SEARCH KEYWORD -- CONTENT SECURITY POLICY



  Microsoft is transforming XBox into a PC controlled by expressions

According to the Voice of China "News Coverage" report. When Apple products are changing  the world, the original computer giant Microsoft is also quietly looking for their new foothold in the field of electronics. This time the breakthrough is from its game console Xbox.Xbox was originally a single function console, there are signs that Microsoft may be planning for the Xbox into the computer with new functions. The selling point of this new product lies in its function of communic...

   Microsoft,XBox,New PC,China     2012-04-01 06:57:04

  I'm Retiring from PHP

I am retiring from PHP as my language of choice for personal side projects and new programming ventures. This was not an easy decision to come to, but one that I think is necessary for my love of programming to continue. You see, I'm not only a programmer because I love programming, but because I can not do anything else. History It all started in 1999 when I was in 8th grade. The Internet was really starting to get interesting and I wanted to start programming. I had picked up...

   PHP,Scala,Programming,Language     2011-06-27 07:36:25

  Penrose Tiling in Obfuscated Python

Here’s a Python script which renders some Penrose tiling. Yes, this is valid Python code: _ =\ """if! 1:"e,V=100 0,(0j-1)**-.2; v,S=.5/ V.real, [(0,0,4 *e,4*e* V)];w=1 -v"def! E(T,A, B,C):P ,Q,R=B*w+ A*v,B*w+C ...

   Python,Disorder,Code,Writing,Style     2011-09-14 11:57:34

  The Death of File Sharing

Last week’s violent government attack on the hugely popular site Megaupload — the U.S. government arresting Belgian citizens in New Zealand, of all places, and stealing at gunpoint servers bank accounts and property — has sent shock waves through the entire digital world. The first shock was the realization that the gigantic protest against legislative moves (SOPA and PIPA) that would smash the Internet turned out to be superfluous. The thing everyone wanted to prevent is al...

   File sharing,Death,Trend,Cloud     2012-02-01 04:44:06

  bash network interface

Some of us may have seen /dev/tcp/<host>/<port> before, is this a special file system implemented in some BSD kernel? Because there is no /dev/tcp in Linux. Actually, this one is implemented in bash. We no need to rely on wget,nc to do network connection. It's very easy to use this interface: bash-4.2$ cat </dev/tcp/time.nist.gov/13 56188 12-09-18 15:34:26 50 0 0 733.5 UTC(NIST) * bash-4.2$ exec 3<>/dev/tcp/www.w3.org/80 bash-4.2$ echo -e "GET / HTTP/1.0\n\n" >&3 b...

   Bash,Network interface,/dev/tcp     2013-07-20 00:57:52

  Is Facebook developing RSS reader?

According to Sina Tech, on Thursday developer Tom Waddington said that he found some strings like "RSS feeds" in Facebook codes, it means that Facebook may launch its own RSS reader.Google announced in March this year that they would close its RSS subscription service Google Reader on July 1 mainly because its use had constantly declined in the past few years. Subsequently, many companies competing to launch Google Reader alternatives. Waddington believes that this time Facebook will also join t...

   Facebook,RSS reader     2013-06-14 12:41:11

  Deep clone of JavaScript object

In JavaScript world, it's frequently seen object clone. Normally when creating a clone of an object, it's only the reference being cloned but not all contents. In some scenarioes, it's desired to clone all the content instead of just the reference such that any change made to the cloned object will not change the original object. Differences between shallow clone and deep clone can be as simple as: Shallow clone : Only the object reference is cloned but not the content Deep clone : Clone all co...

   JAAVSCRIPT,DEEP CLONE,DEEP COPY,SHALLOW CLONE,SHALLOW COPY     2016-10-31 00:27:24

  Australian software engineer got asked algorithm question when entering US

The whole world knows that security and background checks get tighten for people to enter US since Donald Trump took office. But have you ever heard about getting algorithm question asked during the immigration check interview while entering United States? Recently an Australian software engineer David Thornton had such an experience when he tried to enter US. (Image from kaytlentravels.wordpress.com) David is a software engineer from Sydney and he is a 24-year-old studied computer sci...

   NEWS,DONALD TRUMP,UNITED STATES     2017-03-04 12:07:54

  Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java

Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...

   JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION     2023-04-28 21:22:10

  When to Make a Mobile Web Application

I believe that unless your application meets one of these native application criteria, you should not create a native application, but should instead focus on building a mobile web application. Like I said before, I’m a big fan of native applications and I feel that there are a lot of great innovative and market opportunities here, but mobile web apps are the only long-term viable platform for mobile content, services, and applications. Native applications don’t service t...

   Web app,Situation,Condition,Native application     2011-12-12 02:45:52