-
Posts
405 -
Joined
-
Last visited
Posts posted by nicatronTg
-
-
Never mind, wrong thread :(.
New challenge in c#? I want to, but I'd rather create something else.
-
Text based windows update that does not require IE.
-
Trying to decipher this. Do you mean you wish to know the forumla for Pi? ... C/D Circumference over diameter. You could just find a predefined circle circumference and diameter but hey :D
Yes but to do that I would need 2 constants pulled out of my ass. What I am trying to trying to figure out how to figure out what Pi is.
Over the weekend my dad helped me do this (and while doing it decided to rewrite all my code). It now gives out the numbers every 100000 points. It now evens out to about 3.141522, I think this is due to the to the fact that rand() is not that random or some how the numbers are wrong.
// I will foo your bar #include <iostream> using namespace std; #include <cmath> #include <time.h> #include <stdio.h> #define range 32768 int main () { double count = 0; double inside = 0; int q=0; srand ( time(NULL) ); cout << "Starting. n"; while(1) { int x = rand() % range; int y = rand() % range; inside += (x*x + y*y < (range-1)*(range-1)); count++; q++; if(q>=100000) { printf("inside=%.0f count=%.0f ratio=%18.16fn",inside, count,inside*4/count); q=0; } } return 0; }
There seems to be a problem, because the first few numbers of pi are:
3.141592654
-
Edit: Image fixed for IBP
-
My two favorite laptop brands:
WinBook
- [li]Good price[/li]
[li]Easily upgradable[/li]
[li]Great support[/li]
Alienware
- [li]Great hardware[/li]
[li]Minimal internal ads(no Alienware logo slapped everywhere on the machine)[/li]
[li]Great for Gaming[/li]
-
Windows all day, every day, although I did have Ubuntu for almost a year, running 7.04.
I would consider my self a gray hat hacker, in the old meaning:
An exceptionally skilled person who works and messes with computers.
-
HELP US GOOGLE!
-
"Firefox can't find the server at www.youtube.com"
Can it be true?
-
Well, I guess we could have a hack to re-enable active desktop, even on machines that never had it to begin with.
Once that is done, just create a good HTML page and embed the rss feed there.
For the ads, just figure out how the ads work, then truncate the results.
-
would this help at all?
If they are doing the 'monitoring' correctly they would blacklist TOR node IP addresses. The main reason to monitor Internet usage is to spot where computers have been infected, and stopping TOR seals off another line of malware communication.
"What ever you can do the slow the bad guys down is good." (or some thing to that effect)
-- Paul Dot Com
Well that stinks, but couldn't you just find a smaller onion routing system and use that?
-
Is it possible to do the same with the stricter rights management on a linux based system? According to my console, I need to be root in order to shutdown the system and providing the root passwort is not the best idea.
using root, change the permissions for your account to be able to run the halt command.
-
would this help at all?
-
Yes, that one.
Free mirror:
-
These are dirt cheap, and they are quite fast for portable apps and switchblades.
http://www.microcenter.com/single_product_...duct_id=0280099
http://www.microcenter.com/single_product_...duct_id=0267424
http://www.microcenter.com/single_product_...duct_id=0242478
http://www.microcenter.com/single_product_...duct_id=0250132
I use the eight gigabyte version, and it works great.
-
..yeah I got that part, but the acronym doesn't make sense. And has nothing to do with cofee, of what had he spent a little time could have been a great joke.
I said it was a lame joke to be ignored. Ah well, time for the grand edit.
-
Thanks man. I guess my brain just skipped for a few lol
That happens sometimes, and I hate it.
-
You can authorize a new computer, this only works a few times. Ultimately, don't buy DRM'ed music.
Yah, but don't you need to have the other one de-authorized? He should mention if he has all of the other authorized computers used.
-
This is a very good example. The RIAA has gone to the point that online stores will not let users keep copies, and play them without the DRM crap. If there were a legit online website without DRM, then I would surely favor that over iShit.
-
First of all, your data is safe, you just need to use a liveCD or mount the drive on another machine and recover it. This is the easy bit.
Once you have pulled the data off to another machine or disk, you can look at the OS. The fastest way would be to just reinstall the thing, but you can also try repair installs, copying the missing files back etc Personally I would be inclined to reinstall it at this stage, you have to decide if speed or finese is more important here.
VaKo is right, but the iTunes music is DRM protected, and will not run without that machine.
-
COFEE? Let me guess:
Don't
Open
Notoriously
Unused
Trash
Systems when using COFEE.
huh?
my lame attempt at a donut joke.... just ignore it.
-
Wasn't there a Hak.5 episode with for remote help as a Hak-Snack? As I recall it used BozTech's 1-click reverse VNC connection. I think that is a better idea than this, however this is a good idea for slower computers.
-
Wouldn't you need to just spoof the browser, MAC, and get a valid IPhone number? If it doesn't check that there isn't more than one of you on, we could establish an IPhone number directory type system.
-
Removed, see below.
-
I can't find it, but Moonlit created an Anti-USB application, that protects against USB based hacks.
Just thought I would mention it, for future reference.
include exe within exe
in Applications & Coding
Posted
You could open the program in notepad, then copy the program into c#, and put it in an array. Then write the array back out using a file stream.
I shall prove with a program...