background preloader

Computers

Facebook Twitter

The Shapes of CSS. Learn Development at Frontend Masters CSS is capable of making all sorts of shapes. Squares and rectangles are easy, as they are the natural shapes of the web. Add a width and height and you have the exact size rectangle you need. Add border-radius and you can round that shape, and enough of it you can turn those rectangles into circles and ovals. We also get the ::before and ::after pseudo elements in CSS, which give us the potential of two more shapes we can add to the original element. By getting clever with positioning, transforming, and many other tricks, we can make lots of shapes in CSS with only a single HTML element. Square Rectangle Circle Oval Triangle Up Triangle Down Triangle Left Triangle Right Triangle Top Left Triangle Top Right Triangle Bottom Left Triangle Bottom Right Curved Tail Arrow via Ando Razafimandimby Trapezoid Parallelogram Star (6-points) Star (5-points) via Kit MacAllister Pentagon Hexagon Octagon Heart via Nicolas Gallagher Infinity via Nicolas Gallagher Egg Pac-Man Talk Bubble Lock.

Business Technology News, Reviews and Blogs. Pointer Basics. This document introduces the basics of pointers as they work in several computer languages -- C, C++, Java, and Pascal. This document is the companion document for the Pointer Fun with Binky digital video, or it may be used by itself. This is document 106 in the Stanford CS Education Library. This and other free materials are available at cslibrary.stanford.edu. Some documents that are related to this one include... Section 1 -- Pointer Rules One of the nice things about pointers is that the rules which govern how they work are pretty simple. 1) Pointers and Pointees A pointer stores a reference to something. The above drawing shows a pointer named x pointing to a pointee which is storing the value 42.

Allocating a pointer and allocating a pointee for it to point to are two separate steps. 2) Dereferencing The dereference operation starts at the pointer and follows its arrow over to access its pointee. 3) Pointer Assignment Below are versions of this example in C, Java, C++, and Pascal. 3 Ways To Speed Up The Windows 7 Shutdown Process. Advertisement Ever since I switched to Windows 7 on my laptop, which had previously shut down within seconds while running on Windows XP, the slow shutdown has been nagging me. If you also happen to be looking for ways to kick-start a Windows 7 slow shutdown, look no further! Here I will introduce you to 3 ways to optimize or speed up the logoff process, so that you can leave the office or get into bed faster. Prologue I tested these tips one after the other on my Windows 7 netbook (which shut down significantly faster after upgrading to 2GB RAM). I booted into Windows, started some standard programs, including Skype and Chrome with several different tabs open, waited until they had fully loaded, and then shut down the computer.

In its native state, the shutdown took 32 seconds from clicking the ‘Shutdown’ button until the laptop had fully shut down. Initial shutdown time on test machine: 32 seconds 1. Before Windows shuts down, it attempts to properly close all running processes. 2. 3. Temporary Email Aliases. After running tempalias.com as a fun project for a bit more than a year and a half, I would say that the experiment is now finished and tempalias.com is down for now. There are both personal and technical issues. Let me list them here: the tempalias codebase relies on a very old version of node.js and some very old additional libraries which wouldn't even work with newer versions of node.js. I'm concerned about running outdated software, so I would have to put a considerable amount of work into modernizing the infrastructure As the database size has exploded in that year, my very dumb method for garbage collection has reached the end of its possibility for scaling.

This means that tempalias.com is down for now. If you want to have a service like this, remember that the source code of tempalias.com is freely available at my github page I hope you undestand. Tutorial - Learn Python in 10 minutes. NOTE: If you would like some Python development done, my company, Stochastic Technologies, is available for consulting. This tutorial is available as a short ebook. The e-book features extra content from follow-up posts on various Python best practices, all in a convenient, self-contained format. All future updates are free for people who purchase it. Preliminary fluff So, you want to learn the Python programming language but can't find a concise and yet full-featured tutorial. Properties Python is strongly typed (i.e. types are enforced), dynamically, implicitly typed (i.e. you don't have to declare variables), case sensitive (i.e. var and VAR are two different variables) and object-oriented (i.e. everything is an object).

Getting help Help in Python is always available right in the interpreter. >>> help(5)Help on int object:(etc etc) >>> dir(5)['__abs__', '__add__', ...] >>> abs. Syntax Python has no mandatory statement termination characters and blocks are specified by indentation. Strings. Computer hardware poster 1.7 by ~Sonic840 on deviantART. IP Subnet Practice.

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example. Introduction This document provides step-by-step instructions on how to allow VPN Clients access to the Internet while they are tunneled into a Cisco IOS® Router. This configuration is required to allow the VPN Clients secure access to corporate resources via IPsec and at the same time allow unsecured access to the Internet.

This configuration is called split tunneling. Note: Split tunneling can pose a security risk when configured. Since VPN Clients have unsecured access to the Internet, they can be compromised by an attacker. That attacker is then able to access the corporate LAN via the IPsec tunnel. A compromise between full tunneling and split tunneling can be to allow VPN Clients local LAN access only. Prerequisites Requirements There are no specific requirements for this document. Components Used The information in this document is based on these software and hardware versions: Cisco Router 3640 with Cisco IOS Software Release 12.4 Cisco VPN Client 4.8 Conventions Configure Verify.

PIX Firewall and VPN Configuration Guide, Version 6.3 - Site-to-Site VPN Configuration Examples  [Cisco PIX Firewall Software. Configuring PIX Firewall 1 with a VeriSign CA Perform the following steps to configure PIX Firewall 1 to use a public CA: Step 1 Define a host name: Step 2 Define the domain name: Step 3 Generate the PIX Firewall RSA key pair: This command is not stored in the configuration. Step 4 Define VeriSign-related enrollment commands: ca identity example.com 209.165.202.130 ca configure example.com ca 2 20 crloptional These commands are stored in the configuration.

" 2 " is the retry period, " 20 " is the retry count, and the crloptional option disables CRL checking. Step 5 Authenticate the CA by obtaining its public key and its certificate: ca authenticate example.com This command is not stored in the configuration. Step 6 Request signed certificates from your CA for your PIX Firewall's RSA key pair. Welcome to ClearDB! Kyle's Cousin » An Absolute Beginner’s Introduction to Database Indexes. Proper indexes on your tables are a crucial part of any Database design that requires advanced data retrieval.

For basic databases with only a few dozen records per table, indexes may not be absolutely necessary and even slow things down (if your RDBMS does not automatically ignores the index), but it’s still good practice to design your database with proper indexes from the start if you expect it to grow big. The minute your number of table records increases and you need to do more advanced select queries (eg. joining of multiple tables), efficiency and speed becomes important.

That’s where indexes come into play. In this post I’m going to give you an introduction tutorial/guide about database indexes, for everyone who has no idea what they’re used for. Basic SQL knowledge is required in order to comprehend everything. Using an index for simple SELECT statements… Let’s kick things off with a simple example.

And add 10 records to it: This is how your table will look like: Conclusion. Best 10 Sites for Tips and How-To’s — TechnoZeast. Internet is filled with information and there are many site through which we stumble across whole day and night to find the right info about any particular thing. There are so many sites which share tips and How-To’s and many internet users wonder to find accurate information to help them here we have listed best 10 sites for tips and How-To’s check them out below. 1. instructables 2. eHow 3. 4. 5. 6. 5Min 7. 8. 9. 10. Hope these best 10 sites help you find your desired tips and how-to’s to help you with best info.

20 Indispensable Browser Based Apps Design Informer. How to use Google for Hacking. Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.

In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking: 1. Using Google to Hack Security Cameras: There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. Inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.

Intitle:”Live View / – AXIS” 2. 3. . “? Will Smart Contact Lenses Be the Bluetooth Headsets of the Future? Imagine instant access to the latest market segment information at a meeting, or seeing the fourth quarter earnings for a company in (literally) the blink of an eye. Although it might sound like something from a science fiction novel, scientists at the University of Washington are working on solar powered contact lenses with transparent LEDs embedded onto the lens. This technology could be applied in countless ways, from health monitoring to text translation right in front of the wearer's eyes. In 2006, my team at SKD designed a very similar concept for our "Cautionary Visions" project. Analyzing current trends in technology and popular culture, from emerging demands for constant connection to the increasingly blurred boundaries between natural and artificial, my designers imagined the dark alleys down which these trends could take us.

Now it seems like our idea might become a reality. But I haven't asked that question in years. Which takes me back to the Smart Lens. 15 sites web developers and designers should know - CatsWhoCode.com. Creating a good website isn't an easy task, but there's a few tools that can definitely make your developer or designer life easier. In this article, I have compiled 15 extremely useful website that any web developer or web designer should have bookmarked. ColorCombos When designing a website, one of the firsts (and most important) steps of the process is to choose a color scheme. Color Combos allow you to browse thousand of different colors combinations for getting inspired for your upcomming design.

Color schemes can be browsed by colors.Visit colorcombos.com LIpsum Who doesn’t know the extremely popular Lorem Ipsum text? What the font? You just saw a logo or website using a particular font and you enjoyed it. ConvertIcon Favicons are a must have for any website, mostly because on modern browsers as such as Firefox, it is displayed along with the site name in tabs. BgPatterns background Patterns is definitely one of the current webdesign trends. HTML Encoder Test Everything Sprite Generator. Random Key Generator. Hackers outwit Windows 7 activation.

News November 16, 2009 01:37 PM ET Computerworld - Hackers have figured out how to sidestep Windows 7's activation process, continuing a long-running battle with Microsoft, which has blocked such tactics in the past. According to an article published more than a week ago on My Digital Life, hackers have devised a pair of methods that circumvent the new operating system's product activation, a key component of Microsoft's antipiracy technologies.

Microsoft said it knew about the hacks and was looking into ways to block them. "We're aware of this workaround and are already working to address it," a company spokeswoman said today. Two utilities, called "RemoveWAT" and "Chew-WGA," remove the activation technologies or prevent them from running, said My Digital Life. With Windows 7, Microsoft dropped the "Windows Genuine Advantage" (WGA) name for its integrated antipiracy software, and replaced it with "Windows Activation Technologies" (WAT). Visual Cryptography. What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images.

One image contains random pixels and the other image contains the secret information. It is impossible to retrieve the secret information from one of the images. Both transparent images or layers are required to reveal the information. The easiest way to implement Visual Cryptography is to print the two layers onto a transparent sheet. When the random image contains truely random pixels it can be seen as a one-time pad system and will offer unbreakable encryption. How Visual Cryptography works Each pixel of the images is divided into smaller blocks. We can now create the two layers. The system of pixel can be applied in different ways. Additional information.