-
as seen on Stack Overflow
- Search for 'Stack Overflow'
Hello all,
Is there any approach to convert an application developed in .NET into a native executable (sources are included)?
Installing the whole framework (up to .NET Framework 3.5 SP1) takes a lot of time - not always the computers are updated from the internet. Is it possible to call NGen in…
>>> More
-
as seen on Stack Overflow
- Search for 'Stack Overflow'
Is there a reliable way to know what executable has called my executable?
I have a .NET executable but I would like to know who has started my application.
>>> More
-
as seen on Ask Ubuntu
- Search for 'Ask Ubuntu'
I mount an NTFS partition (where I've got some Linux binaries and scripts alongside with Win32 and data files) with the following fstab line:
/dev/sda5 /mnt/dat ntfs-3g rw,dev,exec,auto,async,users,umask=000,uid=1000,gid=1000,locale=en_US.utf8, errors=remount-ro 0 0
All files seem to have executable…
>>> More
-
as seen on Ask Ubuntu
- Search for 'Ask Ubuntu'
I followed a previous post to install dssp on ubuntu
How to install dssp (secondary structure assignments) under 12.04?
After the installation I tried to execute dssp which was in /usr/local/bin/dssp
But it gave me the following error
bash: /usr/local/bin/dssp: cannot execute binary file
Also I…
>>> More
-
as seen on Ask Ubuntu
- Search for 'Ask Ubuntu'
I have purchased a piece of software to configure programable radio control transmitters. It says it will run on Linux, see below:
Digital Radio runs on: Microsoft Windows 2000/2003/XP Microsoft
Windows Vista/Seven/2008, Linux Ubuntu or a distribution with Mono, 32
or 64 bit, also in a virtual…
>>> More
-
as seen on Super User
- Search for 'Super User'
I want keylogging software on my laptop for lifelogging purposes. But the software I can find is targeted towards stealth activity. Can anyone recommend a keylogging software targeted towards personal backup.
Ideal Functionality
Runs publicly (like in the task bar).
Easy to turn off (via keyboard…
>>> More
-
as seen on Super User
- Search for 'Super User'
Is there anyway Encryption on an unidentified file can be broken(file in question: config file and log files from ardamax keylogger). These files date back all the way to 2008. I searched everywhere, nothing on slashdot, nothing on google. Ardamax Keyviewer? Should I just write to Ardamax? I am at…
>>> More
-
as seen on Ask Ubuntu
- Search for 'Ask Ubuntu'
I just within the last few hours had my Amazon and Gmail accounts hijacked. Purchases were made through my Amazon account that I didn't authorize...in fact, I wasn't even in my room. According to Gmail, the IP address of when I got hijacked was where I live.
Enough rambling, here's my question:…
>>> More
-
as seen on Super User
- Search for 'Super User'
Whilst pondering about security, and setting up different VM for certain online activities deemed more risky or requiring extra security (banking, or visiting untrusted websites, etc), I came to think about how such a setup (different VMs for different uses) would defend me against a keylogger.
So…
>>> More
-
as seen on Super User
- Search for 'Super User'
I had a program created for me recently and didn't really think about it being executable posing a threat since I pretty much trust the source but not completely. I then thought about the fact that a keylogger, or any kind of spyware or malicious software could've been possibly binded to it. This…
>>> More