SEARCH KEYWORD -- Local dev
Remote form submission
Remote form submission is way of submitting HTML forms from local to a particular remote server. This is used by many advertisers, spammers or even hackers to submit bad data to other websites in order to get what they want. They can write some automation scripts to help them do spamming. How can people do remote form submission and how to prevent this kind of attacks? Since a website can be accessed by almost every one, so one can save a local copy of a HTML form of a website through File->S...
PHP,Security,Remote form submission 2013-07-14 01:04:49
LESS/SASS/Stylus development tools summary
LESS,SASS and Stylus are more and more popular among developers. More and more people are using these three tools now. Here we introduce some development and testing tools which can make our development process simpler. SublimeText Many front-end developers are now using Sublime Text 2 as their main text editor, there are many plugins in Sublime Text as well. We can use Ctrl+Shift+P –> install package to search relative plugins. Less Sublime Less build Sublime Less2css Less snippets Su...
10 tools to make your shell script more powerful
Many people mistakenly think that shell scripts can only be run in command line. In fact shell can also call some GUI components such as menus,alert dialogs, progress bar etc. You can control the final output, cursor position and various output effects. Here we introduce some tools which can help you create powerful, interactive and user friendly Unix/Linux shell scripts. 1. notify-send This command can let you inform the process to send a desktop notification to users. This can be used to send ...
Introduction to OAuth (in Plain English)
Last week we talked about giving away your passwords and how you should never do it. When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...
Security,OAuth,Permission,Partial access 2012-04-05 11:39:54
Diving Deeper into HTML5 Offline Browsing
Recently, I published an article on one of the new features in HTML 5 called Offline Browsing in HTML5 with ApplicationCache.The response to that article was good, and I was asked to expand on some further points including:how to decide on what files to cachethe implications of caching those filesdebugging the ApplicationCacheSo, that’s where this article will start: where the last one finished. If you haven’t, you should probably read the previous article before this o...
HTML5,Offline browsing,New breakthrough,Feature 2011-12-20 08:46:06
How to apply Domain Level Group Policy
As a system administrator, you may often need to create a Windows domain of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database (called a directory service). Also one or more domain controllers need to be deployed to enable managing the domain. In this post, we will show you how to apply Domain Level Group Policy. There are lots of posts which have covered how to promote a Windows server to a Domain Controller. ...
Group Policy,Domain Controller,Account Policy, GPO 2015-03-19 03:46:34
Scala Macros
This is the home page of project Kepler, an ongoing effort towards bringing compile-time metaprogramming to Scala. Our flavor of macros is reminiscent of Lisp macros, adapted to incorporate type safety and rich syntax. Unlike infamous C/C++ preprocessor macros, Scala macros: 1) are written in full-fledged Scala, 2) work with expression trees, not with raw strings, 3) cannot change syntax of Scala. You can learn more about our vision of metaprogramming from our talks. We propose to enrich Scala ...
Scala,Macro,Efficiency,Maintainebility 2012-02-01 00:12:15
How long does the heuristic cache of the browser actually cache?
Heuristic cache Heuristic caching is the default behavior of browser caching (i.e., for responses without Cache-Control), which is not simply "not caching", but implicitly caching based on the so-called "heuristic cache". HTTP is designed to cache as much as possible, so even if Cache-Control is not specified, the response will be stored and reused if certain conditions are met. This is called heuristic caching. HTTP/1.1 200 OK Content-Type: text/html Content-Length: 1024 Date: Tue, 22 Feb 2022 ...
HEURISTIC CACHE,WEB DESIGN 2023-05-26 08:40:13
3 meanings of Stack
We may frequently see stack when we read programming books. But many times we may be confused about the different meanings of it. This term actually has three common meanings. Here we explain the three different meanings of Stack in programming. 1. Data structure The first meaning of Stack defines a method for storing data. Its feature is LIFO9Last In First Out). In this data structure, data are accumulated level by level. The data last put in is added at the top of the stack. When using the dat...
Stack,Memory,Data structure 2014-02-24 04:56:46
Dates in PHP and MySQL
I see a lot of people on forums and on my training courses asking about the best way (or any way) to manage dates stored in a MySQL database and used in PHP. Three options follow, but first the problem.PHP uses unix timestamps for all its date functionality. It has methods to convert these timestamps into pretty much any text format you could want but internally it uses the timestamp format. A timestamp is simply an integer. Specifically, it’s the number of seconds that have ela...
PHP,MySQL,Date format,Date,Comparison,Date compare 2011-10-17 14:00:57
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>