Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Choose



  Taking Precautions to Avoid Shady VPN Providers

VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...

   VPN,NETWORKING     2019-02-19 07:26:26

  Remove browse button from input type=file

In Web 2.0 era, many websites will ask the user to upload their avatar when creating their profile. In HTML, the input control we should use is input="file". This is a file control provided by the browser vendor and it should be ran in a sandbox for security consideration. Browsers don't provide ways to choose file from local and upload to the remote server without the input="file" control.  There is one annoying part about the input="file", which is a default button named "Choose File" or...

   file,html,browse,remove browse button     2015-07-12 05:17:51

  Simple Strategies to Boost Your Android Phone Security

Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...

   ANDROID,DATA SECURITY     2019-02-19 07:36:46

  How Do You Find the Best Password Managers?

Looking for a smart way to protect your range of electronic devices? Most of us access tons of websites and it could be difficult to store our passwords. It is important to not reuse store passwords that are easily identifiable. Keeping your information secure is more important than ever. Data breaches can occur anytime and sometimes takes months to discover. Sometimes, maybe, they aren’t. Target is a data breach, for instance, took months to discover. Information was leaked online from ce...

       2017-05-11 06:33:55

  ScrollerJS vs Odometer

Both ScrollerJS and Odometer are two JavaScript libraries to transition one number to another number with animation. They provide user a fancy animation about scrolling numbers. These libraries can be used in many scenarios such as user statistic counter, timer or odometer. This post is going to have a comparison on these two open source libraries. Below is a table which lists the features the two libraries have: Feature ScrollerJS Odometer Language JavaScript and CSS JavaScript and CSS S...

   JavaScript, Odometer, ScrollerJS, Open source, CSS Transition     2015-05-13 02:10:55

  What can select do in GoLang

In Go language, select is a keyword used to listen to and perform IO operations related to channels. With the select statement, we can simultaneously listen to multiple channels and perform corresponding operations when any of the channels are ready. This article will summarize the common uses of the select statement and provide some considerations when using it. Basic syntax The basic syntax of the select statement is as follows: select { case <-channel1: // when channel1 has data to ...

   GOLANG,SELECT,USAGE,SYNTAX,TUTORIAL     2023-08-12 20:17:02

  A new SSL 3.0 vulnerability named POODLE is released

Today a new SSL v3 security vulnerability is released by Google and it affects all products which is using SSL v3 protocol as this vulnerability is introduced by a design flaw. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE – short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol – from Google Chrome and Mozilla Firefox to Micro...

   SSL v3, vulnerability, Google, POODLE     2014-10-15 04:48:59

  How to choose quality painted auto parts

Selecting high-quality painted auto parts for your car is key to enhancing its attractiveness and increasing its resale value. In this article, you will learn how to wisely choose parts that not only perfectly fit your vehicle but also ensure its longevity and value. Dive into the topic Let's say you have a Mazda CX-5 that requires a bumper replacement. For example, here is such a rich selection of Mazda painted parts, that you might start to wonder about the differences between them. In genera...

   CAR,AUTO PARTS     2024-04-09 07:47:55

  How IoT is Challenging The World of "Smart" Cars

Smart cars have long been the subject of optimism in the auto industry, with their suites of advanced driver assistance and road safety features. Handy as they are, however, their convenient systems come with a substantially higher price tag. For now, however, many car owners are opting into a cheaper, more modular way to enhance their driving experience: a network of IoT devices. This makes it so that even pre-loved cars can enjoy the same features as smart cars. While IoT remains small at the...

   HARDWARE,IOT,CAR     2020-03-09 07:42:26

  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...

   DATA SECURITY,WINZIP     2019-08-29 11:42:41