|
Thank you very much for your information. I will have a look at the information that you provide for me and let you know if I have any problem.
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Windows 95/98 used to store the password with some trivial encryption in a file in the windows directory, but anything later than that does not. As others have said, through the miracle of cryptographic hashing algorithms, it is not necessary to actually store a password in order to be able to verify it. Thus, NT/2000/XP/2003 only store password hashes, not actual passwords.
my blog
|
|
|
|
|
Hi
I have started writting Audio device for capturing the raw PCM data (.wav,.pcm) into my device(Buffer) when application WINAMP is played . And I want to render it back to the another application (Blue-Tooth)
Will you please guide with this regard.
Probably, WAVE IN AND WAVE OUT will be desired for my functionality.
If possible will you provide me the Sample Code of this(in language C)
Expecting at the earliest. kindly oblige
regards
praveen
|
|
|
|
|
hello programers,
i need your help , i m trying to do this but i m unable to do it ...here we have a code which has two fork()(creating two child)...where one does addition and other subtraction , but if you see output logically should be 0 but it does not , now challange is how to syncronix\ze it using only SEMOPHORES to syncronize it , and get the output 0 all the time
Good luck ...and i would appreciate if youw ill be able to help me :-
// example to show mutual exclusion problem
#include <stdio.h>
#include <sys types.h="">
#include <sys ipc.h="">
#include <sys shm.h="">
#include <string.h>
#define KEY 999030008 // must be unique
void adder(int * memptr){
int n, i=0, total=0;
for(i=0; i<20000; i++){
*memptr += 1;
}
exit(0);
}
void substracter(int * memptr){
int n, i=0, total=0;
for(i=0; i<20000; i++){
*memptr -= 1;
}
exit(0);
}
int main(){
int seg_id;
int * mem_ptr;
// create shared memory segment
seg_id = shmget(KEY,sizeof(int),0600|IPC_CREAT);
if (seg_id==-1){
perror("shmget");
exit(1);
}
// attach to it
mem_ptr=shmat(seg_id, NULL,0);
if ( mem_ptr == 0 ){
perror("shmat");
exit(1);
}
// initial to 0
*mem_ptr = 0;
// create two child. One reader; one writer
if( !fork() ) adder(mem_ptr);
if( !fork() ) substracter(mem_ptr);
// wait for two child
wait(NULL);
wait(NULL);
printf("the value now is %d\n", *mem_ptr);
// detach and then destroy shared memory segment
shmdt((void*)mem_ptr);
shmctl(seg_id, IPC_RMID, NULL);
}
|
|
|
|
|
Hi,
Admistrator,in my office is very much willing to hack others system.I have Windows 2000 OS installed in my system.And I am sure that he does not know my login password so that he can hack my system through "Remote Desktop connection feature".Though some how he does.
Can u help giving ideas to protect my system.Atleast if I get a message when he tries to access my system will be appreciable.
Help me.
|
|
|
|
|
|
You can disable remote desktop and terminal services and all these things that allow any one to use your pc and log to it ,by setting the Services you want only , and also from the Local Security Policy ,they are really good and helpful ,i have modified them in my own system and it is doing good till now
|
|
|
|
|
I am not sure if this is qualified as 'hacking' really. After all, he is the system admin.
George Carlin wrote:
"Don't sweat the petty things, and don't pet the sweaty things."
Jörgen Sigvardsson wrote:
If the physicists find a universal theory describing the laws of universe, I'm sure the a**hole constant will be an integral part of that theory.
My Blog[^]
|
|
|
|
|
joy007 wrote: Admistrator,in my office is very much willing to hack others system.I have Windows 2000 OS installed in my system.And I am sure that he does not know my login password so that he can hack my system through "Remote Desktop connection feature".Though some how he does.
In general concept, administator is the person that have the complete right to perform any action in the system. Whether, he or she has the full right and permission to access the system and data, they must have an ethical to access each user privacy. User privacy should be access only if there is a time for investigation on an serious issue. If you are a general user in the network, you have no opportunity to prevent any sensitive information to your administrator. Discuss this issue in the meeting to find out the solution.
joy007 wrote: Can u help giving ideas to protect my system
If the problem could not be solve, try to keep only data that relate to your work in the computer. Any personal data should be keep in the personal removable media (flash drive or external hard disk drive).
|
|
|
|
|
Hi, how could we identify which Administrator account in windows 2000 is the built-in account or the account that have recently create??
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
I am not quite sure I understand the question but the built-in administrator account in Windows 2000 is called Administrator.
Any other account you create that you want to have admin privliges needs to be added to the administrators group.
|
|
|
|
|
dratcha wrote:
the built-in administrator account in Windows 2000 is called Administrator.
Yes, it is the default account that create automatically after windows 2000 have been setup. But remember that Administrator account could be renamed also. So my question is: how to identify which account that is the built in admin account (the account that create during setup) and which account is the admin account that create by the user (network administrator)??? If it is possible, could we identify this issue in MSDOS??
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Try to delete it and if it's built-in account it will refuse the dleeting process.
|
|
|
|
|
I think this is the risky method. If it is not the built-in account, it would gone. Whether you can create a new account with the same name and group membership, it each account has a unique id that would be load a difference profile.
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
I think this is the risky method ?
Ofcourse it's
|
|
|
|
|
Thank you very much for your help before. Now i could find the solution from here.[^]
|
|
|
|
|
I get really annoyed when I open an explorer window on a directory containing just a couple of files, and get a window that sprawls across half the desktop which I then have to resize manually. Is there an easy (or difficult) way of getting explorer to open directory views just big enough for the number of files in that directory?
Cheers,
Steve.
|
|
|
|
|
I think it is very difficult for you to do that. As far as I know, Microsoft did not give you the patch to solve this. Try to open and close it many time, to ensure that it is working or not...
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Is there a way to do this without creating a logon script?
|
|
|
|
|
One more thing that you can do is creating home folder[^]. But before you do that, I recommend you to know about creating roaming user profile[^].
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Why not a script?
George Carlin wrote:
"Don't sweat the petty things, and don't pet the sweaty things."
Jörgen Sigvardsson wrote:
If the physicists find a universal theory describing the laws of universe, I'm sure the a**hole constant will be an integral part of that theory.
My Blog[^]
|
|
|
|
|
Hi guys,
I'm looking for a software that will show me which files on the server the users are accessing.
Thanks!
|
|
|
|
|
You already have it. Go to Control Panel, Administrative Tools, Computer Management. Expand Shared Folders, then Open Files. From here you can see which files are being accessed.
Stability. What an interesting concept. -- Chris Maunder
|
|
|
|
|
JON10884 wrote:
...which files on the server the users are accessing
If you want to find only the current open file, Mike suggestion is the right answer. But if you want to know about the history of accessing the file from the user, you have know about configure auditing policies[^] and configuring and monitoring auditing article[^].
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
I need the c prog for First Come First Serve Process sceduling algo.
Can any one help?
|
|
|
|