Search Results

Search found 30555 results on 1223 pages for 'closed source'.

Page 218/1223 | < Previous Page | 214 215 216 217 218 219 220 221 222 223 224 225  | Next Page >

  • How hard is FizzBuzz? [closed]

    - by Josh K
    After reading various blog entries I took it upon myself to code a FizzBuzz program in PHP. class FizzBuzz { function __construct() { } function go() { for($i = 1; $i < 101; $i++) { if($i % 3 == 0 and $i % 5 == 0) { echo("FizzBuzz\n"); continue; } else if($i % 3 == 0) { echo("Fizz\n"); continue; } else if($i % 5 == 0) { echo("Buzz\n"); continue; } else { echo($i."\n"); } } } } $FB = new FizzBuzz(); $FB->go(); Created the FizzBuzz object just because I could, I complete this in under five minutes. Is it really that hard to do?

    Read the article

  • Securing a .NET Application [closed]

    - by beakersoft
    Duplicate: Protecting .NET Code from Reverse Engineering We've recently released a small application and this weekend I found a cracked version of it on Piratebay that had the registration checking removed, so the app ran as if it was a registered version. Apart from using a code obfuscation tool (which doesn't seem to be that hard to get around), are there any standard things we should be doing to make our .NET applications more difficult to crack?

    Read the article

  • Reading one or more to understand ? [closed]

    - by Tarik
    I love coding and designing applications but there is something annoying me so much. Some times I can't focus and understand what I am reading when learning new code or a new subject or whatever and that really annoys me because It causes me to read again and again and again which really puts me off and frustrate me. Does something like this happen to you or is there some problem with me ?

    Read the article

  • VMWare steals IP addresses [closed]

    - by Ishan Amin
    I'm having a peculiar problem, that I think I have narrowed down to VMware. For the past one year, every once in a while we lose internet connection and not all users (about 10 users) go down at the same time, its usually one-by-one. First someone will call me and say "Internet is down" and then we would go reset the router and modem and switch and it would be working again for a while, then go down again without any pattern or replicatable sequence. We'd go repeat the steps again to get everyone in the office running again. We called our Internet Service Provider and they constantly say, We see your modem and we see your router and from thier end everything is OK. we replaced our router and switch and modem, twice! Last friday, it dawned upon me, that everytime we turn on a VMware machine, this sequence of taking everyone down starts, which also explains the message that my users get for "IP Conflict Found" So we do alot of VMware testing and lo and behold, it takes my Internet down. My Yahoo and Gtalk would continue working but www is down when the VMware machines are started. I do use bridged networking to all the VMware machines, but I dont know what else to set it at. now, sorry for this long rambling but anyone have any clue on how to stop this? thanks IA

    Read the article

  • bcdkklen ad,m ad.a [closed]

    - by user275852
    bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen bcdkklen

    Read the article

  • Linux: file recovery (Urgent) [closed]

    - by Ashine
    Hi Firends, I desperately need some help regarding problem I am facing now. While creating a softlink for a very important file I gave the reverse command by mistake. Instead of giving it "ln target linkname" I have given it 'ln linkname target'. This has resulted in references pointing to target files are now pointing to links and the actual refernces to target files are lost. How can I recover the files back. "/home/user/data1" was original file location. "/home/user/db2" was the desired softlink for this data. I haveto give "ln data1 db2" but I have given 'ln db2 data1'. This has resulted in 'data1' being now pointing towards 'db2' and the actual data in 'data1' can not be retrieved. Some one please help. Thanks in advance.

    Read the article

  • JAVA vs .NET - Choice for way to go further [closed]

    - by Sarang
    I have my subject .Net acedemically. I also learned core Java and did a project as well. I took training from a Java firm. Now, as a skill I do have knowledge as both language. But, it is creating a large problem to me that, which field I should chhose? Even if having better OOP fundamentals, will it be easier for me to transfer from one to another in the future ? Please suggest me a way. Also, we do have may technologies available at both side, like JSP, JSF, J2ME, Share Point, SilverLight etc. Which is better as per their reliabity point of view? Which are fast growing and useful technologies used mostly in current IT corporate world ? Are they easier to learn at fresher's point of view? Please answer. Perhaps, this answer may help me mostly to create my way to learn them and go further. Every IT developer, please help to find me my way.

    Read the article

  • What is the maximum length of a C# string [closed]

    - by Ahmet Altun
    Possible Duplicate: What is the maximum possible length of a .NET string? How long a C# string can be in maximum? Is there any limitation? Considering if MSN was written in C#, the instant messaging would be designed as Textbox. So, the content would be Textbox.text, which is a string. But can System.string can store such a long value. I assume, string class holds value contiguously.

    Read the article

  • Bitap algorithm in Java [closed]

    - by davit-datuashvili
    The following is the bitap algorithm according to Wikipedia. Can someone translate this to Java? #include <string.h> #include <limits.h> const char *bitap_bitwise_search(const char *text, const char *pattern) { int m = strlen(pattern); unsigned long R; unsigned long pattern_mask[CHAR_MAX+1]; int i; if (pattern[0] == '\0') return text; if (m > 31) return "The pattern is too long!"; /* Initialize the bit array R */ R = ~1; /* Initialize the pattern bitmasks */ for (i=0; i <= CHAR_MAX; ++i) pattern_mask[i] = ~0; for (i=0; i < m; ++i) pattern_mask[pattern[i]] &= ~(1UL << i); for (i=0; text[i] != '\0'; ++i) { /* Update the bit array */ R |= pattern_mask[text[i]]; R <<= 1; if (0 == (R & (1UL << m))) return (text + i - m) + 1; } return NULL; }

    Read the article

  • Access to Windows 7 log from a remote machine [closed]

    - by robob
    I'm trying to access with EventViewer (from a Windows XP Prof) to a remote machine with Windows 7 (Seven). Before I started the Service "RemoteRegistry" I received an "Access Denied". After started the service I can connet to the machine Log (in EventViewer app) but when i clik on any log as "Application" or "Security" I receive a "privilege" error. Could someone help me, please?

    Read the article

  • Is it worthwhile learning about Emacs? [closed]

    - by dole doug
    Hi there Some time ago, I've heard what a great tool Emacs can be. I've read some papers about it and some watched some video too. I've read that emacs is great not only for developers but for usual users too...so i decided to start learning how to use it and wok with it. The problem is that I'm a MS Windows user and I learn in my spare time PHP and C(I also did some products on those languages, but i still considering myself in learning stage). Another problem is that I learn alone (no friends around to ask/learn from them, programming related stuff). Can you give me some tips about how to use those type of tools(especially those written for gnu/unix) with "poor" GUI but rich features? Do you recommend to use the specific windows written applications only and forget about those which come from GNU?

    Read the article

  • Outlook MAPI session exception when outlook interface is closed

    - by michele
    I'm developing a email sender that retrieve data from a database, build up a MailItem with the Outlook Interop and send it. My email sender is running by a windows service that is notified everytime there's some data to send. I'm logging on the MAPI session of Outlook without problem and everything seems to work. But... when someone open Outlook interface and then close, my service crash at the first attempt i call a SendAndReceive method, with an exception that report that the session is assigned to another thread. I'm googling around for hours and i'm listening to the application_quit event, raised by the interface closing, trying to logoff and logon again to the application...but i'm still falling in the same error. Where am i wrong?Any suggestion? Thank you in advance

    Read the article

  • Ive just created a site! [closed]

    - by Steven Pollock
    Hi i just recently made a website and i need to get decent hits on it! The URL is http://www.aussiebac kpackersclan.net It is a clan website that also has its own gaming tournament ladder system and we want teams to sign up!!! What is the best method of achieving this promotion?

    Read the article

  • which collaborative tools do you use to communicate between team members [closed]

    - by john
    I work for a small company and would like to set up some sort of a collaborative tool so that team members can share thoughts, upload documents...something like sharepoint maybe, but not that suffisticated. Only good option I've seen so far is joomla CMS. Just want to get an opinion of the community on which tools they have used for these purposes. I know this is not programming related but I thought stackoverflow community would be good to get an opinion on this.

    Read the article

< Previous Page | 214 215 216 217 218 219 220 221 222 223 224 225  | Next Page >