<< < 1 2 3 4 5 6 7 8 9 > >>   Sort: Date

Site Map
Tutorial Books on Software Programming Android Tutorials - Herong's Tutorial Examples ASP Tutorials - Herong's Tutorial Examples C# Tutorials - Herong's Tutorial Examples Data Encodings - Herong's Tutorial Examples Flash Tutorials - Herong's Tutorial Examples Free Web Services - Herong's Tutorial Ex...
2022-07-03, 17042👍, 0💬

Validating wsse:Password Digest String
This section provides a tutorial example on how the SOAP message receiver should validate the password digest string in the wsse:Password element using the 'Password_Digest = Base64 ( SHA-1 ( nonce + created + password ) )' definition.
2022-01-25, 16492👍, 18💬

💬 2022-01-23 Herong: SardarJi, what is the final version that worked for you?

💬 2022-01-22 SardarJi: Got it. Just had to re-arrange. Thank you.

💬 2022-01-22 SardarJi: I don't think I am missing any step, but I think the way I am generating the passwordDigest for "iLogDogs", it is not giving the...

💬 2022-01-22 SardarJi: As I continue, I realize another logical flaw. Well, the nonce is already in Base64, so it needs to converted properly. Still, h...

💬 2022-01-22 SardarJi: Found a bug in my logic, when copying, I had to give a starting index. So I updated, but it still gives me incorrect password. i...

(More comments ...)

SHA1 Message Digest Algorithm Overview
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending message length, preparing 80 process functions, preparing 80 constants, preparing 5 word buffers, processing input in 512 blocks.
2021-10-25, 16479👍, 8💬

💬 2021-10-25 kareem: karee

💬 2018-12-28 '">alert(2): '">&lt;script>alert(1)&lt;/s cript>

💬 2017-10-26 Herong: Jamal, w(0), ..., w(15) are initial values. w(16), ..., w(79) are used on the left side of the assignment operator to store stor...

💬 2017-10-25 Y. Jamal: Hi, we have w(0), w(1),....w(15) how come in the For loop we have W(t) and t goes from 16 to 79. something is not right.

💬 2017-09-29 Herong: I don't think it takes the length of bits. But I will double check it.

(More comments ...)

Removing IE Addon "Lync Browser Helper"
This section provides a tutorial example on how to disable and remove 'Lync Browser Helper' addon from Internet Explorer.
2018-10-27, 16128👍, 9💬

💬 2018-10-27 Herong: manoj, what is the URL of the web page?

💬 2018-10-27 manoj kumar: internet explore can not didplay the webpage

💬 2017-06-04 Herong: Tech101, can you try to disable the "asktoolbar" add-on within IE 11? Or try to uninstall "asktoolbar" using Control Panel.

💬 2017-06-02 Tech101: Any idea how to remove the asktoolbar from Windows 7 32 and 64 bit .ie11

💬 2017-04-21 Herong: Diana, if you are not using Microsoft Lync anymore, try to uninstall it from "Control Panel > Uninstall a program".

(More comments ...)

"openssl pkcs8" Converting Keys to PKCS#8 Format
This section provides a tutorial example on how to convert a private key file from the traditional format into PKCS#8 format using the 'openssl pkcs8' command. Keys can still be encoded with DER or PEM with or without DES encryption in PKCS#8 format.
2022-03-08, 16087👍, 2💬

💬 2022-03-08 randomn: random123

💬 2016-04-12 Nishant Desai: Does anyone knows any library by which i can execute openssl pkcs8 -topk8 -in openssl_key.pem -inform pem -out openssl_key_pk8_e...

Create Tables with CLOB Columns
This section describes how to create tables with CLOB (LONGTEXT) columns in MySQL server.
2022-07-19, 15771👍, 4💬

💬 2018-01-06 Herong: AAA, what is the this statement for?

💬 2018-01-02 AAA: update MyriadReport mr set Construction_Quality_Sql = CONCAT( "select ConstructionQuality from building bg where bg.CMMContainer...

"base64Binary" Datatype Values and Representations
This section describes the built-in primitive datatype, 'base64Binary' that represents binary data represented in Base64 encoding. Whitespaces are allowed and removed.
2017-11-08, 15737👍, 3💬

💬 2015-10-01 Herong: Harsh, if you are getting an image as a Base64Binary element in an XML file, you need to save it in a file, run Base64 decode on...

💬 2015-09-30 Harsh: I am getting output in base64binary now i want to print that image to the printer how can i do it?

UTF-16, UTF-16BE and UTF-16LE Encodings
This chapter provides notes and tutorial examples on UTF-16, UTF-16BE and UTF-16LE encodings. Topics including encoding and decoding logics of UTF-16, UTF-16BE and UTF-16LE encodings; introduction of surrogate pairs; explanation of the use of BOM (Byte Order Mark).
2022-09-02, 15676👍, 9💬

💬 2021-07-20 abraham: thankyou

💬 2019-08-09 asas: Haga contacto con su administrador del sistema si desea obtener más información

💬 2017-04-06 kl: 21 53 93 68 87 65 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 20 00 31 00 30 00 31 00 32 00 30 00 30 00 30...

Oracle Database 11g Express Edition (XE) Installation
This section describes how to download, install, and start Oracle Database 11g Express Edition (XE).
2022-03-12, 15595👍, 6💬

💬 2022-03-12 Mrunali: thanks

💬 2022-02-20 SAJID ALAM: I WANT TO LEARN

💬 2015-09-11 Herong: Peter, what type of assignment requires you to install Oracle database server?

💬 2015-09-11 Peter M Chauke: Please allow me to write assignment no 2 for second Semester at Unisa becauese the disk I am having does not want to install

💬 2015-09-11 Peter M Chauke: Want to do assigment for Inntroduction to Databases in Oracle XE.Univ.exe

"Err.Raise()" - Raising Your Own Errors
This section provides a tutorial example on how to raise your own runtime errors with the Err.Raise(number, source, description) method. The error number should be in the range of 0 and 65535.
2023-01-28, 15467👍, 4💬

💬 2023-01-28 adheesh: i ment something else

💬 2016-05-07 Herong: Donald, I don't understand your question. More details please.

💬 2016-05-06 Google Chrome 50.0.2661.94 m: Google Chrome Un navigateur Web conçu pour offrir rapidité, simplicité et sécurité Obtenir de l'aide sur l'utilisation de Goog...

💬 2016-05-06 Donald Duck: Please include a list of the different possible values for number. Thanks☺

Windows Command - "certutil -encode/-decode"
This section provides a tutorial example on how to use 'certutil -encode' command on a Windows system to perform Base64 encoding and decoding.
2023-03-12, 15401👍, 6💬

💬 2023-03-12 reuven: BljLekAtpu5P/0tC7W2A/kGfa0pIz5LV52xj KwDtM3Ne04Z39D69GFqZ3qTfTBLAKMbZuJx5 /rST7L7VVpdp/RH6Cjcw5/dhmAuRzhWGOyFq d3p/b8YOj8A8DvwUF8bg...

💬 2022-09-28 Amol: MIIDFDCCAfwCAQAwgZIxCzAJBgNVBAYTAkFV MQwwCgYDVQQIDANWSUMxEjAQBgNVBAcMCU1lbGJvdXJuZTEaMBgGA1UECgwRTW9u ZXkgYnkgQWZ0ZXJwYXkxHDAaBgN...

💬 2022-07-21 Herong: R, thanks for the correction.

💬 2022-07-20 R W: "Base64 with not line breaks" should be"Base64 with no line breaks"

Downloading and Installing Java DB (Derby)
This section describes how to download and install Java DB (Derby database server) 10.11 - free for evaluation.
2019-10-22, 15346👍, 12💬

💬 2019-10-22 mahdi: very good

💬 2019-06-17 Thet: Thanks

💬 2019-01-25 denzel mana-ay: putangina mo wala akong makita

💬 2018-05-10 Anonomyus: tanks

💬 2016-02-19 Ali: Good App

(More comments ...)

Using WSDL2Java to Generate Web Service Stub Classes
This chapter provides tutorial notes and example codes on WSDL2Java. Topics include using the WSDL2Java tool included in Axis2; generating client side stub classes; using stub and data type classes; testing stub classes with XML document and RPC method based Web services.
2022-07-25, 14583👍, 10💬

💬 2018-04-22 test name: thanks

💬 2017-01-20 Stephen: Hi , thanks for this tutorial

💬 2016-02-24 Herong: NfeDownloadNFStub, do you need any help on your WSDL document?

💬 2016-02-23 NfeDownloadNFStub: &lt;?xml version="1.0" encoding="UTF-8"?> &lt;wsdl:definitions xmlns:s="http://www.w3.org/2001/XMLS chema"xmlns:soap12="...

💬 2015-12-18 prem: thanks

CipherDES.java - A Java Implementation of DES
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encryption and decryption algorithm.
2017-02-16, 14344👍, 9💬

💬 2017-02-16 Herong: Andro, I think implementation of DES using String methods will be slower than using byte and int operations.

💬 2017-02-12 Andro: Good done. I have created my own DES with benefits of string methods in Java. My DES receives binary string and key, then cipher...

💬 2016-03-03 Dede: Helps a lot, currently developping a mobile application that has to do with encryption. Thanks

💬 2015-10-16 Herong: Skip, Good luck on your study!

💬 2015-10-15 Skip: I'm taking a graduate course in cryptography and this was extremely helpful for going from DES visual to DES in java. I really a...

(More comments ...)

SslSocketClient.java - SSL Client Socket Example
This section provides a tutorial example on how to write a sample program to create a SSL client socket to connect to a SSL server socket. The connection will fail if the server's certificate is self-signed.
2016-06-10, 14232👍, 3💬

康希诺新冠疫苗
康希诺新冠疫苗的结构和工作机制是什么? 康希诺新冠疫苗是由康希诺生物公司与陈薇院士团队共同研发新型冠 状病毒疫苗,代号为Ad5-nCoV,商品名为克威莎。 康希诺新冠疫苗是一种复制型病毒载体疫苗, 使用基于普通感冒病毒(腺病毒)的弱化版本 的复制缺陷型黑猩猩病毒作为载体,内部包含新冠病毒的突刺蛋白的 RNA链条。康希诺新冠疫苗的工...
2021-07-19, 14136👍, 0💬

DES Key Schedule (Round Keys Generation) Algorithm
This section describes DES (Data Encryption Standard) algorithm - A 16-round Feistel cipher with block size of 64 bits.
2022-06-06, 14072👍, 12💬

💬 2022-06-06 hello: &lt;script> alert("Hello! I am an alert box!"); &lt;/script>

💬 2018-02-24 Herong: hema, values in the pc-2 table are pre-defined by the algorithm. They are not calculated.

💬 2018-02-23 hema: i understood pc-1 table can you pls guide to calculate manually pc-2 table in des algorithm.

💬 2017-10-24 Herong: QuAI, you are right those bits are not used in the Permuted Choice 1 (PC1) table.

💬 2017-10-19 QuAl: And forget about bits 8, 16, ..., 64 of initial кey K! Those bits for parity check only (see FIPS 46-3)

(More comments ...)

"adb push" and "adb pull" Commands
This section describes 'adb push' and 'adb pull' commands, which allows you to copy files to and from the remote Android emulator or device.
2015-12-17, 14000👍, 2💬

💬 2015-12-17 Herong: RevHectorForbes, yes the "adb push" should go first, followed by push-from location and push-to location. I think my examples ar...

💬 2015-12-16 RevHectorForbes: Hey man, this is some way cool technical s**t, but another site (http://www.androidauthority.com/and roid-customization-transfer-...

-Xss JVM Option for Stack Size
This section describes the -Xss option to specify JVM stack size. Changing stack size can help to estimate frame size. The frame size is 32 bytes for a simple method call.
2019-08-24, 13980👍, 1💬

💬 2019-08-24 sksksk: &lt;a href="/1'">&lt;svg/onload=alert( 1)>">click&lt;/a>

HttpsHello.java - HTTPS Server Test Program
This section provides a tutorial example on how to write a HTTPS server test program, HttpsHello.java. It writes back a simple Web page using the HTTPS protocol.
2020-01-28, 13907👍, 25💬

💬 2020-01-28 Herong: Bing, see Generating Private Keys tutorial on how to creat JKS files.

💬 2020-01-24 BingLi224: how to create .jks certificate file correctly?

💬 2017-09-20 Herong: Sandeep, you need to create a server certificate in a .jks file first.

💬 2017-09-08 sandeep kumar shukla: I am getting following error while I run the servier program. java.io.FileNotFoundException: herong.jks (The system cannot find ...

💬 2016-09-21 Test: Hello. How are you?

(More comments ...)

SQL Server CLOB (Character Large Object) - TEXT
This chapter provides tutorial notes on CLOB (Character Large Object) data types, TEXT, with SQL Server JDBC Driver. Topics include creating tables to store CLOB values in SQL Server server; inserting CLOB values with direct SQL INSERT statements, or PreparedStatement with setString(), setCharacterS...
2016-04-07, 13864👍, 1💬

💬 2016-04-07 kuchbhi: OK. Thank you................................. .................................... .................................... .............

Base32 Encoding Algorithm
This section describes the Base32 encoding algorithm with some simple encoding examples.
2022-11-11, 13734👍, 10💬

💬 2022-11-11 Herong: Tomi, you can have lowercase, uppercase, or any kind of characters in the input. They all are encoded as binary input data. By d...

💬 2022-11-09 Tomi: One question, can we have lowercase and uppercase letters in both the input and output?

💬 2021-03-20 Yours: Encryption is the method by which information is converted into secret code that hides the information's true meaning. The scien...

💬 2021-02-12 Herong: madblack, can you follow Example 5 given in the above tutorial? Just add "F" to the end of the input, then follow Padding, Bit G...

💬 2021-02-04 madblack: what is the output of 'ABCDEF' and how to solve it

(More comments ...)

JDBC-ODBC - Connecting to a DSN
This section describes how to connect to a DSN (Data Source Name) with JDBC-ODBC Bridge.
2017-02-28, 13659👍, 3💬

💬 2017-02-28 Munna Shaw: My name is Munna Shaw

💬 2016-04-27 Anish Goel: Thanks a lot!

💬 2015-10-08 manoj soni: satisfied

JDBC-ODBC - Inserting Data Rows to MS Access Database
This section describes how to insert new data rows into MS Access database through the JDBC-ODBC driver.
2017-03-17, 13244👍, 5💬

💬 2016-03-06 Morn: My Testing

💬 2015-08-10 ramya: this website is very useful

<< < 1 2 3 4 5 6 7 8 9 > >>   Sort: Date