Tuesday, May 17, 2011

Arsene Wenger Tips Diet

My new Linux


For personal reasons I changed my old linux (a debian) for new linux. And I chose Linux Mint, why? Its simplicity, ease of use and as homestyle. It's great for me.

If we consult the Wikipedia will tell us:

Linux Mint is a distribution of GNU / Linux distribution based on Ubuntu (which in turn is based on Debian). As of September 7, 2010 Also available is a Debian-based editing, supports the latter shares the same repositories.

Linux Mint keeps a current inventory, a stable operating system for the average user, with a strong emphasis on usability and ease of installation. It is known for being easy to use, especially for users without previous Linux experience. Besides this

your community is very active, I found a English-language web. Leave

Links:
http://www.linuxmint-hispano.com/
http://www.linuxmint.com/

Monday, May 16, 2011

Psittacosisfrom Grey Parrots

"Not One Less" The ESB Project Gonzalez Catan La Salle

The project has the intention of responding to the problems of school failure, repetition and dropout in a neighborhood with higher socio-educational vulnerability of Buenos Aires. The school, founded recently, has developed various strategies and actions to transform these problems, such as tutoring and summer school. Aiming to strengthen the role of youth in their community, the school has developed some charitable projects in isolation, and help support program to develop an institutional program of service learning.

Through work in a subject, students ESB La Salle began to worry about health issues and housing in the locality. The poor state of hospitals, lack of sewage and drinking water led to the spread of disease in much of the population.

One of the teachers was the one who proposed to the young people to submit projects to address citizen participation. In this way, students could recognize the lack of adequate medical care in a protected environment and decent housing, among others.

Students are sensitized to the problems of the neighborhood, it was suggested to the guys who think ideas or alternatives to address these shortcomings. It was thus put together a list of proposals: street paving, access to potable water supply and sewerage to all households, the greater offer of free workshops in all districts, recovery and maintenance of green spaces and housing.

Under Computer classes last year at school the idea of \u200b\u200bcreating the blog www.esblasallecatan.blogspot.com where they began to turn their efforts to improve the situation neighborhood. " With this blog we want to communicate what our problems," says the first post of the boys of ESB La Salle Gonzalez Catan.


Sunday, May 15, 2011

Sandra Bullock Affair





AppFuse is a web based application where the task of connecting all the frameworks already been done (by Matt Raible, which is a guarantee of sufficient quality). It is very useful for certain projects, especially those with large number of rules associated with business users and their permissions on the application. However, to achieve this, the glue used is too strong and is difficult to change the behavior of what is known as the "core" of AppFuse.

For simple applications, or control over the development process, there is AppFuse Light. Spring always around as implementing dependency injection, you can choose from 60 combinations of MVC and persistence frameworks.

AppFuse uses Maven for the purpose of automation, from the compilation and generation of WAR to the execution of unit tests or the application itself Jetty container.

What you should do is go to the following URL and find the framework we need. This query will return the maven archetype to create our project.

For example if I want a multi-module project with the tapestry of maven archetype is:

mvn archetype: generate-B-DarchetypeGroupId = org.appfuse.archetypes-DarchetypeArtifactId = appfuse-basic-tapestry-archetype-DarchetypeVersion = 2.1.0 -DgroupId = com.mycompany-DartifactId = myproject-DarchetypeRepository = http://oss.sonatype.org/content/repositories/appfuse

leave links:

Soaps Without Betaine

AppFuse with Prototype Ajax Programming


Prototype, a JavaScript that implements the Ajax frameworks. Is object oriented, general purpose, ie can be used even in projects that involved no Ajax. Prototype

introduces an object called Ajax that, like all other objects and other functions seeks to eliminate the incompatibilities between browsers. In the case of Ajax, the XMLHttpRequest object differences between Mozilla Firefox and Microsoft ActiveX object in Internet Explorer. Internally, Prototype initializes an XMLHttpRequest object as follows:

 var Ajax = {
getTransport: function () {return
Try.these (
function () {return new XMLHttpRequest ()},
function () {return new ActiveXObject ('Msxml2.XMLHTTP ')},
function () {return new ActiveXObject (' Microsoft.XMLHTTP ')}
)

{method: 'get', parameters
'a = 1 & b = 2', onComplete
: funcionReceptora

});

 Request 
The method takes two arguments: the URL destination in which to settle the request (page, web service, flat file, etc.) and a series of data in JSON notation. Some of the possible are:


method: communication method (POST or GET).

parameters: parameters.

onComplete: function that is invoked when the transaction is complete.
asynchronous: asynchronous communication (true by default) or synchronous (false).

onSuccess: function to invoke when the transaction is completed successfully.
    onFailure: function to be invoked if there is a problem during the transaction.
  • evalScripts: true to evaluate JavaScript code of the response.
  • The function that takes control upon completion of the transaction (known as funcionReceptora) automatically takes the response as an argument:
  • funcionReceptora function (response) {
  • $ ('result'). InnerHTML = Respuesta.responseText;}
  • The answer admits the XMLHttpRequest object's properties, eg


responseText (response returned by the server).
 responseXML (response returned by the server validates as XML). 

status (response status).
statusText (description of the state).


This was a short summary of the use of Prototype
  • , leave links:
  • http://www.prototypejs.org/
  • http://api.prototypejs.org/

http : / / www.prototypejs.org / learn

Saturday, May 14, 2011

Substitute To Polaroid 600 Film




We have often heard the phrase "Programming is learned programming" and I personally believe that nothing is further from the truth. The program is a strategy game like chess, it is necessary to study. Because anyone can move the chess pieces but playing well with basics and knowing the plays, very few.
is also true that some people are born with the ability to solve problems more easily and learn, but equally it does not excuse to stop studying.
Experience is a great tool but not the only developer. He left a The smart learn from their mistakes, the wise man's mistakes.

Wednesday, May 11, 2011

Soap To Treat Folliculitis

phrase you learn programming in Erlang Concurrency



intelligent person recovers from a failure, it is not never recover from a success.





... Nor the success of others.

Sunday, May 8, 2011

Can A Woman Get A Hernia




We've discussed this before:
http://emanuelpeg.blogspot.com/2010/09/concurrencia-en-erlang.html
But let's do a review, Erlang is a concurrent programming language and a delivery system that includes a virtual machine and libraries. It was designed in the company Ericsson for distributed applications, fault tolerant, soft-real-time and uninterrupted operation. Provides hot swapping of code so that it can be changed without stopping the system. Originally, it was a proprietary language Erlang from Ericsson, but was licensed as open source software in 1998. The implementation of Ericsson is primarily performed but also includes a HIPE compiler (only supported on some platforms).
Among the major achievements of the platform we note that facebook chat and CouchDB document database.
No doubt one thing that makes it special is how Erlang handles concurrency. Erlang does not handle the competition with thread as we have used C, C + + or Java. Erlang solves programming model CONCURRENT by actors. The actor model of concurrency is a computational model that treats "actors" as the universal primitives of parallel digital computation: in response to a message received, an actor can make local decisions, create more actors, it sends more messages and determine how to respond to the next message received. -module (hello).
-export ([loop / 0]).
loop () -> Receive

%
greets a well-known "known" ->
io: format ("Hello!"),
loop ();
% A stranger, do not greet
_ - >
io: format ("..."),
loop ()
end.

In the first line declare the module and then import the loop function, with which we define an empty function and iterate forever. Receive to receive a message similar to the swich, wait for a message and the callback executes the code structure which corresponds to the message sent and the "_" as the default is in c, c + + or Java. First compile

:

1> c (hello).
{ok}

greeter spawn can be generated with a process, spawn will return the PID of the process, which we will use to send messages.

2> Pid = spawn (fun greeter: loop / 0).
\u0026lt;0.38.0>

Now we are going to send a message:

4> Pid! "Known."
Hello! "Known"

5> Pid! "Pepe".
... "Pepe"

As expected just say hello to acquaintances. Operator ! send messages to an actor from its Pid.

This is a small example of erlang concurrency management. The way it handles the Scala audience was inspired by Erlang.


Pokemon Heart Gold Wpa

URLRewrite




A good practice to publish our restful url formats. Where data from the query are part of the url, this greater acceptance from the user and search engines. For example, my site features the profile of my users, if wishing to be publishing the profile of John the url would be something like:

http://misitio.com/profile/juan

This is more friendly than this:
I think this we all agree. Many times in our java projects can not do this, as the web framework does not. For these cases there URLRewrite, which allows our url rewriting as we want; eye not only be used for restful url but for any change we would like to make our urls.
First download the maven jar or if we add this in the pom.xml






org.tuckey


urlrewritefilter


3.1.0
 


Then we must add the following filter in the web.xml:

UrlRewriteFilter


org.tuckey.web.filters.urlrewrite.UrlRewriteFilter

 


UrlRewriteFilter
/ *


Now we must write a file containing the URLs change, the file must be called urlrewrite.xml:







 

/ profile / ([az] +) $

/ mysite / profile / index.htm? name = $ 1





can see in the file that there is from (the url that the user) and to (the real url of your system) with $ 1 are indicating that the first parameter is the variable in the url destination. This foma
we set our url so they are more beautiful.

leave links:

http://www.tuckey.org/urlrewrite/

http://urlrewritefilter.googlecode.com/svn/trunk/src/doc/manual/3.2/index.html







Friday, May 6, 2011

Skin Repairing At Night

10 schools are added to the program believing is seeing

Since May, the program "believing is seeing" Natura solidarity support to 36 schools because the schools that participated last year, will add 10 new participants. For its part, four new rural schools added to the School Support Programme Solidarity. As usual, the schools receive funding, training and technical assistance to strengthen the quality and sustainability of service-learning projects.


Here the complete list of schools built in 2011:
Program "believing is seeing" : High School No. 304, Pilar, the College's Salle, Gonzalez Catan, the Technical Education School N ° 4 "Jorge Sabato, Florencio Varela, the Provincial Institute of Secondary Education N ° 23 "Lino Enea Spilimbergo" Unquillo, Córdoba, 4-004 School "Mercedes Álvarez de Segura, San Rafael, Mendoza, Fortunato Bonelli High School , San Nicolas, Buenos Aires, the Middle School No. 27 "Heroes of the Falklands", Lomas de Zamora, School No. 44 Enrique Berduc in "Home School Complex Eva Peron, in Paraná, Entre Ríos, the School No. 61 "Juan Galo Lavalle", Rosario, Santa Fe, and finally the Provincial School No. 44 "José Ignacio Gorriti" de Jujuy.


Wednesday, May 4, 2011

Symptoms Of Stomach Cancer In Dogs

Ceylon




Ceylon is the new language that runs on jvm. It is a language made by JBoss / Red Hat, the main driver is no more, Gavin King
or less the creator of Hibernate.


was created to run on a JVM, use static writing and includes support for higher-order functions, maintaining a strong focus on ease to learn and to read it. The main premise is taken into account in its design was: How would Java if writing today?

promise to make a decent post about the language, for now just leave a series of tutorials that made its creator in his blog:

http://in.relation.to/tag/Introduction+to+Ceylon

Bushnell Trophy Matte T Dot For Sale

stored procedures and functions in MySQL Table Types

If you already use databases such as Oracle, Interbase / Firebird, PostgreSQL, sure heard from stored procedures. However, in MySQL this is a novelty and a huge step for this database will become a true management system databases. But what son en realidad los procedimientos almacenados? Luego de sumergirnos en este tema veremos que el nombre es plenamente identificatorio y casi explica lo que es un procedimiento almacenado.
Los procedimientos almacenados son un conjunto de instrucciones SQL más una serie de estructuras de control que nos permiten dotar de cierta lógica al procedimiento. Estos procedimientos están guardados en el servidor y pueden ser accedidos a través de llamadas, como veremos más adelante.
Para crear un procedimiento, MySQL nos ofrece la directiva CREATE PROCEDURE. Al crearlo éste es ligado o relacionado con la base de datos que se está usando, tal como cuando creamos una tabla, por ejemplo.
Para llamar a un procedimiento We protect the CALL statement. Since a procedure in turn can invoke other procedures or functions.

A stored procedure, like any of the procedures that we set in our applications using any language, is:


A name.

can have a list of parameters.

has a content (also called definition section of the case: here

specify what they will do and how.)

This content can consist of SQL statements, control structures, local variable declaration, error handling, etc..
  • MySQL SQL syntax follows: 2003 for stored procedures, which also uses IBM DB2.
  • In summary, the syntax of a stored procedure is as follows:
  • CREATE PROCEDURE name (parameter)
  • [features]
  • definition may be more than one parameter (separated by commas) or may not have any ( in this case must still be present parentheses, although there is nothing inside.)

The parameters have the following structure: name type mode

Where:
 
way: is optional and may be IN (the default value are the parameters that the procedure will) OUT (are the parameters that the procedure may change) INOUT (mixture of the two).
name is the name of the parameter.

type: any type of data provided by MySQL. Within

features may include comments or define whether the procedure will return the same results with equal inputs, among other things.

definition: it is the body of the procedure and consists of the procedure itself: here you define what it does, how it does and under what circumstances do.
  • Just as there are procedures, there are also functions. To create a function, MySQL offers the CREATE FUNCTION directive.
  • The difference between a function and a procedure is that the function return values. These values \u200b\u200bcan be used as arguments to SQL statements, as we normally do with other functions such as, for example, MAX () or COUNT (). Use
  • RETURNS clause is required when defining a function and used to specify the type of data to be returned (only the data type, not the data).
  • Its syntax is:
  • CREATE FUNCTION name (parameter)
RETURNS type [characteristic]



definition may be more than one parameter (Separated by commas) or may not have any (in this case the brackets should still be present, although there is nothing inside.) The parameters have the following structure: name type

Where:

 name is the name of the parameter. 

type: any type of data provided by MySQL. Within
features may include comments or define whether the function will return the same results with equal inputs, among other things.

definition: it is the body of the procedure and consists of the procedure itself: here you define what it does, how it does and when.


To call a function we do it simply by invoking his name, as in many programming languages.
  • Since a function in turn can invoke other functions or procedures.
  • mysql> delimiter / /
  • mysql> CREATE PROCEDURE procedure (cod IN INT)
  • ->
  • BEGIN -> SELECT * FROM table WHERE cod_t = cod;
  • -> END
-> / / Query
OK, 0 rows affected (0.00 sec)
mysql> delimiter;
mysql> CALL procedimento (4);

 
In the previous code first thing we do is set a delimiter. Using the MySQL command line we saw that the default delimiter is the semicolon (;) in stored procedures can define us.

The interesting thing is that we can write the previous anchor, without which the procedure ends. Later in this same code will return to the classical boundary. Then we create the procedure with the syntax seen above and locate the content between the keywords BEGIN and END.

The procedure takes one parameter and then work with him, so this parameter is of type IN. We define the parameter as OUT when he goes out to await the procedure. If the parameter had been in and out at the same time, it would be called INOUT type.

The procedure ends and is then called with the following statement:

mysql> CALL procedimento (4);



Another example: CREATE PROCEDURE


procedimiento2 (IN a INTEGER)

BEGIN DECLARE CHAR variable ( 20);
IF a> 10 THEN SET
 variable = 'greater than 10'; 
ELSE SET variable = 'less than or equal to 10';
END IF;
INSERT INTO table VALUES (variable);

END
 

• The procedure takes one parameter which is called type integer.
• Declare a variable for internal use is called variable and is of type char.
• Implement a control structure and if a is greater than 10 variable is assigned a value. If it is not assigned another.
• Use the final value of variable in an SQL statement.

Recall that to implement the last example should use new anchors, as discussed above.

now observe a sample of functions:
mysql> delimiter / /
mysql> CREATE FUNCTION square (s SMALLINT) RETURNS SMALLINT
-> RETURN s * s;
-> / /
Query OK, 0 rows affected (0.00 sec)
mysql> delimiter;
mysql> SELECT square (2);



Other databases such as PostgreSQL stored procedures implemented and provide the ability to be programmed using languages \u200b\u200bsuch as PHP or Java.
 
In MySQL is planning to implement the same and probably in future versions we will see, but more important to use language or another is to understand what might serve the stored procedures.

Ultimately we took a tour through the world of programming stored procedures in MySQL. It is important that this is a world that is under development and promises to evolve.

Let Link:


http://dev.mysql.com/doc/refman/5.0/es/stored-procedures.html





Tuesday, May 3, 2011

Dvd Player Home Repair

Multipurpose Training in the Art Center "Prof. Trasobares "

19 and 20 April, there was a learning-service training in the Multipurpose Center of Art "Prof. Trasobares "of Chili. The seminar, delivered by Prof. Maria del Carmen Lash, was aimed at middle school teachers and authorities of the institution.


The classroom training was conducted, among other activities, one day work in the nearby town of Guanchín, which was called the Via Crucis which restored Art students in collaboration with primary school of the town of La Rioja.



Saturday, April 30, 2011

Does Dvr Count In Ratings






When working with MySQL, there is an option vary the type of table after created (except the MySQL system tables and test calls, which by default are MyISAM and should not be modified). To indicate the type of table to create it we use the following syntax:
field2 VARCHAR (25) NOT NULL ) ENGINE = MyISAM;



If you omit the ENGINE option =... default MyISAM table is created.
 Important: as MySQL, the TYPE option (similar to ENGINE) is supported up to version 4.x of MySQL (not to be used from 5). ENGINE option was added in version 4.0.18 of language (for the 4.x series) and version 4.1.2 (for Version 4.1). 


attempt to create a table type not available in our version, MySQL will choose to create a table type MyISAM.


Then we review the types of tables supported. ISAM





Initially, the database manager MySQL started using this type of tables and now are considered obsolete. Its disadvantages include the inability to move files between machines with different architecture (it has a different format for each architecture / operating system, which is faster, but has the problem of incompatibility) and the table does not handle files greater than 4 GB.
indexes are stored in files. ISM and data files. ISD. MySQL recommends that you update this table to the MyISAM type. This can be done with the following SQL statement:



ALTER TABLE table_name ENGINE = MyISAM;





 

MyISAM is the default table type in MySQL versions from 3.23 and is based on ISAM tables, of course they offer more options. When using these tables, the data is physically stored in two files: one that has the extension. MYI (deprecated INDEX), where indices are stored, and another. MYD (deprecated DATA), where data is stored.

are responsible for providing independent storage: this means you can copy tables from one machine to another different platform.
If you are working with MySQL locally, normally, you can see on the computer itself that these files are stored in a folder que tiene por nombre una base de datos (estas carpetas están en el directorio data dentro del directorio en donde se instaló MySQL, y allí hay una carpeta por cada base de datos). Esto vale también para otros tipos de tablas.
Además:
• Soportan archivos de gran tamaño (63 bits, archivos de tablas superiores a 4 GB) en comparación con los que soportaban las ISAM. • Están optimizadas para sistemas operativos de 64 bits.
• Posibilidad de indexar campos BLOB y TEXT.
• Se permiten valores NULL en columnas indexadas.
• Cada tabla guarda un registro que indica si fue cerrada correctamente o no, y al iniciar MySQL existe la opción de indicate that registration is verified, and repair the table if necessary, automatically. This is accomplished by starting MySQL with the option

- myisam-recover

If you find an error, try to repair it quickly sorting the records in the table. If the problem persists, re-create the file containing the table. And if it continues to exist, it tries to repair the records without a writing system.
• Concurrent Inserts (Insert multiple records at once). MERGE





This type of table is used where it is needed to address a number N of MyISAM tables (the same structure and belong the same database, which also should be part of MERGE table) like one.

This could apply if the original MyISAM table is large, and access your content take a considerable amount of time and resources. Obviously, we're talking about a really big table.

Other features:
• can be applied only SELECT, DELETE and UPDATE.
• The table definition is stored in a file. FRM, and the list of MyISAM tables in a file. MRG (here is actually an index of files. MYI used. View MyISAM tables).
• Allow some way to circumvent the size maximum table and the maximum size of a file on a specific operating system. • We know that if we delete a MyISAM table that is part of the MERGE table, we can not do under the Windows operating system because it does not allow deleting open files, and table, to join the MERGE table is considered open. For the same reason there are drawbacks in applying instructions such as DROP TABLE, ALTER TABLE, DELETE FROM without a WHERE clause, REPAIR TABLE, TRUNCATE TABLE, OPTIMIZE TABLE and ANALYZE TABLE. One way around this is to delete the contents of the MERGE table (using the DELETE statement without a WHERE a MERGE table does not delete the contents MyISAM table but they are removed from the list of components of MERGE table). So consider these tables are not open.
When you create a table of this type must be specified (with the UNION statement) the list of associated tables. Here is an example.


CREATE TABLE t1 (a INT AUTO_INCREMENT PRIMARY KEY, message CHAR (20));
CREATE TABLE t2 (a INT AUTO_INCREMENT PRIMARY KEY, message CHAR (20));

INSERT INTO t1 (message) VALUES ('a ");
INSERT INTO t1 (message) VALUES ('two') INSERT INTO t1
(message) VALUES ('three');
INSERT INTO t2 (message) VALUES ('four') INSERT INTO t2
( message) VALUES ("five");
INSERT INTO t2 (message) VALUES ("six");

CREATE TABLE total (a INT AUTO_INCREMENT
 PRIMARY KEY, 
message CHAR (20)
)
ENGINE = MERGE UNION = (t1 , t2) INSERT_METHOD = LAST;

SELECT * FROM total;





would return something like:


January 1 February 2 March 3


January 4 February 5 March 6

INSERT_METHOD parameter specified in which table will be held on INSERTS, if the top of the list (making INSERT_METHOD = FIRST) or last (putting INSERT_METHOD = LAST). In our case, table t1 is the first and t2 is the last. HEAP





Such tables have a characteristic that makes them different from the rest: are memory tables, are temporary and disappear when the server is closed.

is important to know that this makes them really fast and, unlike a TEMPORARY table, which can only be accessed by the user who creates a HEAP table can be used by different people.

Some other features:
• No support columns of type BLOB or TEXT.
• Do not support AUTO_INCREMENT columns of type.
• Do not allow NULL values \u200b\u200bin columns that have been indexed (before MySQL on the appropriate version to 4.0.2). • should always specify the maximum number of rows (MAX_ROWS) when you create the table, not to use all available memory. InnoDB




We know that these tables, as the BerkeleyDB are TST: This term means Transactions Safe Tables, boards for secure transactions. Tables TST are less rapid rate and hold more memory, but instead offer more security against failure during the consultation.

addition, InnoDB tables have the following characteristics:
• Provide the ability to secure transactions. ACID (Atomicity, Consistency, Separation, Isolation and Durability in English).
• Failover.
• Supports FOREIGN KEY (Foreign Keys). First time there is this in MySQL.
• row level locking.
• Perform backups while the database is running. • Greater efficiency in processing large volumes of information. • No clues as to create columns of type BLOB or TEXT.
• A table can not have more than 1000 columns.
• Deleting all rows from a table delete them one by one, leading to problems related to speed. Until now truncate tables.

were added in version 4.0 of MySQL.


BerkeleyDB


These tables can be used independently of MySQL: are developed by another company (Sleepycat) and the database manager MySQL provides an interface to work with them as a possibility.
• Supports COMMIT and ROLLBACK operations.
• type is called TST (Transactions Safe Tables). We can see INNODB tables for more information about this topic.
• Typically, to install them to look for a version of MySQL that includes support for such tables, and enable the option at installation time (- with-berkeley dboption *).
• In the file where you saved the data also saves the path to that same file, so you can not change the base directory.

Why would use each one?
As always, the answer depends on what you have to do. The tables are commonly used today are
MyISAM, but soon (perhaps very soon) will begin to use INNODB

, especially the ability to create relationships between tables (essential in the relational model) and provide greater regarding the safety benefits in addition to the transactions.

The ISAM

are virtually obsolete (even the company that develops MySQL supports the possibility that in the version 5 no longer available), and others have very specific uses and even compatible with other types: the key is to study the problems that need solving, in each case and see what it is.



Ranger 20 Sailboat Sale

MySQL data with PHP Sending Authentication



you can build in PHP script to mimic the sending of data through forms that use the POST method using the headers necessary to get the browser recognizes the request. For example:
/ / Full data to be sent. $ content [] = "x = $ x"; $ content [] = "y = $ y";
$ content [] = "z = $ z";

$ content = implode ("&",$ content);
$ logitud = strlen ($ content);

$ request .= "POST / page . php HTTP/1.1 \\ r \\ n ";
 $ request .=" Host: xservidor.com \\ r \\ n "; 
$ request .=" Content-Type: application / x-www-form-urlencoded \\ r \\ n ";
$ request .=" Content-Length: $ logitud \\ r \\ n ";
$ request .=" Connection close \\ r \\ n ";
$ request .=" \\ r \\ n ";
$ request .= $ content;

if ($ handle = fsockopen ("servidor.com" 80)) {

fputs ($ handle, $ request);

while (! Feof ($ handle)) {$ response .= fgets
($ handle, 1024);


} fclose ($ handler);
}




With this script we test our forms or could be used for mass data entry. But to attack our sites so we should use a captcha to prevent these attacks.





Thursday, April 28, 2011

School Annual Day Compering Speech



As we all know security can be divided into 3 aspects:


Authentication: the user is actually who they say they are.

Authorization: you may do only what is permitted to do.
Data Security: the user to see data that you can actually see. Not all applications need all these aspects, such as a minor application of an intranet does not necessarily need data security. Let

attack authentication. With JSF we can authenticate our users in different ways.
  • One way is through the container, all web containers handled the concept of security and the ability to authenticate a user. Many applications only require authentication, so we can do at the container. This provides three ways: basic, form-based, and client certificate. An example of basic authentication by adding the following lines to web.xml:







  BASIC 

UserDatabase




authentication I brought with the basic concept of realm. A realm is an object that represents the users and their authentication. Realm is not a standard concept and is implemented differently in the containers. For example in Apache Tomcat is a simple xml file:







 






Another possible forms-based authentication is, this solution was created before the JSF and is not recommended if authentication should be integrated Application:



FORM

UserDatabase



 / faces / login.jsp  
/ faces / loginError.jsp


Another possibility is to integrate the login to our application. We will investigate this option that is most used.
What we should do is an application which can not access any website without first log in, and if someone tries to access the page is redirected to the login page. At login the user can log in so they can perform their tasks.
The concept of servlet filter, implemented in version 2.3 of servlet and redefined in 2.4 allows to operate on a request before this is processed. This allows us to check if the user is logged when you access any site. Then we state our filter in the web.xml:




That Require the user log in page
Before Accessing Any Other Than the entry pages


ForcedLoginFilter

 org.assembly.util.ForcedLoginFilter 



ForcedLoginFilter
*. jsp

FORWARD REQUEST



And ForcedLoginFilter class is: package
org.assembly.util;
import java.io.IOException;
import java.util. Arrays;
import java.util.Iterator;


import javax.servlet.Filter;

import javax.servlet.FilterChain;

import javax.servlet.FilterConfig;

import javax.servlet.RequestDispatcher;
 import javax.servlet.ServletException;

import javax.servlet.ServletRequest;

import javax.servlet.ServletResponse;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpSession;



public class ForcedLoginFilter implements Filter {

private static final String LOGIN_JSP = "login.jsp";



public ForcedLoginFilter() {

}



private static boolean checkLoginState(ServletRequest request,

ServletResponse response) throws IOException, ServletException {

boolean isLoggedIn = false;

HttpSession session = ((HttpServletRequest) request).getSession(false);

UserBean managedUserBean = null;

// If there is a UserBean in the session, and it has

// the isLoggedIn property set to true.

if (null != session

&& (null != (managedUserBean = (UserBean) session

.getAttribute("UserBean")))) {

if (managedUserBean.isIsLoggedIn()) {

isLoggedIn = true;

}

}

return isLoggedIn;

}



public void doFilter(ServletRequest request, ServletResponse response,

FilterChain chain) throws IOException, ServletException {



boolean isLoggedIn = checkLoginState(request, response);



if (isRedirect((HttpServletRequest) request) && !isLoggedIn) {

String loginURI = LOGIN_JSP;



RequestDispatcher requestDispatcher = request

.getRequestDispatcher(loginURI);



// Force the login

requestDispatcher.forward(request, response);

return;

} else {

try {

chain.doFilter(request, response);

} catch (Throwable t) {

// A production quality implementation will

// deal with this exception.

}

}

}



private boolean isRedirect(HttpServletRequest request) {

String requestURI = request.getRequestURI();



return (!requestURI.contains(LOGIN_JSP));

}



@Override

public void destroy() {

// TODO Auto-generated method stub





} @ Override public void init
(FilterConfig arg0) throws ServletException {
/ / TODO Auto-generated method stub


}}





Classes are filters must implement the Filter interface. In this case what the filter is to verify that the user exists in the session and if the url is redirecting it, because if login redirect to go to an infinite loop is formed.

Userbar object is responsible for representing a user.



org.assembly.util package;
Userbar
public class String {private

userName;



private String userPassword;



public UserBean(String userName, String userPassword) {

this.userName = userName;
 		this.userPassword = userPassword;

}



public boolean isIsLoggedIn() {

return true;

}



public String getUserName() {

return userName;

}



public void setUserName(String userName) {

this.userName = userName;

}



public String getUserPassword() {

return userPassword;

}



public void setUserPassword (String userPassword) {
this.userPassword = userPassword;
}}








So now we create a login.jsp page that will be as follows





pageEncoding = " UTF-8 "%>





 

<%@ page language="java" contentType="text/html; charset=UTF-8"


<%@ taglib prefix="f" uri="http://java.sun.com/jsf/core"%>
Base <%@ taglib prefix="h" uri="http://java.sun.com/jsf/html"%> Taxpayers

< html>
< head>
< meta http-equiv="Content-Type" content="text/html; charset=UTF-8">





< /head>
< body background="black">




action = "# {loginBean.validate}" />













And then we create the managed bean that will be like this:
< /body>

org.assembly.util.login package; < /html>
import javax.faces.context.FacesContext;
org.assembly.util.UserBean import;
public class


LoginBean {private String userName;

private String userPassword;
 
public String validate () {

/ / validate if the password and pass are correct.
/ / if an error return null;

Userbar Userbar = new user (userName, userPassword);

FacesContext.getCurrentInstance (). GetExternalContext (). GetSessionMap ()
. Put ("Userbar", user);

return "index";}


getUserName public String () {return userName
;
} public void

setUserName (String userName) {
this.userName = userName;}


getUserPassword public String () {
return userPassword;}

public
setUserPassword void (String userPassword) {
this.userPassword = userPassword;
}}






Then we declare in the face-config.xml our bean and login url.






loginBean

org.assembly.util.login.LoginBean


 

request ...

login / login.jsp




This was a little example in jsf login.

Wednesday, April 27, 2011

Christian Greetings For New Born Baby

Despite JSF advancement of open systems, 78% of computers using Windows




Public bugle this news, which I do not really like it:

Despite the advancement of free software, Microsoft Windows 2010 continued to dominate the computer world with a market share 78.6% in the market for operating systems, as market analyst Gartner.
For its part, Apple was able to increase the contributions of its operating systems to the total turnover of 1.6 to 1.7 percent. Mac computers are currently experiencing a boom, according to Gartner, while Microsoft has benefited from unpopular change to the new Windows Vista 7. According to Gartner, in addition to PCs and Macs, for study also took into account the large corporate computers, called "servers" where IBM, HP and Oracle have more presence. Between server operators proved the most popular Linux.
Why not switch to Linux?

leave link:


http://www.ieco.clarin.com/economia/Pese-sistemas-libres-computadoras-Windows_0_235200025.html



Sunday, April 24, 2011

Getting A Pa Trailer License For Boat

Encrypt password with MySQL





who did not have to encrypt a password before storing in the database? As you may know is a good practice to save the encrypted password as this can minimize the damage to our users if an intruder obtains the way to see the base and also allows system administrators are not aware of them, no way to know them.

When working with MySQL , we can use functions or md5 sha1 . For testing we can do it this way: > select md5 ('Holass');

> select sha1 ('Holass');
Recall that the encryption algorithms and md5 sha1


are the most used.

To insert a user with a password encrypted using md5
can do the following: > insert into user (name, password) values \u200b\u200b('name', md5 ('password')); and if we verify the user: > select * from users WHERE name = 'name' and password = md5 ('password'); MySQL

also brings its own function to encrypt password
called Books:

> select password ('Holass');




leave links:

http://dev.mysql.com/doc/refman/5.1/en/password-hashing.html

http://dev.mysql.com/doc/refman/5.0/es/encryption-functions.html

Thursday, April 21, 2011

Best Illegal Softball Bats

I Yeta

I Yeta or I must be, because in this blog comment that the flock browser was the future of browsers
, or at least what I thought. Today I get an email that flock is discontinuous, that support for this browser ceased on 26 April and invited me to migrate to other browsers like firefox or chrome.

I'll try not predict the future of other products, just to keep close.



Tuesday, April 19, 2011

Get Ready In Nylon Overall

NoSQL vs NewSQL


Before we define what is
NoSQL
and
NewSQL
. NoSQL is a term used to group computer a series of non-relational data stores that provide ACID guarantees. Usually no tables or schemes of sentences "join." "
NewSQL " is shorthand we refer to the various new database vendors of high performance. Formerly referred to these products as " ScalableSQL " to differentiate the products of traditional relational databases. As this involves horizontal scalability, which is not necessarily a feature of all products.
And to clarify, as
NoSQL , NewSQL
should not be taken too literally: what is new about the sellers
NewSQL the seller, not the SQL .
So who would be considered sellers
NewSQL ? As NoSQL , NewSQL is used to describe a group of companies or products, which have in common is the development of new products and services, relational database, designed to bring the benefits of the relational model architectures distributed, or to improve the performance of relational databases to the extent that scalability is a necessity. To name a few products / companies NewSQL
: Clustrix, GenieDB, ScalArc, Goleta, VoltDB, RethinkDB, ScaleDB Akiba, CodeFutures, ScaleBase, Translattice and NimbusDB ... These new products
NewSQL functionality overlap with NoSQL , allowing scalability without losing the relational model and some products are mixed with products NoSQL
, making the line very thin.
What is the future of data bases? NewSQL
since he won the won
NoSQL ? Time will tell ...

leave links:

http://www.readwriteweb.com/cloud/2011/04/the-newsql-movement.php


Dining Table Leg Repair

Scala Publish Free Book for Security


is the first edition of Programming in Scala, it's great for this contribution.
leave the link:

Recomendations For Hair Colour

Photos Chilecito Integration and Development Center of Quilmes


People Integration Centre and development in the city of Quilmes, sent us some pictures of activities they are doing boys. Is the share and invite you to send us those of their schools.


Students Gardening Workshop of Integration and Development Center, since 2004, hold a joint experience in applying the acquired knowledge in the care and beautification of the streets "The Cross" and "San Martín" in the town of Quilmes.

in 2007, were honored with a Presidential Citation Award "Solidarity Schools." From that experience grew and students began to produce vegetable seedlings to donate to community gardens and forest seedlings for planting on the street. From the Radio Workshop of the Center activities are disseminated. The Municipality of Quilmes involved in the project to provide advice and, through the transfer of materials and tools, preparation of posters for the squares and the organization of fairs for the sale of seedlings. They have also been given to some students benefit PEC (Community Employment Program) for the realization of micro enterprises.

The practice has contributed to recognition by the residents of the work carried out by students and encouraged them to offer their cooperation and also to purchase floral species produced by students. Since the students participating in the experience improved their self-esteem and improved their educational achievements. The experience enables young people to train in a profession that allows them to have a job opportunity when they finish their schooling, and that the initiative will grow to become a microenterprise.

Sunday, April 17, 2011

How To Change Language In Pokemon Soul Silver






JEE and EJB provide a set of services that developers can integrate declaratively or programmatically. These services include authorization and authentication.

authentication and identification The EJB specification does not indicate as authentic. Although security is defined as the spread from client to server, it is defined as the client gets the identity and credentials with an invocation of EJB, also defined as the server saves and gets the authentication. When you access an EJB many applications use the JNDI API, for example we can authenticate access to an EJB as follows:


properties.put (Context.SECURITY_PRINCIPAL, "username"); properties.put (Context.SECURITY_CREDENTIALS, "password"); Context ctx = new InitialContext (properties);
jndiContext.lookup Object ref = ("SecureBean / remote");
SecureRemoteBusiness remote = (SecureRemoteBusiness) ref;


In the example, the user is authenticated with the connection to the "JNDI InitialContext"


Authorization.
 

applications as we know we are not all equal, each user has a role to an application such as "administrator", "employee", etc.. and each role can do or not do certain actions, ie have or not have permission to. In

EJB there are different types of granularity of permissions can be set per user or role. This allows authentication to a separate process of approval.
Roles are defined in a logical and may represent roles, groups, or any other identification. The roles of the EJBs are mapped to actual users and groups when the bean is deployable.

Permission is well defined in the EJB specification. Roles are declared programmatically and then indicate the permissions for the beans through annotations and ejb-jar.xml incurring
saw so EJB security theory in a future post we will do something more practical.

Port Royale 2 City Editor

JEE EJB 3 Why not? Java





'm a promoter of the use of Spring but X is why I am studying a little JEE 5 and I'm really surprised by its simplicity, change a lot. The only thing critical is the time to raise jboss or glassfish or other JEE server is more than just use tomcat or jetty (obviously).

EJB 3 specification leaves behind the bad taste that had previous versions of EJB in developing. The most important step now is pojos EJB, which by means of annotations can be inferred behavior. There is no need to inherit from any object, make interfaces (thank God).

Consider the types of beans that exist: Message-Driven Beans: Asynchronous messaging is a paradigm in which two or more applications communicate using a message that describes a business event. These beans can produce and consume asynchronous messages. Entity Beans: These are modeling our data objects (POJOs) and are persisted through javax.persistence.EntityManager. Using JPA (described in JSR-317) we persist our entity beans as if we used a common ORM.

This is a short summary of which provides us with EJB 3. In the next post will expand!









Thursday, April 14, 2011

Western Themed Catchy Phrases

adheres to Believe to See Global Youth Service Day


can follow all the news by clicking on the image.

Wednesday, April 13, 2011

Milena Velba Bra Nurse

Magazine is Coming!




The idea is that in late July will leave the official magazine of free Java. It is an interesting proposal oracle.

is not yet a published nro but we can register. leave the link:

http://blogs.oracle.com/java/2011/04/java_magazine_is_coming.html

Tuesday, April 12, 2011

Do Capillaries Disappear

java.util.Objects the new library of Java 7! The history of linux


The truth is that many do not like (to be resistance to change), I think it robs the objects work, for me this feature should be an Object or otherwise, do not know. Beyond my humble opinion was necessary, we always had to write a util to do things that makes this library hours.
showFoo public void (Foo foo) {Foo foo2 = new Foo ();
/ / lot of code
if (foo.equals (foo2)) {System.out
. println ("Two Men");

} else {System.out.println ("And a Half ");
}}
 


NullPointer
This can see how we solve it with Objects:


showFoo public void (Foo foo) {

Foo foo2 = new Foo ();

/ /
lot of code if (Objects.equals (foo, foo2)) {
System.out.println ("Two Men");

} else {System.out.println ("And a Half");}
} 




We can make hash with Objects, which will be of org.apache.commons.lang.builder.HashCodeBuilder


@ Override public int hashCode () {return
Objects.hash (name, age, job);}




We can check that an object is null public void


showFoo (Foo foo) {
 this.bar = Objects.requireNonNull (foo);} 




We take take the toString if not null, and otherwise return a value: return


Objects.toString (foo, "Foo is Empty");
 


Interesting no? they think the new library?
Source:
http://alexsotob.blogspot.com/2011/04/another-shot-of-whiskey-cant-stop.html


 




Swollen Puffy Eyes Memory Foam

Believing Programme See

few days ago , Buenos Aires Economico newspaper published a story on the program Ver Believing The paper explains the project and how many people benefit. Note To view please click on the image