SEARCH KEYWORD -- Good code
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
The history of the name Google
Google now is known almost by everyone who has internet access. It's the most frequently accessed search engine around the world and it provides fast speed and high quality search results. While you are using Google, have you ever wondered how the name Google comes? According to Steven Levy, the author of the book In The Plex: How Google Thinks, Works, and Shapes Our Lives. The original name for the project was named BackRub and was coded by Sergey Brin. He was thinking that web pages made thei...
GOOGLE,HISTORY,GOOGLE NAME,GOOGOL 2016-12-03 20:58:06
Hidden messages in logos
A logo is the simplest thing a user can remember about a product or a company. A good logo design will leave deep impression to customers. Each logo tries to convey either their product information or company vision to customers, this information may be easily understood with a glance or it contains some hidden messages which need us to figure out. Today we share some logos which contain some hidden messages. 1. Fedex The arrow between E and X means Fedex will deliver the product to the right p...
Using msmtp to replace sendmail
sendmail is a mail client in Linux with many vulnerabilities and tedius configuration steps, many system administrators have disabled using it. Then how do we know what happens if a crontab script executes with error? Actually there are some replacements for sendmail, one is ssmtp, but this application is no longer maintained, we even cannot find its source code on Google. Fortunately, we can use msmtp to replace sendmail. The address : http://msmtp.sourceforge.net/ 1. Installation After downloa...
sendmail, msmtp, replacement 2012-09-27 11:41:48
Upcoming Product from Nokia: Nokia 2
With the emergence of telephone, the field of communication has seen a revolution. It was the time when people were able to talk to each other on the phone directly, and the reliance on letters was just reduced. Later entered the cell phones where the users were able to communicate with a phone call or even with SMS. The cell phones made it easy for the users to talk to each other even if they are moving from one place to another. To add value to the cell phones then entered the smartphones to t...
SMARTPHONE,NOKIA 2 2017-11-06 23:29:02
Turn on SecurityManager in Java
SecurityManager in Java is to check whether the application codes can access some restricted resource such as file, socket etc. This can be used in applications which have high security requirements. With this feature turned on, our system resources can be secured with only permitted operations. When JVM starts, it will first check whether the SecurityManager is on by checking the system property java.security.manager, if it's on, then an instance of SecurityManager will be created and it can be...
SecurityManager,enable,program 2013-12-16 05:03:53
Do Not Be Misled by ‘Build an App in 5 Minutes’: In-Depth Practice with Cursor
In August this year, I tried out Cursor and was thoroughly impressed, prompting me to write an introductory article about it. Soon after, I transitioned my daily work environment entirely from GitHub Copilot + JetBrains to the paid version of Cursor. After several months of use, it has felt incredibly smooth. While using it myself, I’ve often recommended Cursor to colleagues and friends. However, many of them still have questions, such as: What advantages does it have over native ChatGPT ...
ARTIFICIAL INTELLIGENCE,GUIDE,CURSOR,CODE EDITING,WINDSURF,DISCUSSION 2024-12-17 21:30:22
A crazy interview experience
How to be outstanding and get the offer after a job interview? Besides the strong technical background, we may still need some other skills such as how to ask questions during interview. Sometimes you may even do some crazy things. There is one question on Quora which is "What's the craziest thing you ever said (or did) at an interview and still got the job?". Among the answers, one answer is worth to be mentioned, the answer is from Stan Hanks and his answer is liked by 3859 people(As this arti...
Why Apple Mac switches its CPU? The war between Intel and ARM
About three months ago, the new iPad Pro was released and it supports touch pad and mouse. It conveys a clear message to users that they want people to treat iPad Pro as a laptop. As we know, iPad and iPhone are both using iOS, if iOS can run on laptop, it means MacOS and iOS can merge and become a unified OS. And if Mac and iPhone can share the same OS, it means the same app can run in all places. It is becoming clearer and clearer that Apple is planning to do this exact thing. Late...
Understand this in JavaScript
In JavaScript, this is always pointing to the owner of a function or a method. Function Let's check out function first. function introduce() { alert("Hello, I am Laruence\r\n"); } For this function, what does this point to? In JavaScript, a global function's owner is the current page, i.e, the window object. Because its a method of the window object if we define a global function. Now you should know the this will point to the window object in the above function. ...
JavaScript,this,event,call 2013-04-03 04:10:03
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>