Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 9 years ago.
Improve this question
Recently I attended an interview, where the interviewer asked me the following questions in technical face to face interview:
How does Sticky Notes works?
How Windows is able to preserver the data even though it is not saved explicitly?
How the data is preserved even when the system crashes?
I've no idea how does it works. Tried googling, but I couldn't find any useful information.
Can anyone explain or give some information?
I agree with #Vii's response. He has the right information about where the file is stored.
I have found some forensic background on this file here:
http://www.forensicswiki.org/wiki/Sticky_Notes
It seems like the SNT file has 3 datastreams, 0,1 and 3. Stream 0 stores information in RTF form and Steam 3 stores the actual text in Unicode format.
The Root Entry of the storage stream has a timestamp associated with it and you can use tools like MiTec Storage Viewer, Sticky7List to view the creation and modification times associated with the file. You can create a sticky note and observe when it creates the datastream and modify the sticky note and monitor how it modifies the file.
Some helpful references:
http://www.pcworld.com/article/191453/sticky_notes.html
https://superuser.com/questions/396698/how-to-retrieve-contents-of-stick-notes-directly-from-file-system
http://www.forensicswiki.org/wiki/Sticky_Notes
http://computer-forensics.sans.org/blog/2010/10/19/digital-forensics-stuck-stickies-2
http://windowsir.blogspot.com/2011/08/sticky-notes-analysis.html
Sticky notes are written to a file which you can find at '%appdata%\Microsoft\Sticky Notes\StickyNotes.snt' and since there is not an explicit 'save' option, it should be flushing the content to that file as you write it and hence the data is preserved in case of a system crash.
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 months ago.
Improve this question
Hail all:
Though I am 52, and active with computers since 1986 (those were more oversized calculators, to be correct), i have no idea what is meant with Form Data.
I know, I know, this is insane, but i just never came across this before.
Might be, I DO know it, but by a different name, maybe Dutch.
Still I am quite stuck, to be quite honest.
Tried to google it, got heaps on information as to how to clear it, restore it, save it, unsave it, ... , but nowhere an in-depth explanation of what is meant with form Data.
Now, I am building a Batch File, for speed-cleaning of certain data, when my Firefox starts to get slow ... .
Came across the "erase Form Data" command, but nae clue as to what Form Data is.
Thank you.
Ben
That rundll32 command only applies to Internet Explorer and will not touch Firefox.
Anyway, form data is data entered into html forms like your name, address and telephone etc. These form fields are edit boxes, check/radio buttons and drop-down selectors.
Firefox has its own setting to clear form data when you close the browser. Form data is very low on the list of what slows down your browser...
Closed. This question is opinion-based. It is not currently accepting answers.
Want to improve this question? Update the question so it can be answered with facts and citations by editing this post.
Closed 4 years ago.
Improve this question
I'm writing an online whiteboard application for fun, where multiple users view the same whiteboard and can draw on it. I'm using websockets (vanilla JS on the frontend, Scala on the backend), and right now am essentially just broadcasting mouse events from one user to the rest of the users, and rendering the image client-side.
However, this results in a transient shared state, whereas I would like to have users be able to hop on at any time and see the preserved shared state. I'm thinking this will probably require having shared rendering code on the backend and the frontend, so that clients render events as they stream but the server can send raw image data when clients associate.
So my question here is: what are some other design patterns I should be aware of for this kind of project? This is a for fun/learning project, so this is an open-ended question, but I'll accept an answer that contains some useful references for this kind of data flow.
So my question here is: what are some other design patterns I should
be aware of for this kind of project?
You don't have to have rendering code on the server. You can just save all the accumulated events that led to the current whiteboard and send those to a new client and let the new client render the whiteboard for itself as if they were listening when all the events originally happened.
If that's more data than is practical, then you can compress raw events. For example a straight or nearly straight line segment does not need all the intervening mouse positions, it really just needs the first and last position of the segment.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
How to avoid mistakes 41 (DataBase.dct)? I work in FoksPro. My file is corrupted. How to save me my table?
On kompyuetere besides my other work tasks .Klient turns my task and work in another, then back at me and an error is 41, that is corrupt memo-file database. Sometimes peeled off the first file in the database and the file is checked.
In FoxPro (VisualFoxPro), if you have a database container, you will have files with the extensions of
.DBC -- The .dbf equivalent representing the database container
.DCX -- The .cdx equivalent representing the indexes for the database container
.DCT -- The .fpt equivalent (memo file content) for the database container.
So, if the database container is whacked, you may just need to go to backups as the database container really doesn't change much.
If you have a specific individual table (based on actual .dbf, .cdx, .fpt file extensions), then the memo file could be corrupt. I don't know of an easy way to repair corrupt memo files, but did write an answer out here on how the .FPT file is formatted to get the content out at low-level file handling.
That said, can you confirm if it is a database container corruption, or an individual table corruption... And also if an individual table, how large is the file and how critical is the content of the memo file content to the table vs something like generic notes that could be easily done via manual re-entry (in case partial recovery of memo is possible).
If a .FPT, .VCT or .DCT is missing, you must replace it. You might have to get it from a backup. If you can't get it from a backup, you will have to re-create the file.
If it is corrupted, you can look for a tool to repair it. It's hard, though.
Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 4 years ago.
Improve this question
All,
I'm interested in the ability to retrieve a specific element within a FHIR resource using a single URL call. For example, suppose I'm interested in the gender of my patients. I would read the using the URL, without having to walk the XML node path every time. Right now, this functionality does not appear to exist. What do you think about the usefulness of this? Would like to get a sense of the community interest. Thanks.
-Jeff
For the default query mechanism, you can't bring anything back other than the full resource. (And don't even have a guarantee that the desired element will be present on all instances of the resource unless that element was part of your search criteria - in which case, why bother asking? :>). There's a new mechanism for defining custom queries. Refer to _query in the search/query section of the FHIR spec. However, it's not clear whether this will allow retrieval of anything other than full resource instances either.
This functionality does not exist at this time. It's on the wishlist, and we're trying to decide whether we can frame it in a sensible and safe fashion. The case you describe is relatively obvious, but many others aren't. And, in fact, when I think about it, it's not really clear to me how it works. what do you get back? just the gender element? so the server needs to - in effect - do the node walk for you, and you get, instead, to deal with a profusion of different schemas. It's not really obvious to me that this is a net saving for the client, and it's certainly a greater cost for the server.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I was reading this article on how to secure my website from attacker i stopped on these line and i was trying to figure out what they mean by it
you cannot rely on the file extension or the mime type to verify that the file is an image
as these can easily be faked. Even opening the file and reading the header, or using
functions to check the image size are not full proof. Most images formats allow storing a
comment section which could contain PHP code that could be executed by the server.
What do they mean by Most images formats allow storing a comment section ?
link : http://www.netmagazine.com/features/10-essential-security-tips-protect-your-site-hackers
Well, just like you can store a comment inside an MP3 file, a lot of image formats also make space for a comment. A comment is just a short bit of text to describe the file.
Lots of applications now are able to extract just a little bit of information from a lot of different file types, and the risk is that your PHP code, while extracting the comment from an image file (a relatively easy task) may run the risk of incorporating any PHP code stored in the comment into your PHP code.
Essentially, this exploited a bug in PHP, kind of similar to a SQL injection exploit. Most HTTP servers, however, when sending images, send them as binary so you needn't worry too much about image files on web-pages being a threat.
Just make sure that any image work you do doesn't try and interpret the comment section, instead pass it through a formatter/sanitizer to ensure that the content of an images' comment section, if retrieved, is not just inserted into the HTML at the point of displaying it.