SEARCH KEYWORD -- MODULE SYSTEM



  JavaScript Attack/Defend

As developers and designers we work hard to build visually attractive, fast and easy to maintain applications. Our goals are to make sure the applications we build stick to users and keep them coming back for more. Security is not always at the forefront of our minds. No one intentionally builds insecure software but often a lack of security knowledge leads developers to build vulnerabilities into their applications. In this article we are going to examine two web security attacks, how they are ...

   JavaScript,Attack,Defend,Security,Cross site     2011-10-13 13:09:11

  Square bracket in checkbox name

0down votefavorite i have a form with checkboxes like this:    <input type=\"checkbox\" name=\"type[]\" value=\"1\" />Fast Food<br>    <input type=\"checkbox\" name=\"type[]\" value=\"2\" />Table Service<br>    <input type=\"checkbox\" name=\"type[]\" value=\"3\" />Cafeteria<br> when i use the brackets in the name (type[]), my php works:    $type=$_POST[\'type\'];    echo \"types are:\";for ( $counter...

   Square bracket,PHP,JavaScript,Array of n     2011-03-22 10:32:40

  Cleansing data with Pig and storing JSON format to HBase with Pig UDF

Introduction This post will explain you the way to clean data and store JSON format to HBase. Hadoop architect experts also explain Apache Pig and its advantages in Hadoop in this post. Read more and find out how they do it. This post contains steps to do some basic clean the duplication data and convert the data to JSON format to store to HBase. Actually, we have some built-in lib to parse JSON in Pig but it is important to manipulate the JSON data in Java code before store to HBase. Apache Pig...

   JSON,HADOOP ARCHITECT,APACHE HBASE,PIG UDF     2016-06-10 01:13:41

  How VR technologies take over the world

Virtual Reality (VR) literally may get it beneficial to experience anything, anywhere, anytime. It is normally the several immersive type of legitimate fact technology and can convince the real real human human brain that it is usually normally someplace it can get absolutely critically not really seriously. Brain installed displays happen to be used with earphones and hands controllers to offer a entirely immersive arrive across. With the major technology businesses on whole world community (Fa...

       2019-05-20 05:30:39

  4 deployment modes of Redis

As a high-performance in-memory database, Redis is widely used in current mainstream distributed architecture systems. To improve system fault tolerance, using multiple instances of Redis is also inevitable, but the complexity is much higher than that of a single instance. This article mainly introduces the four deployment modes of Redis and their advantages and disadvantages. Standalone Standalone mode is to install a Redis, start it, and business connects to it and that's all. The specific ...

   REDIS,STANDALONE,MASTER-SLAVE,SENTINEL,CLUSTER     2023-03-03 21:35:09

  List of freely available programming books

Meta-ListsHow to Design Programs: An Introduction to Computing and Programming25 Free Computer Science EbooksFree Tech BooksMindView IncWikibooks: ProgrammingCheat Sheets (Free)CodePlex List of Free E-BooksBook Training - On Video!Sofware Program Managers Network - Free EBooksEBook Share @ linbai.infoFreeBooksClub.NetTheassayer.orgO'Reilly's Open Books ProjectTechBooksForFree.comGalileo Computing (German)Microsoft Press: Free E-BooksGraphics ProgrammingGPU GemsGPU Gems 2 - ch 8,14...

   Free,eBook,Links,Programming,List     2011-11-14 08:03:34

  Python and PLC Communication

This article provides detailed steps on how to use Python to communicate with Schneider M221 and Siemens S7-1200 PLCs via Ethernet. Additionally, we offer a packaged Python PLC client library, enabling you to easily build your own SCADA control programs, such as Human-Machine Interfaces (HMI). The system overview is shown below: To check the project detail please refer to Python Physical PLC Communication Clients # Created: 2024/06/29 # Version: v0.1.3 # Copyright: Copyright (c) 2024 ...

       2024-06-30 02:21:17

  A re-introduction to JavaScript

Introduction Why a re-introduction? Because JavaScript has a reasonable claim to being the world's most misunderstood programming language. While often derided as a toy, beneath its deceptive simplicity lie some powerful language features. 2005 saw the launch of a number of high-profile JavaScript applications, showing that deeper knowledge of this technology is an important skill for any web developer. It's useful to start with an idea of the language's history. JavaScript was created in 1...

   JavaScript,Types,Array,Re-introduction,OOP     2012-02-09 05:38:08

  Top 15+ Best Practices for Writing Super Readable Code

Twice a month, we revisit some of our readers’ favorite posts from throughout the history of Nettuts+.Code readability is a universal subject in the world of computer programming. It’s one of the first things we learn as developers. This article will detail the fifteen most important best practices when writing readable code.1 - Commenting & DocumentationIDE’s (Integrated Development Environment) have come a long way in the past few years. This made commenting your ...

   Readable,Source Code,Refactor,Comment.OO     2011-04-11 02:20:08

  Applying Large Language Models (LLMs) to Solve Cybersecurity Questions

In this document, we will introduce some test, experiment and analysis conclusion about applying Large Language Models (LLMs) to solve cybersecurity questions. Introduction Large Language Models (LLMs) are increasingly used in education and research for tasks such as analyzing program code error logs, help summarize papers and improving reports. In this project, we aim to evaluate the effectiveness of LLMs in solving cybersecurity-related questions, such as Capture The Flag (CTF) challenges, ...

       2024-09-08 04:05:07