Search:

Type: Posts; User: Maven

Page 1 of 13 1 2 3 4

Search: Search took 0.18 seconds.

  1. Thread: Global Variable

    by Maven
    Replies
    2
    Views
    899

    Re: Global Variable

    include the header file anywhere u use the variable.
  2. Replies
    956
    Views
    210,800

    Re: What if there was a NEW vb6

    Learn a newer and better designed language.

    If your upset because technology changes, you're in the wrong field.
  3. Re: What languages are databases back-ends created in

    You can manage the filesystem from most programming languages. Just read up on file processing.

    But to answer your question, most will be written in C. Server programming is quite tedious because...
  4. Replies
    16
    Views
    40,824

    Re: What Boards have you used?

    I've done some bare metal programming on the raspberry pi in ARM. IE: no OS.

    But that's about it.
  5. Replies
    7
    Views
    24,043

    Re: Possible? Or am I crazy?

    You can do a part of this with a raspberry pi. You would also need a breadboard and some external stuff, but it's doable.

    ugh.. you just reminded me of my first project in Computer Arch.. making...
  6. Re: Using a mathematical identity to speed up certain calculations.

    I can only blame myself since I made the post without proof reading or checking the formula. The main point to the topic was that mathematical identities are useful for speeding up certain...
  7. Replies
    99
    Views
    11,711

    Re: Will .Net outlive us?

    Any language or library can become obsolete. Mainframe coding for example has fell by the wayside even though it was huge at one time; however, there is a lot of mainframe code still in existence and...
  8. Replies
    25
    Views
    6,430

    Re: Should I use VB to do this?

    VB.net is a little better because of its OOP support.
  9. Replies
    0
    Views
    2,174

    [Computer Security] Good Ted Talk

    Here is a good little talk introducing computer security. It's nontechnical.
    ...
  10. Re: Is the IRS story about the harddrive crash plausible to you?

    Economists are experts on the topic. I'll defer to them.
  11. Re: Using a mathematical identity to speed up certain calculations.

    I don't think one could tell much about comparing times like these. Processes are frequently swapped in and out by the operating system; as a result, one can't tell by looking at the system time how...
  12. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Why do you keep insisting that computer security is some kind of technician job?

    Is that why MIT rolls out computer security to first year grad students?
    ...
  13. Re: Using a mathematical identity to speed up certain calculations.

    I just seen he had an exit for in one of his algorithms. It's been a long time since I've looked at vb code, and I didn't notice it when I first posted.

    I posted the code above. And yes its...
  14. Re: Using a mathematical identity to speed up certain calculations.

    Here... I post code for you


    You need a power set function... I simply implemented one of the java functions from here: http://rosettacode.org/wiki/Power_Set



    Public Function...
  15. Re: Using a mathematical identity to speed up certain calculations.

    And it is easily solved by the Gauss identity. And it's rather straight forwards. After all, you implemented the method in one of your posts.




    The only thing wrong was the index over the...
  16. Re: Using a mathematical identity to speed up certain calculations.

    A power set algorithm is what is needed. There have been many different power set algorithms made over the years, and one can find one of his or her liking with a quick google search.
  17. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    A company that delegates computer security to PC technicians simply doesn't have computer security. PC Technicians do not have the qualifications of computer security professionals; instead, PC...
  18. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Uhh.. you obviously don't know what your talking about.

    Do you even know the background you need to do security as a profession? Obviously, this is a new world for you.
  19. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Since when is security experts aka white hats known as "blue collar"? People who sign their paychecks would beg to differ. In addition, security is not the same thing as system administration.
    ...
  20. Re: Is the IRS story about the harddrive crash plausible to you?

    America's high inequality is an economic fact. In addition, the system is not designed to make everything equal as the high inequality is a counter for such an argument.

    Finally, tax revenue...
  21. Re: Is the IRS story about the harddrive crash plausible to you?

    People's ideology influences opinions more than technical readings.

    Hard drives crash all the time. It may not have been backed up for various reasons. We can secure against this kind of loss;...
  22. Thread: Your Age

    by Maven
    Replies
    47
    Views
    8,944

    Poll: Re: Your Age

    Ugh... I'm getting closer to mean at 33.
  23. Re: Using a mathematical identity to speed up certain calculations.

    You have to take a power set of it. Use the single elements in the formula, the rest of the elements are used for intersections.

    Example: The power set of <1, 2, 3>

    <<1>, <2>, <3>, <1,2>,...
  24. Re: Using a mathematical identity to speed up certain calculations.

    The topic already explained when and where this kind of method is useful. It works when you need to sum up a set of numbers. In addition, it teaches algorithms.




    The Guass identity is the...
  25. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    By the way, if you'll PM me your email address I"ll send you an email with the missing directions.

    The next step if you want to get into learning security is to install splunk on the victim...
  26. Re: Using a mathematical identity to speed up certain calculations.

    Here is the code and how you would implement the mathematics from the OP.



    Public Class Form1

    Function CalculateResultBest(ByVal num As Long) As Long
    Dim n As Integer
    ...
  27. Re: Using a mathematical identity to speed up certain calculations.

    You should read the post you link more carefully:


    All optimization is premature unless

    A program is too slow (many people forget this part).

    You have a measurement (profile or similar)...
  28. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    http://us.norton.com/yoursecurityresource/detail.jsp?aid=usbdrives

    Might be a good idea to have a box set aside from the network to test them out. Those people will have no clue where those drives...
  29. [Computer Security] Defensive programming for web applications.

    The first rule of programming is to never ever trust the user. In fact, one should make the worse case assumption about users. In computer security, we call this assumption defensive programming....
  30. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Right, .net programmers don't have to worry about memory allocation issues. So memory leaks and buffer overflows aren't their concern; however, everything else in security is a concern.
  31. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    For visual basic programmers, logical problems, authentication problems, and failure to handle user input correctly will be the largest source of security problems. For example, visual basic programs...
  32. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Computer security is a programming concern. The exploit is caused by bad programming. For example, the above exploit worked because some programmer at Microsoft didn't control a buffer. The program...
  33. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Security and software engineering

    Yes, its good to have an expert come in and look things over. Are you guys just using one step authentication? Are you using multi-factor authentication? I would...
  34. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Yes and no. The security team at target dropped the ball in a big way. They were getting fire-eye warnings that their network was compromised; however, they ignored those warnings. So they didn't...
  35. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    I think security people need to promote security practices in forums like these because a lot of people here end up working in IT or land some programming jobs. And people here really need to...
  36. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    In the future, I'll write on detection. I'll set up the penetration stuff to generate data (it's complicated anyway), then show people what the data looks like in something like splunk.
  37. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    In the future, I'll write on detection. I'll set up the penetration stuff to generate data, then show people what the data looks like in something like splunk.
  38. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    Metasploit is a tool used in professional security to do penetration testing. It's widely used in professional security in fortune 500 and big high tech companies like Microsoft. In fact, Microsoft...
  39. Re: [Computer Security] Demonstration of the aurora hack: how hacking works.

    And there is a certain portion of the population of employees probably clicking on them. The risk here is that one of those URLs might be like the URL we crafted above in the aurora exploit.

    The...
  40. Replies
    17
    Views
    2,884

    Re: This forum has one flaw.

    http://www.vbforums.com/showthread.php?768949-Computer-Security-Demonstration-of-the-aurora-hack-how-hacking-works
Results 1 to 40 of 500
Page 1 of 13 1 2 3 4



Click Here to Expand Forum to Full Width