Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Key-base cache



  Hide a file in a picture

Sometimes if you want to hide some important files on your computer which you don't want others to see, how would you do that? Find a professional tool? Set password for some folders? Change the file properties to hidden? They are possible, but they may not be so convenient or so secure. Here we share with you how to hide a file in a picture. Prerequisites 1 picture for example : test.jpg 1 test file, for example : test.txt WinRAR Steps Prepare the picture test.jpg and test file test.txt Use ...

   Trick,Picture,Fil hiding,WinRAR     2012-09-13 19:36:36

  Windows 8 price is unveiled

Although it's still half month away from releases of Windows 8, Microsoft releases price of all versions of Windows 8 on Windowsteam blog. From now on, users can pre-order this product on Amazon, Bestbuy, Staples and Office Depot. The prices for different version : Windows 8 Professional Upgrade : $69.99 Windows 8 Pro Pack-Product Key Card : $69.99 Windows 8 64 bit(Full Version) -- OEM : $99.99 Windows 8 32 bit (Full Version) -- OEM : $99.99 Windows 8 Professional 32 bit (Full Version) -- OEM ...

   Windows 8, Price     2012-10-12 20:03:55

  Popular Golang JSON libraries evaluation

JSON (Javascript Object Notation), a prevailing data exchange format, is widely used in various platforms and languages. Golang, of course, will never miss the support for JSON. And with its own standard library, such as those interfaces like the REST API from the API Service in Kubernetes, it can easily process JSON. Although Go’s library works great, we can still seek those open-source JSON libs in Github to maximize our efficiency. Then the features, performance, applicability of these ...

   FASTJSON,JSON LIB,JSON LIB COMPARISON,GO-JSON     2021-12-11 23:13:23

  Asus ZenBook 3 vs MacBook: Has Apple Met Its Match?

With its upcoming ZenBook 3, Asus is the latest company to compete with Apple's superthin 12-inch MacBook. Due out later this year, the 12.5-inch laptop is even slimmer than the MacBook and one-ups Apple's offering with a faster CPU and a range of fashion colors. Though we haven't been able to test the ZenBook 3 in our labs yet, we've studied the specs and spent some hands-on time with the slim system to learn about its capabilities. So based on what we know today, which superslim not...

   ZENBOOK 3,PREMIUM LAPTOP,MODEL WITH 8GB,ASUS     2016-06-07 01:15:56

  Game Development Essentials #1 - Don’t use inheritance for your game objects

I recently released my first game, X Fleet, available now in Android Market. It’s a fast paced space shooter / rpg riddled with awesomeness and you should get it now. The reason you should avoid hierarchies/inheritance is your objects will be far too varied and complicated in form to be accurately represented as such. More on this below.  The alternative is a component model. This is very basic. Instead of having everything inheriting (e.g. Object -> MovableObject -> Animat...

   Game design,OOP,Inheritence,Game object     2012-02-07 06:26:40

  Set PHP session timeout

There are many different discussions about PHP sessions. We may often face some weird issues while handling PHP sessions. Sometimes session is expired earlier than expected. Or sometimes the session is not expired. This introduces many confusions. Today we discuss how to set PHP session timeout correctly today. In php.ini, there are three key parameters which will affect the session timeout. session.gc_maxlifetime, session.gc_probability and session.gc_divisor. session.gc_maxlifetime defined the...

   PHP,session,timeout     2013-08-31 08:11:03

  Signs that you're a bad programmer

1. Inability to reason about codeReasoning about code means being able to follow the execution path ("running the program in your head") while knowing what the goal of the code is.SymptomsThe presence of "voodoo code", or code that has no effect on the goal of the program but is diligently maintained anyway (such as initializing variables that are never used, calling functions that are irrelevant to the goal, producing output that is not used, etc.)Executing idempotent functions multiple times (...

   Sign,Programmer,Characteristics,Knowledge,Skill     2011-10-20 08:56:16

  FUCK PASSWORDS

I'm so tired of passwords. So, so, so tired. Most people don't understand this. Most people use the same password everywhere. Most people can just mechanically type out password3 in every password box, smirking to themselves at how clever they are, because who would ever guess 3 instead of 1? I don't do that. Let me tell you what i do. I generate a different password for every service, based on a convoluted master password and the name of the thing. I do this because it's what you're...

   Security,Password,Random generation,Hard to remember     2011-12-05 11:32:45

  Generate signed certificate from CSR in Java

In our previous tutorial, we have explained how to generate CSR which can be sent to CA for generating a signed certificate. In this tutorial, we will explain how to generate the signed certificate from CSR in Java. We will not use an actual CA but a self-signed certificate to act as a CA certificate. Since the CSR contains the subject information where a certificate needs to be generated and signed for. The key here is to extract the subject information from the CSR and then set it as the subje...

   JAVA,CSR,SIGN CERTIFICATE     2020-10-24 07:03:17

  A mini post on GoLang context

In a GoLang web server, every request coming in will be handled by a goroutine. In the request handler, the logic may also need to create new goroutine to handle other tasks like RPC call. When the request is processed and response is returned, these goroutines created need to be exited so that no goroutine leak should happen. package main import ( "fmt" "log" "net/http" ) func main() { http.HandleFunc("/echo", func(w http.ResponseWriter, r *http.Request) { fmt.Println(&r) w.Write(...

   CONTEXT,GOLANG     2019-12-14 06:21:02