SEARCH KEYWORD -- Java Security
3 ways to remove duplicates in List
Frequently, we may have an ArrayList which stores many values, and we need to process the ArrayList and get what are the distinct values in the list, or we may want to count occurrence of each value in the ArrayList. We can remove the duplicates in a few ways. Here we propose 3 methods : public static void main(String[] args){ //SuperClass sub=new SubClass(); String[...
Polymorphism in OOP Programming
Polymorphism is the capability of an action or method to do different things based on the object that it is acting upon. This is the third basic principle of object oriented programming. Overloading, overriding and dynamic method binding are three types of polymorphism. Overloaded methods are methods with the same name signature but either a different number of parameters or different types in the parameter list. For example 'spinning' a num...
JAVA,OOP,POLYMORPHISM,OVERLOADING,OVERRI 2014-10-23 08:11:50
An experience on fixing HTTP 406 Not Acceptable error
This post is about an experience of mine on fixing a HTTP 406 Not Acceptable error seen on one of my page. Just got back from a business trip and opened my computer as usual to start to monitor my website statistics. But when I opened the page on showing real time page views, it shows nothing but zero. So I pressed F12 to bring up the developer tool to check on what's going on. The logic of loading the real time page view is backed by AJAX call. In the developer tool console, I see that the rAJA...
PHP,AJAX,HTML,HTTP 406,CONTENT-TYPE 2019-03-30 04:09:10
What do programmers like to say usually?
Coding is an very important part of programmer's daily work. But beyond coding, programmers need to do other work as well, they need to fix bugs reported by users, they need to write documents for their codes. Also, they often need to answer questions from customers, bosses and colleagues. What do they often say when they are facing different sort of questions? Today we share some. It's done. I just need to clean up a few things. This is hacky, but I'll fix it soon. This can never happen: It's ...
Programmer,Execuse,Bug 2013-08-07 07:38:30
How to password protect a Winzip file
Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...
DATA SECURITY,WINZIP 2019-08-29 11:42:41
Top 10 Tell Tale Signs Your Computer Has a Virus
The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...
COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR 2017-03-19 21:05:12
Hologres vs AWS Redshift
Hologres and Redshift are both data warehousing solutions, but they have some differences in terms of features, architecture, and target use cases. Underlying Infrastructure Hologres: Built on Alibaba Cloud's Apsara distributed computing platform, Hologres leverages the underlying infrastructure for storage, computation, and management. It benefits from Alibaba's expertise in cloud-native architecture and real-time data processing. Redshift: Amazon Redshift is based on a Massively Parallel Pro...
HOLOGRES,REDSHIFT,ALIBABA,AWS,BIG DATA,REAL-TIME 2024-03-23 01:36:41
Twitter user database is hacked
According to Sina Tech, One hacker from Islamic Republic of Mauritania claimed today that he had acquired Twitter's entire user database and he shared over 15000 user account information on file sharing website Zippyshare.These information include the name of each account on Twitter, username and access tokens of third-party applications which have access to their Twitter accounts(such as Instagram or HootSuite).Twitter has yet to comment on the matter, but the company sent messages urging ...
Twitter,Hacker,Access token 2013-08-20 10:49:44
bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security
Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...
Peculiarities of cloud infrastructure
MarketsandMarkets claims that the cloud computing market is worth more than $545 bln nowadays. Moreover, by Thales, nearly 60% of worldwide commercial data is stored in the cloud today. Nay, under Exploding Topics, about 90% of large companies across the world use cloud infrastructure. So, the mentioned technology is incredibly popular among business owners worldwide presently. However, not so many company holders, as well as managers, know enough about the specified solutions. That's because mo...
CLOUD INFRASTRUCTURE,DATA STORAGE 2022-12-30 12:00:44
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>