Jump to content

espurritado

Member
  • Posts

    178
  • Joined

  • Last visited

Everything posted by espurritado

  1. Haven't actually tried installing new packages with node, however, with composer, you could either manually write it or install packages via command line. I'm guessing it should be something like "npm install bootstrap", but, search for it, this one might not be the one. npm install is only run to update the packages in your project, like you updated the version of a package in your json file or you just downloaded the repo (in a git repository you don't upload the packages since the json file has everything you need to get them)
  2. well, of the top of my head the solution would be to cut the word on screen to the length of the input and check if the input equals the cut word
  3. I read there a permission denied, maybe some problem with read/write permissions? try running as sudo or tinkering with the permissions of the folder.
  4. I believe there's a misunderstanding here, you are talking about local ip addresses (normally 192.168.x.x). However, the public ip address (the one anyone in the internet sees you as) is the same for all the devices connected to you local network. You can configure your local network to assign local ip addresses dynamically or not, however, binding a public ip address to a mac address right now would be impossible on the IPv4 protocol. It still might happen with IPv6 but it is yet not implanted
  5. just go online to some page that tells you what's your IP, make note of it, turn off your router for ten seconds and turn it back on. Refresh the page that shows your IP address, it will have changed if your IP is dynamic
  6. whom ever actually said that is a hacker wannabe who does not know the first thing about computer networking If your IP is leaked, by default, there is no way someone can connect to you. If you have tinkered with your ports (for games most likely) still makes no sense. Finally most domestic services (unless otherwise requested) you will have what is called a dynamic IP (which will change every time you turn off your router)
  7. for me, I got smacked in the face with it when a professor decided that it would be a good idea that the practice part for his class was to create a learning algorithm and illustrate its progress through Unity. I think it was at that point when I realized that every programming language is basically the same and I could program in anything I wanted
  8. actually, one of the most used ways to mold plastic is by blowing, not exactly the same way as glass, but if you look at the base of some plastic item made in chain (such as a bottle), you'll find a small circular notch which indicates the spot from where it was blown
  9. last year I did't have time to do it, lets see if I can manage this year
  10. WHY?? you have an enormous memory leak, just do static void ContiniuousChecker() { while (true){ //Do stuff here Thread.Sleep(500); } }
  11. I remember kind of a similar app (it was a chat based on an area so you could ask anyone near you about something in the area) The success of a project like this depends on the amount of users it has. It would be ideal to enable it first in a single city as a trial. Also, it would be hard to moderate that the users are not earning money or doing something illegal. Also, you are counting on the assumption that people are good and trusting, and this is not always the fact, and this could come back to bite you. Finally, I'm really sorry, but my mind tends to always go to how a project could be done, and what could go wrong, which seems to be the majority of this reply.
  12. https://www.raspberrypi.org/documentation/remote-access/ I myself would use ssh, but there's an option for a graphical interface too
  13. It might "work", but working with an unnormalized database implies possible problems in the future with insertions, updates and deletions of values. You must remember, as well, that SQL is way more optimized in it's operations than any code you, or any third party may write. Iterating between the 10 rows returned by a query with a single value will be more efficient than taking a single row, sending all the values received into an array and iterating between them
  14. as I just said, you are breaking the first normal form, the solution, again, would be a different entry for each individual state_id, city_id and spaid. this would mean that for spaid 421 you would have 6 different entries
  15. you are breaking the first normal form of a relational data base. A field for an entry may only contain one value. A solution would be to create an additional table with entries team and value.
  16. great list!! However, I think you should redirect people to the actual page of the language/framework instead of to the Wikipedia entry, any idiot can write on Wikipedia
  17. your code is painful to read, but I'll make some constructive critics. Apart from everything that has already been said, I don't see the point in making the program sleep after you generate each character. If you get rid of that the program will be faster and more lightweight.
  18. I'm pretty sure there's some LTT video about it
  19. when you get to the point where you say it's prime here: you shouldn't compare to primeSearch/2, instead compare to the square root of primeSearch. Also multi-threading wouldn't be an option in this case since you are dependent of the previous execution of the loop in order to execute the next one, if you use multi-threading you might skip a prime, or wrongly categorize a number as prime, specially early on.
  20. It's possible to write a js script that follows the behavior you want (make clicks, input values, read values). I used to work with a framework called Protractor which I believe is quite close to what you want to do. I'm sure, if you look a bit, you'll be able to find a similar framework not so specific so you can adapt it to your needs
  21. never really needed to do it, however, here is the same question at stackoverflow http://stackoverflow.com/questions/3703449/how-to-prevent-php-files-from-being-downloaded-and-what-are-some-ways-someone-c
  22. of the top of my head, you could store them in a separate file and use "require" for the variables. This does not remove your problem with the password in plain text, just moves it somewhere else.However, there should be no problem as long as you make sure there's no way to access the files inside the server from the outside since the front end won't be able to read the php scripts. Just remember to put the file with the users and passwords in the gitignore if you ever publish it to github or some other platform. You won't believe how many sensible passwords can be found if you read through the config files of github projects.
  23. just give it a relative address instead of an absolute one.
  24. what google does is SEO (search engine optimization). Basically it considers your input and generates a list of possible things you might mean, organized by relevance and aproximation. The easy option would be to have a dictionary and show the first few words that coincide with your imput, kind of like wordreference does
×