EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-01-01, 382👍, 1💬
Downloading and Editing WSDL Document
This section provides a tutorial example on how to download the WSDL document from the Web service provider. You can change port.address[@location] to a localhost URL to local testing. 2017-12-18, 23613👍, 11💬
Reciprocity of Time Dilation
This section introduces the reciprocity of time dilation. Elapsed time of a moving clock is slower when measured by a stationary observer; and elapsed time of a stationary clock is slower when measured by a moving observer. 2017-12-09, 532👍, 2💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2017-12-09, 4774👍, 6💬
XML Editor and Schema Processor - XMLPad
This chapter provides notes and tutorial examples on the free XML editor and XML Schema processor, XMLPad. Topics include installing WMHelp XMLPad Pro, assigning XML Schema to XML documents, validating XML documents, generating XML schema diagram. 2017-12-04, 729👍, 1💬
This section describes what is Chinese astrology. 2017-12-04, 610👍, 2💬
Newton's Third Law of Motion
This section introduces Newton's Third Law of Motion - If a force is exerted by one object to another object, another force is simultaneously exerted by the second object to the first object with equal strength and opposite direction. 2017-11-28, 684👍, 1💬
SslReverseEchoer.java - SSL Server Socket Example
This section provides a tutorial example on how to write a sample program to create a SSL server socket to listen for incoming SSL socket connection requests from client machines. 2017-11-27, 1295👍, 1💬
Introduction of HTTPS (Hypertext Transfer Protocol Secure)
This chapter provides a quick introduction of HTTPS (Hypertext Transfer Protocol Secure). Topics include what is HTTPS; Web server authentication; communication data encryption. 2017-11-15, 2386👍, 3💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2017-11-10, 931👍, 2💬
"base64Binary" Datatype Values and Representations
This section describes the built-in primitive datatype, 'base64Binary' that represents binary data represented in Base64 encoding. Whitespaces are allowed and removed. 2017-11-08, 6331👍, 3💬
Building Your Own Web Browser
This section provides a tutorial example on how to use the saveWebArchive() method to save Web page content in WebView to Web archive files in the application's files folder. 2017-11-05, 976👍, 2💬
Running Perl Scripts on Linux Systems
This section provides a tutorial example on how to run Perl scripts on Linux systems. To make a Perl script file executable, you need to add '#!/usr/bin/perl' to the beginning of the script. 2017-10-24, 14332👍, 15💬
This section describes how to connect to a DSN (Data Source Name) with JDBC-ODBC Bridge.
This free book contains Herong's notes and tutorial examples on Chinese GB2312 character set. It pro...
This section provides a tutorial example on how to download and install Apache Tomcat 7 on a Windows...
This section provides a tutorial example on how to write a HTTPS server test program, HttpsHello.jav...
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: g...