Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Picture Password



  Google upgrades its built in calculator

Google search engine is more and more intelligent.It has been a long time since Google integrated a built in calculator in its search engine. Today, Google upgraded its built in calculator function in its search engine, a new calculator interface with 34 buttons is added.Before upgrading, if you type 6+7 in the search field, Google will only show the answer 13. But now, if you enter this formula again, in addition to the answer, it will display one calculator interface with 34 buttons. See follo...

   Google,built in,Calculator,Upgrade     2012-07-25 11:07:33

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  New features in PHP 5.5

Just a few days ago, the PHP official website was redesigned. It seems we directly go from Web 1.0 era to Web 2.0 era. In addition to this new change, PHP 5.5 was also released. Some new features are added in this release. Here we summarize some of them. Enable OPCache by default When installing PHP 5.5, the Zend OPCache will be compiled as OPCache by default and OPCache is enabled by default. Some changes to the language itself Add Generator function getLinesFromFile($fileName) { if (!$file...

   PHP 5.5,New features,Generator     2013-07-05 03:13:22

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  User experience distance

Good user experience can narrow the gap between product and users, it can also improve the user efficiency and increase satisfaction and comfort of users. Here we talk about user experience distance with different examples: 1. Floating bubble layer When users need to delete one picture,they click on the "Delete" button, then the floating bubble layer appears to prompt the user to confirm the deletion, users only need to focus on the picture which reduces the visual burden, and also no need to mo...

   User experience, Design,Detail     2012-12-20 13:20:16

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Install and setup vsftpd on AWS server

When developing websites, frequently we may need to upload source codes to the remote server. To ease of thew work, many website developers set up FTPs to upload the files. This post is a tutorial on how to install and setup vsftpd on a server. vsftpd is a very popular FTP service on Unix-like systems. Open command terminal, then install the vftpd by issuing command yum install vsftpd or sudo apt-get install vsftpd After installing the vsftpd, the config file needs to be updated based on the ope...

   FTP,vsftpd,AWS,Passive,Active     2015-02-02 02:20:27

  HeartBleed: Inside the heart, what happens to a normal WEB user?

To be brief, our email, IM, facebook etc. are at the risk, so try to minimize the access in these few days. Especially we should try to avoid log into our internet-banking, because we may expose our user id and password. Also later when the service providers fix the bug, we would better to change a new password for all the web accounts that are important to us. Here comes the technical explanation. You might notice before that a lot of websites use URL starting with "https". For example, https:/...

   HeartBleed,Analysis     2014-04-09 22:41:43

  Skills Needed to be a Web Developer in 2011

Many web developers think they already have all the knowledge they need to continue their careers. Check out this list of the ten skills all web developers must have to succeed in 2011 and beyond, and see how you measure up.1) Speak The Basic Languages of the WebBesides the content mark-up of HTML and the style rich sheets of CSS, how are you at your JavaScript and other advanced DHTML features? HTML 5, the latest upcoming W3C standard, includes audio and video embedding, database connectivity a...

   HTML5,Web skills,PHP,.NET,Java     2011-05-12 00:47:49

  Google Chrome Alternatives: Best Browsers For Android

Most Android phones come with Chrome pre-installed as the default browser. There’s nothing wrong with that. Chrome is a great browser with excellent features. And it feels natural alongside all the other Google products that also come pre-installed on Android. But the type of browser someone uses is super important. In the end, the browser may be one of the most-used apps on any phone.  Browsers need to fit the needs and lifestyle of the person who is using it. To name a few examples,...

   FIREFOX,MICROSFT EDGE,CHROME     2020-06-18 07:12:35