Search:

Type: Posts; User: BigDick; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    6
    Views
    6,482

    Here is another way of processing them,...

    Here is another way of processing them, especially if you are expecting specific arguments (code is from C, but c++ works the same as do most language). This code snippet allows for tacked arguments...
  2. the latest craze

    There seems to be some sort of pattern. It seems as though, currently, if you are a celebrity of any kind and you want some more "exposure" the best/fastest (sic) way of getting that is to have a...
  3. Replies
    8
    Views
    6,504

    Google, from what I've heard, likes to utilize...

    Google, from what I've heard, likes to utilize CommonLisp for a lot of their development, if this is the case then it is entirely possible that the strength of the google programs has allowed them to...
  4. You can use inheritance, but this is for a bunch...

    You can use inheritance, but this is for a bunch of objects that while similar do not necissarily inherit from anything. Beans if you will. Which all have fields that need to be accessed and...
  5. Code Generation and you, how to win friends and influence people...

    This is a tutorial that provides programmers with a tasty morsel of information straight from the mind of BD. It explains how repititious code can be easily created, with much lower cost of...
  6. Replies
    54
    Views
    25,682

    Look at it this way, in many cases a school IT...

    Look at it this way, in many cases a school IT guy make be extremely overwhelmed. My high school had like .334 IT people on the staff that was comprised of principals, teachers, and students with...
  7. True enough, but I think m$ lucked out on this,...

    True enough, but I think m$ lucked out on this, because this will be the one thing that every body hears about and because IE isn't vulnerable, even though we all know it's because they're slow, M$...
  8. Programs have bugs, or issues, as they are...

    Programs have bugs, or issues, as they are commonly called, which is the result of their being made by people, which are also not perfect. The main issue with spyware is that entirely too many...
  9. Thread: IDE's

    by BigDick
    Replies
    4
    Views
    5,272

    In general a IDE's compiler is the same as the...

    In general a IDE's compiler is the same as the standard compiler for the project, it has to be. This is why some IDEs require that you specify the compiler path. Every IDE I've used has had this,...
  10. Replies
    13
    Views
    47,496

    Just out of curiousity, how is the resource...

    Just out of curiousity, how is the resource efficiency of this system? Java tends to be a resource whore, which is a small part of the reason I don't care for it. Also I noticed a comment about raw...
  11. Thread: What is CVS?

    by BigDick
    Replies
    3
    Views
    4,736

    Just out of curiosity, why do you need to know...

    Just out of curiosity, why do you need to know what CVS is? A few things to note, if you are considering starting a repository, I've found subversion easy to use and as they say it is an updated CVS...
  12. Replies
    7
    Views
    6,740

    If you use Java, you should know that to take...

    If you use Java, you should know that to take full advantage of it you need a container such as Tomcat, http://jakarta.apache.org/tomcat/index.html, with that having been said, you should also check...
  13. Thread: asp on linux

    by BigDick
    Replies
    8
    Views
    6,298

    Is the error a mysql error? If so you should...

    Is the error a mysql error? If so you should link your mysql.sock file to the location it asks and that should clear your problem right up. On the other hand, I have seen nothing wrong with the...
  14. Replies
    9
    Views
    6,934

    I think just the redirect from a meta tag would...

    I think just the redirect from a meta tag would be plenty. Especially since you can set the time to be what ever you want it to be. I agree that redirects can be annoying, but it depends upon how...
  15. Replies
    10
    Views
    11,324

    Electronic Identity theft isn't the only method...

    Electronic Identity theft isn't the only method for having one's identity stolen, I myself had mine stolen by lost mail (such as a credit card statement that somehow went to an old apartment) ...
  16. Replies
    13
    Views
    10,795

    You can use Achilles to check for get/post data...

    You can use Achilles to check for get/post data that should/should not be there, or be editable, use something like nessus to check for vulnerabilities in your server technolog(y/ies).
    You asked...
  17. Replies
    40
    Views
    27,370

    What about a NeXTStep/Mac OSX debate???? Any...

    What about a NeXTStep/Mac OSX debate???? Any takers????
    /me evil laugh
  18. Replies
    40
    Views
    27,370

    Okay a few things, first things first one of the...

    Okay a few things, first things first one of the paradigms of programming states that there are roughly 10 bugs to every 150 or so lines of code, Gore is right, if opened, Windows would have an...
  19. Replies
    10
    Views
    17,234

    Exactly, but another thought, if they have full...

    Exactly, but another thought, if they have full access to the machine couldn't they in theory insure that the evidence they want is there. And even if it wasn't actually there, what's to stop the...
  20. Replies
    20
    Views
    19,081

    As previously stated Java is (like C# is now) the...

    As previously stated Java is (like C# is now) the wierd one as far as programming languages go. It's "Compiled" into java byte code, which is then interpreted by the Java Virtual Machine, which I've...
  21. Replies
    13
    Views
    9,580

    I don't know how to respond to this. In one way...

    I don't know how to respond to this. In one way I can see that the possible ramifications of viral infection of automobiles, airplanes, etc. But at the same time, I don't feel that blaming the...
  22. Replies
    11
    Views
    10,483

    You should try to download process explorer from...

    You should try to download process explorer from http://www.sysinternals.com/ and run that, the site also has several other applications for windows included in the ps-tools stuff. These...
  23. Replies
    31
    Views
    12,960

    This seems to me to just be more of the same ol'...

    This seems to me to just be more of the same ol' stuff when it comes to Microsoft. It seems as though they are overly protective of their income, which is much more than most people could ever...
  24. Replies
    14
    Views
    18,071

    You were correct in you assumption. Now you can...

    You were correct in you assumption. Now you can scan from Files, String and Readables in addition to streams.
    As far as the visible change, from method call to constructor, they were using a...
  25. Replies
    7
    Views
    12,872

    I agree, but it's extremely prolific in...

    I agree, but it's extremely prolific in industrial development and wanted any young programmer who might be going into that field one day to be made aware of the concept.
Results 1 to 25 of 40
Page 1 of 2 1 2