Computing desk | ||
---|---|---|
< November 5 | << Oct | November | Dec >> | November 7 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
OP curious Mahfuzur rahman shourov ( talk) 05:22, 6 November 2015 (UTC)
Assuming both questions are being asked and certain sites are restricted. The British Gentleman has sufficiently answered the question if this were just one hotspot. Assuming there is a connection problem with all hotspots, it would be logical that the device is the issue. Hotspots are very backwards compatible so the age of the device should not be a factor. You should be looking at the hardware or software to solve this issue. Depending on your device, you can download apps that will test the hardware and software. If there were any recent updates prior to the problem, undo them. If you dropped the device, the app should recognize the damage to the hardware. Tools like Speccy from Piriform are free and do an excellent job. I found several answers on the LG help pages for troubleshooting my phone. Brnin60s ( talk) 03:14, 10 November 2015 (UTC) — Preceding unsigned comment added by Brnin60s ( talk • contribs) 01:36, 10 November 2015 (UTC)
Hello,
I am looking for some very specific types of images, and i can't seem to find anything regardless of my search terms. I need a few samples of different images that satisfy the following criteria:
Some images which are similar to what i am looking for:
... I would almost use these images, but the glaring issue is that these are not seamless. If i tile them, its obvious where the image begins to repeat. If it helps, i am wanting this for a subtle dark scrolling background in a main screen menu for some research i am doing in Unity Game Engine.
Thanks to everyone in advance for the help. Believe it or not, googling "Seamless galaxy images" in Google Images brings up lots of bras and photos of Galaxy5 phones!
216.173.144.188 ( talk) 05:43, 6 November 2015 (UTC)
Thank you! This is a most valuable answer, because it does not rely on the availability of something; I can make the image i desire myself! The key thing i am missing from many many of the images i do like is this seamless property. Thanks once again! Problem solved!
216.173.144.188 ( talk) 19:37, 6 November 2015 (UTC)
I would like to know why the space complexity for Depth-first search is Ο(bd)?I have searched the web but it all tells about equations like (m-1)*(b-1)+b that I can't understand.Could anyone give an intuitive explanation with an example. JUSTIN JOHNS ( talk) 08:08, 6 November 2015 (UTC)
I was reading https://protonmaildotcom.wordpress.com/ in which Protonmail admitted to paying DDOSers a ransom. Needless to say, it didn't work, and they published the address of the DDOSers ( 1FxHcZzW3z9NRSUnQ9Pcp58ddYaSuN1T2y ). What I don't understand is... I didn't think Bitcoins were truly anonymous. I thought each one was a number, a solution to some kind of math equation ... isn't it? So why can't Protonmail publish the list of actual bitcoins they paid for the world to see? Then if those bitcoins ever turn up again, people know they were through the extortionists' hands, right? (OTOH maybe the chain of transactions written for Bitcoins already has the address they published coded into it? I don't know the details)
I still don't *really* understand how Bitcoins are protected against double-paying two different people, but if the extortionists try to spend a Bitcoin, the receiver will want to check it. Can't that check be spotted and flagged - whether by the receiver or the party doing the check - to set off an alarm?
I understand if there are a lot of people who say they're just not going to report any crime, whatever it is, then Bitcoins might be safe to use. But the same is true of cash. But even if the guy you pay cash to doesn't look up the serial numbers, eventually someone will, and then there will be a swarm of agents following the trail backward. Isn't that true for Bitcoins also?
What am I missing here? Wnt ( talk) 16:44, 6 November 2015 (UTC)
I recently got a bug report from customer on-site testing at work. An ASP.NET web application I had worked on wasn't able to open one of its pages.
It turned out that the link to open it was using a plain HTTP URL scheme, whereas the customer on-site installation was deployed under HTTPS.
What puzzles me here is that the code should already have worked this out. It uses the Request.Url.AbsoluteUri
property, which should have worked out the correct scheme. But it did not. I added a check that if Request.IsSecureConnection
is true, then it uses the HTTPS scheme on the link, but that didn't work either. In the end I resorted to hard-coding the link scheme as HTTPS.
The testing engineer told me that if the site was accessed directly from its own web server, it worked OK. But if it was accessed from anywhere else, it kept writing the link as HTTP even though the site was deployed as HTTPS.
What is happening here? Is this supposed to work like this? Or is there something I don't understand here? Or is this a bug in the actual .NET libraries? JIP | Talk 19:59, 6 November 2015 (UTC)
Computing desk | ||
---|---|---|
< November 5 | << Oct | November | Dec >> | November 7 > |
Welcome to the Wikipedia Computing Reference Desk Archives |
---|
The page you are currently viewing is an archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages. |
OP curious Mahfuzur rahman shourov ( talk) 05:22, 6 November 2015 (UTC)
Assuming both questions are being asked and certain sites are restricted. The British Gentleman has sufficiently answered the question if this were just one hotspot. Assuming there is a connection problem with all hotspots, it would be logical that the device is the issue. Hotspots are very backwards compatible so the age of the device should not be a factor. You should be looking at the hardware or software to solve this issue. Depending on your device, you can download apps that will test the hardware and software. If there were any recent updates prior to the problem, undo them. If you dropped the device, the app should recognize the damage to the hardware. Tools like Speccy from Piriform are free and do an excellent job. I found several answers on the LG help pages for troubleshooting my phone. Brnin60s ( talk) 03:14, 10 November 2015 (UTC) — Preceding unsigned comment added by Brnin60s ( talk • contribs) 01:36, 10 November 2015 (UTC)
Hello,
I am looking for some very specific types of images, and i can't seem to find anything regardless of my search terms. I need a few samples of different images that satisfy the following criteria:
Some images which are similar to what i am looking for:
... I would almost use these images, but the glaring issue is that these are not seamless. If i tile them, its obvious where the image begins to repeat. If it helps, i am wanting this for a subtle dark scrolling background in a main screen menu for some research i am doing in Unity Game Engine.
Thanks to everyone in advance for the help. Believe it or not, googling "Seamless galaxy images" in Google Images brings up lots of bras and photos of Galaxy5 phones!
216.173.144.188 ( talk) 05:43, 6 November 2015 (UTC)
Thank you! This is a most valuable answer, because it does not rely on the availability of something; I can make the image i desire myself! The key thing i am missing from many many of the images i do like is this seamless property. Thanks once again! Problem solved!
216.173.144.188 ( talk) 19:37, 6 November 2015 (UTC)
I would like to know why the space complexity for Depth-first search is Ο(bd)?I have searched the web but it all tells about equations like (m-1)*(b-1)+b that I can't understand.Could anyone give an intuitive explanation with an example. JUSTIN JOHNS ( talk) 08:08, 6 November 2015 (UTC)
I was reading https://protonmaildotcom.wordpress.com/ in which Protonmail admitted to paying DDOSers a ransom. Needless to say, it didn't work, and they published the address of the DDOSers ( 1FxHcZzW3z9NRSUnQ9Pcp58ddYaSuN1T2y ). What I don't understand is... I didn't think Bitcoins were truly anonymous. I thought each one was a number, a solution to some kind of math equation ... isn't it? So why can't Protonmail publish the list of actual bitcoins they paid for the world to see? Then if those bitcoins ever turn up again, people know they were through the extortionists' hands, right? (OTOH maybe the chain of transactions written for Bitcoins already has the address they published coded into it? I don't know the details)
I still don't *really* understand how Bitcoins are protected against double-paying two different people, but if the extortionists try to spend a Bitcoin, the receiver will want to check it. Can't that check be spotted and flagged - whether by the receiver or the party doing the check - to set off an alarm?
I understand if there are a lot of people who say they're just not going to report any crime, whatever it is, then Bitcoins might be safe to use. But the same is true of cash. But even if the guy you pay cash to doesn't look up the serial numbers, eventually someone will, and then there will be a swarm of agents following the trail backward. Isn't that true for Bitcoins also?
What am I missing here? Wnt ( talk) 16:44, 6 November 2015 (UTC)
I recently got a bug report from customer on-site testing at work. An ASP.NET web application I had worked on wasn't able to open one of its pages.
It turned out that the link to open it was using a plain HTTP URL scheme, whereas the customer on-site installation was deployed under HTTPS.
What puzzles me here is that the code should already have worked this out. It uses the Request.Url.AbsoluteUri
property, which should have worked out the correct scheme. But it did not. I added a check that if Request.IsSecureConnection
is true, then it uses the HTTPS scheme on the link, but that didn't work either. In the end I resorted to hard-coding the link scheme as HTTPS.
The testing engineer told me that if the site was accessed directly from its own web server, it worked OK. But if it was accessed from anywhere else, it kept writing the link as HTTP even though the site was deployed as HTTPS.
What is happening here? Is this supposed to work like this? Or is there something I don't understand here? Or is this a bug in the actual .NET libraries? JIP | Talk 19:59, 6 November 2015 (UTC)