SEARCH KEYWORD -- binary data
Create cron job on CentOS
These two days, I am building a website and deploying it on a VPS server which uses CentOS 5. I don't have cPanel or Plesk for my account, so I need to install and configure everything myself including Apache, PHP, MySQL and FTP server, also today's topic cron job. Since my website has a ranking algorithm to calculate the rankings of each link and update the ranking on database and I need to calculate the rankings every 5 minutes, so I think to use cron jobs. Here are what I have done which may ...
cron job,crontab,CentOS,linux,php,example 2012-06-11 09:23:45
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
Top 10 Tell Tale Signs Your Computer Has a Virus
The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...
COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR 2017-03-19 21:05:12
Google's Business Operations in China Amid Antitrust Scrutiny
Google's journey in China has been complex, marked by strategic retreats and limited re-engagements. As of February 2025, while many of Google's consumer services remain inaccessible within mainland China, the company maintains a presence through specific business operations. However, Google's standing in China faces fresh challenges as the Chinese government recently launched an antitrust probe into the company's activities. This move comes amid rising tensions over trade and technology between...
GOOGLE,BUSINESS,CHINA,ANTI-TRUST 2025-02-12 09:33:05
2D Indoor CQB Robot Simulation
Program Design Purpose: The integration of robots in Close Quarters Battle (CQB) represents a significant advancement in modern military and law enforcement tactics. These robots, designed to navigate tight spaces, gather real-time intelligence, and engage threats, are invaluable assets in high-stakes scenarios. Our goal is to develop a 2D tactical board simulation system, similar to a computer game, that can load building floor blueprints, display CQB squad (robot) positions, enemy locations, ...
Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
We are excited to share that the Power Grid Simulation System we developed was used as part of one red team's targeted critical infrastructure system the international cyber exercise Crossed Swords 2024 which conducted in December 2024. In this article, we will introduce one power outage attack case study which use the Power Grid Simulation System as the demo platform for OT cyber security workshop. Project Design Purpose: This case study demonstrates using the Power Grid Simulation System as a...
The Internet : from 1969-1974
Internet was born 43 years ago. There are some big events in the history of Internet development. In my opinion, most of the big events happened at the first five years, i.e, from 1969-1974. 1969 : ARPANETThe Advanced Research Projects Agency Network (ARPANET), was the world's first operational packet switching network and the core network of a set that came to compose the global Internet. The first ARPANET transmission was between Stanford Research Institute and UCLA on 29th, October 1969...
Top 10 reasons to use a low-code platform
Generally, as the best coding platforms, low code includes low code app development, process development solutions and software development tools. IT users utilize low code solutions as a source of the required building blocks for the building of workflows and applications. The building blocks make it easier to assemble apps and workflows without requiring hand-coding. The growth of low-code platforms therefore levels business grounds by reducing the time spent in coding among other benefits.&nb...
LOW CODE,PROGRAMMING 2021-02-18 19:43:49
Tribute to Java On Successful Completion Of 20 Years
There is a great news for fans of Java that this week Java have completed its 20 years of success and that’s why it is celebrating its 20th anniversary. Java is a language which show legacy with the piece of technology and this is virtually important as the powerful programming methods and related machines are JVM (java virtual machine). SUCCESSFUL LAUNCH OF NEW VERSIONS Java developers are specially celebrating their event due to the huge success of their language and they get success a...
Java software development, Java development services 2015-05-29 08:23:52
How do Silicon Valley companies recruit
There are a lot of friends asking me about the basic flow of how Silicon Valley companies recruit engineers. As a candidate, I tried Facebook, Google, Yahoo, Oracle, and I received offer from all these companies. As an interviewer, I have interviewed no less than 300 people and I know about the process of recruitment. I write this article with the hope of inspiring people who want to go to Silicon Valley or who are preparing for interviews or who are in the design of the recruiting process...
Facebook,Interview,Experience,Silicon Valley 2012-05-15 06:36:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>