SEARCH KEYWORD -- Web Designers
How Chinese tech websites survive
As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...
FUCK PASSWORDS
I'm so tired of passwords. So, so, so tired. Most people don't understand this. Most people use the same password everywhere. Most people can just mechanically type out password3 in every password box, smirking to themselves at how clever they are, because who would ever guess 3 instead of 1? I don't do that. Let me tell you what i do. I generate a different password for every service, based on a convoluted master password and the name of the thing. I do this because it's what you're...
Security,Password,Random generation,Hard to remember 2011-12-05 11:32:45
Glass Button in Photoshop
These days glass buttons seem to be very popular. You can find glass buttons in Windows Vista and all around the Web. Other popular buttons are metallic and plastic buttons. All these buttons have one thing in common: They are all shiny. Some people call these kinds of buttons Web 2.0 buttons. Here I cover the creation of two different glass buttons in Adobe Photoshop CS3. Both glass buttons utilize the same principles. Once you have completed this tutorial you should be able to apply ...
PhotoShop,Glass button,Rounded button,Design 2011-10-10 13:55:46
In praise of impractical programming
Although it’s become a cultural mainstay now, I still remember when I first saw that thick book — the one with the wizard on the cover — about a school for magic where wonders are easily conjured by those who know the proper spells. Of course, I’m talking about the Structure and Interpretation of Computer Programs. There was that other book with the spells, but the “Wizard Book†sincerely claimed to teach magic. For the past few years, I’ve been ...
Impractical Programming,Structure,Scheme,Practical 2011-12-05 12:28:58
Simple Animation in the HTML5 Canvas Element
HTML5 is generating all kinds of buzz these days. Some of the buzz is about HTML5 being a replacement for Adobe’s Flash. I don’t think it’s there yet but it’s certainly on the way to changing the way content is presented on the web. This is a description of a very simple animation in an HTML5 canvas element. It is coded for readability and not for optimized operation. We’ll add a canvas element to a web page and then use javascript to draw on it. We will...
HTML5,Canvas,Animation,Sample code 2011-07-01 10:20:08
Is 99.8% Secure Secure?
A group of researchers (Arjen Lenstra and collaborators from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...
Security,Percentage,Security index 2012-02-27 04:48:06
Why isn't all internet traffic encrypted?
The biggest problem is that you must be able to verify that you're encrypting to the correct key. Without it, encryption would be practically useless, as anyone could perform a man-in-the-middle attack on the connection and remain undetected.In typical SSL/TLS, as well as other protocols using X.509, this verification is performed by "certification authorities", which are explicitly marked as "trusted" by web browsers and operating systems. Unfortunately, these CAs usual...
Internet,Traffic,Encryption,Decryption,Security 2011-10-15 15:03:37
How to teach "Modern" Perl?
Since I started my Perl Tutorial series a couple of people commented on what and how I am teaching.Some people asked why did I show "open or die" and why not using autodie. Others recommended the use IO::All instead of open.Another complaint was the introduction of time and localtime instead of DateTime.While I was mostly writing parts of my regular training material these comments led me to think about it again. I wonder how to teach Perl in 2012?When I started to write the tutorial I still cal...
Perl,Trainning,Teach,Modern,Modern Perl 2011-11-15 08:40:18
7 ways to start learning how to code right now for free
Learning to code is one of the most powerful and satisfying things you can ever do. If you’re a designer, learning to code can help you understand what you’re creating for, and if you’re looking to build a startup from scratch, being a technical founder can make things exponentially easier for you. No matter why you want learn, the only thing you really need is curiosity. But if you’re just starting out as a novice and don’t know where to begin,...
Learn programming,Efficient way,Experiment,iPad 2012-02-03 08:11:21
jQuery 2.0 gives up IE 6/7/8
jQuery 2.0 is released after 10 months development. jQuery 2.0 is customized for modern web browsers and also considers about mobile devices. But one big change is that jQuery 2.0 will not be compatible with old versions of IE and its size is 10% less than the version 1.9.1. The execution efficiency is higher as well. jQuery 1.9.x will still be maintained by jQuery team, they will also provide update for it. Those websites which want to be compatible with all browsers should not upgrade to...
jQuery 2.0,IE support 2013-04-20 07:58:16
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>