Id int64 4 8.51M | PostTypeId int64 1 7 | AcceptedAnswerId int64 7 75.5M ⌀ | ParentId int64 4 41.8M ⌀ | Score int64 -208 27.7k | ViewCount int64 11 12.4M ⌀ | Body stringlengths 0 45k | Title stringlengths 2 150 ⌀ | ContentLicense stringclasses 3
values | FavoriteCount int64 0 225 ⌀ | CreationDate stringdate 2008-07-31 21:42:52 2011-12-14 18:48:47 | LastActivityDate stringdate 2008-08-01 12:19:17 2023-03-05 04:40:26 | LastEditDate stringdate 2008-08-01 13:54:25 2023-03-05 03:12:45 ⌀ | LastEditorUserId int64 -1 21.3M ⌀ | OwnerUserId int64 -1 21.1M ⌀ | Tags listlengths 1 6 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
32,875 | 1 | 3,980,775 | null | 53 | 37,437 | Are there any lists of default CSS stylesheets for different browsers? (browser stylesheets in tabular form)
I want to know the default font of text areas across all browsers for future reference.
| Browsers' default CSS stylesheets | CC BY-SA 3.0 | 0 | 2008-08-28T17:36:29.080 | 2017-09-21T10:54:56.633 | 2014-05-21T07:38:50.003 | 277,697 | 2,118 | [
"css",
"browser",
"fonts",
"stylesheet",
"default"
] |
32,878 | 2 | null | 30,005 | 38 | null | I'm pretty certain that it cannot be done.
Pretty much anything else than PDF works, even Flash. (Tested on Safari, Firefox 3, IE 7)
Too bad.
| null | CC BY-SA 3.0 | null | 2008-08-28T17:38:18.357 | 2011-12-12T04:07:26.050 | 2011-12-12T04:07:26.050 | 31,671 | 2,948 | null |
32,879 | 2 | null | 32,717 | 0 | null | > Is there a way I can define a macro for a directory and use it in the output path
Have you looked at the pre-build and post-build events of a project?
| null | CC BY-SA 2.5 | null | 2008-08-28T17:38:36.033 | 2008-08-28T17:38:36.033 | null | null | 1,069 | null |
32,859 | 2 | null | 32,835 | 2 | null | I would that this question is geared more toward the approach of . I mean, XNA is a framework. Plug in [NUnit](http://www.nunit.org/index.php), and begin writing test cases while you develop.
[Here](https://stackoverflow.com/questions/14087/unit-testing-a-game#14136) is a post on SO about unit testing a game. It'l... | null | CC BY-SA 2.5 | null | 2008-08-28T17:25:52.333 | 2008-08-28T17:25:52.333 | 2017-05-23T10:27:49.720 | -1 | 568 | null |
32,877 | 1 | 33,312 | null | 20 | 14,670 | I've got a problem where incoming SOAP messages from one particular client are being marked as invalid and rejected by our XML firewall device. It appears extra payload data is being inserted by Visual Studio; we're thinking the extra data may be causing a problem b/c we're seeing "VsDebuggerCausalityData" in these mes... | How to remove "VsDebuggerCausalityData" data from SOAP message? | CC BY-SA 2.5 | 0 | 2008-08-28T17:38:07.907 | 2016-07-25T14:27:46.667 | null | null | 1,683 | [
"visual-studio",
"web-services",
"soap"
] |
32,868 | 2 | null | 15,056 | 1 | null | I'm using [Jean-Paul Boodhoo](http://blog.jpboodhoo.com)'s [BDD macro](http://blog.jpboodhoo.com/SmallUpdateToBDDMacro.aspx). It replaces whitespace characters with underscores within the header line of a method signature. This way I can type the names of a test case, for example, as a normal sentence, hit a keyboard s... | null | CC BY-SA 2.5 | null | 2008-08-28T17:29:45.303 | 2008-08-28T17:29:45.303 | null | null | 2,374 | null |
32,881 | 2 | null | 32,875 | 12 | null | I suspect this is something of a moving target for all the browsers, [but there is a default style sheet for HTML 4 as defined by the W3C](http://www.w3.org/TR/CSS21/sample.html).
| null | CC BY-SA 3.0 | null | 2008-08-28T17:38:50.150 | 2016-06-08T12:57:26.953 | 2016-06-08T12:57:26.953 | 2,049,986 | 35 | null |
32,880 | 2 | null | 32,875 | 3 | null | You cannot possibly know all defaults for all configurations of all browsers into the future.
The way people get around this is to start their CSS by resetting everything to known values. Here's an example from one of the main CSS experts: [http://meyerweb.com/eric/thoughts/2007/05/01/reset-reloaded/](http://meyerwe... | null | CC BY-SA 2.5 | null | 2008-08-28T17:38:44.207 | 2008-08-28T17:38:44.207 | null | null | 987 | null |
32,882 | 2 | null | 32,875 | 6 | null | There probably is a list, this is why we use CSS Resets however.
- [Eric Meyer's Reset](http://meyerweb.com/eric/thoughts/2007/04/14/reworked-reset/)- [Yahoo's Reset](http://developer.yahoo.com/yui/reset/)
| null | CC BY-SA 2.5 | null | 2008-08-28T17:39:03.550 | 2008-08-28T17:39:03.550 | null | null | 2,025 | null |
32,885 | 2 | null | 32,607 | 2 | null | I think that the Team Foundation Power Tools is the way to go. If there are pending changes you can move them to a shelveset then undo or check in all pending changes before running the rollback command. See [http://www.codeplex.com/VSTSGuidance/Wiki/View.aspx?title=How%20to%20undo%20a%20check-in&referringTitle=Source%... | null | CC BY-SA 2.5 | null | 2008-08-28T17:41:23.967 | 2008-08-28T17:41:23.967 | null | null | 3,012 | null |
32,897 | 1 | 32,916 | null | 5 | 1,501 | This question would probably apply equally as well to other languages with C-like multi-line comments. Here's the problem I'm encountering. I'm working with Java code in Eclipse, and I wanted to comment out a block of code. However, there is a string that contains the character sequence "*/", and Eclipse thinks that th... | Do Java multi-line comments account for strings? | CC BY-SA 2.5 | null | 2008-08-28T17:47:56.570 | 2015-11-18T20:15:36.373 | null | null | null | [
"java",
"eclipse",
"comments"
] |
32,900 | 2 | null | 32,733 | 1 | null | For some reason, MouseDoubleClick, as suggested by Jason Z is only firing when clicking on the tabs and clicking on the tab panel does not do anything, so that's exactly what I was looking for.
| null | CC BY-SA 3.0 | null | 2008-08-28T17:49:39.657 | 2011-09-21T19:39:29.297 | 2011-09-21T19:39:29.297 | 1,508 | 1,508 | null |
32,899 | 1 | 32,939 | null | 348 | 188,360 | I have some kind of test data and want to create a unit test for each item. My first idea was to do it like this:
```
import unittest
l = [["foo", "a", "a",], ["bar", "a", "b"], ["lee", "b", "b"]]
class TestSequence(unittest.TestCase):
def testsample(self):
for name, a,b in l:
print "test", na... | How do you generate dynamic (parameterized) unit tests in Python? | CC BY-SA 4.0 | 0 | 2008-08-28T17:49:02.293 | 2022-07-11T19:45:08.380 | 2021-01-06T01:04:03.107 | 63,550 | 720 | [
"python",
"unit-testing",
"parameterized-unit-test"
] |
32,903 | 2 | null | 32,282 | 1 | null | I am still a big [The Regulator](http://weblogs.asp.net/rosherove/pages/tools-and-frameworks-by-roy-osherove.aspx) fan.
There are some stability problems but these can be fixed by disableing the Intellisense. It gets mad with some expressions and typos in building an expression.
Would love it if [Roy Osherove](http:/... | null | CC BY-SA 2.5 | null | 2008-08-28T17:50:40.043 | 2008-08-28T17:50:40.043 | null | null | 2,818 | null |
32,898 | 2 | null | 11,986 | 2 | null | Jamis has just released 1.2.4, and the comment history on that bug suggests that the fix is in 1.2.3 and later versions. As a quick test, I did the following on an OS X 10.5 box with Ruby 1.8.6:
```
sudo gem install sqlite3-ruby
```
(verified version number of 1.2.4)
```
rails test
```
(used default `database.ym... | null | CC BY-SA 2.5 | null | 2008-08-28T17:48:16.883 | 2008-08-28T17:48:16.883 | null | null | 3,462 | null |
32,905 | 2 | null | 32,766 | 2 | null | Jared, you've hit it. Using "Convert to Web Application" to manually generate the designer file solves my problem. I'm glad you posted this before i started reinstalling. Thanks.
| null | CC BY-SA 2.5 | null | 2008-08-28T17:51:35.517 | 2008-08-28T17:51:35.517 | null | null | 3,460 | null |
32,904 | 2 | null | 32,875 | 1 | null | There was some discussion and testing done on www-style not too long ago:
[http://lists.w3.org/Archives/Public/www-style/2008Jul/0124.html](http://lists.w3.org/Archives/Public/www-style/2008Jul/0124.html)
[http://lists.w3.org/Archives/Public/www-style/2008Jul/att-0124/defaultstyles.htm](http://lists.w3.org/Archives/P... | null | CC BY-SA 2.5 | null | 2008-08-28T17:51:11.993 | 2008-08-28T17:51:11.993 | null | null | 1,697 | null |
32,893 | 2 | null | 32,845 | 0 | null | Take a look at the following link: [http://www.calumgrant.net/atomic/](http://www.calumgrant.net/atomic/)
The author described "Transactional Programming". This is analogous to the transactions in data bases.
Example:
Start transaction:
1. Step 1
2. Step 2
3. Encounter error during step 2
4. Roll back to before ... | null | CC BY-SA 2.5 | null | 2008-08-28T17:46:58.820 | 2008-08-28T17:46:58.820 | null | null | 3,467 | null |
32,911 | 2 | null | 32,570 | 0 | null | We use the free version of [ISAPI_Rewrite](http://www.isapirewrite.com/). It uses similar syntax to mod_rewrite, so if you're familiar with that you may have an easier time getting started.
There used to be a (syntax-compatible) port of mod_rewrite for IIS, but I can't find it now.
| null | CC BY-SA 2.5 | null | 2008-08-28T17:52:46.590 | 2008-08-28T17:52:46.590 | null | null | 1,806 | null |
32,914 | 1 | 32,936 | null | 3 | 4,892 | I'd like to render to svg data in a swf at runtime (not in Flex - not using degrafa) - how would I go about doing that?
| Is there a way to render svg data in a swf at runtime? | CC BY-SA 2.5 | 0 | 2008-08-28T17:54:10.957 | 2008-12-19T07:06:16.457 | null | null | 3,435 | [
"actionscript-3",
"flash",
"svg"
] |
32,913 | 2 | null | 32,282 | 3 | null | couple of eclipse plugins for those using eclipse,
[http://www.brosinski.com/regex/](http://www.brosinski.com/regex/)
[http://www.bastian-bergerhoff.com/eclipse/features/web/QuickREx/toc.html](http://www.bastian-bergerhoff.com/eclipse/features/web/QuickREx/toc.html)
| null | CC BY-SA 2.5 | null | 2008-08-28T17:53:45.323 | 2008-08-28T17:53:45.323 | null | null | 1,425 | null |
32,916 | 2 | null | 32,897 | 9 | null | Eclipse is correct. There is no interpretation context inside a comment (no escaping, etc). See [JLS §3.7](http://java.sun.com/docs/books/jls/second_edition/html/lexical.doc.html#48125).
| null | CC BY-SA 2.5 | null | 2008-08-28T17:54:34.947 | 2008-08-28T17:54:34.947 | null | null | 3,069 | null |
32,920 | 2 | null | 32,144 | 1 | null | @[Graeme](https://stackoverflow.com/users/1821/graeme): Thanks for helping me refine my question. My employer somehow has the impression that a Windows server is a second-class citizen on a NetWare network. Would installing the NetWare client on the Windows server make it easier for NetWare clients (with some form of W... | null | CC BY-SA 2.5 | null | 2008-08-28T17:56:19.390 | 2008-08-28T17:56:19.390 | 2020-06-20T09:12:55.060 | -1 | 470 | null |
32,906 | 2 | null | 32,505 | 1 | null | > In fact, IIRC, that's actually part of the 'official' spec for parsers.
Official does not need to be quoted :)
> fatal error[Definition:] An error which a conforming XML processor must detect and report to the application. After encountering a fatal error, the processor may continue processing the data to search for ... | null | CC BY-SA 2.5 | null | 2008-08-28T17:51:49.260 | 2008-08-28T17:51:49.260 | 2020-06-20T09:12:55.060 | -1 | 3,069 | null |
32,922 | 2 | null | 8,276 | 1 | null | Class::DBI is an [ORM (Object Relational Mapper)](http://en.wikipedia.org/wiki/Object-relational_mapping) for perl. Searching for "PHP ORM" on google gives some good results, including [Doctrin](http://www.doctrine-project.org/), which I've had good luck with. I'd start there and work your way up.
| null | CC BY-SA 2.5 | null | 2008-08-28T17:56:45.567 | 2008-08-28T17:56:45.567 | null | null | 3,421 | null |
32,929 | 2 | null | 32,814 | 2 | null | @jmein
Actually the problem is that the Validator client script's don't work when placed inside of an updatePanel (UpdatePanels refresh using .innerHTML, which adds the script nodes as text nodes, not script nodes, so the browser does not run them).
The fix was a patch released by microsoft that fixes this issue. I f... | null | CC BY-SA 2.5 | null | 2008-08-28T17:59:06.810 | 2008-08-28T17:59:06.810 | null | null | 1,965 | null |
32,927 | 2 | null | 32,897 | 0 | null | A simple test shows Eclipse is correct:
```
public class Test {
public static final void main(String[] args) throws Exception {
String s = "This is the original string.";
/* This is commented out.
s = "This is the end of a comment: */ ";
*/
System.out.println(s);
}
}
```
This fails to compile... | null | CC BY-SA 2.5 | null | 2008-08-28T17:58:06.187 | 2008-08-28T17:58:06.187 | null | null | 3,449 | null |
32,931 | 2 | null | 32,897 | 0 | null | I may be helpful to just do a "batch" multiline comment so that it comments each line with "//". It is Ctrl+"/" in Idea for commenting and uncommenting the selected lines, Eclipse should have a similar feature.
| null | CC BY-SA 2.5 | null | 2008-08-28T17:59:12.237 | 2008-08-28T17:59:12.237 | null | null | 578 | null |
32,861 | 2 | null | 15,774 | 4 | null | MaseBase, you can use [Web Deployment Projects](http://weblogs.asp.net/scottgu/archive/2005/11/06/429723.aspx) to build and package Web Sites. We do that all the time for projects with a web application aspect. After you assign a WDP to a Web Site, you can open up the file as plain-text XML file. At the end is a comme... | null | CC BY-SA 2.5 | null | 2008-08-28T17:26:24.737 | 2008-08-28T17:26:24.737 | null | null | 2,663 | null |
32,918 | 2 | null | 32,897 | 1 | null | Yes, I am commenting the code out just to do a quick test. I've already tested what I needed to by commenting the code out another way; I was just curious about what appears to be an odd misfeature of Java and/or Eclipse.
| null | CC BY-SA 2.5 | null | 2008-08-28T17:56:10.857 | 2008-08-28T17:56:10.857 | null | null | null | null |
32,907 | 2 | null | 32,280 | 3 | null | > In most programming languages there is no good way to deal with a null that is passed by a caller accidentally. Because this is the case, the rational approach is to forbid passing null by default.
I found ' `@Nullable` and `@NotNull` annotations approach for dealing with this the most ingenious, so far. It's IDE sp... | null | CC BY-SA 3.0 | null | 2008-08-28T17:51:58.263 | 2017-12-27T11:47:59.060 | 2017-12-27T11:47:59.060 | 3,798,217 | 2,718 | null |
32,933 | 2 | null | 32,845 | 1 | null | If you are developing an application for Vista you can use Transactional NTFS, which supports a similar feature to what you are looking for.
[http://en.wikipedia.org/wiki/Transactional_NTFS](http://en.wikipedia.org/wiki/Transactional_NTFS)
Wouldn't installer packages already include this type of rollback support, tho... | null | CC BY-SA 2.5 | null | 2008-08-28T18:00:02.937 | 2008-08-28T18:00:02.937 | null | null | 291 | null |
32,932 | 2 | null | 32,777 | 2 | null | [UnxUtils](http://unxutils.sourceforge.net/) isn't updated as often and isn't as complete as Cygwin but runs natively just like any other Windows command line utility.
[Cygwin](http://www.cygwin.com/) acts more like a Linux command line emulator. It does feel pretty clunky but it is easier to port utilities to it and... | null | CC BY-SA 2.5 | null | 2008-08-28T17:59:49.477 | 2008-08-28T17:59:49.477 | null | null | 3,478 | null |
32,867 | 2 | null | 32,744 | 5 | null | You might also be interested to know why the GMail to HotMail link uses SMTP, just like your Thunderbird client. In other words, since your client can send email via SMTP, and it can use DNS to get the MX record for hotmail.com, why doesn't it just send it there directly, skipping gmail.com altogether?
There are a coup... | null | CC BY-SA 4.0 | null | 2008-08-28T17:28:46.913 | 2021-03-06T16:15:35.623 | 2021-03-06T16:15:35.623 | 3,474 | 3,474 | null |
32,937 | 1 | 33,234 | null | 11 | 2,538 | In C# is there a shorthand way to write this:
```
public static bool IsAllowed(int userID)
{
return (userID == Personnel.JohnDoe || userID == Personnel.JaneDoe ...);
}
```
Like:
```
public static bool IsAllowed(int userID)
{
return (userID in Personnel.JohnDoe, Personnel.JaneDoe ...);
}
```
I know I could... | Shorthand conditional in C# similar to SQL 'in' keyword | CC BY-SA 2.5 | 0 | 2008-08-28T18:01:42.763 | 2012-07-04T19:21:49.620 | null | null | 1,302 | [
"c#",
"lambda",
"conditional-statements",
"if-statement"
] |
32,940 | 2 | null | 3,881 | -1 | null | If it's a "setter", or somewhere I'm getting a member to use later, I tend to use IllegalArgumentException.
If it's something I'm going to use (dereference) right now in the method, I throw a NullPointerException proactively. I like this better than letting the runtime do it, because I can provide a helpful message (s... | null | CC BY-SA 2.5 | null | 2008-08-28T18:03:19.793 | 2008-08-28T18:03:19.793 | null | null | 3,474 | null |
32,936 | 2 | null | 32,914 | 1 | null | The Ajaxian blog had a post about this today.
[http://ajaxian.com/archives/the-state-of-svg-browser-support-using-flash-for-svg-in-internet-explorer](http://ajaxian.com/archives/the-state-of-svg-browser-support-using-flash-for-svg-in-internet-explorer)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:00:42.873 | 2008-08-28T18:00:42.873 | null | null | 757 | null |
32,930 | 1 | 58,758 | null | 8 | 1,579 | I'd like to add dvd burning functionality to my .Net app (running on Windows Server 2003), are there any good components available? I've used the NeroCOM sdk that used to come with Nero but they no longer support the sdk in the latest versions of Nero. I learned that Microsoft has created an IMAPI2 upgrade for Window... | What is a good dvd burning component for Windows or .Net? | CC BY-SA 2.5 | 0 | 2008-08-28T17:59:11.567 | 2014-04-09T05:57:15.903 | 2012-05-03T21:57:22.287 | 680,565 | 327 | [
".net",
"windows",
"components",
"dvd"
] |
32,884 | 2 | null | 15,056 | 10 | null | This is my macro to close the solution, delete the intellisense file, and reopen the solution. Essential if you're working in native C++.
```
Sub UpdateIntellisense()
Dim solution As Solution = DTE.Solution
Dim filename As String = solution.FullName
Dim ncbFile As System.Text.StringBuilder = New System.Tex... | null | CC BY-SA 2.5 | null | 2008-08-28T17:41:12.390 | 2010-03-09T15:01:47.460 | 2010-03-09T15:01:47.460 | 15,369 | 887 | null |
32,941 | 1 | 344,461 | null | 1 | 508 | Is the Sql Server 2008 control available for download? Does it yet support the 2008 RDL schema?
| SQL Server 2008 Reporting Services Control | CC BY-SA 2.5 | null | 2008-08-28T18:03:36.097 | 2008-12-05T16:47:25.180 | null | null | 2,184 | [
"sql-server",
"reporting-services"
] |
32,949 | 2 | null | 5,307 | 0 | null | Someone I know created a component that extends controls with a lot of properties that give you a lot of control over how the form prints. It's worth a look.
[MCL PrintForm Helper Component](http://www.xtremevbtalk.com/showthread.php?t=279707)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:07:14.373 | 2008-08-28T18:07:14.373 | null | null | 2,547 | null |
32,909 | 2 | null | 32,777 | 3 | null | I use Cygwin, but I have used the [Berkley Utilities](http://www.openetwork.com/berk.html) in the past. They worked well enough, if you are used to DOS and you just want the commands. There are some alternatives listed at [TinyApps](http://www.tinyapps.org/system.html).
Maybe you could also consider running a command ... | null | CC BY-SA 2.5 | null | 2008-08-28T17:52:01.430 | 2008-08-28T17:52:01.430 | null | null | 3,471 | null |
32,942 | 2 | null | 32,937 | 2 | null | I would encapsulate the list of allowed IDs as not . Then it's source can be changed easily later on.
```
List<int> allowedIDs = ...;
public bool IsAllowed(int userID)
{
return allowedIDs.Contains(userID);
}
```
If using .NET 3.5, you can use `IEnumerable` instead of `List` thanks to extension methods.
(This ... | null | CC BY-SA 2.5 | null | 2008-08-28T18:03:48.123 | 2008-08-28T18:14:46.833 | 2017-05-23T10:32:50.733 | -1 | 338 | null |
32,939 | 2 | null | 32,899 | 277 | null | This is called "parametrization".
There are several tools that support this approach. E.g.:
- [pytest's decorator](https://docs.pytest.org/en/latest/parametrize.html)- [parameterized](https://github.com/wolever/parameterized)
The resulting code looks like this:
```
from parameterized import parameterized
class TestSeq... | null | CC BY-SA 4.0 | null | 2008-08-28T18:02:33.027 | 2021-02-05T16:18:38.200 | 2021-02-05T16:18:38.200 | 63,550 | 3,448 | null |
32,947 | 2 | null | 32,941 | 0 | null | The ReportViewer control should work just fine with SQL Server 2008.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:06:22.050 | 2008-08-28T18:06:22.050 | null | null | 2,374 | null |
32,965 | 2 | null | 32,282 | 0 | null | [RegExr](http://gskinner.com/RegExr/) for testing with the Actionscript 3 (whichever standard that may be)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:12:22.970 | 2008-08-28T18:12:22.970 | null | null | 914 | null |
32,973 | 2 | null | 32,964 | 4 | null | I don't think the biggest problem is just someone stealing your bandwidth, but what they do with it. It's one thing if someone uses my wireless network to browse the Internet. It's another thing if they use it for torrenting (I find that slows down the network) or any illegal activities (kiddy porn? not on my network y... | null | CC BY-SA 2.5 | null | 2008-08-28T18:13:23.997 | 2008-08-28T18:13:23.997 | null | null | 572 | null |
32,950 | 2 | null | 32,937 | 1 | null | Are permissions user-id based? If so, you may end up with a better solution by going to role based permissions. Or you may end up having to edit that method quite frequently to add additional users to the "allowed users" list.
For example,
enum UserRole {
User, Administrator, LordEmperor
}
```
clas... | null | CC BY-SA 2.5 | null | 2008-08-28T18:07:22.267 | 2008-08-28T18:07:22.267 | null | null | 3,460 | null |
32,978 | 2 | null | 32,964 | 3 | null | Yes you are, your wireless router also doubles as a firewall preventing harmful data from the Internet, by letting one of your virus-infected neighbors in on your wlan you're essentially letting him bypass that.
Now, this shouldn't be a problem in an ideal world since you'd have a well-configured system with a firewal... | null | CC BY-SA 2.5 | null | 2008-08-28T18:14:57.410 | 2008-08-28T18:14:57.410 | null | null | 2,114 | null |
32,959 | 2 | null | 26,816 | 10 | null | > However, if you are using unmanaged
resources in those threads, you may
end up in a lot of trouble.
That would rather depend how you were using them - if these unmanaged resources were properly wrapped then they'd be dealt with by their wrapper finalization regardless of the mechanism used to kill threads which ... | null | CC BY-SA 2.5 | null | 2008-08-28T18:10:40.790 | 2008-08-28T18:10:40.790 | null | null | 987 | null |
32,976 | 2 | null | 32,964 | 16 | null | Bruce Schneier is famous for running an open wireless network at home ([see here](http://www.schneier.com/blog/archives/2008/01/my_open_wireles.html)). He does it for two reasons:
1. To be neighborly (you'd let your neighbor borrow a cup of sugar, wouldn't you? Why not a few megabits?)
2. To keep away from the false ... | null | CC BY-SA 2.5 | null | 2008-08-28T18:14:48.473 | 2008-08-28T18:14:48.473 | null | null | 2,527 | null |
32,964 | 1 | 32,976 | null | 11 | 1,664 | Obviously there are security reasons to close a wireless network and it's not fun if someone is stealing your bandwidth. That would be a serious problem?
To address the first concern: Does a device on the same wireless network have any special privileges or access that an other device on the internet has?
Wireless n... | Should a wireless network be open? | CC BY-SA 3.0 | 0 | 2008-08-28T18:11:55.343 | 2015-12-23T05:00:47.540 | 2015-12-23T05:00:47.540 | 2,893,131 | 1,438 | [
"security",
"networking",
"wireless"
] |
32,944 | 2 | null | 32,937 | 4 | null | How about something like this:
```
public static bool IsAllowed(int userID) {
List<int> IDs = new List<string> { 1,2,3,4,5 };
return IDs.Contains(userID);
}
```
(You could of course change the static status, initialize the IDs class in some other place, use an IEnumerable<>, etc, based on your needs. The main po... | null | CC BY-SA 2.5 | null | 2008-08-28T18:04:36.377 | 2008-08-28T18:12:59.943 | 2008-08-28T18:12:59.943 | 51 | 51 | null |
32,984 | 2 | null | 32,941 | 1 | null | If you are talking about the ReportViewer control, it is [available](http://www.microsoft.com/downloads/details.aspx?FamilyID=cc96c246-61e5-4d9e-bb5f-416d75a1b9ef&DisplayLang=en).
However you need Windows XP, Windows Vista or Windows Server 2003 to install it. It is also written that .NET 3.5 is required, but I'm not ... | null | CC BY-SA 2.5 | null | 2008-08-28T18:15:57.377 | 2008-08-28T18:15:57.377 | null | null | 968 | null |
32,983 | 2 | null | 2,767 | 1 | null | I just found this rather large list of addins:
[http://geekswithblogs.net/brians/archive/2008/05/12/122087.aspx](https://web.archive.org/web/20210127112218/http://geekswithblogs.net/brians/archive/2008/05/12/122087.aspx)
| null | CC BY-SA 4.0 | null | 2008-08-28T18:15:55.817 | 2022-07-24T14:03:16.243 | 2022-07-24T14:03:16.243 | 4,751,173 | 2,786 | null |
32,982 | 2 | null | 32,897 | 2 | null | In Eclipse you can highlight the part of the source code you want to comment out and use the Ctrl+/ to single-line comment every line in the highlighted section - puts a "//" at the beginning of the lines.
Or if you really want to block-comment the selection use the Ctrl+Shift+/ combination. It will detect the block c... | null | CC BY-SA 2.5 | null | 2008-08-28T18:15:36.473 | 2008-08-28T18:15:36.473 | null | null | 3,087 | null |
32,987 | 2 | null | 32,964 | 2 | null | I feel it all has to due with population density. My parents own a big plot of land nearest neighbor is .5 mile away. To me it doesn't make sense to lock a wireless router down. But if I lived in a apartment complex that thing will be locked down and not broadcasting it's ID.
Now at my house I just don't broadcast ... | null | CC BY-SA 2.5 | null | 2008-08-28T18:17:02.477 | 2008-08-28T18:17:02.477 | null | null | 648 | null |
32,980 | 2 | null | 32,871 | 1 | null | I've never done it that way around but I think [swffit](http://swffit.millermedeiros.com/) might be able to pull it off.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:15:32.527 | 2008-08-28T18:15:32.527 | null | null | 914 | null |
32,985 | 2 | null | 32,964 | 1 | null | For most people, the wireless access point is a router that is acting as a hardware firewall to external traffic. If someone's not on your wireless network, the only way they'll get to a service running on your machine is if the router is configured to forward requests. Once a device is behind the router, you're rely... | null | CC BY-SA 2.5 | null | 2008-08-28T18:16:18.157 | 2008-08-28T18:16:18.157 | null | null | 2,547 | null |
32,966 | 1 | null | null | 3 | 930 | I'm using Ruby on Rails for an internal site. Different users of the site have access to a wide variety of data and highly disparate perspectives of the data. Within those different classes of users, there needs to be levels of access. Within the levels of access I need to be able to add features from other classes of ... | How to program user preferences | CC BY-SA 2.5 | null | 2008-08-28T18:12:38.337 | 2008-10-11T00:03:02.503 | 2008-08-28T18:23:00.497 | 757 | 757 | [
"ruby-on-rails",
"ruby",
"user-controls",
"user-interface"
] |
32,986 | 1 | 33,256 | null | 19 | 7,007 | I know that if you have a loop that modifies the count of the items in the loop, using the NSEnumerator on a set is the best way to make sure your code blows up, however I would like to understand the performance tradeoffs between the NSEnumerator class and just an old school for loop
| NSEnumerator performance vs for loop in Cocoa | CC BY-SA 2.5 | 0 | 2008-08-28T18:16:54.443 | 2015-06-08T22:53:03.013 | 2008-11-10T16:12:45.377 | 21,755 | 3,484 | [
"objective-c",
"cocoa",
"nsenumerator"
] |
32,992 | 2 | null | 32,964 | 0 | null | @kronoz: I guess it depends on where you live. Only two houses are within reach of my wireless network, excluding my own. So I doubt that small number of people can affect my bandwidth. But if you live in a major metro area, and many people are able to see and get on the network, yeah, it might become a problem.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:18:54.873 | 2008-08-28T18:18:54.873 | null | null | 572 | null |
32,988 | 2 | null | 32,964 | 2 | null | I would actually disagree with Thomas in the sense that I think bandwidth the biggest problem, as it's unlikely there are many dodgy people in your area who just so happen to connect to your network to misbehave. It's more likely I think that you'll have chancers, or even users who don't fully understand wireless, con... | null | CC BY-SA 2.5 | null | 2008-08-28T18:17:05.517 | 2008-08-28T18:17:05.517 | null | null | 3,394 | null |
32,997 | 2 | null | 32,991 | 0 | null | I can't answer the main question, but do keep in mind that Windows, by default, is always sharing the roots of your drives. Try:
```
\\yourmachine\c$
```
(And then try not to freak out.)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:20:26.180 | 2008-08-28T18:20:26.180 | null | null | 338 | null |
32,991 | 1 | null | null | 2 | 202 | The leaving your wireless network open question reminded me of this.
I typically share the root drive on my machines across my network, and tie login authorization to the machines NT ID, so there is at least some form of protection.
My question, how easy is it to gain access to these drives for ill good? Is the autho... | Leaving your harddrive shared | CC BY-SA 2.5 | null | 2008-08-28T18:18:29.417 | 2008-09-18T10:01:20.620 | 2008-08-28T18:26:51.517 | 1,414 | 1,965 | [
"windows",
"security",
"networking",
"sysadmin"
] |
32,998 | 2 | null | 32,964 | 1 | null | Following joshhinman comment, this is a link to an article where he explains why he has chosen to leave his wireless network setup open.[Schneier on Open Wireless](http://www.schneier.com/blog/archives/2008/01/my_open_wireles.html)
This guy is probably the most famous security expert at the moment, so it worths having... | null | CC BY-SA 2.5 | null | 2008-08-28T18:22:20.560 | 2008-08-28T18:22:20.560 | null | null | 2,697 | null |
32,995 | 2 | null | 32,845 | 4 | null | > Is it "taboo" to programatically create system restore points?
No. That's why the API is there; so that you can have pseudo-atomic updates of the system.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:19:49.850 | 2008-08-28T18:19:49.850 | null | null | 2,131 | null |
32,989 | 2 | null | 32,845 | 4 | null | Whether it's a good idea or not really depends on how much you're doing. A full system restore point is weighty - it takes time to create, disk space to store, and gets added to the interface of restore points, possibly pushing earlier restore points out of storage.
So, if your update is really only changing applicat... | null | CC BY-SA 2.5 | null | 2008-08-28T18:18:13.877 | 2008-08-28T18:18:13.877 | null | null | 1,200 | null |
33,000 | 2 | null | 32,964 | 1 | null | As far as the security aspect goes it is a non issue. An open network can allow a determined person to 'listen' to all your unencrypted communication. This will include emails - probably forum posts - things like this. These things should never EVER be considered secure in the first place unless you are applying your o... | null | CC BY-SA 2.5 | null | 2008-08-28T18:22:39.687 | 2008-08-28T18:22:39.687 | null | null | 3,022 | null |
33,012 | 2 | null | 32,964 | 0 | null | It is so easy to lock a wireless router down now, that I think a better question is why lock it down?
The only reason I can think of is if you had a yard large enough so that your neighbors can't get a signal you frequently have visitors bringing devices into your home (since setting them up can be a chore).
Note t... | null | CC BY-SA 2.5 | null | 2008-08-28T18:26:58.943 | 2008-08-28T18:26:58.943 | null | null | 672 | null |
33,008 | 2 | null | 32,790 | 32 | null | The use of `System.exit` is frowned upon when the 'application' is really a sub-application (e.g. servlet, applet) of a larger Java application (server): in this case the `System.exit` could stop the JVM and hence also all other sub-applications. In this situation, throwing an appropriate exception, which could be caug... | null | CC BY-SA 3.0 | null | 2008-08-28T18:25:27.760 | 2016-11-22T08:37:44.057 | 2016-11-22T08:37:44.057 | 1,672,920 | 3,477 | null |
33,016 | 2 | null | 32,964 | 0 | null | > Personally, I would never run an open wireless network for one reason: accountability. If someone does something illegal on my network, I don't want to be held accountable.> The flip side of this is deniability. If the government or RIAA come knocking on your door about something done from your IP address you can alw... | null | CC BY-SA 2.5 | null | 2008-08-28T18:28:36.443 | 2008-08-28T18:28:36.443 | 2020-06-20T09:12:55.060 | -1 | 572 | null |
33,005 | 2 | null | 32,964 | 1 | null | > Personally, I would never run an open wireless network for one reason: accountability. If someone does something illegal on my network, I don't want to be held accountable.
The flip side of this is deniability. If the government or RIAA come knocking on your door about something done from your IP address you can al... | null | CC BY-SA 2.5 | null | 2008-08-28T18:25:10.460 | 2008-08-28T18:25:10.460 | null | null | 2,600 | null |
33,019 | 2 | null | 32,871 | 0 | null | I halfway looked at swffit but the height (and width sometimes but mainly height) would be dynamic - swffit let's you declare a maxHeight but that number would be constantly changing...maybe I could figure out how to set it dynamically. A great place for me to start though - thanks!
| null | CC BY-SA 2.5 | null | 2008-08-28T18:29:22.337 | 2008-08-28T18:29:22.337 | null | null | 3,435 | null |
33,014 | 2 | null | 32,937 | 0 | null | A nice little trick is to sort of reverse the way you usually use .Contains(), like:-
```
public static bool IsAllowed(int userID) {
return new int[] { Personnel.JaneDoe, Personnel.JohnDoe }.Contains(userID);
}
```
Where you can put as many entries in the array as you like.
If the Personnel.x is an enum you'd hav... | null | CC BY-SA 2.5 | null | 2008-08-28T18:27:50.547 | 2008-08-28T18:27:50.547 | null | null | 3,394 | null |
33,015 | 2 | null | 32,937 | 0 | null | Here's the closest that I can think of:
```
using System.Linq;
public static bool IsAllowed(int userID)
{
return new Personnel[]
{ Personnel.JohnDoe, Personnel.JaneDoe }.Contains((Personnel)userID);
}
```
| null | CC BY-SA 2.5 | null | 2008-08-28T18:28:21.810 | 2008-08-28T18:28:21.810 | null | null | null | null |
33,020 | 2 | null | 32,991 | 1 | null | If this is a home network with no wifi or secured wifi, it's probably not an issue. Your isp will almost certainly prevent anyone from trying anything via the larger web.
If you have open wifi, then there's a little more cause for concern. If it's properly secured so that some authentication is required, you're prob... | null | CC BY-SA 2.5 | null | 2008-08-28T18:30:17.047 | 2008-08-28T18:30:17.047 | null | null | 3,043 | null |
33,024 | 2 | null | 32,937 | 0 | null | Can you write an iterator for Personnel.
```
public static bool IsAllowed(int userID)
{
return (Personnel.Contains(userID))
}
public bool Contains(int userID) : extends Personnel (i think that is how it is written)
{
foreach (int id in Personnel)
if (id == userid)
return true;
return f... | null | CC BY-SA 2.5 | null | 2008-08-28T18:32:29.960 | 2008-08-28T18:32:29.960 | null | null | 3,135 | null |
33,027 | 2 | null | 23,755 | 2 | null | Easy: Burn the haystack! Afterward, only the needle will remain. Also, you could try magnets.
A harder question: How do you find one particular needle in a pool of needles?
Answer: thread each one and attach the other end of each strand of thread to a sorted index (i.e. pointers)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:35:10.013 | 2008-08-28T18:35:10.013 | null | null | 2,774 | null |
33,026 | 2 | null | 32,814 | 3 | null | > @Jonathan Holland: What is wrong with using Validators.dll?
Since they replace the original classes, you are quietly bypassing any bug and security fixes, enhancements, etc. that Microsoft might release in the future (or might have already released). Unless you look carefully at the web.config, you might never noti... | null | CC BY-SA 2.5 | null | 2008-08-28T18:34:41.280 | 2008-08-28T18:41:43.290 | 2008-08-28T18:41:43.290 | 2,230 | 2,230 | null |
33,029 | 2 | null | 32,871 | 0 | null | What I've mostly been using if for is to limit how small you can make a "fullbrowser" flash, and for that it works great.
Happy hacking!
(and don't forget to post your findings here, I might need that too soon ;))
| null | CC BY-SA 2.5 | null | 2008-08-28T18:36:06.347 | 2008-08-28T18:36:06.347 | null | null | 914 | null |
33,033 | 2 | null | 22,873 | 8 | null | For I suggest [Accelerated C++](https://rads.stackoverflow.com/amzn/click/com/020170353X) by Koenig and Moo as a beginning text, though I don't know how it would be for an absolute novice. It focuses on using the STL right away, which makes getting things done easier.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:36:54.410 | 2008-08-28T18:36:54.410 | null | null | 1,121,861 | null |
33,007 | 2 | null | 32,790 | 10 | null | I agree with the "" crowd. One reason is that calling System.exit makes your code difficult to use if you want other code to be able to use it. For example, if you find out that your class would be useful from a web app, or some kind of message consuming app, it would be nice to allow those containers the opportunity t... | null | CC BY-SA 3.0 | null | 2008-08-28T18:25:11.770 | 2016-07-22T10:51:28.313 | 2016-07-22T10:51:28.313 | 6,042,824 | 3,449 | null |
33,034 | 1 | 33,059 | null | 24 | 12,617 | As many of you probably know, online banks nowadays have a security system whereby you are asked some personal questions before you even enter your password. Once you have answered them, you can choose for the bank to "remember this computer" so that in the future you can login by only entering your password.
How doe... | How do banks remember "your computer"? | CC BY-SA 2.5 | 0 | 2008-08-28T18:37:07.513 | 2015-12-03T19:46:25.873 | null | null | 3,508 | [
"https",
"onlinebanking",
"sessiontracking"
] |
33,023 | 2 | null | 5,916 | 0 | null | Using regions (or otherwise folding code) have nothing to do with code smells (or hiding them) or any other idea of hiding code you don't want people to "easily" see.
Regions and code folding is really all about providing a way to easily group sections of code that can be collapsed/folded/hidden to minimize the amoun... | null | CC BY-SA 2.5 | null | 2008-08-28T18:32:08.010 | 2008-08-28T18:32:08.010 | null | null | 1,559 | null |
33,036 | 2 | null | 32,541 | 65 | null | The simplest way that I've done it is to use a XamlWriter to save the WPF object as a string. The Save method will serialize the object and all of its children in the logical tree. Now you can create a new object and load it with a XamlReader.
ex:
Write the object to xaml (let's say the object was a Grid control):
``... | null | CC BY-SA 2.5 | null | 2008-08-28T18:38:06.887 | 2008-08-28T18:38:06.887 | null | null | 1,133 | null |
33,028 | 2 | null | 18,524 | 4 | null | To the people concerned about "boxing" in jsight's answer: there is none. `String.valueOf(Object)` is used here, and no unboxing to `int` is ever performed.
Whether you use `Integer.toString()` or `String.valueOf(Object)` depends on how you want to handle possible nulls. Do you want to throw an exception (probably), o... | null | CC BY-SA 2.5 | null | 2008-08-28T18:35:49.467 | 2008-08-28T18:35:49.467 | null | null | 3,474 | null |
33,031 | 2 | null | 7,642 | 3 | null | The design guidelines that you linked specifically state that they only apply to static public and protected fields. The design guidelines mostly focus on designing public APIs; what you do with your private members is up to you. I'm not positive but I'm relatively confident that private members are not considered wh... | null | CC BY-SA 2.5 | null | 2008-08-28T18:36:15.347 | 2008-08-28T18:36:15.347 | null | null | 2,547 | null |
33,040 | 2 | null | 33,034 | -1 | null | MAC address is possible.
IP to physical location mapping is also a possibility.
User agents and other HTTP headers are quiet unique to each of the machines too.
I'm thinking about those websites that prevents you from using an accelerating download managers. There must be a way.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:39:49.660 | 2008-08-28T18:39:49.660 | null | null | 3,055 | null |
33,041 | 2 | null | 31,446 | 17 | null | Unfortunately, there's no way to disconnect one object from the entity manager in the current JPA implementation, AFAIR.
EntityManager.clear() will disconnect the JPA objects, so that might not be an appropriate solution in all the cases, if you have other objects you do plan to keep connected.
So your best bet woul... | null | CC BY-SA 2.5 | null | 2008-08-28T18:39:55.213 | 2008-08-28T18:39:55.213 | null | null | 2,718 | null |
33,043 | 2 | null | 31,320 | 9 | null | There's a Railscast on profiling that's well worth watching
[http://railscasts.com/episodes/98-request-profiling](http://railscasts.com/episodes/98-request-profiling)
| null | CC BY-SA 2.5 | null | 2008-08-28T18:40:04.153 | 2008-08-28T18:40:04.153 | null | null | 3,162 | null |
33,045 | 2 | null | 33,034 | 0 | null | Are you using a laptop? Does it remember you, after you delete your cookies, if you access from a different WiFi network? If so, IP/physical location mapping is highly unlikely.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:41:06.380 | 2008-08-28T18:41:06.380 | null | null | 1,344 | null |
33,046 | 2 | null | 33,034 | 1 | null | I think it depends on the bank. My bank does use a cookie since I lose it when I wipe cookies.
| null | CC BY-SA 3.0 | null | 2008-08-28T18:41:16.757 | 2015-12-03T19:46:25.873 | 2015-12-03T19:46:25.873 | 3,393,505 | 1,358 | null |
33,038 | 2 | null | 33,034 | 1 | null | It could be a combination of cookies, and ip address logging.
Edit: I have just checked my bank and cleared the cookies. Now I have to re-enter all of my info.
| null | CC BY-SA 3.0 | null | 2008-08-28T18:38:51.177 | 2013-12-15T20:37:29.017 | 2013-12-15T20:37:29.017 | 1,783,163 | 2,083 | null |
33,018 | 2 | null | 32,937 | 0 | null | Just another syntax idea:
```
return new [] { Personnel.JohnDoe, Personnel.JaneDoe }.Contains(userID);
```
| null | CC BY-SA 3.0 | null | 2008-08-28T18:29:17.347 | 2012-07-04T19:21:49.620 | 2012-07-04T19:21:49.620 | 1,001,985 | 3,142 | null |
33,049 | 2 | null | 33,034 | 1 | null | It is possible for flash files to store a small amount of data on your computer. It's also possible that the bank uses that approach to "remember" your computer, but it's risky to rely on users having (and not having disabled) flash.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:41:24.180 | 2008-08-28T18:41:24.180 | null | null | 658 | null |
33,048 | 1 | 130,114 | null | 37 | 13,029 | Suppose you have an ActiveRecord::Observer in one of your Ruby on Rails applications - how do you test this observer with rSpec?
| How would you test observers with rSpec in a Ruby on Rails application? | CC BY-SA 2.5 | 0 | 2008-08-28T18:41:21.920 | 2015-08-27T20:10:38.550 | 2015-08-27T20:10:38.550 | 2,569 | 2,569 | [
"ruby-on-rails",
"ruby",
"activerecord",
"rspec",
"observer-pattern"
] |
32,996 | 2 | null | 32,814 | 21 | null | I suspect you are running the original release (RTM) of .NET 2.0.
Until early 2007 validator controls were not compatible with UpdatePanels. This was resolved with the SP1 of the .NET Framework.
The source of the problem is that UpdatePanel can detect markup changes in your page, but it has no way to track scripts co... | null | CC BY-SA 2.5 | null | 2008-08-28T18:20:00.923 | 2008-08-28T18:44:36.683 | 2008-08-28T18:44:36.683 | 2,230 | 2,230 | null |
33,055 | 1 | 33,064 | null | 196 | 144,604 | What methods are available for backing up repositories in a Windows environment?
| SVN repository backup strategies | CC BY-SA 4.0 | 0 | 2008-08-28T18:43:59.480 | 2022-12-29T03:07:34.710 | 2022-12-29T03:07:34.710 | 11,107,541 | 3,396 | [
"windows",
"svn",
"backup"
] |
33,053 | 2 | null | 33,034 | 1 | null | My bank's site makes me re-authenticate every time a new version of Firefox is out, so there's definitely a user-agent string component in some.
| null | CC BY-SA 2.5 | null | 2008-08-28T18:43:36.453 | 2008-08-28T18:43:36.453 | null | null | 1,902,010 | null |