SEARCH KEYWORD -- Team work
Why isn't all internet traffic encrypted?
The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...
Internet,Traffic,Encryption,Decryption,Security 2011-10-15 15:03:37
Helping people find good Perl tutorials
If a co-worker comes to you and asks you: "I would like to learn Perl, where can I find a good Perl Tutorial?", I am sure your would have a few recommendations. If the same person did not know you she would have to type some search term in Google and hope she found the right learning material.Recently Christian Walde (Mithaldu) asked "How do newbies find Perl learning materials online?". Dave Cross responded by checking the top results when searching for "perl tutorial".It shows that many p...
Perl,Perl tutorial,Resource,Website 2011-11-03 13:34:33
Breakdown Kubernetes Container Runtime
Keeping on learning Kubernetes piece by piece and having a deeper understanding of its advantages, I am no longer shocked at its rapid development and popularity. Though backed by big companies like Google is undoubtedly the push, its design, features, and convenience are the biggest attraction. Most of all, it disintegrates the monolithic Internet system governance and lifecycle and offers a new management method. Kubernetes is a set of concepts, including various resource types like Pod, Deplo...
KUBERNETES,CONTAINER 2021-05-15 04:06:48
Getting started with C++ TR1 regular expressions
Overview This article is written for the benefit of someone familiar with regular expressions but not with the use of regular expressions in C++ via the TR1 (C++ Standards Committee Technical Report 1) extensions. Comparisons will be made with Perl for those familiar with Perl, though no knowledge of Perl is required. The focus is not on the syntax of regular expressions per se but rather how to use regular expressions to search for patterns and make replacements. Support for TR1 ext...
Regular expression,Replace,TR1,Extension 2011-08-14 07:25:20
JavaScript interview questions
This post will cover the JavaScript questions I have encountered and have seen during my programming career. They will mainly focus on vanilla JavaScript though there are lots of excellent frameworks out there and many people are using them in their daily work. this keyword this keyword is an very important but easy to confuse concept in JavaScript since it is always referring to the calling object of the function. 1. What will be the output of below code snippet? function User(name) { this....
JAVASCRIPT,ALGORITHM,THIS,CLOSURE 2019-03-09 07:05:46
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
PHP advisory file lock : flock
When we process a file in PHP, we may often need to acquire a lock so that other scripts cannot edit the same file at the same time. There is a flock() function in PHP which can help us lock the file we want to process. But there is one issue we should take care. Recently, ffb encountered one issue while he was trying to lock a file handle. The codes are below: $filename = "/tmp/lock.txt"; $fp = fopen($filename, "r+"); if (!$fp...
flock(),advisory locking,PHP 2013-04-23 11:42:48
Debunking the Google Interview Myth
Years ago, rumors used to circulate about Microsoft interviews. They were the hot, new company that everyone wanted to work. With envy came the urban myths. These rumors have since been transfered to Google, and will surely be transfered to some new company in due time. Bloggers – always desperate for links and traffic – have capitalized on this, with scary articles about their “nightmare interview†and “crazy questions“. Let’...
Google,Microsoft,Business insider,Interv 2011-04-26 10:09:53
Great code is written twice (or more)
The last couple of years more and more people have been moving towards Agile development. These techniques aren’t new, most we’re devised in the 80s or 90s. But finally these days programmers and (more importantly) business consultants, architects and clients have learned to love and embrace Agile development.Evolving requirementsIt has now become common knowledge that you can’t write down all the requirements before you start the project. These requirements h...
Twice,Good code,Recoding,Agile,Evolvement 2011-11-01 00:36:35
The 10 Greatest Hacks of My Life
My co-founder and I briefly considered applying to YCombinator for the Winter 2012 session. We eventually decided to bootstrap Curvio initially, and raise a seed round on our own after we launch (so far so good!). But looking over the YC application, one question intrigued me:Please tell us about the time you, tansey, most successfully hacked some (non-computer) system to your advantage.Now, there are a lot of ways to interpret this. A mechanical interpretation would be about...
Hack,Most important,Example,Curvio 2011-10-22 12:47:42
RECENT
- What Is The Best SaaS CRM In 2024?
- Common Pitfalls When Handling JSON in Golang
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- more>>