cskane.blogspot.com
csKa blog: Cryptographic Techniques
http://cskane.blogspot.com/2007/12/cryptographic-techniques.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. Today, I would like to discuss some technical terms which are related to cryptography. Cryptography is the art of achieving security by encoding messages to make them non-readable. In general, we say that a message need to be encode is called plain text, while the encoded message is called cipher text. There are two primary ways to encode a plain text message, Substitution. Every encrypti...
cskane.blogspot.com
csKa blog: 2007.09
http://cskane.blogspot.com/2007_09_01_archive.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. The next topic planning to do is Searching. There are some basic searching method need to get familiar with. Breath First Search, Depth First Search. A*, IDA*, Bi-directional BFS. Http:/ acm.pku.edu.cn/JudgeOnline/problem? BFS: http:/ acm.pku.edu.cn/JudgeOnline/problem? BFS: http:/ acm.pku.edu.cn/JudgeOnline/problem? BFS: http:/ acm.pku.edu.cn/JudgeOnline/problem? Min Ratio ST *DONE*.
cskane.blogspot.com
csKa blog: 2007.12
http://cskane.blogspot.com/2007_12_01_archive.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. Answer of yesterday's game. Although it is not 24 hours yet, I still want to give the answer and solution to you. Here is the image hidden in each photo. Photos taken by Sam Rohn - Location Scout. Here is my source code. Which is written in python. If you want to run this code, you need to have the package Python Imaging Library (PIL). Http:/ en.wikipedia.org/wiki/Steganography. Today, I ...
cskane.blogspot.com
csKa blog: 2007.05
http://cskane.blogspot.com/2007_05_01_archive.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. Covering Rectilinear Polygons by Rectangles. Covering Rectilinear Polygons by Rectangles is a category of problems, the general definition of the problem: A board B. Is a finite set of unit squares lying in the plane whose corners have integer coordinates. A rectangle of B. Is a rectangular subset of B. A rectangle cover of B. Is a collection of rectangles whose union equals B. Theta is t...
cskane.blogspot.com
csKa blog: 2008.06
http://cskane.blogspot.com/2008_06_01_archive.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. I was writing blog about interesting security stuff before in blogspot. However, it seems that WordPress is a more interesting place to writing on. Mostly because its beautiful themes). I just start writing there, enjoy and feel free to visit my new blog. Http:/ cskane.wordpress.com/. Subscribe to: Posts (Atom). View my complete profile. Terrytao (Many research paper).
cskane.blogspot.com
csKa blog: 2008.05
http://cskane.blogspot.com/2008_05_01_archive.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. These days I am working on Ajax, learning how to do simple HTTP request through Ajax. Accidentally, I found an interesting property that js has: document.write(). Some of you may already know how to use it to do evil thing, but it is really new to me and I would like to share it with you. Let say we have a evil.html. Containing a piece of code as follow. XmlHttp = new XMLHttpRequest();.
cskane.blogspot.com
csKa blog: Cryptography and Network Security
http://cskane.blogspot.com/2007/12/cryptography-and-network-security.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. Cryptography and Network Security. I am reading this book " Cryptography and Network Security. Seems Amazon does not have this book, please tell me if you find it in Amazon). Seriously, I want to learn network security, and that's why I resume this blog for making notes when I am reading it. Hope you enjoy and rise questions or comments if you have any. The principle of confidentiality.
cskane.blogspot.com
csKa blog: Answer of yesterday's game
http://cskane.blogspot.com/2007/12/answer-of-yesterdays-game.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. Answer of yesterday's game. Although it is not 24 hours yet, I still want to give the answer and solution to you. Here is the image hidden in each photo. Photos taken by Sam Rohn - Location Scout. Here is my source code. Which is written in python. If you want to run this code, you need to have the package Python Imaging Library (PIL). Http:/ en.wikipedia.org/wiki/Steganography.
cskane.blogspot.com
csKa blog: document.write()
http://cskane.blogspot.com/2008/05/documentwrite.html
A boy like acm prog, Web Design, and webapp sec (novice). Learning PY and JS and learning to be a computer scientist. These days I am working on Ajax, learning how to do simple HTTP request through Ajax. Accidentally, I found an interesting property that js has: document.write(). Some of you may already know how to use it to do evil thing, but it is really new to me and I would like to share it with you. Let say we have a evil.html. Containing a piece of code as follow. XmlHttp = new XMLHttpRequest();.