Jump to content

asterix

Members
  • Joined

Everything posted by asterix

  1. They are, and you don't have to define them again unless you're overriding the parent class' behavior. (or defining a virtual function, whatever) It would make more sense for the parent class to load a bitmap from a path stored in a variable in the class (char *), and simply have child classes redefine that variable in their contructor. (Even if it's set in the parent class' constructor, the child class' constructor will be called after the parent class' is called.) Then simply create instances of your child class to create a new bitmap object with the custom bitmap (defined in the constructor of the child class).
  2. There have been lots of people unable to update Windows due to the fact that WGA (Windows Genuine Advantage) fails to detect legitimate installations correctly 100% of the time. However, pirates have no problem, as they merely paste javascript:void(window.g_sDisableWGACheck='all') into their address bar (and press enter obviously) before loading the Windows Update site. ;)
  3. He probably meant "this is what I'm looking at so far". According to their site, the mobo has a NIC built in (standard 10/100). Looking pretty good so far, what monitor size are you packing?
  4. Can you post the definition of the BitmapObject and PaddleObject classes? Would make it a bit easier to understand what you're aiming for and where you're having an issue.
  5. Sounds like you didn't check the NTFS permissions. Go to the Security tab in the Properties dialog of a parent folder (of the hidden folder in question), then go to the Advanced dialog for the Administrators group, then go to the Owner tab, click on the Administrator group or your User account, check off 'Replace owner on subcontainers and objects', and hit Ok. Actually, you can do that for the entire drive (might take a while), and then you're guaranteed to be able to see any file physically present on the drive. If you don't have a Security tab, open any folder and go to Tools->Folder Options->View and uncheck "use simple file sharing" at the bottom iirc.
  6. http://directnic.com/whois/?query=ige.com If they're not a legally registered business in the US, wtf are you worried about? (assuming you're in the US)
  7. It's not tracker-dependent, it's knowing the basics of how port forwarding works + having enough seeds on a given torrent. This was one of my highest ever speeds (before I realized Bittornado was a lame client): http://xs56.xs.to/pics/05476/tiger-ox86.png This was my friend updating WoW on his laptop on my network (Blizzard's downloader uses basically the same protocol as torrents): http://xs56.xs.to/pics/05476/WoW.png
  8. Making multiple program entrypoints for various operating systems and calling your main program loop isn't really exceedingly difficult. Obfuscation for the win
  9. asterix posted a post in a topic in Computer Discussion
    HTTP/SOCKS Proxy or ipconfig /release -> ipconfig /renew if you're on some kind of dynamic connection
  10. gl\gl.h gl\glu.h gl\glaux.h Decent Windows-based C++ compilers come with them. (e.g. not DevC++) Or get them from someone who uses MSVC++ (6.0 or >). You only actually need gl.h, unless you plan on dumbing down your app (and making it a bitch to port) by using GLUT or something.
  11. All the tutorials on that site were free about a year and a half ago, then they turned jewish. http://nehe.gamedev.net for opengl MSDN for directx
  12. Anything written in a compiled language (BitComet, Azureus), not gay scripting languages (Cohen's official BT client, Bittornado). The ones written using scripting languages fucking RAPE your CPU and memory on larger torrents (like 2 gigs+), where the ones written in compiled languages use much less system resources. I prefer BitComet, since you can keep track of multiple torrents at once, all inside 1 program that chills in your system tray, you can set individual upload/download rates for each torrent, <insert other common features>. Here's a pic: http://xs56.xs.to/pics/05471/pic0rz.png
  13. "Jij bent een homofiele jood" if I recall correctly
  14. asterix posted a post in a topic in Computer Discussion
    802.11n can reach up to 400 feet supposedly. That wireless standard has yet to be finalized, but some ballsy manufacturers are already putting out devices capable with one of the proposed versions of the standard. Also the speed drop off/range ratio is supposedly alot better (losing less speed as you move father away from the WAP compared to the a, b, and g standards).
  15. asterix posted a post in a topic in Computer Discussion
    Not spyware, it monitors what function calls other processes are using, and can prevent undesired behavior in those programs (such as a program launching another program, or attempting to read another memory-resident program).
  16. The source code for stuff like PHPBB, IPB, Vbulletin, etc. is designed to run on a variety of setups and configurations (apache, mysql, php all have thousands of possible configuration combinations), so their source code has to take that into account... and it's generally pretty ugly looking. What I meant by table setups was the actual database. After examining how they stored their data, I could piece together mentally how each page would work, and what queries I would have to write to retrieve the data I would need for each type of pageview (index, viewing profile, viewing topic, etc.)
  17. I wrote my own forums in PHP/MySQL for a group of my friends to use with one of their projects. Basically what I did was look at the table setups from IPB and PHPBB to see exactly how they organized the data, then I based my tables off a similar design. I certainly hope you're running apache/mod_php/mysql locally for development, since uploading gets to be quite annoying. :P You might want to check out how to use mod_rewrite as well, keeps your URLs looking clean and pr0.
  18. asterix posted a post in a topic in Computer Discussion
    One that I read a long ass time ago, but is still useful today: http://its.mine.nu/html/re/essays/kg-inject.html Same concept, just do it in a standalone program.
  19. ... I seriously doubt he's going after like Bank of America or something's website. The only thing "encrypted" in a non-commercial site database would probably be password hashes for user accounts. For "stealing" a database, find a way to access to access their web administration interface (e.g. PHPMyAdmin for MySQL), or get shell access to the server and export it manually. Although the first option is probably more plausible... especially if you can exploit a poorly written site into including a remote file (if allow_url_fopen is on) and using show_source() to say, view their forum/site configuration files. Then you'd have a working user/pass to work with.
  20. asterix posted a post in a topic in Computer Discussion
    I repeat, lol.
  21. asterix posted a post in a topic in Computer Discussion
    lol
  22. Guns 'N' Roses - Civil War
  23. asterix posted a post in a topic in Computer Discussion
    http://php.net/manual/en/function.mail.php , assuming they've got a properly configured mailserver already going.
  24. Wow, Slashdot has only duped that story like 4 times in the last 2 weeks. Since it's hiding it from the API, you can use it to 'hide' hacks for any game. :|
  25. asterix posted a post in a topic in General Discussion
    If the guy who manages the site does daily/weekly backups, it'd take him like 2 minute to load a backup of the database and update the forums to the latest version. In my experience though, any site still running the old versions of PHPBB has extremely incompetent "admins". :P