Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- security



  What is Deep Web- all you need to know about it?

Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...

   DEEP WEB,DARK WEB     2018-07-05 08:26:58

  Hacking Vs. Programming

What is the difference between Hacking and programming? One opinion I have heard expressed is that a hacker can put a lot of code together in a hurry but if a change is needed the code has to be completely rewritten. A programmer may take a little longer but if changes are needed they are more quickly and easily installed without the need for a complete rewrite. One source I heard attributed an observation like this to Maggie Johnson of Google. It rings true to me though. Hacking is usual...

   Hacking,Programming,Coding style     2012-04-23 06:09:24

  Developing an eCommerce Website? Here are 4 Things to Keep in Mind

  When it comes to Web development, it is a complicated process. There is a plethora of facets to assess, from performance to user experience. As far as building an eCommerce site is concerned, it is quite a challenging task. Most of the users tend to visit the website in order to gather information about and purchase products. For this reason, a Web Application Development Company tries its best to make this process intuitive and effortless. Besides considering usability, there are some po...

       2015-12-22 05:28:33

  Java Interview Questions

Currently there are many articles online which summarize the list of Java interview questions. Some cover lots of basic questions and some cover some specific questions in specific area such as multithreading. In this post, we will not cover the really basic questions, we will cover something different. For basic question, you can read Java Interview Questions。 Basic What is primitive data type? How many primitive data types in Java? What are they? -- A primitive type is prede...

   JAVA,SECURITY,INTERVIEW,CAREER,MULTITHREADING,QUESTION,JAVA INTERVIEW,JAVA CORE     2019-01-21 07:07:08

  Things to Look for in Microsoft .NET Framework 4.7

The .NET Framework 4.7 is the updated version of the .NET Framework 4.6.2.  It can run along with earlier versions of the .NET Framework. On installation it appears as an update for Microsoft Windows under the Installed Updates item in Control Panel. The improvements in the.NET Framework 4.7 includes: High DPI support for Windows Forms applications on Windows 10 Touch support for WPF applications on Windows 10 Enhanced cryptography support Performance improvements .NET Framework Documenta...

   ASP.NET, ASP.NET FRAMEWORK     2017-07-18 05:55:20

  Some thoughts about microservice adoption

Nowadays microservice is very popular among companies with the increasing complexity of systems. The goal is to make each microservice to handle one specific job and handle it well. This normally would provide the benefit of maintaining the service easily and isolating errors and making the service more reliable and scalable. The benefits of adopting microservice are obvious. Maintainability. Decouple functions so that each function can be maintained separately which reduces the risk of issue ...

   ADVANTAGE,DISADVANTAGE,MICRO SERVICE     2020-09-05 01:25:05

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  How IoT is Challenging The World of "Smart" Cars

Smart cars have long been the subject of optimism in the auto industry, with their suites of advanced driver assistance and road safety features. Handy as they are, however, their convenient systems come with a substantially higher price tag. For now, however, many car owners are opting into a cheaper, more modular way to enhance their driving experience: a network of IoT devices. This makes it so that even pre-loved cars can enjoy the same features as smart cars. While IoT remains small at the...

   HARDWARE,IOT,CAR     2020-03-09 07:42:26

  How One Missing `var` Ruined our Launch

Well, that was a veritable shitstorm (sorry for the language).  Long story short, MelonCard was featured today on TechCrunch (along with other500Startups companies, also on VentureBeat, Forbes, …) and everything broke all at once.  Every. little. thing.  We had rolled out a huge change to MelonCard over the last few days to make our site a seamless “everything just updates” look-good / feel-good product using NodeJS lo...

   JavaScript,NodeJs,jQuery,Variable,Scope,Global     2011-11-02 13:01:22

  Spring – Web sockets in Java Development

Experts of java development team are sharing this article with entire java development community. The purpose behind intending this post is to explain spring – Web sockets as a concept to rest of the world. Technology: Web socket is the one of the protocol supported by web-browsers and web-servers. It provides the two-way communication between client and server. It is used in any Java application for providing the two way communication between client and server. It opens a connection betw...

   JAVA DEVELOPMENT,SPRING,JAVA TECHNOLOGY     2016-09-13 03:56:54