background preloader

Tech.Pro

Tech.Pro

peg.gd - Text Only free website hosting Cybersecurity News IPhone URL Schemes - akosma wiki From akosma wiki This page centralizes code samples for URL schemes available in many iPhone applications, not only in Apple's but in many others. It also includes programming tips and references about implementing apps registering or consuming URL schemes. If you own an iPhone app, contact akosma software to add the schemes you've implemented in your application, for others to use. The important thing is to showcase code samples, ready for others to use. Terms of Use This wiki page is a courtesy service. Thanks for sharing your URL scheme to the community! Programming Tips Registering your own URL schemes Please check this page in iPhone Developer Tips. Note about URL Encoding in Objective-C There can be some problems with NSString's stringByAddingPercentEscapesUsingEncoding: method since it does not encode some reserved characters for URLs; you might prefer to use this code instead: Apple iPhone Applications Safari Apparently opens in Safari. Maps Phone Mail YouTube Duo

Kinect Tutorial - Hacking 101 Microsoft's Kinect has been out for a few months now and has become a fairly popular accessory for the Xbox 360. Let's face it though, using the Kinect for what it was intended didn't end up being the most exciting part of this new toy. What has become far more interesting is seeing the various hacks developed that makes the device so much more than simply an input mechanism for games. Now it's your turn to do something amazing, and this tutorial will get you started. Today I'm going to get your Kinect up and running and demonstrate how to get the camera and depth information into your very own C# application. Above is some example output that our app will produce. 1. openkinect.org is going to be your best friend for this portion of the project. 2. Since our plan with this tutorial is just to display output, we can get away with a basic WPF application, which actually performs surprisingly well. Bundled as part of the libfreenect source are a set of wrappers for various languages. 3.

::Democratized Reward Based Blogging:: History of Computer Security Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security. Table of Contents How To Use This Collection All papers are stored in Adobe's PDF (Portable Document Format). If you have a web browser you can use this interface to access the papers. Paper descriptions are in the file Papers.pdf. A copy of these instructions is in the text file README.txt. Return to top of page List of Papers Click on the citation to read a description of the importance of the paper; click on the file to read the paper itself. Return to top of page Background and Organization Computer security as a discipline was first studied in the early 1970s, although the issues had influenced the development of many earlier systems such as the Atlas system and MULTICS. The information in these papers provides a historical record of how computer security developed, and why. Acknowledgements We thank Dr. Ande72 Keywords

Launching Your Own Application via a Custom URL Scheme Note: Since the introduction of custom URL schemes, this post has consistently been the top read content on the blog. Although much is the same, there are a few nuances that have changed. This is a re-write of the original post, updated for the latest iOS and Xcode versions. One of the coolest features of the iPhone/iOS SDK is an application’s ability to “bind” itself to a custom URL scheme and for that scheme to be used to launch the application from either a browser or from another application. Registering a Custom URL Scheme The first step is to create a custom URL scheme – start by locating and clicking on the project info.plist in the Xcode Project Navigator. From the list presented scroll down and select URL types. Open the directional arrow and you’ll see Item 0, a dictionary entry. Tap on Item 0 and add a new row, select URL Schemes from the drop-down and tap Enter to complete the row insert. Expand the array and tap on Item 0. Calling Custom URL Scheme from Safari

Learn The Ruby Programming Language While Having Fun With Hackety Hack Similar to Alice, which we have covered before, it is meant as a beginners tutorial to programming; however the main difference is that Alice is a GUI programming toolkit while Hackety Hack is a text-based “real” programming environment. To begin, download Hackety Hack for your operating system. Versions are available for Windows, Mac OS X and Linux. Even though their website says that it is for 64-bit only the download worked fine on my Windows 32-bit machine so perhaps that is meant for the Mac OS X version only. Click “Ready” to begin the program. Learning Programming Basics Hackety Hack begins with a menu of Lessons. The rest of the tutorials are geared towards beginner programmers but if you are new to the Ruby language they will also be helpful. How To Program In Ruby The first program you will write will be a “Hello World” program which is standard in computer programming language circles. From there, you get progressively difficult levels of programming from the tutorials.

Codename: Obtvse - Nate Wienert Earlier today I was browsing Hacker News and was a bit let down by a post I ran across by recent HN front-pager, Dustin Curtis. See, Dustin’s done some pretty cool stuff and to date much of his writing has been insightful and spot-on. Other things he’s done have been a bit more controversial (Kudos suck, as did the way he responded to critique’s on them). Nonetheless, I was excited earlier today as I was reading his announcement of Svbtle, his new blogging platform. A minimalist, beautiful and simple markdown-based editor with a dead-easy administration panel? I wrote this engine entirely for myself, without the intention of opening it up to other people. So here’s an obviously talented guy showing off a beautiful new creation on Hacker News, and yet he’s making it a “membership by invitation only” network? Obtvse So, I decided to do something about it. Before I Start a Flamewar Before I link it up, I’d like to give thanks to Dustin. The Goods So without further ado I present obtvse.

CSM: Computer Science and Mathematics Division iOS | How-to Use Property List Files to Store Data in iPad or iPhone App One of vital elements of any iOS application is the info.plist file. This graph based file contains important configuration settings for your application to run normally. For instance you set the icons your app requires in the plist file. This property list file is not only used by app but also by the App Store to determine if the application is properly configured to be included in the App Store. The plist is a key component of the application bundle. When an application is created, a info.plist is created with a set of keys required to allow your app to run normally and co-exist on the device and be listed in the App Store. Property list files are also used to manage the functionality of an app by providing a useful persistence data store for lightweight storage. Property List files lose their effectiveness if you try you use them other than their intended use. Using archiving or another lightweight storage mechanism like possibly a SQLite database might be a better choice.

codr.cc - share code NOOWIT - Splash

Related: