SEARCH KEYWORD -- USER BEHAVIOR
PHP to output string to client terminal
It is a common task to echo messages to the user using PHP. There are lots of ways where the message can be echoed to the client terminal(browser or console window) through PHP. These includes some well know debug methods like var_dump() and var_export() etc. In this post, we will show you some other methods shared by Laruence, one of the core members of PHP development team. 1. echo First comes with the most common one : echo. $str = "Hello PHP\n"; echo $str; 2. print Then comes another c...
SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard
This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...
A journey to investigate a goroutine leakage case
In Go, creating goroutines is straightforward, but improper usage may result in a large number of goroutines unable to terminate, leading to resource leakage and memory leaks over time. The key to avoiding goroutine leaks is to manage the lifecycle of goroutines properly. By exporting runtime metrics and utilizing pprof, one can detect and resolve goroutine leakage issues. This post will go through one real case encountered by the author. The author maintains a service that connects to a targe...
TIMEOUT,SSH,GUIDE,DEBUG,LEAK,GOROUTINE,PPROF,GOLANG 2024-03-16 11:00:23
IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...
What has Google done on improving programming languages
Google is now becoming the most innovative IT company in the world. Every now and then they would deliver one revolutionary product to us such as Google Glass, Google Fiber, Automatic Mobile Cars etc. All these great products are backed up by the powerful software system built into. Google has used many programming languages to develop these software and they have put much resource in improving the programming languages they use and we use today. What has Google done in improving programming lan...
Google,Programming 2014-02-21 09:36:34
XMLHttpRequest Level 2 user guide
XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...
XMLHttpRequest, progress, upload, binary data 2012-09-19 11:51:50
A handbook on the first day of joining a new internet company as BE engineer
When joining a new internet company, there might be lots of things need to be done to get ready for taking new challenges. These include both culture and tech preparation. in this post, we would focus on how to prepare the first day technically. The first thing to do is to get your laptop or your work machine up, these involves lots of tool setup and accesses. Normally there are three major task categories. Access As an engineer, there are lots of accesses needed to access different resources wi...
TIPS,CAREER ADVICE,ONBOARDING 2021-12-11 21:32:10
Alphabet chooses the domain extension .xyz
Google has been restructured and it now has a parent company which is called Alphabet. This new company will fully own the original "Google". Larry Page will be the CEO of Alphabet and Sergey Brin will be the president of the new company. Sundar Pichai will be the new CEO of the new Google. The new Google will continue its current business with some slimmed changes. While Alphabet will focus on working on the next generation of Internet and creating more billion user companies and services...
Google, Alphabet,XYZ, Domain name 2015-08-10 20:18:33
Relationship oriented website vs content oriented website
Relationship oriented website is a kind of website based on friend circle, people come to the website to share news with their friends and see what's happening around their friends, these websites include Facebook, Twitter and Tumblr. While content oriented website is a kind of website based on unique content, people come to the website to find information or find answers for their questions, these websites include TechCrunch, The Verge and Medium. Most of websites on the Internet nowadays belon...
Relationship oriented,Content oriented, Loyalty 2013-07-11 09:20:37
How to improve website rank in search engine?
Want to let people know your website? Want to get much web traffic ? Then you need to make sure that people can find your website. Currently, many people are using search engine to find what they are interested in. So besides good content, you need to spend some time on getting your website shown at the first few pages of the search engine. Here are 10 suggestions to improve your website rank in search engine.1. Webpage response speedSimilar to human beings, search engine hates waiting. Webpage ...
Website rank,Suggestions,SEO 2012-07-23 13:28:27
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>