|
People I know don't go around trying to break the protection on software because they know that if they do and get caught they will go to jail.
There are enough people who do go around houses and try the door to see if it is unlocked. Sometimes the person is more determined. When I was at school my parents house was broken into. I was the first to arrive home and I noticed something was odd. The patio doors were slanted, the back door had marks in it and the kitchen window was ajar. The house was a mess. When the police did their investigation the opinion was: The burgalar had arrived and trying to open the back door with a chisle like instrument, that failed and tried the patio door and the kitchen window all these attempts failed. Then he climbed onto the roof and in through the skylight (so he must have been thin). He took what he wanted then tried to get out. He attempted to open the patio doors but failed (he succeeded in breaking the mechanism such that it was hanging slighly-off its hinges but wouldn't open futher than a few centimeters - he also left a big Addidas imprinted shoe mark on the glass), he failed to get out the back door as similar marks were found on the inside, but succeeded in cracking the glass. He did eventually manage to get out of the kitchen window.
--Colin Mackay--
EuroCPian Spring 2004 Get Together[^]
|
|
|
|
|
hi liquidknight...
i tend to agree with you...
Sun Tzu (the author of Zen and the Art of War) i think said it best...
"You can be sure of succeeding in your attacks if you only attack places which are undefended. You can ensure the safety of your defence if you only hold positions that cannot be attacked."
the basic premise, however, between attempting to enter a house or a computer system is basically the same, and i say this with some authority having spent some years as both a physical security analyst and an information security anaylst... i suppose the difference lies in the fact that people feel more 'secure' hacking at a computer/file/etc as 'the nosey neighbour' can't see them doing it... but break and enter/theft/criminal damage is the same for both a house and a computer assuming the intent is the same, to deprive the owner of an object (physical or electronic) by means of removing permanently or damaging the object to a point it is no longer usable, and to enter an area (physical or electronic) for which you have not been given the authority to do so...
here in australia, it is covered (i believe) by the Commonwealth Crimes Act 1914 Section 7a which includes any unathorised entry be it electronic or physical...
ultimately, i also believe that protection can only protect from the vast majority of people who are either not interested in attacking a target (like a house or computer system) or the inept... for those truly determined, they will eventually find a way...
so, yes, you are 100% correct (in my mind) when you talk about protection being to protect and not immune, and also 100% correct (in my mind again) when you talk about there never having been any system that can protect 100%, however, i must disgree that it is "unfit to compare a computer program to a door of a house", they, from the purpose of law and general intent, are identical, it is only the motive and manner which are different...
either way, your submission idea seems good... i am looking forward to reading it...
cheers
nik
Nik Vogiatzis
PhD Candidate: University of South Australia
+++++++++++++++++++++++++++
Developing new generation Traffic Micro-simulation Tools for Traffic Engineers
em: nikolaos.vogiatzis@unisa.edu.au
|
|
|
|
|
The only problem with your analogy is that the burglar seldom picks up your house and takes it to a place unknown to you, where he or she can break into it, out of sight of anyone.
--
Seraphim Shock. Gold for your ears.
|
|
|
|
|
i'll concede that point...
Nik Vogiatzis
PhD Candidate: University of South Australia
+++++++++++++++++++++++++++
Developing new generation Traffic Micro-simulation Tools for Traffic Engineers
em: nikolaos.vogiatzis@unisa.edu.au
|
|
|
|
|
have a problem and I feel for most of the students it is trivial but I have not been able to have a satisfactory solution to it despite putting considerable time . (Due to its trivial nature I preferred the anonymous option/ mailing you directly that you mentioned in the class ).
PROBLEM:
I compile a simple program using visual c++
#include<iostream.h>
void main()
{
cout<<"CANADA";
}
If I copy its execuatable to linux or try to run in shell(it does not run or outputs some garbage with error message- I mean native code is not portable),
I know the different platform will not run the exe complied at windows platform and vice versa.
My problem is I want to know the reasons/factors that contribute to the difference, (OS system calls etc , compiler issue I am not sure).
Any details or webPointers/explanations/chaptersInBook on this issue (why exe for one platform does not run on other platforms though the library calls are the same- issues involved etc ) will be of great help to me.
Thankyou very much for your time.
|
|
|
|
|
|
Hi all,
Our firm is in search for the standart/sample on documenting the program product. I mean technical documentation, such as module descriptions, functions, variables etc.
Can anyone recommend some links ?
Thanks in advance,
Valery
P.S. It is late to drink mineral water when the liver fall off, I understand
|
|
|
|
|
|
Hello
I need breif documentation about peer to peer file transfer. so i can learn complete about p2p from that doc if any one have then please send it to me at ryu_fs@hotmail.com
Thnx
Foky
|
|
|
|
|
Hi, guys.
I need to develop an application which needs to comunicate through a modem. It should be able - through others - to play a wave file stored on the computer through the modem and I have no idea of how to do it. Any explication, either accompanied of code or not, might help me pass this problem.
Also, the application needs to recognize and generate DTMF frequencies.
I'll be glad if you might help me!
Thanks a lot!
|
|
|
|
|
There are several articles at CodeProject which discuss serial communications; these will help you learn to code for modem comms. Recognizing and generating DTMF tones is a hardware task performed by the modem itself. These tones are not encoded and passed through to the application software for your use. If your goal is to send .wav files to other computers, a simple modem program will suffice, but if you intend to play the audio over the phone lines you may have to design a new hardware device for that purpose. Try posting this on a programming forum and see what develops.
"Another day done - All targets met; all systems fully operational; all customers satisfied; all staff keen and well motivated; all pigs fed and ready to fly" - Jennie A.
|
|
|
|
|
Such Applications are Developed using TAPI (Telephony API)
Chris Sells once wrote wonderfull classes to minimize the programming effort required
try seaching at google
(The Source came with a book 'Windows Telephony Programming'
i think)
C makes it easy to shoot yourself in the foot; C++ makes it harder, but when you do, it blows away your whole leg
|
|
|
|
|
Hi,
First, it's a very good example.
Second, I would like to know if I can present a Column 3d graph with this example and if I can, how can I do it?
Regards, Michal.
|
|
|
|
|
Anyone interested in an article on Performance Monitor Counters?
|
|
|
|
|
Yes, as a matter of fact, I am.
Here is the dilemma.
I want to know if a process is running on the local or a remote machine.
I use the PDH helper library to enumerate the 'Process' object list.
However, this text 'Process' is not the same on foreign language systems!
In French, you need to use 'Processus'. Probably something else in German, Italian, etc.
So, using perhaps remote registry connection, I want to discover what NAME to use for the process list so I can turn around and pass the correct text into the PDH functions. I am pretty sure the correct text is stored in the dynamic data hive of the registry, where the performance data is stored.
Can you perhaps provide a sample of enumerating or traversing the registry performance counters and interpreting the names of the 'objects' that can be passed to the PDH functions?
|
|
|
|
|
hello can somebody help me?? i just wish somebody that help me to give me some idea about some project or system that is relate to the networking title so that i can have this idea to helping to enhance my project
so so thanks for you helping. thanks
|
|
|
|
|
What? Any arbitrary idea? Could you be more specific? What is it that you seek help on?
--Colin Mackay--
|
|
|
|
|
An arbitrary idea about networking to enhance an arbitrary project ? I bet you wake up with one monster headache tomorrow.
Christian
I have drunk the cool-aid and found it wan and bitter. - Chris Maunder
|
|
|
|
|
Create an app that lets me enter a database name for a db that exists somewhere on the network, but known only by filename, which returns a valid connection object without me having to specify it when I want to access it. Let it advertise its schema, as well, so that my app doesn't have to know in advance what fields and tables I have to construct; they should be constructed dynamically when I connect. Assume that I'm a manager, and therefore clueless.
I know that's not an acheivable goal; the spec isn't even realistic. But you sound like a student trying to find a final project worthy of your skills. The future of our industry is going to rest in the realm of "seamlessness." Non-technical people are going to expect us to produce products that they can use without extensive technical knowledge, that extend their limited PC skills to business processes and objectives. Find a business process that is currently being done badly, and do it in a way that makes it brainless. Supply chain management is one area that comes immediately to mind. Most of it is done using paper and pencil, plus a lot of emails and phone calls. Create a stock replenishment system that analyzes sales patterns and automates reordering product.
CRM, Customer Relationship Management software is also big right now; when is the last time you called Mr. XXX? I once read a book, by Robert Heinlein, I believe, where a manager had what was called a 'Farley file' for every visitor. When that person visited, he'd punch up his file, and it would display everything he knew about that person, enabling him to ask about the wife, kids, job, favorite foods... What a great idea, yet it still has yet to be implemented by anyone.
There's a couple of ideas, just to get you started. I'm sure you'll think of more. Hopefully you'll publish whatever you do here so that the rest of us can learn from your efforts. I think I could come up with some more ideas, but it's late...
"Another day done - All targets met; all systems fully operational; all customers satisfied; all staff keen and well motivated; all pigs fed and ready to fly" - Jennie A.
|
|
|
|
|
I would find an article on cross browser client scripting and css styling very handy. I've mostly worked on company intranets where the browser is standard (ie) I think its about time I learnt how to cater for other browsers. There seem to be lots of quirks, workarounds, fixes, css oddities between different browsers that need to be catered for.
Jim
|
|
|
|
|
This is scandalous to ask but what base level of browser are you looking at?
An article on CSS and JS for IE5+ and Netscape 6+ will be very different from an article that also has to cover Netscape 4 and IE4. There is a big leap between the 4th and 5th (or 6 if you are Netscape) generation of browser.
regards,
Paul Watson
Bluegrass
South Africa
Brian Welsch wrote:
"blah blah blah, maybe a potato?" while translating my Afrikaans.
Crikey! ain't life grand?
Einstein says...
|
|
|
|
|
I'm mainly interested in the latest generation of browsers e.g. Netscape 6+, Opera, Mozilla. Currently code against Internet Explorer 6. Are there still fundamental differences in the Javascript and CSS environment in the latest generation of browsers? I would hope not.
Jim
|
|
|
|
|
The DOM and manipulation of it by JS is pretty standard now. What works in Netscape 6 works in IE6 and Mozilla. Though Opera is noteably lagging behind in this regard. Saying that it's market share and future market share seem too small to worry much about it (it gets enough right though that most manipulations you want to do will work).
CSS still has a way to go, though it is a lot better than it was with the 5th generation line.
I will see if I have some time to put together an article. If anybody else wants to help then speak up please.
regards,
Paul Watson
Bluegrass
South Africa
Brian Welsch wrote:
"blah blah blah, maybe a potato?" while translating my Afrikaans.
Crikey! ain't life grand?
Einstein says...
|
|
|
|
|
i want to know about the topics related to networking
|
|
|
|
|
ok, so I have heavily invested in x-10 hardware, and purchased the HAL2000 Voice interactive control software, which all BTW works great, and fills my tech-junkie needs
as well as Energy Auditing/conservation goals.
So i'm customizing the hal2000, and playing vith voices and macros for action etc.
When it dawns on me that I need a talking head, an avatar, a face to sync with the
speech responces the computer gives. give this puppy some personality !
I've done some minor web searching, and mostly what I see are sophisticated, EDU type projects that address the many issues of creating a truly sync'd believeable talking head.noteably: http://mrl.nyu.edu/~perlin/facedemo/ and http://mrl.nyu.edu/~perlin/head/
Two very awesome examples of the work being done. worth the trip to view their work.
I believe at NYU all the pieces are there to do what I want to do, but it's a streatch for this HTML coder.. I need a simple to use, perhaps simple to skin (wouldn't it be great to have your favorite personality read yer e-mail to ya?) windows app or web page rendition of a talking head, that moves the lips via the sound it "hears" and maybe does facial movements based on a text file that I can have the system write lines to as part of the macro's I am already editing in hal2000.
I'm thinking along the lines of a bot talking to you as in RTCWolvenstein.
not totally sync'd but one can believe in it.
I CAN have the macro's in hal2000 write out a file, or append a codeword, that could be used to cue a facial expression if read by this proposed avatar. I would love to have a team of us to build it and show it to the HAL/x-10 folks too.
If you haven't seen it HAL -HomeAutomatedLiving.com is a pretty good out of the box system, definitely can control the x-10 and more with ease, and with imagination in building macros can be very interactive Speech and actionwise.
not that it matters, but I named mine Sweetie as the attention command of "computer"
was just too trekkie, but mostly the phenom was hard for the system to recognise by the
system, (spelled "sweet E" in the command line werks perfect every time)
and so you can see how it would be cool to have a face to put the voice to so-to speak.
I know it can be done rather simply, and will continue to struggle with the project
I'll post what I get here, do I have any of you on the edge of your seat ?
Thanks for taking the time to read, happy holidays !
-Watchman
|
|
|
|
|