Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Windows.ISB device



  Diving Deeper into HTML5 Offline Browsing

Recently, I published an article on one of the new features in HTML 5 called Offline Browsing  in HTML5 with ApplicationCache.The response to that article was good, and I was asked to expand on some further points including:how to decide on what files to cachethe implications of caching those filesdebugging the ApplicationCacheSo, that’s where this article will start: where the last one finished.  If you haven’t, you should probably read the previous article before this o...

   HTML5,Offline browsing,New breakthrough,Feature     2011-12-20 08:46:06

  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  String.length() vs String.getBytes().length in Java

In Java, String.length() is to return the number of characters in the string, while String.getBytes().length is to return the number of bytes to represent the string with the specified encoding. By default, the encoding will be the value of system property file.encoding, the encoding name can be set manually as well by calling System.setProperty("file.encoding", "XXX"). For example, UTF-8, Cp1252. In many cases, String.length() will return the same value as String.getBytes().length, but in some ...

   Java,UTF8,String,Encoding,Sample     2015-04-01 22:22:23

  Why isn't all internet traffic encrypted?

The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...

   Internet,Traffic,Encryption,Decryption,Security     2011-10-15 15:03:37

  Subdomain Configuration

Subdomain ConfigurationA subdomain configuration is very similar to a domain name configuration. The only difference is that the subdomain entry is tied to the corresponding domain name lookup. A request for the subdomain (e.g. http://content.websitegear.com) will be routed to a DNS server containing the DNS information for the parent domain (websitegear.com). Once the DNS record for the subdomain is resolved to a particular IP address, the request is sent to the web server listening on that IP ...

   Domain,Subdomain,Configuration,Setup     2011-10-09 09:23:16

  Google Dart? Don’t bet against JavaScript

Procotols, programming languages and operating systems all compete in a constantly evolving software ecosystem. Out of that ecosystem only a few technologies truly have staying power and survive over the long term. An example? How about Ethernet? It’s been a survivor over the last thirty years despite existing in a constantly changing landscape that’s been populated with many worthy competitors. Ethernetâ€â„...

   Google Dart,JavaScript,Comparison,Future     2011-12-06 09:49:39

  How to play with cross domain request

What is cross domain request In simple, cross domain request is to request resource from other domain in one domain. Note, the "other domain" doesn't just mean domain name only, it includes much more. If the protocol, domain name, port is not the same, two domains will be considered different.  Below example describes what is considered as different domain. http://www.a.com/a.jshttp://www.a.com/b.js               # Same domainhttp://www.a.com/lab/a.js &nb...

   FRONT END,JSONP,CROSS DOMAIN,CROSS ORIGIN,CORS,DOCUMENT.DOMAIN,WINDOW.NAME     2016-11-06 00:48:54

  Multitasking vs multiprogramming

As all these processing are the part of computer functions. You should not be confused between these processes.In computing, multitasking is a method by which multiple tasks are performed by the user also known as processes, share common processing resources such as a CPU. CPU is actively executing more than one task at a time. Multitasking solves the problem by scheduling the tasks instructions. Which task may be the one running at any...

   multitasking,multiprogramming,os,differe     2011-09-22 13:46:30

  Glass Button in Photoshop

These days glass buttons seem to be very popular. You can find glass buttons in Windows Vista and all around the Web. Other popular buttons are metallic and plastic buttons. All these buttons have one thing in common: They are all shiny. Some people call these kinds of buttons Web 2.0 buttons. Here I cover the creation of two different glass buttons in Adobe Photoshop CS3. Both glass buttons utilize the same principles. Once you have completed this tutorial you should be able to apply ...

   PhotoShop,Glass button,Rounded button,Design     2011-10-10 13:55:46

  Hey kids, just say NO to programming !

Cory Doctorow's latest talk 'The Coming War on General Purpose Computing' really puts things in perspective about life in the 21st century. This got me thinking more about functional programming languages and how they are related to the intentional limitation/crippling of turing machines by industry and government. What if Stallman is right about the intentional efforts to limit freedom of information ? What if it's even worse than we all think it is ? In relation to functional languages ...

   Programming,Factor,View,Kids,No     2012-01-16 10:16:19