Java GC Tutorials - Herong's Tutorial Examples
This book is a collection of tutorial notes and sample codes written by the author while he was learning JVM GC (Garbage Collection) processes. Topics include Java Garbage Collectors, STW (Stop-The-World), Serial Collector, Parallel Collector, Concurrent Collector, G1 Collector, GC Algorithms, Gener... 2018-06-17, 248👍, 1💬
java.time.Duration - Time Durations
This section describes the java.time.Duration class that represents a duration of time measured in seconds with fractions in nanosecond resolution. 2018-01-03, 197👍, 1💬
2-Step Message Encryption - Symmetric and RSA
This section describes how SoapUI performs the SOAP message entryption in 2 steps: encrypt the SOAP message with random secret key and encrypt the secret key with receiver's RSA public key. 2017-12-31, 209👍, 1💬
Variable Declaration and "Dim" Statement
This section provides a quick introduction of what is a variable and how variable can be declared explicitly with a Dim statement and implicitly with an assignment statement. 2017-12-30, 3277👍, 3💬
File_Input_Output_Test.php - File Input/Output Examples
This section provides a tutorial example script on how to use file input and output functions like fopen(), fread(), fwrite(), and fclose(). The example script copies any file in binary mode. 2017-12-28, 144👍, 3💬
OpenSSL Introduction and Installation
This chapter provides tutorial notes and example codes on OpenSSL. Topics include introduction of OpenSSL; installing OpenSSL on Windows systems. 2017-12-24, 719👍, 4💬
Downloading and Editing WSDL Document
This section provides a tutorial example on how to download the WSDL document from the Web service provider. You can change port.address[@location] to a localhost URL to local testing. 2017-12-18, 22032👍, 11💬
Reciprocity of Time Dilation
This section introduces the reciprocity of time dilation. Elapsed time of a moving clock is slower when measured by a stationary observer; and elapsed time of a stationary clock is slower when measured by a moving observer. 2017-12-09, 262👍, 2💬
What Is SHA1 Message Digest Algorithm?
This section describes what is SHA1 (Secure Hash Algorithm 1) - a message digest algorithm which takes as input a message of arbitrary length and produces as output a 160-bit 'fingerprint'. 2017-12-09, 4361👍, 6💬
XML Editor and Schema Processor - XMLPad
This chapter provides notes and tutorial examples on the free XML editor and XML Schema processor, XMLPad. Topics include installing WMHelp XMLPad Pro, assigning XML Schema to XML documents, validating XML documents, generating XML schema diagram. 2017-12-04, 489👍, 1💬
This section describes what is Chinese astrology. 2017-12-04, 464👍, 2💬
Usage Examples of Public Key Infrastructure
This section provides some usage examples of PKI (Public Key Infrastructure), like HTTPS (Hypertext Transfer Protocol Secure) protocol, digital signature, encryption of documents, digital identification. 2017-11-30, 633👍, 2💬
Newton's Third Law of Motion
This section introduces Newton's Third Law of Motion - If a force is exerted by one object to another object, another force is simultaneously exerted by the second object to the first object with equal strength and opposite direction. 2017-11-28, 491👍, 1💬
SslReverseEchoer.java - SSL Server Socket Example
This section provides a tutorial example on how to write a sample program to create a SSL server socket to listen for incoming SSL socket connection requests from client machines. 2017-11-27, 1256👍, 2💬
PHP Implementation of DES - mcrypt
This chapter provides tutorial examples and notes about PHP implementation of DES. Topics include introduction of mcrypt library; mcrypt encryption functions; DES encryption and decryption test program and test result. 2017-11-23, 1279👍, 3💬
Introduction of HTTPS (Hypertext Transfer Protocol Secure)
This chapter provides a quick introduction of HTTPS (Hypertext Transfer Protocol Secure). Topics include what is HTTPS; Web server authentication; communication data encryption. 2017-11-15, 1961👍, 3💬
How Secure Is RSA Algorithm?
This section discusses the security of RSA public key encryption algorithm. RSA private key is not 100% secure. But if the private key uses larger value of n = p*q, it will take a very long time to crack the private key. 2017-11-10, 444👍, 2💬
"base64Binary" Datatype Values and Representations
This section describes the built-in primitive datatype, 'base64Binary' that represents binary data represented in Base64 encoding. Whitespaces are allowed and removed. 2017-11-08, 4983👍, 3💬
This section provides a tutorial Java program, CipherDES.java - A Java Implementation of DES encrypt...
中國年歷 - 2017 年年歷 - 雞年
This chapter provides tutorial examples and notes on runtime error handling. Topics include the defa...
This section provides a tutorial example on how to write a HTTPS server test program, HttpsHello.jav...
This section provides a tutorial example on how to create a JAR file with the 'jar' command.