topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Wednesday November 12, 2025, 4:26 am
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 145next
426
Home

Just wanted to join in?  ;D

**Edit:** I have no idea wtf happened with that quote
427
Living Room / Java Forever (This is fantastic!)
« Last post by KynloStephen66515 on April 24, 2018, 03:22 PM »
428
Python. Client side.
Skulpt is an entirely in-browser implementation of Python.

No preprocessing, plugins, or server-side support required, just write Python and reload.

Demo
The code is run entirely in your browser, so don't feel obligated to "crash the server", you'll only stub your toe. Help, or examples: 1 2 3 4 5 6 7 8. Ctrl-Enter to run.

Sexy Sauce: http://www.skulpt.org
GIT Sauce: https://github.com/skulpt/
429
Now, if I only knew what CMS means.....???
Content management systemw

EDIT// Oops, I missed that there was another page in this thread :-[ :D

I think everybody did the same  ;D
430
Developer's Corner / x86 Assembly Guide
« Last post by KynloStephen66515 on April 24, 2018, 02:37 PM »
This is a version adapted by Quentin Carbonneaux from David Evans' original document. The syntax was changed from Intel to AT&T, the standard syntax on UNIX systems, and the HTML code was purified.

This guide describes the basics of 32-bit x86 assembly language programming, covering a small but useful subset of the available instructions and assembler directives. There are several different assembly languages for generating x86 machine code. The one we will use in CS421 is the GNU Assembler (gas) assembler. We will uses the standard AT&T syntax for writing x86 assembly code.

The full x86 instruction set is large and complex (Intel's x86 instruction set manuals comprise over 2900 pages), and we do not cover it all in this guide. For example, there is a 16-bit subset of the x86 instruction set. Using the 16-bit programming model can be quite complex. It has a segmented memory model, more restrictions on register usage, and so on. In this guide, we will limit our attention to more modern aspects of x86 programming, and delve into the instruction set only in enough detail to get a basic feel for x86 programming.

Registers
Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).



Hot Sauce: http://flint.cs.yale...ers/x86-asm/asm.html
431
Now, if I only knew what CMS means.....???


Content management system
432
Official Announcements / Re: DonationCoder 2018 Fundraiser
« Last post by KynloStephen66515 on April 24, 2018, 10:12 AM »
Go go thermometer, $2,000 above our first goal!
[ Invalid Attachment ]

Well then...That jumped quite a lot overnight! haha
433
Living Room / Re: grab urls
« Last post by KynloStephen66515 on April 24, 2018, 10:09 AM »
I downloaded from your link and Windows Defender immediately flagged it with the same results you got, Stephen.

https://www.microsof...;threatid=2147726780

EDIT: Something is really fishy about the site. The download links redirect you to all sorts of places before finally ending up on Mega. And supposedly JDownloader is Open Source but I couldn't find the source code.

Yeah that's what struck me as odd - The CDN redirect didn't concern me that much but then being bounced around until finally landing on mega (why use a CDN if you're just gonna host your download elsewhere?) - The download was flagged and stopped by Chrome by Windows Defender (images above).

The whole thing just strikes me as very very odd indeed.

Note: In case the developer of JDownloader pops by and reads this, I'm not suggesting that the software IS bad/malware, I'm simply pointing out that it FEELS that way (again, the report from Defender could certainly be a false positive, and it wouldn't be the first time that has happened).
434
Living Room / Re: grab urls
« Last post by KynloStephen66515 on April 23, 2018, 11:07 PM »
It scans through the url doesn't it?

I clicked the link and it just seems to be scanning Mega as a page, rather than the download - I could be wrong but that's how it looks.  I kinda wanna download the file again and let it through, then upload it to be scanned after...but then again, I don't want my computer to implode...sooooooooooooooo.......I won't do it haha...it's not worth setting up a secure environment to do it...I'm really not THAT bothered, just slightly curious seeing as 4wd has recommended it above.
435
Living Room / Re: grab urls
« Last post by KynloStephen66515 on April 23, 2018, 10:35 PM »
The URL was not detected by virustotal...

https://www.virustot...7d43e36f5d/detection

That just seems to have scanned the Mega.nz website rather than the RAR that came from there.
436
Developer's Corner / Re: Ludum Dare 41: April 20th-23rd, 2018
« Last post by KynloStephen66515 on April 23, 2018, 10:03 PM »
Can confirm the game is very fun!  Also wish I had made something so I could rate it on LD haha.
437
Living Room / Re: grab urls
« Last post by KynloStephen66515 on April 23, 2018, 09:56 PM »
I just downloaded JDownloader and it instantly got killed by my system with a "Severe" threat level, because of: Trojan:Win32/Occamy.C

I was only doing this so I could poke through the installation and have a looksie what's going on but now I'm curious if this is a FP or otherwise?  I got the download from http://jdownloader.org/download/index which redirected me to a mega.nz link in order to download "Install JDownloader.rar".

**edit**

I've googled to check if anybody else has had this show up with JDownloader and found nothing...which has me even more curious now.

jdown.png
jdown2.png
438
Welcome to PyBrain
PyBrain is a modular Machine Learning Library for Python. Its goal is to offer flexible, easy-to-use yet still powerful algorithms for Machine Learning Tasks and a variety of predefined environments to test and compare your algorithms.

PyBrain is short for Python-Based Reinforcement Learning, Artificial Intelligence and Neural Network Library. In fact, we came up with the name first and later reverse-engineered this quite descriptive "Backronym".

How is PyBrain different?
While there are a few machine learning libraries out there, PyBrain aims to be a very easy-to-use modular library that can be used by entry-level students but still offers the flexibility and algorithms for state-of-the-art research. We are constantly working on more and faster algorithms, developing new environments and improving usability.
What PyBrain can do
PyBrain, as its written-out name already suggests, contains algorithms for neural networks, for reinforcement learning (and the combination of the two), for unsupervised learning, and evolution. Since most of the current problems deal with continuous state and action spaces, function approximators (like neural networks) must be used to cope with the large dimensionality. Our library is built around neural networks in the kernel and all of the training methods accept a neural network as the to-be-trained instance. This makes PyBrain a powerful tool for real-life tasks.
Using PyBrain
PyBrain is open source and free to use for everyone (it is licensed under the BSD Software Licence). Just download it and start using the algorithms and modules in your own project or have a look at the provided tutorials and examples. If you use PyBrain for your research, we kindly ask you to cite us in your publications. Use the reference below or import this bibtex reference.

Pickle Sauce: http://pybrain.org
439
Developer's Corner / [Mini-Course] Instant Python
« Last post by KynloStephen66515 on April 21, 2018, 08:06 PM »
This is a minimal crash-course in the programming language Python. To learn more, take a look at the documentation at the Python web site, www.python.org; especially the tutorial. If you wonder why you should be interested, check out the comparison page where Python is compared to other languages.

This introduction has been translated into several languages, among them Portuguese, Italian, Spanish, Russian, French, Lithuanian, Japanese, German and Greek, and is currently being translated into Norwegian, Polish, and Korean. Since this document still might undergo changes, these translations may not always be up to date.

Note: To get the examples working properly, write the programs in a text file and then run that with the interpreter; do not try to run them directly in the interactive interpreter - not all of them will work. (Please do not ask me for details on this! I get swamped with emails on the subject… Check the documentation, or send an email to [email protected]).

The Basics
To begin with, think of Python as pseudo-code. It’s almost true. Variables don’t have types, so you don’t have to declare them. They appear when you assign to them, and disappear when you don’t use them anymore. Assignment is done by the = operator. Equality is tested by the == operator. You can assign several variables at once:

x,y,z = 1,2,3

first, second = second, first

a = b = 123
Blocks are indicated through indentation, and only through indentation. (No BEGIN/END or braces.) Some common control structures are:

if x < 5 or (x > 10 and x < 20):
    print "The value is OK."

if x < 5 or 10 < x < 20:
    print "The value is OK."

for i in [1,2,3,4,5]:
    print "This is iteration number", i

x = 10
while x >= 0:
    print "x is still not negative."
    x = x-1
The first two examples are equivalent.

The index variable given in the for loop iterates through the elements of a list (written as in the example). To make an “ordinary” for loop (that is, a counting loop), use the built-in function range().

# Print out the values from 0 to 99 inclusive.
for value in range(100):
    print value
(The line beginning with “#” is a comment, and is ignored by the interpreter.)

Okay; now you know enough to (in theory) implement any algorithm in Python. Let’s add some basic user interaction. To get input from the user (from a text prompt), use the builtin function input.

x = input("Please enter a number: ")
print "The square of that number is", x*x
The input function displays the prompt given (which may be empty) and lets the user enter any valid Python value. In this case we were expecting a number — if something else (like a string) is entered, the program would crash. To avoid that we would need some error checking. I won’t go into that here; suffice it to say that if you want the user input stored verbatim as a string (so that anything can be entered), use the function raw_input instead. If you wanted to convert the input string s to an integer, you could then use int(s).

Note: If you want to input a string with input, the user has to write the quotes explicitly. In Python, strings can be enclosed in either single or double quotes.

So, we have control structures, input and output covered — now we need some snazzy data structures. The most important ones are lists and dictionaries. Lists are written with brackets, and can (naturally) be nested:

Chilli Sauce: http://hetland.org/w.../instant-python.html
440
Developer's Corner / Basic Excel Skills
« Last post by KynloStephen66515 on April 21, 2018, 08:04 PM »
BASIC EXCEL SKILLS
Now a days, any job requires basic Excel skills. These basic Excel skills are – familiarity with Excel ribbons & UI, ability to enter and format data, calculate totals & summaries thru formulas, highlight data that meets certain conditions, creating simple reports & charts, understanding the importance of keyboard shortcuts & productivity tricks. Based on my experience of training more than 5,000 students in various online & physical training programs, the following 6 areas form the core of basic Excel skills.
GETTING STARTED
Excel is a massive application with 1000s of features and 100s of ribbon (menu) commands. It is very easy to get lost once you open Excel. So one of the basic survival skills is to understand how to navigate Excel and access the features you are looking for.





Marinara Sauce: http://chandoo.org/wp/excel-basics
441
Developer's Corner / The Scala Programming Language
« Last post by KynloStephen66515 on April 21, 2018, 07:58 PM »
Scala combines object-oriented and functional programming in one concise, high-level language. Scala's static types help avoid bugs in complex applications, and its JVM and JavaScript runtimes let you build high-performance systems with easy access to huge ecosystems of libraries.

Sweet Sauce: http://www.scala-lang.org
442
Developer's Corner / Full Stack Python [Tutorial]
« Last post by KynloStephen66515 on April 21, 2018, 07:51 PM »
Introduction
You're knee deep in learning the Python programming language. The syntax is starting to make sense. The first few "ahh-ha!" moments hit you as you learning conditional statements, for loops and classes while playing around with the open source libraries that make Python such an amazing language.

Now you want to take your initial Python knowledge and make something real, like an application that's available on the web that you can show off or sell as a service to other people. That's where Full Stack Python comes in. You've come to the right place to learn everything you need to create, deploy and operate production Python web applications.

This guide branches out on topic because your learning requirements depend on what you're working on. Select one of the buttons below or check out the full table of contents.

Tomato Sauce: http://www.fullstackpython.com
443
Developer's Corner / Free Computer Science Ebooks and Resources
« Last post by KynloStephen66515 on April 21, 2018, 07:49 PM »
C & C++   Calvert, Charlie: Borland C++ Builder 4 Unleashed (Sams Publishing)  |  mirror  |  mirror
Chapman, Davis: Visual C++ 6 in 21 Tagen. Markt&Technik
Eckel, Bruce: Thinking in C++ (1.6 MB)  |  at amazon.com
Heller, Steve: Optimizing C++. Prentice-Hall 1999
Kernighan, Brian W.; Dennis M. Ritchie: The C Programming Language. Prentice-Hall 1988  |  mirror  |  mirror
Oualline, Steve: C Elements of Style (M & T)
Williams, Mickey: Sams Teach Yourself Visual C++ 5 in 24 Hours

(there are wayyyy more than this)

Sauce: http://mic-ro.com/informatik/ebooks.html
444
If you look at the disassembly of functions inside Windows DLLs, you'll find that they begin with the seemingly pointless instruction MOV EDI, EDI. This instruction copies a register to itself and updates no flags; it is completely meaningless. So why is it there?

It's a hot-patch point.

The MOV EDI, EDI instruction is a two-byte NOP, which is just enough space to patch in a jump instruction so that the function can be updated on the fly. The intention is that the MOV EDI, EDI instruction will be replaced with a two-byte JMP $-5 instruction to redirect control to five bytes of patch space that comes immediately before the start of the function. Five bytes is enough for a full jump instruction, which can send control to the replacement function installed somewhere else in the address space.

Although the five bytes of patch space before the start of the function consists of five one-byte NOP instructions, the function entry point uses a single two-byte NOP.

Why not use Detours to hot-patch the function, then you don't need any patch space at all.

The problem with Detouring a function during live execution is that you can never be sure that at the moment you are patching in the Detour, another thread isn't in the middle of executing an instruction that overlaps the first five bytes of the function. (And you have to alter the code generation so that no instruction starting at offsets 1 through 4 of the function is ever the target of a jump.) You could work around this by suspending all the threads while you're patching, but that still won't stop somebody from doing a CreateRemoteThread after you thought you had successfully suspended all the threads.

Why not just use two NOP instructions at the entry point?

Sauce: https://blogs.msdn.m...newthing/20110921-00
445
Developer's Corner / Guide To GIT (Git Magic)
« Last post by KynloStephen66515 on April 21, 2018, 07:43 PM »
No idea when this was written, or if it's still relevant, but I'm on StumbleUpon (Bored out of my mind) and it came up, so I figured it was worth posting:

www-cs-students.stanford.edu/~blynn/gitmagic

Preface
Git is a version control Swiss army knife. A reliable versatile multipurpose revision control tool whose extraordinary flexibility makes it tricky to learn, let alone master.

As Arthur C. Clarke observed, any sufficiently advanced technology is indistinguishable from magic. This is a great way to approach Git: newbies can ignore its inner workings and view Git as a gizmo that can amaze friends and infuriate enemies with its wondrous abilities.

Rather than go into details, we provide rough instructions for particular effects. After repeated use, gradually you will understand how each trick works, and how to tailor the recipes for your needs.

Translations

Simplified Chinese: by JunJie, Meng and JiangWei. Converted to Traditional Chinese via cconv -f UTF8-CN -t UTF8-TW.
French: by Alexandre Garel, Paul Gaborit, and Nicolas Deram. Also hosted at itaapy.
German: by Benjamin Bellee and Armin Stebich; also hosted on Armin’s website.
Italian: by Mattia Rigotti.
Korean: by Jung-Ho (John) Han; also hosted on John’s website.
Polish: by Damian Michna.
Brazilian Portuguese: by José Inácio Serafini and Leonardo Siqueira Rodrigues.
Russian: by Tikhon Tarnavsky, Mikhail Dymskov, and others.
Spanish: by Rodrigo Toledo and Ariset Llerena Tapia.
Ukrainian: by Volodymyr Bodenchuk.
Vietnamese: by Trần Ngọc Quân; also hosted on his website.
Other Editions

Single webpage: barebones HTML, with no CSS.
PDF file: printer-friendly.
EPUB file: E-reader-friendly.
Debian package, Ubuntu package: get a fast and local copy of this site. Handy when this server is offline.
Physical book [Amazon.com]: 64 pages, 15.24cm x 22.86cm, black and white. Handy when there is no electricity.
Thanks!
I’m humbled that so many people have worked on translations of these pages. I greatly appreciate having a wider audience because of the efforts of those named above.

Dustin Sallings, Alberto Bertogli, James Cameron, Douglas Livingstone, Michael Budde, Richard Albury, Tarmigan, Derek Mahar, Frode Aannevik, Keith Rarick, Andy Somerville, Ralf Recker, Øyvind A. Holm, Miklos Vajna, Sébastien Hinderer, Thomas Miedema, Joe Malin, Tyler Breisacher, Sonia Hamilton, Julian Haagsma, Romain Lespinasse, Sergey Litvinov, Oliver Ferrigni, David Toca, Сергей Сергеев, Joël Thieffry, and Baiju Muthukadan contributed corrections and improvements.

François Marier maintains the Debian package originally created by Daniel Baumann.

My gratitude goes to many others for your support and praise. I’m tempted to quote you here, but it might raise expectations to ridiculous heights.

If I’ve left you out by mistake, please tell me or just send me a patch!

License
This guide is released under the GNU General Public License version 3. Naturally, the source is kept in a Git repository, and can be obtained by typing:

$ git clone git://repo.or.cz/gitmagic.git  # Creates "gitmagic" directory.
or from one of the mirrors:

$ git clone git://github.com/blynn/gitmagic.git
$ git clone git://git.assembla.com/gitmagic.git
$ git clone [email protected]:blynn/gitmagic.git
GitHub, Assembla, and Bitbucket support private repositories, the latter two for free.
446
Living Room / Re: Wrist watch voice recorder
« Last post by KynloStephen66515 on April 21, 2018, 07:28 PM »
I should also point out that if I was ever recorded without my permission (spoken conversations) by a person I was conversing with, I'd likely remove their recording device and insert it into somewhere they would find uncomfortable.

Just sayin'.
-Stephen66515 (April 21, 2018, 07:11 PM)

He might already have done it since I doubt if you know what he looks like.

Just sayin'

Doubtful, as somebody might indeed recommend something but it will be 5 years before we find out it wasn't good enough.


I don't know why you bully me all the time....

Nobody is "bullying" you...they offer you a HUGE amount of help on every thread you post, but are met with hugely frustrating replies (that can take literal years before we find out more information).

In terms of this thread...if you think me calling you a "creepy fuck" for wanting to secretly record people; is bullying, then you might want to reevaluate your life, because secretly recording people is creepy as fuck
447
Living Room / Re: Wrist watch voice recorder
« Last post by KynloStephen66515 on April 21, 2018, 07:11 PM »
I should also point out that if I was ever recorded without my permission (spoken conversations) by a person I was conversing with, I'd likely remove their recording device and insert it into somewhere they would find uncomfortable.

Just sayin'.
448
Living Room / Re: Wrist watch voice recorder
« Last post by KynloStephen66515 on April 21, 2018, 07:07 PM »
I know, but I want to record it secretly hihihi

Not sure why "I want to be creepy as fuck" is funny...but ok?
449
General Software Discussion / Re: Personal keylogger
« Last post by KynloStephen66515 on April 21, 2018, 09:37 AM »
OK! I installed FreeKeylogger and it seems now that Windows Defender doesn't quarantine it.
However, it has one MAJOR flaw: it doesn't allow you to seach for typed/clipboarded text across any date! You have to choose a specific date and search!

Then ask their developer to add your feature?
450
General Software Discussion / Re: Personal keylogger
« Last post by KynloStephen66515 on April 21, 2018, 06:35 AM »
This thread is brilliant  ;D ;D ;D
Pages: prev1 ... 13 14 15 16 17 [18] 19 20 21 22 23 ... 145next