SEARCH KEYWORD -- Web security
Breakdown Kubernetes Container Runtime
Keeping on learning Kubernetes piece by piece and having a deeper understanding of its advantages, I am no longer shocked at its rapid development and popularity. Though backed by big companies like Google is undoubtedly the push, its design, features, and convenience are the biggest attraction. Most of all, it disintegrates the monolithic Internet system governance and lifecycle and offers a new management method. Kubernetes is a set of concepts, including various resource types like Pod, Deplo...
KUBERNETES,CONTAINER 2021-05-15 04:06:48
Will China surpass United States on innovation?
I had some discussions on whether China would surpass United States on innovation with some entrepreneurs during last weekend's APEC. The conclusion is United Stats has advantages on innovation today, but in the future, China's innovation will be more widespread and successful. For the next 10 years, what advantages do United States and China have? Actually United States has obvious advantages, especially on innovation structure and innovation culture. Technology -- It's undoubted that Unit...
Innovation,China,United States 2013-07-15 04:40:12
PHP 7 is coming soon
After a few RCs, PHP 7 will be officially released on November 12, 2015. This is a major release of PHP since PHP 5.6. @Laruence, one of the core contributors of PHP, has posted this news on Weibo(China's Twitter). This is a one month later than the expected time as recorded in PHP 7 timeline. But it's not that late. The new release will come with a few features including: Scalar type declaration, you can define variable like int now Return type support. Besides declare scalar type ...
RELEASE DATE,PHP7 2015-11-08 09:13:37
OpenLDAP Proxy -- Tricks and tips
Just like other software configuration, there would be issues encountered during the OpenLDAP proxy setup process. In this post, we would try to summarize some of the tricks and tips for OpenLDAP proxy setup. OpenLDAP Version We would always recommend that you install the latest version of the OpenLDAP because they contain the latest features, bug fixes and security patches. You should always refer to the latest release notes for new changes. In case you have used an earlier version of Open...
SSL,AUTHENTICATION,OPENLDAP,OPENLDAP PROXY,ATTRIBUTE MAPPING,OVERLAY 2017-11-04 04:29:38
How to Set Spring profile With Example
Technology: Spring Profiles provides a way to isolates the parts of application configuration, it will make available only in certain environments. It is mainly useful it wants to load spring beans based on environment configuration, for example if the operating system is windows we can load some specific spring beans, if it is other than load different spring beans. One more scenario where spring profiles widely used, like for QA environment we will use some database which is hosted local...
JAVA,PROFILE,SPRING,DEVELOPMENT,APPLICATIONS 2018-07-20 01:17:23
How to Choose the Right Ruby on Rails Hosting Platform
Over the last decade, Ruby on Rails has become an increasingly popular framework for web-based apps. At its beginnings, hosting Rails was a real challenge and required a fair amount of relevant know-how. Nowadays, there are dozens of hosting platforms that provide cheap and accessible services for building and deploying Rails apps. In general, the choice of hosting should be based on your requirements and technical skills – some platforms are much more difficult to handle than others. Here...
ruby on rails, ruby hosting 2015-01-30 06:27:47
User experience : Exception handling
Exception handling is the process of handling emergencies or unpredictable operational errors. The specific time of the occurrence of unexpected events and the actual consequences of the specific situation are difficult to predict. How to handle this unexpected crisis is also related to the user experience of your users. Let's first look at how some famous products deal with unexpected exception encountered by users:1. Goodyear tires can automatically expand when leaking.Tire blast is one of the...
User experience,Exception handling 2013-04-06 05:05:04
XMLHttpRequest Level 2 user guide
XMLHttpRequest is a web browser interface, it makes it possible for JavaScript doing HTTP(s) communication. Microsoft's IE5 first introduced XMLHttpRequest, because it's so useful that many other browsers also adopted this. AJAX came to the front since. However, this interface is not standardized, implementation among different browsers is different, with the emerging of HTML5, W3C is considering to standardize this interface. In February 2008, they proposed a XMLHttpRequest Level 2 draft. This ...
XMLHttpRequest, progress, upload, binary data 2012-09-19 11:51:50
Python PLC Honeypot Project
Program Design Propose : This project aims to develop a sophisticated honeypot system that emulates an OT (Operational Technology) SCADA network environment, bridging Level 1 OT field controller devices (PLCs) with Level 2 control programs, including Human-Machine Interfaces (HMIs). This honeypot will simulate various PLC models from major vendors, such as Schneider and Siemens, while supporting the primary communication protocols Modbus-TCP and Siemens-S7Comm. The system will integrate essenti...
Latest PHP patch cannot fix the bug
On Wednesday(2012-05-02), a remote code execution vulnerability in PHP was accidentally exposed to the Web, prompting fears that it may be used to target vulnerable websites on a massive scale. The bug itself was traced back to 2004, and came to light during a recent CTF competition.A CERT advisory on the flaw explains: “When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the php-cgi receives a processed query string parameter as command line arguments which allows com...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>