SEARCH KEYWORD -- AUTO DIALER



  An experience on fixing HTTP 406 Not Acceptable error

This post is about an experience of mine on fixing a HTTP 406 Not Acceptable error seen on one of my page. Just got back from a business trip and opened my computer as usual to start to monitor my website statistics. But when I opened the page on showing real time page views, it shows nothing but zero. So I pressed F12 to bring up the developer tool to check on what's going on. The logic of loading the real time page view is backed by AJAX call. In the developer tool console, I see that the rAJA...

   PHP,AJAX,HTML,HTTP 406,CONTENT-TYPE     2019-03-30 04:09:10

  A Chinese Programmer Accused of Circumventing Great Firewall Faces Confiscation of RMB 1.05 Million

Recently, a programmer posted an article on Weibo claiming that he was working for an overseas company while accessing the international internet. He was subsequently accused by the Shuangqiao Public Security Sub-bureau in Chengde, Hebei of "illegally establishing and using non-official channels for international networking" and received an administrative penalty of a fine of RMB 200 and the confiscation of "illegal gains" totaling RMB 1.05 million. This is the most severe punishment reported s...

   GITHUB,CHINESE     2023-09-25 07:57:58

  HTML above flash (transparency + z-index)

We have faced this problem many of the times. When we want to display some message on top of all layers on a page or use some feature like jQuery light boxes. Normally the flash file continues to shine through the page. No matter what you do with layering the dom elements using z-index.See the layering flash content problem definition here.Before this, people used to dodge this issue with some fixes like hiding the flash area completely and then showing a static image of...

   HTML,Flash,Above,z-index,wmode,transpare     2011-05-01 15:46:34

  Capture video stream with WebRTC

WebRTC(Web Real-Time Communication) is an API supporting real time audio and video communication through a browser. It is now a recommended W3C standard. This post is to show you how to capture video stream and screenshot with WebRTC. Capture video stream To play video stream from the video camera, we first need to put a video tag in our code: <video id="video"></video> The main function to get the video stream is the navigator.getUserMedia, as of now only few of the browsers support...

   WebRTC,Video,Screenshot     2013-10-24 21:04:41

  YOU'RE A DEVELOPER, SO WHY DO YOU WORK FOR SOMEONE ELSE?

As a developer, you are sitting on a goldmine. Do you even realize it? No, seriously, a @#$% goldmine!Never in modern history has it been so easy to create something from scratch, with little or no capital and a marketing model that is limited only by your imagination.Think about the biggest websites you visit or use on a regular basis: Facebook, Twitter, Flickr, Foursquare, or even Google for that matter -- all of them were created by developers who created something from little more than an id...

   Developer,Work,Startup,Money,Idea,Time     2011-11-06 14:35:48

  How to password protect a Winzip file

Winzip files are great ways of sharing documents and images of large sizes over the web or through email, since their reduced size makes it possible for them to be sent and received. Also, it is easier to manage one attachment than multiple. But what if the file contains sensitive information you don’t want snoopers to see? Simply add a password protection in Winzip. Adding a password will ensure more security and reliability of the transported files. How to add a Password to your Zip Fil...

   DATA SECURITY,WINZIP     2019-08-29 11:42:41

  Subdomain Configuration

Subdomain ConfigurationA subdomain configuration is very similar to a domain name configuration. The only difference is that the subdomain entry is tied to the corresponding domain name lookup. A request for the subdomain (e.g. http://content.websitegear.com) will be routed to a DNS server containing the DNS information for the parent domain (websitegear.com). Once the DNS record for the subdomain is resolved to a particular IP address, the request is sent to the web server listening on that IP ...

   Domain,Subdomain,Configuration,Setup     2011-10-09 09:23:16

  Is Java Set ordered or not?

“Is Java Set ordered or not? ” is the most popular question asked when you interview for a Java Developer position. Many fail to answer it, and I have to admit I was one of the many. I have known the answer is “Yes and No” for a long time. No. HashSet is not ordered. Yes.TreeSet is ordered. If the interviewer continues with some follow up questions, I’m not confident that I know the answer then. Why is TreeSet ordered? Are there any other ordered S...

   ORDER,SORTEDSET,HASHSET,JAVA     2021-02-11 06:55:00

  5 Amazing Firefox Add-ons That Ensure Superior Software Testing

In this rapidly evolving IT world, quality has become the primary parameter to achieve a niche position. The IT professionals are using an array of advanced software testing tools to ensure an excellent quality of the application. And among this set of highly sophisticated software testing tools and techniques, web browser has emerged as one of the simplest, nicest and affordable means which can be easily used, even on a daily basis for testing life cycle of the application. In fact, there is h...

   software testing, web testing     2014-11-25 07:38:51

  Secure Your Go Code With Vulnerability Check Tool

Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...

   GOVULNCHECK,GOSEC,GOLANG     2022-10-29 23:43:20