SEARCH KEYWORD -- Dropdown menu
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
TUTORIAL,ENCRYPTION,DECRYPTION,PGP,GPG 2020-10-29 05:06:09
Telecom elements in WeChat
As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...
WeChat,Telecom operator 2013-04-13 20:29:46
How to project a phone screen to a PC in Windows 10
In this post, we will show you a simple way to project a phone to a PC in Windows 10. Windows 10 provides a feature called Project to this PC which allows to project other devices on a PC installed with Windows 10. Below are the steps for doing this. 1.Press Win + i key to open Windows Settings. 2. In System menu, click Project to this PC option. Then select either Available everywhere on secure networks or Available everywhere. 3. Now open your phone which you want to project. Ensure it connec...
PHONE,WINDOWS 10,WIRELESS PROJECTION 2020-03-06 19:53:40
Install both 32 bit and 64 bit WAMP server
WAMP server is a platform tool for serving PHP applications on Windows. It includes a combination of Apache, MySQL and PHP service which can help developers test or run PHP applications with minimal setup. Sometimes one would first have a 32 bit version of WAMP installed and a few applications have been configured. But later s/he would mistakenly installed a 64 bit version of WAMP and somehow the 32 bit version configuration is overwritten. This causes a problem where the old applications config...
PHP,WAMP,64 BIT,32 BIT,MULTIPLE VERSION 2017-03-18 01:14:21
Fuzzy search algorithm in Sublime Text
Fuzzy string searching is the technique of finding strings that match a pattern approximately (rather than exactly. In many editors, we can easily find the Find menu item to do exact matching. While in Sublime Text and some other editors, we can use fuzzy string searching as well if we just want to have an approximate match. There is some algorithm implemented in Sublime Text to implement achieve this. First the search query is split into characters, join them with a regex wildcard, and then run...
Sublime Text,Fuzzy search 2013-10-14 22:49:38
CSS Selector for Web Scraping
Creating a web scraper is no easy task. This is because it requires precision to identify the specific data points that we intend to collect for the end goal we are working towards. Whether we are looking to create a marketing content database or analyze market trends, the last thing we need from our scraper is for it to return a lot of unnecessary data that will not help our cause. To avoid the inconvenience of going through huge amounts of data to get what we requested, it is crucial to ...
CSS,WEB DESIGN,SELECTOR 2023-02-20 07:32:53
SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...
SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
Program Design Purpose: The purpose of this program is to develop a Graph-Based SIEM (System Information and Event Management) dashboard that visualizes network communication patterns by processing and analyzing logs from IDS, firewalls, host computers, and other security devices. This dashboard will help security analysts quickly identify and investigate potential threats by using a Cytoscape-style Node-Edge graph for intuitive data representation. The program is an angular plug in which can i...
Screen recording in Windows 10
Have you ever wondered how to take screen recording easily on Windows? Normally you would think to download some software online and install it on your machine such as Camtasia. However, many of them are either non-free or uneasy to use. Fortunately, there is a built-in tool provided in Windows 10 which can be used to take simple screen recording plus audio recording. The tool is called the Game Bar which is primarily intended for gamers to take screenshots of their plays and achievements. Don't...
WINDOWS 10,GAME BAR,SCREEN RECORDING 2018-03-06 11:42:07
Things to Look for in Microsoft .NET Framework 4.7
The .NET Framework 4.7 is the updated version of the .NET Framework 4.6.2. It can run along with earlier versions of the .NET Framework. On installation it appears as an update for Microsoft Windows under the Installed Updates item in Control Panel. The improvements in the.NET Framework 4.7 includes: High DPI support for Windows Forms applications on Windows 10 Touch support for WPF applications on Windows 10 Enhanced cryptography support Performance improvements .NET Framework Documenta...
ASP.NET, ASP.NET FRAMEWORK 2017-07-18 05:55:20
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>