What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
codingsec.webp 2016-07-05 17:00:39 How to implement stack using single queue (lien direct) We are given queue data structure, the task is to implement stack using only given queue data structure. In this article, a new solution is discussed that uses only one queue. This solution assumes that we can find size of queue at any point. The idea is to keep newly inserted element always at front, keeping order of previous elements same. Below are complete steps. // x is the element to be pushed and s is stack <strong>push(s, x) </strong> 1) Let size of q be s. 1) Enqueue x to q 2) One by one Dequeue s items from
codingsec.webp 2016-07-05 17:00:33 An introduction to android frimware (lien direct) Android phones and tablets are generally a lot more open than their counterpart running operating system such as iOS, Tizen, or Windows 10 Mobile. If you don’t like the firmware the device manufacturers has installed on your Android devices, you are free to replace it with your own custom firmware.CyanogenMod, Paranoid Androids, and the Pure Nexus Projects are example of custom firmwares that enjoy a lot of popularity among Android user. Custom firmwares is also the only way you can install newer version of Android on devices that are no longer supported by their manufacturer. Unless you own a device
codingsec.webp 2016-07-04 18:50:03 New Ransomware ‘Satana’ Prevents Your PC from Starting By Encrypting Your Boot Record (lien direct) Malicious attackers are  now working on a new ransomware that messes with your master boot record (MBR), like the Petya did last March. Called Satana (“Satan” in few Romance languages), this ransomware is a mixture of both Petya and classic ransomware. Satana encrypts your files using the same old methods other ransomware families use. For every encrypted file, Satana prepends the attacker’s  email address to each file like: “email@domain.com__filename.extension”. This ransomware encrypts the MBR and then replaces with its own. When a user reboots his computer for the first time, Satana’s MBR boot code loads and the computer won’t start and shows Satana’s ransom note. According to
codingsec.webp 2016-07-04 16:00:28 How blog owners can use Plagiarism Checker to detect duplicate content (lien direct) In this article I am going to discuss about an important tool called the plagiarism checker. This tool is developed by the SmallSeoTools what the tool does is amazing it scrapes the entire web to check whether the article is unique or it was copied from another website. The article that you type will be scanned end to end and checks weather it exits on the web and gives you the percentage on how much of the article is unique Duplicated content and results in a lower page ranks. If you publish an article or web page contents that is
codingsec.webp 2016-07-03 20:23:31 Google Found 2 Zero-Days and 16 Bugs in Windows (lien direct) The Project Zero researchers revealed that, this week they helped Microsoft patch 16 security issues regarding how font processing operations are handled in Windows kernel, among those 16, 2 are zero-day vulnerabilities. Project Zero is an initiative sponsored by Google to help and improve the security of crucial software. In the past, it successfully helped in fixing many bugs and critical vulnerabilities in many open and closed-source projects like important open source code libraries and high-end antivirus products. Few days ago, in a blog post they published that published, the project’s researchers explained the methodology using which they managed to discover 16 issues in the Windows way of handles fonts.
codingsec.webp 2016-07-03 18:00:19 How different programming languages lead to different lives (lien direct) Programming is an essential skill to learn even if you don't want to make career in it. Programming teaches you how to think. It is very difficult task for a beginner to choose which programming language he/she should learn. Each programming language has its own particular use, as well as some pros and cons. If you are thinking to start learning programming and getting confused that which language to start with then this article will surely help you to choose the perfect one.You will also know how much average salary an employer get, the total job counts and the top ★★
codingsec.webp 2016-07-01 16:00:46 Here are some new features introduced in Xcode 8 (lien direct) 1. Swift 2 and 3 Up until Xcode 8, every version of Xcode was tied to a specific version of the Swift programming language. That is no longer true as of Xcode 8. Swift 3 introduces a slew of changes and a considerable number of these changes are breaking. Projects created with Xcode 8 use Swift 3 by default. Fortunately, Xcode 8 includes a build setting that gives developers the ability to stick with Swift 2, Swift 2.3 to be precise. This means that you can choose when you want to migrate a project to Swift 3. To configure a
codingsec.webp 2016-06-30 16:00:02 How to read large files using python (lien direct) Obtaining the File In order to carry out our experiment, we need an extremely large text file. In this tutorial, we will be obtaining this file from the UCSC Genome Bioinformatics downloads website. The file we will be using in particular is the hg38.fa.gz file, which as described here, is: “Soft-masked” assembly sequence in one file. Repeats from RepeatMasker and Tandem Repeats Finder (with period of 12 or less) are shown in lower case; non-repeating sequence is shown in upper case. I don’t want you to worry if you didn’t understand the above statement, as it is related to Genetics terminology. What
codingsec.webp 2016-06-30 13:32:59 Here is Why You Should be Very careful While Using Public Wi-Fi (lien direct) We are all told constantly that we should be very careful about connecting to free public Wi-Fi. Though it is an easy warning to forget about when we are away from the home or when we need to get online urgently. In an experiment conducted by the Avast highlights why you should think twice before connecting to a public Wi-Fi from unknown sources. The company set up a fake honeypot hotspot demonstrating just how easy it is seduce people into giving up their personal data without their notice, when they are connected to a network which looks legitimate. To create this trap, Avast set
codingsec.webp 2016-06-29 18:28:34 Why Should We Remove USB Device Safely ? (lien direct) One day i was working in my friends PC, and when i was about to remove the USB device he shouted Wait ! let me remove USB device safely , He said. I was wondering since then, should we remove USB device safely ? what happens if we don’t ?. i am sure you have come across these questions at some point in your life. Windows get pretty annoyed if you don’t remove USB device safely, and prompts you with a message saying” USB device removed unexpectedly”. Seeing that, many normal users freak out and think. ” I should safely
codingsec.webp 2016-06-29 16:00:43 Dokku an alternative to AWS and Heroku (lien direct)   Differences between Dokku and Heroku Dokku requires at least some comfort levels with running your own server; you may have to modify nginx configuration, manually configure some plugin, or turn to the system tools for debugging. Dokku utilizes Dockers, which is a fine platforms but can add an extra layer of complexity to a server installation. Dokku requires root access to a VPS to installing plugins, run commands, etc. In short, you're going to need to do a bit more commands line setup on Dokku than Heroku’s — nothing you can't pick up along the way, but you might
codingsec.webp 2016-06-28 20:36:42 Linux Mint 18 Cinnamon and MATE Editions Are Now Available Download Here (lien direct) Softpedia stated that the final versions of the Linux Mint 18 Operating system with both Cinnamon and MAT editions is ready for download for users. Their final ISO images are out now. At a very first glance, it seems that Linux Mint project leader Clement Lefebvre, has approved the ISO images earlier  June 28, 2016, for landing. Therefore, when softpedia checked the Irish mirror, they are already available for download in their final form. There was no official announcement as of now on the Linux Mint Website ( at the time of writing this article) Looks like Clement Lefebvre is waiting Guideline
codingsec.webp 2016-06-28 20:09:23 Brexit Do-Over Petition is Subject to an Automated Bot Attack (lien direct) The House of Commons Petitions Committee from UK parliament said they removed more than 77,000 fake signatures from the petition asking the government to consider having a second Brexit referendum invalidating the first one. The petition asked the officials to implement a rule that, if the Leave or Remain vote count is less than 60 percent, then there should be another Brexit referendum. The petition originally has almost 4 million signatures as of now, and according to a CNN report, it was set up by a man who choose to vote “Leave” in the first referendum. The man actually created
codingsec.webp 2016-06-28 19:16:30 Easily Stop Videos From Autoplaying in Your Browser (lien direct) The internet has gotten a lot better in the past few years.  More people are accessing internet and more quality content is being aired everyday. But there is absolutely no doubt that it has also gotten more annoying. Many websites use creepy ads which get quite annoying at times. These ads get even worse when a website  you visit loads a bunch of video ads that you absolutely have no interest in. This can be annoying for couple of reasons. First, it’s distracting. We visit a website to read the stuff in there not to watch their video content. It
codingsec.webp 2016-06-28 18:03:15 Try Whonix 13 The Anonymous Operating System (lien direct) Whonix is a desktop operating system designed for advanced privacy and security. While maintaining the usability, it realistically addresses attacks. It makes online anonymity possible using fail-safe, desktop-wide use of Tor network. Here, a heavily reconfigured Debian base is run inside many virtual machines. This provides a substantial layer of protection from IP leaks and malware. Pre-installed applications are pre-configured with safe default settings and ready for use. Additionally, installing any custom application or personalizing the desktop to your liking will in no way jeopardize you with hard steps. Whonix is the only actively developed OS designed that can be
codingsec.webp 2016-06-28 18:00:09 Most frequently asked interview questions on linux (lien direct) Here are some of the linux interview questions and answers that would help you to crack some of the most important and difficult interviews as a beginner. 1. What is the basic difference between Linux and Unix? Linux is an open source operating system while Unix is a proprietary operating system. Linux is therefore, available for free to download but Unix is a paid OS (most of the versions 2. How can you find the active connections through terminal? Using the netstat command, it is possible to find the active internet connections with the current machine. It is a command
codingsec.webp 2016-06-28 17:00:00 What is gnome sort? How it works?? (lien direct) Gnome Sort also called Stupid sort is based on the concept of a Garden Gnome sorting his flower pots. A garden gnome sorts the flower pots by the following method- He looks at the flower pot next to him and the previous one; if they are in the right order he steps one pot forward, otherwise he swaps them and steps one pot backwards. If there is no previous pot (he is at the starting of the pot line), he steps forwards; if there is no pot next to him (he is at the end of the pot line), he
codingsec.webp 2016-06-28 16:00:53 How to use JSX and React to create apps (lien direct) In this article we are going to learn about the JSX and React framworks. JSX is similar to a mix of XML and HTML. You use JSX within React code to easily create components for your apps. JSX transforms into JavaScript when React compiles the code. The beauty of React is that you can create reusable code and easily structure your app from a component-based mindset. Finally, the gap between mocking up wireframes of semantically formed ideas and implementing them has never been closer. Your First Taste of JSX Here is an example of JSX being used to render HTML:
codingsec.webp 2016-06-28 04:43:32 What is DNS Cache Poisoning and How Does It Work ? (lien direct) What Is Cache Poisoning? Cache poisoning is a kind of attack in which corrupted data is inserted into the cache database of DNS(Domain Name System) name server. The Domain Name System ( DNS ) is a system which associates domain names with respective IP addresses. Devices which are connected to the internet or a private network rely on the DNS for resolving URLs into their corresponding IP addresses. During a DNS cache poisoning attack, malicious party sends duplicate responses from an imposter DNS  to reroute a domain name to a new IP address. The new IP address is most likely controlled
codingsec.webp 2016-06-27 22:45:49 Sundar Pichai’s Quora Account Hacked and Then His Twitter Account (lien direct) A three-man team of Saudi hackers known as OurMine, made another high-profile victim. The group managed to access the Quora account of Sundar Pichai, the CEO of Google, and then cross-posted on his Twitter account. This incident took place on Sunday night, and hackers managed to cross-post three messages from Pichai’s official Quora account to his Twitter profile before being detected and reported then lost the access to his account. These hackers did not post a social message, but only posted short texts saying they managed to hack the account. Group hacked other famous tech CEOs Just weeks before this
codingsec.webp 2016-06-27 20:03:43 What is Network Attached storage (NAS) and What are It’s Uses ? (lien direct) Network Attached storage (NAS) is a special type of device for dedicated file storage. It provides local area network (LAN) nodes with file-based shared storage, through a standard Ethernet connection. NAS devices usually do not have a keyboard or display. They are configured and managed with a browser-based utility program. Every NAS has its own IP address and resides on the LAN as an independent network node. One of the important uses of having a NAS is that you can provide multiple clients in the network with access to the same files. Before NAS, enterprises used to have thousands of
codingsec.webp 2016-06-24 18:34:04 Explained: Simple Network Management Protocol (SNMP) (lien direct) Today we will see a brief introduction on what SNMP is. Simple Network Management Protocol or  SNMP is basically used as the transport protocol for network management. A general Network management consists of some network management stations communicating with network elements such as routers, hosts, printers or servers. The agent is the software on that network element (router, host, printer) which runs the network management software. That is why when the word agent is used, it is used to refer to the network element. Usually the agent stores information in a Management Information Base or MIB. Management software will compare various network devices and
codingsec.webp 2016-06-24 16:00:26 Top 10 Security Coding Pratices (lien direct) Validate input. Validate input from all un-trusted data sources. property of input validation can eliminate the vast majority of softwares vulnerabilitie. Be suspicious of most external data’s sources, including command-line arguments, networking interfaces, environmental variable, and user controlled file. Heed compiler warnings. Compile code using the many highest warning level available for your compiler and to eliminate warnings by modifying the codes . Use static and dynamic analysis of tools to detecting and eliminate additional securityflaws. Architect and design for security policies. Create a software architecture and design your software to implement and enforce security policies. For example, if your system requires
codingsec.webp 2016-06-23 17:00:51 Best Javascript frameworks for presentation (lien direct) Creating Presentation for modern browser JavaScript and Html5 frameworks play a big role.Presentation is basically a way of representing the organizational visual details to create an overall impression.Doing a presentation for website manually is a hard task but the presentation frameworks makes it easy. There are many Html5 and JavaScript presentation Frameworks  which helps to create presentations for the modern browsers.So let's take a look of the best 10 presentation frameworks of JavaScript and Html5. 10 BEST JAVASCRIPT AND HTML5 PRESENTATION FRAMEWORKS REVEAL A framework for easily creating beautiful presentations using HTML.reveal.js comes with a broad range of features including nested slides,
codingsec.webp 2016-06-23 14:31:28 7 Apps That Perfectly Replaces Adobe Creative Suite on Linux (lien direct) Many of the Linux users have been asking Adobe to release their Creative Suite on Linux but their answer is a straight NO. The reason for Adobe’s harsh decision is because the user base is less in number. With the huge growth in the Linux users in the recent years, the requirement for the professional applications has been growing. In this article we will see 7 Apps that perfectly replaces the Adobe Creative Suite for Linux users. 7 Apps That Replaces Adobe Creative Suite on Linux For Photoshop: Use GIMP Best Photoshop application  was one of the most common searches from
codingsec.webp 2016-06-23 10:06:41 Anonymous Creates a New Political Party in the US called THumP (lien direct) The members of the biggest hacktivist group on the internet, Anonymous  created a new political party in the US and named it as The Humanity Party, or THumP. Anonymous announced their intentions through a press release which they put out Monday, here they explained that their new political party will be a way of bringing change from the within, with the help of lawful and peaceful tactics. Both in the press release, and in a video which they posted on YouTube, Anonymous denounced many of it’s famous trademarks, like the usage of a computerized voice in threatening videos where they warn cyber criminals. All new
codingsec.webp 2016-06-22 22:08:03 EXPLAINED: What is Domain Name System ( DNS )? (lien direct) DNS is a common term we hear everyday and it kind of reminds me of acronym DNA. While the words in DNS are not as complex as in acronym DNA, both topics can get equally complex when we go deep into their working mechanism. Here is an easy explanation on how it works. EXPLAINED: What is Domain Name System ( DNS )? DNS stands for Domain Name System, which is a system of computers that provides the infrastructure and allows browsing of the World Wide Web. In its simple form, it’s definition can be given as, a collection of root servers that have the IP addresses
codingsec.webp 2016-06-22 19:59:31 What is Address Resolution Protocol (ARP) and How it Works ? (lien direct) Address Resolution Protocol (ARP) is a protocol used for mapping an IP address to a physical machine address that is present in the local network, especially for IP Version 4 which has a 32 bits long address. However, in an Ethernet local area network, physical machine addresses ( Also known as Media Access Control or MAC address) for attached devices are of 48 bits length. To solve this issue, A table called the ARP cache is used to maintain a correlation between each IP address and it’s corresponding MAC address. Address Resolution Protocol provides the necessary protocol rules for making this correlation and provides
codingsec.webp 2016-06-22 16:00:15 How to enable CSS beta Features with PostCSS (lien direct) This one will concentrate on implementing new properties and values from upcoming specifications. The plugins covered in this article implement different functionality and can be effectively used both together and separately, depending on your needs. We'll start with my personal favorite. Taking Resets to a New Level CSS3 introduced two nice features: the initial value and the all property. The initial value used with values of inherit and unset allow you to reset a property to its original value. The all property serves as a shorthand property to reset every property to one of these three states. While each is
codingsec.webp 2016-06-21 18:34:02 Google Engineer Donates Bug Bounty Reward to Amnesty International (lien direct) One of Google’s most respected security researchers, Tavis Ormandy has donated a bug bounty reward of $15,000 to the Amnesty International organization which he won for finding a security flaw in Bromium’s micro-virtualization technology. The Bromium is a relatively new security vendor that became popular by its virtual hardware approach, and more importantly, because of its endpoint solution known as Bromium Enterprise Controller. As we said earlier, Bromium’s software uses micro-virtualization (micro-VM) which protects it  against malicious code triggered by the user actions, such as clicking on bad links, opening spam email attachments, and interacting with dangerous files. The Bromium Challenge The company was so sure of
codingsec.webp 2016-06-21 16:00:23 Best Hidden Linux Tips and Tricks (lien direct) In this article we are going to learn tips and tricks used in linux commandline. #1: Check processes not run by you Difficulty: Expert Application: bash Imagine the scene – you get yourself ready for a quick round of Crack Attack against a colleague at the office, only to find the game drags to a halt just as you’re about to beat your uppity subordinate – what could be happening to make your machine so slow? It must be some of those other users, stealing your precious CPU time with their scientific experiments, webservers or other weird, geeky things! OK,
codingsec.webp 2016-06-20 19:07:51 Elon Musk says we’re going to need brain implants to compete with AI (lien direct) Elon Musk warns that humans are at risk of becoming the “house pets” of AI, unless we implant some kind of technology into our brains which could help us compete with machine learning that occurs in the future. On Twitter last week, Elon Musk tweeted that a ‘neural lace’ – which means  a brain increase   natural intelligence by hooking us up to computers – will be the savior of our species. Musk said “I don't love the idea of being a house cat, but what's the solution?” in a live interview Code Conference in California last week. “I think one of the best solutions is to add an AI layer. Just
codingsec.webp 2016-06-20 16:00:43 Best PHP libraries to look for inorder to be a professional (lien direct) PHP Mailer Anybody who has started a consumer facing application for the first time knows how difficult it is to handle mail without investing in a third party mail service. PHP Mailer is a simple email library that makes it easier for you to send, receive and manage emails from any email account. ReCaptcha If you have had to prove to a website that you are not a robot at any time, you were probably looking at an implementation of ReCaptcha. It is the simplest and most sophisticated captcha authentication library at the same time. More importantly, it is developed
codingsec.webp 2016-06-19 22:20:26 Attackers Used Nearly One Million IPs to Brute-Force a Financial Institution (lien direct) In February this  year, Cisco’s security products managed to pickup automated attacks that employed over one million different IPs to brute force the login credentials and hijack user accounts. To be exact, Cisco says the attackers used 1,127,818 different IPs and launched  744,361,093 login attempts using a total of 220,758,340 distinct email addresses ( Well those are some big numbers ). These attackers targeted many services, but the lion’s share  of the login attempts were targeted at two companies, one in media & entertainment and one in the financial sector. The attack against the financial target was accounted for over 90 percent of the total volume
codingsec.webp 2016-06-19 19:38:53 How to Customize the Windows 10 Start menu (lien direct) When I first moved from Windows 8.1 to Windows 10, I really found how much I missed the Start menu. It is a fantastic feeling to have it back on the OS, and I personally like the live tiles addition. But the windows 10 start menu comes with load of default additions that you probably don’t want. Today I will show you how you can customize the start menu in Windows 10.                             Dump Recently added and Most used Let's start the process by clicking the Start and opening the Settings
codingsec.webp 2016-06-19 16:00:54 How to download a file using windows command line (lien direct) If you're like most Internet users, you download various types of files now and then. You either download these files with your web browser or some download manager software. Have you ever considered downloading files using the command prompt i.e. CMD? If not, we recommend you to try it. It's quite interesting apart from being very useful as well. In this article, we'll show you how to download a file using command prompt aka CMD. How to download a file using command prompt? There are several useful commands for the Command Prompt and one of them is bitsadmin. Though bitsadmin
codingsec.webp 2016-06-18 20:32:49 Start Menu Voted Top Windows 10 Feature in latest Poll, Here are the rest (lien direct) We still remember those days after Microsoft rolled out Windows 8 and everyone started criticizing the company because there was no Start menu?.  Microsoft learned the hard way that people actually loves the Start menu.  A recent poll shows that the statement is still valid for Windows 10 too. Just to find out what is the favorite feature of Windows 10, author Bogdan Popa  from Softpedia  conducted a poll. He asked the members of the Microsoft community on Google+ to choose from Cortana, the Start menu, the Action Center, Microsoft Edge, and others. The results pretty much speak for themselves. Just as expected the Start menu was
codingsec.webp 2016-06-18 18:27:41 How To Create Falling Matrix Code Effect In Command Prompt (lien direct) Whenever I see a matrix movie I wonder how do the operator see objects through that ‘ Green random code ‘. While I don’t think I can figure it out any time soon, I know how to create a similar screen with green random numbers falling. Today I will show you how you can do something like that and act like an Operator in front of your friends.  How To Create Falling Matrix Code Effect In Command Prompt Step 1 : First open Notepad. Step 2 : Copy the code below and paste it in your notepad editor. Code @echo off color 02 :start echo
codingsec.webp 2016-06-18 16:00:50 How to find copyrighted free images on the Flickr (lien direct) I think we're all always looking for that touch that makes a design feel fresh and different – a pattern, a photo, or a texture that doesn't feel like stock. One of my favorites sources is Flickr – but probably not the way you use it. Sure, most of us know about Flickr's vast library of creative commons licensed images but there's another rich vein of fascinating imagery worth exploring. Many of the world's great libraries, government agencies, private companies, national & state archives, museums, and historical societies use Flickr as a catalog for their books, documents, illustrations, and photographs.
codingsec.webp 2016-06-17 21:22:19 How to Block Game Requests on Facebook (lien direct) Even though Games in Facebook is a really cool thing, Game and App requests become quite annoying at times. If you are getting lot of game requests from your friends and feel annoyed, this article is for you. Let’s see how you can block game requests on Facebook How To Block Game Requests On Facebook. Blocking the game requests in Facebook can be done in two different ways. Here I will explain both of them. Follow the one that looks easy to you. Method 1:- Go to Settings option in Facebook. In mobile you can click top right corner to find
codingsec.webp 2016-06-17 19:09:22 Intel x86 CPUs Contain a Secret Backdoor That Nobody Can Touch or Disable (lien direct) Damien Zammit, A hardware security expert says that the recent Intel x86 CPUs contain a secret subsystem that runs as a hidden CPU inside your CPU. This CPU can not be disabled and nobody was able to review the closed proprietary code inside it. This system is called the Intel Management Engine (ME) and is literally embedded inside the x86 chipsets, where it runs its own secret firmware. Intel says ME was designed to be used for Active Management Technology (AMT) which allows big enterprises to manage their computers remotely . Damien explains that AMT runs separately from on the OS user installed, allowing access to the computers
codingsec.webp 2016-06-17 16:13:15 Bitonic Sort – A new way of sorting array (lien direct) Bitonic Sort is a classic parallel sorting method for sorting. Bitonic sort does O(n Log 2n) comparisons. The number of comparisons done by Bitonic sort are more than popular sorting algorithms like Merge Sort , but Bitonice sort is better for parallel implementation because we always compare elements in predefined sequence and the sequence of comparison doesn't depend on data. Therefore it is suitable for implementation in hardware and parallel processor array. To understand Bitonic Sort, we must first understand what is Bitonic Sequence and how to make a given sequence Bitonic. Bitonic Sequence A sequence is
codingsec.webp 2016-06-16 22:16:49 Screenshots of iOS 10 Shows That We Will Soon Have A Dark Theme on iPhones (lien direct) Earlier this week, Apple launched the first preview of iOS 10 for developers and as many top websites suggested, there is evidence that the update is going to bring a much-anticipated dark theme on iPhones. And the new screenshots of iOS 10 that have reached the web today seem to just confirm that Apple is indeed working on a dark theme for iOS 10. This new visual style seems just not yet ready and this is the reason why developers aren't this feature it their first preview. A developer named Andrew Wilk posted some screenshots on twitter which shows us an early version  of iOS 10 with a dark
codingsec.webp 2016-06-16 17:33:19 Top 5 YouTube Channels to Learn Programming (lien direct) Youtube is a great source for learning stuff. Even though Youtube was initially filled with cat videos, slowly people started using the platform in a useful way and creative content started ruling the website. At present, Youtube is one of the best resources for you to learn anything from cooking to coding. So, here are the 5 best  Youtube channels you need to refer to learn programming. Top 5 YouTube Channels to Learn Programming 1. TheNewBoston Thenewboston has more than 4,200 videos with more than a million subscribers. TheNewBoston is arguably the single best resource for anyone who wants to become a Programmer. The
codingsec.webp 2016-06-16 14:53:13 5 Best Free Development Tools Every Developer Should Know (lien direct) For every developer, along with the knowledge of programming language, a sound knowledge of developer tools is needed for more productive outcome. Dealing with bugs and errors is a developers daily routine and to control the number of bugs and errors, some minor tools help a lot. Hence these tools make the life of a developer easy. There are thousands of developer tools across the internet but there are some tools which are very important and every developer needs to know them to maintain a better work flow. 5 Best Development Tools Every Developer Should Know 1. GitHub GitHub needs no introduction. It
codingsec.webp 2016-06-16 11:03:24 5 Awesome ways Developers Can Make Extra Money From Home (lien direct) Developers these days wonder about not getting a job even after mastering several programming languages. Developing a site is not the only possible job you can do being an  expert in a programming language. Many people want to earn money from his/her own home instead of visiting office regularly.  There are several ways a developer can earn extra money from home which  I am going to describe them in this post. 1.Freelancing Clearly, freelancing is the best way to earn money from home for developers. in free lancing, you are not bounded to a particular company for long term basis and also you are not forced
codingsec.webp 2016-06-15 16:00:04 How to build a raspberry pi cluster server (lien direct) Building a Raspberry Pi Server has become a piece of cake while building a raspberry cluster is a different story. First the cluster need to be compact hence we share the power cable to many ports we can use the usb power to minimise the cables which you can use a usb hub to power the entire cluster. We are currently building the cluster with 4 nodes in which individual node acts as the server. In the theme we can put the cluster easily We can use the enclosure four board stackable server which you can pick it up at
codingsec.webp 2016-06-14 16:00:02 How to work with JavaFX UI Application class (lien direct) Most of the today’s GUI based applications are from JavaFX class. It is the new Graphics class which we can call predecessor of the Java JFrame Class. The javafx.application.Application class gives a framework for managing a JavaFX applications. This application must have a class that extends Application, overriding many methods that the JavaFX runtime calls to compile application-specific code. An application can call Application functions/methods to obtain startup arguments, access host services, arrange to launch itself as a stand-alone application, interact with the preloader(a small app that’s starts before the main application to custom the startup experience), and access the Web browser style sheet. Application life One of Application task is
codingsec.webp 2016-06-13 22:22:13 10 Private Search Engines That Do Not Track You (lien direct) Private browsing using the private or incognito modes provided in your browser, does not give you the level of privacy you think it does. If you really don’t want to be tracked and also don’t want anyone tracking your searches, try these search engines. 10 Private Search Engines That Do Not Track You 1.DuckDuckGo DuckDuckGo is a very secure search engine that never tracks your searches while providing you really good search experience. The main purpose of building this search engine is for people who likes to remain private while searching, and delivers instant results without tailored ads on the search pages. DuckDuckGo gets
codingsec.webp 2016-06-13 20:16:32 How to Speed Up Chrome Browser (lien direct) Chrome is the most popular and commonly used browser in the world. Even though Google releases regular updates, Chrome gets slow and laggy sometimes. Here are some tricks you  can do to speed up your Chrome browser. How to Speed Up Chrome Browser 1. Disable Unnecessary Extensions The functionality of Chrome browser is extended with extensions. These are very helpful but sometimes they become useless. Usually, extensions run in the background, to parse or filter web pages you browse but they also load their own data from internet. So, to have a hassle free running, you need to disable the unwanted Extensions. Here is how you
Last update at: 2024-05-07 00:07:48
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter