SEARCH KEYWORD -- Built-in server
Check if query string variable exists ASP.NET C#/VB
One of the problems I encountered when I started programming ASP.NET websites was to do with the Request.QueryString function. The first projects I was worked on were built with VB.NET and I used the following code to check the existence of a query string variable:VB.NET Codeview plaincopy to clipboardprint?If Request.QueryString("[VARIABLE]") <> Nothing Then 'CODE HERE End If This code check...
ASP.NET,Query string,Request,Empty,NULL,Check 2011-11-05 15:29:50
CSS and HTML5 responsive images
With the popularity of Retina screen, the requirement of the images in the webpages is higher. How to make sure the image still clear while enlarging twice on retina screen? This brings much trouble to web developers, the good news is CSS3 and HTML5 is trying to change this, we can use response image. What is responsive image? It means user agent loads different images according to different resolutions of output devices, it will not waste bandwidth as well. In addition, it can load respective ...
CSS3, HTML5,image-set,responsive image 2013-03-10 03:30:07
Please Steal These webOS Features
When Apple introduced the first iPad in 2010, I bought one immediately. I didn’t know what I’d use it for, but I was sure that I would find some use for it. I never did. I played around with it, wrote some code for it, but eventually stopped using it. I would pick it up from time to time to read something or watch a YouTube movie, but even that was a rare occurrence. I have since picked up an iPad 2, and I’m using it a lot more than the first iPad, but again, I’...
3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe
Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...
TECH 2019-11-29 00:29:40
ECMAScript 5 Objects and Properties
ECMAScript 5 is on its way. Rising from the ashes of ECMAScript 4, which got scaled way back and became ECMAScript 3.1, which was then re-named ECMAScript 5 (more details)- comes a new layer of functionality built on top of our lovable ECMAScript 3. Update: I've posted more details on ECMAScript 5 Strict Mode, JSON, and More. There are a few new APIs included in the specification but the most interesting functionality comes into play in the Object/Property code. This new code gives you th...
ECMAScript,Object,Property 2012-01-29 04:38:50
SQL Injection through HTTP Headers
During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...
Code security,SQL injection,HTTP header 2012-04-05 11:42:04
Why Programmers don’t have a High Social Status?
Up to date there is No single street name for a top programmer or computer scientist in any of the Top 20 most developed countries in the world during the last 60 years. There is no statue built in the center of a major city for a renown programmer or computer scientists. No “Presidential Medal†or “Congressional Gold Medal†has been awarded to a computer scientists or programmer. There is no nationally televised social reward ceremony for computer programmers and scie...
Propgrammer,Social status,Remember,Achievement 2012-01-04 02:43:05
File System vs Core Data: the image cache test
Code for this project is on GitHub While doing a full re-write of Droplr's iOS app for the 2.0 launch, I couldn't find any good file/image caches out there had a particular feature I really wanted: extending item expiration whenever it's touched. I set out to write my own — which wasn't that much of a challenge — but somewhere along the process I had this crazy idea that perhaps (SQLite-backed) Core Data would be a much better tool for the job: No mismatch between cache index ...
File system.Image cache,Multimedia 2012-02-01 08:52:02
Oracle CEO Mark Hurd : IBM PureSystem is far behind Oracle
Oracle CEO Mark Hurd had an interview with Chinese media in San Francisco on 19th April. Mark Hurd first introduced different levels of Oracle's overall strategy: 1) the product must achieve best among similar products; 2) system open, vertical integration to provide customers with maximum performance; 3) Industry specific solutions; 4) give users the right to choose and the integration of the cloud environment (private cloud, public cloud, mixed cloud). In addition, Mark Hurd share his own...
Oracle,IBM,Pureystem,Hardware/Software 2012-04-19 07:17:24
What’s Your Start-up’s “Bus Count� 7 Myths of Entrepreneurship and Programming
Software development is a rapidly evolving field that got off to a very rocky start. Conventional wisdom for many years was that software engineering should be like other types of engineering: design carefully, specify precisely, and then just build it – exactly to spec. Just like building a bridge, right? The problem with this approach is that software is just that. Soft. It’s endlessly malleable. You can change software pretty much any time you want, and people do. A...
RECENT
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- more>>