SEARCH KEYWORD -- file write
Show drop down list or menu above of a flash in webpage
How to make a drop down menu show above of a flash in webpage?Normally when we embed a flash or swf file into our webpage, it is not one component of our webpage.So sometimes the flash will always show above of the webpage, it will not interact with our HTML page.To solve this problem,we need to use wmode property of object tag.wmode has three properties: window,opaque and transparent.window : the flash will show in its own rectangular window,which will not interact with ...
HTML,Flash,Block,Drop down menu,Solution 2012-03-12 17:13:57
this in JavaScript
this is a keyword in JavaScript. It refers to an internal object created automatically when a function executes, it can only be used in a function. For example: function test(){     this.x = 1;   }The this keyword will change when a function is called in different situations. However, the general rule is : this refers to the object which calls the function.Next we discuss the use of this in 4 different situatio...
this,keyword,use,JavaScript 2012-05-05 12:47:37
Chrome to provide native image lazyload support
Previously we have introduced how Medium achieved loading images lazily, basically what they did was using lots of HTML tags and CSSs to change the images at different stage. It needs lots of code to do this. With the high demand of this feature for resource consumption and performance consideration, Chrome is now working on a feature to provide native support for loading images/iframes lazily. This feature is named lazyload. lazyload will allow three values: auto: the default behavior of ...
HTTP Server development resource summary
This article summarizes some materials, articles and books I used when learning HTTP Server development. Hope this will help you. RFC and standard documents RFC2616 – Hypertext Transfer Protocol — HTTP/1.1 HTTP protocol standard document, it's an essential reference document for all personnel engaged in the development of the HTTP-related projects, careful study is recommended. RFC793 – TRANSMISSION CONTROL PROTOCOL TCP Protocol standard document The WWW Common Gateway Interfac...
HTTP Server,Book,Article 2012-09-25 22:46:56
Shell script common interview questions
Shell script is frequently used when monitoring system status on Linux. It's not an easy task to write shell script but it's a very important skill for developers and system administrators to ease work and automate common tasks. This post will share some common interview questions about shell script. 1. Get random characters(8 characters) Method 1 # echo $RANDOM |md5sum |cut -c 1-8 471b94f2 Method 2 # openssl rand -base64 4 vg3BEg== Method 3 # cat /proc/sys/kernel/random/uuid |cut -c 1-8 ed...
LINUX,INTERVIEW,SHELL SCRIPT 2018-09-28 10:46:00
3 better and efficent ways of cloud to help content marketing
Content marketing has enlarged in quality over the past year, with around 88% of business-to-business (B2B) firms participating during this marketing stategy and around 90% of customers indicating that custom content is beneficial. Some businesses across industries need staff to send email newsletters, pen web log posts , draft advertisements, write grant proposals and publish white papers. flexibility to form quality content are often an important talent every jobs However, making and mar...
BUSINESS 2016-03-08 10:39:10
Fix Permission Issue for iTerm2 to Access Application Support on MacOS
In case you have a new MacOS setup (especially on the newly released Apple M4 MacBook) and you are trying to install/launch iTerm2 on your system, you may encounter an error where it complains that you don't have enough permission to access Application Support, the error message would be like There was a problem finding or creating your application support directory. iTerm2 won't work very well until this problem is fixed. It should be at ~/Library/Application Support/iTerm2. The error was...
FIX,MACOS,APPLICATION SUPPORT,ITERM2,PERMISSION ISSUE 2024-11-17 13:09:11
etcd installation and usage
etcd is an open source and highly available distributed key-value storage system and is commonly used in critical data storage and service discovery and registration use cases. It is focusing on: Simple: well-defined, user-facing API (gRPC) Secure: automatic TLS with optional client cert authentication Fast: benchmarked 10,000 writes/sec Reliable: properly distributed using Raft etcd and Redis both support key-value storage and can be set up in distributed systems. Also Redis supporst more key...
ETCD,TUTORIAL,RAFT,DISTRIBUTED SYSTEM 2021-03-07 03:10:33
Python PLC Honeypot: Env Deployment And Attack Detection
In the previous article, we introduced the design of Python PLC Honeypot Project, this article will provide detailed step-by-step instructions on how to deploy and use the honeypot system in your environment for detecting potential attacks on OT (Operational Technology) networks. The article includes three main section: Design of Attack Alert and Notification Function Honeypot deployment: an example deployment of a mixed OT protocol honeypot, consisting of a simple setup with...
Understand this in JavaScript
In JavaScript, this is always pointing to the owner of a function or a method. Function Let's check out function first. function introduce() { alert("Hello, I am Laruence\r\n"); } For this function, what does this point to? In JavaScript, a global function's owner is the current page, i.e, the window object. Because its a method of the window object if we define a global function. Now you should know the this will point to the window object in the above function. ...
JavaScript,this,event,call 2013-04-03 04:10:03
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>