9 Tutorial Topics

Remove Filter
Member Avatar for
Member Avatar for dimitrilc

## Introduction ## Although not included in the headlines, the release of JDK 17 also added 3 sets of new methods to the class `java.lang.Process`: 1. `inputReader()` to read from stdout. 2. `inputWriter()` to write to stdin. 3. `errorReader()` to read from stderr. In this tutorial, we are going to …

3
1K
Member Avatar for dimitrilc

## Introduction ## There are many ways to design secure Java objects. In this tutorial, we are going to learn how to create secure Java objects by understanding **Accessibility**, **Extensibility**, and **Immutability**. ## Goals ## At the end of this tutorial, you would have learned: 1. Understand how and why …

Member Avatar for JamesCherrill
2
144
Member Avatar for dimitrilc

## Introduction ## In this tutorial, we will focus on how to manage IO permissions to read, write, and delete local files using the `SecurityManager` class. ## Goals ## At the end of this tutorial, you would have learned: 1. What policy files are and how to use them. 2. …

2
246
Member Avatar for AccurateAG

PART 1 1. INTRODUCTION: When you are starting with your first SEO project, you may feel as if you have been told to empty the ocean with a teaspoon, there is so much to know and so much to do. Well, don't freak out, it is not as bad as …

Member Avatar for Naheedmir
16
24K
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
954
Member Avatar for happygeek

There are two very obvious truths which need to be stated before going any further: Truth 1 - prevention is better than cure, so don't visit 'dodgy' sites or download anything anyone sends you a link to, and do keep your PC as secure as possible with the help of …

Member Avatar for Stuugie
5
792
Member Avatar for FireNet

File I/O With C++ Fstream **Intro** File handling is as simple as writing in a book, much easier to modify and find. It's so simple people get confused with it :-). Welcome to the world of file handling. We will use the c++ fstream classes to do our file handling. …

Member Avatar for Swalih
5
11K
Member Avatar for Adamsappleone

Many of you know how to hide your important files and folders and burn them to disc to keep them from being accessed from other users, but if you your drive has so many files that it would take too long to copy all to disc, then why not hide …

Member Avatar for sanbafunv
0
342
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K

The End.