SEARCH KEYWORD -- DROP TABLE
How big is sizeof structure?
First let's see the codes of a structure: struct node{ int a; int b; }; Question : What's sizeof(node)? The answer is very simple, on a 32 bit machine, an int will take 4 bytes and two ints will take 8 bytes. So sizeof(node) is 8. The answer for the above codes is 8, then how about the following structure: struct node{ char a; int b; }; Question : Then what's sizeof(node) now? int takes 4 bytes, char takes 1 bytes, is the answer 5? Now the answer may not be 5, on some mac...
Data structure alignment, pack 2012-10-29 12:13:37
Handling Chinese Character Encoding Issues in Oracle Database
When working with Chinese data in Oracle databases, character encoding issues often lead to garbled text, preventing proper display and processing. This is typically because the default character set in Oracle is US7ASCII, which cannot recognize Chinese characters. By modifying the character sets of the database, client, and application, data can be converted to the correct character set, thus avoiding garbled text issues. This article introduces several methods to resolve Chinese character enco...
ORACLE,CHINESE CHARACTER,UNICODE,DATABASE 2024-07-12 21:09:14
iPhone App Development: What’s New For Developers In iOS 11
A curiosity ends with the introduction of iOS 11 on 5th of June 2017. It is the next-generation version of iOS. This update takes the best and most advanced operating system and turns it up to 11. But with iOS 11 was released to the public on 19 September 2017 and since then, there have been two distinct updates to iOS 11.02 which fixed the earpiece noise during phone calls; and the major iOS 11.1. iOS 10 was an operating system update that largely ignored the iPad, but Apple made up for it in ...
Why my Website Contact form is not converting enough traffic?
Contact forms are a very common part of any website and anybody can overlook them. Generally people try to choose it as their first solution but they do not realize that they are actually hurting the growth of their business. WordPress currently power more than 66 million websites but it would be good if your website is existing because of one of the most popular Content Management Systems of the world. Everyone starting from blogger to the person sitting next door use this tool for making their...
website contact form tutorial 2014-11-17 05:04:03
How does JGSS read Windows native TGT credential?
MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...
KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE 2015-03-25 03:42:32
MySQL Index Merge Optimization Practices
In production environment databases, it is often seen that some SQL where conditions include: equal condition on a normal index + primary key range query + order by limit Although using a normal index would be more efficient, the system chooses to use index merge instead in some cases. This article explores such index merge situations. Index Merge Official Introduction The Index Merge access method retrieves rows with multiple range scans and merges their results into one. Generall...
INDEX MERGE,MYSQL,PRIMARY INDEX,SECONDARY INDEX 2024-09-10 04:52:26
File upload in PHP
File is a special kind of form data, when being uploaded to the server through HTTP POST request, PHP will create a $_FILES global array, the relevant file information will be stored in this global array. We will illustrate file upload with some code snippets using PHP and look into the internal work mechanism. Lastly will talk about file upload security. File upload In order for users to upload files in client side, we have to provide a form on the user interface. Since the uploaded file is a s...
File upload,PHP 2012-11-30 22:01:28
Understanding Twitter Bootstrap 3
On 27, July, Twitter Bootstrap 3 RC 1 was released, if there are no major bugs found in this release, then it will be the final released Twitter Bootstrap 3 with some minor changes. What changes does Bootstrap 3 have compared to Bootstrap 2? After checking the documents, we can find that there are mainly 3 changes. Embrace flat design In Bootstrap 3, it begins to embrace flat design. First from the official webpage of Bootstrap 3, we can find elements are flat designed. Also, all buttons have no...
Bootstrap 3,Change,Bootstrap 2 2013-08-05 07:06:22
37 powerful Linux shell commands
To work on Linux platform, you cannot avoid using shell commands to complete some tasks. These tasks can be as simple as list files in some directories or find some text in some file, or can be as complex as monitoring processes. In this post, we will share 37 powerful Linux shell commands. Task Commands 1 Delete file with 0 byte(empty file) find . -type f -size 0 -exec rm -rf {} \;find . type f -size 0 -delete 2 Check process memory consumption ps -e -o "%C : %p : %z : %a"|sort -k...
Linux command,List 2013-09-16 07:47:16
bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security
Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>