Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Security index



  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  Why Outsourcing .Net Services is a Growing Trend?

IT companies are focusing more on .net for application development. This is because; the .net platform empowers developers with a wide range of tools and libraries to create diverse applications in an easy and efficient manner. The dot net framework allows users i.e. developers, to design and develop applications that can interact with web services and a range of online devices. .Net programming language is richer than others in many contexts. It has several objects oriented features like proper...

   dot net services, outsourcing, .net, framework     2014-10-23 22:30:43

  Are NSA engineers better than engieers at Microsoft?

NSA is the US government department which takes care of the information and data security of US. It's said to be one of the largest of U.S. intelligence organizations in terms of personnel and budget. There are many excellent engineers working on information and data security and developing algorithms and software help US government to collect intelligence information from all around the world. Many people may be curious about whether NSA has better engineers than IT companies like Microsoft and...

   NSA,Microsoft     2014-01-09 07:24:43

  Get the 48×48 or 256×256 icon of a file on Windows

Getting the 16×16 and 32×32 icons on Windows is relatively easy and is often as simple as one call to ExtractIconEx. However, getting the extra large (48×48) and jumbo (256×256) icons introduced respectively by XP and Vista is slighly more complex. This is normally done by: Getting the file information, in particular the icon index, for the given file using SHGetFileInfoRetrieving the system image list where all the icons are storedCasting the image list to an IImageList interf...

   File icon,File extension,Association,Large icon,Windows     2012-03-23 09:35:17

  Statistics on StackExchange

StackExchange is the most popular and professional IT Q&A site, Under StackExchange, there is StackOverflow and other sub sites. Many of us may wonder how this mega site is maintained and what its performance is. A performance page has been released by StackExchange recently. Below is some statistic about this mega site. 560 million page views per month, i.e around 1.9 million PVs per day. For such as big site, it has only 9 web servers and 4 SQL servers(while two of them are in backup mode...

   Stackoverflow,statistic     2015-01-05 02:47:01

  Understanding JavaScript closure and where it can be used

Closure The official definition of closure is: an expression (usually a function) that has many variables and is bound to an environment that includes those variables. In JavaScript, closure refers to the ability of a function to access the lexical scope in which it was defined, even after the function has been executed and left that scope. This ability is due to the fact that when a function is created, it generates a closure that includes a reference to the definition environment of the curr...

   CLOSURE,JAVASCRIPT,USAGE     2023-03-05 02:17:08

  Twitter prosecuted five companies

Recently Twitter sought help from law enforcement agencies because they can not stand spam emails. On Thursday, Twitter prosecuted five separate companies which provide tools so that spam on Twitter can be spread easier.Twitter said in a statement, Twitter now has 140 million active users, and the number of users are still increasing quickly, as Twitter continues to grow, spam also began looking to come to. Although the content of the spam on Twitter is not the proportion, it still gave rise to ...

   Twitter,Spam,Prosecution     2012-04-06 01:58:37

  Why you should be careful about optimizations

In one of my current javascript projects, I have to deal with 3D voxel coordinates. And, sometimes, I have floating points coordinates which must be converted to integers in order to convert them into proper array index. Javascript is a wonderful language, really. However, implementations are sometimes weird, and the way to do something can sometimes have very huge impacts on the performances. Worse, sometimes the classical way is more expensive than the tricky one. So, some peo...

   JavaScript,Bitwise,Floor,Trick,Optimization     2012-05-02 11:29:20

  Software Development Company Shares Its Development Process

v\:* {behavior:url(#default#VML);} o\:* {behavior:url(#default#VML);} w\:* {behavior:url(#default#VML);} .shape {behavior:url(#default#VML);} Normal 0 false false false false EN-IN X-NONE GU

   CUSTOM SOFTWARE DEVELOPMENT COMPANY,SOFTWARE ARCHITECHURE,TESTING,REQUIREMENT ANALYSIS,MAINTENANCE     2016-01-21 00:13:26

  Coming up Next for JavaScript Web Apps Is Next.Js 3

Are wondering who is going to be the next PHP of the internet; except JavaScript. Next.js is all set to bring the PHP experience to JavaScript with its latest version. As the technology continues to be considered as a “win” amongst a number of developers across the globe, professionals are trying to improve it as much as they can. Because of its minimalist approach to server-rendered apps, this highly customizable framework can be recommendable for beginners as well as experienced pr...

   NEXT.JS3,JAVASCRIPT     2017-11-20 23:43:38