Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: programming through C  (Read 8286 times)

0 Members and 1 Guest are viewing this topic.

Carbon Dudeoxide

  • Global Moderator

  • Mastermind
  • Thanked: 169
    • Yes
    • Yes
    • Yes
  • Certifications: List
  • Experience: Guru
  • OS: Mac OS
Re: programming through C
« Reply #15 on: January 31, 2010, 12:17:30 AM »
Took me three tries to read your second line, Joker.

Why Do You Capitalize The First Letter Of Every Word?

the_mad_joker



    Apprentice

    Thanked: 8
    Re: programming through C
    « Reply #16 on: January 31, 2010, 01:21:48 AM »
    Cant Help   :'(

    I 've Got A Habit of It :-*

    Salmon Trout

    • Guest
    Re: programming through C
    « Reply #17 on: January 31, 2010, 01:35:23 AM »
    Cant Help   :'(

    I 've Got A Habit of It :-*

    Well, maybe it's time you gave it up, at least on here. Along with various other unfortunate little "habits" you seem to have, it makes you come across like a dumb cheeky trolling kid, which I am sure you would wish to avoid, not least because it makes people less willing to answer your questions.

    « Last Edit: January 31, 2010, 02:10:39 AM by Salmon Trout »

    BC_Programmer


      Mastermind
    • Typing is no substitute for thinking.
    • Thanked: 1140
      • Yes
      • Yes
      • BC-Programming.com
    • Certifications: List
    • Computer: Specs
    • Experience: Beginner
    • OS: Windows 11
    Re: programming through C
    « Reply #18 on: January 31, 2010, 08:46:45 AM »
    There Is a Thing called "Ethical Hacking"

    No there isn't. Is there something called ethical burglary or ethical theft? No. "hacking" has come to mean breaking into computer systems without permission. It's burglarly. Penetration testing is not "ethical hacking", because it's done by professional Programmers and security experts; maybe they <used> to be hackers, but now they are professionals. a hacker is by definition unskilled (trust me, I've seen threads in "professional" hacker forums where people spend pages trying to simply attach a picture).

    Penetration testing, on the other hand, is done with the permission of the owner of the system; this is equivalent to having a burglary test done on your house.

    I was trying to dereference Null Pointers before it was cool.