background preloader

Pointer Basics

Pointer Basics
This document introduces the basics of pointers as they work in several computer languages -- C, C++, Java, and Pascal. This document is the companion document for the Pointer Fun with Binky digital video, or it may be used by itself. This is document 106 in the Stanford CS Education Library. Section 1 -- Pointer Rules One of the nice things about pointers is that the rules which govern how they work are pretty simple. 1) Pointers and Pointees A pointer stores a reference to something. The above drawing shows a pointer named x pointing to a pointee which is storing the value 42. Allocating a pointer and allocating a pointee for it to point to are two separate steps. 2) Dereferencing The dereference operation starts at the pointer and follows its arrow over to access its pointee. The dereference operation on a pointer only works if the pointer has a pointee -- the pointee must be allocated and the pointer must be set to point to it. 3) Pointer Assignment Section 3 -- Study Questions

The Shapes of CSS Learn Development at Frontend Masters CSS is capable of making all sorts of shapes. Squares and rectangles are easy, as they are the natural shapes of the web. Add a width and height and you have the exact size rectangle you need. Add border-radius and you can round that shape, and enough of it you can turn those rectangles into circles and ovals. We also get the ::before and ::after pseudo elements in CSS, which give us the potential of two more shapes we can add to the original element. Square Rectangle Circle Oval Triangle Up Triangle Down Triangle Left Triangle Right Triangle Top Left Triangle Top Right Triangle Bottom Left Triangle Bottom Right Curved Tail Arrow via Ando Razafimandimby Trapezoid Parallelogram Star (6-points) Star (5-points) via Kit MacAllister Pentagon Hexagon Octagon Heart via Nicolas Gallagher Infinity via Nicolas Gallagher Diamond Square via Joseph Silber Diamond Shield via Joseph Silber Diamond Narrow via Joseph Silber Cut Diamond via Alexander Futekov Egg Pac-Man Talk Bubble TV Screen Lock

3 Ways To Speed Up The Windows 7 Shutdown Process Advertisement Ever since I switched to Windows 7 on my laptop, which had previously shut down within seconds while running on Windows XP, the slow shutdown has been nagging me. If you also happen to be looking for ways to kick-start a Windows 7 slow shutdown, look no further! Here I will introduce you to 3 ways to optimize or speed up the logoff process, so that you can leave the office or get into bed faster. Prologue I tested these tips one after the other on my Windows 7 netbook (which shut down significantly faster after upgrading to 2GB RAM). Initial shutdown time on test machine: 32 seconds 1. Before Windows shuts down, it attempts to properly close all running processes. These are two fairly harmless registry hacks. Editing the registry can damage your operating system! For the first hack, click the key combination > [WINDOWS] + [R], type > regedit into the text field, and click > OK to launch the registry editor. In the registry editor, navigate to this folder: 2. 3. Epilogue

Temporary Email Aliases After running tempalias.com as a fun project for a bit more than a year and a half, I would say that the experiment is now finished and tempalias.com is down for now. There are both personal and technical issues. Let me list them here: the tempalias codebase relies on a very old version of node.js and some very old additional libraries which wouldn't even work with newer versions of node.js. This means that tempalias.com is down for now. If you want to have a service like this, remember that the source code of tempalias.com is freely available at my github page I hope you undestand

Tutorial - Learn Python in 10 minutes NOTE: If you would like some Python development done, my company, Stochastic Technologies, is available for consulting. This tutorial is available as a short ebook. The e-book features extra content from follow-up posts on various Python best practices, all in a convenient, self-contained format. Preliminary fluff So, you want to learn the Python programming language but can't find a concise and yet full-featured tutorial. Properties Python is strongly typed (i.e. types are enforced), dynamically, implicitly typed (i.e. you don't have to declare variables), case sensitive (i.e. var and VAR are two different variables) and object-oriented (i.e. everything is an object). Getting help Help in Python is always available right in the interpreter. >>> help(5)Help on int object:(etc etc) >>> dir(5)['__abs__', '__add__', ...] >>> abs. Syntax Python has no mandatory statement termination characters and blocks are specified by indentation. Data types You can access array ranges using a colon (:).

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example Introduction This document provides step-by-step instructions on how to allow VPN Clients access to the Internet while they are tunneled into a Cisco IOS® Router. This configuration is required to allow the VPN Clients secure access to corporate resources via IPsec and at the same time allow unsecured access to the Internet. This configuration is called split tunneling. Note: Split tunneling can pose a security risk when configured. Since VPN Clients have unsecured access to the Internet, they can be compromised by an attacker. Prerequisites Requirements There are no specific requirements for this document. Components Used The information in this document is based on these software and hardware versions: Cisco Router 3640 with Cisco IOS Software Release 12.4 Cisco VPN Client 4.8 The information in this document was created from the devices in a specific lab environment. Conventions Refer to the Cisco Technical Tips Conventions for more information on document conventions. Configure Verify

Welcome to ClearDB! PIX Firewall and VPN Configuration Guide, Version 6.3 - Site-to-Site VPN Configuration Examples  [Cisco PIX Firewall Software Configuring PIX Firewall 1 with a VeriSign CA Perform the following steps to configure PIX Firewall 1 to use a public CA: Step 1 Define a host name: Step 2 Define the domain name: Step 3 Generate the PIX Firewall RSA key pair: This command is not stored in the configuration. Step 4 Define VeriSign-related enrollment commands: ca identity example.com 209.165.202.130 ca configure example.com ca 2 20 crloptional These commands are stored in the configuration. " 2 " is the retry period, " 20 " is the retry count, and the crloptional option disables CRL checking. Step 5 Authenticate the CA by obtaining its public key and its certificate: ca authenticate example.com This command is not stored in the configuration. Step 6 Request signed certificates from your CA for your PIX Firewall's RSA key pair.

Kyle's Cousin » An Absolute Beginner’s Introduction to Database Indexes Proper indexes on your tables are a crucial part of any Database design that requires advanced data retrieval. For basic databases with only a few dozen records per table, indexes may not be absolutely necessary and even slow things down (if your RDBMS does not automatically ignores the index), but it’s still good practice to design your database with proper indexes from the start if you expect it to grow big. The minute your number of table records increases and you need to do more advanced select queries (eg. joining of multiple tables), efficiency and speed becomes important. That’s where indexes come into play. In this post I’m going to give you an introduction tutorial/guide about database indexes, for everyone who has no idea what they’re used for. Using an index for simple SELECT statements… Let’s kick things off with a simple example. And add 10 records to it: This is how your table will look like: You may not have noticed, but you already created an index. Other types of indexes

Best 10 Sites for Tips and How-To’s — TechnoZeast Internet is filled with information and there are many site through which we stumble across whole day and night to find the right info about any particular thing. There are so many sites which share tips and How-To’s and many internet users wonder to find accurate information to help them here we have listed best 10 sites for tips and How-To’s check them out below. 1. instructables 2. eHow 3. 4. 5. 6. 5Min 7. 8. 9. 10. Hope these best 10 sites help you find your desired tips and how-to’s to help you with best info. 20 Indispensable Browser Based Apps Design Informer How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. intitle:index.of finances.xls

Will Smart Contact Lenses Be the Bluetooth Headsets of the Future? Imagine instant access to the latest market segment information at a meeting, or seeing the fourth quarter earnings for a company in (literally) the blink of an eye. Although it might sound like something from a science fiction novel, scientists at the University of Washington are working on solar powered contact lenses with transparent LEDs embedded onto the lens. This technology could be applied in countless ways, from health monitoring to text translation right in front of the wearer's eyes. In 2006, my team at SKD designed a very similar concept for our "Cautionary Visions" project. One of the results was an "Assisted Living Contact Lens" that would project helpful information, such as the calorie count for a chocolate scone, or a GPS map overlay locating the nearest gyms. Now it seems like our idea might become a reality. But I haven't asked that question in years. Relevance is the challenge that new technology developers face, and it’s an area where designers can add value.

15 sites web developers and designers should know - CatsWhoCode.com Creating a good website isn't an easy task, but there's a few tools that can definitely make your developer or designer life easier. In this article, I have compiled 15 extremely useful website that any web developer or web designer should have bookmarked. ColorCombos When designing a website, one of the firsts (and most important) steps of the process is to choose a color scheme. LIpsum Who doesn’t know the extremely popular Lorem Ipsum text? What the font? You just saw a logo or website using a particular font and you enjoyed it. ConvertIcon Favicons are a must have for any website, mostly because on modern browsers as such as Firefox, it is displayed along with the site name in tabs. BgPatterns background Patterns is definitely one of the current webdesign trends. HTML Encoder Do you display code on your website? Test Everything Sprite Generator CSS Sprites is definitely a great technique to use, mainly because it reduces the number of HTTP requests. Load Impact IconFinder TypeTester CSS Tidy

Hackers outwit Windows 7 activation News November 16, 2009 01:37 PM ET Computerworld - Hackers have figured out how to sidestep Windows 7's activation process, continuing a long-running battle with Microsoft, which has blocked such tactics in the past. According to an article published more than a week ago on My Digital Life, hackers have devised a pair of methods that circumvent the new operating system's product activation, a key component of Microsoft's antipiracy technologies. Microsoft said it knew about the hacks and was looking into ways to block them. Two utilities, called "RemoveWAT" and "Chew-WGA," remove the activation technologies or prevent them from running, said My Digital Life. With Windows 7, Microsoft dropped the "Windows Genuine Advantage" (WGA) name for its integrated antipiracy software, and replaced it with "Windows Activation Technologies" (WAT). Microsoft has blocked anti-activation hacks in the past, using Windows Update to push changes to users.

Related: