|  | From Scott Orgera, your About Programming Editor July's first edition of the programming newsletter features an array of in-depth tutorials showing you how to tell the current time in Perl to utilizing the crypt function in PHP to keep your passwords safe, and much more in between. Debug your code faster with our JavaScript error reference, configure SSH on a Raspberry Pi and use VBA to your advantage when coding in Visual Basic... | | Linux: An Introduction to Named Pipes A simple, yet powerful feature of Linux is the "Named Pipe" mechanism. It can be used to connect programs that were not necessarily designed to work together. Often times programmers use files to accomplish that, which is kind of clunky and inefficient. Named pipes look similar to files but provide an elegant method to pass data directly from one process to another, without the overhead of writing the data to disk and then reading that data. | Java: What is a Package? A package allows a developer to group classes (and interfaces) together. These classes will all be related in some way. They might all have to do with a specific application or perform a particular set of tasks. For example, the Java API is full of packages. One of them is the javax.xml package. It and its subpackages contain all classes in the Java API related to handling XML. | Common JavaScript Errors When you first try to run a JavaScript on your Web page it is quite likely that it won't work the way that it was supposed to. You may receive an error message that gives you a clue as to what happened, or the script may just not appear to do anything. There are lots of reasons why a script doesn't work but there are a small number of common errors that people make when writing JavaScript. When your script doesn't work the best place to start, if you don't have an error message that tells you exactly what went wrong, is to check your code to see if you have made any of these common errors. | Encrypting Passwords in PHP In PHP we can use the crypt () function to create one-way encryption. This means that the data is encrypted but cannot easily be decrypted. Although at first glance that may seem useless, it is actually very useful when working with passwords. When a user chooses their password, it is then encrypted and the encrypted version of this password is saved. The next time the user goes to log in, their password is encrypted again and then checked against the already saved (encrypted) version to see if they are the same. This way if the data is intercepted they can only see the encrypted version. | | | | Related Searches | | | | Featured Articles | | | | | Sign up for more free newsletters on your favorite topics | | | | You are receiving this newsletter because you subscribed to the About.com Healthy Eating newsletter. If you wish to unsubscribe, please click here.
If you would like to unsubscribe from all newsletters sent from About.com, please send an email to optout@about.com with "Unsubscribe" as the subject line. Contact Information: 1500 Broadway, 6th Floor New York, NY, 10036 © 2014 About.com | | | |