Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Command window



  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  â€œBuild something people want” is not enough

Most people take “Build something people want” to mean “Pick a problem to solve and solve it well.” This is not sufficient to build a world changing company.“Why now?” is the question entrepreneurs really need to answer. “Why now” encompasses two important and closely related concepts:Why have previous attempts at this idea failed?What enabling factors have emerged that enable you to succeed today?The world is full of smart people who have the same...

   User requirement,User friendly,Example,People needs     2011-11-16 08:18:45

  JavaScript cross domain request solution

1. What is cross domain? We may often using AJAX to request data from other domain, now we will have cross domain request issues. It's because JavaScript only allows to request data from the same domain because of security consideration. In short, same domain strategy means a piece of code can read data from the same source, the same source here means the combination of the same domain, protocol and port number. For example: URLDescriptionAllow communication? http://www.a.com/a.js http:/...

   AJAX,cross domain,security     2013-03-13 20:04:52

  Shell script common interview questions

Shell script is frequently used when monitoring system status on Linux. It's not an easy task to write shell script but it's a very important skill for developers and system administrators to ease work and automate common tasks. This post will share some common interview questions about shell script. 1. Get random characters(8 characters) Method 1 # echo $RANDOM |md5sum |cut -c 1-8 471b94f2 Method 2 # openssl rand -base64 4 vg3BEg== Method 3 # cat /proc/sys/kernel/random/uuid |cut -c 1-8 ed...

   LINUX,INTERVIEW,SHELL SCRIPT     2018-09-28 10:46:00

  How I Became a Programmer

I posted a very brief response to a post on HackerNews yesterday challenging the notion that 8 weeks of guided tutelage on Ruby on Rails is not going to produce someone who you might consider a "junior RoR developer." It did not garner many upvotes so I figured that like most conversation on the Internet it faded into the general ambient chatter. Imagine my surprise when I woke up to couple handfuls' worth of emails from around the world asking me what I did, how I did it, an...

   Programmer,Advice,Method,Study     2011-11-24 09:14:50

  Different types of keystore in Java -- BKS

BKS is a keystore format provided by the popular third party Java cryptographic library provider -- BouncyCastle. It is a keystore similar to the JKS provided by Oracle JDK.  Before starting to use BKS, the BouncyCastle provider has to be downloaded and installed. To download the provider, please go to BouncyCastle download page. The provider can be installed by adding an entry in the java.security file. security.provider.N=org.bouncycastle.jce.provider.BouncyCastleProvider N means the pr...

   JAVA,KEYSTORE,BOUNCYCASTLE,BKS     2016-07-03 03:00:18

  Using Nlog Logging Framework With Vnext In Asp.Net

In this article, asp.net development company experts will brief you about asp.netVNext and its features. They will also explain how to use NLog Logging framework in Asp.net. Read this article and learn what they want you to understand. Overview of Asp.Net VNext The next level of Asp.Net after Asp.Net 5 is Asp.Net VNext. Currently, the code is run in Asp.Net with same CLR as that of desktop apps. There is a need for cloud optimized version of Asp.Net for getting higher throughput with lesser memo...

   ASP.NET ,ASP.NET DEVELOPMENT COMPANY,ASP.NET VNEXT     2016-10-26 01:14:53

  Using Fabric to deploy web app

Many people may use FTP and rsync to synchronize codes to server, this way is fine but it may be troublesome when you need to deploy many times a day, actually there is a simple way if you can spend time on finding the fast way. We introduce Fabric today for deploying web app to remote server. Fabric is a deployment tool written with Python, the biggest feature if it is you no need to login to remote server, you can execute remote commands locally. Here is s simple deployment script written with...

   Fabric, Web deployment,SSH,Python     2012-12-08 03:16:00

  Create an adaptable website layout with CSS3 media queries

With the rise of both very large screens and mobile devices, web developers have to be able to create websites that display correctly and look good whatever the device is. Sure, you can use good old techniques like fluid layouts, but I’ve got something better to show you today. This tutorial will teach you how you can create an adaptable website layout using CSS3.Getting startedView demo (Horizontally resize your browser to view it in action)Download filesCreating the default layoutT...

   CSS3,Media,Mobile device,Resize,PC,@medi     2011-09-20 12:38:27

  PopCap’s 10 rules for commercial failure in mobile games development

PopCap, the company behind social gaming hits as Plants vs. Zombies and Bejeweled, has a way of doing presentations at conferences. Last year’s Social Gaming Summit presentation was insightful in the sense that developers were advised to postpone trying to make money from their game until there is some serious traction. At yesterday’s London Games Conference, PopCap’s presentation was equally remarkable. During a brief presentation David Bishop (Senior Game Designer) ...

   Game design,Rules,Smart phone     2012-04-16 13:25:27