|
by: Sean |
last post by:
Hi, I'm programming an IRC bot. I'm trying to establish a dcc
connection with another IRC client. I give the ipaddress and port
number to the client in the request. I listen to that port with
TcpListener on IPAddress.Any. The listener never receives a
connection.
My situation is the bot computer is behind a router. Is there
something special that must be done to bind to the router's port?
Thanks,
|
by: pbd22 |
last post by:
hi.
i am having probs understanding how to grab a file being uploaded from
a remote client. i am using hidden input fields for upload such as:
<input id="my_file_element" type="file" name="file_1" size=46 /><input
type=submit />
so, after adding a few files, the input fields look like this:
|
by: Tom |
last post by:
I need my data generating C program on computer #1 to export small
amounts of data (one - 40 byte data structure) periodically (once per
minute) to a C program on computer #2.
I am considering having computer #1 to create two duplicate data files
sequentially. (file_1.dat & file_2.dat).
Then, Computer #2 tries to open file_2.dat and upon failure it opens
file_1.dat.
|
by: starmonche |
last post by:
Hey guys this is a Linux networking question and I've not had any luck with getting it solved yet.
ra0 (192.168.1.90) connects to roommate's wireless router for internet
eth1 (192.168.8.1) feeds shared internet into WAN port of my router
eth0 (172.28.201.3) connects to a LAN port of my router
computers on my router are 172.28.201.xxx
my server shares files, runs bind, and is a dchp server (dhcp is disabled on my router)
this script...
|
by: mrsmitty13 |
last post by:
I'm looking for a solution but cant seem to find one so far so I was hoping somebody can help.
I just moved into a home that has a wired network already installed. It is all connected to a wired BEFSR81 Linksys Router. Unfortunatly its not a wireless one so in one of the jacks in my house i have a wirless DI-624 D-Link Router piggybacked that will allow my wireless laptops to surf the internet. The problem appears when I want to do file...
|
|
by: Saurabh |
last post by:
Dear All,
Can anyone tell me, how to write such a program that can transfer
files (either binary or text) behind NAT devices( such as for
computers behind firewalls and routers and other NAT devices) using
TCP socket programming.
I have a mechanism through which the public IP of the router and Port
number will be forwarded to me. But after that I am not sure that
simple TCP/IP socket programming will suffice or I need to do
|
by: John Salerno |
last post by:
Let me see if this question even makes sense...I'm reading Core Python
Programming and I jumped ahead to the more specific topics like network
programming. I plan to follow along with the example in that chapter and
create a socket connection between my desktop and laptop.
However, these two computers are already connected on my home network
(using the Windows Network Setup Wizard), so I was wondering if this
will have any effect on what...
|
by: 2boysnus |
last post by:
I set up a network at my work last week and we have been having some problems that I have not ben able to fix. We have:
2 New computers running Windows XP
2 New Computers running Windows Vista Home Premium
and 2 old Computers that are both running Windows XP and were the only two computers before and were networked.
We replaced an old router to a larger router with VPN capabilities. Everything went fine for the setup with the normal...
|
by: Asja |
last post by:
I have written an application that runs in a kind of peer-to-peer framework. Servers connect to a masterserver, which a client then queries to receive a list of servers. The client selects a server and connects to that server directly and both the server and client sever their connections with the masterserver.
Problem: I have the masterserver set up at a location and it is not behind a router or firewall or anything, just directly connected...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|