Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Microsoft Security



  How Technology Can Prevent Casino Cheating

Cheating has been around as long as gambling itself, which is surely since the dawn on of time. Cheating in casinos, both land based and online, can prove a huge problem, not only for those playing against the cheater, but for the individual casino operators, as well as the industry in its entirety. Preventing cheating makes casino play fairer for all involved, both operators and their clients.Fortunately, in today's day and age, we have excellent, highly developed technology that can assist cas...

   Technology,Casino     2015-07-13 02:52:44

  Top 10 PHP Best Security Practices for Sys Admins

PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...

   PHP,code security,System admin,Advice,Best practice     2012-02-01 00:04:37

  Is programmer really profession for youth only?

- dedicated to the new programmers just into the workplace.

One young Chinese friend asked me: is programmer meant only for less experienced youth? Should I consider transition once if I work on it until 30 years old?

   Programmer,Youth,Product,Project,Career,Analysis     2012-03-18 07:06:44

  Generate certificate in Java -- Self signed certificate

This is the first post in this series which I will show you how to generate SSL certificate in Java programmatically. Certificates are frequently used in SSL communication which requires the authentication of server to client. This is to make the client to trust that the server is actually the one it claims. Certificates are really important on the Internet. All HTTPS communications on the Internet need the server side to present their certificates signed by trusted CAs. The basic flow of a requ...

   Java,Certificate,X509     2014-07-30 07:42:18

  Windows 8 price is unveiled

Although it's still half month away from releases of Windows 8, Microsoft releases price of all versions of Windows 8 on Windowsteam blog. From now on, users can pre-order this product on Amazon, Bestbuy, Staples and Office Depot. The prices for different version : Windows 8 Professional Upgrade : $69.99 Windows 8 Pro Pack-Product Key Card : $69.99 Windows 8 64 bit(Full Version) -- OEM : $99.99 Windows 8 32 bit (Full Version) -- OEM : $99.99 Windows 8 Professional 32 bit (Full Version) -- OEM ...

   Windows 8, Price     2012-10-12 20:03:55

  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  How I Develop Things and Why

I've always considered myself a bit of a software junkie. Nothing excites me more than a great piece of new software. Some of my best childhood memories are our trips to Grandma's house, where I'd have access to a computer with a dial-up connection that I'd use to obtain freeware and shareware. I'd bring 4 or 5 floppies with me and try to cram all the games, waveform editors, and utilities that I could sneaker-net home. Luckily today, excellent software written with passion oozes out of ...

   Development,Software,Why,How,Experience     2012-01-28 07:01:34

  Beauty of code : How to write graceful PHP code

Writing good code is an art. In order to achieve this, it is necessary to develop good programming habits at the beginning. Good programming habits not only contributes to the early project design (modular),but also allows you to the code easier to understand, so that the maintenance of the code is easier. Bad programming habits will result in more code bugs, and will make future maintenance work difficult. We introduce some good programming habits taking PHP as example. Hope this will help you....

   PHP,Good code     2012-08-26 12:23:03

  Native Client Brings Sandboxed Native Code to Chrome Web Store Apps

Wouldn’t it be great if you could create web apps using your existing C and C++ code? Native Client lets you do just that, and it is now enabled for Chrome Web Store apps in Google Chrome’s beta channel. Native Client apps live on the web platform, so you don’t need to create separate versions of your app for each operating system. Rather than relying on OS-specific APIs, Native Client apps use Pepper, a set of interfaces that provide C and C++ bindings to the capabilities o...

   C++,Web application,Native Client,Useful     2011-08-24 02:23:03

  Yahoo is going to recycle inactive user IDs

According to Sina Tech, Yahoo announced that it would provide users with shorter, more lovely and more memorable Yahoo IDs starting from July 15. For IDs like emily@yahoo.com, if they are in inactive status in the past 12 months, then other users will be able to get this ID. Yahoo plans to reset Yahoo ID system to help users get the ID they want in mid of July. By mid-August, users who apply for a Yahoo user ID will be informed what kind of ID they get.This means that users can apply multiple ID...

   Yahoo,ID recycle     2013-06-12 21:22:15