Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- SUBLIME TEXT



  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  A Sip of Go Log

Logging is indispensable in any code that we need its support both in debugging and in statistics. However, a package that filled withfmt.Println/fmt.Printf printing various messages can never be considered a read-to-be-adopted package, which can be optimized by a simple change, using Golang’s native log package to print information to standard output or to a file. Then, how to apply the log package? Are there any limitations? If so, can we seek open-source packages? Let&rsq...

   GOLANG,LOGGING     2022-06-16 05:43:24

  10 Time-Management Tips That Work

Chances are good that, at some time in your life, you've taken a time-management class, read about it in books, and tried to use an electronic or paper-based day planner to organize, prioritize and schedule your day. "Why, with this knowledge and these gadgets," you may ask, "do I still feel like I can't get everything done I need to?"The answer is simple. Everything you ever learned about managing time is a complete waste of time because it doesn't work.Before you can even begin to manage time,...

   Time management,Tips,Work,Overhead     2011-10-10 05:24:01

  Build a Kubectl Plugin from Scratch

by author The command-line tool kubectl is indispensable when using Kubernetes. You need it to query related Pod and Service information both in developing or performing some maintenance operations, such as events, scale, rolling update, etc. However, when using kubectl, there are many inconveniences. Though Kubernetes is officially maintaining kubectl¹, and you can submit the problems, improvement, and even PR in its Github Issues, you still have to wait long before its release. The m...

   KUBENETES,KUBECTL,PLUGIN,GOLANG     2020-12-02 03:43:16

  PHP Security

1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...

   PHP,Security,SQL Injection,XSS Cross sit     2011-10-01 02:25:31

  Meta tag in HTML header

In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...

   HTTP,meta,HTML,head     2013-05-22 11:34:08

  Java Polymorphism and Overriding Methods

Most Java developers will be familiar with polymorphism – we’ve all seen the example of the Dog and Cat classes inheriting from some abstract Animal class and having their say() methods produce different results. But it’s still worthwhile to look at a few simple examples to reinforce the concepts.First, we define a simple class with one instance method and one static method.public class A { public String getName() { return "I a...

   Java,Overriding,Polymorphism,Demo,Dynami     2011-10-04 14:09:06

  Collection Of Puzzles For Programmers

Did you know that we have a nice collection of puzzles here on less than dot? Some are harder than others so there is something for everyone. You can pic any language you want, you will see that there are solutions in Ruby, Python, Visual Basic, SQL, JavaScript, C++ and other. Here is a partial list of what we have Friday the Thirteenths The goal is to identify all friday the thirteenths for a given timeframe Regular Pentagon Given a grid co-ordinate (x,y) as the centre point of a regu...

   Programming puzzle,Fibonacci,Prime,ASCII     2012-01-04 08:06:18

  Are college students learning?

In his State of the Union address last Tuesday, President Obama proposed several measures to lower college tuition. University leaders responded cautiously, warning that cost-cutting reforms might also cut into instructional quality. But here's the big open secret in American higher education: Most institutions have no meaningful way to measure the quality...

   College students,Learning,Survey     2012-02-02 07:10:02

  The tips of learning Linux kernel

  As the Linux kernel has become one of the most gigantic and complex software project in the world, its complication scare many novices away. In this post, I will give some personal experience on how to learn Linux kernel, and hope these tips can offer some help to newcomers. (1) Download vanilla kernel and install it. Yes, I suggest you can find a physical machine, or if you really don’t have one at hand, virtual machine is also OK. Download the newest vanilla k...

       2017-07-28 22:53:11