SEARCH KEYWORD -- Text color



  iPhone 7 may come with following new features

There are all kinds of news that iPhone 7 will be released in the coming September. Now the news seems to be convincing. On 26 August, a Sina Weibo(China's Twitter) user @POPPUR posted an weibo which says that China Telecom, one of the largest telecom vendors in China, has opened the pre-order of iPhone 7. Along with this, a few new features of iPhone 7 are also released. On the photo uploaded, there are a few new features of iPhone 7 displayed. They are : Waterproof No headphone jack Wireless...

   NEW FEATURE,NEWS,IPHONE 7,CHINA TELECOM     2016-08-27 03:50:41

  Using Angular 2 with Asp.Net MVC/Asp.Net Core

Asp.net development professionals bring this post to explain the use of Angular 2 with Asp.net MVC/ Core. You will read the overview of Angular 2 and Asp.net Core at first in this post. Read the article to find how experts use Angular 2 with MVC / Core. Angular 2 Overview Angular 2 is the upcoming version of MV framework used for creating high level applications in browser. It contains everything needed to create a complex mobile or web apps from a variety of templates. Angular team recently re...

   ASP.NET DEVELOPMENT,ANGULAR 2, ASP.NET MVC     2016-10-29 05:15:06

  Python FTP Server and Client

Distributed Log File Automated Archive System This week, we will introduce the automated compute cluster nodes' log automated archive system project and FTP Communication utility library module. Program Design Purpose: This project aims to create an FTP server & client lib program for file transfer and a files management system for log data synchronization. We will develop an automated log file archive system that regularly collects newly generated log files from multiple nodes in a compute...

       2024-09-29 04:07:50

  3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe

Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...

   TECH     2019-11-29 00:29:40

  What can .htaccess file do?

A .htaccess file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration. What can a .htaccess file do? We summarized some of them here.  Hope it may help you. 1. Timezone settingSometimes when you use date() or mktime() functions in PHP, , it may display some weird information because of the timezone difference. For example, one possible warning is :Warning: date(): It is not safe to rely on the syste...

   .htaccess,setting,tip     2012-06-15 06:39:39

  Top 9 Web Design Trends in 2020

To stay in demand, a top-level design agency must be aware of the current trends. This will improve their professional skills, help them to keep an eye on the latest events, and offer the clients relevant models that will increase conversion, website traffic, and customer loyalty. Read on to find out which nine web design trends are popular in 2020. UL animation There is a stereotype that it makes no sense to develop a complex, high-quality animation because it will not be supported by devices w...

   WEB DESIGN,UX     2020-09-04 10:06:52

  Hexadecimal and long in Java

Today I encountered a hexadecimal operation problem when I was implementing a bit reverse function for integer type. Basically in the implementation, there is an operation which is to do the bit operation & between one long integer and a hexadecimal number 0x00000000FFFFFFFFF. I was expecting that the high 32 bits of the long integer will be zeroed. But unfortunately I didn't get the expected result. The basic implementation is: long num=0x00F0_0000; num = (num>>16) | (num<<16); ...

   Hexadecimal,long,Java,bitwise operation     2014-06-18 23:44:32

  Python Deserialization Attack Introduction: How to Build a Python Pickle Bomb

This article introduces an old and classic unsecured Python data serialization feature (the pickle library) and demonstrates how a red team attacker can exploit it to create a malicious binary or text data file that executes remote code or commands upon deserialization. The following attack flow diagram illustrates this process: We will follow 3 steps with the program code to show how Deserialization Attacks Work:   [ Step1 ] Crafting Malicious Data: An attacker crafts a malicious payloa...

       2024-07-07 03:08:22

  OT Power Grid System Development

Use PLC to Remote Control Circuit Breaker in Power Grid System Figure-00: Project Overview Diagram, version v0.0.2 (2024) Project Design Purpose: The objective of this project is to demonstrate how to utilize Programmable Logic Controllers (PLC) to remotely monitor and control circuit breakers within a power (grid/supply) system. Using a Schneider Electric circuit breaker, sensor, closer and PLC, the project will cover the physical hardware connections and provide a step-by-step guide for desig...

       2024-09-21 08:56:05

  Will tablet revolution really come soon?

The famous Silicon Valley entrepreneur and academic Vivek Wadhwa said a few months ago that tablet revolution would come only if the price dropped below $100. According to The Wall Street Journal, the 4th largest PC manufacturer Acer seems to be the first one to eat crab. It plans to promote $88 Android tablet Acer Iconia B1. Does this indicate that the tablet revolution is coming? According to a person who knows the Acer tablet project, Acer Iconia B1 configuration will be similar to those of ...

   Acer,Tablet,Low price,Tablet revolution     2012-12-24 20:51:33