Cryptography Tutorials - Herong's Tutorial Examples
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include AES, blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, p... 2017-06-14, 13752👍, 3💬
Downloading and Installing JDK 1.7.0 on Windows
This section provides a tutorial example on how to download and install JDK 1.7.0 (Java SE 7) on a Windows XP system. A simple Java program was entered, compiled, and executed with the new JDK installation. 2017-01-02, 4034👍, 3💬
PC Register and Native Method Stack
This section describes PC Registers and Native Method Stacks, which are reserved one per thread. Normal Java applications do not have any significant impact on PC Registers and Native Method Stacks. 2016-05-13, 733👍, 2💬
Sun's JVM - Java HotSpot VM
This chapter provides tutorial notes and example codes on Sun Java HotSpot VM. Topics include running Java HotSpot VM in client and server modes; checking memory usage with the Runtime class. 2016-01-26, 393👍, 1💬
Table of Contents - Index
This free book is a collection of notes and sample codes written by the author while he was learning JVM himself. Topics include JVM (Java Virtual Machine), HotSpot, JRockit, GC (Garbage Collection), Memory, Stack overflow, CDS (Class Data Sharing), Runtime, Reflection. 2015-07-18, 237👍, 0💬
Garbage Collection Tests
This chapter provides tutorial notes and example codes on garbage collection. Topics include garbage collection test program - GCTest2.java; comparisons between HotSpot 1.7.0, HotSpot 1.6.0 and JRockit R28.2.7. 2015-08-16, 195👍, 1💬
Accessing System Environment Variables
This section provides a tutorial example on how to access environment variables defined in the operating system using the System.getenv() method. 2017-01-14, 186👍, 2💬
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encrypt...
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending mess...
This section describes 'adb push' and 'adb pull' commands, which allows you to copy files to and fro...
Want to know when is the 2016 Chinese New Year day? Looking for Chinese calendars for 2016? Chinese ...
This cryptography tutorial book is a collection of notes and sample codes written by the author whil...