Search:
Type: Posts; User: Maven
Search:
Search took 1.26 seconds.
-
include the header file anywhere u use the variable.
-
Learn a newer and better designed language.
If your upset because technology changes, you're in the wrong field.
-
You can manage the filesystem from most programming languages. Just read up on file processing.
But to answer your question, most will be written in C. Server programming is quite tedious because...
-
I've done some bare metal programming on the raspberry pi in ARM. IE: no OS.
But that's about it.
-
You can do a part of this with a raspberry pi. You would also need a breadboard and some external stuff, but it's doable.
ugh.. you just reminded me of my first project in Computer Arch.. making...
-
I can only blame myself since I made the post without proof reading or checking the formula. The main point to the topic was that mathematical identities are useful for speeding up certain...
-
Any language or library can become obsolete. Mainframe coding for example has fell by the wayside even though it was huge at one time; however, there is a lot of mainframe code still in existence and...
-
VB.net is a little better because of its OOP support.
-
Here is a good little talk introducing computer security. It's nontechnical.
...
-
Economists are experts on the topic. I'll defer to them.
-
I don't think one could tell much about comparing times like these. Processes are frequently swapped in and out by the operating system; as a result, one can't tell by looking at the system time how...
-
Why do you keep insisting that computer security is some kind of technician job?
Is that why MIT rolls out computer security to first year grad students?
...
-
I just seen he had an exit for in one of his algorithms. It's been a long time since I've looked at vb code, and I didn't notice it when I first posted.
I posted the code above. And yes its...
-
Here... I post code for you
You need a power set function... I simply implemented one of the java functions from here: http://rosettacode.org/wiki/Power_Set
Public Function...
-
And it is easily solved by the Gauss identity. And it's rather straight forwards. After all, you implemented the method in one of your posts.
The only thing wrong was the index over the...
-
A power set algorithm is what is needed. There have been many different power set algorithms made over the years, and one can find one of his or her liking with a quick google search.
-
A company that delegates computer security to PC technicians simply doesn't have computer security. PC Technicians do not have the qualifications of computer security professionals; instead, PC...
-
Uhh.. you obviously don't know what your talking about.
Do you even know the background you need to do security as a profession? Obviously, this is a new world for you.
-
Since when is security experts aka white hats known as "blue collar"? People who sign their paychecks would beg to differ. In addition, security is not the same thing as system administration.
...
-
America's high inequality is an economic fact. In addition, the system is not designed to make everything equal as the high inequality is a counter for such an argument.
Finally, tax revenue...
-
People's ideology influences opinions more than technical readings.
Hard drives crash all the time. It may not have been backed up for various reasons. We can secure against this kind of loss;...
-
Ugh... I'm getting closer to mean at 33.
-
You have to take a power set of it. Use the single elements in the formula, the rest of the elements are used for intersections.
Example: The power set of <1, 2, 3>
<<1>, <2>, <3>, <1,2>,...
-
The topic already explained when and where this kind of method is useful. It works when you need to sum up a set of numbers. In addition, it teaches algorithms.
The Guass identity is the...
-
By the way, if you'll PM me your email address I"ll send you an email with the missing directions.
The next step if you want to get into learning security is to install splunk on the victim...
-
Here is the code and how you would implement the mathematics from the OP.
Public Class Form1
Function CalculateResultBest(ByVal num As Long) As Long
Dim n As Integer
...
-
You should read the post you link more carefully:
All optimization is premature unless
A program is too slow (many people forget this part).
You have a measurement (profile or similar)...
-
http://us.norton.com/yoursecurityresource/detail.jsp?aid=usbdrives
Might be a good idea to have a box set aside from the network to test them out. Those people will have no clue where those drives...
-
The first rule of programming is to never ever trust the user. In fact, one should make the worse case assumption about users. In computer security, we call this assumption defensive programming....
-
Right, .net programmers don't have to worry about memory allocation issues. So memory leaks and buffer overflows aren't their concern; however, everything else in security is a concern.
-
For visual basic programmers, logical problems, authentication problems, and failure to handle user input correctly will be the largest source of security problems. For example, visual basic programs...
-
Computer security is a programming concern. The exploit is caused by bad programming. For example, the above exploit worked because some programmer at Microsoft didn't control a buffer. The program...
-
Security and software engineering
Yes, its good to have an expert come in and look things over. Are you guys just using one step authentication? Are you using multi-factor authentication? I would...
-
Yes and no. The security team at target dropped the ball in a big way. They were getting fire-eye warnings that their network was compromised; however, they ignored those warnings. So they didn't...
-
I think security people need to promote security practices in forums like these because a lot of people here end up working in IT or land some programming jobs. And people here really need to...
-
In the future, I'll write on detection. I'll set up the penetration stuff to generate data (it's complicated anyway), then show people what the data looks like in something like splunk.
-
In the future, I'll write on detection. I'll set up the penetration stuff to generate data, then show people what the data looks like in something like splunk.
-
Metasploit is a tool used in professional security to do penetration testing. It's widely used in professional security in fortune 500 and big high tech companies like Microsoft. In fact, Microsoft...
-
And there is a certain portion of the population of employees probably clicking on them. The risk here is that one of those URLs might be like the URL we crafted above in the aurora exploit.
The...
-
http://www.vbforums.com/showthread.php?768949-Computer-Security-Demonstration-of-the-aurora-hack-how-hacking-works
|
Click Here to Expand Forum to Full Width
|