SEARCH KEYWORD -- BLOCK ACCESS



  Fix could not read Username for 'https://xxx.com': terminal prompts disabled

Recently was working on a project which needed to build a docker image, but unfortunately it kept failing as below error was seen. fatal: could not read Username for 'https://xxx.com': terminal prompts disabled Based on the error, it looked like it was trying to pull code from remote Gitlab repository but failed as the terminal prompt is disabled. At first glance, have a doubt why it needs terminal prompt to be enabled? It should just succeed and without prompting for anything. The only reason...

   GIT,TERMINAL PROMPTS DISABLED,DOCKER     2020-12-13 04:43:12

  Three ways to define class in JavaScript

In object oriented programming, class is the template of object, it defines the properties and methods of a group of objects. Unfortunately, JavaScript doesn't support class, but we can have some workarounds to simulate class.1. Constructor functionThis is the classical approach, it is also the approach mentioned in many text books. It uses the constructor function to simulate class and it uses the keyword this to represent the object internally.function Cat() {  this.name = "Kelly...

   JavaScript,Class,Method,Private,Inheritance     2012-07-09 11:59:51

  First Chinese app on Google Glass : PM25.in

PM25.in is an open source PM2.5 project developed by BestApp. It retrieves PM2.5 data of different cities in China through a crawler and then processes the data retrieved. They also created an API which enables third parties to access these data. Now the team has built something new, they moved this project to Google Glass and developed the world's first Chinese Google Glass application -- PM25.in. Now users with Google Glass can check PM2.5 of different cities in China. The final effect on Goog...

   Google Glass,China,PM25.in,BestApp     2013-06-23 10:17:40

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  Implementing DESede/ECB/NoPadding cipher algorithm in GoLang

By default, GoLang doesn't provide the ECB mode cipher for DESede though there is CBC mode provided. In cases we need to encrypt/decrypt data with ECB mode, we need to implement those by ourselves. This mode is frequently used when encrypting/decrypting PIN block which is small block data less than 16 bytes. In this post, we will introduce how to implement the DESede/ECB/NoPadding algorithm in GoLang by using the existing cipher support. Here we will not cover how DESede works in detail, instead...

   SECURITY,SAMPLE,GOLANG,DES,DESEDE,3DES     2019-07-29 06:43:50

  Create animated refresh button in Android

In Android, we can have drawings on a button, also we can put animated drawings on a button as well. Today we will show how to create an animated refresh button with an animated spinner on it. We need to create an animated drawing first. Here we name it as progress.xml and put it in the res/drawable folder: <?xml version="1.0" encoding="utf-8"?><animation-list xmlns:android="http://schemas.android.com/apk/res/android"    android:id="@+id/spin_refresh" android:oneshot="fal...

   Animation,Spinner,Refresh button,Android     2012-11-02 11:51:41

  Venn Diagram entirely in CSS

The HTML5 Microzone is presented by DZone and Microsoft to bring you the most interesting and relevant content on emerging web standards.  Experience all that the HTML5 Microzone has to offer on our homepage and check out the cutting edge web development tutorials on Script Junkie, Build My Pinned Site, and the HTML5 DevCenter. A friend of mine alerted me this weekend to just how much I have a weird fascination with Venn diagrams. I decided to roll with it. So yeah...

   CSS,Venn Diagram,Implementation     2012-02-06 08:10:41

  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  Exploring Open edX: A Global Platform for Online Education

Understanding Open edX The digital education sector has seen a rise in platforms that enhance global learning access. Open edX, in particular, has made a significant mark with its comprehensive and robust features. Companies like Raccoon Gang offer specialized open edX services to further enhance this platform's capabilities. This article delves into the essence of Open edX, highlighting its key components and global appeal. Open edX Core Features Course Authoring: User-friendly tools for cou...

   OPENEDX,LEARNING     2024-06-04 23:09:45

  Step-by-Step Guide: How to Choose a Website Developer

A software development partner greatly affects the success and performance of your online project it is involved in. Therefore, it is so important to approach your IT partner selection with special care and responsibility. Find below the main steps and decisions you need to make in order not to fail in this business.  Step 1: Decide What Tasks the New Site Should Perform The main goal of any business (and a website) is to generate and grow profits. You shouldn't create or update a site just...

   WEBSITE DEVELOPER,WEB DESIGN     2020-08-26 03:56:41