w3hello.com logo
Home PHP C# C++ Android Java Javascript Python IOS SQL HTML videos Categories
Rackspace - php-opencloud filters - Documentation for valid ObjectList filters?
Unfortunately, the underlying API doesn't support filtering for objects in Swift/Cloud Files containers (cf. http://docs.rackspace.com/files/api/v1/cf-devguide/content/List_Objects-d1e1284.html). The $filter parameter is supported as part of the shared code, but it doesn't actually do anything with Cloud Files here. I'll see if I can get the docs updated to reflect that.

Categories : PHP

How to overcome javascript's 56-bit limitation
You might simply convert the pointers to doubles in the C side (see this related question) , and communicate with JavaScript only doubles. There won't be any loss this way as you'll only deal with IEEE754 double precision numbers whose possible values are the same both side. But experience shows that exchanging pointers between programs is usually a bad idea (obviously it introduces a strong coupling, for a start), so I would use some kind of ID, which is what you do with your hashmap.

Categories : Javascript

Storing locations in hierarchy - How to overcome?
Let me say right up front that if you're working with hierarchies in a relational database, you really want this book: http://www.amazon.com/Hierarchies-Smarties-Edition-Kaufmann-Management/dp/0123877334 Thinking about your Washington question, I'm wondering: Are you unhappy because your table structure forces you to add an entry for "USA" when all you really want is "Washington?" I'm not 100% I can answer your question, but let me tell you how I approach these types of problems. I almost always model hierarchies in relational databases using paths. Instead of 5 tables, I'd have one called "locations," which would look something like this: create table locations ( id varchar(10) not null primary key, path varchar(1000) not null unique, name varchar(40) not null, loc

Categories : Python

how to overcome buffer overflow attacks?
This is typically done by setting the no-execute bit on a memory page or segment (the stack, for example), in modern CPUs. It helps against some stack-based overflows, but isn't a 100% fool-proof cure. Check out http://en.wikipedia.org/wiki/No_execute

Categories : Misc

How to overcome the face detection API restrictions?
This can be used for converting the bitmap in the required format (The bitmap must be in 565 format). Bitmap mFaceBitmap = bitmapImage.copy(Bitmap.Config.RGB_565, true); bitmapImage.recycle(); // If you want to free memory ASAP And to alter the width, you can try something like mFaceBitmapWidth = mFaceBitmap.getWidth(); mFaceBitmap.setWidth(mFaceBitmapWidth - 1);

Categories : Android

How to overcome "existence of vector dependence" in icc
Add #pragma ivdep in front of the for loop, it instructs the compiler to ignore assumed vector dependencies. #pragma ivdep for(k = 0; k < SysData->numOfClaGen; k++) A[k] = B[k] * cos(x1[2 * k] - x1[ind0 + k]); for more info about ivdep, see icc doc

Categories : C

How to overcome this situation Windows Services App
I struggled to understand your question but I think you are looking at something like the following; if not can you please extend your question. protected override void OnStart(string[] args) { testc(); } public static void testc() { } After your last comment I have added the following code. The OnStart method will launch a thread and start the desired method: protected override void OnStart(string[] args) { m_Run = true; Thread LoadNewData = new Thread(ImportNewData); LoadNewData.Start(); } public void ImportNewData() { while(true) { //do stuff here } }

Categories : C#

How to overcome the limitations with mongoDB aggregation framework
1) Saving aggregated values directly to some collection(like with MapReduce) will released in future versions, so first solution is just wait for a while :) 2) If you hit 2-nd or 3-rd limitation may you should redesign your data scheme and/or aggregation pipeline. If you working with large time series, you can reduce number of aggregated docs and do aggregation in several steps (like MapReduce do). I can't say more concretely, because I don't know your data/use cases(give me a comment). 3) You can choose different framework. If you familiar with MapReduce concept, you can try Hadoop(it can use MongoDB as data source). I don't have experience with MongoDB-Hadoop integration, but I mast warn you NOT to use Mongo's MapReduce -- it sucks hard on large datasets. 4) You can do aggregation

Categories : Mongodb

How to overcome the situation when content of spinner is hidden?
Maybe you have to reset the spinner once you save or view an entry? (Perhaps in the onClick methods of the save/view buttons) Also the xml file doesn't seem right as you have a Linear Layout within a ScrollView.

Categories : Android

I am able to insert duplicate entries in TreeSet. How to overcome this
The way you are comparing string is wrong. See How to compare 2 Strings in Java (Employee)emp).employeeName== this.employeeName should be (Employee)emp).employeeName.equals(this.employeeName)

Categories : Java

How to overcome 255 character limit on conditional defines?
My Delphi is a little rusty, but I believe you can create a define that represents all those others are defined aswell, so you only have to check for one condition. {$IF Defined(Win32API) AND Defined(AlarmServerEngineVersion27) AND Defined(ImNotUsingOlderSimpleThread) AND Defined(EnableJclExceptionTracking) AND Defined(SaveExceptionsToDatabase) AND Defined(ShowExceptionForm) AND Defined(SNAPIN_NEEDS_NODE_DESCRIPTOR) AND Defined(VIRTUAL_TREES_MOUSE_DOWN_FOCUS_LAST) AND Defined(UseSQLServerLocking) AND Defined(SnapInFactoryFormClassIsOptional) AND Defined(Strict) AND Defined(SIFFCIO) AND Defined(Sqm) } {$DEFINE I_AM_TOTALLY_READY} {$IFEND}

Categories : Delphi

spam tool in vb.net
if don't wanna open the browser then use webbrowser control like so Private webbrows As New WebBrowser private sub form_load(snder...... dim _url as string = "your url that mostly wont work" webbrows.Navigate(_url) ' if you use vb2010 then you have lambada expressions AddHandler webbrows.DocumentCompleted, Sub(sd As Object, e4 As System.Windows.Forms.WebBrowserDocumentCompletedEventArgs) ' a check that the page fully loaded If e4.Url.ToString <> _url Then Exit Sub sd.dispose() End Sub end sub

Categories : Vb.Net

How to overcome from the error " The requested URL was not found on this server "in AVfoundation
you problem here is, you are first deleting the file and trying to use it with export session. You should not delete the file while export is in progress, and I recommend you to save exported file to temporary directory, after export is done, just delete your old file and move the exported one to the original file URL. Good Luck!

Categories : Iphone

Clang. How to overcome "unknown builtin" error message
Something must have gone funny when you did your project configuration. The ff_log2 code, for example, is inside: #if HAVE_FAST_CLZ && AV_GCC_VERSION_AT_LEAST(3,4) So you need to make sure HAVE_FAST_CLZ isn't defined, and you should be ok on that front. You can do similar things to fix the strcmp.

Categories : C++

How to overcome maven org.eclipse.persistence JAR signature error
OK, as best I can tell I was right, the problem was caused by a signature difference in the JAR files. How this can happen on a library as popular as eclipselink is beyond me but hey. My solution was to use a snapshot as they are generally not signed. Given that I was unable to obtain snapshot from central I used the following repo to obtain it; <repository> <id>sonatype-snapshots</id> <url>https://oss.sonatype.org/content/repositories/snapshots/</url> </repository> <dependency> <groupId>org.eclipse.persistence</groupId> <artifactId>org.eclipse.persistence.jpa.modelgen</artifactId> <version>2.6.0-SNAPSHOT</version> </dependency>

Categories : Security

Java/Python MD5 implementation- how to overcome unsigned 32-bit requirement?
Since all the operations are bitwise operations, they wouldn't suffer from sign extension (which would cause you problems), except for right shift. Java has a >>> operator for this purpose.

Categories : Java

IOException: "A required privilege is not held by the client." best way to overcome?
Maybe find a better folderpath with a call to GetFolderPath Environment.GetFolderPath(Environment.SpecialFolder.Personal)); From the msdndoc for the SpecialFolder enum The directory that serves as a common repository for documents. This member is equivalent to MyDocuments. If you only need to create a temporary file you can call: Path.GetTempFilename(); which Creates a uniquely named, zero-byte temporary file on disk and returns the full path of that file, see the msdn doc

Categories : C#

Spam, even with captcha on Php Form
1) It may be that your CAPTCHA is weak and just automatically cracked by the spam robot 2) Is the CAPTCHA validation in the server side handling class? If it is not, it is pretty useless because anybody can just post to the form.

Categories : PHP

Can a captcha attract spam?
My first thought would be to make use of the so called invisible captcha or honeypot technique. In a nutshell, the invisible captcha relies on the principle that bots will detect hidden fields and fill in with some information. A human visitor, on the contrary, will never see them (as they are hidden by the CSS), therefore they will remain empty. I am aware of a wordpress plugin for invisible captcha, but it only works on comments and it does not seem to be useful in your case. Hope this is of some help.

Categories : Wordpress

Emails contains Image and going in Spam
Try to use return-path in your headers like, $headers .= "Return-Path: email@example.com "; Read Spamassassian

Categories : PHP

Spam protection onclick()
why dont you just take a timestamp when the button was first clicked then compare the time when the button was clicked again and see if the difference is greater than the allotted amount of time?

Categories : Java

Avoiding Spam - Android App
There are so many ways to do this. Firstly you need to research about server-client architecture and security. Simply; You may use SSL certificate , send some secure header parameters in request, encrypt some of your data. But first, research about architecture. Good luck.

Categories : PHP

How to prevent Curl spam
Why not use a Captcha on any form that you submit? Bots cannot read those and you would prevent the post with an invalid captcha. For example: http://www.phpcaptcha.org/ If not using Captcha, then you need to look into different methods to prevent CSRF (Cross Site Request Forging). Here is a cheat sheet on what it is and some different methods on how to prevent it - https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet and they even make a framework for PHP that generates a unique key for each form, effectively only allowing inputs to come from a form that was rendered on from your site - https://www.owasp.org/index.php/PHP_CSRF_Guard

Categories : PHP

How to prevent spam in rails?
Aggressive Spam Bots are using (most of the times) the same tld or selected names, strings or numbers. You can try Filters Spam to filter out Words etc. you don't like in your App. And if you have a Really Big Problem with Spam just go with Rakismet (Ruby Akismet), for only 4.99/Month. I dont think this is to much to ask.

Categories : Ruby On Rails

iOS Push notification spam
This was related to our device logging into multiple accounts. Each time the device logged into a new account a new tracking ID was issued. The Spam was sending it to each account which in turn was sending it to the ID multiple times repeatedly. I doubt this will ever be an issue for anyone else, but thought I would answer the question.

Categories : Iphone

My phpmailer script goes to spam
Your mail is going to spam, ergo your mail is being sent, ergo there is (probably) nothing wrong with your script. There are many reasons why mail is delivered to spam. Most obviously, it might be spam. You should be checking the configuration of your mail configuration, specifically check for correct SPF and DKIM records. If you're using a third-party mailing service check that they haven't themselves been blacklisted. Check your return addresses make sense and are valid. Trace the path from the headers and see where any warnings are added en route. And finally, check your own spam filters.

Categories : PHP

How to overcome this error:- Collection was modified; enumeration operation may not execute."
You can use: foreach (var group in roleGroupsCopy.ToList()) Calling ToList() copies it to a temp list that you loop over. The temporary list will not be modified. An alternative is to use: securityRole.Groups.RemoveAll(g => g.GroupID == currentGroups[c]);

Categories : Asp Net Mvc

Outgoing mails to spam directory
I don't know much about the setup side, but several other factors could cause it to hit spam folders. Try removing one possible cause at a time until the email works. replace all the content with pure text (no $, !'s or large numbers) send from a different email address send to a different email address on a different domain If any of those fix your problem, you should have it narrowed down to the cause, which will help the rest of us to give more targeted answers. If those things don't make a difference, then it is most likely in your setup.

Categories : Email

Sending Thousands of Email per day without being spam
Managing your own mail server can be a pain. There's a lot to doing it right, and getting it wrong can mean landing on a blacklist. I recommend going with a service who has put in the time to ensure their e-mails get through. You can find a rather exhaustive list of them here: Sendgrid vs Postmark vs Amazon SES and other email/SMTP API providers? Also, if you're sending e-mails in the US, be sure to follow the guidelines of the CAN-SPAM Act.

Categories : Asp Net

Preventing Spam; Using Nodemailer; Using Sendmail
Here's a few reasons: http://www.codinghorror.com/blog/2010/04/so-youd-like-to-send-some-email-through-code.html There are also blacklists of ip addresses. Anything coming from these would just be ignored or regarded as spam. If your email is sent from a server which doesn't seem to be linked to the from address you'll have potential issues as well. Detecting spam and trying not to be seen as spam are both non trivial things. That's why a lot of mailing lists are done through a specialist provider.

Categories : Node Js

How to prevent spam inputs on a web page?
Perhaps you can use jQuery to disable the button. $('#myButton').click(function(){ $('#myButton').attr("disabled", "disabled"); setTimeout(unlockButton, 1000); }); function unlockButton(){ $('#myButton').removeAttr('disabled'); } Like so: http://jsfiddle.net/D3zLf/

Categories : Javascript

Email sent from VPS going into spam folder or being blocked
One reason why your messages may be going to the SPAM folder is the lack of a positive reputation. Look at it from Gmail's perspective... about 80% of new sources of email are spewing malicious messages. Often times Gmail and other mailbox providers look upon new sources of email as guilty until proven innocent. ReturnPath, a email reputation company shows your IP as not having sent very much mail. https://senderscore.org/lookup.php?lookup=174.136.14.186 By sending good mail to people who want to receive your messages your mail will begin to more often land in the inbox. Your only other options are to play around with your content. Try using different local address portions, domains, subjects, and content. If you include URLs like bit.ly which is a domain commonly abused you could

Categories : Email

My VPS has been shut down now again for the second time for TOS violations email spam
We dealt with the same problem earlier this year. First, you need to look through your log files to determine which site(s) are getting attacked. My guess would be that the sites being hit at 1.5 sites, without exception that was the case on our servers. If that is the case, then those sites need to be let go. If they don't want to upgrade, they need to take their sites elsewhere. Simple as that. You cannot risk your other sites and email blacklists due to customers that don't want to upgrade. We don't allow J1.5 on our servers any more.

Categories : Apache

Email with attachments going to Spam folder - VPS Server
EDIT #2: (PDF attachment) You will need to enter your $_POST variables, but if you try this as is, including the PDF file you wish to send, will run on its own. Change all instances of file.pdf in the code to the file name you wish to attach, as well as your Email address. (TESTED) <?php $sendto = "email@example.com"; $message = "Message here Hello, this is a test!!"; $filename = "file.pdf"; $handle = fopen($filename, 'rb'); $contents = fread($handle,filesize($filename)); fclose($handle); $encoded = chunk_split(base64_encode($contents)); $seperator = md5(uniqid(time())); $from = '"First Last" <username@domain.com>'; $header = ''; $header .= "From: $from "; $header .= "MIME-Version: 1.0 Content-Type:"." multipart/mixed; boundary="$seperator"; "; $body.= "--$seperator ";

Categories : PHP

HTML Email sent via PHP treated as spam in Gmail
Theres a million reasons why gmail would suspect the email is spam. The first thing I would do is use a library that deals with headers correctly -> http://swiftmailer.org/ Secondly, ensure your sender host is coming from the same IP as the server and have correct MX records.

Categories : PHP

Can spam bots trigger mouseenter or hover events?
A "generic" spambot that triggered events in order to harvest email addresses would have to feed the page into basically a headless browser, somehow determine what might be JS-obfuscated email content and then blindly try to emulate the user interaction that deobfuscates the interesting data. This is an enormous amount of work for possibly no benefit and no spammer would ever consider doing it. What they would do instead if they were really interested in harvesting your site is figure out how your protection works (hey, it's just written in reverse) and just special-case the spambot to unscramble the data manually. This type of protection scheme should be more than enough as long as you are too small to be worth targeting, but the downside is that website visitors that do not use JavaSc

Categories : Jquery

Preventing spam and bots using JavaScript generated checkbox
The article seems fishy to me. The checkbox captcha seems like a decent defense against spam bots that blindly fill out forms, knowing nothing about the website they happen to be on, however if someone is writing a bot that has any sort of insight into your page, the benefits end there. In the end, all that matters is the HTTP post. If the POST can be verified by the server, it doesn't really matter how the POST was created or what script may have run on the client. If the server is looking for a POST value called NotABot which has a value equal to 1, a spam bot can simply include this value in its own POST, as the server doesn't know if a checkbox was created through client-side script.. If the value must be equal to a random value provided in the initial HTML, the spambot can scrape

Categories : Javascript

How can I prevent email spam (too many instant emails on actions)?
I would recommend having a cron job that runs a rake task that does this. Have an attribute on each comment that indicates whether it is a 'new' comment or not, and each day when the cron goes through the comments mark them as 'not new' (or something that makes sense to you). write your query so that it only returns the 'new' comments, and doesn't loop through every comment in the db and then check to see if it is 'new' or not. check out the whenever gem. I haven't used it, but there are plenty of resources to help you decide if it's right for you.

Categories : Ruby On Rails

AJAX chat - Prevent spam server sided?
In the part of your scripts, where the server is about to save the chat message, you hook up a database query like SELECT COUNT(*) FROM chat_messages WHERE uid='1234' AND timestamp > DATE_SUB(NOW(), INTERVAL 10 SECOND) LIMIT 10 then check if the result is greater than your limit and return false, or a message "too many messages sent in too short time" Another, maybe better approach would be to identify not only a user/session, but also save the IP and limit messages to an IP. Many modern bots can easily circumvent sessions or switch IP very fast, so you should go for a combination of more than one technics. Also consider client side prevention, like hashing the message, or adding a checksum to the messages. Many bots don't talk JavaScript too good.

Categories : PHP

How do I overcome Microsoft SQL Server, Error: 1827: restore failed...exceed licensed limit?
SQL Server 2008 R2 or 2012 Express have a 10GB limit so you can use one of those.

Categories : Sql Server



© Copyright 2017 w3hello.com Publishing Limited. All rights reserved.