Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 8 years ago.
Improve this question
Wondering if I can create a heater/ coin miner combo that only turns on when the heater in my house is also on.
Is that possible? What are the limitations of this type of concept?
The best thing is to leave the fan blowing, while you don't need the temparature in the processor, but in the room. Therefore the fan needs to blow it into your room. Not to say that your processor needs cooling in order to maintain a reasonable life time.
As an collatoral benèfit the fans consumes power, and thus generates also (a little) heat.
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 3 years ago.
Improve this question
If I had a confuserex application with the most amount of obfuscation added (max preset) how would I deobfuscate it?
It is orders of magnitude easier to obfuscate something, the to de-obfuscate it. This question has a high likelyhood of having nefarious intent. And any practical help would just result in future obfuscation being way more agressive. A scenario worse for performance, debugging and reliability of hte obfuscated software.
About the only theoretical way I could think off, would having something like Visual Studioes/.NET JiT level code optimisation. They are capable of swapping out constructst for totally different, quicker ones. A optimsaition for speed. This would be a optimisation towards readability. But even that will not be able to recover names obfuscated with some placeholder name. But I do not want to think this any further.
Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 5 years ago.
Improve this question
I have a problem. I made some program with c# to help me in games. The logic is very simple. I used SendKey() method and low-level procs and they works correclly in software but doesn't work in games. any body has some idea?
Thank you all.
Avoiding Send keys is a pretty basic anti-cheat measure. And you did just explain why :D
Send Key only works if the other side is reacting to what the Windowing System is telling it. Games often use raw input, to have better reactiontimes and avoid everything Windows might do to the input. And this rather simply cheat/bot approach too.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
I am a new user of C# (for work), coming from C++ development. I'm used to knowing more or less how data is laid out, and how many levels of pointer indirection there are, as these things can be very important for performance.
I know I'm supposed to just relax and have a good time hammering out business software and not think about these details on the clock, but is there good documentation for this for C# somewhere?
I know there is compilation to IR, and then JIT to native code, so I guess I am asking about how C# source relates to the native x86-64 code.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I am near release date for my Excel Add-In and I want to have only one limitation hardcoded in the code. My aim is for people to download and use the tool for free but have a limitation that potentially encourages them to buy the unlimited version. I know that there isn't a truly secure way to add that limitation but I was wondering what is the best way of achieving it. The limitation is simply a hardcoded value that I store in the Properties section of my app. Any ideas how I can make it a bit more secure?
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 9 years ago.
Improve this question
I have to architect and design a web application which needs a dynamic scaling solutions. It needs to support a a few million requests during mornings (from approx. 10 AM to 12 AM), with only a few thousand requests during the rest of the day.
Same way, during a peek season or holiday seasons i should be able to support peaks of up to several million requests per hour.
I dont want to scale up or scale out statically, as the usage pattern of the site differs from time to time, so I'm looking into dynamic scaling.
What are some of the approaches to this problem? I am looking for best practices and experience report (public and private clouds).