The Lounge is rated Safe For Work. If you're about to post something inappropriate for a shared office environment, then don't post it. No ads, no abuse, and no programming questions. Trolling, (political, climate, religious or whatever) will result in your account being removed.
1) A large file email service. MailBigFile.com has a free service for up to 2GB which can be used commercially. You can upload and protect the files, they get loaded onto a server and the recipient is emailed to allow them to download. You get email confirmations throughout, so when the upload finishes, when the recipient starts the download, and when the recipient completes the download.
There are other similar services available, but that is the one I tend to use. There is a pro version for £19 per year that lets you send bigger files and leave the files on the server for longer etc.
2) Log in remotely with TeamViewer and depending on file size either copy and paste directly into the machine or use the built in File Transfer functionality. There is a free version but it is limited to non-commercial usage and you would need it on both machines, but the user can install into memory for a one-off and allow you to have access. They cannot deny receiving it if you put it directly onto their machine!
I use the Professional version commercially to provide remote support and file transfer, and whilst it is not cheap, but it is a very good product. Again there are other similar products available including free ones but I prefer the higher security and better functionality of TeamViewer.
Either solution should provide all you have requested with ease, and both are free if you are doing open source or volunteer work.
Well, as you're the developer, you can build in to the opening screen (i.e., make it the opening screen) a path that does not let them actually run the application until they click some sort of accept delivery button. A little more sophistication is to return a key that either they need to enter themselves or is stored by you (if an .exe, for example, you have the power!).
I used a similar scheme, many years ago, to enable software extensions to a product. The product had an authorization dongle but that didn't take care of add-ons. To get an authorization code, the user was given a key (actually just encrypted date-time for that moment) and this was combined with a unique value from the device (like cpu serial number) to generate a counter key. That got them authorized "forever" and never bothered them again.
Unless the users are clever hackers and your software is of wide interest to the masses, you can create any sort of scheme that forces the user to acknowledge having the software in order to use it. If you charge per-cpu, then you need to key each to the machine, otherwise it's rather simple
Finished one project, completely buried in work, my customer asked me to send him the project using WeTransfer.
I'd like to receive a confirmation of reception.
I have no idea who they are, but are you saying a company offering a service called "WeTransfer" doesn't have the means to provide confirmation of reception...? That seems like...a basic feature for any system offering, y'know, any sort of transfer.
Based on some sensitivity concerns one of our tables IPAddressWhiteList is being renamed to IPAddressAllowList. At first I was offended, but then I came to realize that such a change is something that is beyond my ability to comprehend. I don't have to understand; and I don't have to care - so call it whatever you want.
In order to participate in the zeitgeist I did put in the suggestion that we rename our All_Irishmen_Are_Pathetic_Drunks table, tho.
Gah! People are idiots who don't know where their idioms come from.
Black hats and White hats stem from black and white western movies, the villains always wore black hats and the heroes always wore white hats so you could tell who was who. Nothing to do with race, everything to do with film.
The goodest guy: Hopalong Cassidy - who dressed completely in black. Must have been pretty damn darn hot in that outfit (Hoppy would never say the "D" word !). What makes it still a decent show is that he solved problems with his brains - even though good with a gun.
What's really cool about the old-time movies (serials) is that after a fight they'd not have any black-and-blue marks, typically their hat was never knocked off, and surprisingly often, their suit wasn't even dirty!
Being "Black Balled", in its current usage, is a Masonic term. When the members vote to let in a new perspective candidate, or not, they casting of a black ball by any member was enough to deny the application. Similarly, to be "black balled" in the current meaning, is to be denied something based upon a single (or more) blemish on some sort of ledger (employement, club membership, etc.)
An interesting thing is the very serious secrecy of the balloting process. To reveal how one has voted to anyone else - even another member of high rank - is a very serious breach of the rules. In more modern times, when moved to the public voting, it has since been called the Australian Ballot.
To be "hoodwinked" is another term brought into common usage from Masonic procedures, although in this case the implications in the vernacular, is that of shady dealings.
I remember, when I was a small lad, that my father came home from his warehouse with the news that the Air Force dictated that all components labeled 'male / female' should be changed to 'inner / outer'. This struct me as being worse the the original.
A human being should be able to change a diaper, plan an invasion, butcher a hog, navigate a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects! - Lazarus Long