Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Button



  File upload in PHP

File is a special kind of form data, when being uploaded to the server through HTTP POST request, PHP will create a $_FILES global array, the relevant file information will be stored in this global array. We will illustrate file upload with some code snippets using PHP and look into the internal work mechanism. Lastly will talk about file upload security. File upload In order for users to upload files in client side, we have to provide a form on the user interface. Since the uploaded file is a s...

   File upload,PHP     2012-11-30 22:01:28

  Cracking Siri

On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...

   Siri,Cracking,Defect,Speech to text,Record,AI     2011-11-15 08:38:23

  LESS/SASS/Stylus development tools summary

LESS,SASS and Stylus are more and more popular among developers. More and more people are using these three tools now. Here we introduce some development and testing tools which can make our development process simpler. SublimeText Many front-end developers are now using Sublime Text 2 as their main text editor, there are many plugins in Sublime Text as well. We can use Ctrl+Shift+P –> install package to search relative plugins. Less Sublime Less build Sublime Less2css Less snippets Su...

   LESS,SASS,Stylus,CSS     2013-02-23 22:45:02

  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  6 Tips to Help You Build a Great Web Application

Web applications are a little more challenging to design than websites. Designers need to anticipate user behavior, make users’ lives easier and make the experience as visually appealing as possible. Many designers tend to do what is easier for them than think about what’s easier for the user. The following is a small list of tips that designers often overlook in the process of designing a web application.1. The Power of a Good TooltipWhen you present your web application to a...

   Web design,Mobile device,Library,Style     2011-11-25 03:02:11

  Pagination or continuous scrolling? It's a question

No matter in web page or mobile applications, information often can not be displayed on one page all alone, there needs some interactive modes which can expand page information: Pagination and Continuous Scrolling are very common interactive modes. Every day we may see them, they are so common that we do not even feel their presence, when browsing to the bottom of the page, we will see it. But it's difficult to choose which mode to use in design. Here we have a discussion on these two modes. Pag...

   Pagination,Continuous scrolling,Design     2012-09-12 19:55:51

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20

  The Anatomy of a Perfect Web Site

Many sites on the web are good. They are well-designed, clear, have great information architecture and are easy to navigate. Often, web designers emphasize the “design” part too much, and neglect the other equally important things. However, there are sites which aren’t that aesthetically pleasing, but still are the best sites in the world. They may look like a big, sad bag of wrestling underwear on the outside, but their underlying user experience is really, really refine...

   Website,web design,Anatomy,Interaction,Feature     2011-11-08 09:00:34

  How to let Google index AJAX contents?

There are lots of websites containing only one page now with the popularity of AJAX. The website will load different contents according to different inputs from users. This approach provides good user experience and it also helps save bandwidth, the drawback is that AJAX contents are not easy to be indexed by search engines. For example, if you have a website: http://example.com Users can see different contents with the appended # structure in the URL: http://example.com#1 http://example.com#2 h...

   AJAX,Search engine,Google,History     2013-07-16 00:47:14

  Examples of bad design

Good designs always help users solve their problems in a convenient and familiar way. It takes little or no time for users getting used to the product with a good design. In contrast, bad designs frequently introduce confusion and complexity to users. Before we design any product, we should think carefully about every aspect of the product. We share some really bad design here to show how they can affect people's life. 1. USB Connector Have you ever put one in right on the first try? We frequen...

   Bad design,Usability,Web design     2013-09-25 22:57:49