What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
codingsec.webp 2016-07-25 21:06:03 Top 5 Information Security Certifications For 2016 (lien direct) According to the U.S. Labor Department's Bureau of Labor Statistics, the demand for job market for information-security analysts, and cybersecurity professionals, is set to increase 36.5 percent by 2022, with about 27,400 jobs being added. The demand for the security and IT professionals is very high and continues to increase in future. Employers will be looking for certifications from the candidates as a measure of their hard work , dedication and excellence. If you are looking to pursue career in the information security, here are the top 5 information security certifications that are considered to be leaders in the infosec industry today. When Guideline
codingsec.webp 2016-07-25 18:00:02 What is the need of the design patterns in programming (lien direct) Design of object oriented software is hard: People who are familiar with object oriented software development are familiar with the fact that designing reusable object oriented software is very hard. So, what will make the development of reusable software easier? Experienced Vs novice designers: The experienced designers use their knowledge they had gained from their experience in designing object oriented software. The novice designers who have no experience in designing are left with numerous ways to develop the designs which may lead them to develop ineffective designs. The experienced designers have documented their experience as design patterns. These design patterns Guideline
codingsec.webp 2016-07-25 15:27:53 Scientists Made The World’s Smallest Hard Disk With 500x More Storage Space than Best Hard Drive (lien direct) Scientists from Netherlands have successfully written data at the smallest scale ever. Scientists managed to  manipulate chlorine atoms one at a time and stored a kilobyte of data in what is now being called as the world’s ‘smallest hard disk’. These researchers took their inspiration from the famous physicist Richard Feynman – who once in 1959 envisioned that one day in future we could arrange individual atoms to store information. These scientists actually coded a part of Feynman’s speech on this topic into their latest ‘atomic kilobyte’. According to the team of researchers from the Kavli Institute of Nanoscience located at Delft University, the data written at this ★★★★
codingsec.webp 2016-07-25 04:44:15 4 Ways To Hack A WhatsApp Account and How To Protect Yourself From Being Hacked (lien direct) Whatsapp is now the mainstream chat application for many people, here are the ways hackers can hack Whatsapp account and spy on your messages. Follow the secure measures to make your account strong and safe.   1.Hack Whatsapp Account from OTP SMS We all know that Without confirming Whatsapp Number by OTP SMS, we can not use it. In this scenario, a hacker only has to get the access to your SMS messages from any spyware app. How Can you Protect yourself from this Whatsapp SMS Hack Use a good antivirus in your mobile phone. Lock your phone from Pattern lock or PIN. Turn off
codingsec.webp 2016-07-24 22:01:28 Advanced Tips To Protect Yourself From Hackers (lien direct) HACKER TRICKS AND PREVENTION TECHNIQUES In TV series and movies we see hackers being involved in many situations. We see  them apply their computer knowledge in order to perform the hacker tricks that saved the day. Hackers are considered as heros with only a keyboard and a mouse as weapons. However, the prevention of hacker attacks and protecting the innocent from hacker attacks is very hard, and complex, in the real life. Hollywood usually has a tendency to oversimplify things so that the general public can easily understand them. But, only a very small percentage of the population have enough skills to perform these kind of demonstrations. If you want to be
codingsec.webp 2016-07-24 16:00:09 How to work with AWT controls in java (lien direct) In this article we will look at how to create and work with various AWT controls available in the java.awt package along with sample code.   We can add and remove controls to a Container like Applet and Frame using the following methods available in the Container class: Component add(Component ref) Component remove(Component ref)   Label A label is a GUI control which can be used to display static text. Label can be created using the Label class and its constructors which are listed below: Label() Label(String str) Label(String str, int how) The parameter how specifies the text alignment. Valid values are
codingsec.webp 2016-07-23 22:25:49 Here is How To Install Chrome On Kali Linux Without Errors (lien direct) If you are someone who wants to use Kali Linux as your main operating system, the most common issue you face initially in lacking of a good browser. The default browser in Kali Linux is iceweasel which is a forked version of Firefox. To have a better browsing experience, you might want to install Chrome on Kali Linux. Install Chrome on Kali Linux 2.0 Sana Frst of all, download google chrome if you are running a 32 bit computer, then download 32 bit or if it is 64 bit then download the 64 bit file   after downloading, copy the file to your
codingsec.webp 2016-07-23 18:00:13 How to work with Swing Controls in java (lien direct) In this article we will look at some of the swing controls available in javax.swing package along with sample Java code for each control.   Labels The JLabel class is used to display a label i.e., static text. A JLabel object can be created using any one of the following constructors: JLabel(Icon icon) JLabel(String str) JLabel(String str, Icon icon, int align) In the above constructors icon is used to specify an image to be displayed as a label. Icon is a predefined interface which is implemented by the ImageIconclass. str is used to specify the text to be displayed in the label and align is
codingsec.webp 2016-07-23 15:03:08 Anonymous Launches DDoS Attack Against Rio Court That Blocked WhatsApp (lien direct) The Anonymous hacker group’s Brazil branch launched a DDoS attack against the website of the Rio court (tjrj.jus.br) which banned the usage of WhatsApp across the country. This particular attack was meant to be a warning shot, and only lasted for a few hours. The court website was back online at 15:00, local time. Anonymous hacker group took credit for the attack through a post on their Official Facebook page, the place where they have explained the reason for their doings. Yesterday, this court in Rio ordered the country’s five major ISPs Claro, Nextel, TIM, Oi, and Vivo,to block WhatsApp across Brazil. Many times in past Whatsapp-related problems are thrown
codingsec.webp 2016-07-22 16:00:18 What are adapter classes in java (lien direct) In this article we will learn about adapter classes which are used to simplify the event handling process. Sample Java programs are also provided.   Adapter classes are a set of classes which can be used to simplify the event handling process. As we can see in the mouse event handling program here, even though we want to handle only one or two mouse events, we have to define all other remaining methods available in the listener interface(s). To remove the aforementioned disadvantage, we can use adapter classes and define only the required event handling method(s). Some of the adapter
codingsec.webp 2016-07-21 19:41:38 Here is How to Install and Run Kali Linux In VirtualBox (lien direct) Kali Linux is the favorite OS for pentesters but it is not exactly for everyday use. Kali Linux can be overwhelming for daily use and for everyday browsing, Windows and Linux distro like Ubuntu are very famous. So, to use Kali Linux when needed is the choice we have. This can be done in 2 ways, by running Kali Linux in VirtualBox or by dual booting Kali with your choice of OS. How to How to dual boot Kali Linux with windows 10. A step-by-step tutorial. Here is How to Install and Run Kali Linux In VirtualBox In this tutorial we will
codingsec.webp 2016-07-21 16:00:09 How event handling is performed in java (lien direct) In this article we will learn what is event handling and how to handle events in Java programs using the delegation event model.   Definition: The process of handling events is known as event handling. Java uses “delegation event model” to process the events raised in a GUI program.   Delegation Event Model The delegation event model provides a consistent way of generating and processing events. In this model a source generates an event and sends it to one or more listeners. A listener waits until it receives an event and once it receives an event, processes the event and returns. The advantage
codingsec.webp 2016-07-21 08:59:36 Feds Seize Kickass Torrents Domains, Arrest Owner (lien direct) Kickass Torrents (also known as KickassTorrents or KAT) seems to be down. We had a little luck getting in loading, by trying both http://kat.cr and https://kat.cr, but in most of the cases the popular torrent site simply doesn't work. Feds Seize Kickass Torrents Domains, Arrest Owner This outage came soon after the arrest of the 30-year-old Artem Vaulin, who is the alleged founder of KAT the person U.S. will seek to extradite. Artem was arrested in Poland and was charged with one count of conspiracy to the criminal copyright infringement, another count of conspiracy to commit money laundering, and another two counts of criminal copyright infringement. Criminal complaint filed in
codingsec.webp 2016-07-20 22:43:03 Here is How To Install Flash in Kali Linux 2.0 (lien direct) Kali Linux is an awesome OS for pentesting and made any fans over years. Since the default browser in the Kali is Ice weasel, which is a derivative of Firefox  it lacks the flash and java. Let’s keep java aside and try to install flash in you Kali computer. Also read: Here is How to Theme Up Your Kali Linux  How To Install Flash in Kali Linux 2.0 Step 1: Download Flash for Kali Linux Let us start the process by  downloading the  tar.gz for other linux from the website: .https://get.adobe.com/flashplayer/ Step 2: Extract the tar.gz File If you have finished downloading
codingsec.webp 2016-07-20 20:05:39 Here is How to Theme Up Your Kali Linux (lien direct) Kali Linux is a great OS for pentesting but lets accept the truth, when it comes to bare looks, Kali looks lifeless. The Kali rolling may be an exception but even that looks boring over time. one way to make it look cool is to apply a theme on top of Kali, which we will be doing in this tutorial. Step 1: Downloading a Theme of your choice You can visit GNOME-Look website and download your theme. You must select GTK3 themes only, the link is here http://www.gnome-look.org download your theme of choice which is gtk 3.x  and in tar.gz format. Step 2:Extraxting the Dowloaded
codingsec.webp 2016-07-20 16:00:16 How to prioritize threads in java (lien direct) In this article we will learn how to work with thread priorities when there are several threads competing for CPU time. Example code is also provided.   In a uni-processor system, when several threads are competing for the CPU, you might want a certain thread to get more CPU time (burst time) over the remaining threads. We can use thread priorities in such situation.   The thread class provides three final static variables (constants) namely: MIN_PRIORITY, NORM_PRIORITY, and MAX_PRIORITY whose values are 1, 5 and 10 respectively. Priority values can be in the range 1 to 10. 1 denotes minimum priority
codingsec.webp 2016-07-19 19:56:57 WikiLeaks Servers Went Down, After Announcing Turkey Coup Leaks (lien direct) While WikiLeaks was releasing the details of failed Turkish coup, they were hit by a DDoS attack which resulted in shutting down of their servers. WikiLeaks received the information from an anonymous source. Here is the complete story: Yesterday WikiLeaks started teasing its followers on Twitter about an upcoming leak that may contained 300,000 emails and also over 500,000 documents. WikiLeakssyas that these documents were leaked from AKP (In English: Justice and Development Party/ In Turkish: Adalet ve Kalkınma Partisi ), which is President’s party and also the current biggest political force in Turkey. WikiLeaks has announced this data dump just three days after
codingsec.webp 2016-07-19 16:00:31 what are control statements in javascript (lien direct) Statements that are used to control the flow of execution in a script are known as control statements. Control statements are used along with compound statements (a set of statements enclosed in braces). Local variables are not allowed in a control construct (control statement + single/compound statement). Even though a variable is declared within a control construct, it is treated as a global variable.   Control Expressions The expressions upon which the flow of control depends are known as control expressions. These include primitive values, relational expressions and compound expressions. The result of evaluating a control expression is always a
codingsec.webp 2016-07-18 20:49:57 Who invented the Internet? And Why? (lien direct) Even though the World Wide Web was invented by a single person, the greatness of the internet was because of numerous efforts by many individuals who sometimes worked as groups and sometimes as individuals. The birth of internet dates back to the cold war time. At that time there is a serious competition for technology between US and USSR. USSR sent their sattilite Sputnik 1 into space in October 4, 1957. In response to that, American government created the Advanced Research Project Agency also known as DARPA( Defense Advanced Research Projects Agency) in 1958. Simply saying, the intention on launching DARPA
codingsec.webp 2016-07-18 16:00:44 what is interthread communication and how it is done in java (lien direct) In this article we will learn how to implement inter thread communication i.e how can we coordinate the communication between two or more threads.   Although we can restrict the access of data or code to a single thread at a time by using synchronization, it can't guarantee the consistent execution of our logic.   As an example let's consider the conventional Producer-Consumer problem which is generally introduced in Operating Systems course. In this problem Producer process or thread produces items and stores in a queue and Consumer process or thread consumes items from the queue. Note that the Consumer thread should wait ★★★
codingsec.webp 2016-07-17 22:10:59 Researcher Finds Way to Steal Money From Google, Microsoft, and Instagram (lien direct) A security researcher from Belgia named Arne Swinnen found a creative way to steal money from top companies like Facebook (using the Instagram service), Microsoft, and Google, using their two factor authentication voice-based token distribution systems. Most of the companies which use  Two-Factor Authentication(2FA ) send short codes using SMS to their users. But, if the user want, he has an option to receive a voice call also from the company, here the robot operator speaks out  the code. These phone calls are received by the  phone number that is officially linked to those specific accounts. Arne  in his experiments, discovered that he can create Google , Microsoft
codingsec.webp 2016-07-17 19:28:15 Linus From Linus Media Group Accepts that He Got Hacked (lien direct) Famous Youtuber and the founder of Linus Media Group, Linus Sebastian accepted that they are hacked. There were various rumors in the industry that LMG got hacked and they used a very easy password which anyone could guess and other rumor says the database of LMG was out for just $5. After all these, Linus came out to put a stop to those rumors. In the latest video of his recent series of videos called Honest Answers, Linus explained what actually  happened. he named the episode as’ WTF is Happening’. Going into the details, Linus clearly stated that weak passwords are Uber
codingsec.webp 2016-07-17 16:00:49 How to style the XML documents (lien direct) This article explains styling xml documents using CSS and XSLT. Styling information can be specified for an XML document in one of the two ways. First is by using CSS (Cascading Style Sheets) and the second is by using XSLT (eXtensible Stylesheet Language Transformations) which was developed by W3C. Although using CSS is effective, XSLT is more powerful.   Cascading Style Sheets CSS can be specified in a separate file and linked with an XML document by using the xml-stylesheet processing instruction as shown below: <?xml-stylesheet  type=”text/css”  href=”style.css” ?>  As an example consider the following XML document: <?xml version=“1.0” encoding=“utf-8”?>
codingsec.webp 2016-07-16 23:15:28 Fake Pokemon GO Android Apps Locks Your Screen, Clicks on Ads (lien direct) It is already known that attackers are using the Pokemon GO apps to spread some remote access trojans through third-party app stores. Now, one of these malware-infected apps made its way to the Google Play Store. After a report from ESET, Google intervened and removed the application, and also removed  two other apps that distributed scareware. This malicious app’s with the name Pokemon GO Ultimate promised users allowing  them to play the game, even though it was not available in their country. Since Pokemon GO is only available in the Australia, US, Germany, the UK, and New Zealand, some users from other countries  installed the app hoping for a way to play the Nintendo’s bestseller.
codingsec.webp 2016-07-16 20:15:30 Ubuntu vs Linux Mint : Which Distro Should You Use? (lien direct) Ubuntu and Linux Mint are both famous for being very friendly for beginners. Ubuntu is the most popular Linux distro and Linux Mint is based on Ubuntu. But there are some real differences between both of these. And how would you choose the one for you? today we will answer this Ubuntu vs Linux Mint question. System Requirements Linux Mint: 512MB Ram  with 1GB as recommended. 9GB of disk space with 20GB as recommended. 800 x 600 screen resolution with 1024 x 768 recommended. Ubuntu: 512MB RAM with 2GB as recommended. 5GB of disk space with 25GB as recommended. 1024 x 768
codingsec.webp 2016-07-16 16:00:02 How to perform data validation in javascript (lien direct) One of the best uses of client-side JavaScript is the form validation. The input given by the user can be validated either on the client-side or on the server-side. By performing validation on the client-side using JavaScript, the advantages are less load on the server, saving network bandwidth and quicker response for the users. Form input can be validated using different events, but the most common event used is submit i.e when the submit button is clicked. Corresponding attribute to be used is onsubmit of the form tag. Let's consider a simple form as shown below: //HTML Code <html>     <head>
codingsec.webp 2016-07-15 16:00:41 How to perform type conversion in JavaScript (lien direct) The mechanism of converting a value or variable from one type to another type is known as type conversion. There two types of type conversion: implicit type conversion and explicit type conversion.   Implicit Type Conversion: Type conversion which is performed automatically by the JavaScript interpreter is known as implicit type conversion or coercion. Implicit type conversion may take place when the expected type is different from the actual type of the value given from the user or read from a file etc. For example, consider the following expression: “John” + 123  It can be observed that in the above
codingsec.webp 2016-07-14 20:50:50 What’s the difference between a software engineer and a programmer? (lien direct) Both computer software engineers and programmers are integral to the development of new mobile apps and computer programs. Even though software engineers may sometimes program, the basic job requirements are different from each other in some ways. Developers and Software engineers design new programs and applications, and write the code that allows those programs to function properly. Here is the differences between software engineer and programmer. Computer Programmers A computer programmer is also called a coder since he is the one who writes the code for computer programs. Basically, Computer programmers take the designs of software engineers and make them real by writing computer code that makes applications and even
codingsec.webp 2016-07-14 16:00:28 How to perform IO in javascript (lien direct) Input and Output in JavaScript JavaScript models the HTML/XHTML document as the document object and the browser window which displays the HTML/XHTML document as thewindow object. The document object contains a method named write tooutput text and data on to the document as shown below: document.write(“Welcome to JavaScript”); To display multiple lines of text using the write method, include the HTML tag <br /> as a part of the string parameter as shown below: document.write(“Welcome<br />to<br />JavaScript”); The output of the above code on the document will be as shown below: Welcome to JavaScript Although the document object has another ★★★
codingsec.webp 2016-07-13 19:34:10 Augmented vs Virtual Reality: The Difference? (lien direct) Augmented Reality and Virtual reality are two common words we hear everyday. It’s time we know the basic differences between them. What Is Augmented Reality? The term Augmented reality (AR) refers to devices that can combine elements of virtual aspects with the real world. This is often done by using our phone's camera to display “real world” and adding a virtual overlay on top of it, though it is not always. For example, take Google Glass which uses a tiny display on the upper-right corner of a pair of glasses and shows virtual elements over top of your real world elements. When the Google announced their Google Glass back
codingsec.webp 2016-07-13 16:00:34 Hard to remember terminal commands use CLI Companion (lien direct) Well when you are new to the Linux terminal and had never used the Linux terminal before you may find hard to remember respective commands to do the task Hence People from launchpad.net have programmed a handy tool that will help the users to work with the Terminal Flawlessly it uses a database and a relational model to remember your most frequently used commands next time if you want to use a specific command just select from the GUI provided by the CLI Companion where you can select the command and just click on the apply button. It is even
codingsec.webp 2016-07-12 20:54:29 Speed runner Completes Super Mario Bros. 3 in Just 2 seconds (lien direct) There are a lot of amazing speed runs on video games on the internet over years. But this article is about the most amazing speed run we have ever seen. As a part of Summer Games Done Quick, named ais523, a Tool Assisted Speed Runner (TAS) managed to pull an incredible act of completing the Super Mario Bros. 3 in just two seconds. This may easily be one of the quickest speed runs of all time. This speed run is completed in just 2 seconds so, you could have easily thought that this is impossible for a normal person and guess what, you are right.
codingsec.webp 2016-07-12 16:00:34 Difference between different cloud services (lien direct) In this article we will look at cloud services examples. Various examples for SaaS, PaaS and IaaS service models are provided. SaaS Services Email and Office Productivity: Applications for email, word processing, spreadsheets, presentations, etc. Billing: Application services to manage customer billing based on usage and subscriptions to products and services. Customer Relationship Management (CRM): CRM applications that range from call center applications to sales force automation. Collaboration: Tools that allow users to collaborate in workgroups, within enterprises, and across enterprises. Content Management: Services for managing the production of and access to content for web-based applications. Document Management: Applications for ★★★★★
codingsec.webp 2016-07-11 20:45:56 The world’s largest air purifier sucks in smog and turns it into jewellery (lien direct) The air we breath was once very clean and t is not anymore. In many recent cases, the situation is getting worse. According to recent study by UC Berkeley researchers, in China smog kills about 4,000 people every day. And in US about 4 in 10 every people live in counties which have unhealthy levels of ozone or particle pollution. According to the American Lung Association. To solve this problem and help clean up our air and make it better and breathable again. Dutch designer Daan Roosegaarde made a 23-foot (7-metre) tall air purifier which is called the Smog Free Tower. This tower-like device
codingsec.webp 2016-07-11 16:00:55 10 Obstacles you face when you are working with cloud (lien direct) Obstacle 1: Business Continuity and Service Availability Organizations often worry about the availability of the service provided by the cloud providers. Even the popular service providers like Amazon, Google, Microsoft experience outages. Keeping the technical issues of a availability aside, a cloud provider could suffer outages for non-technical reasons like going out of business or regulatory action. Obstacle 2: Data Lock-In Data Lock-is related to tight dependency of an organization's business with the software or hardware infrastructure of a cloud provider. Even though software stacks have improved interoperability among platforms, the storage APIs are still essentially proprietary, or at least
codingsec.webp 2016-07-10 20:03:40 how to be a Gmail Power User [Infographic] (lien direct) Internet was trying  hard to kill email for forever but so far, no considerable damage has been done to it. Why else would there be many guides and tips on the internet teaching you how to be a Gmail power user or how to use Gmail like a pro? This infographic is one of the plenty of doable tips on internet that can help you work faster (using the keyboard shortcuts), increased productively (auto-archives, canned responses), and be more organized (use folders, filters and labels) on Gmail. My personal favorite of the lot is the Undo Send feature which saved me several times. It is
codingsec.webp 2016-07-10 16:30:11 What is wild card pattern matching algorithm (lien direct) Given a text and a wildcard pattern, implement wildcard pattern matching algorithm that finds if wildcard pattern is matched with text. The matching should cover the entire text (not partial text). The wildcard pattern can include the characters '?' and '*' '?' – matches any single character '*' – Matches any sequence of characters (including the empty sequence) For example, Text = "baaabab", Pattern = “*****ba*****ab", output : true Pattern = "baaa?ab", output : true Pattern = "ba*a?", output : true Pattern = "a*ab", output : false Each occurrence of '?' character in wildcard pattern can be replaced with any
codingsec.webp 2016-07-09 23:54:57 All Fedora 24 Linux Flavors on a Single Live ISO Image Is Now a Dream Come True (lien direct) Željko Popivoda of the Linux AIO team yesterday confirmed softpedia  on the availability of an updated ISOs of their Linux AIO Fedora project, which is based on latest Fedora Linux release. Linux AIO Fedora Live 32-bit ISO and 64-bit images are now available for download which are based on the recently released Fedora 24 Linux OS that was officially launched on June 21, 2016. For many Fedora fans, this is a dream come true, Linux AIO Fedora Live DVDs include all important Fedora 24 flavors, such as the Fedora 24 Workstation with the GNOME desktop environment, along with the official Fedora Spins. Among these, other
codingsec.webp 2016-07-09 23:50:11 F.Security Framework for Web Application Pen Testing (lien direct) F.Security Framework has been created by Fedy Wesleti, the naming convention has been inspired from Mr Robot and is designed for discovering  vulnerabilities and information disclosure issues relating to WordPress, Joomla and Drupal. It also has the ability to search for admin login areas, Cloudflare vulnerabilities and even can perform networking scanning for open ports. Here is a statement fom Fedy Wesleti “F.Security Framework Is a WebbAPP For Penetration testing designes to everyone in the Information Technology field It helps you gain time by its fast and quick responses , easy tool browsing , and comprehensive architecture dedicated To FSociety
codingsec.webp 2016-07-09 19:24:10 4 Ways to Run Linux Software on Windows (lien direct) Many Windows users want to try Linux at some time. They may be different reasons for that, may be they are irritated by Windows updates, may be they love open source. If you are looking for a better development environment and powerful command-line tools, you can run Linux software on Windows. Different options are available for running Linux software on Windows. It is easier than running Windows software on Linux, as you don’t need any software licenses for setting up a virtual machine with a free Linux distribution. 4 Ways to Run Linux Software on Windows Virtual Machines You can use Virtual machines to run any
codingsec.webp 2016-07-09 16:00:05 What to expect in the upcoming apple programming language swift 3 (lien direct) You probably know Swift 3 is coming later this year. It is the first release that incorporate the hard work of a fantastic communities. Dozens of proposal were submitted since Apple open sourced Swift in 2015 and dozen were accepted after careful consideration by the core teams. In this article, we take a look at some of the important change in Swift 3. What Is Swift 3 About? The core team has a very clear goal in mind with the release of Swift 3, creating a solid foundations for the Swift programming languages. At WWDC 2016, Chris Lattner emphasized that
codingsec.webp 2016-07-08 20:57:27 How to Find and Remove Duplicate Files on Windows (lien direct) We all happen to have duplicate files on our computer and they waste a lot of precious space on our hard drive. If you are someone who uses an SSD the pain is more for you. Here is how you can remove duplicate files and free up some disk space. We recommend some programs here. Each one we suggest below comes with a clean installer which won't try to install any crapware on your system. We hate that just as much as you. How to Find and Remove Duplicate Files on Windows  dupeGuru Music Edition, dupeGuru, and dupeGuru Pictures Edition dupeGuru is an awesome application for this ★★
codingsec.webp 2016-07-08 16:00:21 How to work with regular expressions (lien direct) A regular expression (sometimes called a rational expression) is a sequence of characters that define a search pattern, mainly for use in pattern matching with strings, or string matching, i.e. “find and replace”-like operations.(Wikipedia). Regular expressions are a generalized way to match patterns with sequences of characters. It is used in every programming language like C++, Java and Python. What is a regular expression and what makes it so important? Regex are used in Google analytics in URL matching in supporting search and replace in most popular editors like Sublime, Notepad++, Brackets, Google Docs and Microsoft word. <strong>Example : </strong>
codingsec.webp 2016-07-07 20:09:43 Getting Started With Ubuntu? Here are Things You Should do (lien direct) If you are a new to Linux and choose Ubuntu, there are a lot of things that looks confusing in the beginning. Ubuntu looks and feels a bit different for users coming from Windows or OS X. So, here are some things you should be doing to make Ubuntu feel like home. 1. Download Updates Since you have just  installed Ubuntu, the very first thing you should be doing is to download the latest updates. Launch the Ubuntu Software in the Dock. Look at the Updates tab to see if any updates are available. Or just search for Software Updater from Dash. This app will check
codingsec.webp 2016-07-07 16:00:07 5 Best File upload plugins in jQuery (lien direct) Implementing file upload with Ajax can be very challenging, especially if you want features like drag and drop support, images previews or progress bar. The following 10 jQuery file upload plugin come with many option, and great user interface that will quickly allow you to implement a beautiful file uploader. 1. FineUploader FineUploader is a flexible, actively maintained uploader, written in pure JavaScript, but also available as jQuery plugin. Compared to all other plugins below, it has the most interesting — and unique — features implemented: pause/resume uploads, concurrent chunking, <canvas> upload, retry, folder uploads, edit filenames, and many more.
codingsec.webp 2016-07-06 21:26:23 How to make Your Windows 10 PC Boot Faster (lien direct) Windows PCs tend to decrease their boot speed over time as you start installing more desktop applications. Many of the programs we install in our computer adds themselves to the startup process and start automatically each time your your computer is booting. The new Startup manager helps in trimming the list of the startup apps down to your choice. Here is a beginners guide that shows how you can reduce your boot time in windows 10. Access Windows 10's Startup Manager You will find this feature in Task Manager. To open Task manager, right-click the taskbar and then select Task Manager. You can also press Ctrl
codingsec.webp 2016-07-06 18:00:49 How to setup home VPN using raspberry PI (lien direct) One part of working with the Internet of Things is the difficulty of connecting to devices in your home when you aren't in your home network. I face this difficulty every week when travelling around — I need to run tests and build Internet of Things demos, yet I'm not home to do so! I decided to turn my Raspberry Pi into a VPN so I could connect to my home network remotely. Here's how you can do the same thing using an OpenVPN installer called PiVPN. You can run through the following tutorial using either the terminal on your
codingsec.webp 2016-07-06 18:00:34 Most frequently asked questions on IOS (lien direct) 1. Enlist the Latest IOS Development Patform? The recent iOS Development platforms are as follows: IOS 10 beta iOS 9.2 beta 2 Build version: 13C5060d IOS 9.1 Build Version: 13B143 2. Explain Fast Enumeration. Fast enumeration is a iOS Programming Language feature that enables you to enumerate over the contents of a collection. It will also make your code execute your code faster due to internal implementation which gets reduced message sending overheads and increased pipelining potential. 3. Explain ARC. ARC represents Automatic Reference Counting. It is a Compiler level feature that simplifies the process of managing the lifetimes of
codingsec.webp 2016-07-06 18:00:20 What is peterson’s algorithm?? How does it provide mutual exclusion?? (lien direct) Problem: Given 2 process i and j, you need to write a program that can guarantee mutual exclusion between the two without any additional hardware support. Solution: There can be multiple ways to solve this problem, but most of them require additional hardware support. The simplest and the most popular way to do this is by using Peterson Algorithm for mutual Exclusion. It was developed by Peterson in 1981 though the initial work in this direction by done by Theodorus Jozef Dekker who came up with Dekker's algorithm in 1960, which was later refined by Peterson and came to be
codingsec.webp 2016-07-05 23:02:14 This Malware Uses Tor to Open Backdoor on Mac OS X Systems (lien direct) Bitdefender  Security researchers have identified a new malware family that can open a backdoor using  Tor network on Mac OS X systems. The new malware  has a technical name called Backdoor.MAC.Eleanor, and for now, its creators are distributing it to victims as EasyDoc Converter, which is a Mac app that allows users to easily convert files by just dragging them onto a small window. Practically, Bitdefender says that the app only downloads and runs a malicious script which installs and registers at startup, three new components: a PHP Web service, the Tor hidden service, and a Pastebin client. Backdoor.MAC.Eleanor creates a .onion address for
Last update at: 2024-05-06 16:08:05
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter