SEARCH KEYWORD -- Access token



  Shell script common interview questions

Shell script is frequently used when monitoring system status on Linux. It's not an easy task to write shell script but it's a very important skill for developers and system administrators to ease work and automate common tasks. This post will share some common interview questions about shell script. 1. Get random characters(8 characters) Method 1 # echo $RANDOM |md5sum |cut -c 1-8 471b94f2 Method 2 # openssl rand -base64 4 vg3BEg== Method 3 # cat /proc/sys/kernel/random/uuid |cut -c 1-8 ed...

   LINUX,INTERVIEW,SHELL SCRIPT     2018-09-28 10:46:00

  Chrome to block mixed content downloads in version 86

Google has announced its plan to block mixed content downloads in Chrome in February 2020 and now the day to block mixed content downloads is coming soon as we are nearing October when Chrome 86 is supposed to be released. What is mixed content downloads? According to Google, it is non-HTTPS downloads started on secure pages. For example, if you access a page called https://example.com/download, and in this page, there is a download link to http://download.example.com/something, ...

   CHROME,MIXED CONTENT DOWNLOADS     2020-09-18 21:10:53

  Microsoft to lay off Zune

Recently we can see many news about Microsoft's Windows 8, Microsoft puts much effort to promote Windows 8.  A few days ago, Microsoft announced the death of Windows Live brand, instead they will integrate it into the Windows system. Also, Microsoft now plans to lay off its Zune and focus on XBox, let XBox be the main entertainment service of Microsoft. XBox can provide  music and videos, it can also let users play video games.Here is a part of Microsoft's announcement:This year, Xbox ...

   Windows 8,Zune,XBox,Microsoft,Layoff     2012-05-30 08:14:58

  Mobile devices are facing new threats

More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...

   Mobile device,Data security,Malicious software     2012-04-05 13:00:57

  Seven Java projects that changed the world

O\'Reilly is celebrating the release of Java 7, and our inaugural OSCON Java conference: July 25-27 in Portland, Ore. Java\'s open source ecosystem is strong and healthy, one of the primary reasons for our creation of OSCON Java. Over the last decade, several projects have traveled beyond mere adoption and had effects dominating the Java world, into software development in general, and some even further into the daily lives of users. JUnit Ported to Java by Kent Beck and Erich Gamma from Be...

   Java,Projects,Prominent,Eclipse,Sue     2011-07-26 02:50:42

  Using Java keytool programmatically

Java provides a command line tool to access and operate different keystore which store keys and certificates. This tool is named keytool and is located at \bin.  On command line, you can issue below command to generate a keystore named mytest.jks which contains a private key and certificate chain. keytool -genkeypair -alias mykey -keyalg RSA -sigalg SHA256withRSA -dname CN=Java -storetype JKS -keypass password -keystore mytest.jks -storepass password Sometimes, in testing purpose, w...

   JAVA,KEYTOOL     2016-01-09 06:28:07

  Something you may not know about Shell

Shell is also called command line interface, it is the interface between *nix users and computer. Shell is a program which provides service to access OS kernel services. This article is to introduce some not so well known but useful and interesting knowledge about shell. Wiki shell was born almost at the same time as Unix. The first UNIX shell was written by Ken Thompson in 1971 and its name is Thompson sh. It's older than Linux kernel. The default Shell in most *nix and MacOS is bash, bash was...

   Linux, Unix,Shell,Command     2012-11-24 07:19:47

  Apple patent shows they are developing "Killer" 3D Camera

This is not the first time that Apple patent shows they have interest on 3D camera technology. In November last year, one Apple patent shows that Apple is developing advanced three-dimensional object recognition and verification technology. According to PatentlyApple report (March 30,2012) one patent released this week shows that Apple is developing a 3D camera technology for the future iOS devices. This 3D camera is described as an advanced component with advanced micro-lens, depth, chrom...

   3D Camera,Apple,Patent     2012-04-03 07:46:35

  SD Cards: Why Order Them In A Bulk?

Backing up important data is an undeniable aspect of the technologically advanced modern world. Be it photographs, videos, movies or other significant data, they all need to be stored properly for future use.  SD card or Secure Digital card is one such device that will help store all the relevant materials securely. As the name suggests, it secures all digital data. To understand why we should order bulk SD cards, we need to know why they are so beneficial.  They are extremely compact,...

   HARDWARE,SDCARD     2019-10-10 10:43:27

  When to Make a Mobile Web Application

I believe that unless your application meets one of these native application criteria, you should not create a native application, but should instead focus on building a mobile web application. Like I said before, I’m a big fan of native applications and I feel that there are a lot of great innovative and market opportunities here, but mobile web apps are the only long-term viable platform for mobile content, services, and applications. Native applications don’t service t...

   Web app,Situation,Condition,Native application     2011-12-12 02:45:52