Posts by woliveirajr • 2,122 points
27 posts
-
4
votes1
answer5010
viewsA: How do Bematech printer cut the print in half?
I found the following website that teaches how to do : Driving the guillotine in the non fiscal minimpressor Basically, if you are using the printer’s DLL, you will send the following command after…
-
11
votes3
answers568
viewsA: Compute secure data randomly
Random data can only be obtained from random procesoss. Physically, only quantum processes are really random and so there are external devices that generate random data: Geiger counters, reversally…
-
2
votes1
answer321
viewsA: How to prevent a user from storing mp3 files, thus preventing them from being able to distribute them?
Short answer: impossible to do. If the user can hear the audio on his computer, he can store a copy. Detailing: in the most extreme case, the user can connect the audio output from his sound card to…
-
0
votes2
answers171
viewsA: How to insert an asterisk every 3 characters?
I think the answer is in your own question: 1 - the person has a place where to enter an entry 2 - when it presisona enter, this value is processed: 2.1 - it picks up everything you typed in; 2.2 -…
canswered woliveirajr 2,122 -
3
votes1
answer605
viewsA: Recover Corrupted . gz File
Yes, it is possible to try to recover a . gz file, but expect to have large data losses from the middle of it. First, make a copy of the file and work only with the copy. Make a gunzip <…
-
16
votes3
answers4153
viewsA: Common encryption algorithm between Java and C#
From what I understand are your questions: Yes, the "encryption mechanisms" are the same, ie: implemented the same algorithm with the same initialization parameters, the obtained result should be…
-
3
votes2
answers17877
viewsA: What are the syntax of the for loop in java?
This type of construction started with Java 5. It is called for-each and does just this: for every element given in loop of for, executes one or more commands. With it the reading of the code…
-
1
votes3
answers2057
viewsA: How to format textfield with bold in Ireport?
Thanks for posting the image of the field properties, I was wondering if it could have been some special source that wasn’t being processed correctly. In the properties the Sansserif font is already…
-
10
votes5
answers6123
viewsA: Physical Exclusion vs Logical Exclusion
Advantages of using a logical deletion: Audits: If you use a date-time field to store the deletion, instead of a simple boolean / string, you can know when it was deleted. And you can use indexes…
sqlanswered woliveirajr 2,122 -
1
votes1
answer3509
viewsA: Delay while upgrading files via FTP with Filezilla
There are several Opencart extensions that cache. The ideal was to know which one you use on this site/server, to check if there is any specific configuration for it to recognize faster the files…
-
0
votes3
answers864
viewsA: Difference between ways to perform a backup (Disk space, buffer, etc.)
You can create an NFS for the remote machine and perform the backup normally, as you would in a local directory. The time of your backup will depend on the speed of the link between your local…
-
4
votes2
answers3560
viewsA: How to calculate the freight of various products
To make a calculation that matches the logistics company, you would have to do the same calculation that they do. Each company can be its own criterion: weight-only dimension: width + height + depth…
-
11
votes5
answers20277
viewsA: How do I use @import in a CSS file?
The line of @import has to be the first in your .CSS. file if you enter any information before (for example, comments), @import will fail. At most, you can have one <style> @import....…
-
2
votes2
answers275
viewsQ: Editing of captured fabrics for making manuals
[Note: goal: I know it’s not about programming, but I’m not sure about the limits of Stack Overflow PT yet, so it’s also a test for our site.] At the end of the software development, it was time to…
documentationasked woliveirajr 2,122 -
4
votes3
answers949
viewsA: Scrypt, Bcrypt or anything else
About the dollar sign being obvious to an attacker: it doesn’t really mean anything. The security of your system lies in the difficulty of making the attack, not the difficulty of finding out which…
-
17
votes4
answers8554
viewsQ: How do LTRIM() and RTRIM() in Java?
I need to process some strings in Java. I know the method exists trim(), but I need a Left Trim and of a Right Trim. How do I do this? For now I’m walking the string with a loop and removing all…
-
4
votes4
answers1341
viewsQ: An algorithm for finding repeated files?
I need to make a program that finds repeated files on my computer, so that the user decides what action to take with these files (e.g.: delete the copies). For now, I only care about a binary file…
-
1
votes5
answers3608
viewsA: Can the browser "remember" a password programmatically?
Anything stored in the browser could be targeted by an XSS in some way. And each browser will have its own method of storing fields (such as password or encryption key), which makes a universal…
-
7
votes3
answers3831
viewsA: Check if number is integer in Access
The function int( ) returns the whole part of the number. For example, intNumber = Int(902.3) would cause the intNumber variable to equal 902. In your case, just test if the number is equal to its…
-
3
votes3
answers4238
viewsA: How to find the internal IP?
An answer to this was posted on Stackoverflow in English by the user nodyou: https://stackoverflow.com/questions/3653065/get-local-ip-address-in-node-js var os=require('os'); var…
-
5
votes3
answers2560
viewsA: Database redundancies are always undesirable?
Maintaining your database with all non-repeated data, etc., is called normalization, and there are "5 normal forms" The reverse process, which you describe, is the denormalization: try to optimize a…
-
1
votes2
answers606
viewsA: Competitive when using time table
Possible solutions: 1 - Has a flag in some table (main table, temporary table, or any other table of your system) that indicates that the temporary table is in use or is free 2 - Make this task can…
-
7
votes8
answers7830
viewsA: Is giving a "SELECT" before an "INSERT" a safe way of not having duplicate records?
To think a little outside the box: Is there any restriction that the code column has to be numerical and sequential? By the way, what is its type? If it is numerical, what is the maximum value it…
-
10
votes2
answers2870
viewsA: Should I adopt the naming standard of my framework or team legacy?
If a particular framework has a pattern, following this pattern will always give you less trouble than adapting it to some reality. In your case, if Laravel and Cakephp have a Nomeclature format for…
databaseanswered woliveirajr 2,122 -
18
votes8
answers5920
viewsA: Is it always guaranteed that a multi-threaded application runs faster than using a single thread?
The parallelization of tasks will not always give performance gain. In the simplest situation: a single processor (chip), with a single core (core), without hyper-threading technology. All the code…
-
22
votes2
answers5784
viewsA: How to validate a Brazilian civil name?
In Brazil there are no restrictions on the names of people. The law only mentions that it cannot expose the person to ridicule, otherwise it is allowed. And yet nothing prevents a foreigner from…
validationanswered woliveirajr 2,122 -
3
votes2
answers694
viewsA: Return the total value of items calculated in a list
In Msaccess you can create fields and put their value equal to another form field / report. In your case, if I understand correctly, you will make a form that calculates the total of 3 sales, and…
ms-accessanswered woliveirajr 2,122