Id
int64
4
8.51M
PostTypeId
int64
1
7
AcceptedAnswerId
int64
7
75.5M
ParentId
int64
4
41.8M
Score
int64
-208
27.7k
ViewCount
int64
11
12.4M
Body
stringlengths
0
45k
Title
stringlengths
2
150
ContentLicense
stringclasses
3 values
FavoriteCount
int64
0
225
CreationDate
stringdate
2008-07-31 21:42:52
2011-12-14 18:48:47
LastActivityDate
stringdate
2008-08-01 12:19:17
2023-03-05 04:40:26
LastEditDate
stringdate
2008-08-01 13:54:25
2023-03-05 03:12:45
LastEditorUserId
int64
-1
21.3M
OwnerUserId
int64
-1
21.1M
Tags
listlengths
1
6
32,875
1
3,980,775
null
53
37,437
Are there any lists of default CSS stylesheets for different browsers? (browser stylesheets in tabular form) I want to know the default font of text areas across all browsers for future reference.
Browsers' default CSS stylesheets
CC BY-SA 3.0
0
2008-08-28T17:36:29.080
2017-09-21T10:54:56.633
2014-05-21T07:38:50.003
277,697
2,118
[ "css", "browser", "fonts", "stylesheet", "default" ]
32,878
2
null
30,005
38
null
I'm pretty certain that it cannot be done. Pretty much anything else than PDF works, even Flash. (Tested on Safari, Firefox 3, IE 7) Too bad.
null
CC BY-SA 3.0
null
2008-08-28T17:38:18.357
2011-12-12T04:07:26.050
2011-12-12T04:07:26.050
31,671
2,948
null
32,879
2
null
32,717
0
null
> Is there a way I can define a macro for a directory and use it in the output path Have you looked at the pre-build and post-build events of a project?
null
CC BY-SA 2.5
null
2008-08-28T17:38:36.033
2008-08-28T17:38:36.033
null
null
1,069
null
32,859
2
null
32,835
2
null
I would that this question is geared more toward the approach of . I mean, XNA is a framework. Plug in [NUnit](http://www.nunit.org/index.php), and begin writing test cases while you develop. [Here](https://stackoverflow.com/questions/14087/unit-testing-a-game#14136) is a post on SO about unit testing a game. It'l...
null
CC BY-SA 2.5
null
2008-08-28T17:25:52.333
2008-08-28T17:25:52.333
2017-05-23T10:27:49.720
-1
568
null
32,877
1
33,312
null
20
14,670
I've got a problem where incoming SOAP messages from one particular client are being marked as invalid and rejected by our XML firewall device. It appears extra payload data is being inserted by Visual Studio; we're thinking the extra data may be causing a problem b/c we're seeing "VsDebuggerCausalityData" in these mes...
How to remove "VsDebuggerCausalityData" data from SOAP message?
CC BY-SA 2.5
0
2008-08-28T17:38:07.907
2016-07-25T14:27:46.667
null
null
1,683
[ "visual-studio", "web-services", "soap" ]
32,868
2
null
15,056
1
null
I'm using [Jean-Paul Boodhoo](http://blog.jpboodhoo.com)'s [BDD macro](http://blog.jpboodhoo.com/SmallUpdateToBDDMacro.aspx). It replaces whitespace characters with underscores within the header line of a method signature. This way I can type the names of a test case, for example, as a normal sentence, hit a keyboard s...
null
CC BY-SA 2.5
null
2008-08-28T17:29:45.303
2008-08-28T17:29:45.303
null
null
2,374
null
32,881
2
null
32,875
12
null
I suspect this is something of a moving target for all the browsers, [but there is a default style sheet for HTML 4 as defined by the W3C](http://www.w3.org/TR/CSS21/sample.html).
null
CC BY-SA 3.0
null
2008-08-28T17:38:50.150
2016-06-08T12:57:26.953
2016-06-08T12:57:26.953
2,049,986
35
null
32,880
2
null
32,875
3
null
You cannot possibly know all defaults for all configurations of all browsers into the future. The way people get around this is to start their CSS by resetting everything to known values. Here's an example from one of the main CSS experts: [http://meyerweb.com/eric/thoughts/2007/05/01/reset-reloaded/](http://meyerwe...
null
CC BY-SA 2.5
null
2008-08-28T17:38:44.207
2008-08-28T17:38:44.207
null
null
987
null
32,882
2
null
32,875
6
null
There probably is a list, this is why we use CSS Resets however. - [Eric Meyer's Reset](http://meyerweb.com/eric/thoughts/2007/04/14/reworked-reset/)- [Yahoo's Reset](http://developer.yahoo.com/yui/reset/)
null
CC BY-SA 2.5
null
2008-08-28T17:39:03.550
2008-08-28T17:39:03.550
null
null
2,025
null
32,885
2
null
32,607
2
null
I think that the Team Foundation Power Tools is the way to go. If there are pending changes you can move them to a shelveset then undo or check in all pending changes before running the rollback command. See [http://www.codeplex.com/VSTSGuidance/Wiki/View.aspx?title=How%20to%20undo%20a%20check-in&referringTitle=Source%...
null
CC BY-SA 2.5
null
2008-08-28T17:41:23.967
2008-08-28T17:41:23.967
null
null
3,012
null
32,897
1
32,916
null
5
1,501
This question would probably apply equally as well to other languages with C-like multi-line comments. Here's the problem I'm encountering. I'm working with Java code in Eclipse, and I wanted to comment out a block of code. However, there is a string that contains the character sequence "*/", and Eclipse thinks that th...
Do Java multi-line comments account for strings?
CC BY-SA 2.5
null
2008-08-28T17:47:56.570
2015-11-18T20:15:36.373
null
null
null
[ "java", "eclipse", "comments" ]
32,900
2
null
32,733
1
null
For some reason, MouseDoubleClick, as suggested by Jason Z is only firing when clicking on the tabs and clicking on the tab panel does not do anything, so that's exactly what I was looking for.
null
CC BY-SA 3.0
null
2008-08-28T17:49:39.657
2011-09-21T19:39:29.297
2011-09-21T19:39:29.297
1,508
1,508
null
32,899
1
32,939
null
348
188,360
I have some kind of test data and want to create a unit test for each item. My first idea was to do it like this: ``` import unittest l = [["foo", "a", "a",], ["bar", "a", "b"], ["lee", "b", "b"]] class TestSequence(unittest.TestCase): def testsample(self): for name, a,b in l: print "test", na...
How do you generate dynamic (parameterized) unit tests in Python?
CC BY-SA 4.0
0
2008-08-28T17:49:02.293
2022-07-11T19:45:08.380
2021-01-06T01:04:03.107
63,550
720
[ "python", "unit-testing", "parameterized-unit-test" ]
32,903
2
null
32,282
1
null
I am still a big [The Regulator](http://weblogs.asp.net/rosherove/pages/tools-and-frameworks-by-roy-osherove.aspx) fan. There are some stability problems but these can be fixed by disableing the Intellisense. It gets mad with some expressions and typos in building an expression. Would love it if [Roy Osherove](http:/...
null
CC BY-SA 2.5
null
2008-08-28T17:50:40.043
2008-08-28T17:50:40.043
null
null
2,818
null
32,898
2
null
11,986
2
null
Jamis has just released 1.2.4, and the comment history on that bug suggests that the fix is in 1.2.3 and later versions. As a quick test, I did the following on an OS X 10.5 box with Ruby 1.8.6: ``` sudo gem install sqlite3-ruby ``` (verified version number of 1.2.4) ``` rails test ``` (used default `database.ym...
null
CC BY-SA 2.5
null
2008-08-28T17:48:16.883
2008-08-28T17:48:16.883
null
null
3,462
null
32,905
2
null
32,766
2
null
Jared, you've hit it. Using "Convert to Web Application" to manually generate the designer file solves my problem. I'm glad you posted this before i started reinstalling. Thanks.
null
CC BY-SA 2.5
null
2008-08-28T17:51:35.517
2008-08-28T17:51:35.517
null
null
3,460
null
32,904
2
null
32,875
1
null
There was some discussion and testing done on www-style not too long ago: [http://lists.w3.org/Archives/Public/www-style/2008Jul/0124.html](http://lists.w3.org/Archives/Public/www-style/2008Jul/0124.html) [http://lists.w3.org/Archives/Public/www-style/2008Jul/att-0124/defaultstyles.htm](http://lists.w3.org/Archives/P...
null
CC BY-SA 2.5
null
2008-08-28T17:51:11.993
2008-08-28T17:51:11.993
null
null
1,697
null
32,893
2
null
32,845
0
null
Take a look at the following link: [http://www.calumgrant.net/atomic/](http://www.calumgrant.net/atomic/) The author described "Transactional Programming". This is analogous to the transactions in data bases. Example: Start transaction: 1. Step 1 2. Step 2 3. Encounter error during step 2 4. Roll back to before ...
null
CC BY-SA 2.5
null
2008-08-28T17:46:58.820
2008-08-28T17:46:58.820
null
null
3,467
null
32,911
2
null
32,570
0
null
We use the free version of [ISAPI_Rewrite](http://www.isapirewrite.com/). It uses similar syntax to mod_rewrite, so if you're familiar with that you may have an easier time getting started. There used to be a (syntax-compatible) port of mod_rewrite for IIS, but I can't find it now.
null
CC BY-SA 2.5
null
2008-08-28T17:52:46.590
2008-08-28T17:52:46.590
null
null
1,806
null
32,914
1
32,936
null
3
4,892
I'd like to render to svg data in a swf at runtime (not in Flex - not using degrafa) - how would I go about doing that?
Is there a way to render svg data in a swf at runtime?
CC BY-SA 2.5
0
2008-08-28T17:54:10.957
2008-12-19T07:06:16.457
null
null
3,435
[ "actionscript-3", "flash", "svg" ]
32,913
2
null
32,282
3
null
couple of eclipse plugins for those using eclipse, [http://www.brosinski.com/regex/](http://www.brosinski.com/regex/) [http://www.bastian-bergerhoff.com/eclipse/features/web/QuickREx/toc.html](http://www.bastian-bergerhoff.com/eclipse/features/web/QuickREx/toc.html)
null
CC BY-SA 2.5
null
2008-08-28T17:53:45.323
2008-08-28T17:53:45.323
null
null
1,425
null
32,916
2
null
32,897
9
null
Eclipse is correct. There is no interpretation context inside a comment (no escaping, etc). See [JLS §3.7](http://java.sun.com/docs/books/jls/second_edition/html/lexical.doc.html#48125).
null
CC BY-SA 2.5
null
2008-08-28T17:54:34.947
2008-08-28T17:54:34.947
null
null
3,069
null
32,920
2
null
32,144
1
null
@[Graeme](https://stackoverflow.com/users/1821/graeme): Thanks for helping me refine my question. My employer somehow has the impression that a Windows server is a second-class citizen on a NetWare network. Would installing the NetWare client on the Windows server make it easier for NetWare clients (with some form of W...
null
CC BY-SA 2.5
null
2008-08-28T17:56:19.390
2008-08-28T17:56:19.390
2020-06-20T09:12:55.060
-1
470
null
32,906
2
null
32,505
1
null
> In fact, IIRC, that's actually part of the 'official' spec for parsers. Official does not need to be quoted :) > fatal error[Definition:] An error which a conforming XML processor must detect and report to the application. After encountering a fatal error, the processor may continue processing the data to search for ...
null
CC BY-SA 2.5
null
2008-08-28T17:51:49.260
2008-08-28T17:51:49.260
2020-06-20T09:12:55.060
-1
3,069
null
32,922
2
null
8,276
1
null
Class::DBI is an [ORM (Object Relational Mapper)](http://en.wikipedia.org/wiki/Object-relational_mapping) for perl. Searching for "PHP ORM" on google gives some good results, including [Doctrin](http://www.doctrine-project.org/), which I've had good luck with. I'd start there and work your way up.
null
CC BY-SA 2.5
null
2008-08-28T17:56:45.567
2008-08-28T17:56:45.567
null
null
3,421
null
32,929
2
null
32,814
2
null
@jmein Actually the problem is that the Validator client script's don't work when placed inside of an updatePanel (UpdatePanels refresh using .innerHTML, which adds the script nodes as text nodes, not script nodes, so the browser does not run them). The fix was a patch released by microsoft that fixes this issue. I f...
null
CC BY-SA 2.5
null
2008-08-28T17:59:06.810
2008-08-28T17:59:06.810
null
null
1,965
null
32,927
2
null
32,897
0
null
A simple test shows Eclipse is correct: ``` public class Test { public static final void main(String[] args) throws Exception { String s = "This is the original string."; /* This is commented out. s = "This is the end of a comment: */ "; */ System.out.println(s); } } ``` This fails to compile...
null
CC BY-SA 2.5
null
2008-08-28T17:58:06.187
2008-08-28T17:58:06.187
null
null
3,449
null
32,931
2
null
32,897
0
null
I may be helpful to just do a "batch" multiline comment so that it comments each line with "//". It is Ctrl+"/" in Idea for commenting and uncommenting the selected lines, Eclipse should have a similar feature.
null
CC BY-SA 2.5
null
2008-08-28T17:59:12.237
2008-08-28T17:59:12.237
null
null
578
null
32,861
2
null
15,774
4
null
MaseBase, you can use [Web Deployment Projects](http://weblogs.asp.net/scottgu/archive/2005/11/06/429723.aspx) to build and package Web Sites. We do that all the time for projects with a web application aspect. After you assign a WDP to a Web Site, you can open up the file as plain-text XML file. At the end is a comme...
null
CC BY-SA 2.5
null
2008-08-28T17:26:24.737
2008-08-28T17:26:24.737
null
null
2,663
null
32,918
2
null
32,897
1
null
Yes, I am commenting the code out just to do a quick test. I've already tested what I needed to by commenting the code out another way; I was just curious about what appears to be an odd misfeature of Java and/or Eclipse.
null
CC BY-SA 2.5
null
2008-08-28T17:56:10.857
2008-08-28T17:56:10.857
null
null
null
null
32,907
2
null
32,280
3
null
> In most programming languages there is no good way to deal with a null that is passed by a caller accidentally. Because this is the case, the rational approach is to forbid passing null by default. I found ' `@Nullable` and `@NotNull` annotations approach for dealing with this the most ingenious, so far. It's IDE sp...
null
CC BY-SA 3.0
null
2008-08-28T17:51:58.263
2017-12-27T11:47:59.060
2017-12-27T11:47:59.060
3,798,217
2,718
null
32,933
2
null
32,845
1
null
If you are developing an application for Vista you can use Transactional NTFS, which supports a similar feature to what you are looking for. [http://en.wikipedia.org/wiki/Transactional_NTFS](http://en.wikipedia.org/wiki/Transactional_NTFS) Wouldn't installer packages already include this type of rollback support, tho...
null
CC BY-SA 2.5
null
2008-08-28T18:00:02.937
2008-08-28T18:00:02.937
null
null
291
null
32,932
2
null
32,777
2
null
[UnxUtils](http://unxutils.sourceforge.net/) isn't updated as often and isn't as complete as Cygwin but runs natively just like any other Windows command line utility. [Cygwin](http://www.cygwin.com/) acts more like a Linux command line emulator. It does feel pretty clunky but it is easier to port utilities to it and...
null
CC BY-SA 2.5
null
2008-08-28T17:59:49.477
2008-08-28T17:59:49.477
null
null
3,478
null
32,867
2
null
32,744
5
null
You might also be interested to know why the GMail to HotMail link uses SMTP, just like your Thunderbird client. In other words, since your client can send email via SMTP, and it can use DNS to get the MX record for hotmail.com, why doesn't it just send it there directly, skipping gmail.com altogether? There are a coup...
null
CC BY-SA 4.0
null
2008-08-28T17:28:46.913
2021-03-06T16:15:35.623
2021-03-06T16:15:35.623
3,474
3,474
null
32,937
1
33,234
null
11
2,538
In C# is there a shorthand way to write this: ``` public static bool IsAllowed(int userID) { return (userID == Personnel.JohnDoe || userID == Personnel.JaneDoe ...); } ``` Like: ``` public static bool IsAllowed(int userID) { return (userID in Personnel.JohnDoe, Personnel.JaneDoe ...); } ``` I know I could...
Shorthand conditional in C# similar to SQL 'in' keyword
CC BY-SA 2.5
0
2008-08-28T18:01:42.763
2012-07-04T19:21:49.620
null
null
1,302
[ "c#", "lambda", "conditional-statements", "if-statement" ]
32,940
2
null
3,881
-1
null
If it's a "setter", or somewhere I'm getting a member to use later, I tend to use IllegalArgumentException. If it's something I'm going to use (dereference) right now in the method, I throw a NullPointerException proactively. I like this better than letting the runtime do it, because I can provide a helpful message (s...
null
CC BY-SA 2.5
null
2008-08-28T18:03:19.793
2008-08-28T18:03:19.793
null
null
3,474
null
32,936
2
null
32,914
1
null
The Ajaxian blog had a post about this today. [http://ajaxian.com/archives/the-state-of-svg-browser-support-using-flash-for-svg-in-internet-explorer](http://ajaxian.com/archives/the-state-of-svg-browser-support-using-flash-for-svg-in-internet-explorer)
null
CC BY-SA 2.5
null
2008-08-28T18:00:42.873
2008-08-28T18:00:42.873
null
null
757
null
32,930
1
58,758
null
8
1,579
I'd like to add dvd burning functionality to my .Net app (running on Windows Server 2003), are there any good components available? I've used the NeroCOM sdk that used to come with Nero but they no longer support the sdk in the latest versions of Nero. I learned that Microsoft has created an IMAPI2 upgrade for Window...
What is a good dvd burning component for Windows or .Net?
CC BY-SA 2.5
0
2008-08-28T17:59:11.567
2014-04-09T05:57:15.903
2012-05-03T21:57:22.287
680,565
327
[ ".net", "windows", "components", "dvd" ]
32,884
2
null
15,056
10
null
This is my macro to close the solution, delete the intellisense file, and reopen the solution. Essential if you're working in native C++. ``` Sub UpdateIntellisense() Dim solution As Solution = DTE.Solution Dim filename As String = solution.FullName Dim ncbFile As System.Text.StringBuilder = New System.Tex...
null
CC BY-SA 2.5
null
2008-08-28T17:41:12.390
2010-03-09T15:01:47.460
2010-03-09T15:01:47.460
15,369
887
null
32,941
1
344,461
null
1
508
Is the Sql Server 2008 control available for download? Does it yet support the 2008 RDL schema?
SQL Server 2008 Reporting Services Control
CC BY-SA 2.5
null
2008-08-28T18:03:36.097
2008-12-05T16:47:25.180
null
null
2,184
[ "sql-server", "reporting-services" ]
32,949
2
null
5,307
0
null
Someone I know created a component that extends controls with a lot of properties that give you a lot of control over how the form prints. It's worth a look. [MCL PrintForm Helper Component](http://www.xtremevbtalk.com/showthread.php?t=279707)
null
CC BY-SA 2.5
null
2008-08-28T18:07:14.373
2008-08-28T18:07:14.373
null
null
2,547
null
32,909
2
null
32,777
3
null
I use Cygwin, but I have used the [Berkley Utilities](http://www.openetwork.com/berk.html) in the past. They worked well enough, if you are used to DOS and you just want the commands. There are some alternatives listed at [TinyApps](http://www.tinyapps.org/system.html). Maybe you could also consider running a command ...
null
CC BY-SA 2.5
null
2008-08-28T17:52:01.430
2008-08-28T17:52:01.430
null
null
3,471
null
32,942
2
null
32,937
2
null
I would encapsulate the list of allowed IDs as not . Then it's source can be changed easily later on. ``` List<int> allowedIDs = ...; public bool IsAllowed(int userID) { return allowedIDs.Contains(userID); } ``` If using .NET 3.5, you can use `IEnumerable` instead of `List` thanks to extension methods. (This ...
null
CC BY-SA 2.5
null
2008-08-28T18:03:48.123
2008-08-28T18:14:46.833
2017-05-23T10:32:50.733
-1
338
null
32,939
2
null
32,899
277
null
This is called "parametrization". There are several tools that support this approach. E.g.: - [pytest's decorator](https://docs.pytest.org/en/latest/parametrize.html)- [parameterized](https://github.com/wolever/parameterized) The resulting code looks like this: ``` from parameterized import parameterized class TestSeq...
null
CC BY-SA 4.0
null
2008-08-28T18:02:33.027
2021-02-05T16:18:38.200
2021-02-05T16:18:38.200
63,550
3,448
null
32,947
2
null
32,941
0
null
The ReportViewer control should work just fine with SQL Server 2008.
null
CC BY-SA 2.5
null
2008-08-28T18:06:22.050
2008-08-28T18:06:22.050
null
null
2,374
null
32,965
2
null
32,282
0
null
[RegExr](http://gskinner.com/RegExr/) for testing with the Actionscript 3 (whichever standard that may be)
null
CC BY-SA 2.5
null
2008-08-28T18:12:22.970
2008-08-28T18:12:22.970
null
null
914
null
32,973
2
null
32,964
4
null
I don't think the biggest problem is just someone stealing your bandwidth, but what they do with it. It's one thing if someone uses my wireless network to browse the Internet. It's another thing if they use it for torrenting (I find that slows down the network) or any illegal activities (kiddy porn? not on my network y...
null
CC BY-SA 2.5
null
2008-08-28T18:13:23.997
2008-08-28T18:13:23.997
null
null
572
null
32,950
2
null
32,937
1
null
Are permissions user-id based? If so, you may end up with a better solution by going to role based permissions. Or you may end up having to edit that method quite frequently to add additional users to the "allowed users" list. For example, enum UserRole { User, Administrator, LordEmperor } ``` clas...
null
CC BY-SA 2.5
null
2008-08-28T18:07:22.267
2008-08-28T18:07:22.267
null
null
3,460
null
32,978
2
null
32,964
3
null
Yes you are, your wireless router also doubles as a firewall preventing harmful data from the Internet, by letting one of your virus-infected neighbors in on your wlan you're essentially letting him bypass that. Now, this shouldn't be a problem in an ideal world since you'd have a well-configured system with a firewal...
null
CC BY-SA 2.5
null
2008-08-28T18:14:57.410
2008-08-28T18:14:57.410
null
null
2,114
null
32,959
2
null
26,816
10
null
> However, if you are using unmanaged resources in those threads, you may end up in a lot of trouble. That would rather depend how you were using them - if these unmanaged resources were properly wrapped then they'd be dealt with by their wrapper finalization regardless of the mechanism used to kill threads which ...
null
CC BY-SA 2.5
null
2008-08-28T18:10:40.790
2008-08-28T18:10:40.790
null
null
987
null
32,976
2
null
32,964
16
null
Bruce Schneier is famous for running an open wireless network at home ([see here](http://www.schneier.com/blog/archives/2008/01/my_open_wireles.html)). He does it for two reasons: 1. To be neighborly (you'd let your neighbor borrow a cup of sugar, wouldn't you? Why not a few megabits?) 2. To keep away from the false ...
null
CC BY-SA 2.5
null
2008-08-28T18:14:48.473
2008-08-28T18:14:48.473
null
null
2,527
null
32,964
1
32,976
null
11
1,664
Obviously there are security reasons to close a wireless network and it's not fun if someone is stealing your bandwidth. That would be a serious problem? To address the first concern: Does a device on the same wireless network have any special privileges or access that an other device on the internet has? Wireless n...
Should a wireless network be open?
CC BY-SA 3.0
0
2008-08-28T18:11:55.343
2015-12-23T05:00:47.540
2015-12-23T05:00:47.540
2,893,131
1,438
[ "security", "networking", "wireless" ]
32,944
2
null
32,937
4
null
How about something like this: ``` public static bool IsAllowed(int userID) { List<int> IDs = new List<string> { 1,2,3,4,5 }; return IDs.Contains(userID); } ``` (You could of course change the static status, initialize the IDs class in some other place, use an IEnumerable<>, etc, based on your needs. The main po...
null
CC BY-SA 2.5
null
2008-08-28T18:04:36.377
2008-08-28T18:12:59.943
2008-08-28T18:12:59.943
51
51
null
32,984
2
null
32,941
1
null
If you are talking about the ReportViewer control, it is [available](http://www.microsoft.com/downloads/details.aspx?FamilyID=cc96c246-61e5-4d9e-bb5f-416d75a1b9ef&DisplayLang=en). However you need Windows XP, Windows Vista or Windows Server 2003 to install it. It is also written that .NET 3.5 is required, but I'm not ...
null
CC BY-SA 2.5
null
2008-08-28T18:15:57.377
2008-08-28T18:15:57.377
null
null
968
null
32,983
2
null
2,767
1
null
I just found this rather large list of addins: [http://geekswithblogs.net/brians/archive/2008/05/12/122087.aspx](https://web.archive.org/web/20210127112218/http://geekswithblogs.net/brians/archive/2008/05/12/122087.aspx)
null
CC BY-SA 4.0
null
2008-08-28T18:15:55.817
2022-07-24T14:03:16.243
2022-07-24T14:03:16.243
4,751,173
2,786
null
32,982
2
null
32,897
2
null
In Eclipse you can highlight the part of the source code you want to comment out and use the Ctrl+/ to single-line comment every line in the highlighted section - puts a "//" at the beginning of the lines. Or if you really want to block-comment the selection use the Ctrl+Shift+/ combination. It will detect the block c...
null
CC BY-SA 2.5
null
2008-08-28T18:15:36.473
2008-08-28T18:15:36.473
null
null
3,087
null
32,987
2
null
32,964
2
null
I feel it all has to due with population density. My parents own a big plot of land nearest neighbor is .5 mile away. To me it doesn't make sense to lock a wireless router down. But if I lived in a apartment complex that thing will be locked down and not broadcasting it's ID. Now at my house I just don't broadcast ...
null
CC BY-SA 2.5
null
2008-08-28T18:17:02.477
2008-08-28T18:17:02.477
null
null
648
null
32,980
2
null
32,871
1
null
I've never done it that way around but I think [swffit](http://swffit.millermedeiros.com/) might be able to pull it off.
null
CC BY-SA 2.5
null
2008-08-28T18:15:32.527
2008-08-28T18:15:32.527
null
null
914
null
32,985
2
null
32,964
1
null
For most people, the wireless access point is a router that is acting as a hardware firewall to external traffic. If someone's not on your wireless network, the only way they'll get to a service running on your machine is if the router is configured to forward requests. Once a device is behind the router, you're rely...
null
CC BY-SA 2.5
null
2008-08-28T18:16:18.157
2008-08-28T18:16:18.157
null
null
2,547
null
32,966
1
null
null
3
930
I'm using Ruby on Rails for an internal site. Different users of the site have access to a wide variety of data and highly disparate perspectives of the data. Within those different classes of users, there needs to be levels of access. Within the levels of access I need to be able to add features from other classes of ...
How to program user preferences
CC BY-SA 2.5
null
2008-08-28T18:12:38.337
2008-10-11T00:03:02.503
2008-08-28T18:23:00.497
757
757
[ "ruby-on-rails", "ruby", "user-controls", "user-interface" ]
32,986
1
33,256
null
19
7,007
I know that if you have a loop that modifies the count of the items in the loop, using the NSEnumerator on a set is the best way to make sure your code blows up, however I would like to understand the performance tradeoffs between the NSEnumerator class and just an old school for loop
NSEnumerator performance vs for loop in Cocoa
CC BY-SA 2.5
0
2008-08-28T18:16:54.443
2015-06-08T22:53:03.013
2008-11-10T16:12:45.377
21,755
3,484
[ "objective-c", "cocoa", "nsenumerator" ]
32,992
2
null
32,964
0
null
@kronoz: I guess it depends on where you live. Only two houses are within reach of my wireless network, excluding my own. So I doubt that small number of people can affect my bandwidth. But if you live in a major metro area, and many people are able to see and get on the network, yeah, it might become a problem.
null
CC BY-SA 2.5
null
2008-08-28T18:18:54.873
2008-08-28T18:18:54.873
null
null
572
null
32,988
2
null
32,964
2
null
I would actually disagree with Thomas in the sense that I think bandwidth the biggest problem, as it's unlikely there are many dodgy people in your area who just so happen to connect to your network to misbehave. It's more likely I think that you'll have chancers, or even users who don't fully understand wireless, con...
null
CC BY-SA 2.5
null
2008-08-28T18:17:05.517
2008-08-28T18:17:05.517
null
null
3,394
null
32,997
2
null
32,991
0
null
I can't answer the main question, but do keep in mind that Windows, by default, is always sharing the roots of your drives. Try: ``` \\yourmachine\c$ ``` (And then try not to freak out.)
null
CC BY-SA 2.5
null
2008-08-28T18:20:26.180
2008-08-28T18:20:26.180
null
null
338
null
32,991
1
null
null
2
202
The leaving your wireless network open question reminded me of this. I typically share the root drive on my machines across my network, and tie login authorization to the machines NT ID, so there is at least some form of protection. My question, how easy is it to gain access to these drives for ill good? Is the autho...
Leaving your harddrive shared
CC BY-SA 2.5
null
2008-08-28T18:18:29.417
2008-09-18T10:01:20.620
2008-08-28T18:26:51.517
1,414
1,965
[ "windows", "security", "networking", "sysadmin" ]
32,998
2
null
32,964
1
null
Following joshhinman comment, this is a link to an article where he explains why he has chosen to leave his wireless network setup open.[Schneier on Open Wireless](http://www.schneier.com/blog/archives/2008/01/my_open_wireles.html) This guy is probably the most famous security expert at the moment, so it worths having...
null
CC BY-SA 2.5
null
2008-08-28T18:22:20.560
2008-08-28T18:22:20.560
null
null
2,697
null
32,995
2
null
32,845
4
null
> Is it "taboo" to programatically create system restore points? No. That's why the API is there; so that you can have pseudo-atomic updates of the system.
null
CC BY-SA 2.5
null
2008-08-28T18:19:49.850
2008-08-28T18:19:49.850
null
null
2,131
null
32,989
2
null
32,845
4
null
Whether it's a good idea or not really depends on how much you're doing. A full system restore point is weighty - it takes time to create, disk space to store, and gets added to the interface of restore points, possibly pushing earlier restore points out of storage. So, if your update is really only changing applicat...
null
CC BY-SA 2.5
null
2008-08-28T18:18:13.877
2008-08-28T18:18:13.877
null
null
1,200
null
33,000
2
null
32,964
1
null
As far as the security aspect goes it is a non issue. An open network can allow a determined person to 'listen' to all your unencrypted communication. This will include emails - probably forum posts - things like this. These things should never EVER be considered secure in the first place unless you are applying your o...
null
CC BY-SA 2.5
null
2008-08-28T18:22:39.687
2008-08-28T18:22:39.687
null
null
3,022
null
33,012
2
null
32,964
0
null
It is so easy to lock a wireless router down now, that I think a better question is why lock it down? The only reason I can think of is if you had a yard large enough so that your neighbors can't get a signal you frequently have visitors bringing devices into your home (since setting them up can be a chore). Note t...
null
CC BY-SA 2.5
null
2008-08-28T18:26:58.943
2008-08-28T18:26:58.943
null
null
672
null
33,008
2
null
32,790
32
null
The use of `System.exit` is frowned upon when the 'application' is really a sub-application (e.g. servlet, applet) of a larger Java application (server): in this case the `System.exit` could stop the JVM and hence also all other sub-applications. In this situation, throwing an appropriate exception, which could be caug...
null
CC BY-SA 3.0
null
2008-08-28T18:25:27.760
2016-11-22T08:37:44.057
2016-11-22T08:37:44.057
1,672,920
3,477
null
33,016
2
null
32,964
0
null
> Personally, I would never run an open wireless network for one reason: accountability. If someone does something illegal on my network, I don't want to be held accountable.> The flip side of this is deniability. If the government or RIAA come knocking on your door about something done from your IP address you can alw...
null
CC BY-SA 2.5
null
2008-08-28T18:28:36.443
2008-08-28T18:28:36.443
2020-06-20T09:12:55.060
-1
572
null
33,005
2
null
32,964
1
null
> Personally, I would never run an open wireless network for one reason: accountability. If someone does something illegal on my network, I don't want to be held accountable. The flip side of this is deniability. If the government or RIAA come knocking on your door about something done from your IP address you can al...
null
CC BY-SA 2.5
null
2008-08-28T18:25:10.460
2008-08-28T18:25:10.460
null
null
2,600
null
33,019
2
null
32,871
0
null
I halfway looked at swffit but the height (and width sometimes but mainly height) would be dynamic - swffit let's you declare a maxHeight but that number would be constantly changing...maybe I could figure out how to set it dynamically. A great place for me to start though - thanks!
null
CC BY-SA 2.5
null
2008-08-28T18:29:22.337
2008-08-28T18:29:22.337
null
null
3,435
null
33,014
2
null
32,937
0
null
A nice little trick is to sort of reverse the way you usually use .Contains(), like:- ``` public static bool IsAllowed(int userID) { return new int[] { Personnel.JaneDoe, Personnel.JohnDoe }.Contains(userID); } ``` Where you can put as many entries in the array as you like. If the Personnel.x is an enum you'd hav...
null
CC BY-SA 2.5
null
2008-08-28T18:27:50.547
2008-08-28T18:27:50.547
null
null
3,394
null
33,015
2
null
32,937
0
null
Here's the closest that I can think of: ``` using System.Linq; public static bool IsAllowed(int userID) { return new Personnel[] { Personnel.JohnDoe, Personnel.JaneDoe }.Contains((Personnel)userID); } ```
null
CC BY-SA 2.5
null
2008-08-28T18:28:21.810
2008-08-28T18:28:21.810
null
null
null
null
33,020
2
null
32,991
1
null
If this is a home network with no wifi or secured wifi, it's probably not an issue. Your isp will almost certainly prevent anyone from trying anything via the larger web. If you have open wifi, then there's a little more cause for concern. If it's properly secured so that some authentication is required, you're prob...
null
CC BY-SA 2.5
null
2008-08-28T18:30:17.047
2008-08-28T18:30:17.047
null
null
3,043
null
33,024
2
null
32,937
0
null
Can you write an iterator for Personnel. ``` public static bool IsAllowed(int userID) { return (Personnel.Contains(userID)) } public bool Contains(int userID) : extends Personnel (i think that is how it is written) { foreach (int id in Personnel) if (id == userid) return true; return f...
null
CC BY-SA 2.5
null
2008-08-28T18:32:29.960
2008-08-28T18:32:29.960
null
null
3,135
null
33,027
2
null
23,755
2
null
Easy: Burn the haystack! Afterward, only the needle will remain. Also, you could try magnets. A harder question: How do you find one particular needle in a pool of needles? Answer: thread each one and attach the other end of each strand of thread to a sorted index (i.e. pointers)
null
CC BY-SA 2.5
null
2008-08-28T18:35:10.013
2008-08-28T18:35:10.013
null
null
2,774
null
33,026
2
null
32,814
3
null
> @Jonathan Holland: What is wrong with using Validators.dll? Since they replace the original classes, you are quietly bypassing any bug and security fixes, enhancements, etc. that Microsoft might release in the future (or might have already released). Unless you look carefully at the web.config, you might never noti...
null
CC BY-SA 2.5
null
2008-08-28T18:34:41.280
2008-08-28T18:41:43.290
2008-08-28T18:41:43.290
2,230
2,230
null
33,029
2
null
32,871
0
null
What I've mostly been using if for is to limit how small you can make a "fullbrowser" flash, and for that it works great. Happy hacking! (and don't forget to post your findings here, I might need that too soon ;))
null
CC BY-SA 2.5
null
2008-08-28T18:36:06.347
2008-08-28T18:36:06.347
null
null
914
null
33,033
2
null
22,873
8
null
For I suggest [Accelerated C++](https://rads.stackoverflow.com/amzn/click/com/020170353X) by Koenig and Moo as a beginning text, though I don't know how it would be for an absolute novice. It focuses on using the STL right away, which makes getting things done easier.
null
CC BY-SA 2.5
null
2008-08-28T18:36:54.410
2008-08-28T18:36:54.410
null
null
1,121,861
null
33,007
2
null
32,790
10
null
I agree with the "" crowd. One reason is that calling System.exit makes your code difficult to use if you want other code to be able to use it. For example, if you find out that your class would be useful from a web app, or some kind of message consuming app, it would be nice to allow those containers the opportunity t...
null
CC BY-SA 3.0
null
2008-08-28T18:25:11.770
2016-07-22T10:51:28.313
2016-07-22T10:51:28.313
6,042,824
3,449
null
33,034
1
33,059
null
24
12,617
As many of you probably know, online banks nowadays have a security system whereby you are asked some personal questions before you even enter your password. Once you have answered them, you can choose for the bank to "remember this computer" so that in the future you can login by only entering your password. How doe...
How do banks remember "your computer"?
CC BY-SA 2.5
0
2008-08-28T18:37:07.513
2015-12-03T19:46:25.873
null
null
3,508
[ "https", "onlinebanking", "sessiontracking" ]
33,023
2
null
5,916
0
null
Using regions (or otherwise folding code) have nothing to do with code smells (or hiding them) or any other idea of hiding code you don't want people to "easily" see. Regions and code folding is really all about providing a way to easily group sections of code that can be collapsed/folded/hidden to minimize the amoun...
null
CC BY-SA 2.5
null
2008-08-28T18:32:08.010
2008-08-28T18:32:08.010
null
null
1,559
null
33,036
2
null
32,541
65
null
The simplest way that I've done it is to use a XamlWriter to save the WPF object as a string. The Save method will serialize the object and all of its children in the logical tree. Now you can create a new object and load it with a XamlReader. ex: Write the object to xaml (let's say the object was a Grid control): ``...
null
CC BY-SA 2.5
null
2008-08-28T18:38:06.887
2008-08-28T18:38:06.887
null
null
1,133
null
33,028
2
null
18,524
4
null
To the people concerned about "boxing" in jsight's answer: there is none. `String.valueOf(Object)` is used here, and no unboxing to `int` is ever performed. Whether you use `Integer.toString()` or `String.valueOf(Object)` depends on how you want to handle possible nulls. Do you want to throw an exception (probably), o...
null
CC BY-SA 2.5
null
2008-08-28T18:35:49.467
2008-08-28T18:35:49.467
null
null
3,474
null
33,031
2
null
7,642
3
null
The design guidelines that you linked specifically state that they only apply to static public and protected fields. The design guidelines mostly focus on designing public APIs; what you do with your private members is up to you. I'm not positive but I'm relatively confident that private members are not considered wh...
null
CC BY-SA 2.5
null
2008-08-28T18:36:15.347
2008-08-28T18:36:15.347
null
null
2,547
null
33,040
2
null
33,034
-1
null
MAC address is possible. IP to physical location mapping is also a possibility. User agents and other HTTP headers are quiet unique to each of the machines too. I'm thinking about those websites that prevents you from using an accelerating download managers. There must be a way.
null
CC BY-SA 2.5
null
2008-08-28T18:39:49.660
2008-08-28T18:39:49.660
null
null
3,055
null
33,041
2
null
31,446
17
null
Unfortunately, there's no way to disconnect one object from the entity manager in the current JPA implementation, AFAIR. EntityManager.clear() will disconnect the JPA objects, so that might not be an appropriate solution in all the cases, if you have other objects you do plan to keep connected. So your best bet woul...
null
CC BY-SA 2.5
null
2008-08-28T18:39:55.213
2008-08-28T18:39:55.213
null
null
2,718
null
33,043
2
null
31,320
9
null
There's a Railscast on profiling that's well worth watching [http://railscasts.com/episodes/98-request-profiling](http://railscasts.com/episodes/98-request-profiling)
null
CC BY-SA 2.5
null
2008-08-28T18:40:04.153
2008-08-28T18:40:04.153
null
null
3,162
null
33,045
2
null
33,034
0
null
Are you using a laptop? Does it remember you, after you delete your cookies, if you access from a different WiFi network? If so, IP/physical location mapping is highly unlikely.
null
CC BY-SA 2.5
null
2008-08-28T18:41:06.380
2008-08-28T18:41:06.380
null
null
1,344
null
33,046
2
null
33,034
1
null
I think it depends on the bank. My bank does use a cookie since I lose it when I wipe cookies.
null
CC BY-SA 3.0
null
2008-08-28T18:41:16.757
2015-12-03T19:46:25.873
2015-12-03T19:46:25.873
3,393,505
1,358
null
33,038
2
null
33,034
1
null
It could be a combination of cookies, and ip address logging. Edit: I have just checked my bank and cleared the cookies. Now I have to re-enter all of my info.
null
CC BY-SA 3.0
null
2008-08-28T18:38:51.177
2013-12-15T20:37:29.017
2013-12-15T20:37:29.017
1,783,163
2,083
null
33,018
2
null
32,937
0
null
Just another syntax idea: ``` return new [] { Personnel.JohnDoe, Personnel.JaneDoe }.Contains(userID); ```
null
CC BY-SA 3.0
null
2008-08-28T18:29:17.347
2012-07-04T19:21:49.620
2012-07-04T19:21:49.620
1,001,985
3,142
null
33,049
2
null
33,034
1
null
It is possible for flash files to store a small amount of data on your computer. It's also possible that the bank uses that approach to "remember" your computer, but it's risky to rely on users having (and not having disabled) flash.
null
CC BY-SA 2.5
null
2008-08-28T18:41:24.180
2008-08-28T18:41:24.180
null
null
658
null
33,048
1
130,114
null
37
13,029
Suppose you have an ActiveRecord::Observer in one of your Ruby on Rails applications - how do you test this observer with rSpec?
How would you test observers with rSpec in a Ruby on Rails application?
CC BY-SA 2.5
0
2008-08-28T18:41:21.920
2015-08-27T20:10:38.550
2015-08-27T20:10:38.550
2,569
2,569
[ "ruby-on-rails", "ruby", "activerecord", "rspec", "observer-pattern" ]
32,996
2
null
32,814
21
null
I suspect you are running the original release (RTM) of .NET 2.0. Until early 2007 validator controls were not compatible with UpdatePanels. This was resolved with the SP1 of the .NET Framework. The source of the problem is that UpdatePanel can detect markup changes in your page, but it has no way to track scripts co...
null
CC BY-SA 2.5
null
2008-08-28T18:20:00.923
2008-08-28T18:44:36.683
2008-08-28T18:44:36.683
2,230
2,230
null
33,055
1
33,064
null
196
144,604
What methods are available for backing up repositories in a Windows environment?
SVN repository backup strategies
CC BY-SA 4.0
0
2008-08-28T18:43:59.480
2022-12-29T03:07:34.710
2022-12-29T03:07:34.710
11,107,541
3,396
[ "windows", "svn", "backup" ]
33,053
2
null
33,034
1
null
My bank's site makes me re-authenticate every time a new version of Firefox is out, so there's definitely a user-agent string component in some.
null
CC BY-SA 2.5
null
2008-08-28T18:43:36.453
2008-08-28T18:43:36.453
null
null
1,902,010
null