SEARCH KEYWORD -- website contact form tutorial



  Disposable Email address

There is one statement which says Giving out your email address is like starting a relationship. What happens when you want to break up?Once you gave out your email address, you may take the risk of receiving big amount of junk emails. However, when we register on some websites, we must provide our Email address to receive authentication emails. If we cannot receive the authentication email, we cannot finish the registration process. Is there any alternative way?We can use disposable email, i.e,...

   Disposable email,Website,Summary     2012-05-19 12:27:14

  Microsoft to launch Surface Pro 4 on October 6

Microsoft Microsoft has just updated on their website about an event to be held on October 6. This event will be held in New York at October 6 10am EDT.  As described by Microsoft : "We have some exciting news to share about Windows 10 devices". Although there are no details about what these Windows 10 devices are, many think this is the time when new Lumia Phones and Surface Pro 4 will be launched.  The Lumia devices will be Lumia 950 and Lumia 950XL. Both of them will be shipped wit...

   SURFACE PRO 4,MICROSOFT,WINDOWS 10,LUMIA     2015-09-15 07:31:56

  10 tools to make your shell script more powerful

Many people mistakenly think that shell scripts can only be run in command line. In fact shell can also call some GUI components such as menus,alert dialogs, progress bar etc. You can control the final output, cursor position and various output effects. Here we introduce some tools which can help you create powerful, interactive and user friendly Unix/Linux shell scripts. 1. notify-send This command can let you inform the process to send a desktop notification to users. This can be used to send ...

   shell,GUI,zenity     2013-04-05 08:50:41

  Twitter user database is hacked

According to Sina Tech, One hacker from Islamic Republic of Mauritania claimed today that he had acquired Twitter's entire user database and he shared over 15000 user account information on file sharing website Zippyshare.These information include the name of each account on Twitter, username and access tokens of third-party applications which have access to their Twitter accounts(such as Instagram or HootSuite).Twitter has yet to comment on the matter, but the company sent messages urging ...

   Twitter,Hacker,Access token     2013-08-20 10:49:44

  <=> operator in MySQL

Have you ever seen "<=>" in a SQL query while using MySQL? Does it mean less and equals to and greater than? Actually if you consider it as the union of <= and =>, great, you are close to it. This is one form of equal operator in MySQL, it has the similar meaning to the = operator with some subtle difference. According to MySQL documentation, <=> is NULL-safe equal. This operator performs an equality comparison like the = operator, but returns 1 rather than NULL if both operand...

   MySQL,NULL safe,<=>     2014-03-24 06:23:22

  Different types of keystore in Java -- PKCS12

PKCS12 is an active file format for storing cryptography objects as a single file. It can be used to store secret key, private key and certificate.It is a standardized format published by RSA Laboratories which means it can be used not only in Java but also in other libraries in C, C++ or C# etc. This file format is frequently used to import and export entries from or to other keystore types. Next we will explain the operations which can be performed on PKCS12 keystore. Create PKCS12 keystore Be...

   Java, PKCS12, keystore, tutorial     2015-01-04 21:08:49

  3 preconditions for Facebook to enter China

It's well known that Mark Zuckerberg has a big interest in the Chinese market. Recently, the founder of Facebook visited China to attend a development forum held by the Chinese government. Along with the trip, he also paid a trip to some famous places in Beijing such as The Great Wall. He even did a morning run in front of the Tian'an men Square, the symbol of China.  In past few years, Zuckerberg also learned Chinese and read Chinese books, showed his love to the Chinese culture....

   FACEBOOK,CHINA,MARK ZUCKERBERG     2016-03-25 01:32:51

  Those interaction methods we can play with

Smartphones have become one important part of our lives, the phone apps also play more and more important roles. They can help us live through the boring time or help us connect to our close friends fat away from us or help us get information,etc. There are also some interesting interaction methods since the birth of smartphones. We can play with them while we interact with the smartphones. Here we summarize some of them. 1. Shake Since WeChat introduces the Shake method to find people which yo...

   Interaction,Mobile device,Google glass     2013-05-07 05:21:15

  How Chinese tech websites survive

As a tech site which aims to share knowledge and experience, content is its core value. To attract readers, it needs to produce valuable content and keep the originality of the content. When an article is published on a site, it should be a copyrighted property of that site or the original author while others should be very careful when considering to copy that article to their own site. They should generally avoid to copying the whole content of the article. However, in reality, this is no...

   WEBSITE,COPYRIGHT,CHINESE     2017-08-08 21:54:32

  5 Lightweight PHP Frameworks For Creating An API

PHP is undoubtedly one of the most popular programming languages that offer a wide range of lightweight frameworks for building basic websites to REST APIs. These frameworks are powerful tools that have the potential to enhance productivity in order to deliver faster results without getting distracted from the best practices of development. Developing REST APIs with plain PHP is a tedious and time-consuming process. In order to sort this out, you only need to hire php developers who have a niche...

   PHP,API     2018-10-22 07:55:34