techvj.blogspot.com
The Vijay Albuquerque Blog: Live and Die with jQuery
http://techvj.blogspot.com/2009/01/live-and-die-with-jquery.html
The Vijay Albuquerque Blog. Monday, January 19, 2009. Live and Die with jQuery. Is a JavaScript library that makes web programming simple and highly productive. With the new 1.3 release. Events. To understand. Events, we must recollect how things were done before the 1.3 release. To bind events to elements we used jQuery's. Input:type=button").bind("click", function() { alert($(this).val() ; });. The code above binds the. Only works on the set of elements currently in the DOM. The code below binds the.
techvj.blogspot.com
The Vijay Albuquerque Blog: 08/01/2007 - 09/01/2007
http://techvj.blogspot.com/2007_08_01_archive.html
The Vijay Albuquerque Blog. Sunday, August 12, 2007. Memory Monitoring on Security Now. Is a weekly podcast that focuses on the topic of computer security. I am a regular listener to the show and received a rather pleasant surprise to find a question that I had posted to the podcast being discussed. STEVE: Yup, it’s so nice. STEVE: Right, right. LEO: I think the memory manager does a pretty good job of getting rid of unused blocks. It can’t solve a memory leak, but nothing can solve it. If ...
techvj.blogspot.com
The Vijay Albuquerque Blog: 07/01/2007 - 08/01/2007
http://techvj.blogspot.com/2007_07_01_archive.html
The Vijay Albuquerque Blog. Tuesday, July 24, 2007. Lambda Probe - Manage Tomcat with Simplicity. Is arguably the most popular servlet container in use today. It has a well-established user base and is usually one of the first to implement new Servlet and JSP JSR specifications. Tomcat comes bundled with the Manager App. Lambda Probe installs as just another web application under Tomcat and provides a clean, simple visual interface for core administration and monitoring. Quick check is an instant way of ...
techvj.blogspot.com
The Vijay Albuquerque Blog: 01/01/2013 - 02/01/2013
http://techvj.blogspot.com/2013_01_01_archive.html
The Vijay Albuquerque Blog. Saturday, January 19, 2013. A Super Quick Start To Git. Is a distributed version control system. This post is helpful to someone who would like to get quickly started with Git. Once up and running with the commands below, the reader is encouraged to follow-up with the comprehensive documentation on Git available from many excellent online sources. This will help to grasp the core concepts of Git, which are essential for regular use. Create A New Repository. Initialises a new G...
techvj.blogspot.com
The Vijay Albuquerque Blog: 04/01/2008 - 05/01/2008
http://techvj.blogspot.com/2008_04_01_archive.html
The Vijay Albuquerque Blog. Wednesday, April 09, 2008. Advanced Filtering in GMail. That are an effective way to organize and access the huge number of emails that we receive everyday. That looks for emails sent to john cv@gmail.com and either flags them for your attention or at other times automatically deletes them! Email rules and filters have existed for a long time but GMail aliases take this to a whole new level. The possibilities (of email suffixes) are indeed endless! Subscribe to: Posts (Atom).
techvj.blogspot.com
The Vijay Albuquerque Blog: 03/01/2007 - 04/01/2007
http://techvj.blogspot.com/2007_03_01_archive.html
The Vijay Albuquerque Blog. Friday, March 30, 2007. Secure Email Attachments with TrueCrypt. Digital documents have finally come of age. We now increasingly receive our bank statements, insurance quotes and receipts as digital files such as Word or PDF. Also, there is often a need to attach these documents to an email. Securing these attachments in transit over the Internet is an immediate concern. There are a number of solutions available such as Hushmail. The concept of key files makes using Truecrypt ...
techvj.blogspot.com
The Vijay Albuquerque Blog: 03/01/2008 - 04/01/2008
http://techvj.blogspot.com/2008_03_01_archive.html
The Vijay Albuquerque Blog. Thursday, March 20, 2008. Almost all Java projects, apart from the most trivial ones have dependencies. These dependencies could either be on other projects or third-party libraries. Managing these dependencies can be extremely time-consuming and distracting from the primary focus of the project. Apache Ivy. Ivy is designed to work with Ant. The final step is to integrate the Ivy dependency resolution process with our Ant build process. Following is an example of a build&#...
techvj.blogspot.com
The Vijay Albuquerque Blog: 01/01/2009 - 02/01/2009
http://techvj.blogspot.com/2009_01_01_archive.html
The Vijay Albuquerque Blog. Monday, January 19, 2009. Live and Die with jQuery. Is a JavaScript library that makes web programming simple and highly productive. With the new 1.3 release. Events. To understand. Events, we must recollect how things were done before the 1.3 release. To bind events to elements we used jQuery's. Input:type=button").bind("click", function() { alert($(this).val() ; });. The code above binds the. Only works on the set of elements currently in the DOM. The code below binds the.
techvj.blogspot.com
The Vijay Albuquerque Blog: Perfect Paper Passwords - Two-Factor Authentication for the Masses
http://techvj.blogspot.com/2007/11/perfect-paper-passwords-two-factor.html
The Vijay Albuquerque Blog. Monday, November 12, 2007. Perfect Paper Passwords - Two-Factor Authentication for the Masses. Usernames and passwords have long been established as the de facto form of authentication. For websites and other systems. They provide a convenient system for authenticating and identifying users. However, they are also highly vulnerable to dictionary attacks, weak passwords, key-loggers etc. Recently, two-factor authentication. Steve Gibson from GRC. Quick Access in Eclipse.
techvj.blogspot.com
The Vijay Albuquerque Blog: 11/01/2007 - 12/01/2007
http://techvj.blogspot.com/2007_11_01_archive.html
The Vijay Albuquerque Blog. Monday, November 12, 2007. Perfect Paper Passwords - Two-Factor Authentication for the Masses. Usernames and passwords have long been established as the de facto form of authentication. For websites and other systems. They provide a convenient system for authenticating and identifying users. However, they are also highly vulnerable to dictionary attacks, weak passwords, key-loggers etc. Recently, two-factor authentication. Steve Gibson from GRC. Friday, November 02, 2007.
SOCIAL ENGAGEMENT