Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Tools



  How to check a port is taken by which program on Linux

Lots of you may have encountered some error message stating that the port has been taken by another program while trying to start a program on Linux. And you would want to know which program takes the port you want to use. This post will provide some feasible ways to check out which program is taking a specific port. lsof -i:[port] lsof is the command to list open files on Linux. And if you know more about Linux you should get to know everything on Linux is a file even including networ...

   LINUX,PORT,NETSTAT,LSOF     2018-08-12 04:27:57

  The four key figures behind the success of JavaScript - Douglas Crockford

JavaScript's success can be attributed to at least four key figures: Brendan Eich, the creator of JavaScript Douglas Crockford, the creator of JSLint and JSON John Resig, the creator of jQuery Ryan Dahl, the creator of Node.js. We are already very familiar with Brendan Eich and the invention process of JavaScript, so let's start with Douglas Crockford, the second in command of JavaScript. Alliance In the 1990s, Microsoft's dominance overshadowed the whole world. At this time, two challengers e...

   JAVASCRIPT,DOUGLAS CROCKFORD,HISTORY     2023-05-07 06:42:30

  First impression of Github Copilot

It has been some time since I heard about the new generation of AI powered coding assistant -- Github Copilot. Don't get chance to experience it until obtained the tech preview access recently. So this post will document some first impression while using it. For now, this tool is only supported in VSCode and it can support various different programming languages. To enable it, just need to search and install the Github Copilot extension within VSCode. Once that is enabled, you will find that whe...

   GITHUB COPILOT,FIRST IMPRESSION     2021-08-13 22:45:31

  Encrypting and decrypting PGP file or text on MacOS

When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...

   PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL     2020-10-29 05:06:09