Jump to content
xisto Community

ethergeek

Members
  • Content Count

    388
  • Joined

  • Last visited

Posts posted by ethergeek


  1. @ethergeek: I know vectors are more dynamic then arrays, but are there any other advantagen when using them ?

    Lots. :rolleyes:

    They're thread safe

    They're easier to work with

    Parameterized, there's no casting needed like there was in 1.4-

    Serialize easier

    Implement most of the collections interfaces, so you get sorting, iterating, serialization...right out of the box

    Built in batch methods for adding collections to collections

    Object oriented collections almost always have an advantage over simple collections like arrays. The notable exception here is arrays of primitives...you can't make collections of primitives, so the JVM has to autobox/unbox them when you try...this can be slow if done in a large loop.

     

    Edit: I forgot to mention: when updating a GUI on the fly, it's a good idea to pass it off to the Event Dispatch Thread (EDT) so as to avoid painting inconsistencies. This is easily done using the SwingUtilities.invokeAndWait() method.


  2. I always put my GA track code at the bottom of my pages...the reason being, is that I don't want the script load tying up my page load on browsers that don't pipeline and evaluate the JS before building the DOM (most mobile browsers).I've noticed that the GA code can sometimes be very slow to load...and if it makes the page unusable, then all GA is gonna see is the visitor that won't ever come back :rolleyes:


  3. Microsoft is like a drug pusher here...they give you the "goods" (and I use that term lightly) for cheap until you get hooked/standardize...then it's just waiting for the *bottom* rape from them. Once you have an infrastructure that requires windows, you'll be paying for it.Microsoft did this whole thing for the PR. I mean really, piracy isn't a problem when people don't know if they're going to be able to afford to eat on any given day, as mHelmy said.


  4. They all put in the fine print now that the offer requires you to satisfy some offer and referral requirements. It's not a fix (they really should tell you upfront the list of things you need to do to complete the requirements...of course if they did that I don't think anyone would actually sign up) but I think they had to because they were getting so much bad PR over what they were doing. Gratis networks did start this nightmare and alot of people have copied the scam.


  5. Either you work for the company or have realy fallen for this.

    I signed up for the freeipod.com one way back in the day, gave them an email address (when they wanted a credit card number I decided not to waste my time), and it got so spammed that I lost a good email account. It was a lesson learned, and at least all I lost was an email account. I rail on these programs in an attempt to educate those who might start being careless with their credit cards in their zeal to obtain a free new toy.

     

    There's two basic tenets that one should remember about these things:

    If it sounds too good to be true, it probably is

    Nothing worth anything, is completely free

    And last but not least, *always* read the fine print. When you have to do something dumb and then dupe your friends into doing it to, it really isn't worth an Xbox 360 for the aggravation you've caused your friends (who are probably scheming to kill you afterward).

  6. These programs are such a scam...they require so much effort to get the "free" product (between starting and canceling "free" trials and buying dumb crap you don't want)...it's just not worth it given how much money they make off of you. If you want to see what these *BLEEP*s do, just sign up for one using a spamgourmet address or a throwaway account that has no spam...within 2 weeks you'll be getting 30+ spam messages a day. Within 2 months it will climb to about 200. It's just not worth it.


  7. It's some cool stuff, but kind of old news...at least the simplicity of a gui interface for doing this will probably lead to advances in cryptography or at least raise the bar for what we all consider bare minimum for symmetric cipher strength.As for just cracking passwords...the speed increases this could provide are nothing compared to the speed you get with a precomputed hash-style attack. Generating the hash tables might be faster, maybe tho.


  8. I don't think this is possible...php and javascript are handled by two different preprocessors, one of them is php, the other is handled by the servlet engine. There may be a way to do it specifically using Tomcat and php installed into Tomcat, try the documentation...but as far as doing it with apache and the tomcat redirector...you may be out of luck.


  9. I made my own code in Object Pascal, that hides my application from everything and renders taskman utterly useless, it is still there but it's shut down so fast every time it is run (and so is msconfig, among others) that it is impossible to close the application, remove it from start-up (due to how it is made) or do anything to it.
    At least not without a third party task manager to kill the process.

    Although my application isn't malicious (and I have taken some measure to insure it can't really be used as such), it's basically a key logging application, however it is built to recognise custom keystroke combinations (words actually), so you could trigger some basic events, or automatic internal logging of when certain words, phrases etc are typed anywhere from the keyboard input.

    This means you could catch out someone on your computer from typing certain "naughty words" or know if they are visiting "undesirable" websites etc.

    Anyway, once I get my old custom components back up, I can re-open the project and start work again and refresh my memory as to how I did it, someone might find it useful, the good thing is, while it would be difficult for the average user to stop it, with my particular combination, if you get a third part task manager, it can be taken care of quite easily.


    The fact that people can do inane **** like this...is exactly why I use Mac and Linux. An application running as a non-root user should *never* have edit access to things like the process table (which is basically how these apps work).

  10. Just because someone uses IE does not necessarily mean they are an inferior computer user. In fact, I have had more issue with Firefox plugins than I've ever had with IE plugins, and IE7 is avtually a good browser. I still use Firefox, but I disapprove of the whole IE is Microsoft thus not good software idea.
    It is a good idea to remove the autorun feature from flash drives. I know of no pieces of software for flash drives, other than viruses, that require the autorun feature to work, and there never should be.

    ~Viz


    I didn't say someone using ie, i said "someone using ie and has alot of toolbars". Someone using IE and having multiple advertising-oriented BHO toolbars throws up a warning flag to me.

    IE is bad not because it's microsoft, but because it's such a popular target for attacks due to its tight integration with the underlying operating system. Overrun a buffer in IE and you have potentially the same level of access to the computer that the shell does...overrun a buffer in firefox and congratulations, you've just annoyed someone by crashing their browser.

  11. Assuming someone adds the code to hide their process from task manager, what's the easiest way to identify the process and kill it. Because hiding the process is something I know many viruses do, and I would like to be able to track them down easily, if possible.
    ~Viz


    The easiest way to do it is just enumerate all the threads on the scheduler...find threads that aren't owned by a process and suspend them, kill them, or look at their file handles and see what they're up to.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.