Jump to content

David Heffernan

Members
  • Content Count

    744
  • Joined

  • Last visited

  • Days Won

    54

David Heffernan last won the day on March 29

David Heffernan had the most liked content!

Community Reputation

579 Excellent

2 Followers

Technical Information

  • Delphi-Version
    Delphi XE7

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Sounds like the classic OOP trap of trying to solve all problems with inheritance. Good OOP programmers hardly ever use inheritance to solve problems.
  2. David Heffernan

    Problems running in 64 bit mega PC

    I mean that this thing is named as though it is an affinity mask. And on Windows that makes it pointer sized. So, NativeUInt.
  3. David Heffernan

    Problems running in 64 bit mega PC

    Affinity masks for pointer sized.
  4. David Heffernan

    Problems running in 64 bit mega PC

    Don't try to use more than 48 threads in that case
  5. David Heffernan

    Connection string encryption

    If the hacker gets the program, and there is a hard coded key in the program, then it's trivial to hack.
  6. David Heffernan

    Problems running in 64 bit mega PC

    Is it 96 cpus, or 48 with 2 threads per core? Is the memory NUMA?
  7. David Heffernan

    Connection string encryption

    Seems like it's not really worthwhile then....
  8. David Heffernan

    Connection string encryption

    So you don't mind if the security is easily circumvented?
  9. David Heffernan

    Connection string encryption

    Although do anticipate that any hacker will be able to see the plain text when you decrypt in memory.
  10. David Heffernan

    Random Access Violation?

    So often this is caused by a defect in your code. You supply an argument that is invalid. Perhaps an object that has already been destroyed. So full fastmm4 debug is useful. You would debug this by trying to create a minimal example that reproduces the issue. That's the starting point.
  11. David Heffernan

    Random Access Violation?

    No reason at all to suspect that multithreading is the issue here. You aren't likely to get good leads from people making random guesses. Hard debugging is the way forward.
  12. The WOL packet is also being routed it would seem.
  13. David Heffernan

    Random Access Violation?

    One of many possible explanations, but far from the only one.
  14. How many ports do you have open on your public facing router?
×