SEARCH KEYWORD -- FRONT END



  How to Create Custom Textures using Filters & Layers?

Textures are an important and integral part of the design world. You would find textures in every nook and corner of your life, in every space across your home. For a long time people have looked at Photoshop as a tool to manipulate photos and make them look the way you want it to appear. But, that’s not all to Photoshop. You can create interesting textures, and create amazing design works using Photoshop too. All you need is a design hand, and some basic understanding of how to use it. He...

   Photoshop     2014-08-01 05:46:07

  Generating CSR using Java

A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq.  But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...

   JAVA,SECURITY,CSR,CERTIFICATE REQUEST     2016-05-25 04:49:17

  Programming: the benefits of taking a break

This post lists several benefits of taking a break during programming.You work smarter, not harder. Once, I worked really hard on a feature. For two weeks, 12 hours a day, I put in a lot of effort. After those two weeks, I took a break and came up with several ideas that made much of the work unnecessary.You think more clearly. Being tired has a similar effect as being drunk. At the end of a day, I often kid myself that I’ll just get this one thing finished quickly to have a fre...

   Programming,Break,Rest,Refresh,New idea     2011-11-08 08:50:45

  Essential Rules To Protect Your Credit Card When Shopping Online

You have to protect yourself and your credit card online while shopping. There are a number of ways to do this, but some prove more technical than others. Your basic best defense includes sensible use and layers of protection. The best way to do this is to pick and choose which stores at which you charge purchases. You can reduce the chance of losing your card details to a thief by declining to allow the retailer to store your credit card. Use a password manager to save your passwords and make a...

   SECURITY,CREDIT CARD,MASTERCARD     2019-10-09 08:40:07

  8 Essential Mobile Game App Development Tools

Who doesn’t love playing a game on their mobile? Temple run had caught the whole world’s attention to such an extent that right from children to elder people in the household were glued to this game. It is indeed interesting that mobile games can keep your kids occupied. In fact, they are the best stress busters available in the present times. Remember how you used to steal some hours just to play candy crush while on the break? This way you used to relieve yourself of the stress bun...

       2014-10-09 05:00:05

  An experience of fixing a memory-corruption bug

During the last 4 months, I was disturbed by a memory-corruption bug, and this bug will cause program crash. Until last Monday, I found the root cause and fixed it. This debug process is a difficult but memorable experience, so I will share it in this article.   My program works as a SMS Hub. When it receives a SMS, it will allocate a structure in heap memory like this: typedef struct { ...... int *a[8]; ...... } info; After processing the SMS, the program will free the m...

   c, debug, unix, solaris, multi-thread     2014-05-04 03:52:43

  Do You Morph Into A Different Programmer?

Every experience you have as a software developer should change you in some way. And I don’t just mean growing older by virtue of time passing. Everything you do should evolve your understanding of your craft (and/or related skills) or your understanding of yourself – which ultimately achieves the same goal. I am not just talking about major milestones in your software development career like switching jobs, becoming a leader/manager or starting you own company. Every job, ev...

   Programmer,Steps,Process,Developer     2011-08-18 08:59:01

  Ajax file upload tutorial

Step 1 - AJAX file uploadAJAX file upload tutorialFirst of all I have to say that to create a pure AJAX file upload system is not possible because of security limitations of JavaScript. All of the Ajax upload systems I know use some third party tool/package or only mimics the AJAX feeling. Even so it makes file upload process a bit nicer. In the next section I will present you a solution which imitates the AJAX process, but uses a normal upload process and iFrames.The concept: Create a simp...

   Ajax,File upload,PHP,Tutorial,IFRAME     2011-04-22 13:34:33

  Pagination or continuous scrolling? It's a question

No matter in web page or mobile applications, information often can not be displayed on one page all alone, there needs some interactive modes which can expand page information: Pagination and Continuous Scrolling are very common interactive modes. Every day we may see them, they are so common that we do not even feel their presence, when browsing to the bottom of the page, we will see it. But it's difficult to choose which mode to use in design. Here we have a discussion on these two modes. Pag...

   Pagination,Continuous scrolling,Design     2012-09-12 19:55:51

  PHP Security

1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...

   PHP,Security,SQL Injection,XSS Cross sit     2011-10-01 02:25:31