SEARCH KEYWORD -- Web platform



  Secret Symphony: The Ultimate Guide to Readable Web Typography

Right now, there’s a mathematical symphony happening on your website.Every single one of your readers is subconsciously aware of this symphony, and more important, they are all pre-programmed to respond to it in a particular way.The question is this:Is your site’s symphony pleasing and inviting to your readers, or does it turn them off and make it harder to communicate with them? The Mathematical Symphony of TypographyAs it turns out, this symphony is not unique to websites. You...

   Web design,Typography,Math,Golden rule     2011-12-23 07:48:10

  Latest PHP patch cannot fix the bug

On Wednesday(2012-05-02), a remote code execution vulnerability in PHP was accidentally exposed to the Web, prompting fears that it may be used to target vulnerable websites on a massive scale. The bug itself was traced back to 2004, and came to light during a recent CTF competition.A CERT advisory on the flaw explains: “When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives a processed query string parameter as command line arguments which allows com...

   PHP,bug,patch,bypassed     2012-05-08 11:20:56

  The faster-than-fast Fourier transform

The Fourier transform is one of the most fundamental concepts in the information sciences. It’s a method for representing an irregular signal — such as the voltage fluctuations in the wire that connects an MP3 player to a loudspeaker — as a combination of pure frequencies. It’s universal in signal processing, but it can also be used to compress image and audio files, solve differential equations and price stock options, among other things.The reason the Fourier...

   FFT,Fast fourier transform,MIT,Compression     2012-01-19 09:59:09

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  Some useful Linux commands for teamwork

A small development team in the intranet will frequently transfer codes, share files. Here are some command we use frequently to release some of our work. They are not applicable to Windows users. 1. Output program execution output through GTalk. Sometimes we may need to send the program execution result and log to teammates for debugging using IM. These outputs are very troublesome to copy and send while in command line mode. So we could have a program called gpipe.py which can put GTalk as a p...

   Linux,NFS,GTalk,HTTP     2013-01-16 04:36:33

  Creating Dynamic PDF files using HTML and PHP

There always arise a need for converting content from one file format to another one. Some may need to convert some text into HTML and some may need to convert some HTML content to an image format. The main reason for the need to convert from one file format to another is because the target file format is best suited for targeted medium where the content need to be displayed. The targeted medium may be an email, a printed hard copy or a web browser. The text format is best suited for sending ema...

   PHP,HTML,PDF,Conversion,Generate,Library     2011-11-18 12:10:53

  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  Mozilla releases an online editing tool --Popcorn Maker

Firefox developer Mozilla has been sparing no effort to promote the development of HTML5 and Web App They officially released a product: Popcorn Maker 1.0. It lets people edit video online and produce video with interactive features. Popcorn Maker video editing website page is similar to the ordinary video editing software, but the interface is simple and easy-to-use. You can edit the video content with simple select and drop and drag options, including inserting text, links, maps, Twitter infor...

   Popcorn Maker,Mozilla,Video editing     2012-11-13 11:50:31

  Top 10 PHP Best Security Practices for Sys Admins

PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment. My sample setup for PHP Security Tips: D...

   PHP,code security,System admin,Advice,Best practice     2012-02-01 00:04:37

  Rebirth of Microsoft?

Only from the point of view of design and products, Microsoft may seem like an ongoing decline of the old giant: IE browser market share continues to drop, PC market continues to shrink where Windows depends on and tablet PC market gets rapid expansion, Windows Mobile, Windows phone perform not so well, even CEO Steve Ballmer is often ridiculed and accused. All these seem to indicate that Microsoft's golden era is over. But on the other hand, while its net profit for the past two years has ...

   Microsoft,Rebirth,change     2012-10-05 20:09:15