Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: BigDick; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    6
    Views
    777

    Here is another way of processing them,...

    Here is another way of processing them, especially if you are expecting specific arguments (code is from C, but c++ works the same as do most language). This code snippet allows for tacked arguments...
  2. the latest craze

    There seems to be some sort of pattern. It seems as though, currently, if you are a celebrity of any kind and you want some more "exposure" the best/fastest (sic) way of getting that is to have a...
  3. Replies
    8
    Views
    1,141

    Google, from what I've heard, likes to utilize...

    Google, from what I've heard, likes to utilize CommonLisp for a lot of their development, if this is the case then it is entirely possible that the strength of the google programs has allowed them to...
  4. You can use inheritance, but this is for a bunch...

    You can use inheritance, but this is for a bunch of objects that while similar do not necissarily inherit from anything. Beans if you will. Which all have fields that need to be accessed and...
  5. Code Generation and you, how to win friends and influence people...

    This is a tutorial that provides programmers with a tasty morsel of information straight from the mind of BD. It explains how repititious code can be easily created, with much lower cost of...
  6. Replies
    54
    Views
    3,397

    Look at it this way, in many cases a school IT...

    Look at it this way, in many cases a school IT guy make be extremely overwhelmed. My high school had like .334 IT people on the staff that was comprised of principals, teachers, and students with...
  7. True enough, but I think m$ lucked out on this,...

    True enough, but I think m$ lucked out on this, because this will be the one thing that every body hears about and because IE isn't vulnerable, even though we all know it's because they're slow, M$...
  8. Programs have bugs, or issues, as they are...

    Programs have bugs, or issues, as they are commonly called, which is the result of their being made by people, which are also not perfect. The main issue with spyware is that entirely too many...
  9. Thread: IDE's

    by BigDick
    Replies
    4
    Views
    749

    In general a IDE's compiler is the same as the...

    In general a IDE's compiler is the same as the standard compiler for the project, it has to be. This is why some IDEs require that you specify the compiler path. Every IDE I've used has had this,...
  10. Replies
    13
    Views
    19,400

    Just out of curiousity, how is the resource...

    Just out of curiousity, how is the resource efficiency of this system? Java tends to be a resource whore, which is a small part of the reason I don't care for it. Also I noticed a comment about raw...
  11. Thread: What is CVS?

    by BigDick
    Replies
    3
    Views
    620

    Just out of curiosity, why do you need to know...

    Just out of curiosity, why do you need to know what CVS is? A few things to note, if you are considering starting a repository, I've found subversion easy to use and as they say it is an updated CVS...
  12. Replies
    7
    Views
    918

    If you use Java, you should know that to take...

    If you use Java, you should know that to take full advantage of it you need a container such as Tomcat, http://jakarta.apache.org/tomcat/index.html, with that having been said, you should also check...
  13. Thread: asp on linux

    by BigDick
    Replies
    8
    Views
    693

    Is the error a mysql error? If so you should...

    Is the error a mysql error? If so you should link your mysql.sock file to the location it asks and that should clear your problem right up. On the other hand, I have seen nothing wrong with the...
  14. Replies
    9
    Views
    834

    I think just the redirect from a meta tag would...

    I think just the redirect from a meta tag would be plenty. Especially since you can set the time to be what ever you want it to be. I agree that redirects can be annoying, but it depends upon how...
  15. Replies
    10
    Views
    2,011

    Electronic Identity theft isn't the only method...

    Electronic Identity theft isn't the only method for having one's identity stolen, I myself had mine stolen by lost mail (such as a credit card statement that somehow went to an old apartment) ...
  16. Replies
    13
    Views
    1,432

    You can use Achilles to check for get/post data...

    You can use Achilles to check for get/post data that should/should not be there, or be editable, use something like nessus to check for vulnerabilities in your server technolog(y/ies).
    You asked...
  17. Replies
    40
    Views
    2,979

    What about a NeXTStep/Mac OSX debate???? Any...

    What about a NeXTStep/Mac OSX debate???? Any takers????
    /me evil laugh
  18. Replies
    40
    Views
    2,979

    Okay a few things, first things first one of the...

    Okay a few things, first things first one of the paradigms of programming states that there are roughly 10 bugs to every 150 or so lines of code, Gore is right, if opened, Windows would have an...
  19. Replies
    10
    Views
    2,308

    Exactly, but another thought, if they have full...

    Exactly, but another thought, if they have full access to the machine couldn't they in theory insure that the evidence they want is there. And even if it wasn't actually there, what's to stop the...
  20. Replies
    20
    Views
    3,324

    As previously stated Java is (like C# is now) the...

    As previously stated Java is (like C# is now) the wierd one as far as programming languages go. It's "Compiled" into java byte code, which is then interpreted by the Java Virtual Machine, which I've...
  21. Replies
    13
    Views
    1,315

    I don't know how to respond to this. In one way...

    I don't know how to respond to this. In one way I can see that the possible ramifications of viral infection of automobiles, airplanes, etc. But at the same time, I don't feel that blaming the...
  22. Replies
    11
    Views
    3,420

    You should try to download process explorer from...

    You should try to download process explorer from http://www.sysinternals.com/ and run that, the site also has several other applications for windows included in the ps-tools stuff. These...
  23. Replies
    31
    Views
    1,791

    This seems to me to just be more of the same ol'...

    This seems to me to just be more of the same ol' stuff when it comes to Microsoft. It seems as though they are overly protective of their income, which is much more than most people could ever...
  24. Replies
    14
    Views
    1,561

    You were correct in you assumption. Now you can...

    You were correct in you assumption. Now you can scan from Files, String and Readables in addition to streams.
    As far as the visible change, from method call to constructor, they were using a...
  25. Replies
    7
    Views
    1,295

    I agree, but it's extremely prolific in...

    I agree, but it's extremely prolific in industrial development and wanted any young programmer who might be going into that field one day to be made aware of the concept.
Results 1 to 25 of 40
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides