SEARCH KEYWORD -- Shopping search service
GitHub : Code is the most direct way for programmers to communicate
If not invested by Andreessen Horowitz, GitHub might not be noticed by Forbes, CNN, New York Times. People didn't know this tool because it was very far away from the world -- GitHub is a project hosting service used by programmers.But to some programmers, it is not just a place for project hosting, it is`also the hub for open source projects, a place for programmers improving themselves and a social network for programmers.There are around 3.26 million projects hosted on GitHub currently, inclu...
GitHub,Open source,Hosting,Social 2012-07-20 11:38:31
Supercolliding a PHP array
Did you know that inserting 2^16 = 65536 specially crafted values into a normal PHP array can take 30 seconds? Normally this would take only 0.01 seconds. This is the code to reproduce it: <?php echo '<pre>'; $size = pow(2, 16); // 16 is just an example, could also be 15 or 17 $startTime = microtime(true); $array = array(); for ($key = 0, $maxKey = ($size - 1) * $size; $key <= $maxKey; $key += $size) { $array[$key] = 0; } $endTime = microtime(true); echo 'Inserting...
How to Impact the User Experience by Adding Surprising Details to Your Website?
Internet is improving day by day and the competition is also increasing for every businessman. Having an online presence is a necessity but just online presence won’t work you have to do something extra to grab your potential customers. Websites that are successful online are basically because of three reasons (1) Web technologies are evolving constantly and are allowing for more unique and advanced designs. (2) Technologies have become more accessible than they were earlier, and are empow...
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
Write Scalable, Server-side JavaScript Applications with Node.js
If you live in the Silicon Valley area, you have already heard the buzz: Node.js is being hailed as the next big thing. It’s the silver bullet that offers scale, eases development, and can be leveraged by the vast pool of client-side JavaScript developers. So, what exactly is Node.js?Node.js is a server-side JavaScript environment that uses an asynchronous event-driven model. It is based on Google's V8 JavaScript engine plus several built-in libraries. The excitement around Node.js is tha...
Node.js,Server side,Scalable,JavaScript app 2012-03-29 13:50:50
Fix WampServer offline issue
WampServer is a web server on Windows which provides easy to use features for PHP developers. You can easily setup a web server by installing WampSserver without much hard to understand configurations. After installing it and with a simple configuration, you just need to double click it and start all services and your server is gonna up. If the server starts up normally, you will see a green icon which indicates the working status at the taskbar. But if you don't see the green icon shown u...
APACHE,PHP,WAMPSERVER 2015-09-13 01:59:38
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
That “JavaScript not available†case
During some interesting discussions on Twitter yesterday I found that there is now more than ever a confusion about JavaScript dependence in web applications and web sites. This is a never ending story but it seems to me to flare up ever time our browsing technology leaps forward. I encountered this for the first time back in the days of DHTML. We pushed browsers to their limits with our lovely animated menus and 3D logos (something we of course learned not to do again, right?) and we were ...
JavaScript,Security,Banned,Reason 2012-01-04 02:37:35
Top 10 Tell Tale Signs Your Computer Has a Virus
The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...
COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR 2017-03-19 21:05:12
Linux Command Line tips that every Linux user should know t
Below is the collection of Linux command line tips which I’ve found useful for Linux users. To get more information about the command mentioned below just open your terminal and type man <command>.Things a Linux user must learnLearn bash: No need to refer a lengthy bash guide or something else. Just read the complete man page of bash (man bash).Learn vim: You might be using Emacs or Eclipse for your work all the time but nothing can compete vim.Learn ssh: Learn the basics of passw...
Linux,Unix,Command line,Tips 2012-03-21 09:27:03
RECENT
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- Flows.network: Writing an LLM Application in Rust
- more>>