SEARCH KEYWORD -- JUSTIFY-CONTENT
Funny Linux commands
1. sl You will see a train moving from the right to left on the screen. Install : $ sudo apt-get install sl Run : $ sl It has options like -aiFe: -a An accident seems to happen. You'll feel pity for people who cry for help.-l shows little one.-F It flies.-e Allow interrupt by Ctrl+C. We can also make fun of other people by setting an alias like below: $alias ls=sl When the user types ls, he will see the train instead of the file list. 2. fortune Output one statement, it can be a joke, or famous...
Linux,funny command,figlet,sl 2013-06-08 21:30:26
LESS/SASS/Stylus development tools summary
LESS,SASS and Stylus are more and more popular among developers. More and more people are using these three tools now. Here we introduce some development and testing tools which can make our development process simpler. SublimeText Many front-end developers are now using Sublime Text 2 as their main text editor, there are many plugins in Sublime Text as well. We can use Ctrl+Shift+P –> install package to search relative plugins. Less Sublime Less build Sublime Less2css Less snippets Su...
Linux Clock : CST,UTC and NTP setup
1. There is an option when you set up clock on installing Linux: system clock users UTC, so what does UTC mean? It's Universal Time Coordinated(UTC), there are two different times in GPS system: one is UTC , the other one is LT(Local Time). The difference between these two is just the timezone difference, UTC is the time in timezone 0. If the local time in Beijing is 8 o'clock in the morning, then UTC time is 0 o'clock, which is a 8 hour difference. 2. In Linux, when we use date to check the tim...
Using keytool to create certificate chain
JDK provides a command line tool -- keytool to handle key and certificate generation. This tool has a set of options which can be used to generate keys, create certificates, import keys, install certificate and export certificates etc. In this tutorial, we will show how to create certificate chain using keytool. If you want to understand how to create certificate chain programmably, please refer to Generate certificate in Java -- Certificate chain. To begin, we first generate a key pair whi...
JAVA,KEYTOOL,CERTIFICATE CHAIN,CERTIFICATE 2015-12-17 07:09:33
10 major updates of Windows 8.1
Last night, the 2013 Microsoft Build Developer Conference started in San Francisco. The highlight of the first day is Microsoft CEO Steve Ballmer announced the release of Windows 8.1 Preview . The final version will be released in November and he also mentioned that there would be over 300 updates on the new OS. Now let's summarize 10 major updates of the new OS. 1. Classical desktop mode After getting a lot of feedback from users, Microsoft adds a new setting. Users can choose to start in clas...
Windows 8.1,Build 2013-06-27 05:45:02
A simple tutorial on writing Java native program
Java provides Java Native Interface(JNI) to enable developers to write programs which can utilize the underlying native libraries of the operating system. The benefits of writing native code are that they normally provide better performance compared to Java codes. Sometimes if you want to utilize some system specific functions you may also want to use JNI. One main drawback of writing native code is that your application may not be platform independent anymore. This is not what Java is desi...
Java native interface, JNI, Native code, Sample 2015-08-15 08:28:15
8 most successful open source products
Open source itself is a successful product. It is not only liked by many personals, many famous enterprises like itAlthough there are numerous open source projects and open source products, which is the most successful among them? "Success" is defined as the widely used + well known here. In many successful open source products, only a minority leaders. Here we share 8 most successful open source products we think they deserve to be.LinuxReason: Linux + GNU = GNU / Linux. It has been almost 2...
Open source,MySQL,Linux,BIND,BSD 2012-04-19 08:29:00
How to Prevent a Data Breach: Guide For Businesses
The consequences of a data breach are nothing to joke about. From reputation damage to regulatory fines, it is a disaster for any business. So you should always strive to do your best to prevent it. But with so many steps to take, where do you even begin? Businesses of all shapes and sizes should follow this 8-step approach: 1. Outline Your Assets Your assets, whether digital or physical, should always remain in your sight. It should be the very first step you take. Picture anything that might r...
DATA SECURITY 2020-03-04 08:16:44
When can Chinese buy fresh food online?
Farmigo is an online agricultural marketing platform. Farmers can post their own products, people can directly purchase their favorite ingredients on it. Farmigo promises that fresh ingredients will be sent to the designated location within 48 hours, but the price is 20-30% cheaper than the supermarket.In other words, Farmigo itself does not sell agricultural products, it just plays a platform intermediary role. Their advantages to attract consumers are fresh ingredients supply, home delivery a...
Agriculture, Online sales, B2B 2012-12-12 13:37:03
Web design trends for 2014
Now, it's age of web, many resource and manpower have been invested in web to extend and enhance the capability of web. Every year there are new web designs and technologies emerging. In recent years, with the popularity of handhold devices such as smart phones and smart devices like iPads,Surface, responsive design is becoming a requirement, also we can find flat design in many places. The web design trend is changing dramatically. Many people may wonder what's the web design trend in 2014? Jow...
web design,trend,2014 2014-06-01 08:27:35
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>