SEARCH KEYWORD -- Information leak
How to maintain a software project?
For a software engineer, at least from my own experience, maintaining an existing software project would take up a considerable amount of time: adding new features, fixing tricky bugs, and so on. In this post, I will share some some tips about how to become a veteran from a novice quickly when facing a new project. (1) Get familiar with the background knowledge of the project. Every software has its own purposes and users: a device driver serves the specified hardware, whilst a SMS gateway helps...
Google is returning back to China
It has been five years since Google announced its difficult decision to leave China in 2010. The well known reason was that Google didn't want to conform to China's censorship request on sensitive information. During these five years, many stories happened bbetween these two sides. Things may turn around now as there are a few indications where Google may return back to China at an appropriate time soon. The most convincing indication is that a customized Google play -- Google online shop may a...
Google,China,Alphabet,Google play 2015-09-06 04:13:30
Simplify Cloud Data Security: A Deep Dive Into Protecting Sensitive Data in Java
Featuring encryption, anonymization, hashing, and access control Network security incidents occur now and then, mostly caused by data leakage. Data security has aroused widespread concern, and the community keeps working hard on approaches to simplify data security, especially in sensitive data protection. Sensitive data includes but is not limited to personally identifiable information (PII) like names, ID numbers, passport numbers, driver’s license numbers, contact information like addre...
JAVA,SECURITY,ENCRYPTION,DECRYPTION,TOKENIZATION 2023-04-28 21:22:10
Disposable Email address
There is one statement which says Giving out your email address is like starting a relationship. What happens when you want to break up?Once you gave out your email address, you may take the risk of receiving big amount of junk emails. However, when we register on some websites, we must provide our Email address to receive authentication emails. If we cannot receive the authentication email, we cannot finish the registration process. Is there any alternative way?We can use disposable email, i.e,...
Disposable email,Website,Summary 2012-05-19 12:27:14
The tic-tac-toe game with Python
In this tutorial, we will show how to build a tic-tac-toe game with Python. We will use functions,arrays,if statements,while statements, for loops and error handling etc. First, we need to create two functions, the first function will display the borad of the game: def print_board(): for i in range(0,3): for j in range(0,3): print map[2-i][j], if j != 2: print "|", print "" Here we used two for loops to loop through the map, this map is...
Python,Tic-Tac-Toe 2013-07-30 02:49:09
How Artificial Intelligence Is Helping Fight Environmental Challenges
Environmental challenges like climate change, global warming, air pollution, etc., all pose a severe threat to humans. According to the World Health Organization (WHO), around 3.6 billion people are already living in areas vulnerable to climate change. Climate change is predicted to result in an additional 250,000 deaths between 2030 and 2050. To solve environmental problems that have long presented difficulties for ecosystems and communities, artificial intelligence (AI) is emerging as a...
AI, ENVIRONEMNT 2025-02-17 04:06:08
Balancing Convenience and Security in the Digital World
Source The digital world has made everyday life easier in ways that were unimaginable a few decades ago. Online banking, smart home automation, cloud storage, and seamless communication have changed how people work and interact. With a few clicks or a simple voice command, tasks that once required time and effort are now completed instantly. However, this increased accessibility comes with risks. Every day, cybercriminals look for weaknesses to exploit, putting personal data, financial in...
DIGITAL WORLD,DATA SECURITY 2025-02-07 06:14:43
PHP to get long running process progress dynamically
Frequently in web applications, we may have a request to the back end system which may trigger a long running process such as searching huge amount of data or a long running database process. Then the front end webpage may hang and wait for the process to be finished. During this process, if we can provide the user some information about the progress of the back end process, it may improve user experience. Unfortunately, in web applications, this seems not an easy task because web scripting lang...
AJAX,PHP,progress,long process,demo 2012-06-04 07:29:37
Secure Your Go Code With Vulnerability Check Tool
Security vulnerabilities exist in any language and any code, some are written by ourselves, but more are from the upstream dependencies, even the underlying Linux. We have discussed the security protection methods for Go and Kubernetes Image in Path to a Perfect Go Dockerfile and Image Vulnerability Scanning for Optimal Kubernetes Security, in which the security scanning was performed based on generic. As the Go community grows, more and more open-source packages have caused ...
GOVULNCHECK,GOSEC,GOLANG 2022-10-29 23:43:20
Google launches Google Keep
According to Tencent Tech, Google announced the launch of Google Keep on Wednesday This is a note application similar to Evernote, its philosophy is to help you save everything you want to remember, including text and images and other notes, they can be instantly synchronized among different devices so that users can get the information they want at any time. This is a free service, it provides support for Web and Android 4.0 or later devices, users can navigate to Drive.Google.com/Keep or downl...
Google Keep,Evernote,Synchronization 2013-03-21 13:00:02
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>