Popular Books:
"pip/pip3" Python Package Manager
This section provides a tutorial example on how to use 'pip/pip3' command to install and manage Python packages. 2022-10-01, ∼366🔥, 0💬
Outdated: "HijackThis" - Spyware and Browser Hijacker Detector
This section provides a tutorial example on how to run 'HijackThis' to generate a system diagnose report. 2018-07-01, ∼366🔥, 2💬
Tables with Primary Key Column "GENERATED ... AS IDENTITY"
This section describes how to create a table primary key column defined as 'GENERATED ... AS IDENTITY'. 2022-10-04, ∼365🔥, 0💬
What Is an Enum Type
This section describes 'enum' types, which are defined by 'enum' declaration statements. An 'enum' type is actually a special kind of class type. 2022-10-01, ∼365🔥, 0💬
Enum Constant Implicit Methods
This section describes 2 static methods implicitly added by the Java compiler to all enum types declared by the 'enum' statement. 2022-10-01, ∼365🔥, 0💬
What Is MySQL Workbench
Quick introduction of MySQL Workbench and ways to start it and access the local MySQL server. 2022-10-01, ∼365🔥, 0💬
Installing Crypt::Blowfish 2.14 with ActivePerl
A tutorial is provided to show how to install Crypt-Blowfish 2.14 module originally developed by A.M. Kuchling with ActivePerl 5.18 on Windows. 2022-10-01, ∼365🔥, 0💬
"-XX:+PrintGCTaskTimeStamps" - Print GC Threads
This section describes how to use the '-XX:+PrintGCTaskTimeStamps' JVM option to show multiple GC threads used by the Parallel Collector. 2022-10-01, ∼365🔥, 0💬
"netstat" - Display Network Statistics
This section provides a tutorial example on how to use 'netstat' command to display network statistics 2022-10-01, ∼365🔥, 0💬
Blowfish Test Vectors with 16-Byte Keys
A tutorial Perl example is provided to show how to build a table of test vectors with Crypt::Blowfish with 128-bit (16-byte) secret keys. 2023-10-28, ∼364🔥, 1💬
💬 2023-10-28 Jeremy Gemegah: pardon me, I am a bit confused, what is the size of the sub keys?
OFB (Output FeedBack) as a Stream Cipher
This section describes how DES OFB (Output FeedBack) operation mode can be modified as a 1-bit stream cipher or a 1-byte stream cipher. 2022-10-04, ∼364🔥, 0💬
"If" Statements
This section describes 4 forms of 'If' statements supported in VBScript. The more complex form is 'If ... ElseIf ... Else ... End If'. 2022-10-01, ∼364🔥, 0💬
Popular Posts:
This book is a collection of notes and sample codes written by the author while he was learning SOAP...
This section provides a tutorial example on how to use the saveWebArchive() method to save Web page ...
中国生物新冠疫苗的结构和工作机制是什么? 中国生物新冠疫苗是由国药集团的中国生物技术股份有 限公司(Sinopharm)研发的COVI...
This section describes the -Xss option to specify JVM stack size. Changing stack size can help to es...
A detailed description of the MixColumns() procedure algorithm is provided. The MixColumns() procedu...