The people who attended my presentations at RMOUG Training Days 2010 asked several good questions. One question that was asked in the Groovy presentation that I really wish I had included a slide on ...
I was involved in a recent discussion on the "best" way to remove a given parameter from a URL string. The conversation began with using string primitives to split and join the parameter, a method ...
In DDoS Protection, Gcore uses the bundle of XDP and regular expressions (regex). This article will explain why Gcore started using this solution (regex in XDP) and how they bound them via a ...
Tony Northrup is a developer, security consultant and author with more than 10 years of professional experience developing applications for Microsoft Windows. Developers frequently need to process ...
Google Search Console is an amazing tool that provides invaluable search data by real users directly from Google. While the charts and tables are friendly to work with, a large part of the data is not ...
If you’ve struggled with regular expressions that took hours to match when you needed them to complete in seconds, this article is for you. Java developer Cristian Mocanu explains where and why the ...
Parsing HTML and extracting useful bits of data is common job for web programmers. The only question is, how do you go about it? You could use Regular Expressions. On the surface of things, regular ...
Google Analytics 4 now supports creating and/or modifying events using regular expressions, regex. This can help you migrate destinations and event goals from Universal Analytics to Google Analytics 4 ...
If you consider yourself a good cook, you may or may not know how to make a souffle or baklava. But there are certain things you probably do know how to do that form the basis of many recipes. For ...
Users often create weak and easily guessed passwords they reuse across systems and websites. As a result, traditional passwords are often the weakest link in the security of business-critical ...