SEARCH KEYWORD -- PROGRESSIVE WEB APPS



  How I Learned to Program

Programming is, without a doubt, the most mentally rewarding thing I've ever done. Programming taught me that life should be fun, filled with creativity, and lived to the fullest. Programming taught me that anything is possible; I can do anything I want using only my mind. Programming also taught me that learning is fun. It showed me that the more you know, the more power you have. Programming showed me that a life filled with learning is a life worth living. Programming revealed to me wh...

   Programming,Tips,Write,Practice,Interest     2012-02-04 21:37:12

  Twitter OAuth the easy way – simple post to twitter script

After Twitter introduced mandatory authentication with OAuth, many of the current scripts for posting content to Twitter don’t work anymore. OAuth can be great for more advanced authentication, but for a simple post to twitter script, it seems like a little overkill. In this post you’ll learn how to create a simple script that uses a quick and dirty version of OAuth for posting new tweets to Twitter. How to create a simple script Simplified, Twitter OAuth involves sending both ap...

   Twitter,OAuth,PHP,Auto tweet     2012-02-25 12:51:07

  Google wins the lawsuit against Oracle

According to The Next Web, San Francisco court has made a final decision that Google didn't violate Oracle's Java patent. Although previously some judges and some people in jury said that Google made some mistakes on Java's use. The final decision made by the court saves Google from the charge of Java patent infringement. The next step of this lawsuit was supposed to be the evaluation of the damage and compensation. But now because of court's decision, this step is jumpe...

   Google,Oracle,Java,Anroid     2012-05-24 03:18:11

  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...

   Code security,SQL injection,HTTP header     2012-04-05 11:42:04

  Step-by-Step Guide: How to Choose a Website Developer

A software development partner greatly affects the success and performance of your online project it is involved in. Therefore, it is so important to approach your IT partner selection with special care and responsibility. Find below the main steps and decisions you need to make in order not to fail in this business.  Step 1: Decide What Tasks the New Site Should Perform The main goal of any business (and a website) is to generate and grow profits. You shouldn't create or update a site just...

   WEBSITE DEVELOPER,WEB DESIGN     2020-08-26 03:56:41

  GET, POST, and safely surfacing more of the web

As the web evolves, Google’s crawling and indexing capabilities also need to progress. Weimproved our indexing of Flash, built a more robust infrastructure called Caffeine, and we even started crawling forms where it makes sense. Now, especially with the growing popularity of JavaScript and, with it, AJAX, we’re finding more web pages requiring POST requests -- either for the entire content of the page or because the pages are missing information and/or look completely br...

   HTML,Get,Post,Form,SEO,Index,Search engine     2011-11-02 12:48:47

  Crash your Chrome with %%30%30

Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...

   CRASH,SECURITY,CHROME,GOOGLE     2015-09-20 08:24:16

  Lessons Learned About Documentation

Here at Kendo UI, we have always encouraged you to give us feedback.  Whether it’s through our forums, or the Kendo UI User Voice site, what you think is important to us.  We take your thoughts very seriously.  We receive a lot of feature requests, enhancement requests and other various pieces of product feedback. One of the things that we heard loud and clear from our users was that our documentation could be better.  We took a good look at what we had, and we ag...

   Documentation,Lessons,Programming     2012-02-15 05:53:28

  Tribute to Java On Successful Completion Of 20 Years

There is a great news for fans of Java that this week Java have completed its 20 years of success and that’s why it is celebrating its 20th anniversary. Java is a language which show legacy with the piece of technology and this is virtually important as the powerful programming methods and related machines are JVM (java virtual machine). SUCCESSFUL LAUNCH OF NEW VERSIONS Java developers are specially celebrating their event due to the huge success of their language and they get success a...

   Java software development, Java development services     2015-05-29 08:23:52

  Three things you should never put in your database

As I've said in a few talks, the best way to improve your systems is by first not doing "dumb things". I don't mean you or your development staff is "dumb", it's easy to overlook the implications of these types of decisions and not realize how bad they are for maintainability let alone scaling. As a consultant I see this stuff all of the time and I have yet to ever see it work out well for anyone. Images, files, and binary data Your database supports BLOBs so it must be a good idea to shove ...

   Database,BLOB,Log,Image     2012-05-02 04:44:25