SEARCH KEYWORD -- DATA ENGINEERING
Generating CSR using Java
A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq. But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...
JAVA,SECURITY,CSR,CERTIFICATE REQUEST 2016-05-25 04:49:17
LinkedIn ceases operations in China
Microsoft's social platform LinkedIn announced on Wednesday, August 9th, that it would cease its operations in China, ending its nearly decade-long presence in the Chinese market. This move signifies the departure of a major Western social media platform from China. Currently, when accessing LinkedIn's domain within China, users are redirected to a page that provides services for corporate clients. The mobile app for "LinkedIn Workplace" displays a message stating, "Unable to load data." ...
How Do I Enable Remote Access To MySQL Database Server?
By default remote access to MySQL database server is disabled for security reasons. However, some time you need to provide remote access to database server from home or a web server. If you want to remotely access to the database server from the web server or home, follow this quick tutorial.MySQL Remote AccessYou need type the following commands which will allow remote connections.Step # 1: Login Using SSH (if server is outside your data center)First, login over ssh to remote MySQL database ser...
MySQL,Remote access,Enable,Host or webdomain 2011-10-31 00:31:41
Some measures for improving Linux server security
The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...
Linux server,Server security 2012-08-21 05:08:50
Jackie the smart quadcopter to launch at Robotics Week
Flying security camera synced to smartphone kicks off Kickstarter campaign Entrepreneurs and robotics graduate students Jackie Wu and Ritwik Ummalaneni, in Northwestern University’s Master’s in Robotics program, are launching their new product, Jackie, during the National Robotics Week. The flying security camera quadcopter syncs straight to a smartphone, and is the next evolution in home security platforms that consumers have been waiting for. Jackie’s intuitive and easy co...
Startup,Quadcopter,Security camera,Jackie Wu 2015-04-05 20:56:11
Gaussian Blur Algorithm
Usually, image processing software will provide blur filter to make images blur. There are many algorithms to implement blur, one of them is called Gaussian Blur Algorithm. It utilizes Gaussian distribution to process images. This article is to introduce Gaussian Blur algorithm, you will find this is a simple algorithm. In fact, it is a kind of data smoothing which can be used in many situations. 1. Gaussian Blur theory The so called blur can be understood as taking a pixel as the average valu...
ALGORITHM,GAUSSIAN BLUR, IMAGE BLUR 2020-09-12 02:34:40
Beginners guide to Linux directory structure
Have you ever looked in your / directory, you’ll see a lot of directories. Here we are presenting beginners guide to linux directory structure explaining what they mean and what are the contents of these directories.Screenshot of contents of root directory: /This is called root partition. All files and directories start with root partition. Write privileges under this directory are avaible with root user only. Not to confuse it with root user’s home directory, know the ...
Linux,File system structure,Beginner's guide 2012-04-20 12:19:32
Email Modular Design – An Overview
Email is one of the most prevalent forms of business communication. Businesses all over the world send hundreds of email every day to communicate with their customers in a personalized, intimate way, providing useful information, special offers, records of business transactions, official news or messages and much more. Right from one or two-man projects to large Fortune 500 companies, every business entity uses emails on a daily basis to stay in touch with their base of customers. As a company g...
email 2014-08-14 08:22:03
If You’re Busy, You’re Doing Something Wrong: The Surprisingly Relaxed Lives of Elite Achievers
The Berlin StudyIn the early 1990s, a trio of psychologists descended on the Universität der Künste, a historic arts academy in the heart of West Berlin. They came to study the violinists.As described in their subsequent publication in Psychological Review, the researchers asked the academy’s music professors to help them identify a set of stand out violin players — the students who the professors believed would go onto careers as professional performers.Weâ...
Relax,Elite,Achievement,Work life balance 2011-11-11 02:37:03
PHP Security
1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...
PHP,Security,SQL Injection,XSS Cross sit 2011-10-01 02:25:31
RECENT
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- more>>