Friday, January 18, 2019

Let’s Encrypt finally released the Wildcard certificate

As the title, Let's Encrypt finally released the Wildcard (general domain name) certificate after several rounds of jump tickets, the folk called: wild card Let's Encrypt is a digital certificate authority launched in...

What is EDR?

EDR (Enhanced data rate) is an abbreviation of the enhanced rate in Bluetooth technology. It is characterized by greatly improving the data transmission rate of Bluetooth technology, reaching 2.1Mbps, which is...

REST API design – resources and HTTP based REST APIs

If you have plans to build an API, then make sure that it will be useful for the clients and consumers. In order to design a good API, there are some...

What is the difference between the sata2 and sata3 interfaces? Sata2 and sata3 interface...

SATA2 and SATA3 motherboard hard disk interface appearance is basically the same, but many low-end motherboards still use sata2 and sata3 dual interface hybrid mode, like AMD platform A75, Intel platform...

How to set up Win7 printer in just few steps

PS - Win7 system computer and XP system computer can not share the print, but after the following small test found that Win7 and Win7 computer between the Win7 and XP can...

What Is Big Data Analytics On Social Media?

The digital revolution we are already seeing in the world is taking everything online. This means that the IoT (Internet of Things) is becoming bigger and bigger. What most people do...

Google launches AutoDraw Black Technology Soul Painter saved

Google has come up with a new "toy", a " black technology " named "AutoDraw ." It is said to be able to save a group of hand-scarred people who can't paint. To tell the truth, based on...

What is XSS attack and more about it.

About XSS attack cross-site scripting attack, when users browse the web, the embedded script code is executed, thus achieving the purpose of attacking users, common vulnerability pages, website search Page, message board. To...

What’s the Difference between SeedBox vs VPN?

Why do you expect Security? I cannot use my online functionality with maximum security. One report and I will lose my account and all information. Another reason for IP recognition is...

Top 10 common hacking techniques you should know

"With simple hacking, hackers can understand unauthorized personal information that you may not want to disclose. Learn about these common hacking techniques, such as phishing, DDoS, clickjacking, etc., to facilitate your personal...