SEARCH KEYWORD -- LINKED LIST
Concise bash programming skills
The following are some concise bash programming skills which we may need in our daily programming work. 1. Check status of command execution The usual way: echo abcdee | grep -q abcd if [ $? -eq 0 ]; then echo "Found" else echo "Not found" fi Concise way: if echo abcdee | grep -q abc; then echo "Found" else echo "Not found" fi Of course you can remove if...else with following code [Sun Nov 04 05:58 AM] [kodango@devops] ~/workspace $ echo abcdee | grep -q ...
Currency list with symbols
For those who want to find out a currency code, name, symbol, numeric code and decimal numbers, below is a simple JSON structure for easy use. [{ "code": "AED", "numeric": "784", "name": "UAE Dirham", "symbol": "د.إ", "decimal": 2 }, { "code": "AFN", "numeric": "971", "name": "Afghani", "symbol": "؋", "decimal": 2 }, { "code": "ALL", "numeric": "008", "name": "Lek", "symbol": "L", "decimal": 2 }, { "code": "AMD", "numeric": "051", "name": "Arme...
JSON,REFERENCE,NUMERIC CODE,SYMBOL,CURRENCY 2021-12-03 04:38:50
A guide on installing and setting up GitLab server on Ubuntu
GitHub, GitLab and BitBucket are the three most famous code hosting platform in the world. They have different features which allow teams or individuals to share code with others remotely. In case you want to build your own code hosting server so that you can host and share the code by yourself, you can install and set up your own server. In this post, we will walk you through a guide on installing and setting up GitLab server on Linux environment. gitlab is a web based code hosting tool which i...
Different types of keystore in Java -- Windows-MY
Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...
JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI 2016-01-09 05:45:59
Google Chrome Alternatives: Best Browsers For Android
Most Android phones come with Chrome pre-installed as the default browser. There’s nothing wrong with that. Chrome is a great browser with excellent features. And it feels natural alongside all the other Google products that also come pre-installed on Android. But the type of browser someone uses is super important. In the end, the browser may be one of the most-used apps on any phone. Browsers need to fit the needs and lifestyle of the person who is using it. To name a few examples,...
FIREFOX,MICROSFT EDGE,CHROME 2020-06-18 07:12:35
What Makes A Successful Cryptocurrency?
The cryptocurrency landscape today is a little bit of a maze. There seem to be countless cryptos available — thousands of them, by some estimates — and unless you’re particularly well versed in this technology, it can be difficult to tell what differentiates them. To cut through some of the confusion, we decided to take a closer look at cryptocurrencies. We won’t simply list the most prominent ones, the way so many sites already have. Instead, we’re going to look i...
BITCOIN,CRYPTOCURRENCY 2020-08-25 05:13:22
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
5 Things You Can Do to Protect Your Data
The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...
DATA SECURITY 2019-08-20 08:35:54
Simple Strategies to Boost Your Android Phone Security
Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...
ANDROID,DATA SECURITY 2019-02-19 07:36:46
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>