A Blog about Programming, Security, Business, Web, Earn money

Showing posts with label web. Show all posts
Showing posts with label web. Show all posts

Programming Languages Loved, Hated and Best Paid for Developers

Here are the most popular programming languages and what developers can expect to gain by mastering them.

The Stack Overflow Knowledge Sharing Site has released its annual 2019 Developer Survey, which reveals the most popular and highest-paying programming languages in the world and the United States.

If you're a programmer loving Rust, Python, and TypeScript, you're not alone, according to Stack Overflow's 2019 survey, which surveyed 90,000 developers around the world on their favorite, least-favored, and favorite languages.

The youngest languages are popular
The 10 preferred languages are Rust, Python, Microsoft TypeScript, Kotlin, WebAssembly, Swift, Clojure, Elixir, Go, and C #. These languages all have in common that they have been created in the last 10 years or so, with the exception of Microsoft C # and Python.

It also seems that developers are showing little attraction for older languages. The 10 least popular development languages all appeared more than 20 years ago.

The most feared language is Visual Basic for Applications (VBA), followed by Objective-C, PHP, Erlang, Ruby, R, C ++ and Java. Python, becoming one of the most popular, is also the "most wanted" language for the third year in a row, according to the Stack Overflow study.

Other languages that developers would like to learn, but do not use yet, include JavaScript, Go, TypeScript, Kotlin, Rust, C ++, WebAssembly, and Java. According to a SlashData report, JavaScript and Java are already among the languages with the most developers in the world (11.7 and 7.6 million respectively).

The Stack Overflow survey also provides an overview of remuneration according to the development languages under control. Worldwide, Clojure is associated with the highest salaries, with an average of $ 90,000. Other languages associated with salaries over $ 70,000 include F #, Go, Scala, Elixr, Ruby, WebAssemnbly, Rust and Erlang.

The highest wages reported in the United States are far above the median overall wages for all languages included in the survey. HTML / CSS and C # are related to the lowest wages in the United States.

For Web developers, Visual Studio Code and Visual Studio Studio are the most popular development environments. Just over half of mobile developers say they use Google's Android Studio and the same proportion say they use Visual Studio Code.


Share:

Inside a central computer unit

Whether you have a desktop computer or a laptop, your computer always consists of a CPU. Indeed, a CPU is the part that allows your computer to function properly.

If you have a laptop, the CPU is located inside the computer since you only have one block. In the case of a desktop computer, the CPU will be a block completely separate from the screen, the keyboard and the mouse. Indeed, these will be peripherals of the central unit which will be the heart of the computer. A computer, laptop or desktop, can only work in the presence of the central unit.

A central unit is composed of several elements that are mandatory. These elements are the processor which is a computer chip playing the role of computer brain, the motherboard which is a large circuit board with connection ports and which plays the role of nervous system of the computer, the memory which is also called RAM and which allows the computer to start and store data, the graphics card which is also called video card allows the display of the content on the screen of the computer, the sound card which is also called audio card and which manages the sound of the computer, the hard drive that allows the computer to store the data and keep them even when you turn off your computer and the DVD player which can be a simple player , a single burner or a burner drive allowing you to play DVDs and CDs.

In addition to these elements, other elements are also connected to the central unit. These are called devices. Since the CPU is the centerpiece of a computer, it must be properly protected. Thus, a central unit is protected by a plastic or metal case whose role is to protect the various components of the central unit against electromagnetic waves in addition to acting as sound insulation. The protective case of the CPU is often called the "tower" for a desktop. When you buy a desktop computer, you have the choice between three types of cases namely the big tower case, the middle tower and the mini tower. Whatever type of enclosure you choose, it must be equipped with a power supply.


Share:

How do computer programming languages work ?


To work, a computer program needs computer software. These are developed from precise languages that describe the set of consecutive actions that a computer must perform. Based on precise algorithms, it is not always easy to know how it works. Here is a brief, helpful summary.

Computer programming languages allow software and programs to communicate with machines. They are the ones who give orders to tell the machine how to respond to a particular request from the user. This is a basic approach and computer programming is much more complex than that. The programming language is thus classified into two major programming families: the imperative language and the functional language.

The difference between his two families results in the way instructions are given and processed by the machine. In the imperative language, the program follows a series of instructions that the program executes. They are subject to a condition that if not fulfilled prevents its operation. The functional language consists of a program built by functions. The functions fit together. We speak of recursion when the function is called itself.

Computer language is also classified into two general categories. We thus find the interpreted languages and the compiled languages. The difference lies mainly in the way the communication is handled. The interpreted language thus needs an auxiliary program that will translate the given instructions. Languages such as MATLAB, PHP to develop websites or Prolog for artificial intelligence. We speak of compiled language when the file is completely autonomous.

For this he needs a compiler that can translate a program once that can work anywhere. The resulting file is an executable! This type of file is very convenient since it can only be modified by one owner. Anyone who tries to modify it must compile the file again. Among the most common computer languages compiled, there are the C, C ++ that are used in programming video games or applications for example.

There are also intermediate computer languages that combine both the interpreted language and the compiled language. In this category we find languages like Python, Java or LISP ...


Share:

What is javascript ?

Originally created by the American Brendan Eich, JavaScript can create interactive web pages. It is used inside a web page. It has many features. Its uses are not limited and it is characterized by a standard. JavaScript and Java are two different concepts.

Its main function is to perform several actions. He is currently a key position in computer development. It can be triggered by a user either by a Mouse or a button. JavaScript can be available in any communication accessory such as Smartphones, tablets, PhoneGapd'Adobe, applications for Windows 8, but also multiplatform software.
JavaScript can add many elements and interactive elements such as pop-up messages, display, pop-up and pop-up. It can also design windows, redirect links without forgetting its input data control function. Thanks to JavaScript, you can chat in the social network Facebook. You can also play videos on the web with the JavaScript feature. Young and old can play powerful games like 3D Tetris or Torus. A lightweight scripting language, JavaScript makes it possible to verify the data. It makes a site more alive and dynamic. It can also create tooltips. Its function is to scroll through the images. It can display or hide text. JavaScript creates slideshows.

JavaScript has the ability to communicate with the web server. It speeds up the speed of using an online site. Very secure, JavaScript limits the theft of confidential data and information. It saves you from destroying files. It is accepted by the majority of visitors. Its ambition is to accelerate the opening of a website. It offers many possibilities and is an ideal solution for the web designer. You can make scripted slideshows and running images via JavaScript. The design of a JavaScript function requires a certain programming skill and several languages ​​related to computing. In recent years, JavaScript is becoming more widespread and global. It has become a significant tool for all web applications. For a better use, it is important to understand all the peculiarities of JavaScript language. In addition, for maximum success of your operation, you must manipulate the tips and tricks of JavaScript.


Share:

Which programming language to choose to start?

Beginners in programming will be able to choose a specific programming language that suits their level. This activity can be used to create software, the trick to make the manipulation easier is to choose the right technique. IT developers have to master some computer languages if they want to create the website.

What programming language is used when you are a beginner?
Novice IT developers could get started in this business by learning to master the C language. C ++ is a computer language also available to neophytes in computer science. Note that Java is also an interesting alternative for beginners who want to learn this practice. A software developer passionate about technology has reported an interesting track on the ideal programming language for apprentice computer developers.

The choice of programming languages ​​varies according to the motivations of the apprentice developer. It is possible to associate 9 programming languages ​​at the start of your IT career: Java, JavaScript, Python, C, C ++, C #, PHP, Ruby, Objective-C. Recall that Matlab, OCaml, HTML / CSS are other programming languages ​​making the computer developer job accessible to beginners.

IT developer fact sheet
The computer developer is a professional programming language. This technician analyzes the needs of companies and creates customized programs or improves the performance of existing tools. When the developed software is finished, the creator of the tool is responsible for testing it, establishes technical documentation, assumes the use and training of the user of the product.

To exercise its function, the IT developer works from a set of specifications entrusted by the client. This specification can be done by the IT developer in person. He will then have to carry out all the tasks chronologically. The main missions consist in identifying and analyzing the needs of client companies, programming software, conducting a series of tests ...

Skills required to become IT developers
To be a computer developer, you need to know the programming concepts, to master several programming languages. According to the computer developer's job description, this expert must understand the constraints of the project, find solutions to problems, be creative and imaginative in order to propose innovative solutions. The IT developer must also have a good general IT background, be self-taught, and at least English proficient to understand how different code languages such as HTML work.


Share:

How to solve the problem of transferring large files

At the moment, where file transfer has to happen almost instantaneously, businesses and individuals have a choice of file-sharing solutions. Among the best offer of the market, GrosFichiers site to transfer free and without commitment up to a volume of 4GO.

How to quickly send large files?
Using high-performance free file sharing software has become a necessity for both businesses and individuals. Indeed, the transfer of files is a problem that occurs daily and many are those who seek preferably a free and reliable solution. The GrosFichiers tool is perfect for sending heavy files, videos, images, zip, which are too large to be transferred via a regular mailbox. Admittedly, there are many solutions online but no need to look further to find a free and powerful solution up to 4 GB. With GroFichiers you have at your fingertips a simple tool to share your files without paying.

Find the best file transfer solution
Today it is possible to transfer directly through the GrosFichiers interface several large attachments, to send a lot of photos and images up to 4GB. Simply go to the site and without registration load the files you want to share just by indicating the address of the mailbox of the recipient or recipients with whom you want to share the free file. You can increase the duration and the file size with a maximum of 4 GB. Depending on the speed of the Internet connection, the file arrives in the recipient's box with a download download link.

Take advantage of a free powerful tool
With its free tool up to 4 GB GrosFichiers is one of the best solutions for large file transfer from the Web. To use a simple browser is enough because GrosFichiers serves as relay between the sender and the recipient (s) of transferred files. The interface is simple but yet the tool is powerful and the user has no difficulty to transfer files too heavy for mail. It manages the availability of the link but it can also be done automatically when the recipient has downloaded via the link sent to him. Until the recipient has downloaded the file, it is stored safely on the servers of this free web service.


Share:

Tips for Successful Powerpoint Presentations

The presentation of an idea at work such as the defense of a proposal in front of a jury, the illustration of a course, or a project ... Whatever the circumstances, a presentation must be prepared. From creation to editing, here are some guidelines to give you every opportunity to persuade your audience. Note that there are agencies on the market that prepare your work in PowerPoint format such as http://www.davytopiol.com

An idea rhymes with a slide that represents the basic rule for a successful PowerPoint presentation. Your slides should be as explicit as possible. Many use a fairly basic rule: 6 Points / Slide and 6 Words / Point. Be aware, however, that this procedure remains a maximum restriction to assist you in lightening your exhibitions! But the ideal would be to write a minimum of text. A concept is summarized in one word, or even two. In some circumstances, you can use a sketch, an image, a Smart Art. It is particularly important to ignore her theory in textual terms. Do not forget to organize yourself before starting work. If you know beforehand, what you want to put in your Powerpoint is impeccable. It is recommended to take time, to write all your plans on paper, or on Word. Start with a bulk, an excellent organization, the establishment of a precise, analytical project, the addition as and when the perspectives that appear. Through this basic text, it will be a huge gain of time for the creation of the support. In addition, you will be able to fill in the comment cells, an excellent basis for an oral interview. Go through Storyboard which is a kind of synthesis of your story, allowing deconstructing and PowerPoint design beforehand. The technique seems basic: sketch your slide briefly, then slowly add what you want to put in the content. Draw on your detailed program and introduce next to the drawings to be treated in the presentation. Be careful in the use of animations. In general, an exhibition without animations makes more apply. In principle, a controlled summary attracts the attention of the audience. Other instructions: promote basic animations, fast, measured; adapt the depth of the idea to develop, do not exceed the limits. It is very important to build your chart and honor it. Microsoft PowerPoint incorporates an awesome accessory called slide masks. Compared to the colors, do not increase the layers of color, choose one or two colors by focusing on the hues, font size, bold, italic.
Share:

What is the difference between hardware and software?

The two concepts Hardware and Software are two different domains. Indeed, the hardware designates the physical material constituting the desktops, the PC, the external equipments while the software is a software and an application which runs a computer.

First of all, the software is an English word which means the software. It is an invisible part of a computer. Indeed, the software is used to facilitate and to prolong the life of a computer. Software is characterized by machine-readable instruction sequences. They determine the tasks that can be analyzed by the machine. The software data is organized as a file. The machine takes the place of the computer or a calculator. According to experts, the software is called the smart part of a computer. It operates the machine or the PC. The software is a set of programs that can be executed by one or more machines. It is immaterial and it can be stored thanks to a memory medium. Thus, even inside a computer, the Software is a centerpiece of a computer. You can distinguish 3 broad categories of software, including system software, application software, and programming software. You have heard of Microsoft or MS-DOS, they are software used every day by Internet users, individuals and professionals. To be able to work, a computer needs a software and a hardware. Thus, in a general way, the software and the hardware are indissociable. While the hardware is the physical or computer hardware side. It is characterized by spare parts of computing devices. They are placed inside and outside the computer case. The pieces are made by different firms and different brands. They are mounted on printed circuits. For proper operation of your computer, you must use compatible computer equipment that meets the standards. All parts built into the computer can receive information. They can also send, store and process them. All hardware operations must follow the instructions of each software. For a problem in your computer tool, you must contact either a computer hardware maintenance technician or a technician who specializes in computer software maintenance. Many experts remain available on the web to help you out at any time.

Share:

Is there any job for beginners in computer science?

Beginners in IT can be reassured, because they can easily apply to find a job related to this area of activity. Jobs for beginners in computer science are jobs that provide jobs. From this observation, we understand more the interest of young people who wish to move towards computers. Computer learning is a study that can be done at any age.

Some examples of jobs related to the computer sector
Jobs for beginners in computer science may concern different fields of activity. Indeed, there are several types of jobs available to people who have specialized in the field of computer science: engineer and beginner computer development, information technology engineer beginner, engineer studies and development beginner Java / JavaScript, Java developer beginner, computer technician, computer science engineer, project engineer, Java developer, computer maintenance technician ...

Computer job offers that accept entry-level candidates are legion. For example, a position that recruits a developer in Python programming language, developer engineer, digital printing machine operator, computer technician, engineer / computer scientist, IT project manager ...

Why apply for a job for beginners in computer science?
IT is now accessible to all. Indeed, employees, students, young people and even retirees can take an interest in this sector of activity and learn to master it as well in a professional as it is playful. In addition, IT is very useful in all departments of the company. She is involved in the daily management of the various activities of the company such as human resources, accounting, marketing, administrative services ...

The use of computers is also useful in every step of the life cycle of a product created by the company. Computer science is involved from the design phase to the marketing stage without forgetting the manufacture of a product. All trades require various applications such as CAD, CAM, CAM, CMMS, DTP.

Tips for exercising the computer industry
To apply for a job for beginners in computer science, the candidate must acquire basic skills in logic and mathematics. Once these skills are mastered, they can be combined with other skills, namely advanced technical skills such as the operating system expert job, application manager or programming language.

Depending on the affinities of the learner, he can deepen his mastery in finance or economics, develop applications managing data flows, monitor market orders ... The computer scientist can specialize in consulting expertise by becoming a consultant, by acquiring artistic qualities as a graphic designer, webmaster ... improving his technological vision, embedded computing ... With so many job diversities, young computer science graduates can find a job that fascinates him.

Share:

Private VPN test: the protection of personal data first and foremost

    If it does not shine by its speed or its price, PrivateVPN Trunkspace promises a strong protection of privacy.
The name PrivateVPN is not unknown, but the latest service from Trunkspace Hosting should not be confused with the Swedish site PrivateVPN.com. The Trunkspace service makes it easy to connect to servers in 48 countries.

Features and services

The Windows Trunkspace VPN offers a single panel interface listing all supported national connections. The VPN usually offers at least two possible choices per country. To connect to a specific server, simply select it and click the Connect / Disconnect button to the right of the country name.
    A bar at the top of the window is colored red to indicate that there is no connection in progress, it turns yellow when the VPN establishes a connection and green when the connection is active. In the "Settings", which are accessed by the menu icon located in the upper left corner, there are additional options. The Stealth VPN check box is used to hide traffic to bypass network firewalls that block VPN connections.

    In "Advanced Setup" on the "Settings" page, there is an option to disable the Internet at logoff, cutting off any Internet access when the VPN connection is interrupted. Finally, in "Routing", it is possible to specify that only certain domains can pass through the VPN. This option is useful if you only want to protect the connection to an enterprise mailbox, for example, while maintaining occasional browsing outside the VPN. The routing function is not particularly difficult to use, but it is rather reserved for experienced users.
    Strangely, Trunkspace chose not to add the app icon to the taskbar. To make it appear, you must open the system tray, then click on the icon to display the application in the foreground. When our colleagues asked Trunkspace CEO Atif Khan why he chose this approach, he replied that many Trunkspace customers preferred not to have a VPN icon in the taskbar. "From our experience and from what we've seen, the VPN is typically like" set and forget ". Many of our early customers have complained about finding the icon in the taskbar, because it's not an application like Microsoft Word, an email client, or a web browser that you need to interact with. permanently ".

Performance

Trunkspace's performance was good in some cases, but overall not as good as other services. According to tests of our colleagues at PCWorld, PrivateVPN's speed averaged 19.26%. This is not high considering that the performance of the best services tested reaches 50% and the average performance of all VPNs tested is about 30%. But that does not mean that Trunkspace speeds are not fast. As the testers state, most PrivateVPN scores are double-digit, but not high enough to score better. However, as usual, everyone's experience may vary depending on the ISP, the router and the devices.

Confidentiality, anonymity and trust

Trunkspace is officially based in Montreal. The service is domiciled in a UPS shop in the city, but it's not unusual for a small company whose employees work remotely. The CEO of Trunkspace is, as mentioned before, Atif Khan, and the technical director is Jessica Chan. The Trunkspace Privacy Policy or Terms of Service do not contain any logging commitment. But the homepage of the VPN indicates that it does not record any "personal information" such as "IP addresses, connection and disconnect timestamps, bandwidth consumption, and DNS queries".

 It's a good thing to find this information somewhere, but presented as it is, it has more marketing argument than opposable engagement. Trunkspace has recognized the nuance and plans to include these elements in its privacy policy or terms of service in the coming weeks. To register with Trunkspace PrivateVPN, you must also provide the company with more information than many other services claim, including its name, email address, postal address and phone number, regardless of the mode. of payment. Trunkspace accepts payments by PayPal, credit card, bank transfer, gift cards, and several cryptocurrencies.

Conclusion

The VPN approach of Trunkspace is clear. The service does not offer additional features like some VPNs, and its speeds are acceptable, but not exceptional. But, given the offer, the price is a bit too high. There are cheaper solutions on the market with similar privacy policies that require less personal information at registration. PrivateVPN's privacy policy commitments are significant. And if the service revised its tariff down and required less personal information, PC World testers would recommend it more strongly.

Share:

A flaw in the PHP Adminer tool exposes sites to data theft (update)

    The attacks perpetrated by the Magecart group on online transactions may well have exploited a flaw in the PHP Adminer tool, widely used by MySQL database administrators and PostgreSQL.
     A localized vulnerability in the PHP Adminer tool used to administer various databases, including MySQL and PostgreSQL, allows attackers to retrieve data - or inject it - onto websites or e-commerce sites using open source databases. The flaw is associated with the MySQL Load Data command. The information was first reported by the Security Boulevard website. Several other sites, including BleepingComputer, and security researchers have commented and detailed, including on Reddit.

    The flaw can be exploited to access data on which a client has read rights during an interaction between that client and a MySQL server that has been configured to accept connections to unreliable servers. The MySQL documentation also mentions the risks associated with the use of Load Data associated with the keyword Local on the client workstation. An attacker can in fact use the malicious server to make a Load Data Local response and request any file on which the client has read access.

Exploited for Magecart attacks on online payments

    According to researcher Willem de Groot who spoke on the Reddit discussion on January 20, it is this flaw that would have been exploited by the group of attackers Magecart to intercept payment transactions on different sites by the insertion of a code . The Magecart attacks listed included British Airways, Ticketmaster Entertainment and Cathay Pacific Airways. For Willem de Groot, those intervened in October 2018 would have gone through this fault (mdj).

    In a post published a few days ago, the researcher describes the various steps that allow attackers to proceed using the Adminer tool, widely used among administrators of different databases. "Attackers can abuse it to fetch passwords on popular applications like Magento and Wordpress, and take control of the site's database," he wrote, detailing how they are doing. "I tested Adminer versions 4.3.1 to 4.6.2 and found them all vulnerable. Adminer 4.6.3 was delivered in June 2018 and it looks healthy. " He adds that it is unclear whether the security breach was corrected voluntarily or by chance, as Adminer did not release a security update.

Share:

More than 6 billions terminals threatened by ThreadX

    Researchers have identified a flaw in the SoC ThreadX OS that allows an attacker to send malicious code into WiFi controllers. Express Logic's operating system is embedded in nearly 6.2 billion computers, routers, smartphones and game consoles.
The Threadx-compatible SoCs, including the Marvell Avastar 88W8897, are integrated in a multitude of consumer terminals like PCs and smartphones, but also PS4 and Xbox One. (Credit: Marvell)

    Embedi researchers have detected a flaw in Express Logic's ThreadX operating system. Avastar 88W8897 SoCs and all ThreadX-compatible SoCs are affected. In short, nearly 6.2 billion devices (computers, smartphones, routers, PlayStation 4 and Xbox One) equipped with these SoC are exposed.

One of the vulnerabilities discovered was a special case of ThreadX block pool overflow. This vulnerability can be triggered without user interaction during the analysis of available networks, reads the blog post of the researcher Embedi. The latter has found several ways to execute malicious code. The most worrying is the ability to broadcast corrupted WiFi packets that will load into the SoC memory of the WiFi module. They will run at the time of updating the list of available networks on the machine, every five minutes on FNU / Linux according to the researchers. Worse, it is not necessary to know the WiFi key network to attack. Express Logic has stated that patches are being developed.


Share:

Create your own FileProtector to hide your files

In today's article we will talk about programming. More specifically, we will program a small utility to hide / protect your important files (passwords, important memories ... etc).

Little notes before you start:

This utility is written in VB.NET language, it is an old project brought up to date.
This utility is only available on Windows.
For starters, and to edit the source code, you will need to install Visual Studio Community (the integrated development environment of Microsoft).

You will also need to install the .NET Framework, version 3.5 minimum (normally already present on most PCs). And you will need a minimum of knowledge in VB.NET language (or want to learn and understand;)).

Want to learn programming to get started on your own projects right now? Download the complete guide to learn C, C # and Python? Click here. Use the promo code "FIRSTAPROG" to get it at -20% (8 codes remaining).

What is a FileProtector?
It is a utility to protect your sensitive files with a password. This type of tool already exists, Winrar for example can do it, but we will make a portable utility, that is to say that does not require installation and contains only a small file. Unlike other FileProtector's, it will not clearly indicate that it is one, it will display a default error message, letting others believe it is a mundane program.

The main purpose of this article is to provide you with a nice little project to familiarize yourself with the programming, since practicing is what allows you to learn faster. I also do not allow myself to consider this program as perfect, it has defects, it can be improved, modified or even rewritten in another programming language, and this is precisely what allows to practice and learn. Do not hesitate to suggest additions / modifications / improvements, because everyone can learn from others.

Example of operation
In order to make you understand how it works, nothing better than a video demonstration.

Explanations of the demonstration:
- We have two files to protect that we place in a demo.rar file.
- Drag and drop this demo.rar file into FileProtector.
- FileProtector asks us for a password and demo.rar number.
- We delete the original files and demo.rar
- Then click on FileProtector which displays a false error message.
- In the right corner of the error message, you can display the dialog box to decrypt the file.
- We give back the password and FileProtector we recreate the file demo.rar called this time dechiffre.rar and containing the initial files.

How to program FileProtector?
Let's start from a very general point of view.
There are two ways to use FileProtector
To encrypt
Drag and drop the file to be encrypted on FileProtector. This is handled via Environment.GetCommandLineArgs () which retrieves the full path of the dragged / dropped file.

We then read the contents of the dragged / dropped file with System.Text.Encoding.Default.GetString ((IO.File.ReadAllBytes (file))) and we ask for a password to encrypt all its contents with InputBox.

We now want to add the contents of the encrypted file to the end of FileProtector (the latter thus plays the role of encrypted file container).

For this we will first add a separator that will allow us to separate the contents of FileProtector contents of the encrypted file. We will also add the extension of the encrypted file so that it can be deciphered with the correct extension later:
FilePut(1, "#separateur#" & IO.Path.GetExtension(fichier) & "#ext#" & chiffre)
Here is a schema that shows the contents of FileProtector when it hides an encrypted file:


But to add this data in FileProtector, we have to go through a temporary copy of FileProtector because it is already running and we can not edit a file that is running.

We will create a temporary file identical to FileProtector, called "copy.exe" and we will add the information in question:
FileOpen(1, Application.StartupPath & "\copy.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)

Finally, it will remain to delete the old FileProtector and rename copy.exe FileProtector.exe. It is a combination to keep a single file FileProtector.exe by bypassing the limits mentioned above. For this, we use another temporary file that is a series of batch command to do the actions cited and self-delete.

Here is the source code that starts when FileProtector starts:

Here is the Rename And Delete procedure which is perhaps the most ambiguous part of this program:

To decipher:
FileProtector must be started as a normal program. This will display an error message to keep curious users away.

But it has a hidden feature to enable decryption. This is a small, transparent image in the lower right corner of the window.

Clicking on this image displays a dialog asking for the password to decrypt the hidden file.

The decryption then takes place, we do the same thing as before: we create a temporary copy file of FileProtector.exe to recover the encrypted content.

We decipher this content and recreate an empty FileProtector.exe file and the decrypted initial file, with the correct extension.

We reuse a batch file for that.

We can then repeat the steps and encrypt a new file.

Here is the code that executes when you click on the hidden image:



Known limitations
You can only put one file at a time in FileProtector (use a .zip file to place several files).

Files or folders with accents "é, è, à, etc" as well as network paths make (or can make) crash the program.

If the decryption password is incorrect, the temporary copy is not deleted.

The source code can (largely) be improved.

Maximum size tested: 400MB (the speed of (un) encryption and the final size depends on the encryption algorithm used).

Your antivirus may suspect this utility but it is not malicious. In this regard, sandboxed executions prevent the program from running normally.

Supplied as such, without warranty.

Improvements Track
Save the file name with the extension, to recover exactly the same file after decryption.

Manage the character problem (?).

Create an external process to avoid the (ugly) use of a bat file that opens a command prompt.

Check that it works on other systems.

Use more recent libraries / functions than FileOpen, FilePut ... Etc. For example, IO.FileStream and IO.StreamWriter.

Suggest another way to display the decryption dialog.

For example with a keyboard shortcut:
Private Sub Form1_KeyDown(sender As Object, e As KeyEventArgs) Handles Me.KeyDown
    If e.Control AndAlso e.KeyCode = Keys.S Then 'si la touche controle est appuyée ainsi que la touche S
       'demander mot de passe
    End If
 End Sub
Share:

Microsoft Edge: Did Google intentionally sabotage the browser?


A former Microsoft trainee accuses Google of intentionally changing its websites, including YouTube. The goal is to "break" competing browsers like Microsoft Edge, according to information published on the English-language website HackerNews.

According to Joshua Bakita, Google would make regular code changes in some of its sites in order to cause slow and weary users of browsers other than Google Chrome. To stay compatible with Google services, these browsers that are like Safari or Edge.P would be forced to update regularly.

Changes in YouTube's code
Joshua Bakita even estimates that Eden was superior to Chrome on YouTube, but that Google then chose to change the code to return to its competitor, rather than improve its own features.
"Although I'm not entirely sure that YouTube has been intentionally modified to slow Edge, many of my colleagues are convinced of this - and they've looked at the problem more closely," writes the former intern on HackerNews. . To improve nothing, when we asked him, YouTube refused to delete the "div" (tag in the code HTLM) empty hidden and did not give explanations ".

Google denies any intentional maneuver
For its part, Google has refuted all charges of sabotage. For the web giant, YouTube's empty "div" was a simple computer bug, which has since been fixed.

"YouTube does not add code designed to neutralize the optimizations of other browsers and acts quickly to correct the detected bug," said a spokesman for the firm in The Verge. He added: "We regularly collaborate with other browser vendors via standardization organizations, the Web Platform Tests project, the Chromium open source project ... to improve browser interoperability. "

Share:

Introduction to ASP.NET MVC


Explore the key moving elements of MVC, the way to produce an initial project, and therefore the variations between MVC and ASP.NET.

Mod 01: Basics of MVC and the Moving Parts

Mod 02: Creating and Configuring Models

Mod 03: The Power of Visual Studio

Mod 04: Deep Dive into Controllers

Mod 05: Deep Dive into Views

Mod 06: Introduction to Bootstrap


Mod 07: Introduction to Authentication in MVC

Mod 08: Supplement Your Knowledge
Share:

Courses don’t fear the internet

BASIC HTML & CSS for NON-WEB DESIGNERS
 By Jessica Hische and Russ Maschmeyer

   Are you a print designer, artist, fine-artist, or general artistic person? does one have a stinking web {site} that you simply abused  along yourself in Dreamweaver in this ONE net style category that you simply took in college? does one not have a site the least bit as a result of you’ve been waiting 2 years for your relative to place it along for you? Well, we’re here to assist. we all know that you simply have very little to no want to try and do net style professionally, however that doesn’t mean that you simply need an unpleasant same web site or to accept one that hasn't been updated since Hackers was in theaters. Through short tutorial videos, you’ll learn the way to require a basic wordpress web log and manipulate the css, HTML (and even some php!) to match your aesthetic. You’ll feel authorised instead of lame by {the internet|the net|the net} and worst case situation you’ll a minimum of find yourself having an improved plan of however skilled web styleers flip your design dreams into a reality on screen.



“Don’t Fear the Internet”, a new resource to help demystify html and css coding so you can prettify your blogs and quit asking your nerd friends for freebies!

In this episode, we’ll introduce you to the internet, give you a simple framework for how the web works as well as introduce you to what a website is on a practical level.

In this enlightening (and hunger-inducing) episode, we’ll talk a bit about HTML code structure before we get into the meat of it (har har!) in upcoming episodes.

In this episode, we’ll introduce you to the developer tools hidden in your browser that will become indispensable as you begin to look at HTML and CSS code.

In the first video in this two-part series, we’ll take you through building a webpage from scratch by using a good text editor.

In the conclusion of this two-part series, we’ll show you how to apply and write your own CSS.

We’ll give you the low-down on Classes and IDs and hone your CSS skills at the same time.

In this “epicsode”, Jessica covers some type history and many CSS terms you’ll come to know and love.

In this installment, Russ can take you from net layout zero to hero. He’ll take you step by step, from the box model to positioning and floating and can begin you down the trail to responsive net style with fluid dimension layouts.

Share:

Windows 10 Microsoft wants to add ads to the mail application

   Microsoft has been thinking of adding advertising in Windows 10 through some popular applications. Some users have noticed the presence of ads in the form of email in "Mail" mail client installed by default. However, a company official said the test should not have reached the general public.



Windows 10 could make room for advertising in some of its applications, such as its mail client. Indeed, some Mail users in many countries have seen the presence of advertisements in the form of emails underlines The Verge. An initiative that seems straight forward to draw inspiration from its competitor Google. Indeed, Gmail has already been advertising on its service for a little while.

Windows 10 has been advertising in its mail application

We do not know exactly what pushes Microsoft to imitate the pace of its competitor. Windows 10 is after all a paid software. The license is included in the price of new computers, users may not appreciate this very unpleasant novelty. However, the Redmond giant explained about this through Frank Shaw, communications manager of Microsoft that explains that it was ultimately a test that should never have touched the general public.

According to the firm who told The Verge, "The company decided to turn off these ads. He also stated that the experiment was never designed to be tested on a large scale, which does not support the existence of a pilot program FAQ set up in several countries around the world, but the advertisements should disappear" . If some users have seen advertising on the app, it should disappear quickly.

On the positive side of this experience, we remember that Microsoft refuses to scan emails to display targeted content. The company has always refused to give in to this kind of practice and has even teased Google in the past about it. Gmail has decided to stop scanning emails from. What do you think of this case? If Microsoft added advertising in its applications, how would you welcome this news? Share your opinion about it in the comments.

Share:

Web Programming in Python with Django


What is Django? 
Apps, Models, and Views
URL Structure
Templates
Admin Interface
Forms
Examples / Tutorials

Download free Web Programming in Python with Django, course tutorial training, PDF file by Steve Levine, Maria Rodriguez, Geoffrey Thomas.

Share:

IPSec VPN Guide free


   IPSec is a transparent security layer for TCP/IP that is commonly used to create and operate Virtual Private Networks (VPNs).

  This document has been divided into several distinct parts according to the amount of information different types of readers are likely to need:

Part I. Learning about InJoy IPSec
Part II. Getting Started Guide
Part III. Setting up a VPN
Part IV. Advanced Features Guide
Part V. Deployment Examples
Part VI. References

  It is never too late to start learning and it would be a shame to miss an opportunity to learn a tutorial or course that can be so useful as IPSec VPN Guide especially when it is free! You do not have to register for expensive classes and travel from one part of town to another to take classes. All you need to do is download the course and open the PDF file. This specific program is classified in the Network category where you can find some other similar courses.

Share:

Adobe Dreamweaver Essentials



     Adobe Dreamweaver could be a program that enables users to make websites. The program makes it simple for users with restricted information of scripting languages to make their own web site that permits them to focus a lot of on visual aspects. The user will click and drag things into place or use the tools provided to make their own content, and Dreamweaver mechanically writes the code that's required to form it show properly in a very applications programme. It doesn't, however, limit those that area unit terribly aware of committal to writing and scripting languages to change their sites by ever-changing the code directly.

It is ne'er too late to start out learning and it might be a shame to miss a chance to be told a tutorial or course which will be therefore helpful as Adobe Dreamweaver necessities particularly once it's free! you are doing not ought to register for expensive  categories and travel from one a part of city to a different to require categories. All you would like to try to to is transfer the course and open the PDF file. This specific program is assessed within the net programming class wherever you'll be able to realize another similar courses.


Share:

Blog Archive

Recent Posts

Contact Us

Name

Email *

Message *