Forgot your password?
Sign in with
Article Help Forum
Submit an article or tip
Import GitHub Project
Import your Blog
Ask a Question
View Unanswered Questions
View All Questions
View C# questions
View Python questions
View C++ questions
View Java questions
All Message Boards...
Running a Business
Sales / Marketing
Collaboration / Beta Testing
Design and Architecture
Internet of Things
C / C++ / MFC
ATL / WTL / STL
Objective-C and Swift
Hardware & Devices
Hosting and Servers
.NET (Core and Framework)
Site Bugs / Suggestions
Spam and Abuse Watch
The Insider Newsletter
The Daily Build Newsletter
Most Valuable Professionals
The CodeProject Blog
Where I Am: Member Photos
The Insider News
The Weird & The Wonderful
What is 'CodeProject'?
Ask a Question
Bugs and Suggestions
Article Help Forum
Comments by jsolutions_uk (Top 27 by date)
There is a good explanation
As I read it ... An "empty" object has to have some size as if it was 0 size, one would not be able to use pointer arithmetic on arrays of an empty object .... or something along those lines :)
Interesting discussion over
Code reuse via an inheritance hierarchy is a sure fire way to get in a right old mess with tightly coupled dependencies. Personally I try to limit my use of class hierarchies to where I really need run time polymorphism.
Occasionally this results in some abstract base classes containing virtual methods that can be overridden / called by derived classes, but this is usually a result of needing the polymorphism and I should probably refactor the code to encapsulate the "reusable" state/behaviour outside the base class and have a more loosely coupled dependency :)
You could always test your values you are getting against
glad to be of help :)
I've replied to your new question.
With jpg images, you need to make sure the jpeg imageformat plugin is loaded. I know on Windows it is found in (QTDIR)/plugins/imageformats/ I can't be sure where it is found on Linux off the top of my head. Usually I would place this file in the output folder for your project, under a plugins/imageformats/ folder. Hope that helps.
just beat me to it :)
Can't you just maintain some counter that can be incremented and used to determine the contents of that "X copy" value for the page that you are rendering next?
I presume you have enabled native code debugging in the debug settings for the C# project? It's not enabled by default. Also the access violation sounds like either an initialisation problem somewhere (debug and release builds can behave slightly differently with uninitialised variables) or maybe you're accessing something via a pointer to memory that has been freed and you have not re-assigned the pointer value......
However, that is all very much speculation as we cannot see any of your code :)
Correct me if I'm wrong, but are you taking C# code from codeproject and converting it to C++ ? If that is the case, just point us to the code in question :)
If this is a general question: "What is the best way to convert C# to C++", I think you have your answer: "There is no best way, it is very dependent on the C# code in question and the platform the C++ code is being written for".
Fair comment :)
5 from me, bring on variadic templates :)
If the idea is to only encrypt data locally, to prevent any other users of that PC from reading the data (implementing Confidentiality), how about forgetting the idea of an encrypted key, and deriving a key at runtime from a password entered by the user on running the application (if of course the app is a user interactive one). It sounds to me like your problem is purely a Confidentiality of private, rather than shared data?
Just out of interest, how are you planning to distribute these keys? That is going to be your biggest problem with AES keys, or any other symmetric key. Once you have worked that out, then there is little point investing in a storage technology that is weeker than your distribution mechanism.
Also, it is probably worth noting that a possibly better scheme is to use assymetric keys, so clients of whatever app this is share their public keys amongst each other as seen fit. Some kind of fingerprint check could be done over the phone, for example. Each time a message needs to be sent, a one time AES key is generated to encrypt the body of the message and this is encrypted with the destination public key. That way, the only person who can get the clear text is the reciever.
Key management will probably be a lot easier if you follow this model.
Is that more of an answer than a comment? :)
Click once is really a deployment solution, via a website (usually) and not a web application technology. I have used it for desktop application deployment and it works quite nicely.
Usually, the way click once works is that you deploy it to a web site where the clients have access to a holding page for the click once installer. The click once app is installed on the clients PC (along with any dependencies) and can have a link on desktop/start menu etc. Click once can do quite a lot, so I suggest you have a good read of the docs.
glad to be of help :)
You probably need a bit more detail than that to get an answer. Some answers to the following questions might be useful:
1. Why do you need to convert it?
2. Is it a console or GUI app?
3. Does it provide a network client or server?
4. Does it rely on any other specific technology, (eg XML, Database etc)
That way, you might get some pointers as to how to approach whatever problem you have.
I shall just add that I am more than aware of various tabular environments, which are all well and good, but I have a need for old school tabstops where a tab inserted in a paragraph causes the text following it to shift immediately to the position specific and when the line with the tabstop in it reaches the line break it restarts at the beginning of the next line, not at the tabstop position. I hope that makes it a little clearer. I have, of course, tried to argue against such functionality being required, but there are some genuine use cases for it.
Why downvoted, just interested in what's wrong with the question?
I believe there is a limit, there are also some other parameters relating to recieving packets. I suspect they are OS dependent, probably configurable.... but much more than that I would be in google territory :)
You state that you are using UDP? UDP does not provide a guarantee of deliver, so if you are worried about that, perhaps use TCP which provides a greater level of reliability. 40 clients sending data simultaneously should not be a problem as IP packets should effectively be queued by the server OS, if I understand correctly.
I suspect a component you are installing isn't being registered by your installer. Either that or you are dependent on a component on your dev machine that isn't installed and registered on the target machine. As to which component that is, you will probably need some better diagnostics, probably just output some more details of the exception to a log file. I must admit, I thought that error message would usually include the CLSID of the component not registered, which would be of some use.
Why does it need to be decrypted?
Last Updated 1 Jan 1900
All Rights Reserved.