SEARCH KEYWORD -- Microsoft Open Technologies
An ex-Mozilla employee's view about Chrome
Chrome now becomes the most popular web browser on the planet because it provides excellent user experience. As a general user, we think it's fast and easy to use. How about those who develop web browsers? How do they think about Chrome? Abhinav Sharma ,an ex-Mozilla employee and now Facebook employee, shared his opinion about Chrome. Mozilla fights an uphill battle given Google's advertising budget and capacity to have some incredibly good engineers and designers work on Chrome. They also came ...
Tips on Writing for Tech Blogs
If you know your stuff when it comes to tech, you might be inspired to start contributing articles to tech blogs. A friend or colleague may suggest the idea to you, or you may see an invitation for submissions, much like the one on this website. Sounds like a great idea; but what do you know about writing articles, blog posts, or other types of content? Writing is a skill, and there are also practical aspects to writing that you need to be aware of before you start creating your own pieces. Gett...
Python FTP Server and Client
Distributed Log File Automated Archive System This week, we will introduce the automated compute cluster nodes' log automated archive system project and FTP Communication utility library module. Program Design Purpose: This project aims to create an FTP server & client lib program for file transfer and a files management system for log data synchronization. We will develop an automated log file archive system that regularly collects newly generated log files from multiple nodes in a compute...
Resolve git issue git@github.com: Permission denied (publickey)
Sometimes when clone a remote repository from github.com, you may see below error. D:\Project\Playground\GitBisect>git clone git@github.com:bradleyboy/bisectercise.git Cloning into 'bisectercise'... git@github.com: Permission denied (publickey). fatal: Could not read from remote repository. Please make sure you have the correct access rights and the repository exists. The issue occurs when there is no key on your machine which is associated with your github account. To fix the issue, please ...
GIT,GITHUB,PERMISSION DENIED,PUBLIC KEY 2019-07-12 10:10:49
Recover deleted file in Linux EXT3 file system
Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...
Linux,EXT3,File recovery 2013-08-16 07:06:45
SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...
SIEM Big Data Visualization [03]:Graph-Based SIEM Log Analysis Dashboard
Program Design Purpose: The purpose of this program is to develop a Graph-Based SIEM (System Information and Event Management) dashboard that visualizes network communication patterns by processing and analyzing logs from IDS, firewalls, host computers, and other security devices. This dashboard will help security analysts quickly identify and investigate potential threats by using a Cytoscape-style Node-Edge graph for intuitive data representation. The program is an angular plug in which can i...
Python and PLC Communication
This article provides detailed steps on how to use Python to communicate with Schneider M221 and Siemens S7-1200 PLCs via Ethernet. Additionally, we offer a packaged Python PLC client library, enabling you to easily build your own SCADA control programs, such as Human-Machine Interfaces (HMI). The system overview is shown below: To check the project detail please refer to Python Physical PLC Communication Clients # Created: 2024/06/29 # Version: v0.1.3 # Copyright: Copyright (c) 2024 ...
PYTHON,PLC,COMMUNICATION 2024-06-30 02:21:17
Android Security
Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...
Android security,Input validation 2013-04-16 12:19:37
Create host only network on VirtualBox
Previously we showed how to install Ubuntu in VirtualBox. What if we want to communicate with the host OS from within the Guest OS on VirtualBox? There are a few ways to do this. For example, bridged network, Host only networks. Today we will show you how to enable network communication between host OS and guest OS using host only networks. A host only network will not need to access the physical network interface of the host OS. It will create a network between different virtual machines and th...
VIRTUALBOX,NETWORK,VIRTUAL MACHINE,HOST-ONLY 2015-12-01 09:29:13
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>