background preloader

Advanced Bash-Scripting Guide

Advanced Bash-Scripting Guide

http://www.tldp.org/LDP/abs/html/

How Browsers Work: Behind the Scenes of Modern Web Browsers Web browsers are the most widely used software. In this primer, I will explain how they work behind the scenes. We will see what happens when you type google.com in the address bar until you see the Google page on the browser screen. The browsers we will talk about Top 50 Free Open Source Classes on Computer Science : Comtechtor Computer science is an interesting field to go into. There are a number of opportunities in computer science that you can take advantage of. With computers increasingly becoming a regular part of life, those who can work with computers have good opportunities. You can find a good salary with a program in computer science, and as long as you are careful to keep up your skills. Here are 50 free opencourseware classes that can help you learn more about computer science: Introduction to Computer Science

Building and Running from the Command Line There are two ways to build your application using the Ant build script: one for testing/debugging your application — debug mode — and one for building your final package for release — release mode. Regardless of which way you build your application, it must be signed before it can install on an emulator or device—with a debug key when building in debug mode and with your own private key when building in release mode. Whether you're building in debug mode or release mode, you need to use the Ant tool to compile and build your project. shUnit2 2.1.x Documentation This section covers several advanced usage topics. Error handling The constants values SHUNIT_TRUE, SHUNIT_FALSE, and SHUNIT_ERROR are returned from nearly every function to indicate the success or failure of the function.

SQL Injection Attacks by Example A customer asked that we check out his intranet site, which was used by the company's employees and customers. This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises.

30 free programming eBooks - citizen428.blog() - StumbleUpon Since this post got quite popular I decided to incorporate some of the excellent suggestions posted in the comments, so this list now has more than 50 books in it. BTW: I’m not very strict on the definition of “ebook”, some of them are really just HTML versions of books. [UPDATED: 2012-01-18] Learning a new programming language always is fun and there are many great books legally available for free online. Here’s a selection of 30 of them: Android Engineer: Using Ant to Automate Building Android Applications The standard way to develop and deploy Android applications is using Eclipse. This is great because it is free, easy to use, and many Java developers already use Eclipse. To deploy your applications using Eclipse, you simply right-click on the on the project, choose to export the application, and follow the prompts There are a few things we cannot easily do with this system, though.

Top 10 C Language resources that will turn you into a better programmer Custom Search People consider computer programming a little tiresome but some find it more enjoyable. Every programmer has to keep up with the latest trends coming in the programming languages. Most of the programmers start programming in C as it is the most commonly used programming language for writing operating systems and applications. If you are reading this article, most probably you are already a programmer or want to become a programmer. Luckily, you are on the right place because in this article I have gathered C programming websites/tutorials that can help you becoming a good C programmer.

Bash wait command wait command stop script execution until all jobs running in background have terminated, or until the job number or process id specified as an option terminates.It returns the exit status of waited-for command. wait can take the job-id or the process number. i.e. wait%1 or wait $PID Linux: Increasing the number of open file descriptors See additional more recent notes at the bottom of this file A small number of open file descriptors (sockets) can significantly reduce both the performance of an Internet Server and the load that workload generator like httperf can generate. This is meant to provide some information about how to increase the limits on the number of open file descriptors (sockets) on Linux. Note: the actual numbers used below are examples. The numbers you should use will depend on weather you are modifying a system that will be used as a client or a server and the load being generated. In this example we increase the limit to 65535.

The First Few Milliseconds of an HTTPS Connection Convinced from spending hours reading rave reviews, Bob eagerly clicked “Proceed to Checkout” for his gallon of Tuscan Whole Milk and… Whoa! What just happened? In the 220 milliseconds that flew by, a lot of interesting stuff happened to make Firefox change the address bar color and put a lock in the lower right corner. With the help of Wireshark, my favorite network tool, and a slightly modified debug build of Firefox, we can see exactly what’s going on.

Related:  Unix/Linux/OSXShell scripting