ArchiveApril 2019

What is PHP Data Objects

W

PDO, an acronym for PHP Data Objects, is a PHP extension that can be used as an abstraction level for the connection between PHP programs and various databases. PHP Data Objects (PDO) is a PHP extension that defines a light, consistent interface for accessing PHP databases. Each database driver, which implements the PDO interface, can expose database-specific features through common expansion...

What is AngularJS

W

AngularJS is an open-source JavaScript framework built and maintained by Google, which facilitates the development of web applications. AngularJS standardizes client-side applications, providing a robust and easy to implement structure in site development. Why AngularJS? 1. Easy to understand 2. Sponsored by Google 3. Guidelines 4. Well documented 5. Thought for REST 6. Very fast 7. Pattern MVW 8...

What is an assembly language

W

An assembly language is a computer programming language that, instead of the machine code, uses a symbolic designation of program elements, relatively easy to read and interpreted by humans. It is used mostly to increase the running speed of programs. What are the advantages and disadvantages of using an assembly language Although it is one of the oldest programming languages, the assembly...

The NIX package manager

T

A package manager is a collection of applications that provide a consistent and automatic way to install, configure, update and delete software packages from a computer. The term is generally used on Unix systems, especially Linux, as they rely heavily on the package library, a typical installation with thousands of individual packages. A package usually contains an application, a library, or a...

What is Krita

W

Krita is free software and a raster open-source graphics editor, designed primarily for digital painting and animation. It features a minimalist UI, high-quality OpenGL acceleration canvas, color management support, advanced brush engine, non-destructive layers and masks, group-based layer management, vector art support, and customizable profiles switched. It runs on Linux, Microsoft Windows, and...

What is WireShark

W

Wireshark is an open source application that monitors data packets. It is used to troubleshoot network problems, analyze traffic, develop software products, and communicate protocols for educational purposes. Wireshark is a free packet sniffer that captures packets that are sent on a particular network interface. The functionality of Wireshark is similar to tcpdump, but the first one has a...

What is Nmap

W

Nmap is a security scanner originally written by Fyodor Vaskovich used to discover hosts and services on a computer network, creating a map of the network. To achieve its goal, Nmap sends specially formatted packages to the target host and then analyzes the responses. Although Nmap functions have increased in number over time, it has started as an efficient port scanner and remains this at its...

What do less more sort and sed commands do

W

The less, more, sort and sed commands are text processing commands. A word processor, or textual document preparation system, is an application used for producing (composition, editing, page layout, or formatting, possibly printing) of any type of material for printing. The UNIX more command prints the contents of a file on the screen. The file is printed on a page-by-page basis, so it also...

What is a compiler

W

A compiler is a software or an array of software, that translates the text of a program written in a source language into another computer language called target language. The original source is usually called source code and the object code result. The name “compiler” is used for a program that translates from a high-level language into a low-level language. A program that performs...

What is Asymmetric Cryptography

W

Asymmetric cryptography is a type of cryptography that uses a pair of keys: a public key and a private key. A user holding such a pair publishes their public key so anyone who wants to use it to send them an encrypted message. Only the private key holder is the one who can decrypt the encrypted message. In 1874, a book written by William Stanley Jevons described the relationship between non...

Recent Posts

Archives

Categories