Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Abuse



  XML Abuse

It’s everywhere. XML Abuse. From Domain Specific Languages to Data Serialization, XML is the most commonly abused data format I’ve ever encountered. XML is perfectly fine for (because it was designed for this): First of all: XML was designed to be written by humans and read by humans. Nearly all generated XML I’ve seen sucks badly. I think this is because XML cannot efficiently represent common data structures found in programming languages.XML is good...

   XML,Abuse,Alternative,Serialization,Data storage     2011-12-14 07:12:10

  Disposable Email address

There is one statement which says Giving out your email address is like starting a relationship. What happens when you want to break up?Once you gave out your email address, you may take the risk of receiving big amount of junk emails. However, when we register on some websites, we must provide our Email address to receive authentication emails. If we cannot receive the authentication email, we cannot finish the registration process. Is there any alternative way?We can use disposable email, i.e,...

   Disposable email,Website,Summary     2012-05-19 12:27:14

  The Future of JavaScript � take a peek today!

The ECMA committee is working hard on designing the next version of JavaScript, also known as "Harmony". It is due by the end of next year and it is going to be the most comprehensive upgrade in the history of this language. Chrome and V8 are committed to pushing JavaScript forward and have already started implementing the new features. You can try some of them today in the latest dev channel release. Here’s a summary: Lexical scoping. Now "let" is the new "var" – traditional "var...

   JavaScript,Future,Feature     2012-02-12 04:56:37

  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  Essay Writing - Time Management For Students

Most of the senior year students have a billion things to do. You have to attend classes every day, participate in after school activities, do home assignments, sports, and do a part-time job. And now you have to deal with a new essay. So, you have to focus on time management which will help you accomplish the writing project faster and will bring some balance in your life.  Many students do not find time to write a college essay and this makes them searching who help. If you ask yourself ...

   STUDENT,ESSAY,TRAVEL     2020-01-23 07:45:11

  SSH Security and You - /bin/false is *not* security

Backstory While at RIT around 2004 or 2005, I discovered that a few important machines at the datacenter allowed all students, faculty, and staff to authenticate against them via ssh. Everyone's shells appear to be set to /bin/false (or some derivative) on said machines, so the only thing you'll see after you authenticate is the login banner and your connection will close. I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" ...

   Linux,Security,/bin/false,SSH     2012-02-06 07:46:29

  5 Reasons Your Javascript Stinks

Javascript gets a bad rap on the Internet, but there are few languages that are so dynamic, so widespread, and so deeply rooted in our lives as Javascript is. The low barrier of entry leads some people to call it a script kiddie language, others scoff at the concept of a dynamic language while riding their statically typed high horse. You and Javascript just got off on the wrong foot, and now you've made it angry. Here's five reasons why your Javascript code sucks.1. You're not using a namespace...

   JavaScript,Good,Habit,Prototype,OOP     2011-04-13 12:25:37

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  10 Object Oriented Design principles Java programmer should know

Object Oriented Design Principles are core of OOPS programming but I have seen most of Java programmer chasing design patterns like Singleton pattern , Decorator pattern or Observer pattern but not putting enough attention on Object oriented analysis and design or following these design principles. I have regularly seen Java programmers and developers of various experience level who either doesn't heard about these OOPS and SOLID design principle or simply doesn't know what benefits a particular...

   OOP design,Principle,Java     2012-03-14 13:51:38

  Php Class to Retrieve Alexa Rank

Alexa is a service acquired by Amazon which offers a web traffic report for websites. They retrieve the data from toolbar that can be installed in different browsers, centralize the data and display reports to anyone. The most important indicator is the Alexa Rank. It represents the rank of a webpage in a list of all the websites. It’s not the 100% accurate but it gives a good indication.Alexa does not offer any free API to obtain Alexa Rank. However there is a simple method to obtain it ...

   PHP,Alexa,Alexa rank,API,Retrieve Alexa rank     2011-10-25 11:28:55