EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-01-01, 329👍, 1💬
Startup Programs Removal for Better System Performance
This chapter provides a quick introduction of system startup programs. Topics include system performance affected by startup programs, listing startup program with HijackThis, locations of startup program settings, removing startup program setting from Windows registry and startup folders. 2015-10-19, 166👍, 1💬
Cipher - Secret Key Encryption and Decryption
This chapter provides tutorial notes and example codes on the cipher process. Topics include the cipher process - data encryption and decryption; the cipher class, javax.crypto.Cipher; the cipher sample program and test results with Blowfish and DES encryption algorithms. 2015-10-13, 177👍, 1💬
Microsoft Management Console (MMC)
This section describes the Microsoft Management Console (MMC), which can be used to create a console to manage certificate stores on Windows XP systems. 2015-10-11, 594👍, 1💬
opendir.pl - Sample Program to Read Directories
This section provides a tutorial example on how to open the current directory using opendir() function and read its file names using readdir() function. 2015-10-10, 352👍, 2💬
"Unexpected subelement ..." Error from the Stub Class
This section provides a tutorial example on how to troubleshoot and resolve the 'Unexpected subelement ...' error occurred in the stub class. The root cause of the error is the namespace on sub elements of the response SOAP Body does not match what defined in the WSDL document. 2015-10-10, 2595👍, 5💬
Microsoft JDBC Driver - Query Statements and Result Sets
This chapter provides tutorial notes on running query statements and working with result sets with Microsoft JDBC Driver. Topics include creating statement objects; executing SQL query statements; retrieving ResultSet objects; looping through result set; obtaining field values from the result sets. 2015-10-09, 720👍, 2💬
SWF Files for Video and Audio Streams
This chapter provides tutorial notes and example codes on SWF files for video and audio streams. Topics include SWF file structure for video and/or audio streams; installing FFmpeg to manipulate video/audio streams; 'ffprobe' to view video/audio stream properties; 'ffplay' to play stream SWF files; ... 2015-10-09, 464👍, 2💬
Message Digest Algorithm Implementations in JDK
This chapter provides tutorial notes and example codes on message digest algorithm implementation. Topics include JCA (Java Cryptography Architecture) package; java.security.MessageDigest class; MD5 and SHA message digest program; message digest output comparison. 2015-10-06, 156👍, 2💬
Compiling C# Source Code Files
This chapter provides tutorial examples and notes on C# compiler options. Topics include compiling C# source code with multiple classes in a single source code file and multiple source code files; generating .NET library files. 2015-10-03, 373👍, 1💬
GROUP BY Clause of a SELECT Statement
This section provides tutorial examples on how to use the GROUP BY clause to aggregate orginal rows of the base table into group rows in a SELECT statement. 2015-09-27, 834👍, 1💬
What Is LWP::UserAgent?
This section describes what is LWP::UserAgent - a Perl class that helps you to prepare a HTTP request, send it to a Web server, then receive the HTTP response from the Web server. 2015-09-25, 169👍, 1💬
Introduction of VBScript - Visual Basic Scripting Edition
This chapter provides a quick introduction on VBScript language. Topics include what is VBScript; what are VBScript host environments; running VBScript codes within Internet Explorer (IE), Internet Information Services (IIS), and Windows Script Host (WSH). 2015-09-20, 147👍, 1💬
This cryptography tutorial book is a collection of notes and sample codes written by the author whil...
This section describes a tutorial example of a complete SOAP application with both server and client...
This section describes the DSA (Digital Signature Algorithm) algorithm, which consists of 2 parts: g...
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending mess...
Want to know when is the 2018 Chinese New Year day? Looking for Chinese calendars for 2018? Chinese ...