|
I have tested software named speccy which gives proper external hard disk serial numbers. What do you say about it ?
|
|
|
|
|
I'd say that it is probably not open source, nor written in C#.
Even if you get the serial numbers, you'd need to write a device driver to enforce it.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
i need a C@ code to help to retrieve data b from a sql server database
|
|
|
|
|
|
Do not cross post - you have also asked this in the Database and Android forums
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
|
Just looked at the first few digits of the user name. not the last few! Maybe they are classmates?
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
Awesome. I'm glad you stopped by to let us know. Good luck with searching for the millions of hits on Google.
This space for rent
|
|
|
|
|
I want to adjust color transparent of splitContainer (of Microsoft Visual Studio) what I have change properties ?
|
|
|
|
|
This is not a good question - we cannot work out from that little what you are trying to do.
Remember that we can't see your screen, access your HDD, or read your mind.
So try explaining in more detail exactly what you are trying to do, bearing in mind we have no context for your question!
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
|
And? What do you want it to be like?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
i want splitContainer have got color tranparent
|
|
|
|
|
Hi,
Please help on this:
How to intercept text of password send to HttpListener service when use AuthenticationSchemes.IntegratedWindowsAuthentication
|
|
|
|
|
Why would we tell anyone how to "intercept a password"?? We're not going to help anyone hack anything.
|
|
|
|
|
Dave,
Is not for hacking application, it is for my own app. As backup means to authentication if active directory go down. I cannot find this property any where.
If no one can be help, then hard way will be this:
set authentication to basic authentication only (because I have necessarily see their text password in this app)
attempt open dummie folder with their login to see if the AD login works
If AD login fails, try againt at a list having a form backed up
|
|
|
|
|
AD doesn't "go down". A domain controller might, but that's rare.
Also, you're not going to "intercept the password" in the IntegratedWindowsAuthentication mode because it's never sent. The users security token is sent instead wrapped in an secured channel that you're not going to get into.
There is no "backup method" for AD if it goes down. If having it up and running is so important the better solution is having more than one domain controller and having different network paths to get to these controllers.
|
|
|
|
|
Already at this business for all users use utility to change password , that updates user login at once in AD and on a .csv file stored on a seperate server, for non-windows applications to access over FTP and authenticate user seamlessly. I wanted to use both simultaneously for redundancy.
|
|
|
|
|
THEY DID WHAT !?!?!?!?!?!
Quit. Leave the company NOW. They obviously don't take security seriously. That is most definitely the WRONG way to have a security system for ANY application let alone a "backup" in the event of an AD failure. That is NOT seamless, not standard by any means and is extremely INSECURE.
What's keeping someone from just downloading the entire "backup" list? It's a f***ing text file! The usernames and passwords are probably in CLEAR TEXT! If anyone gets their hands on that file they probably have the keys to the users personal accounts on other sites too. People tend to use the same passwords over multiple accounts across the internet, including work accounts.
WOW. Just WOW.
|
|
|
|
|
Of course it is secure, no hacker would consider looking for that file it is too obviously stupid. Having a pissed off SA email it home on the other hand!
Never underestimate the power of human stupidity
RAH
|
|
|
|
|
My son does web consulting and found exactly the same issue with a site he was asked to sort out. They backed up all the clear text passwords to a data file on one of their servers. Took him less than five minutes to find it the first time he looked at their system.
|
|
|
|
|
Are you sure you didn't mean to put the joke icon on this message?
|
|
|
|
|
Hi,
In my interview following question was asked but I was unable to answer. Please help me in solving it.
The algorithm below is a simple checksum formula used to validate a variety of identification numbers.
Your Task: Write a class that can be used to add a check digit to any number.
The check digit is calculated as follows:
1. Counting from the right-most digit and moving left, double every alternate digit starting with the first one. For any digits that thus become 10 or more, take the two numbers and add them together. For example, 111 becomes 212, while 876 becomes 773.
2. Add all these digits together. For example, if 111 becomes 212, then 2+1+2 is 5; and 873 becomes 773, so 7+7+3 is 17.
3. The check digit is: 10 – (<the sum above> % 10), where % is the modulus operator (gives the remainder after division). For example, the check digit for 111 is 10 - the remainder of (2+1+2)/10, which is 5. The check digit for 876 is 10 - (7+7+3)%10, which is 3.
|
|
|
|
|
A quick Google for "luhn check digit" will give you plenty of ideas. Over 25,000 of them.
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
And?
It's a pretty trivial problem: what part of it can you not do?
The instructions are very clear - they look more like a homework question where everything has to be spelled out than a task specification!
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|