SEARCH KEYWORD -- DATA STORAGE



  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI

We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1  When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...

   HARDWARE,RASPBERRY PI     2019-05-20 08:52:55

  All Programmers Are Self-Taught

When I was a teenager I played high caliber baseball. I’m competitive to a fault and when I decide I want to be good at something, results usually follow. Now I’m a third year undergrad studying computer science. There’s something critically different between programming and sports though: A pitching coach teaches you how to pitch, but a CS professor doesn’t teach you how to code. I was surprised that neither my TAs nor professors critiqued my code during my firs...

   Programming,Style,Habit,Self learning     2011-12-21 10:25:50

  Let's talk about JSON.stringify()

JSON has been used in lots of places to exchange data among different services/systems. Nowadays all mainstream programming languages have built-in library support of JSON data parse and stringify. In this post, let's talk about JSON.stringify() in JavaScript. Let's first take a small example of Object conversion handling. There is a requirement to convert below object const todayILearn = { _id: 1, content: '今天学习 JSON.stringify(),我很开心!', ...

   JAVASCIPT,JSON,JSON.STRINGIFY     2020-02-22 04:25:08

  The Role of Coding Skills in Advancing Tech Careers

In the fast-changing technical landscape of today, coding is not a unique advantage; it's a basic necessity. From a software engineer to a data analyst or digital marketer, being able to code will greatly expand the opportunities one has for their careers and how effective they can be in their jobs. This essay discusses how coding skills help one's career in the tech field and gives the basic concept of coding: objects, a building block for any modern programming language. 1. Creates Employment ...

   CODING,OOP,OBJECT     2024-05-04 14:27:42

  How to Understand and Use nil in Golang Correctly?

In Golang, nil is a predefined identifier that carries different meanings in various contexts, but typically represents "none", "empty" or "zero value". It can be assigned to variables of pointer, slice, map, channel, function, and interface types. Understanding the significance of nil is crucial for writing robust Go programs, as mishandling nil can lead to unexpected issues. nil in Pointers In Go, pointers are a fundamental type that stores the memory address of a variable. When a pointer is d...

   FUNCTION,SLICE,MAP,CHANNEL,GOLANG,NIL     2024-01-05 05:19:40

  There is no privacy in front of Facebook Home

Facebook CEO Mark Zuckerberg announced the release of Facebook Home application. It will be available for Android users on 12th April. But there is one thing to be noted. What's about our privacy? Facebook is questioned by public about its privacy issues. Facebook Home is deeply integrated with Android and has fully control of the entry of user. This makes people who care about privacy alert. The editor of Gigaom Malik expressed his own worries in one article. Here is what he wrote: The new Hom...

   Facebook Home,Privacy     2013-04-05 10:51:46

  Big file transfer in Linux

It's very common that we need to transfer files between two different hosts such as backups. It is also an very simple task, we can use scp or rsync to complete the task well. But what if the file is very big, it may take some time to transfer it. How can we transfer a big file with high speed? Here we propose one solution. Copy file If we copy one uncompressed file, then we should follow below steps: Compress data Send it to another host Uncompress the data Verify the data integrity This will...

   Linux, SCP,ZIP     2013-01-10 05:55:50

  Nokia : Nokia map is better than Apple map

Recently, the new release of Apple map is criticized by many users because of its search results accuracy. By this time, Nokia which has its map service Ovi Maps has a comparison of three maps in its Conversations blog. These three maps are the one on the Lumia 920, the Google Map on Samsung Galaxy S3, the map on Apple iPhone 5, It wants to show that Nokia is the best among them. Let's take a look:1. Offline modeOn Lumia 920 Map, the map of the entire country is downloaded, you can position, sea...

   Lumia 920,Galaxy s3,iPhone 5,Map     2012-09-22 00:09:24

  JavaScript Attack/Defend

As developers and designers we work hard to build visually attractive, fast and easy to maintain applications. Our goals are to make sure the applications we build stick to users and keep them coming back for more. Security is not always at the forefront of our minds. No one intentionally builds insecure software but often a lack of security knowledge leads developers to build vulnerabilities into their applications. In this article we are going to examine two web security attacks, how they are ...

   JavaScript,Attack,Defend,Security,Cross site     2011-10-13 13:09:11