by: David Sworder |
last post by:
Hi there,
I come from a Visual C++ background. When writing a service that's
exposed to the Internet, I had to check the incoming data stream (from the
client) VERY carefully. If a hacker was...
|
by: Adam Hartshorne |
last post by:
Hi All,
I have the following problem, and I would be extremely grateful if
somebody would be kind enough to suggest an efficient solution to it.
I create an instance of a Class A, and...
|
by: Paul Gorodyansky |
last post by:
Hi,
More than a year passed since Netscape/Mozilla implemented what IE had since IE 5:
http://www.faqts.com/knowledge_base/view.phtml/aid/1661
Is Opera still behind and does not allow...
|
by: cody |
last post by:
no this is no trollposting and please don't get it wrong but iam very
curious why people still use C instead of other languages especially C++.
i heard people say C++ is slower than C but i can't...
|
by: darrel |
last post by:
I've asked this a few times and gotten answers, but I'm still missing a
piece of the puzzle.
Here's what I have:
- page.aspx
- title tag
- usercontrol.aspx
- usercontrol.aspx.vb
|
by: Simon-Pierre Jarry |
last post by:
Hi,
I created a custom HttpModule for managing the security of my
application. in "Init" sub, I regsiter the events doing that :
Public Sub Init(ByVal context As System.Web.HttpApplication)...
|
by: twoeyedhuman1111 |
last post by:
I want some l33t exploits!
|
by: Kamilche |
last post by:
I switched to Python a couple years ago, and haven't looked back. I've
used Python for many applications, including several commercial plugins
for Poser. I don't post on here much, because I don't...
|
by: bekz |
last post by:
Hi All,
I have written exploits for binaries with fixed stack frame pointer.
But now a days most of the compliers generates instrutions with random
stack frame pointer. And with injecting...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|