SEARCH KEYWORD -- windows 8.1
Why to Build Modern Web Apps with ASP.NET?
ASP.NET offers multiple options for fabricating cloud-based web applications. Its features such as the ability to cope up with different platforms including Mac, Linux, and Windows along with its open source nature indicate its efficiency. The various architectural modifications in the core framework have made the system more affable, and modular components make the job easier by simplifying the various implications. Microsoft has worked on the roots of this software to render a sophistica...
WEB DEVELOPMENT,ASP.NET DEVELOPMENT, WEB APPLICATION DEVELOPMENT,.NET DEVELOPMENT 2016-01-25 03:43:26
Differences among Enter,F5 and Ctrl+F5 in webpage refresh
When we press Enter, F5 or Ctrl+F5 to refresh a webpage, is there any difference among them? Actually it's yes, we can find the difference from the request header and response header information. There are two cases about pressing Enter in the address bar. First if the page requested is cached and not expired in the browser, we can find the header information sent by the browser is : Host 192.168.3.174:8080 User-Agent Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20100101 Firefox/5.0 Accept ...
Examples of bad design
Good designs always help users solve their problems in a convenient and familiar way. It takes little or no time for users getting used to the product with a good design. In contrast, bad designs frequently introduce confusion and complexity to users. Before we design any product, we should think carefully about every aspect of the product. We share some really bad design here to show how they can affect people's life. 1. USB Connector Have you ever put one in right on the first try? We frequen...
Bad design,Usability,Web design 2013-09-25 22:57:49
Different types of keystore in Java -- Overview
Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...
JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS 2014-08-18 02:09:54
How does JGSS read Windows native TGT credential?
MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...
KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE 2015-03-25 03:42:32
Microsoft Edge: Banishing Painful Memories of Internet Explorer
If you are one of those unlucky early internet users, you would remember how painful those days were; like our basic computer, the browser used to take forever to load, but nothing could diminish our excitement for the latest innovation i.e. the internet. Around that time Internet Explorer was the best we had. In fact, it enjoyed more than 90% of the market share in 2003 when Microsoft bundled its browser with the Windows operating system for free. However, things began to go downhill for the I...
Example of less is more
Less is more is a very important design principle. It is as important as the 80:20 principle. It means that which is less complicated is often better understood and more appreciated than what is more complicated; simplicity is preferable to complexity; brevity in communication is more effective than verbosity. Next we will use an animated image to describe what is less is more. The popularity of flat design in web application design also proves the importance of less is more. Many famous compan...
Less is more,Flat design 2013-09-20 07:20:43
Haxe: Another multiplatform language
There are two kinds of programmers: One is using different languages to solve problems, the other is inventing languages to solve problems. Haxe is an emerging open source programming language which is universal, powerful and easy-to-use. Some languages claimed they were multiplatform languages, such as Java, C# and ActionScript. They all are based on some platforms, Java has JVM, C# has .Net and ActionScript has Flash Player. While Haxe is a trule multiplatform language, it can be used to devel...
Haxe,Multiplatform,Open source 2012-06-11 08:08:28
Google+ doesn't support Firefox 23?
Mozilla just released a new version of Firefox--Firefox 23, but after upgrading to the new version. We cannot login to Google+ anymore, instead it will show a page which says "Your browser is no longer supported" and it gives some choices to download new web browsers. It also allows to download Firefox. But the thing is we have updated to the latest version. Also when clicking on the "Download Firefox" link, it is redirected to the download Firefox for Android page, is it weird? Is this becaus...
Firefox 23,Google+ 2013-08-10 21:46:27
10 notorious computer virus
The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...
Computer virus,History,Security 2013-07-16 21:09:22
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>