for happygeek

The University of Birmingham in the United Kingdom has been [researching](www.cs.bham.ac.uk/~tpc/Papers/P2PSecComm2012.pdf) how users of the hugely popular file-sharing BitTorrent peer-to-peer protocol are being monitored by those acting for copyright holders. What the researchers found surprised them, and may surprise those using BitTorrent to download pirated content: the average time it …

Member Avatar for Bigling
0
372
Member Avatar for WASDted

[ATTACH=RIGHT]21161[/ATTACH]Power, it’s a dirty word. Power corrupts, and I don’t just mean people and politicians. Power problems, impurities and inconsistencies are a huge contributor to problems with sensitive computer equipment. Power problems can damage hardware as well as your files and data. The losses and downtime that result from power …

Member Avatar for Mastaba
1
2K
Member Avatar for vizz

I need help to create **Process monitoring program.** (services, system, and user-run processes) If any **software/Process** wants to run, this program display it's details and ask user to **allow or block software/Process.** Also display List of All Running Processes with it's address(process related with perticular software) with **stop/block process** option. …

Member Avatar for NathanOliver
1
394
Member Avatar for amiralirezaei

Hi guys i was trying to integrate a very basic Client/Server chat software with Caesar Cipher. i just wanted to encrypt the communication using Caesar cipher. the Client/server chat software is using TCP sockets.i tried and integrated the cipher on client side but it encrypted all texts and its not …

Member Avatar for ddanbe
0
2K
Member Avatar for ITech

i want to monitor the egress interaface(tx) of the firewall and identify the users bandwidth, visited websites, who is having the most bandwidth for internet etc. i am planning to do this by port mirroring the port which is going to the firewall. the mirrored port will be connected to …

Member Avatar for BigPaw
0
312
Member Avatar for happygeek

Since last fall, Google has either closed down or combined more than 30 different products. If you thought that was the end of the axe wielding, think again: another bunch of Google technologies are to bite the dust. ![dweb-googlegone](/attachments/small/0/dweb-googlegone.jpg "align-right") According to the General Manager of Global Enterprise Search at …

Member Avatar for gyno
0
683
Member Avatar for holidaydarin

Explorer is running in the background and I can't stop it. This has been going on for a week or so. Explorer sometimes runs as two processes simultaneously, one under "New User" and one under "System". I use Firefox 99.9% of the time. Any advice will be much appreciated. Below …

Member Avatar for holidaydarin
0
375
Member Avatar for Dani

Is there any way to set the long_query_time for the slow query log to less than < 1s? We consider anything over 0.5s something wrong. Or can you recommend any MySQL monitoring software that can handle a super high load without a super amount of storage space?

Member Avatar for pritaeas
0
626
Member Avatar for kanonno.earhart.56

Hi guys! I'm not computer savvy and need your help and suggestions. And what do you think about my PC? Is it like really old? CPU-Z TXT Report ------------------------------------------------------------------------- Binaries ------------------------------------------------------------------------- CPU-Z version 1.61.2 Processors ------------------------------------------------------------------------- Number of processors 1 Number of threads 2 APICs ------------------------------------------------------------------------- Processor 0 -- Core …

Member Avatar for caperjack
0
374
Member Avatar for srv104

![IMG_13002](/attachments/small/3/IMG_13002.jpg "align-right") The D-link DCS-2230 offers a low cost solution to indoor surveillance. Boasting 2-way communication, wireless N connectivity, and 1080p resolution even in complete darkness. Opening the box provided the basics: The camera, power, documentation, mounting hardware, CAT5 cable, and installation software. After plugging the camera into my router …

Member Avatar for littlemisschic
1
286
Member Avatar for Cameron1012

Hey guys, so I was wondering if something is wrong with my PCI Express Card. I did the CPU-Z scan or whatever, and it says I have a PCI Express Card, but it also says the Link Width is x0 and the Max. Supported is x0. Is there something wrong …

Member Avatar for bnuppp
0
412
Member Avatar for MichaelDrew

The PC world is an ever changing one and according to trends the All-in-one market is going to show a large growth in the year to come. In addition touch screen devices are steadily gaining in popularity. With the planned Metro Interface of the Windows 8 operating system the touch …

Member Avatar for mdabusufian
1
878
Member Avatar for zina_a

hi, I prepare for a project for LAN monitoring,and I want to display hosts connected to the network with a jTree( the name or the adress of the machine),I do not know where I can start,is there any open source software that allows making something similar and thanks for help

Member Avatar for Majestics
0
80
Member Avatar for abshake4u

Hello Helpers! My Compaq M2000 laptop has been a victim of a very silly mistake done by me. I've followed the steps given in the below link: http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/threads/134865/read-me-before-posting-a-request-for-assistance following are the logs for your persual: **GMER One.log:** GMER 1.0.15.15641 - http://www.gmer.net Rootkit quick scan 2012-03-20 22:48:27 Windows 5.1.2600 Service Pack …

Member Avatar for gALENA
0
309
Member Avatar for Ritesh_4

Hello, I need advise on the software to use to write a mini program which can be used to monitor the CPU temperature of a computer. The program to be written will also need to control the fan speed whenever needed. Which among the following can be used to interact …

Member Avatar for tungnk1993
0
170
Member Avatar for vinodvinu

Hi all, My PC's internet connection speed is maximum 52 kilobytes per second. But my Antivirus software is downloading it's update files the speed of about 3 kilobytes per second. When i noticed this, i posed all downloads but still that speed remains. My network monitoring tool displays that the …

Member Avatar for CimmerianX
0
148
Member Avatar for zachattack05

Quick question. A few of the commercial/closed source applications I use contain an external exception handler or crash catcher and I am wondering if anyone has ever implemented something like this and would be willing to discuss the use of such a method of exception handling? Basically the way it …

Member Avatar for Philippe.Lahaie
0
247
Member Avatar for avinash_545

Hi everyone. Suppose I have my database in postgresql, with around 100 tables. I would like to know if there is any way to know which table(s) is affected after running a specific query. For example, if I add a new row, that software for example, should be able to …

Member Avatar for pritaeas
0
97
Member Avatar for meassokha

Dear all helper In recently, I found that my computer CPU usage always 100% usage and I notice that it cause by ping.exe in the process list. When I kill the ping.exe process, my CPU usage is go down well. But after a few seconds, the ping.exe run again and …

Member Avatar for jmamike
0
1K
Member Avatar for rexesq

I appearts that I have the Google Redirect malware somewhere. About 2/3 of the time,when I click on a Google result, I get redirected. This behavior happens only in MSIE; it does not happen in Chrome. I have run Super Antispyware, MS Security Essentials, and MBAM multiple times. SASW finds …

Member Avatar for alex.kerchner
0
348
Member Avatar for stevensan1983

I am in need of help ping.exe keeps running and using up all of my cpu i have tried to start in safe mode and delet this item but it replaced itself upon restarting in normal mode i have ran all the scans so far malware bytes is currently running …

Member Avatar for stevensan1983
0
537
Member Avatar for dapesche

So I was searching for that awesome pic of the anteater standing up saying 'f@ck you, I'm an anteater', for my wife because it is hilarious. Unfortunately, my AVG 'free' caught an issue, but it was too late. I noticed ping.exe in the task manager. Really appreciate you folks taking …

Member Avatar for PhilliePhan
0
413
Member Avatar for CustomChevyGuy

Shortly after Thanksgiving, I was having issues with the Ping.exe running my CPU usage up to 100% and freezing my computer. I ran my Avira Antivirus and it said it had found a Trojan, and quarantined it. However, after this, I was still having issues with the Ping.exe issue. I …

Member Avatar for PhilliePhan
0
546
Member Avatar for tat2dlady

Hi. I am having some trouble with my computer. Here is a quick review of issues...About a month ago my McAfee AV kept getting turned off. I could not figure out what was wrong. Nothing was found on any scans. I removed McAfee and got AVG free edition. It stopped …

Member Avatar for 07knev
0
621
Member Avatar for MMG

Dear community, On a quite regular basis, the screen of one of the laptops I use [COLOR="red"]blinks for a fraction of a second[/COLOR]. It does it like with some screen capture softwares when they are triggered. Besides, I'm observing from time to time some strange behaviour: [COLOR="red"]Command windows that open …

Member Avatar for jholland1964
0
285
Member Avatar for chantalrdj

HELP!!!I am running Windows 7 using the latest IE. Somehow this morning I got a nasty virus of 'System Fix' I ended up having to use Rkill to disable it and malwarebytes' to take it off. I thought that my computer was back to normal afterwards, but no! Shortly after …

Member Avatar for jholland1964
0
545

The End.