Search Results

Search found 30819 results on 1233 pages for 'software security'.

Page 596/1233 | < Previous Page | 592 593 594 595 596 597 598 599 600 601 602 603  | Next Page >

  • Does NaCl mean the death of Internet Explorer? [closed]

    - by Monika Michael
    From the wikipedia - Google Native Client (NaCl) is a sandboxing technology for running a subset of Intel x86 or ARM native code using software-based fault isolation. It is proposed for safely running native code from a web browser, allowing web-based applications to run at near-native speeds. (Emphasis mine) (Source) Compiled C++ code running in a browser? Are other companies working on a similar offering? What would it mean for the browser landscape?

    Read the article

  • What are some good game development programs for kids?

    - by John Giotta
    I know a very bright little boy who excels in math, but at home he's glued to his Nintendo DS. When I asked him what he wanted to do when he grew up he said "Make video games!" I remember a few years there was mention of a MIT software called Scratch and thought maybe this kid can do want he wants to do. Has anyone used any of the "game development" for kids softwares out there? Can you recommend any?

    Read the article

  • Question: Why switch to Linux or a Mac?

    <b>Sure, It's Secure:</b> "I'm no friend to Windows. I know the operating system too well to trust it. But, I did think that even though Windows is defective by design, you could keep it relatively safe by installing patches quickly and using anti-virus software religiously. I was wrong."

    Read the article

  • I am now ready to publish my commercial Android/IPhone/Anything application - what disclaimers should I use to protect myself?

    - by corgrath
    I have now written my last line of code and I am ready to publish my application to the Android Market, what disclaimers should I add to protect myself as a developer from customers who purchase my application, to prevent being sued by stupid people? It might be a harsh question, but how does developers protect themselves when publishing their software? Developers or small companies (for example all these iPhone/Android developers) that can't afford hiring a small army of lawyers, what should they do? Any solid text I can use?

    Read the article

  • problem with grafics on ubuntu 12.10

    - by kargeo
    please help I just install 12.10 x86_64 to my new computer amd fx8120 cpu ati hd 7770 msi 990 fxa and I'm facing the following error: 2012-11-17 18:19:04,393 WARNING: /sys/module/fglrx/drivers does not exist, cannot rebind fglrx driver From :additional drivers" can not install the ati drivers From "system settings" "software sources" only the x.org server is working but with problems Compiz works continuously and if I open for example a video the fun is running like crazy The mouse pointer goes slow The windows act strange (flashing, don't open, open slowly etc) What should I do? Thanks

    Read the article

  • In what kind of variable type is the player position stored on a MMORPG such as WoW?

    - by jokoon
    I even heard J. Carmack quickly talk about it... How a software can track a player's position so accurately, being on a such huge world, without loading between zones, and on a multiplayer scale ? How is the data formatted when it passes through the netcode ? I can understand how vertices are stored into the graphic card's memory, but when it comes to synchronize the multiplayer, I can't imagine what is best.

    Read the article

  • Upgrading Oracle Enterprise Manager: 12c to 12c Release 2

    - by jorge_neidisch
    1 - Download the OEM 12c R2. It can be downloaded here: http://www.oracle.com/technetwork/oem/grid-control/downloads/index.html  Note: it is a set of three huge zips. 2 - Unzip the archives 3 - Create a directory (as the oem-owner user) where the upgraded Middleware should be installed. For instance: $ mkdir /u01/app/oracle/Middleware12cR2 4 - Back up OMS (Middleware home and inventory), Management Repository and Software Library. http://docs.oracle.com/cd/E24628_01/doc.121/e24473/ha_backup_recover.htm#EMADM10740 5 - Ensure that the Management tables don't have snapshots:  SQL> select master , log_table from all_mview_logs where log_owner='<EM_REPOS_USER>If there are snapshots drop them:  SQL> Drop snapshot log on <master> 6 - Copy emkey  from existing OMS:  $ <OMS_HOME>/bin/emctl config emkey -copy_to_repos [-sysman_pwd <sysman_pwd>]To verify whether the emkey is copied, run the following command: $ <OMS_HOME>/bin/emctl status emkeyIf the emkey is copied, then you will see the following message:The EMKey  is configured properly, but is not secure.Secure the EMKey by running "emctl config emkey -remove_from_repos". 7 - Stop the OMS and the Agent $ <OMS_HOME>/bin/emctl stop oms $ <AGENT_HOME>/bin/emctl stop agent 8 - from the unzipped directory, run $ ./runInstaller 8a - Follow the wizard: Email / MOS; Software Updates: disable or leave empty. 8b - Follow the wizard:  Installation type: Upgrade -> One System Upgrade. 8c - Installation Details: Middleware home location: enter the directory created in step 3. 8d - Enter the DB Connections Details. Credentials for SYS and SYSMAN. 8e - Dialog comes: Stop the Job Gathering: click 'Yes'. 8f- Warning comes: click 'OK'. 8g - Select the plugins to deploy along with the upgrade process 8h- Extend Weblogic: enter the password (recommended, the same password for the SYSMAN user). A new directory will be created, recommended: /u01/app/oracle/Middleware12cR2/gc_inst 8i - Let the upgrade proceed by clicking 'Install'. 8j - Run the following script (as root) and finish the 'installation':  $ /u01/app/oracle/Middleware12R2/oms/allroot.sh 9 - Turn on the Agent:  $ <AGENT_HOME>/bin/emctl start agent  Note that the $AGENT_HOME might be located in the old Middleware directory:  $ /u01/app/oracle/Middleware/agent/agent_inst/bin/emctl start agent 10 - go to the EM UI. Select the WebLogic Target and choose the option "Refresh WebLogic Domain" from the menu. 11 - Update the Agents: Setup -> Manage Cloud Control -> Upgrade Agents -> Add (+) Note that the agents may take long to show up. ... and that's it! Or that should be it !

    Read the article

  • Choosing a Hover Ad Creator

    When you design a hover ad, there are a number of factors you will want to consider. First, the hover ad should not be obtrusive to the people who visit your website. It should be pleasant, easy to read, and it should capture the attention of those who see it. Therefore, when you're looking for a good hover ad creator software program, you will want to find a program that is flexible.

    Read the article

  • technique for checking modifications in configuration file while starting up a program

    - by rajesh
    I'm writing a software for periodically checking a specific range of networked devices' reach-ability. I'm specifying the address range and the time frequency for checking their reachability, in an xml file. Which technique can I use to check that xml file during the start up of the program for any modifications done in either the range or the frequency and do the necessary update in specific database?

    Read the article

  • What's the name for a bug that suddenly breaks things but has always been present?

    - by splattered bits
    We had a failure in our software today and after investigating discovered that the failure should have been occurring for weeks, but it waited until this morning to rear its ugly head. Is there an accepted name for such a bug that I can use when referring to it with other programmers? The closest I could find was a Schrödinbug, but I'm don't think it applies, since nobody was inspecting any code. The bug was just lying in wait.

    Read the article

  • Do I need to paste open source license information at the top of my webpage?

    - by Rich
    I'm developing a JavaScript application that uses several open source JavaScript projects. All their licenses have a phrase like "You must give any other recipients of the Work or Derivative Works a copy of this License". Does this mean I need to make a massive HTML comment at the top of my webpage with all the licences of the software that I use? I ask this question because I've never seen the source code of a webpage that does this.

    Read the article

  • Get Advanced Solutions by Outsourcing iPhone Application Development Services

    Developed by Apple, iPhone is a smart phone which has outstanding features like high resolution camera, access to internet, video iPod etc. The increasing demand of iPhone among the users has increased the demand of iphone applications to attract new and existing customers. This demand has given rise to the iPhone application development services. The software development companies are focusing on new applications which can be installed in the iPhone.

    Read the article

  • Deciphering a Search Engine Optimization Analysis

    A search engine optimization analysis is a tool that web developers can use to track how well their sites are showing up on the most popular search engines. There are several types of analysis software and services available that will give a good reading of your website's real optimization level. Ideally, a business website will be ranked near the top of search engine results, which will drive more traffic to the site.

    Read the article

  • Swift and predictable reactions to WebM

    <b>LWN.net: </b>"Google unveiled something that many in the open source community had been expecting (and which the Free Software Foundation asked for in March): it made the VP8 video codec available to the public under a royalty-free, open source BSD-style license."

    Read the article

  • Microsoft Press deal of the Day 11/October/2013 - F# for C# Developers

    - by TATWORTH
    Originally posted on: http://geekswithblogs.net/TATWORTH/archive/2013/10/11/microsoft-press-deal-of-the-day-11october2013---f-for.aspxToday, 11/October/2013, O'Reilly on behalf of Microsoft Press are offering 50% off F# for C# developers. Just remember to use the code MSDEAL when you check out. "Extend your C# skills to F#—and create data-rich computational and parallel software components faster and more efficiently. Focusing on F# 3.0 and Microsoft Visual Studio 2012, you’ll learn how to exploit F# features to solve both computationally-complex problems as well as everyday programming tasks"

    Read the article

  • Help with deleted components registry keys (2 replies)

    Hello, I did a big mistake and I deleted the path of these files in windows xp registry: System.Workflow.Activities.dll PresentationFramework.Luna.dll RedistList\\FrameworkList.xml The keys that should contain the paths are: [HKEY LOCAL MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S 1 5 18\Components\300DC0511590697408C9B53F71E7AB4A] &quot;0DC1503A46F231838AD88BCDDC8E8F7C&quot; &quot;&quot; [H...

    Read the article

  • Link Tracking

    Finding the correct way to utilize your link tracking software is actually a very simple task for even the green SEO learner. Everyone knows that you want to have as many links as possible pointing to your site to increase your rankings in the SERP's thus increasing the amount of traffic coming to your site via major search engines.

    Read the article

  • How to remove configuration files completely

    - by Jasper Loy
    Recently I uninstalled some software using sudo apt-get --purge autoremove, thinking that this would remove all traces of it including unused dependencies and configuration files. However I discovered that a configuration file was left behind in my home folder. Is there a more powerful command which would remove even that? As a related question about keeping things clean , is is safe to delete the hidden files and folders under home, if they are merely configuration files, or are there other kinds of files?

    Read the article

  • How To Prevent Microsoft SQL Injection in ASP.Net

    This is a two-part tutorial series meant to help beginners understand MS SQL database injection and the problems associated with it particularly when applied to an ASP.NET web form application. It also outlines preventive measures which will be discussed thoroughly in the second part so that you can secure your SQL-based web applications.... ALM Software Solution ? Try it live! Requirements Management, Project Planning, Implementation Tracking & QA Testing.

    Read the article

  • Opera 11.60 est disponible en Beta : nouveau parseur HTML5 avec support des protocoles personnalisés et compatibilité ECMAScript 5.1

    Opera 11.60 est disponible en Beta Nouveau parseur HTML5 avec support des protocoles personnalisés et compatibilité ECMAScript 5.1 L'amélioration du support des nouveaux standards Web sur chaque nouvelle version des navigateurs a ralenti avec l'accélération de leur rythmes de développement. Mais Opera Software réussit à maintenir un juste milieu entre nouveautés visibles et fonctionnelles sur des itérations relativement rapides. L'entreprise scandinave sort Opera 11.60 « Tunny » en version bêta, avec son nouveau parseur HTML5 baptisé Ragnarök. Il s'agit de l'implémentation de l'algorithme de parsage de l'HTML5, destiné à standardiser les comportements des différents navigat...

    Read the article

  • Prolific Viruses

    Anti-Virus software gets a great deal of coverage in Click because ultimately it';s a very important component of any computer system and choosing the right program to protect your computer should be ... [Author: Chris Holgate - Computers and Internet - May 16, 2010]

    Read the article

  • Bluetooth push application

    - by Paul Kassey
    I am considering the technical viability of software that I want to write. Is there a way that I can push data to a phone (iPhone or Andriod) via Bluetooth without pairing with it? I want to be able to walk into a room and have a computer push data to my phone when I get a certain distance from it, or push data to any phone automatically when it comes within a certain distance to a Bluetooth-ready device?

    Read the article

< Previous Page | 592 593 594 595 596 597 598 599 600 601 602 603  | Next Page >