Jump to content

John

Members
  • Content Count

    1,760
  • Joined

  • Last visited

Everything posted by John

  1. 1) Place this tag <IMG src="./offers/offer.png" alt="Deal of the day" /> somewhere on the home page. 2) Create an "/offers" folder on the server. 3) Place 7 images called "monday.png", "tuesday.png", e.t.c. inside the offer folder 4) Create a .htaccess file containing the following text (untested) RewriteEngine On RewriteBase / RewriteCond %{TIME_WDAY} 0 RewriteRule ^sunday.png$ offer.png RewriteCond %{TIME_WDAY} 1 RewriteRule ^monday.png$ offer.png RewriteCond %{TIME_WDAY} 2 RewriteRule ^tuesday.png$ offer.png RewriteCond %{TIME_WDAY} 3 RewriteRule ^wednesday.png$ offer.png RewriteCond %{TIME_WDAY} 4 RewriteRule ^thursday.png$ offer.png RewriteCond %{TIME_WDAY} 5 RewriteRule ^friday.png$ offer.png RewriteCond %{TIME_WDAY} 6 RewriteRule ^saturday.png$ offer.png 5) Put the .htaccess file in the /offers folder. This can be wrapped up in 15 minutes. Beside, I'm not recommending they do it this way. I'm just presenting a possible solution and it is up to the OP to make their own mind up whether this solution is for them. I have no idea if they have apache nor do I know if having the offer displayed just as an image is an option for them. ---------- Post added 06-08-2014 at 11:29 ---------- Given the frequency of the image changes it is likely to need a line with no-cache header rule in the .htaccess
  2. If your website is running off an apache web server then you could add a .htaccess file and add rules to serve a different offer images based on day of week. If this approach is a workable solution, then this is the quickest and easiest way if you do not have any server side scripting / sql knowledge to do it the "Correct" way.
  3. If you, or anyone else for that matter, ever plan to do work for free in order to build a portfolio then contact charities instead of businesses.
  4. I'll do it! Best I can offer you for your idea is to put your name in the credits.
  5. Maybe the recent electrical storm may have something to do with it?
  6. As a software developer I would never ever sign a NDA because I have no idea that an idea presented is closely related to something that I may or may not be working on now or in future and could severely restrict my career path.
  7. Re-read what I wrote... Still not convinced? Google Poor mans copyright.
  8. This won't work. Nothing stopping you from sending yourself an empty UNSEALED envelope to yourself. You can then enter in anything you like years later and make false claim you invented product X.
  9. This might be worth attending: http://www.eventbrite.co.uk/e/growoffshore-wind-for-yorkshire-and-humber-tickets-12136527681?aff=es2&rank=13
  10. The implementation within each function are different, they re-wrote all of these apart from 9 lines of code mentioned - What left is the API. Despite the implementation being totally different, the function names remained the same - this would be no longer be "JAVA" if these were changed and so could not be changed if you want to retain interoperability. You cannot change names of public structures, nor the order within the structure and maintain interoperability so these have to remain the same. Yes, they copied the file with 7000 lines of code instead of recreating it - they broken copyright laws here despite JAVA being "open"! They could have written a script to recreate this file automatically by scanning the directory reading each package and build up the declaration that way. This with exception of the public structures which needs to be done by hand. Yes, they copied it, but if they did it from scratch, then the content of this file would have been exactly the same, albeit different order, as there is no other way to declare the same thing. Hence it is essential to the interoperability of JAVA. Judge Alsup’s Key Findings of Non-Copyrightability section is worth a read: http://www.americanbar.org/publications/landslide/2012_13/november_december/java_api_copyrightability_put_the_test_smartphone_technology_battle.html#ref72
  11. They rewrote the entire code base but kept the API naming convention. They got caught out with 1 function that contained 9 lines of code as being same - see page 52 onward in pdf - http://www.groklaw.net/images/GoogleOpeningStatementSlides.pdf There was one file, containing 7,000 lines of code, which contains the entire API declaration that was copied but looked as if it wasn't part of this court case. It is mentioned in the second grey box here http://www.groklaw.net/articlebasic.php?story=20130528214954679
  12. I'm no accountant but... I think your statement would read correctly if you wrote: If Amazon made £4.3 Billion sales NET PROFIT then their tax worked out at 0.1 percent if they paid £4.2 million. So I doubt 0.1% is correct unless you meant to say net profit and not sales.
  13. Very good for checking if anyone steals your images. I've looked on a few tradesmen / builders websites and used image check to see if they is a chance they are lying about the work they have carried out. When you see 10+ sites claiming they done the same work then this is a clue that maybe you should look elsewhere.
  14. Simply put the hacker lied to the server. First of all let talk about memory and how it works. Memory is a shared resource and because it is not infinite, it eventually runs out. To prevent this from happening, programs allocate blocks of memory as and when needed and free it when it no longer want it. This system prevent memory from running out quickly. When memory is freed, it goes back in what is called a free memory pool so it can be reused elsewhere. The problem is, when you free or allocate reused memory, the previous owner's content of this memory is never cleared by the OS. Bearing the above in mind, let look at what the hacker did... The hacker send a string to the sever with the word "HELLO" and he says this string length is 65536 characters long. That is a lie as the true length is 5 characters but the sever believes him when he says it 65536 characters long. The server then allocates 65536 bytes of memory. Now when the server allocated this memory it could have been a recycled block of memory that was once used elsewhere it could also contains vital information such as passwords and credit cards, e.t.c. Anyway, once 65536 bytes was allocated by the server, it proceeded to write "HELLO" at the start of this memory buffer wiping out the first 5 bytes of it but leaving then other 65531 bytes intact. The server then send 65536 characters back to the hacker. What the hacker then get back is a string containing "HELLO" followed by 65531 characters containing what is effectively garbage. Now this garbage, could contains someone's password or credit card number.
  15. It is a programming error / bug - no one is perfect and it is only obvious once you've are made aware that this is a problem. If you reboot the server your data is lost because it is held in RAM. However, it is possible that your data is held in VM (Virtual memory) in which case, this data was stored on the server hard drive. Despite there is a possibility of your data being stored on the hard drive it is not possible after rebooting the machine that any data held in VM can be recovered just by doing a memory allocation. By "Not possible" one assume there isn't a bad implementation / bug in the actual VM management itself but this is highly unlikely due to design.
  16. Everybody doesn't get the same ads you are seeing. If you have been getting singles ladies in your area kind of ads, then it is likely you have been on other sites looking at single ladies. Go to http://www.johnlewis.co.uk and browse the TV section. Come back on here then your single ladies ads are likely to be replaced with john lewis TVs ads.
  17. Do you have it in writing anywhere that you will be paid within 7 days of the invoice date?
  18. That area floods quite often. Quite ironic really because there is a large pipe that runs under that section of road which happens to be a thoroughfare for a stream.
  19. And... that a problem because... ? 2012 event was first advertised in August 2011 and the site NEVER got updated leading up to the 2012 event. 2013 event was first advertised in May 2013 and the site NEVER got updated leading up to the 2013 event. 2014 event was advertised in August 2013, so far like the previous years this site hasn't been updated and I doubt we'll be seeing any updates until dates for 2015 are confirmed or it has been cancelled. Till then... it is on.
  20. 110th Annual Norton Show, Saturday 9th August 2014 According to http://www.nortonshow.co.uk/
  21. You can see it hailing on the peregrine - see live video http://efm.dept.shef.ac.uk/peregrine/
  22. The camera for sheffield one really is in a bad position as a little more than 50% of the view is outside of the box, i.e. on the logo. So, when the birds are being perched on the edge of the box its head part of their body is cut off from view. How did they managed to get peregrine Falcons nesting in those boxes in the first place?
  23. Can you tell us more about the games festival in Sheffield? Like where and when.
  24. The BBC website has a feature about this today: http://www.bbc.co.uk/news/uk-england-south-yorkshire-26478728
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.