EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-01-01, 427👍, 1💬
Examples of Unicode Characters
This chapter provides notes and tutorial examples on the Unicode character set. Topics including introduction of Unicode standard, example characters, history of releases, blocks of code points. 2019-06-24, 2852👍, 6💬
RFC 1867 - Form-based File Upload in HTML
This section describes the file upload specification, 'RFC 1867 - Form-based File Upload in HTML', proposed by E. Nebel and L. Masinter in 1995. 2019-06-19, 107👍, 1💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2019-06-17, 1681👍, 3💬
Validating wsse:Password Digest String
This section provides a tutorial example on how the SOAP message receiver should validate the password digest string in the wsse:Password element using the 'Password_Digest = Base64 ( SHA-1 ( nonce + created + password ) )' definition. 2019-06-17, 10217👍, 8💬
Running Perl Scripts on Windows Systems
This section provides a tutorial example on how to run Perl scripts with ActivePerl on Windows systems. To make a Perl script file executable, you need to set the script file name extension to '.pl'. 2019-06-17, 155👍, 2💬
What Is Ethereum
This section describes what is Ethereum. 2019-06-17, 112👍, 2💬
U1DC0: Combining Diacritical Marks Supplement
This section provides a quick summary of the Unicode code point block: 'Combining Diacritical Marks Supplement', which contains 64 code points to represent additional diacritical marks used in conjunction with preceding letters. 2019-06-17, 128👍, 2💬
'native2ascii' - Native-to-ASCII Encoding Converter
This chapter provides tutorial notes on the native-to-ASCII encoding converter 'native2ascii'. Topics include 'native2ascii' command options, default encoding CP1252 used by 'javac', converting UTF-8 characters into \udddd Unicode code sequences, converting \udddd sequences back to native encodings. 2019-06-12, 3438👍, 43💬
Table Column Headers and Footers
This section provides a tutorial example on how to create tables with column headers and footers. table-header and table-footer formatting objects should go before table-body formatting object. 2019-06-06, 126👍, 1💬
Downloading and Installing Visual C# 2010 Express
This section provides a tutorial example on how to download and install Microsoft Visual C# 2010 Express edition on Windows systems. 2019-06-06, 3490👍, 17💬
"java --list-modules" - Listing Modules in JDK
This section provides a tutorial example on how to use 'java --list-modules' command to list all modules included in the JDK installation. 2019-06-01, 453👍, 4💬
Using Microsoft Word as a Unicode Text Editor
This chapter provides notes and tutorial examples on using Microsoft Word as a Unicode text editor. Topics including opening Unicode text files in 3 encodings: UTF-8, UTF-16BE, and UTF-16LE; saving and opening Unicode text files with the BOM character prepended. 2019-06-01, 155👍, 2💬
SoapUI Configuration for Messaging Encryption
This section provides a tutorial example on how to create a configuration entry to support SOAP messag encryption with an X.509 certificate in a JKS (Java KeyStore) file. 2019-06-01, 1791👍, 3💬
XML Notepad - XML Editor
This chapter provides notes and tutorial examples on XML Notepad. Topics include downloading and installing XML Notepad 2007; converting XML to pretty print format; XSD schema validation; XSLT transformation to HTML documents. 2019-06-01, 153👍, 2💬
How JSP Pages Are Processed?
This section describes how JSP pages are processed by the Web server. Two key steps are involved: 1) compilation of the JSP page into a Java Servlet class; 2) execution of the compiled class. 2019-05-30, 2789👍, 3💬
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. The...
This PKI (Public Key Infrastructure) tutorial book is a collection of notes and sample codes written...
This section describes how to delete rows from target tables through ResultSet objects.
This section describes the SHA1 algorithm - a 6-step process of padding of '1000...', appending mess...
This section describes how to insert new data rows into MS Access database through the JDBC-ODBC dri...