SEARCH KEYWORD -- DATA STORAGE
Cybersecurity | The New Dangers That Lurk Online and Their Solutions
(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...
DATA SECURITY,VPN 2020-04-23 06:47:37
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
All Programmers Are Self-Taught
When I was a teenager I played high caliber baseball. I’m competitive to a fault and when I decide I want to be good at something, results usually follow. Now I’m a third year undergrad studying computer science. There’s something critically different between programming and sports though: A pitching coach teaches you how to pitch, but a CS professor doesn’t teach you how to code. I was surprised that neither my TAs nor professors critiqued my code during my firs...
Programming,Style,Habit,Self learning 2011-12-21 10:25:50
Let's talk about JSON.stringify()
JSON has been used in lots of places to exchange data among different services/systems. Nowadays all mainstream programming languages have built-in library support of JSON data parse and stringify. In this post, let's talk about JSON.stringify() in JavaScript. Let's first take a small example of Object conversion handling. There is a requirement to convert below object const todayILearn = { _id: 1, content: '今天å¦ä¹ JSON.stringify(),我很开心ï¼', ...
JAVASCIPT,JSON,JSON.STRINGIFY 2020-02-22 04:25:08
The Role of Coding Skills in Advancing Tech Careers
In the fast-changing technical landscape of today, coding is not a unique advantage; it's a basic necessity. From a software engineer to a data analyst or digital marketer, being able to code will greatly expand the opportunities one has for their careers and how effective they can be in their jobs. This essay discusses how coding skills help one's career in the tech field and gives the basic concept of coding: objects, a building block for any modern programming language. 1. Creates Employment ...
How to Understand and Use nil in Golang Correctly?
In Golang, nil is a predefined identifier that carries different meanings in various contexts, but typically represents "none", "empty" or "zero value". It can be assigned to variables of pointer, slice, map, channel, function, and interface types. Understanding the significance of nil is crucial for writing robust Go programs, as mishandling nil can lead to unexpected issues. nil in Pointers In Go, pointers are a fundamental type that stores the memory address of a variable. When a pointer is d...
There is no privacy in front of Facebook Home
Facebook CEO Mark Zuckerberg announced the release of Facebook Home application. It will be available for Android users on 12th April. But there is one thing to be noted. What's about our privacy? Facebook is questioned by public about its privacy issues. Facebook Home is deeply integrated with Android and has fully control of the entry of user. This makes people who care about privacy alert. The editor of Gigaom Malik expressed his own worries in one article. Here is what he wrote: The new Hom...
Facebook Home,Privacy 2013-04-05 10:51:46
Big file transfer in Linux
It's very common that we need to transfer files between two different hosts such as backups. It is also an very simple task, we can use scp or rsync to complete the task well. But what if the file is very big, it may take some time to transfer it. How can we transfer a big file with high speed? Here we propose one solution. Copy file If we copy one uncompressed file, then we should follow below steps: Compress data Send it to another host Uncompress the data Verify the data integrity This will...
Nokia : Nokia map is better than Apple map
Recently, the new release of Apple map is criticized by many users because of its search results accuracy. By this time, Nokia which has its map service Ovi Maps has a comparison of three maps in its Conversations blog. These three maps are the one on the Lumia 920, the Google Map on Samsung Galaxy S3, the map on Apple iPhone 5, It wants to show that Nokia is the best among them. Let's take a look:1. Offline modeOn Lumia 920 Map, the map of the entire country is downloaded, you can position, sea...
JavaScript Attack/Defend
As developers and designers we work hard to build visually attractive, fast and easy to maintain applications. Our goals are to make sure the applications we build stick to users and keep them coming back for more. Security is not always at the forefront of our minds. No one intentionally builds insecure software but often a lack of security knowledge leads developers to build vulnerabilities into their applications. In this article we are going to examine two web security attacks, how they are ...
JavaScript,Attack,Defend,Security,Cross site 2011-10-13 13:09:11
RECENT
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- SIEM Big Data Visualization [02]: National Cyber Threats Dashboard
- Exploring the Impact of a Loan Origination System on Financial Institutions
- Power Grid OT Simulation System
- Why is Golang's Compilation Speed So Fast?
- more>>