SEARCH KEYWORD -- Network programming



  Mark Zuckerbeg's hacker way

According to TechCrunch, Facebook CEO Mark Zuckerberg wrote codes for the latest mobile IM application : Poke, the tone played when receiving push notifications is from the mouth of Zuckerberg. This approach reflects the way pursued by Zuckerberg : hacker way.As one of the earliest features of Facebook the "Poking" is invented by Zuckerberg, it is not surprising that Zuckerberg involves in Poke's development.Zuckerberg recorded his own voice on the phone initially just for fun. But he was later ...

   Poke,Facebook,Snapchat, Mark Zuckerberg     2012-12-24 12:01:52

  The Mature Programmer

1. The Mature Programmer The mature programmer manages their own time and productivity well. The MP knows that maintenance is as much work as the initial writing and code always takes longer than you think. The MP knows that any changes to code can introduce bugs, no matter how seemingly trivial. The MP knows that premature optimization is foolish and dangerous. The MP knows that sexy coding like writing big complex systems from scratch is rarely the best way to go. The MP does not get...

   Mature programmer,MP,Feature,Coding standard,Efficiency     2011-12-05 13:12:00

  Leaving comments in real life

As a programmer I like to write comments because I know that some future person (often me) is going to need to know something about my code that won't be immediately obvious from reading it. Here's a recent example from my homebrew display's code:// protocol_init: Set up a newly powered-on string of lights.  The lights are arranged// in an array wired diagonally starting from the bottom left.  For ease of programming// it's better if they are given numbers which correspond to coor...

   Comment,Programming,Style,Format,Coding standard     2011-11-15 11:42:19

  What is an HTC File?

Question: What is an HTC File?Did you find an HTC file on your computer and wonder what program should open it? Maybe someone emailed you an HTC file but you're not sure how to use it. Perhaps you tried to open the HTC file but Windows told you that it could not open it. Before you can open an HTC file (assuming it's even a file format that's intended to be viewed or edited), you'll need to determine what kind of file the HTC file extension refers to. Answer: A file with the HTC file exte...

   HTC,HTML Component,JavaScript,Extension     2011-06-30 23:07:44

  Call of Duty Elite Has Amazing Security

I had tried to register for Elite yesterday, and the servers were being funny, so I wasn't sure if I'd registered. I just now tried to reset my password, and I got the following:Hello JoshForgot your password? These things happen. Access your account with the password below:{Actual Unencrypted Password}Really? They're storing hundreds of thousands of passwords in plain text??EDIT: Not sure what the downvotes are for, surely it's not because huge companies like Steam and Sony never get hacked, an...

   Game,Elite,Call of duty,Defect     2011-11-15 12:42:50

  IDEs for Java programmers

IDEs are great helpers to programmers. They can help programmers write less error-prone programs with less time. They have become an inevitable part of many programmers. As a Java developer, you may be familiar with Eclipse already. But do you know other IDEs for Java programmers? We will give an overview of different IDEs for Java programmers. These IDEs are Eclipse, Intellij IDEA, NetBean and BlueJ. Eclipse Eclipse is the most widely used IDE for Java programmers. It's an open source IDE whic...

   Java IDE,BlueJ,NetBeans,Eclipse     2014-08-21 06:15:54

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  A journey to investigate a goroutine leakage case

In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...

   TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG     2024-03-16 11:00:23

  10 rules of PHP-masters

1. Use PHP only when it is necessary – Rasmus Lerdorf There is no better source than the creator of PHP, to learn what he can do. Rasmus Lerdorf created PHP in 1995. Since then, the language has spread like a wildfire rate in the developer community, incidentally changing the face of the Internet. However, Rasmus did not create PHP with these intentions. PHP was created for the needs of web development. As is the case with many other projects wi...

   PHP,Master,Experience,Advice     2011-12-16 09:38:07

  How Integers Should Work (In Systems Programming Languages)

My last post outlined some of the possibilities for integer semantics in programming languages, and asked which option was correct. This post contains my answers. Just to be clear: I want practical solutions, but I’m not very interested by historical issues or backwards compatibility with any existing language, and particularly not with C and C++. We’ll start with: Premise 1: Operations on default integer types return the mathematically correct result or else trap. This is th...

   Number,Algorithm,System,Embedded system     2011-12-05 12:48:41