SEARCH KEYWORD -- CONTENT SECURITY POLICY
Use downcase! with caution in Ruby
Ruby provides ! to change state of some object in place. Hence if you see some functions have ! appended, it means the state of the caller of the function is expected to be changed. This is a very interesting Ruby feature. But sometimes one should be cautious when using this kind of functions because you would get unexpected behavior if using improperly. Let's take an example of String#downcase!. According to the documentation. Downcases the contents of str, returning nil if...
RUBY,EXCLAMATION MARK,DOWNCASE 2017-02-10 06:34:44
Mozilla Firefox Browser Tips & Tricks You Didn't Know About
Chrome might be all the rage right now, but Mozilla’s Firefox browser has always held its own in the browser wars. This open-source browser has its core set of dedicated fans and is popular under a broad user base across the world. With Firefox’s faster web page download speeds and strong privacy policies, it’s not hard to imagine why. But there are some other brilliant features that many might have missed. Take a look at these seven Firefox tricks that many users don’t k...
Testing is not a Feature
I pointed out to someone at work today that PyDev 2.5.0 now offers really cool TDD support. I’m not a huge TDD proponent or anything, but this stirred up a discussion. This guy, let’s call him John, said that “TDD may shorten the time it takes to develop a feature, but sometimes a feature is so urgent we may want to deliver it as quickly as possible and test it laterâ€.Sentences like that make me weep. I tried to explain that without testing, the...
Testing,Feature,Software testing 2012-04-24 06:30:09
How to praise yourself in resume
When finding a job, we first need to send our CV and resume to the employer. Among many candidates, how do we make our resume prominent and noticed by the employer. We need some impressive information. We can praise ourselves in the resume so that the employer can have a good impression on me. Here we summarized a list about how to praise ourselves in our resume.Mature, dynamic and honest.Excellent, ability of systematical management.Ability to work independently, mature and resourceful.A person...
Telecom elements in WeChat
As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...
WeChat,Telecom operator 2013-04-13 20:29:46
7 Incorrigible Mistakes Of Mobile App Design
Plethora of mobile apps are launched every day, let alone a month or a year. With such a rising competition making an app which is not liked by people is a committal sin not just from a user's perceptive but also due to so many people and their efforts attached to it. In this blog we will discuss some of the very important factors which one should know before crafting an app. It's obviously not worth crying over the split milk as 80% of the users not even open an app again if they encounter ...
Mobile App 2015-06-18 08:08:48
Why email is crucial to Google, Microsoft and Yahoo
Google, Microsoft and Yahoo. These three companies rule webmail withGmail, Hotmail and Yahoo Mail, the three largest email services on the Internet.What might escape a lot of people, though, is just how important email services are for the online presence of those companies (yes, even for Google). To give you an idea, let’s look at some rather interesting website traffic numbers.Webmail share of site trafficAlexa can give you an estimate of how many peop...
Gmail,Yahoo,Hotmail,Important,Email,Stat 2011-05-27 12:44:05
Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb
This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work: [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...
Installing LAMP On Ubuntu
In this guide I will show you how to install a LAMP system. LAMP stands for Linux, Apache, MySQL, PHP. The guide is intended to help those who have very little knowlegde of using Linux. Install ApacheTo start off we will install Apache.1. Open up the Terminal (Applications > Accessories > Terminal).2. Copy/Paste the following line of code into Terminal and then press enter:sudo apt-get install apache23. The Terminal will then ask you for you're password, type it an...
Sony is to release PlayStation4 in 2015
According to Japanese media, Sony may release its flagship game console PlayStation 4 in the Christmas 2013, codenamed Orbis, As the source of the message is very reliable, so the possibility of a new generation of Sony PlayStation 4 game console to the market next year is still quite large. Sony has registered the Orbis domain name, but people are still unable to obtain relevant news on the Orbis website. The release plan on the Sony PlayStation4 game console will be officially launched this s...
Sont,PS4,PlayStation,High resolution 2012-04-04 08:44:13
RECENT
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure
- Introduction to the Application of eBPF in Golang
- more>>