Ethereum Tutorials - Herong's Tutorial Notes
This free book is a collection of tutorials and notes on Ethereum and blockchain. Topics include Blockchain, Ethereum, Cryptocurrency, Mining, MetaMask, Wallet. 2018-05-11, 320👍, 2💬
This section provides a quick introduction of the UTF-16LE (Unicode Transformation Format - 16-bit Little Endian) encoding for Unicode character set. UTF-16LE is a variation of UTF-16. 2018-01-18, 4657👍, 6💬
java.time.Duration - Time Durations
This section describes the java.time.Duration class that represents a duration of time measured in seconds with fractions in nanosecond resolution. 2018-01-03, 172👍, 1💬
2-Step Message Encryption - Symmetric and RSA
This section describes how SoapUI performs the SOAP message entryption in 2 steps: encrypt the SOAP message with random secret key and encrypt the secret key with receiver's RSA public key. 2017-12-31, 182👍, 1💬
Variable Declaration and "Dim" Statement
This section provides a quick introduction of what is a variable and how variable can be declared explicitly with a Dim statement and implicitly with an assignment statement. 2017-12-30, 3225👍, 3💬
File_Input_Output_Test.php - File Input/Output Examples
This section provides a tutorial example script on how to use file input and output functions like fopen(), fread(), fwrite(), and fclose(). The example script copies any file in binary mode. 2017-12-28, 144👍, 3💬
OpenSSL Introduction and Installation
This chapter provides tutorial notes and example codes on OpenSSL. Topics include introduction of OpenSSL; installing OpenSSL on Windows systems. 2017-12-24, 697👍, 4💬
Downloading and Editing WSDL Document
This section provides a tutorial example on how to download the WSDL document from the Web service provider. You can change port.address[@location] to a localhost URL to local testing. 2017-12-18, 21859👍, 11💬
Reciprocity of Time Dilation
This section introduces the reciprocity of time dilation. Elapsed time of a moving clock is slower when measured by a stationary observer; and elapsed time of a stationary clock is slower when measured by a moving observer. 2017-12-09, 234👍, 2💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2017-12-09, 4304👍, 6💬
XML Editor and Schema Processor - XMLPad
This chapter provides notes and tutorial examples on the free XML editor and XML Schema processor, XMLPad. Topics include installing WMHelp XMLPad Pro, assigning XML Schema to XML documents, validating XML documents, generating XML schema diagram. 2017-12-04, 453👍, 1💬
This section describes what is Chinese astrology. 2017-12-04, 443👍, 2💬
Usage Examples of Public Key Infrastructure
This section provides some usage examples of PKI (Public Key Infrastructure), like HTTPS (Hypertext Transfer Protocol Secure) protocol, digital signature, encryption of documents, digital identification. 2017-11-30, 567👍, 2💬
Newton's Third Law of Motion
This section introduces Newton's Third Law of Motion - If a force is exerted by one object to another object, another force is simultaneously exerted by the second object to the first object with equal strength and opposite direction. 2017-11-28, 470👍, 1💬
SslReverseEchoer.java - SSL Server Socket Example
This section provides a tutorial example on how to write a sample program to create a SSL server socket to listen for incoming SSL socket connection requests from client machines. 2017-11-27, 992👍, 2💬
PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result. 2017-11-23, 1238👍, 3💬
Introduction of HTTPS (Hypertext Transfer Protocol Secure)
This chapter provides a quick introduction of HTTPS (Hypertext Transfer Protocol Secure). Topics include what is HTTPS; Web server authentication; communication data encryption. 2017-11-15, 1907👍, 3💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2017-11-10, 421👍, 2💬
This section describes how to download and install Java SE Development Kit (JDK) 8u45 on a Windows s...
This chapter provides notes and tutorial examples on XML Tools Plugin for Notepad++. Topics include ...
This section describes 'adb push' and 'adb pull' commands, which allows you to copy files to and fro...
This section describes differences between a SOAP 1.1 request and SOAP 1.2 request for GetSpeech Web...
This section provides a list of supported character encodings supported in Java. The list is generat...