Search Results

Search found 4544 results on 182 pages for 'hacker news'.

Page 126/182 | < Previous Page | 122 123 124 125 126 127 128 129 130 131 132 133  | Next Page >

  • Seesmic and Silverlight Provide an Extensible Social Platform

    This week, Seesmic announced a new Seesmic Desktop platform. They finally revealed more details to the public and released developer previews of their shell, SDK and some sample plugins. You can get them on the Seesmic Developer Wiki. The best part? Its built on Silverlight 4 and the Managed Extensibility Framework (MEF)! This is awesome news for those of us who have been using various clients that have been locked down to specific use scenarios. There always is a few things I want/need/etc in...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Le framework PHP Jelix disponible en version 1.4 : compatibilité PSR0, templates virtuels et gestion du cache HTTP à la une

    Jelix 1.4 est disponible ! Compatibilité PSR0, templates virtuels et gestion du cache HTTP à la une du framework PHP Dans toute cette agitation de mise à jour de framework PHPn, on aurait presque oublié la sortie de Jelix. [IMG]http://idelways.developpez.com/news/images/jelix.png[/IMG] Jelix est et reste l'un des meilleurs frameworks PHP existants et cela par sa conception bien souvent en avance sur d'autres outils. Je pense à la modularité et à la gestion d'événements mises en place dans Jelix depuis de nombreuses années et qui font à peine leurs apparitions sur certains frameworks dits majeurs. Une nouvelle version majeure de Jelix ...

    Read the article

  • Kindle Screen as Informational Display (weather, unread emails, calendar)

    - by coder543
    I'm looking to create a type of homepage for my kindle like you might expect to see upon waking up (though realistically, I plan on using it as a secondary screen throughout the day) whereupon it shows you several things dividing the screen, but not being scrollable. I just want the summary to fill the screen of the web browser. It would show the weather my gmail inbox my calendar for the day maybe some tech news However, as a starting question, how would I go about embedding my gmail inbox into the page? I would love to put m.gmail.com into an iframe restricted to a certain portion of the screen, but I know that won't likely be happening. Any ideas on how to embed an email summary or the calendar? (both served by Google) I've got the weather part working via AccuWeather's embed-able widget. I was inspired by this: http://lifehacker.com/5943867/hack-a-kindle-into-a-weather-display

    Read the article

  • iOS 6 "jailbreaké" moins d'une journée après son lancement par le groupe de hackers Dev-Team, l'iPhone 5 bientôt déverrouillé ?

    iOS 6 "jailbreaké" moins d'une journée après son lancement Par le groupe de hackers Dev-Team, l'iPhone 5 bientôt déverrouillé ? L'iPhone Dev-Team, un groupe de hackers indépendant spécialisé dans les produits Apple, a réussi à créer un Jailbreak (déverrouillage) pour l'iOS 6. Cette annonce est survenue moins d'une journée après la sortie de ce dernier. [IMG]http://idelways.developpez.com/news/images/jailbreak.jpg[/IMG] Sorti dans la lignée du célèbre outil redsn0w, le jailbreak fonctionne seulement pour l'iPhone 4, l'iPhone 3GS et la quatrième génération de l'iPod Touch, soit uniquement des dispositifs équipés de processeurs A4. L'iPhone 5 n'est ...

    Read the article

  • Using <strong> for introductory paragraph to a post - a bad idea?

    - by user1515699
    I have a news website and on most posts the first paragraph is in bold. Currently the authors are just using <strong> to bold the paragraph, would it be better from an SEO point of view to rather use a paragraph class that is styled with p.bold {font-weight:bold;} <p class="bold">. Does <strong> on the first paragraph send the wrong message to search engines? The text is important but the main reason it is in bold is because it is the opening paragraph. I realise <strong> is used to emphasise certain words on a page

    Read the article

  • NoSQL : MongoDB 2.2 est disponible, framework d'agrégation, meilleure gestion des clusters distribués et de l'accès concurrentiel

    NoSQL : MongoDB 2.2 est disponible Framework d'agrégation, meilleure gestion des clusters distribués et amélioration de l'accès concurrentiel 10Gen, l'entreprise derrière le SGBD populaire MongoDB, vient d'annoncer la dernière version de l'outil, à savoir la 2.2. Elle comporte des fonctionnalités anticipées dans la Developer Preview de la 2.1, mais adaptées à un environnement de production. [IMG]http://idelways.developpez.com/news/images/mongodb.png[/IMG]L'apport le plus important de cette version est un nouveau framework d'agrégation en temps réel idéal pour les opérations complexes d'analyse. Celui-ci permettra de récupérer et de manipuler les données dans MongoDB, san...

    Read the article

  • Google Games Chat #3!

    Google Games Chat #3! The Google Games Chat is back! Now with a little bit of structure! Come check out the hot new property that Web Pro News raved "a show", and what we here at Google call "45 minutes away from doing real work." We'll be chatting about games, industry trends, and making bold new predictions that will probably look ridiculously wrong in three years. As always, please ask questions in the Google Moderator section below, and we might even get around to answering one or two. From: GoogleDevelopers Views: 0 0 ratings Time: 00:00 More in Science & Technology

    Read the article

  • MVC 2 Client Side Model Validation with ExtJS

    One of the most exciting new features in MVC 2 is "Enhanced Model Validation support across both server and client"; this new enhanced support allows for client side validation to be dynamically generated into a view from DataAnnotations attributes on models. One minor complaint: Out of the box, it only supports the Microsoft AJAX libraries. Good news: It can use other frameworks, and we have done just that! Ext.ux.MvcFormValidator The MvcFormValidator is an alternative form validation...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Silverlight : vers une fin programmée ? Microsoft ferme Silverlight.net, le site de référence sur la technologie

    Silverlight : vers une fin programmée ? Microsoft ferme Silverlight.net, le site de référence sur la technologie L'avènement du HTML5 a mis en mal les technologies de développement d'applications Web riches (RIA) comme Silverlight et Flash. Voici aujourd'hui pratiquement un an que Microsoft a publié Silverlight 5. Depuis, l'éditeur n'a plus fait mention d'une évolution de la technologie en dehors de la sortie discrète d'une mise à jour mineure (Silverlight 5.1). [IMG]http://idelways.developpez.com/news/images/silverlight-logo.jpg[/IMG] Par contre, Microsoft accorde une attention particulière à HTML5, qui occupe une place de...

    Read the article

  • Goings On

    The last several weeks have been pretty hectic for me. First, Visual Studio 2010 and .NET Framework 4 shipped. Of course, only those living in caves and under rocks missed that bit of news. However, that event forced me to leave my own cave and make a few public appearances. April 12-15 - DevConnections, Las Vegas One thing that I love about the Bellagio is how they go out of their way to make me comfortable by naming their convention center rooms after the...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Google s'exprime sur ses règles de confidentialité, dans une lettre ouverte en réponse aux recommand

    Mise à jour du 11.05.2010 par Katleen Google s'exprime sur ses règles de confidentialité, dans une lettre ouverte en réponse aux recommandations européennes Google vient enfin de répondre à la lettre salée qu'il avait reçue de la part de la CNIL et de neuf autres organisations européennes (voir news précédente ci-dessous), dans un courrier ouvert rendu public ce jour. La firme de Mountain View y expose sa vision de la collecte de données personnelles et rappelle ses règles de confidentialité maison. Google met en avant le fait que ses utilisateurs sont informés des données qu'il récolte et conserve, avant de déclarer utiliser ces informations pour «fournir des produits et services util...

    Read the article

  • Google quitterait la Chine dès le 10 avril et l'annoncerait lundi, selon une source proche du dossie

    Mise à jour du 19 03 2010 par Katleen Google quitterait la Chine dès le 10 avril et l'annoncerait lundi, selon une source proche du dossier Une nouvelle source anonyme vient d'évoquer le possible départ de Google avec, cette fois, une date précise de cessation d'activités. D'après un collaborateur de la firme de Mountaiw View, "Google quitterait la Chine le 10 avril, mais Google n'a pas confirmé l'information pour le moment". Ce témoignage a été reccueilli par CBN (China Business News), et annonce une prise de parole officielle de Google pour expliquer l'organisation de ce départ dès lundi. A suivre donc. Mise ...

    Read the article

  • Les autorités américaines préparent un procès d'envergure contre Google, qui risque également des poursuites en Europe

    Les autorités américaines préparent un procès d'envergure contre Google Qui risque des poursuites des deux côtés de l'Atlantique pour ?comportement préférentiel? Le New York Times a publié un rapport dévoilant que la FTC (Federal Trade Commission) prépare un nouveau procès antitrust contre Google. Le dossier de l'affaire contient un mémo détaillé de plus de 100 pages, qui tente de répondre à la question de savoir si Google manipule ses résultats de recherche afin de favoriser ses services et de désavantager les produits de ses concurrents. [IMG]http://x-plode.developpez.com/images/news/40-fonctionnalites-google/google.jpg[/IMG] L'enquête est tenue par les procureu...

    Read the article

  • Apple désactive les plug-ins Java de tous les navigateurs sous Mac OS X via mise à jour du système

    Apple désactive les plug-ins Java de tous les navigateurs Sous Mac OS X via mise à jour du système Apple désactive les plug-ins Java de tous les navigateurs lors de l'installation de la dernière mise à jour de son système d'exploitation Mac OS X. La firme déclare sur le bulletin de mise à jour que cette dernière « désinstalle le plug-in d'applet Java, fourni par Apple, de tous les navigateurs Web ». [IMG]http://idelways.developpez.com/news/images/java-vulnerabilite.jpg[/IMG] Les utilisateurs qui veuillent continuer d'utiliser Java doivent désormais se procurer le plug-in nécessaire auprès d'Oracle. Apple ne fournit pas détails sur l...

    Read the article

  • Secunia PSI 3.0 has just been released?

    - by TATWORTH
    I have been using Secunia 3.0 Beta for some time and recommend it to all PC users. It is free for personal use. I suggest you use to keep your PC software up to date. Here is the message they sent:We just wanted to let you know that Secunia has released the final versionof Secunia PSI 3.0, featuring a new and simplified interface, moreautomated updates, multiple languages (English, German, Spanish, Frenchand Danish), as well as a lot of other improvements that we hope you willlike. You can download the new version here (it is of course still available forfree):http://secunia.com/vulnerability_scanning/personal/And if you want a quick product tour see the PSI video on Youtube:https://www.youtube.com/watch?v=iUmaLmO0gx0&list=UU8EGaYoGIGlMAbfeJrS_0OQ&index=2&feature=plcp If interested you can also read the full press release here:http://secunia.com/company/blog_news/news/319/

    Read the article

  • Comment stimuler la présence des femmes dans l'IT ? Elles ne représentent que 35% des effectifs

    Mise à jour du du 02.04.2010 par Katleen Comment stimuler la présence des femmes dans l'IT ? Elles ne représentent que 35% des effectifs Et voici de nouveau la seule femme de l'équipe news qui va, encore une fois, vous parler de la situation de la gente féminine dans les milieux informatiques professionnels. Le site de recrutement anglais IT Job Board vient de publier une étude surce sujet. En Europe, seulement un tiers des salariés en informatique sont des femmes (soit 35% des effectifs). De plus, ces dernières ne sont pas satisfaites de leur conditions de travail, dont elles pensent qu'elles pourraient être améliorées. 51 % des femmes interrogées en Angleterre c...

    Read the article

  • What are some interesting fringe programming topics that might have hands-on training?

    - by hal10001
    Whenever training topic questions are asked, the answers are fairly typical, and involve a pretty limited subset of topics like OO, design patterns, algorithms, web services, SQL, etc., but I wonder if there are some fringe topics that are still applicable to the programming field and would give me a more rounded approach to development. When I think of "fringe", I think of 2600: The Hacker Quarterly articles that discuss how to use real world (sometimes obscure) exploits, or something like Maker Faire that demonstrates embedded systems programming using Arduino. I have around $1500-2000 to spend, and my job entails Java technologies, but that does not limit my options.

    Read the article

  • Is it viable and necessary to encrypt bytes?

    - by Shervin
    We have a requirement from customer that if someone gets access to the database, all data that includes personal information should be encrypted, so that when they do select calls, they shouldn't be able to see anything in clear text. Now this isn't any problem for Strings, but what about bytearrays? (that can potentially be quite huge (several 100mb)) When you do a select call, you get gibberish anyways. Is it possible for a hacker to somehow read the bytes and get the sensitive information without knowing how the structure of the object it is mapped against is? Because if that is the case, then I guess we should encrypt those bytes, even if they can potentially be quite huge. (I am guessing adding encryption will make them even bigger)

    Read the article

  • Control Windows VM from Linux Host

    - by vy32
    I am looking for a tool that will allow me to monitor and control programs running inside a Windows VM from the Linux host machine. I realize that this is similar to what a rootkit would do, and I am completely happy to use some hacker software if it provides the necessary functionality (and if I can get it in source-code form). If I can't find something, I'll have to write it using C. Probably an embedded HTTP server running on an odd port and doing some kind of XMLRPC thing. Here is the basic functionality I need: Get list of running processes Kill a process. Start a process Read/write/create/delete files I would like to: - Read contents of screen - Read all controls on screen. - Send arbitrary click to a Windows control. Does anything like this exist?

    Read the article

  • How do you embed a resource so that it can be accessed for icons?

    - by fneep
    I have a C# project using VS2005. Basically I have two icons, one for the application, and one for files that are associated with the application. I have associated these files with the application, and I know how to set their icons in the Registry, but I can only set them to the application icon because it seems to be the only external resource. To show what I mean, I've built the app and opened it with Resource Hacker, and you'll notice only one of the two icons is there, using one icon and one icon group.

    Read the article

  • Browser for cross-site-script testing (for testing Mozilla Add-On)

    - by Anthony
    I am working on a Firefox extension that will involve ajax calls to domains that would normally fail due to the same-origin policy set by Firefox (and most modern browsers). I was wondering if there is a way to either turn off the same-origin restriction (in about:config, perhaps) or if there was a standard lite-browser that developers turn to for this. I really would like to avoid using any blackhat tools, if possible. Not because I'm against them, I just don't want to add another learning curve to the process. I can use curl in PHP to confirm that the requests work, but I want to get started on writing the js that the addon will actually use, so I need a client that will execute js. I also tried spidermonkey, but since I'm doing the ajax with jquery, it threw a fit at all of the browser-based default variables. So, short version: is there a reliable browser/client for cross site scripting that isn't primarily a hacker app? Or can I just turn off same-domain policy in Firefox?

    Read the article

  • What's a reliable and practical way to protect software with a user license ?

    - by Frank
    I know software companies use licenses to protect their softwares, but I also know there are keygen programs to bypass them. I'm a Java developer, if I put my program online for sale, what's a reliable and practical way to protect it ? How about something like this, would it work ? <1> I use ProGuard to protect the source code. <2> Sign the executable Jar file. <3> Since my Java program only need to work on PC [I need to use JDIC in it], I wrap the final executable Jar into an .exe file which makes it harder to decompile. <4> When a user first downloads and runs my app, it checks for a Pass file on his PC. <5> If the Pass file doesn't exist, run the app in demo mode, exits in 5 minutes. <6> When demo exits a panel opens with a "Buy Now" button. This demo mode repeats forever unless step <7> happens. <7> If user clicks the "Buy Now" button, he fills out a detailed form [name, phone, email ...], presses a "Verify Info" button to save the form to a Pass file, leaving license Key # field empty in this newly generated Pass file. <8> Pressing "Verify Info" button will take him to a html form pre-filled with his info to verify what he is buying, also hidden in the form's input filed is a license Key number. He can now press a "Pay Now" button to goto Paypal to finish the process. <9> The hidden license Key # will be passed to Paypal as product Id info and emailed to me. <10> After I got the payment and Paypal email, I'll add the license Key # to a valid license Key list, and put it on my site, only I know the url. The list is updated hourly. <11> Few hours later when the user runs the app again, it can find the Pass file on his PC, but the license Key # value is empty, so it goes to the valid list url to see if its license Key # is on the list, if so, write the license Key # into the Pass file, and the next time it starts again, it will find the valid license Key # and start in purchased mode without exiting in 5 minutes. <12> If it can't find its license Key # on the list from my url, run in demo mode. <13> In order to prevent a user from copying and using another paid user's valid Pass file, the license Key # is unique to each PC [I'm trying to find how], so a valid Pass file only works on one PC. Only after a user has paid will Paypal email me the valid license Key # with his payment. <14> The Id checking goes like this : Use the CPU ID : "CPU_01-02-ABC" for example, encrypt it to the result ID : "XeR5TY67rgf", and compare it to the list on my url, if "XeR5TY67rgf" is not on my valid user list, run in demo mode. If it exists write "XeR5TY67rgf" into the Pass File license field. In order to get a unique license Key, can I use his PC's CPU Id ? Or something unique and useful [ relatively less likely to change ]. If so let's say this CPU ID is "CPU_01-02-ABC", I can encrypt it to something like "XeR5TY67rgf", and pass it to Paypal as product Id in the hidden html form field, then I'll get it from Paypal's email notification, and add it to the valid license Key # list on the url. So, even if a hacker knows it uses CPU Id, he can't write it into the Pass file field, because only encrypted Ids are valid Ids. And only my program knows how to generate the encrypted Ids. And even if another hacker knows the encrypted Id is hidden in the html form input field, as long as it's not on my url list, it's still invalid. Can anyone find any flaw in the above system ? Is it practical ? And most importantly how do I get hold of this unique ID that can represent a user's PC ? Frank

    Read the article

  • What's the funniest user request you've ever had?

    - by Shaul
    Users sometimes come up with the most amusing, weird and wonderful requirements for programmers to design and implement. Today I read a memo from my boss that we need the "ability to import any excel or access data, irrespective of size, easily and quickly." From the same memo, we have a requirement to "know if anyone unauthorized accessed the system" - as if a hacker is going to leave his calling card wedged between an index and a foreign key somewhere. I think my boss has been watching too much "Star Trek"... :) What's the funniest user request you've ever had?

    Read the article

  • Telling between a "natural" HTTP 404 and a PHP Generated one

    - by JCOC611
    So I have a file that should never be accessed by a user directly, but included in another PHP file. If the file is called directly, it generates a HTTP Status 404 Not Found to trick a possible attacker that such file doesn't exist. However, if the hacker could tell that the 404 was generated by PHP or is not "natural" then the whole point of the header would be lost. So is it possible to tell whether the 404 was generated by the server naturally (because the file really doesn't exist) or by a PHP code? PS: I know this question might seem pretty weird lol

    Read the article

  • Resources for TDD aimed at Python Web Development

    - by Null Route
    I am a hacker not and not a full-time programmer but am looking to start my own full application development experiment. I apologize if I am missing something easy here. I am looking for recommendations for books, articles, sites, etc for learning more about test driven development specifically compatible with or aimed at Python web application programming. I understand that Python has built-in tools to assist. What would be the best way to learn about these outside of RTFM? I have searched on StackOverflow and found the Kent Beck's and David Astels book on the subject. I have also bookmarked the Wikipedia article as it has many of these types of resources. Are there any particular ones you would recommend for this language/application?

    Read the article

< Previous Page | 122 123 124 125 126 127 128 129 130 131 132 133  | Next Page >