SEARCH KEYWORD -- file write



  9 reasons to use Zsh

Like majority *nix users, I have been using bash for many years. Sometimes I feel uncomfortable with bash. I tried use some other shells as well such as ksh, tcsh and zsh which I am going to talk about. A few days ago, I found an open source project ranking in the 6th named oh-my-zsh on Github, I downloaded it and had a try with it. It's amazing. We should use zsh to replace bash now. Why do we need to use zsh? Here is a 4 minutes YouTube video which shows many reasons why we should switch from ...

   zsh, advantage, command     2012-09-28 12:46:39

  Install Windows 7 with USB 3.0 ports only

Windows 7 is another great operating system released by Microsoft after Windows XP. Since Microsoft has announced that it suspended the support of Windows XP starting from April 8, 2014. Many users have been forced to move to Windows 7. Unfortunately, if you are using a bootable USB flash drive to install Windows 7 and your computer doesn't have USB 2.0 port but only USB 3.0 port, you will encounter missing driver issue while installing it. This post will show you how to workaround this issue. B...

   Windows 7, USB 3.0 driver, Bootable USB drive, Installation     2014-12-29 20:56:39

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  The war with spam comment

Spam comments are annoying and notorious. They are either malicious data from hackers to exploit the loopholes of the site or advertisements posted by robots. These kinds of comments have their own features and patterns, if we are careful enough, we can find ways to block most of them although it's not so easy. To block the comment with malicious executable codes such as JavaScript, we should remember one rule : never trust user input. So wherever there are user inputs, we need to check the vali...

   Spam comment,Block,Filter     2013-11-29 20:29:43

  5 comment styles should be avoided

Have you ever found some superfluous comments while checking others codes? The purpose of using comments in the code is to enhance the readability of the code, so that non-original code developers can understand them better and easier.I summarized 5 kinds of comment styles and the developers who write them. Hope you don't do the same thing as below in your application development process. 1. Arrogant comments public class Program { static void Main(string[] args) { string message...

   Code comment, comment style     2012-11-21 10:57:34

  Free PHP, HTML, CSS, JavaScript editor - Codelobster IDE

In this article, we suggest you to get acquainted with the free editor of web languages - Codelobster IDE. It is presented on the software market for a long time already, and it wins a lot of fans. Codelobster IDE allows you to edit PHP, HTML, CSS and JavaScript files, it highlights the syntax and gives hints for tags, functions and their parameters. This editor easily deals with those files that contain a mixed content. If you insert PHP code in your HTML template, then the editor correctly hig...

   IDE,CODELOBSTER,PHP,HTML     2019-07-27 09:37:14

  new() and make() in GoLang

GoLang is a modern, statically typed, compiled programming language designed for building scalable, concurrent, and efficient software. It provides various built-in functions and features that help developers write concise and efficient code. Among them are the new() and make() functions, which may appear similar at first glance but serve different purposes in GoLang and are crucial for memory allocation and data initialization. In this blog article, we will explore the differences between the n...

   NEW,MAKE,GOLANG     2023-11-18 13:43:25

  App Store, Most Effective Weaponry In Apple’s Armor

Apple’s most effective and effectual weaponry is its app store. Surprisingly however, the first generation iPhone did not support any Mobile apps, and Steve Jobs was actually proud of this fact. Back then, in 2007, third party mobile apps were not allowed on the iPhone. Jobs in-fact announced that Mobile app developers could use the most modern standards and write customized mobile apps for the iPhone web browser. He said, “We think we’ve got a very sweet story for you. You can...

   Mobile app developers, customized mobile apps, software development kit,     2015-07-28 03:26:19

  IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...

       2024-07-14 01:40:09

  The Strange Behavior of the void Type in TypeScript

Preface In TypeScript (TS), there is a type called void. It represents "nothing" but it's important to note that it's not the same as "nothing" in JavaScript(JS). Typically, void is used to declare the return type of functions. Although you can declare a variable as void, we generally don't do this because it serves no meaningful purpose. Let's explore why in the examples below. The void Type Declaring a Variable as void let name: void; // Declare a variable `name` with type `void`. name = 'nan...

   TYPESCRIPT,JAVASCRIPT,VOID,TYPE     2024-09-13 23:44:26