EC Cryptography Tutorials - Herong's Tutorial Examples
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive and multiplicative notations; ... 2019-07-06, 685👍, 3💬
Table Column Headers and Footers
This section provides a tutorial example on how to create tables with column headers and footers. table-header and table-footer formatting objects should go before table-body formatting object. 2019-06-06, 201👍, 1💬
"java --list-modules" - Listing Modules in JDK
This section provides a tutorial example on how to use 'java --list-modules' command to list all modules included in the JDK installation. 2019-06-01, 872👍, 4💬
Using Microsoft Word as a Unicode Text Editor
This chapter provides notes and tutorial examples on using Microsoft Word as a Unicode text editor. Topics including opening Unicode text files in 3 encodings: UTF-8, UTF-16BE, and UTF-16LE; saving and opening Unicode text files with the BOM character prepended. 2019-06-01, 309👍, 2💬
SoapUI Configuration for Messaging Encryption
This section provides a tutorial example on how to create a configuration entry to support SOAP messag encryption with an X.509 certificate in a JKS (Java KeyStore) file. 2019-06-01, 1986👍, 3💬
XML Notepad - XML Editor
This chapter provides notes and tutorial examples on XML Notepad. Topics include downloading and installing XML Notepad 2007; converting XML to pretty print format; XSD schema validation; XSLT transformation to HTML documents. 2019-06-01, 241👍, 2💬
How JSP Pages Are Processed?
This section describes how JSP pages are processed by the Web server. Two key steps are involved: 1) compilation of the JSP page into a Java Servlet class; 2) execution of the compiled class. 2019-05-30, 2926👍, 3💬
Retrieving Query Parameters and Headers
This section provides a tutorial example on how to retrieve input parameters from query string and request content, and retrieve request headers. 2019-05-21, 302👍, 1💬
Usage Examples of Public Key Infrastructure
This section provides some usage examples of PKI (Public Key Infrastructure), like HTTPS (Hypertext Transfer Protocol Secure) protocol, digital signature, encryption of documents, digital identification. 2019-05-14, 1916👍, 3💬
Downloading and Installing JDK 1.8.0 on Windows
This section provides a tutorial example on how to download and install JDK 1.8.0 (Java SE 8) on a Windows 7 system. A simple Java program was entered, compiled, and executed with the new JDK installation. 2019-05-13, 1362👍, 3💬
What Is Bitcoin Blockchain
This section describes what is Bitcoin Wallet. 2019-05-12, 136👍, 2💬
Client-Side Scripts for Event Handling
This section provides an overview of client-side scripting for event handling. Scripts registered as event handlers will be executed when events are triggered by the end user on the final Web page. 2019-05-10, 115👍, 1💬
tinyec - Python Library for ECC
This chapter provides tutorial notes on 'tinyec' Python library for ECC. Topics include installing 'tinyec'; creating ec.Curve objects, performing point addition and scalar multiplication. 2019-05-10, 106👍, 1💬
Passing Values between JSP Pages
This section provides a tutorial example on how to use different ways to pass values between JSP pages: putting values in 'session' or 'application' objects, or putting values at the end of redirect URL. 2019-05-05, 793👍, 5💬
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte bl...
What is test testing area for? The testing area is provided to allow visitors to post testing commen...
This section describes how to download and install Java SE Development Kit (JDK) 8u45 on a Windows s...
This section describes DES (Data Encryption Standard) algorithm - A 16-round Feistel cipher with blo...
This section provides a tutorial example on how to disable and remove 'Lync Browser Helper' addon fr...