Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Security camera



  Turn on SecurityManager in Java

SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...

   SecurityManager,enable,program     2013-12-16 05:03:53

  What surprise Google brings us in Nexus 5?

Because Nexus 4 performed well after release, many people are confident of the performance of the upcoming Nexus 5. It is manufactured by LG and equipped with attractive configurations. LG Nexus 5 will have Android 5 installed, as for hardware, it will have a 5.2 inch screen with a resolution of 1920x1080  Also the processor will be a 2.3GHz Quad-Core processor. The exciting part is it has a 4GB(Some says it's 3GB) memory which is larger than almost all current Android devices which have 2G...

   Nexus 5,Google,LG     2013-04-08 07:37:41

  Samsung announces Galaxy Note II

Samsung announced Galaxy Note II in today's Mobile Unpacked conference. It has been one year since the first generation of Galaxy Note released in October last year.Galaxy Note â…¡ is not lighter, but a little thinner compared to Galaxy Note I. It is equipped with Android 4.1 Jelly Bean with a 5.5-inch screen. Detailed parameters are as follows: 1.6GHz quad-core Exynos processor 5.5 inches HD Super AMOLED screen, 1280 x 720 (16:9) 8 megapixel rear camera, 1.9 megapixel front camera 2G RAM,...

   Samsung,Galaxy Note II,Parameters,Price     2012-08-29 20:01:08

  Capture video stream with WebRTC

WebRTC(Web Real-Time Communication) is an API supporting real time audio and video communication through a browser. It is now a recommended W3C standard. This post is to show you how to capture video stream and screenshot with WebRTC. Capture video stream To play video stream from the video camera, we first need to put a video tag in our code: <video id="video"></video> The main function to get the video stream is the navigator.getUserMedia, as of now only few of the browsers support...

   WebRTC,Video,Screenshot     2013-10-24 21:04:41

  Why are ugly websites so successful?

“Techmeme has redesigned,” Gabe Rivera founder of the popular technology news site wrote in January 2012. “Drudge Report is now indisputably the web’s ugliest news site.” I use Techmeme all the time. I find it an excellent news website. It’s a collection of well-selected links to important issues in the technology industry. It doesn’t look pretty but it works fine for me. Asides from the quality of its stories it also has black text on white bac...

   Website design,Ugly,Success,Analysis     2012-02-13 05:27:56

  How does CSDN dare to use plain text as password?

Recently, the China's largest Chinese IT community website named CSDN leaked its user's account information. Later today CSDN made an announcements to its users on their website. The announcement said that some user account information was leaked and the passwords of the accounts were stored as plain text in their database before 2009, and after 2009, they adopted an encryption algorithm to encrypt user password. They urged all users who registered the account before 2009 to change their passwor...

   Security,Information leak,CSDN,Plain text     2011-12-22 09:10:01

  Samijyon : A tablet from North Korea

According to Sina Tech, North Korea Tech posted an article about Samijyon. Samijyon is a model of Android  tablet manufactured by North Korea. You can buy it with $200 in North Korea. Smajiyon's hardware configuration is as good as Samsung and Apple, but it doesn't allow WiFi connection and ordinary North Koreans cannot connect to Internet as well, users can only connect to domestic network of North Korea. On this tablet, there are no built-in Google apps such as Gmail and Google Play. But...

   Samijyon,North Korea,Tablet     2013-08-03 22:01:35

  25 worst passwords in 2012

Weak password is a serious security vulnerability, but the majority of network users still use some universal simple character sequences as the password. SplashData recently announced the world's worst password list in 2012.  "password","123456" and "12345678" are still at top places, while others have varying,  some new passwords like  "welcome" "Jesus" "ninja","mustang"and "password1 "are in the list. With the risk of password loss, SplashData CEO Morgan Slain said we hoped netw...

   Password,Security     2012-10-25 12:04:49

  HTML5 photo taking and uploading app implementation

Underthe support of HTML5 standard, Building Web App to take photos is now possible.I will elaborate on how to take photos using Web App, display them on the pageand upload them to the server. 1.     Videostream HTML5 TheMedia Capture API provides the programmable  access to video camera on phones, users canuse the getUserMedia() method to get the video stream provided by video camera.What we need to do is to add a HTML <video> tag and make the videostrea...

   HTML5,Photo taking,Media Capture API ,Implementation     2012-03-15 07:19:49

  Different types of keystore in Java -- PKCS11

PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...

   PKCS11,keystore,HSM,Java     2015-01-08 00:39:12