SEARCH KEYWORD -- BLOCK ACCESS
Google released a visual programming language Blockly
Google released a visual programming language Google Blockly, similar to the children programming language Scratch developed by MIT. You can build an application using some graphic objects, this is like playing LEGO toys. Eveny graphic object is a code block, you can integrate them together to create simple functions, then you can combine some simple functions together to build a complete application. Users can drag blocks together to build an application. No typing required.This project...
Google,Blockly,Visual programming language 2012-06-05 08:58:26
Snapkidz for children under 13
According to 36 Kr, in the past, you must be over 13 years old to register on Snapchat, while Snapchat added a new feature called Snapkidz in the latest version of its iOS app last weekend, users under 13 years old can use it now.In short, Snapchat categorize users using people's age. For users older than 13, there are no many changes; but for those younger than 13, you can also fill out the registration form, but these information are not sent to Snapchat for registering a new account, instead...
All I Know About Certificates -- Websites
In last article, we know the role of clients and their responsibilities for certificate verification. Finally, let's talk about websites. We've discussed many potential issues between CAs and clients concerning certificates, but the most frequent issue is with websites—many websites have faced this problem: certificate expiration. Websites need to ensure two things: Ensure their certificate does not expire. Protect their private key from being leaked. If someone else obtains the priv...
CLIENTS,WEBSITES,SSL CERTIFICATE,CERTIFICATE AUTHORITY,CA 2024-07-26 22:33:29
SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...
Shell script common interview questions
Shell script is frequently used when monitoring system status on Linux. It's not an easy task to write shell script but it's a very important skill for developers and system administrators to ease work and automate common tasks. This post will share some common interview questions about shell script. 1. Get random characters(8 characters) Method 1 # echo $RANDOM |md5sum |cut -c 1-8 471b94f2 Method 2 # openssl rand -base64 4 vg3BEg== Method 3 # cat /proc/sys/kernel/random/uuid |cut -c 1-8 ed...
LINUX,INTERVIEW,SHELL SCRIPT 2018-09-28 10:46:00
When and Where to Use Pointers in Go
When declaring variables in Go, we usually have two syntax options: In some scenarios, pointers; in others, reference; sometimes, either. It’s great to have choices, but it is also confusing sometimes as to which one in which scenario. To be more reasonable in choice-making, I started from pointers, walked through their natures, and summarized some rules in using them in Go. from unsplash, Jordan Ladikos Pointers Go has pointers. A pointer holds the memory address of a ...
NIO vs IO in Java
Java 1.4 provides a new API for handling IO -- NIO. This is a non-blocking and buffer oriented IO API. Below are main differences between the NIO and IO in Java. IO NIO Stream oriented Buffer oriented Blocking IO Non-blocking IO N/A Using selector Stream oriented vs Buffer oriented The main difference is that IO is stream oriented where the data is read byte by byte and the data will not be buffered normally.This means there is no pointer to move forward and backward in the stream. I...
Office is confirmed to be on iOS and Android
In May, there were news that Microsoft Office software would be on iOS and Android platforms. Now Microsoft officially confirmed the news and said that the Office would be on iOS and Android in some form.Not too long ago, Microsoft Czech branch had said that the Office would be on iOS and Android early next year.Microsoft said: "As we shared previously, Office Mobile will work across Windows Phones, Android phones and iOS, and we have nothing additional to announce today about retail availabili...
Bing now supports code search
In programmer's daily life, much time is spent on searching Google or StackOverflow for code snippets which can help them understand how the code works. Now there is one more option. Microsoft's Bing now adds a new feature which support code snippet search. With this new feature, you can search code snippet and execute them directly within the search results. For example, if you type "quick sort java", you will see below search result : This feature now supports a few popular programming langua...
BING,CODE SEARCH,HACKERRANK 2016-04-09 02:49:25
Linux Kernel is replacing HTTP link with HTTPS
Linux kernel is in the process of replacing the HTTP links in its source code with HTTPS links. HTTPS is considered more secure than HTTP and can prevent lots of attacks like Man-In-The-Middle attack. Currently there are more than 150 patches submitted by Linux Kernel developers to replace these HTTP links. One thing to be noted is this replacement process is not a manual search and replace process. Indeed, some scripts are created to find out these links and try to find whethe...
LINUX KERNEL,HTTP,HTTPS 2020-08-08 01:35:20
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>