EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 584👍, 3💬
Perl Script Conversion Tools
This section describes why and how to convert Perl script files to executable binary files. ActivePerl Dev Kit and Perl2Exe are two popular conversion tools for Windows systems. 2019-07-21, 1272👍, 5💬
Settings on Browsing History in IE 10
This section provides a tutorial example on how to review and change settings on how Internet Explorer 10 is storing browsing history data on your computer. 2019-07-21, 132👍, 2💬
Downloading and Installing JDK 1.8.0 on Windows
This section provides a tutorial example on how to download and install JDK 1.8.0 (Java SE 8), which contains the HotSpot 1.8 JVM, on a Windows XP system. A simple Java program was entered, compiled, and executed with the new JDK installation. 2019-07-20, 56602👍, 43💬
JVM "-verbose:class" Option
This section provides a tutorial example on how to the '-verbose:class' option on the 'java' command to see when and where classes are loaded into the JVM. 2019-07-19, 180👍, 1💬
This section provides a quick introduction of Shift-JIS, also called MS Kanji, encoding, which maps a JIS X0208 character to a 2-byte sequence using a complicated schema designed by Microsoft. 2019-07-16, 303👍, 3💬
GetCountries - Get All Countries and Territories
This chapter provides a quick introduction of the free Web service, GetCountries, returning a list of all countries in the world. Topics include usage description of GetCountries; request message sample; response message sample. 2019-07-14, 117👍, 1💬
"dateTimeStamp" Datatype Values and Representations
This section describes the built-in primitive datatype, 'dateTimeStamp' that represents moments of time in Gregorian calendar. Leading and trailing whitespaces are allowed and trimmed. Timezone offset is required. 2019-07-08, 120👍, 1💬
ActiveX Filtering - Controlling ActiveX on Silverlight
This section provides a tutorial example on how to enable the ActiveX Filtering function in Internet Explorer 10 to stop Microsoft Silverlight Plug-in. 2019-07-05, 109👍, 1💬
Examples of Unicode Characters
This chapter provides notes and tutorial examples on the Unicode character set. Topics including introduction of Unicode standard, example characters, history of releases, blocks of code points. 2019-06-24, 3036👍, 6💬
DES Decryption Algorithm
This section describes DES decryption algorithm - identical to the encryption algorithm step by step in the same order, only with the subkeys applied in the reverse order. 2019-06-17, 1932👍, 3💬
This section provides a tutorial example on how to perform validation of a certificate path with the...
This section provides a quick introduction of the SecretKeySpec class and the KeySpec interface. The...
This section provides a tutorial example on how to use the getSelection() method to know which butto...
This PKI (Public Key Infrastructure) tutorial book is a collection of notes and sample codes written...
This section provides a tutorial example on how to create and delete a program service with 'sc.exe'...