SEARCH KEYWORD -- Background image path



  eLearning Can Improve How Educators Approach Learning

eLearning has varied benefits for learners, as has been amply documented across numerous articles on the web. It allows learners to gain access to quality education from the comforts of their homes, according to their convenience. It allows them to focus on their other interests and education at the same time.  When it comes to educators, there’s a dearth of documentation of the positive impacts of eLearning on their work. eLearning has revolutionized the entire learning process, and ...

   ELEARNING     2022-01-29 04:01:23

  Polymorphism in OOP Programming

Polymorphism is the capability of an action or method to do different things based on the object that it is acting upon. This is the third basic principle of object oriented programming. Overloading, overriding and dynamic method binding are three types of polymorphism. Overloaded methods are methods with the same name signature but either a different number of parameters or different types in the parameter list. For example 'spinning' a num...

   JAVA,OOP,POLYMORPHISM,OVERLOADING,OVERRI     2014-10-23 08:11:50

  Load html content properly in iframe

When loading content in an ifrasme, there are normally two ways: loading with src or creating iframe dynamically and set content dynamically. In this post, we will talk about how to properly load content in a dynamically created iframe element, especially on how to fix some issue we faced while in Firefox. To create an iframe dynamically, we would normally use JavaScript and with below piece of cod: let iframe = document.createElement("ifrasme"); iframe.innerHTML = "this is some text"; document...

   IFRAME,HTML,BLANK,FIREFOX,FIX     2021-04-10 02:17:27

  Facebook : App Center is more suitable for developers

Facebook recently announced that they will release their own app store named App Center. It will be released in a few weeks. At the same time, Facebook also released the introduction page of the App Center, it introduces to developers the process of app submission and the standards of app approval.Facebook allows developer to provide charged apps via App Center. Since it has over 900 million active users globally, so many developers are willing to develop apps on this platform. Facebook will dec...

   Facebook,App Center,Introduction     2012-05-13 01:03:56

  OT Railway System Development: How to Use PLC to Implement Land Based Railway Track Fixed Block Sign

Figure-00: Railway fixed block signaling system over view diagram, version v1.3 (2024) Project Design Purpose: This project aims to use Programmable Logic Controllers (PLC) with train detection sensors and train control signals to develop an automated OT system for railway track fixed block signaling control. The system will include a digital equivalent simulation to explain the logic of the track fixed block Automatic Train Control (ATC) mechanism for demonstration and training purposes. In th...

       2024-07-27 04:08:41

  How to let Google index AJAX contents?

There are lots of websites containing only one page now with the popularity of AJAX. The website will load different contents according to different inputs from users. This approach provides good user experience and it also helps save bandwidth, the drawback is that AJAX contents are not easy to be indexed by search engines. For example, if you have a website: http://example.com Users can see different contents with the appended # structure in the URL: http://example.com#1 http://example.com#2 h...

   AJAX,Search engine,Google,History     2013-07-16 00:47:14

  Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb

This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work:   [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...

       2024-07-07 03:08:22

  12 Eye-Popping Presentation Ideas That Will Keep Everyone Awake

Photo credit: Freepik Engaging an audience during a presentation is a challenge every speaker faces. The key to a successful presentation is not just delivering information but doing it in a way that captivates and keeps the audience interested throughout. Here are 12 creative and eye-popping ideas that will ensure your audience stays awake, attentive, and inspired. Start With a Shock Begin your presentation with a surprising fact, shocking image, or a provocative question. This creates immedia...

   PRESENTATION SKILL     2024-06-19 07:09:23

  Python PLC Honeypot Project

Program Design Propose : This project aims to develop a sophisticated honeypot system that emulates an OT (Operational Technology) SCADA network environment, bridging Level 1 OT field controller devices (PLCs) with Level 2 control programs, including Human-Machine Interfaces (HMIs). This honeypot will simulate various PLC models from major vendors, such as Schneider and Siemens, while supporting the primary communication protocols Modbus-TCP and Siemens-S7Comm. The system will integrate essenti...

       2024-11-25 03:56:49

  Understand diff in Unix

diff is an important tool program in Unix. It is used to compare differences of two files, it is the foundation for code version control. If you type : $ diff <file_before_change> <file_after_change> diff will tell you what's the difference between these two files. The result may not be so easy to understand, so now I will show you how to understand diff. 1. 3 formats of diff diff has 3 formats due to historic reasons. normal diff context diff unified diff 2. Demo files For easy d...

   diff,Unix,version control,git     2012-09-03 10:49:36