SEARCH KEYWORD -- Front end development
Undoing Changes in Git: Working Directory, Staging Area, and Committed Changes
When working with Git, it's crucial to understand how to undo changes at different stages—whether in the working directory, the staging area, or after committing changes to the local repository. This guide walks you through the essential Git commands to effectively manage and revert changes, ensuring that your version control process is smooth and error-free. Modifying Files in the Working Directory but Not Yet Added to the Staging Area When you make changes to files in your working direct...
GIT RESET,STAGING AREA,UNDO CHANGE 2024-08-11 08:53:34
How to prevent next HeartBleed bug?
How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...
Open source,HeartBleed,Security 2014-04-24 09:07:05
My life as a freelancer
In the summer of 2006 a work buddy, George, has told me that I could make some extra money programming on a site named Rent A Coder. I’ve signed up the same day. After losing some time on a project that never started I lost my interest in “coding for moneyâ€. I almost forgot about RAC.Fast-forward two years, I was a PhD student at a small North American University with a student visa and … nothing else in my pockets. For a few months I was able to make a living from ...
Life,Freelancer,C,Rent a Coder,RAC 2011-11-07 02:53:03
Glass Button in Photoshop
These days glass buttons seem to be very popular. You can find glass buttons in Windows Vista and all around the Web. Other popular buttons are metallic and plastic buttons. All these buttons have one thing in common: They are all shiny. Some people call these kinds of buttons Web 2.0 buttons. Here I cover the creation of two different glass buttons in Adobe Photoshop CS3. Both glass buttons utilize the same principles. Once you have completed this tutorial you should be able to apply ...
PhotoShop,Glass button,Rounded button,Design 2011-10-10 13:55:46
Is 99.8% Secure Secure?
A group of researchers (Arjen Lenstra and collaborators from EPFL Lausanne and James Hughes from Palo Alto) published a study, Ron was wrong Whit is right, of new vulnerabilities of cryptosystems. The New York Times picked up the story. Although Lenstra et al discuss several cryptosystems, their results are particularly relevant to those based on RSA. The title mirrors their conviction that cryptosystems based on a single random element have fewe...
Security,Percentage,Security index 2012-02-27 04:48:06
How to teach "Modern" Perl?
Since I started my Perl Tutorial series a couple of people commented on what and how I am teaching.Some people asked why did I show "open or die" and why not using autodie. Others recommended the use IO::All instead of open.Another complaint was the introduction of time and localtime instead of DateTime.While I was mostly writing parts of my regular training material these comments led me to think about it again. I wonder how to teach Perl in 2012?When I started to write the tutorial I still cal...
Perl,Trainning,Teach,Modern,Modern Perl 2011-11-15 08:40:18
40+ Techniques to enhance your php code
1. Do not use relative paths , instead define a ROOT path Its quite common to see such lines : 1require_once('../../lib/some_class.php'); This approach has many drawbacks : It first searches for directories specified in the include paths of php , then looks from the current directory. So many directories are checked. When a script is included by another script in a different directory , its base directory changes to that of the including script. Another issue , is that when a script is being ru...
PHP,Quirk,Trick,Efficiency,Techniques 2012-04-10 13:06:55
HeartBleed: Should C be blamed for the HeartBleed bug?
There is a discussion about the security of applications written in C on Hacker News recently after the report of HeartBleed bug in OpenSSL. In this discussion, some people are saying that the applications written in C are unsafe. It seems all or most of the faults should be laid on C. I think this is biased. The language itself should not be blamed.Safety is a relative term for programming languages. No language is absolutely safe. We claim some languages like Java and C# are safer than C/C++ b...
C,HeartBleed,Analysis,Code review 2014-04-14 03:52:55
Send Email Using Gmail in ASP.NET
If you want to send email using your Gmail account or using Gmail's smtp server in ASP.NET application or if you don't have a working smtp server to send mails using your ASP.NET application or aspx page than sending e-mail using Gmail is best option.you need to write code like this First of all add below mentioned namespace in code behind of aspx page from which you want to send the mail.using System.Net.Mail;Now write this code in click event of button C# code protected void But...
ASP.NET,Email,Send email,Gmail 2011-11-15 13:01:02
do {...} while (0) in macros
If you are a C programmer, you must be familiar with macros. They are powerful and can help you ease your work if used correctly. However, if you don't define macros carefully, they may bite you and drive you crazy. In many C programs, you may see a special macro definition which may seem not so straightforward. Here is one example: #define __set_task_state(tsk, state_value) \ do { (tsk)->state = (state_value); } while (0) There are many this kind of macros which uses do{...}while(0)...
RECENT
- The Ultimate Guide to Implement Function Overloading in Python
- How Cybersecurity Preparedness Can Minimize Downtime During Cyber-Attacks
- Private LLM Integration with RAGFlow: A Step-by-Step Guide
- First Touch on OpenAI API
- Special ARP Uses: Gratuitous ARP, ARP Probe, and ARP Announce
- SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
- How to make select in WinSock exceed the 64-socket limit
- EtsiosApp Release Date: All You Need to Know
- SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
- How AI is Changing Web Development: A New Era of Digital Innovation
- more>>