Monday, March 30th, 2015

CSS Defaults and Resets

Browsers can have different default settings in their CSS. In this article we look at how to create a reset that overrides those defaults.

CSS Defaults and Resets

Be Sociable, Share this post with your friends.
    Sunday, March 29th, 2015

    Outlook and Replyingto Digitally Signed Emails

    There are three ways to send an email. The way most people use is to send their email as if it were a postcard. Anyone can access the email along the way and see what it says (and perhaps alter what it says) and there is no guarantee that it came from whoever it says sent it.

    If you install a digital certificate in your email program then you can send digitally signed emails that both confirm to the recipient that you sent it and confirm that no one has altered it along the way. Anyone can still read it though. One problem with signing an email though is that if the recipient is using Outlook or Outlook Express then their program defaults to signing the reply (which it can’t do if they don’t have a certificate of their own). They can of course change to send the reply unsigned but probably wouldn’t know how.

    With both parties having certificates the third method of sending emails where the content is encrypted so that only the intended recipient can read it is possible.

    Outlook and Replying to Digitally Signed Emails

    Get a free email certificate

    Be Sociable, Share this post with your friends.
      Saturday, March 28th, 2015

      What is a zip file?

      This page for beginners explains what a zip file is and what it is used for.

      What is a zip file?

      Be Sociable, Share this post with your friends.
        Friday, March 27th, 2015

        Two Hard Drives butOne Partition

        One way of combining drives into a single partition is to use a hardware solution involving RAID. There is an alternative that will work with regular hard drives provided that you are running an operating system that supports it and don’t try to make the operating system itself span multiple drives.

        Two Hard Drives but One Partition

        Be Sociable, Share this post with your friends.
          Thursday, March 26th, 2015

          The Book of CSS3: A Developer’s Guide to the Future of Web Design

          User rating:
          List price: $34.95
          Sales price: $25.34
          You save: $9.61 (27 %)
          Sales Rank: 192939
          Read more...



          The Book of CSS3: A Developer's Guide to the Future of Web Design : Peter Gasston: Book

          Be Sociable, Share this post with your friends.
            Thursday, March 26th, 2015

            One Field WithMultiple Values

            There are lots of different ways that newbies use to solve the problem where one field in their database is allowed to hold multiple values at the same time. One solution they might use is to provide multiple occurrences of the field (eg phone1, phone2, phone3, phone4) and another is to store all the values in the one field with commas in between. Using any approach like this is wrong and will just cause problems later when there are either not enough fields or the list becomes too long, not to mention the added complexity of queries trying to use such data. Such problems do not occur if you design the database properly in the first place.

            One Field With Multiple Values

            Be Sociable, Share this post with your friends.
              Wednesday, March 25th, 2015

              HTML5 Hacks

              User rating:
              List price: $34.99
              Sales price: $25.36
              You save: $9.63 (28 %)
              Sales Rank: 526515
              Read more...



              HTML5 Hacks : Jesse Cravens,Jeff Burtoft: Book

              Be Sociable, Share this post with your friends.
                Wednesday, March 25th, 2015

                Copyright and theWeb

                Many people mistakenly believe that the material they find on the web is not covered by copyright. In fact the same copyright laws exist on the web as exist elsewhere. The only differences are that it is easier for someone to copy something from the web and also easier for the owner to track down stolen copies so as to take action against the thief.

                Copyright and the Web

                Be Sociable, Share this post with your friends.
                  Tuesday, March 24th, 2015

                  Boolean Operators

                  There are three boolean operators that process true and false values in JavaScript. Here we look at some of the peculiarities in how they work both with regard to what is returned from an operation (which need not be a boolean) as well as where the order of precedence of the operators does not necessarily mean that the higher precedence operator gets run at all.

                  Boolean Operators

                  Be Sociable, Share this post with your friends.
                    Monday, March 23rd, 2015

                    Simple Class Processing in JavaScript

                    Referencing a specific id in a web page from JavaScript and then interacting with the element it is attached to has been easy to do ever since the Document Object Model was added to JavaScript. Now it is just as easy to do the same for all of the elements in a page that have a specific class attached thanks to the querySelectorAll DOM call and the Array.forEach method.

                    Simple Class Processing in JavaScript

                    Be Sociable, Share this post with your friends.
                      Monday, March 23rd, 2015

                      Mobile Developer’s Guide To The Galaxy: 15th Edition

                      User rating:
                      Read more...



                      Mobile Developer's Guide To The Galaxy: 15th Edition : Robert Virkus,Daniel Kranz,Anna Alfut,Ian Thain,Dean Churchill,Julian Harty,Chris Ward,Oscar Clark: eBooks

                      Be Sociable, Share this post with your friends.
                        Sunday, March 22nd, 2015

                        Breach of Privacy

                        Word documents are the absolute last format that anyone should ever consider uploading to the web because what is visible in the document is usually not all that the document contains.A knowledgeable person can extract past copies of the content out of the document and find out things you didn’t want them to know.

                        Breach of Privacy

                        Be Sociable, Share this post with your friends.