SEARCH KEYWORD -- USER
Some hidden XSS injection vulnerabilities
XSS injection refers to a Web page generates some unexpected executable js codes based on user input and these executable codes are executed by web browser,i.e, the source code sent to web browser by the server contains some illegal js codes, and these illegal js codes are related to user's input. Common XSS injection vulnerabilities can be fixed with some functions such as htmlspecialchars(escaping HTML special characters) and strip_tags() or similar, but there are some hidden XSS injecti...
XSS,PHP,Security,Code,JavaScript 2012-08-27 20:32:08
Meta tag in HTML header
In server response, we can use response.setHeader() to set the meta information in header of a HTML page. The usage is response.setHeader(name,context); meta is used to simulate the response header of HTTP protocol in HTML page. It should be put between the <head> and </head> tag. 1. <meta name="Generator" content="" > <!--This is to specify the tool which generates this page such as Microsoft FrontPage 4.0 etc --> 2. <meta name="keywords" content=""> <!-- To tel...
Apple will shut down Ping on 30th September
What? Apple also has social networks! Yes. Unfortunately, you just heard it and it is to be shut down. In fact, Apple launched Ping not too long ago, in September 2010, it was released together with iTunes 10.Ping allows users to share with your friends the music you are listening to, and you can even share concerts and activities information, and it supports for picture and link sharing. In addition, Ping also includes the "Top Ten" list of features that can be customized, each singer and the ...
Apple,Ping,Social network 2012-09-12 22:21:31
Google has done more for the world with ngrams
Data is valuable asset for a company in the Internet world. With data of users, a company can gain lots of benefits. They can push specified ads to users by analyzing user behaviors, they can even sell the data to third parties. Data is very important for a company's success, so some companies will keep their data secret in order to gain advantages over competitors. However, Google seems do it in another way. Google shared their ngrams text corpus publicly, which basically contains valuable info...
OpenLDAP Proxy -- Introduction
OpenLDAP is an open source project which is intended to provide some commercial-grade, fully featured applications and development tools based on the well known Light-weight Directory Access Protocol(LDAP). Hence corporations which want to manage their user and group information can freely use these tools. OpenLDAP provides ldap servers, ldap clients and corresponding tools to work on LDAP. The LDAP server is called slapd(Stand-alone LDAP daemon). And it would serve as the server whi...
META,OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF,LDAP 2017-10-28 11:20:00
3 Most Popular Ways Hackers Steal Your Phone Data – Stay Safe
Our mobile devices store personal information, including passwords, usernames, birthdates, financial information, social security numbers, PIN, etc. Hence, this makes hacking a mobile phone an attractive option for hackers and scammers. There are various techniques that hackers use to spy on a mobile phone for personal information. Also, stalkers can make use of spy apps and malicious software to spy on unsuspecting people. Mobile phones are not secure because these devices connect to other net...
TECH 2019-11-29 00:29:40
Configure static IP for Linux
When a Linux server is running, it has to have an IP so that other machines can talk to it. It is often desired that the server would own a static IP so that every time other machines want to connect to it, the same IP address would be used. This is extremely useful when there are virtual machines installed on a host machine where the virtual machine would start and stop now and then. To configure static IP address for a Linux server, the /etc/network/interfaces needs to be updated. Assumi...
Flows.network: Writing an LLM Application in Rust
Over the past year, large language models (LLMs) have been booming and developing vigorously. As an enthusiast of data systems, it would indeed seem outdated not to pursue and research this hot field at all. This article summarizes my recent practical experiences attempting to write an LLM application using Rust with flows.network. Concepts Related to Large Language Models When talking about large language models, it's impossible not to mention ChatGPT and OpenAI. Although OpenAI recently change...
LLM,RUST,APPLICATION,DEVELOPMENT 2024-09-30 21:38:04
3 Mistakes Website Owners Must Avoid to Enjoy SEO Success
The first thing a consumer asks themselves when they enter any website/webpage is whether they should stay or not. A consumer has just a few seconds during which, you have a chance to capture and retain them or else they will go. Whether or not they stay depends on a number of factors, but these are things that you can improve in on-site SEO, assisted of course by the web design and development team. Read on to find the three biggest peeves that are causing high bounce rates on your site and ho...
SEO,WEB DESIGN 2015-11-20 02:33:07
Python basics summary
Python is recommended by many people as the first language to be learned now. Even in some universities, it is the primary language to be taught to CS/CE students. To master this languages, we should understand some basics of it. Here we summarize some basics about this language. These basics include : string replacement with regular expression, traverse a directory, sort a list, remove duplication, dictionary ordering, dictionary, list, string conversion, date object manipulation, command line ...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>