by: Chris Fynn |
last post by:
Is there an easy way to detect the local language settings of a client
browser or system?
I want to for example determine if the users browser or system is set to
English, French, or Italian...
|
by: Mad Programmer |
last post by:
I'm writing a destructive trojan with C++ and I need to know how I can
destroy the target's monitor and format the target's harddisk before the
target can stop the program.
What do I need to do?
|
by: Sony Music CDs install Malware |
last post by:
Whether you are a web surfer or a C++ developer, if you use Windows be
cautioned about SONY music CDs. They contain 'viewer' type software that is
actually a trojan horse for a "rootkit". The...
|
by: Roy |
last post by:
Hi,
I have a problem that I have been working with for a while.
I need to be able from server side (asp.net) to detect that the file i'm
streaming down to the client is saved...
|
by: eBob.com |
last post by:
I've got the basics of an XML ini file working. I.E. I can stash away
and retrieve user preferences. (Code below.) But how do I handle a
new preference? Say I have A and B. And then I invent...
|
by: =?Utf-8?B?bXkgY2F0IGtub3dzIG1vcmU=?= |
last post by:
* your browser was infected by trojan.win.32.obfuscated.gx. you need to
clean your system immediately or it will crash.
Okay so this is what keeps popping up every so often. I've downloaded...
|
by: =?Utf-8?B?UmFuZ2VyODAx?= |
last post by:
Hi All
My virus software detected a trojan horse virus in the smss.exe and
winlogon.exe files that were located in my C:\Program Files\Common Files\
Since then I can no longer log onto my MS...
|
by: pangsans |
last post by:
hai
i have a problem here because of a trojan attack..its called trojan agent horse.ACNS i googled it and could not find any relevant information. this trojan does not let me run anything.for...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|