SEARCH KEYWORD -- TEMP FILE
Tips to improve JavaScript efficiency
Writing JavaScript code is tedious and error prone. You not only need to implement the necessary functions, but also need to ensure cross browser compatibility. This often causes the low efficiency of JavaScript developers. Here we recommend 12 tips you can benefit from. 1. Remove array element by index If we want to remove one element in an array, we can use splice. function removeByIndex(arr, index) { arr.splice(index, 1); } test = new Array(); test[0] = ’Apple’; test[1] = &rsq...
JavaScript,Tips,Array 2013-07-27 20:50:40
Cripple Pachebel's Canon on Matlab
What can Matlab do? What the following Matlab code does is playing the piano music of Cripple Pachebel's Canon. You can have a try if you have Matlab installed on your computer. % Cripple Pachebel's Canon on Matlab % Have fun fs = 44100; % sample rate dt = 1/fs; T16 = 0.125; t16 = [0:dt:T16]; [temp k] = size(t16); t4 = linspace(0,4*T16,4*k); t8 = linspace(0,2*T16,2*k); [temp i] = size(t4); [temp j] = size(t8); % Modification functions mod4 =...
Matlab,Programming,Canon,Music 2012-05-16 11:55:13
Remove browse button from input type=file
In Web 2.0 era, many websites will ask the user to upload their avatar when creating their profile. In HTML, the input control we should use is input="file". This is a file control provided by the browser vendor and it should be ran in a sandbox for security consideration. Browsers don't provide ways to choose file from local and upload to the remote server without the input="file" control. There is one annoying part about the input="file", which is a default button named "Choose File" or...
file,html,browse,remove browse button 2015-07-12 05:17:51
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
TUTORIAL,ENCRYPTION,DECRYPTION,PGP,GPG 2020-10-29 05:06:09
My frequently used Linux commands
In our day to day work. We may have many chances working on Linux/Unix systems. There are many things we may need to do, checking logs, navigating in directories, creating file or installing software. We may use many commands to complete the work, such as ls, mkdir, cd etc. Below are my frequently used Linux commands or programs recently: pwd : print working directory, sometimes I need to check which working directory I am in in order to know where to go next. ls : List current directory files,...
Output a file with HTTP range header in PHP
When downloading a large file, we may encounter some network issues which causes download termination and only part of the file is downloaded. When the network connection resumes next time, we may need to redownload the file again from the beginning. In order to save bandwidth, http provides a Range parameter in its header which can control the file transfer flow. With the range parameter in the header, we can resume the download from where we stop. Here is a piece of PHP code snippet which uses...
PHP, range,http, file transfer 2013-01-09 05:55:05
Upgrade phpMyAdmin Version in WAMP
Once PHP version is upgraded in WAMP(especially from PHP 5 to PHP 8), we may encounter issue where phpMyAdmin may not work anymore. It needs us to make some upgrade of phpMyAdmin in this case. To do upgrade, can follow below steps. Download the latest phpMyAdmin version. Unzip the downloaded file and copy it to c:\wamp64\apps and rename it to phpmyadminx.y.z, the version you downloaded. Copy the config.inc.php file from the old phpMyAdmin folder to the new one. Update the alias of Apache s...
WAMP,PHPMYADMIN,UPGRADE,GUIDE,PHP 8 2024-11-28 00:55:42
Recover deleted file in Linux EXT3 file system
Environment : CentOS 5.3 x86_64, /dev/sdb1 is the data segment /data0. EXT3 file system. Problem : /data0/tcsql/cankao/phpcws-1.5.0/httpcws.cpp is deleted mistakenly and httpcws.cpp is not backed up. It will take much time to rewrite this program again. So we must recover it back. debugfs is feasible in EXT2 file system, but in EXT3 file system, it's not very useful. There is one open source software called ext3grep which can help us recover deleted file in EXT3 file system. The recovery steps a...
Linux,EXT3,File recovery 2013-08-16 07:06:45
Get associated file icon with only extension name using C++ on Windows
I have searched on Google for a few examples on how to get associated file icon with only file extension name using C++ on Windows. There are some useful information provided on MSDN which explains the use of SHGetFileInfo() function.It also gives an example code, but it doesn't say how to do it with only the extension name. Here I give an example code on how to achieve this after I gathered and summarized some useful information from Internet. I have tested the code on my PC, it w...
File icon,Windows,Association,Extension name,C++ 2012-03-26 09:55:20
Install PHP 8 in WampServer
With the release of PHP 8.4, there are some new features added in, it reminds me that I may need to upgrade my development environment PHP version as well. It has php 5.x and php 7.x installed already, now I need to add php 8.x as well. This post will show the steps to achieve this. Step 1 Install PHP 8.x The first step is that we need to download the new PHP version. Here we chose PHP 8.1.31. Once the zip file is downloaded, unzip it and copy the folder to c:/wamp64/bin/php and rename the folde...
WAMP,GUIDE,PHP VERSION,PHP 8 2024-11-24 02:43:22
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>