SEARCH KEYWORD -- LINE FEED
How to Encrypt Your Online Conversations
Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy. Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk. But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...
DATA SECURITY,VPN 2020-01-30 07:33:29
The hidden risk of passing slice as function parameter
In Go's source code or other open source libraries, there are lots of cases where a slice pointer is passed to function instead of slice itself. This brings up a doubt why not passing slice directly as its internal is backed by an array pointer to point to underlying data? For example, in log package, the formatHeader function takes a parameter buf as type *[]byte instead of []byte. func (l *Logger) formatHeader(buf *[]byte, t time.Time, file string, line int) {} Let's understand the r...
GOLANG,SLICE,SLICE POINTER 2020-12-13 06:11:14
Build RPM package on Linux
1. Check the OS version and core version #uname -a #more /etc/redhat-release 2. Create relative directories /usr/src/redhat/SOURCES //Store source codes, patches, icons etc /usr/src/redhat/SPECS //Store specs about the process of building RPM packages /usr/src/redhat/BUILD //File after uncompressed are stored here /usr/src/redhat/RPMS //Store the binary files built with rpmbuild /usr/src/redhat/SRPMS&nbs...
Software Development Company Shares Its Development Process
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
Normal
0
false
false
false
false
EN-IN
X-NONE
GU
CUSTOM SOFTWARE DEVELOPMENT COMPANY,SOFTWARE ARCHITECHURE,TESTING,REQUIREMENT ANALYSIS,MAINTENANCE 2016-01-21 00:13:26
A list of different CAPTCHA designs
Here is a list of website CAPTCHA designs which demonstrate all kinds of weird verification methods. By looking at these designs, as a website designer, you should distinguish which design is accessible and which is not.Is this human readable?What characters are in the picture?One moreWe will be crazy if we see theseOMG,What's the answer?IQ Test?Are you a normal person?You know how blind people read?ASCII PictureAre you an adult?3D verification codereCaptchaIt increase a new feature recently. It...
CAPTCHA,Website design 2012-07-19 11:51:06
Additional steps need to implement to setup shadow-boxV2 OPTEE on Raspberry PI
We followed the Shadow-box v2 project from the https://github.com/kkamagui/shadow-box-for-arm to set up the trustZone on Raspberry PI modeB to protect the Linux Kernel. But got a problem when doing the step: [3.6.5. Activate Shadow-Box for ARM and Start Secure Pi!] to create the hash for the memory area. The result is not shown. If you met the same problem, this is what I did to fix the problem on my PI: 1.1 When we do the step [3.5.1. Copy OP-TEE OS with Shadow-Box for ARM and N...
HARDWARE,RASPBERRY PI 2019-05-20 08:52:55
Telecom elements in WeChat
As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...
WeChat,Telecom operator 2013-04-13 20:29:46
Go Error Best Practice
Being indulged in Go for quite a while and having implemented web-related programs, grpc interfaces and Operators, I seem to be an advanced beginner now. However, I am still a raw hand in production-environmental debugging, which is cumbersome if done by querying logs or error messages. Imagine the scenario that a full-text search is called when the specific location of the error log is missing. Then what happens when those error logs are not only in one place? Yes, my error logs can no longer h...
GO ERROR,ERROR HANDLING 2021-10-07 07:38:28
What did iPhone bring to us in the past 5 years?
It is five years now since the first iPhone was released on 29th June 2007. In these 5 years, iPhone is the biggest variable in technology industry on this planet. It brings revolutionary change to many industries including the mobile phone, communication and Internet. It brings us into the era of mobile web. BuzzFeed collected a series of pictures to summarize the changes brought to us by iPhone in these 5 years. Here are some of them.1. Apple is the most valuable company in the worldIn August ...
Silicon Valley engineers have something to say about work from home
Quitting from Google and joined Yahoo which was thought as a declining giant, Marissa Mayer has been trying to prove that she has the ability to lead this Internet giant to reverse the decline. In order to boost the low morale of the employees, Meyer tried to transplant Google's work culture to Yahoo with office decoration, free lunch and issuance of smart phones, these generous measures let her win the applause of the Silicon Valley.But a recent ban issued by Meyer has attracted a lot of contro...
Work from home,Yahoo, Marissa Mayer 2013-03-07 02:39:23
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>