Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Privacy information



  Create tweet without explicitly showing the link URL

When crafting a tweet, there are instances where we may wish to include a link, but we prefer the preview to be shown without displaying the URL explicitly after the tweet is published. How can we accomplish this? This article outlines the steps to achieve it. To begin, copy and paste the link you want to share into the tweet box. After clicking Post, the tweet will be published without displaying the link; instead, it will showcase the page preview, and clicking on the preview image will open ...

   TWEET,LINK URL,X,PREVIEW     2024-01-23 08:06:46

  Shortest command on Linux

Usually when we log in to a Linux system,. we may type some frequently used Linux commands such as pwd,ls, ps etc. All these commands are really simple but powerful with different options. But do you know what is the shortest command on Linux? The answer is w. According to Linux manual, w will show who is logged on and what they are doing on the system. w displays information about the users currently on the machine, and their processes. The header shows, in this order, the current time, how l...

   Linux,w,shortest command     2014-04-30 11:07:38

  Hidden messages in logos

A logo is the simplest thing a user can remember about a product or a company. A good logo design will leave deep impression to customers. Each logo tries to convey either their product information or company vision to customers, this information may be easily understood with a glance or it contains some hidden messages which need us to figure out. Today we share some logos which contain some hidden messages. 1. Fedex The arrow between E and X means Fedex will deliver the product to the right p...

   Logo,Meaning     2013-10-01 07:52:05

  Differences among Enter,F5 and Ctrl+F5 in webpage refresh

When we press Enter, F5 or Ctrl+F5 to refresh a webpage, is there any difference among them? Actually it's yes, we can find the difference from the request header and response header information. There are two cases about pressing Enter in the address bar. First if the page requested is cached and not expired in the browser, we can find the header information sent by the browser is : Host 192.168.3.174:8080 User-Agent Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 Accept ...

   Refresh,F5,Ctrl+F5     2013-06-13 22:03:35

  Making Your Tech Conference Presentation, and Experience, Not Suck

Tech conferences are incredibly expensive, and not just in dollars. Even free conferences like BarCamps incur the expense of the attendee’s time. Taking time off from work or family is a hassle at the very least, and it’s time that isn’t billable. The draw of the conference boils down to those 45 minute sessions, and speaker and attendee alike should make the most of it. Speakers often start off by wasting time. They front-load the presentation with worthless informatio...

   Soft skill,Tech presentation,Advice,Highlight     2011-12-20 08:50:00

  Galaxy S III will be released on May 3

Samsung Galaxy S II's popularity makes people look forward to the next generation of Galaxy mobile phones. As 2012 London Olympic Games is approaching us, Galaxy S III is also near us. An anonymous message says that the Galaxy S III conference was scheduled on May 3 at London, UK, this year's Olympic Games host city.According to the information previously circulated, Samsung Galaxy S III will have a 720p high-definition display Super AMOLED, the screen size will be between 4.6 to 4.8 inches, a...

   Samsung Galaxy S III,Release     2012-04-16 16:09:18

  Redesigning the Technical Hiring Process

Since my last post on technical interviews, I’ve been fairly involved in hiring at Pulse as we grew our team from 6 people when I joined last November to 14 full-timers. In my previous post, I suggested that technical interviews, in the conventional sense, are not especially effective (by technical interviews, I mean the traditional 45 minute coding-at-a-whiteboard and algorithm puzzlers interviews). Those do a great job of telling you how well a candidate is at acing those types o...

   Career,Recruitment,Process,Developer,Ski     2011-09-14 12:01:37

  Good ways to "insult" a computer scientist

Computer scientists are a group of people who are hard working and talented. They build the theory foundation for information and computation and they usually work on something difficult to understand. Many computer algorithms are created by computer scientists. In our mind, they are those people we admire most. But sometimes we also want to make fun of them or "insult" them. What are good ways to "insult" them? Here we share some. Ask him to make a website for you...and with PHP. Ask them why ...

   Computer scientist,Jokes     2013-08-06 09:32:56

  Latest PHP patch cannot fix the bug

On Wednesday(2012-05-02), a remote code execution vulnerability in PHP was accidentally exposed to the Web, prompting fears that it may be used to target vulnerable websites on a massive scale. The bug itself was traced back to 2004, and came to light during a recent CTF competition.A CERT advisory on the flaw explains: “When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives a processed query string parameter as command line arguments which allows com...

   PHP,bug,patch,bypassed     2012-05-08 11:20:56

  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...

   DATA SECURITY,WINZIP     2019-08-29 11:42:41