Search:

Type: Posts; User: weaver_x7; Keyword(s):

Search: Search took 0.09 seconds.

  1. Replies
    13
    Views
    47,698

    I've written a program that takes a list of ip's...

    I've written a program that takes a list of ip's and port numbers and creates an ftp connection to them using threads. The main part of this program creates a thread for a new connection, and does...
  2. Replies
    12
    Views
    3,514

    If I remember correctly, since MSN uses your...

    If I remember correctly, since MSN uses your hotmail account as your login, they actually use the same contact lists. You'll probably have to add them again.
  3. Thread: Netsky.C

    by weaver_x7
    Replies
    3
    Views
    5,672

    An interesting tidbit about Netsky.c. It seems to...

    An interesting tidbit about Netsky.c. It seems to want to disable MyDoom.a and MyDoom.b. Look at McAfee's site here .
  4. Replies
    5
    Views
    2,599

    I don't know why you made a second class in this...

    I don't know why you made a second class in this example. You can have a main method in any class. It will only run if you try to run this class or explicitly call it.


    I see 2 errors with your...
  5. Replies
    9
    Views
    3,383

    Actually, it's BEDMAS. Brackets Exponents...

    Actually, it's BEDMAS.

    Brackets
    Exponents
    Division
    Multiplication
    Addition
    Subtraction
  6. Replies
    16
    Views
    20,786

    All java source files must have the .java...

    All java source files must have the .java extension in order to be compiled.
  7. Replies
    4
    Views
    7,184

    Thanks, I'll take a look at those.

    Thanks, I'll take a look at those.
  8. Replies
    4
    Views
    7,184

    Encryption Algorithms

    Does anyone have any good resources on encryption algorithms?
  9. Replies
    8
    Views
    7,660

    Ok, I think I should consolidate what I am...

    Ok, I think I should consolidate what I am looking for.

    - Command line encryption program (preferably commercial)
    - Must be able to encrypt part of a line (like position 23 to 36)
    - Must be able...
  10. Replies
    8
    Views
    7,660

    To be honest, I don't care what encryption I use....

    To be honest, I don't care what encryption I use. I am actually using Oracle's sqlload command to load the data into Oracle. The data actually is coming from a number of different machines to one...
  11. Replies
    25
    Views
    17,522

    AVG is a very nice antivirus program. It will...

    AVG is a very nice antivirus program. It will work on any Windows OS (maybe not 3.1 but who is running that anyway). There is very little overhead with it and I have noticed that it can usually deal...
  12. Replies
    8
    Views
    7,660

    Actually, I am importing the data into Oracle...

    Actually, I am importing the data into Oracle already. The data needs to be encrypted before it is loaded into Oracle.
  13. Replies
    8
    Views
    7,660

    I need to encrypt part of the file because it is...

    I need to encrypt part of the file because it is sensitive information. I won't be able to work with the rest of the data if the whole file is encrypted.
  14. Replies
    8
    Views
    7,660

    Command line encryption program

    I am looking for a command line encryption program that can encrypt a specific part of a line within a file.

    The program must run on unix and idealy should be a commercial product.
Results 1 to 14 of 14