loading...
DotNek app development
DotNek بازدید : 133 چهارشنبه 19 خرداد 1400 نظرات (0)

Web owners are always trying to improve the quality of content on the web and in order to achieve this goal, they take various measures and use all available facilities, to draw graphics on web pages, you can use the Canvas element, which we are going to explain to you in this regard, so that we can learn the ways to implement important things together, such as adding shadows, text, and so on.

Canvas Rectangle, Shadow, Path and Text training in HTML

What is HTML Canvas?

This element is used to draw graphics, and the important point is that, in order to do this, scripting is required, which is usually used in JavaScript and you can apply the graphics through it, finally, with the help of this element, text, shadows, paths, etc., can be added to the images, if you want to make them more attractive to different users.

This element is one of the most attractive features in HTML5 , and it should be noted that almost all browsers today support Canvas, and through it, you can draw graphics using JavaScript while running (On The Fly).

Canvas Rectangle:

This method is used in order to draw a rectangle which has various parameters that we are going to mention in the following.

Available parameters:

- width:

This parameter represents the width of the rectangle which is in pixels.

- Height:

As you know, in addition to the width of the rectangle, it also has a length, which determines the height of the rectangle, and it is also in pixels.

- x:

By using this parameter, you can specify the coordinates that the upper-left corner of the rectangle should have and determine where the rectangle should start from.

- y:

This parameter also specifies the coordinates of the upper-left corner, so with these 4 parameters, a rectangle can be drawn.

Another point that should be mentioned is that you can also specify the color of the rectangle by using the command ctx.strokeStyle, which we are going to show you an example of coding in order to draw a rectangle with the help of JavaScript .

For example, suppose you want to draw a blue rectangle with line width 6, length 250, width 150 and at 5&5 point, you need to do the following with JavaScript.

// Blue rectangle

ctx.beginPath ();

ctx.lineWidth = "6";

ctx.strokeStyle = "Blue";

ctx.rect (5, 5, 250, 150);

ctx.stroke ();

After doing this, you can easily draw a rectangle and use it in order to make your content more attractive.

Now imagine that you want to draw a slightly smaller green rectangle inside this blue rectangle, if you want to do this, you have to do the following.

// Green rectangle

ctx.beginPath ();

ctx.lineWidth = "4";

ctx.strokeStyle = "green";

ctx.rect (30, 30, 70, 50);

ctx.stroke ();

All the things mentioned above is usually done with the help of JavaScript, so in the following we are going to introduce this language to you.

What is JavaScript?

There are different programming languages, one of which is JavaScript, it is a kind of language which different programmers can use in order to implement various features in web pages, another use of it, is in the development of various games , finally all of these enable the user to get a better user experience from using pages and games.

Canvas Rectangle, Shadow, Path and Text training in HTML

Shadows:

Everyone's effort is to be able to convey a better feeling to the user that in HTML5 canvas you can make images, text, even a line more realistic with the help of shadows, in other words, with the help of shadows, everything can be made 3D, the shadows that are created can have the following properties:

- shadowOffsetX () Property:

This is one of the properties of the shadow which is zero by default, and with help of which you can specify the horizontal distance of the shadow from the shape, it should be also noted that in order to change the position of the shadow, you can use positive or negative values.

The way of doing this is as follows:

ctx.shadowOffsetX = h_distance;

- shadowOffsetY () Property:

This is another property for adding shadow, which is used to adjust the vertical distance of the shadow from the shape, and just like the previous case, it is zero by default, and with the help of positive and negative values, you can determine its position.

In order to do this, you must do the following:

ctx.shadowOffsetX = v_distance;

- shadowBlur () Property:

Another feature for shadows is the amount of blurring that can be adjusted, which you must be done as follows.

ctx.shadowBlur = blur_value

- shadowColor () Property:

Shadows can have different color spectrums which can be adjusted this way: ctx.shadowColor

For example, suppose you want to create several rectangles with the same size which have shadows with different colors in relation to each other, to do this, you can do the following.

<! DOCTYPE html>

<html>

<head> <title> HTML5 Canvas - shadow </title>

</head>

<body>

<canvas id = "DemoCanvas" width = "500" height = "600"> </canvas>

<script>

var canvas = document.getElementById ("DemoCanvas");

if (canvas.getContext)

{

var ctx = canvas.getContext ('2d');

ctx.shadowColor = "black";

ctx.shadowBlur = 6;

ctx.shadowOffsetX = 6;

ctx.shadowOffsetY = 6;

ctx.shadowColor = "orange";

ctx.strokeRect (25, 25, 300, 200);

ctx.shadowColor = "green";

ctx.strokeRect (50, 50, 300, 200);

ctx.shadowColor = "blue";

ctx.strokeRect (75, 75, 300, 200);

ctx.shadowColor = "red";

ctx.strokeRect (100, 100, 300, 200);

}

</script>

</body>

</html>

In addition to adding a shadow feature to a rectangle or any other shape, you can also add shadows to a text, if you want to make it more attractive to the user.

Path:

In HTML5 canvas, it is possible for you to create custom shapes, for example, imagine that you are going to start drawing a path, first, you need to start from beginPath () and finally draw the path you want, then you need to use the fill () or stroke () methods to create a suitable shape for the user, in the last step you can execute the command of a new path with closePath (), for example imagine that you want to draw a yellow triangle, to do this you have to do the following.

<! DOCTYPE html>

<html>

<head>

<title> Sample arcs example </title>

</head>

<body>

<canvas id = "DemoCanvas" width = "300" height = "600"> </canvas>

<script>

var canvas = document.getElementById ("DemoCanvas");

var context = canvas.getContext ("2d");

// Set the style properties.

context.fillStyle = 'yellow';

context.strokeStyle = 'red';

context.lineWidth = 2;

context.beginPath ();

// Start from the top-left point.

context.moveTo (20, 20); // give the (x, y) coordinates

context.lineTo (190, 20);

context.lineTo (20, 190);

context.lineTo (20, 20);

// Now fill the shape, and draw the stroke.

context.fill ();

context.stroke ();

context.closePath ();

</script>

</body>

</html>

If you want to draw any other path, you can do the same, which may only differ in characteristics, for instance, color, starting point, end point, number of paths, and so on.

Text:

One of the other things that you can do with the help of this version is drawing text, which also has different properties, such as drawing a map, drawing a rectangle, etc., the text may be italics, bold, normal and so on, also the font size and other features may differ from each other, in general, among the characteristics of the texts, the following can be mentioned.

-text:

To draw text on canvas, you can use the string type and draw it.

- x:

To draw text, you must specify what horizontal coordinates you want to draw with the canvas.

- y:

Like drawing all items, you need vertical coordinates for canvas to draw text in addition to horizontal coordinates.

- maxWidth:

Another feature that different texts can have is the maximum text width.

In general, different texts can be drawn, and also different methods can be used to draw each one, which we will mention an example of drawing text with the fillText () method in the following.

If you want to draw the text 'Canvas Rectangle, Shadow, Path' in a simple way, you can do it by coding which is mentioned below.

<! DOCTYPE html>

<html>

<head>

<title> HTML5 Canvas - Text </title>

</head>

<body>

<canvas id = "DemoCanvas" width = "500" height = "600"> </canvas>

<script>

var canvas = document.getElementById ("DemoCanvas");

if (canvas.getContext)

{

var ctx = canvas.getContext ('2d');

ctx.font = 'italic 32px sans-serif';

ctx.fillText ('Canvas Rectangle, Shadow, Path', 10, 50);

}

</script>

</body>

</html>

Canvas Rectangle, Shadow, Path and Text training in HTML

Last word:

In general, HTML Canvas can be used to draw various items that ultimately cause users to get a better user experience by viewing them, in this article, we have mentioned drawing items, so that it can give you an idea about making your site attractive, as a result, you can increase the traffic to your website with these simple tasks.

DotNek بازدید : 791 چهارشنبه 19 خرداد 1400 نظرات (0)

While the initial segment of each test is amazingly critical, it is simply a large portion of the battle, the planning, and the execution. How the information is taken care of is similarly fundamental, and it can prompt inventive outcomes and perceptions to perform great information in the right way.

The most startling piece of performing research is constantly utilized as information preparation. However, it doesn't need to be that way. Although you should realize how to manage the information and how to break down the information, factual examination programming can make this assignment as smooth and direct as could be expected. Help Writing  research papers is one of the most difficult aspects of academic study. As a result, students begin looking for help in order to write the best research paper possible.To lead factual information investigation and exploration, an immense scope of insights devices are accessible, and underneath we list the seven best measurement apparatuses for examination and information examination.

Ultimate Guide Statistics Tools For Data Analysis And Research

Best measurements Tools For Data Analysis and Research

There are various sorts of factual apparatuses accessible for your exploration and information examination accessible on the web. You need to check everything before picking the best one for you. Beneath, we have recorded the best seven apparatuses for information investigation and examination:

SPSS

SPSS, often known as the Statistical Package for the Social Sciences, is possibly the most widely used measuring software in human behaviour research. Factual Package for the Social Sciences gives the ability to rapidly incorporate authoritative measurements, parametric and nonparametric examinations, and graphical portrayals of results in the graphical UI (GUI). It also includes deciding to make content to mechanize investigation or to take out more prevalent measurable handling. The SPSS programming bundle was made for the administration and factual examination of social information. It was first distributed by SPSS Inc. in 1968 and then acquired by IBM in 2009. Economic analysts utilize SPSS, wellbeing scientists, study organizations, government substances, schooling specialists, showcasing associations, information diggers, and many more for handling and investigating study information. For example, you gather with an online review stage like Alchemy.

SAS(Statistical Analysis Software)

SAS is an apparatus for a measurable investigation that allows utilizing the GUI or producing more modern examinations. It is a top-notch approach that is generally utilized to examine an industry, medical care, and human instinct. Progressed investigation can be completed, and distribution commendable outlines and diagrams can be made, albeit the coding can likewise be a difficult change for those not familiar with this technique. SAS is utilized:

A tremendous cluster of factual techniques and calculations, particularly for cutting edge measurements,

Profoundly adjustable examination choices and yield alternatives.

Distribution quality illustrations with ODS.

They are broadly utilized in numerous fields, including business and medication.

Huge, dynamic online local area.

Ultimate Guide Statistics Tools For Data Analysis And Research

R

R is a free bundle of measurable programming usually utilized in investigations on human conduct and in different regions. For many uses, tool stash (fundamental modules) are accessible, improving on various parts of information preparation. While R is a good tool, it has a high expectation for absorbing information and requires a certain level of coding.Nonetheless, it accompanies a functioning gathering associated with building and improving R and the applicable modules, which implies that help is rarely excessively far away. R can be thought of as a different way of executing S. There are some notable differences. However, a lot of code written for S works fine in R. One of R's qualities is the simplicity with which very much planned distribution quality plots can be delivered, including numerical images and formulae where required. Extraordinary consideration has been assumed control over the defaults for the minor plan decisions in designs, yet the client holds full control.

Microsoft Excel

Albeit not a front-line factual investigation arrangement, Microsoft Excel gives a ton of information representation and essential examination instruments. Outline diagrams and tweaked illustrations and insights are not difficult to deliver, making it a useful stage for the individuals who need to see the essentials of their information. It also settles an open decision for those needing to begin with numbers since numerous individuals endeavor the same owner and skill to utilize Excel. The primary employments of Excel incorporate; Data Entry, Data Management, Accounting, Financial investigation, Charting and Graphing, Programming, Time Management, Task the executives, monetary displaying, Customer relationship the board (CRM), Almost anything that should be coordinated!

Matlab

Matlab is a programming language and scientific instrument that architects and researchers use broadly. Likewise, the learning way is long, likewise with R, and you will be relied upon at some stage to construct your code. There are likewise many tool compartments accessible to respond to your testing questions (like EEGLab for investigating EEG information). Even though it tends to be trying for newbies to utilize MatLab, it gives an enormous measure of adaptability as far as what you'd prefer to do, as long as you can code it.

Minitab

The Minitab programming gives various measurable apparatuses for information handling that are both straightforward and genuinely modern. Orders can be acted in both the Interface and customized orders, practically identical to GraphPad Prism, making it open to novices just as clients hoping to accomplish more convoluted investigation.

Graphpad Prism

GraphPad Prism combines logical diagramming, complete bend fitting (nonlinear relapse), reasonable insights, and information association in one application. While it won't be able to replace a comprehensive measuring tool, Prism can let you execute basic factual tests commonly used by lab and clinical analysts. T-tests, nonparametric tests, one-, two-, and three-way ANOVA, analysis of possibility tables, and endurance investigation are all available in Crystal. The results of the investigation are presented in plain terms, free of unnecessary quantifiable terminology. GraphPad Prism is progressing programming mostly utilized in science-related measurements, even though it has an assortment of highlights that can be utilized in various fields. Identified with SPSS, prearranging options can improve on computations or accomplish more convoluted measurable estimations. However, it is feasible to complete the remainder of the work through the GUI. 

Ultimate Guide Statistics Tools For Data Analysis And Research

End

Various insights programming apparatuses are accessible. Each gives something quietly not the same as the client, in light of different factors, including the investigation question, numerical abilities, and coding abilities. In any case, we have talked about a portion of the seven best insights apparatuses for exploration and information investigation.

These factors could imply that you are at the bleeding edge of information examination, yet the exactness of the information gathered relies upon the nature of the report's execution, likewise with any exploration. In this way, it is important to take note of that while you may have complex insights apparatuses (and the ability to utilize them) advantageous to you, the information would not mean a lot on the off chance that they are not truly.

DotNek بازدید : 137 چهارشنبه 19 خرداد 1400 نظرات (0)

so that they can be opened from the bottom of the page to the top of the page and show the required information to users, and Bottom Sheets , including components Material Design are on Android. They have two different types, one Persistent Bottom Sheet and Modal Bottom Sheet (modal bottom sheets android), both of which are used to display information to users, and the way to access them is by dragging them from the bottom of the page and then the item information We see the needs and details. It should be noted that these can be used in applications such as Google Maps and Google Drive. Google Drive and 

6- Define and create a simple Bottom Sheet. Like the following:

<? xml version = "1.0" encoding = "utf-8"?>
<android. support.design. widget. CoordinatorLayout xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
xmlns: app = "http://schemas.android.com/apk/res-auto"
tools: context = ". MainActivity">

<LinearLayout
android: layout_width = "match_parent"
android: layout_height = "200dp"
android: orientation = "vertical"
android: background = "# 009688"
android: padding = "8dp"
app: layout_behavior = "android. support.design. widget. BottomSheetBehavior">

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# ffffff"
android: textSize = "20sp"
android: textStyle = "bold"
android: text = "Bottom Sheet Title" />

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# ffffff"
android: textSize = "16sp"
android: text = "Lorem ipsum dolor sit amet, te sed vide delicata,
per ex salutandi intellegat temporibus, ei insolens molestiae vis.
Eum ei possim aperiam, fuisset suscipit vim ut. Voluptua repudiare
gubergren id eum, nullam labores an nam. Sed et tota quae referendum,
enim elit democritum quo et.
Lorem ipsum dolor sit amet, te sed vide delicata,
per ex salutandi intellegat temporibus, ei insolens molestiae vis.
Eum ei possim aperiam, fuisset suscipit vim ut. Voluptua repudiare
gubergren id eum, nullam labores an nam. Sed et tota quae referendum,
enim elit dem ocritum quo et. "/>

</LinearLayout>

</android. support.design. widget. CoordinatorLayout>

In the code above, we add a LinearLayout to the layout that has two TextViews. Note that we must define LinearLayout as a Bottom Sheet. Like the following:

app: layout_behavior = "android. support.design. widget. BottomSheetBehavior"

By inserting the above code and adding a layout to it, we will cause Android to consider it as a Bottom Sheet. The value of this property can be defined as follows:

app: layout_behavior = "@ string / bottom_sheet_behavior"

Then, hold down the Ctrl key on the keyboard and click on the value entered above. This will connect to the values.xml file that is linked to the design library.

7- We run the project. After running the program, we will see that a bar with a background color of 200dp will appear at the bottom of the screen.

8- It should be noted that the content of this bar has two TextViews.

9- This bar that we have created is currently fixed and does not change by dragging down or up.

10- In order to be able to adjust it so that it changes by dragging down or up, we must add the property listed below to  is used to show the contents.

For example, we can say that the user selects a place on the map in Google Map and by dragging the bar upwards he can see the information and details about it, and if he presses the MORE INFO button, he can even see the contents related to it. Slowly

1- We create a new project in Android Studio and choose its name as desired. The name chosen in this tutorial is PersistentBottomSheet.

2- In this project, we create an Empty Activity.

3- We also add the design library to this section.

4- In this project, unlike the previous project, we want it to be opened and closed by clicking on the Bottom Sheet button.

5- The codes that should be in the activity_main.xml section are as follows:

<? xml version = "1.0" encoding = "utf-8"?>
<android. support.design. widget. CoordinatorLayout
xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
tools: context = ". MainActivity">

<RelativeLayout
android: layout_width = "match_parent"
android: layout_height = "match_parent">

<Button
android: id = "@ + id / btn_expand"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: layout_centerInParent = "true"
android: text = "Expand" />

</RelativeLayout>

</android. support.design. widget. CoordinatorLayout>

What is the function of Bottom Sheets in Android and what are they used for?

In the code above, because the CoordinatorLayout does not have the power and ability to manage the layout, we put the button in RelativeLayout.

6- Add a Bottom Sheet to the layout.

<LinearLayout
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: orientation = "vertical"
android: id = "@ + id / bottom sheet"
android: background = "# 94aab4"
android: padding = "8dp"
app: behavior_hideable = "true"
app: behavior_peekHeight = "60dp"
app: layout_behavior = "@ string / bottom_sheet_behavior">

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 000000"
android: textSize = "20sp"
android: text = "Location: Austria "
android: paddingbottom = "10dp"
android: paddingtop = "10dp" />

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 452f2f"
android: textSize = "16sp"
android: text = " Austria initially emerged as a margraviate around 976 and developed into a duchy and archduchy. In the 16th century, Austria started serving as the heart of the Habsburg Monarchy and the junior branch of the House of Habsburg – one of the most influential royal dynasties in history. As an archduchy, it was a major component and administrative center of the Holy Roman Empire. Early in the 19th century, Austria established its own empire, which became a great power and the leading force of the German Confederation, but pursued its own course independently of the other German states following its defeat in the Austro-Prussian War in 1866. In 1867, in compromise with Hungary, the Austria-Hungary Dual Monarchy was established. "/>
</LinearLayout>

In the code above, we used wrap_content to specify the size and height of the bar, which causes the bar to be so high that the content is there. In other words, it can be said that the height of this bar will be equal to the content that is inside it. In this section, we did not specify a height for the bar.

7- Create a new layout with the desired name, for example bottom_sheet.xml, and put the code inserted below it.

<? xml version = "1.0" encoding = "utf-8"?>
<LinearLayout
xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: app = "http://schemas.android.com/apk/res-auto"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: orientation = "vertical"
android: id = "@ + id / bottom sheet"
android: background = "# 94aab4"
android: padding = "8dp"
app: behavior_hideable = "true"
app: behavior_peekHeight = "60dp"
app: layout_behavior = "@ string / bottom_sheet_behavior">

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 000000"
android: textSize = "20sp"
android: text = "Location: Austria "
android: paddingbottom = "10dp"
android: paddingtop = "10dp" />

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 452f2f"
android: textSize = "16sp"
android: text = " Austria initially emerged as a margraviate around 976 and developed into a duchy and archduchy. In the 16th century, Austria started serving as the heart of the Habsburg Monarchy and the junior branch of the House of Habsburg – one of the most influential royal dynasties in history. As an archduchy, it was a major component and administrative center of the Holy Roman Empire. Early in the 19th century, Austria established its own empire, which became a great power and the leading force of the German Confederation, but pursued its own course independently of the other German states following its defeat in the Austro-Prussian War in 1866. In 1867, in compromise with Hungary, the Austria-Hungary Dual Monarchy was established. "/>

</LinearLayout>

8- The complete and final codes that should be in the activity_main.xml section are as follows:

<? xml version = "1.0" encoding = "utf-8"?>
<android. support.design. widget. CoordinatorLayout xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
tools: context = ". MainActivity">

<RelativeLayout
android: layout_width = "match_parent"
android: layout_height = "match_parent">

<Button
android: id = "@ + id / btn_expand"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: layout_centerInParent = "true"
android: text = "Expand" />

</RelativeLayout>

<include layout = "@ layout / bottom sheet" />

</android. support.design. widget. CoordinatorLayout>

9- After applying the changes, if we run the project, we will see that the tape will open at 60dp first, and if we then drag it upwards, its size will be larger.

10- In this section, we have to make changes and adjustments so that this opening of the page is done by the button.

11- We complete the activity as follows:

import android. support.design. widget. BottomSheetBehavior;
import android.support.v7.app.AppCompatActivity;
import android.os. Bundle;
import android. view. View;
import android. widget. Button;
import Android.Widget. LinearLayout;

public class MainActivity extends AppCompatActivity {

Button banshee;
LinearLayout sheet Layout;
BottomSheetBehavior bottom Sheet;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

banshee = findViewById (R.id.btn_expand);
sheet Layout = findViewById (R.id. bottom sheet);
bottom Sheet = BottomSheetBehavior. From (sheet Layout);

btnPhoto.setOnClickListener (new View.OnClickListener () {
@Override
public void onClick (View view) {

bottomSheet.setState (BottomSheetBehavior.STATE_EXPANDED);

}
});

}
}

In the code above, we define a Button and LinearLayout that belong to Bottom Sheet. Then we create an example of the BottomSheetBehavior method with the desired name bottom Sheet.

Then we create a Listener for the button. To be able to set the Bottom Sheet mode, we use the set State () method.

In the code above, we have selected STATE_EXPANDED, but by selecting it, we can make it open by touching the status bar button.

12- We will implement the project.

13- After the implementation of the project, we will see that the operation is done correctly and the settings that we have provided have been successful.

14- Then, we have to make changes that are hidden by touching the bar button. Like the following:

btnPhoto.setOnClickListener (new View.OnClickListener () {
@Override
public void onClick (View view) {

if (bottomSheet.setState () == BottomSheetBehavior.STATE_COLLAPSED) {

bottomSheet.setState (BottomSheetBehavior.STATE_EXPANDED);

}
else if (bottom Sheet. getState () == BottomSheetBehavior.STATE_EXPANDED) {

bottomSheet.setState (BottomSheetBehavior.STATE_COLLAPSED);

}

}
});

In the code above, using the if else and the getState () method, we set a condition that will check that if the bar is collapsed, its status will change to Expanded by touching the button.

15- Use the setText () method and modify the condition, as follows:

btnPhoto.setOnClickListener (new View.OnClickListener () {
@Override
public void onClick (View view) {

if (bottomSheet.setState () == BottomSheetBehavior.STATE_COLLAPSED) {

bottomSheet.setState (BottomSheetBehavior.STATE_EXPANDED);
btnSheet.setText ("Collapse");

}
else if (bottomSheet.setState () == BottomSheetBehavior.STATE_EXPANDED) {

bottomSheet.setState (BottomSheetBehavior.STATE_COLLAPSED);
btnSheet.setText ("Expand");

}

}
});

What is the function of Bottom Sheets in Android and what are they used for?

16- If we run the project after making all the changes, we will see that everything is successful.

17- There is only one problem and that is that if we move the bar down or up using the button, the text of the button will also change, but if we move it up or down by hand, there is no change in text will not be done and we have to fix this problem and apply the relevant settings.

18- We use the setBottomSheetCallback method, which can manage the Bottom Sheet.

bottomSheet.setBottomSheetCallback (new BottomSheetBehavior.BottomSheetCallback () {
@Override
public void onTextChanged (@NonNull View bottom Sheet, int new State) {

}

@Override
public void on Slide (@NonNull View bottom Sheet, float slide Offset) {

}
});

19- It should be noted that this method has two functions. One onTextChanged and on Slide.

 20- In this section, we use the first function to solve the problem.

public void onTextChanged (@NonNull View bottom Sheet, int new State) {

if (new State == BottomSheetBehavior.STATE_EXPANDED) {
btnSheet.setText ("Collapse");
} else if (new State == BottomSheetBehavior.STATE_COLLAPSED) {
btnSheet.setText ("Expand");
}

}

21- The complete and final code that should be in the MainActivity.java section is as follows:

import android. support. annotation. Nonnull;
import android. support.design. widget. BottomSheetBehavior;
import android.support.v7.app.AppCompatActivity;
import android.os. Bundle;
import android. view. View;
import android. widget. Button;
import Android.Widget. LinearLayout;

public class MainActivity extends AppCompatActivity {

Button btnSheet;
LinearLayout sheet Layout;
BottomSheetBehavior bottom Sheet;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

btnSheet = findViewById (R.id.btn_expand);
sheet Layout = findViewById (R.id. bottom sheet);
bottom Sheet = BottomSheetBehavior. From (sheet Layout);

btnPhoto.setOnClickListener (new View.OnClickListener () {
@Override
public void onClick (View view) {

if (bottomSheet.setState () == BottomSheetBehavior.STATE_COLLAPSED) {

bottomSheet.setState (BottomSheetBehavior.STATE_EXPANDED);
//btnSheet.setText("Collapse ");

}
else if (bottomSheet.setState () == BottomSheetBehavior.STATE_EXPANDED) {

bottomSheet.setState (BottomSheetBehavior.STATE_COLLAPSED);
//btnSheet.setText("Expand ");

}

}
});

bottomSheet.setBottomSheetCallback (new BottomSheetBehavior.BottomSheetCallback () {
@Override
public void onTextChanged (@NonNull View bottom Sheet, int new State) {

if (new State == BottomSheetBehavior.STATE_EXPANDED) {
btnSheet.setText ("Collapse");
} else if (new State == BottomSheetBehavior.STATE_COLLAPSED) {
btnSheet.setText ("Expand");
}

}

@Override
public void on Slide (@NonNull View bottom Sheet, float slide Offset) {

}
});

}
}

Modal Bottom Sheet

In this section, we also display a Dialog as a Bottom Sheet. Like Google Drive.

It should be noted that Modal is used to display options such as Upload, Copy and Share or even other options.

1- We create a new project in Android Studio and select its name as desired, and the name selected in this section for this project is ModalBottomSheet.

2- After creating the project and performing the next steps, we must create an Empty Activity.

3- Like previous projects, we add the Support Design library to the project.

4- The codes that should be in the activity_main.xml section are as follows:

<? xml version = "1.0" encoding g = "utf-8"?>
<android. support.design. widget. CoordinatorLayout xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
tools: context = ". MainActivity">

<RelativeLayout
android: layout_width = "match_parent"
android: layout_height = "match_parent">

<Button
android: id = "@ + id / btn_expand"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: layout_centerInParent = "true"
android: text = "Expand" />

</RelativeLayout>

</android. support.design. widget. CoordinatorLayout>

5- Create a fragment to display the Bottom Sheet in the form of a Dialog.

6- After creating the fragment, we have to change its inheritance, that is, change it from Fragment to BottomSheetDialogFragment.

7- The code that should be in the BottomSheetFragment.java section is as follows:

import android.os. Bundle;
import android. support.design. widget. BottomSheetDialogFragment;
import android. view. LayoutInflater;
import android. view. View;
import android. view. ViewGroups;


public class BottomSheetFragment extends BottomSheetDialogFragment {


public BottomSheetFragment () {
// Required empty public constructor
}


@Override
public View onCreateView (LayoutInflater inflater, ViewGroups container,
Bundle savedInstanceState) {
// Inflate the layout for this fragment
return inflater. inflate (R. layout. fragment_bottom_sheet, container, false);
}

}

8- Then we have to complete the layout of this fragment.

9- It is worth mentioning that we use the content that was created in the previous project for bottom_sheet.xml in this project as well.

10- The codes that should be in the fragment_bottom_sheet.xml section are as follows:

<? xml version = "1.0" encoding = "utf-8"?>
<LinearLayout
xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: app = "http://schemas.android.com/apk/res-auto"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: orientation = "vertical"
android: id = "@ + id / bottom sheet"
android: background = "# 94aab4"
android: padding = "8dp"
app: behavior_hideable = "true"
app: behavior_peekHeight = "60dp"
app: layout_behavior = "@ string / bottom_sheet_behavior">

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 000000"
android: textSize = "20sp"
android: text = "Location: Austria "
android: paddingbottom = "10dp"
android: paddingtop = "10dp" />

<TextView
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: textColor = "# 452f2f"
android: textSize = "16sp"
android: text = " Austria initially emerged as a margraviate around 976 and developed into a duchy and archduchy. In the 16th century, Austria started serving as the heart of the Habsburg Monarchy and the junior branch of the House of Habsburg – one of the most influential royal dynasties in history. As an archduchy, it was a major component and administrative Centre of the Holy Roman Empire. Early in the 19th century, Austria established its own empire, which became a great power and the leading force of the German Confederation, but pursued its own course independently of the other German states following its defeat in the Austro-Prussian War in 1866. In 1867, in compromise with Hungary, the Austria-Hungary Dual Monarchy was established. "/>

</LinearLayout>

11- Then we have to write a Listener for the Expand button.

12- We will implement the project.

import android.support.v7.app.AppCompatActivity;
import android.os. Bundle;
import android. view. View;
import android. widget. Button;

public class MainActivity extends AppCompatActivity {

Button btnSheet;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

btnSheet = findViewById (R.id.btn_expand);

btnPhoto.setOnClickListener (new View.OnClickListener () {
@Override
public void onClick (View view) {

BottomSheetFragment bottom Fragment = new BottomSheetFragment ();
bottomFragment.show (getSupportFragmentManager (), bottomFragment.getTag ());

}
});

}
}

What is the function of Bottom Sheets in Android and what are they used for?

13- We will see that like AlertDialog, this bar has elevation.

14- It is removed by pressing the back button or dragging it down.

15- We complete it as follows:

DotNek بازدید : 127 چهارشنبه 19 خرداد 1400 نظرات (0)

One of these features is that this chair usually has a long back that it helps the gamers to keep their back in a good situation and save them from back ache.

What are the characteristics of a suitable chair for playing?

The Importance of gaming Chairs:  

Gaming chairs may seem unfamiliar to the general public, but they are becoming an essential accessory for game fans . Characteristics of gaming chairs differ them from other types of chair. Gamers usually sit on the game chair for a long time. A professional gamer may sit in a chair for about 10 hours a day. Therefore, having a comfortable and standard chair in which the principles of ergonomics are well observed; it's too important. The chair should be adjustable so that the person can easily sit in a comfortable position relative to his computer.Characteristics of gaming chairs allow the gamer to fully enjoy the game.A chair has certain parts, each of which must have characteristics in order to be accepted as a good chair.

Comparing a play chair with an office chair:

a gaming chair , the back of the chair is long and extends to the head. In addition, the back and seat of the chair are serrated and keep the body firm and stable. There is no holding position in a normal chair and it can be said that it is difficult to sit properly on it for a long time.Another difference between game chairs and office chairs is in their design and color. Game seat designers try to use colorful designs to make these seats look like a sports car. This chair may be pink or bright red. Of course, these chairs have a good variety of colors and game enthusiasts can easily match it with their play space. While in other chairs, designs usually do not fall out of the category of public furniture.Also, in game chairs, unlike ordinary chairs, a more durable metal frame is used so that heavy users can use it for a long time without worry. In general, these chairs are wider than ordinary chairs.
In the following articles, the expected features of each part of the seat suitable for the game will be stated.

Seat back: 

One of the characteristics of gaming chairs is the long back of it. Seat back is of particular importance. Because it can help keep the back in a straight and upright position and prevent back pain.The back of the chair should be at a suitable height that can support your pelvis, spine and back well. Also, its slope should be adjustable. Having lumbar cushions and head cushions are useful for optimizing the backrest and helping to sit better. Leaning the head back makes the weight of the head split on the neck, making it easier to look at the monitor while lying down.

What are the characteristics of a suitable chair for playing?

Chair bases: 

Chair bases play a very important role in the quality of the chair. In addition to maintaining the balance of the chair, they are also effective in positioning the person's legs. In some models of gaming chairs, the bases are designed in such a way that they place the legs in a higher position and create a relaxed state for the person. These chairs are ideal for playing video games in front of the TV and when playing with the computer.

Seat handles:

The importance of chair handles is due to the fact that in case of any defect in the chair handle, it may cause the feeling of pain in the wrist, arm or elbow area.The difference between the handles of a gaming chair and an office chair is in their movability. In a gaming chair, the handle of the chair is movable and it can be moved in different directions. The ideal chair handle should be such that the person can place his arms in parallel or on the table after sitting on the chair. It should also help keep the elbows close to the body and form a right angle. The wrist should also be as aligned with the elbow as possible. The height of the arm of the chair should be easily adjustable. In the best possible case, the arm of the chair should have a three-dimensional position and the height, depth and width of the arm should be easily adjusted.Another important point about the arm of the seat is the presence of suitable cushions on it so that it provides comfort to the gamer's hands.

Chair seat: 

It is one of the most important parts of the chair that can be examined from different perspectives. First of all, the size of the chair should be large enough for the person to sit comfortably in. The ideal size is such that after sitting down and placing your feet on the ground, there is as much space as four fingers between the knees.The seat of the chair should be soft enough so that it does not cause any problems for the person after sitting for a long time. Also, very good sponges should be used in this part so that it does not lose its shape by bearing the weight of the gamer for a long time and has good durability.

Price of game chairs:

Gaming chairs are expensive due to their special capabilities. In some models, features such as a massager have been added, the price has increased. But do not worry, there are also student game chairs and game chairs with more limited features that are less expensive.

Game chair material:

One of the most important things when buying a game chair is to pay attention to its material. As mentioned in the previous sections, the playing chair is usually used for long hours. Therefore, it is important that the material is such that it minimizes sweating and is easy to clean.The materials used in the game chairs can be divided into two groups: fabric and synthetic leather. In fabric samples, air conditioning is better and they have good durability; but in this group, the seat is more likely to get dirty and stains are usually visible. Synthetic leathers have a special beauty and are resistant to stains because they repel water. In leather game chairs, the air does not flow well and it is not very easy to use them in hot seasons such as summer.

What are the characteristics of a suitable chair for playing?

Seat angle: 

There are many models of gaming chairs that have a "lying down function" that allows you to relax a little by changing the angle of your backrest. The longer the lying angle, the easier you can relax. One of the best positions for professional gamers is the perfectly flat mode, which supports up to 180 degrees. You can adjust the angle so that the seat is parallel to the ground, so you can lie down while playing or downloading a game . Or you can even take a nap in your spare time before starting an in-game event. 

DotNek بازدید : 124 چهارشنبه 19 خرداد 1400 نظرات (0)

If important data is corrupted, it can cause irreparable damage to individuals as well as institutions, so it is necessary to protect them from being damaged, in the field of data protection , in fact, there is a need to ensure that if data is lost, you can recover the data again. It is also necessary to provide security and privacy for all your data , in general, data protection is an essential issue, which is why we are going to discuss it in more detail and mention the important points.

What is data protection, and why is it important?

What is data protection?

Data protection is the protection of privacy by regulating the processing of personal information, as well as identifying individuals to protect data by defining their duties and having control over their work.

As we mentioned earlier, data availability in case of a data breach is one of the principles of data protection and another important issue in this field is data management.

Data management itself has two fields including data lifecycle management and information lifecycle management, which we are going to discuss in more detail below.

- Data lifecycle management:

In this field of data management, all important data in a system is in the way of storing it online as well as offline.

- Information lifecycle management:

In this cycle, the information is protected against errors that may occur in the program, such as virus attacks, technical problems in the device, malware , etc., in order not to damage them, new tasks may be added to the management every day, and the ultimate goal is to protect the data in the best possible way.

Which methods were used to protect data in the past?

As you know, when the data is stored, some steps needs to be taken in order to protect it, the best ways for data storage are offline methods, in the past, many organizations, tried offline method in order to store their data through which they copied data to the tape cartridge machine, and they would eventually protect that tape.

Storing data on another computer system is something that you have to be more worried about because your data is more endangered, due to the fact that protecting your data from hacking attack would be much harder, even though having access to the tapes may be a slow process, it is the best method and there won’t be any risk of attacking the network and losing data backup.

As a result, it is generally necessary to back up all data, because as we have mentioned, this is one of the principles of data protection , different properties of data caused the need for more protection, one of them is the ability to being transferred, which we will mention more in the following.

The ability to transfer data:

This feature allows data to be transferred between clients or servers, which ultimately raises concerns about data duplication among data owners.

In the meantime, it is necessary to point out that another method that can be used to back up data is cloud backup, which has become more common these days, and most organizations often transfer their backed up data to public clouds or clouds maintained by backup vendors.

This method is better and simpler than the method which people used for data storage in the past and the ability to access data is also faster.

So far we have made some remarks about data protection , but you need to know which data needs to be protected?

Which data should be protected?

Normally, information such as documents of, transactions which have been made, employee work history, customer information, etc., should be protected, so that hackers and profiteers cannot use this important information in different ways.

As we mentioned above, a step that was taken in order to protect the data, was storing it, which is still one of the methods of data protection, essential data such as important emails, phone numbers, credit card details, documents, etc., are also important documents that need to be stored.

Data storage has rules that must be followed properly during the process, so that you can keep all the necessary data accurate, secure and legal.

Rules to follow while storing backup data:

- Information storage should be done through pre-determined methods.

- All stored data should be stored in a secure environment.

- Data storage time is limited.

- Only limited and specific people have access to data, and it is not possible for everyone in an organization.

- There shouldn’t be the permission of copying the stored data.

- While saving, enable the feature which gives you the opportunity of saving your data automatically, so in case of a hacking attack, it won’t be possible to access the backed up data for profiteers.

- Provide strong passwords for backed up data to protect them properly.

Why is data protection important?

Data protection is important due to various factors, which can be summarized as follows.

- Provide security:

Security is very important and one of the factors that can help you provide security is data protection, in fact, data protection laws ensure that important data, such as the private information of employees, customers, and other data associated with the organization, are properly protected and not made available to profiteers.

Of course, the important point that should be mentioned here is that it is necessary to check all the information you receive from each person to make sure that this information is correct, and then put your time and energy into storing it.

These actions can greatly prevent cybercrime, and ultimately your employees and customers can trust you, in addition, by checking the information of customers, you can also trust your employees and customers, as a result, you can safely provide them with important information.

- Not following data protection tips will cost a fortune:

Imagine that you are the owner of a site which different users give their personal information such as bank card information, username, address, etc., to your website, but you do not care about data protection, in this case, profiteers can have access to all users’ information easily, therefore users have the right to sue you in such circumstances, and the law may impose heavy fines on you, as a result, you should take care of users’ information as good as possible in order to prevent the possible threats from happening.

In addition to the two factors which we have mentioned above, there are other things that can be mentioned in order to emphasize the importance of data protection , but these two were the ones that should be taken into consideration more than the others.

Differences between data protection, security and privacy:

Each of these three has a huge world, but some individuals and institutions equate the terms data protection, data security, and data privacy and use them interchangeably, so it is necessary to give a brief explanation of their differences, simply put, data protection can be expressed as backing up and recovering information in order to prevent data loss. Data security is also a set of measures that should be taken in order to protect information and systems in the best possible way against various manipulations as well as the entry of malware.

Privacy is also the right of each user, institution, etc., to determine a limitation for other people in having access to their information and the time when they prefer to share this information with them, it is easy to conclude that if hackers invade the privacy of institutions and individuals, the law will severely punish them.

What is data protection?

Last word:

In general, data protection is an important issue and its importance is increasing day by day, in this article we have explained one of the reasons for this to you, so that if you have not thought about the ways to protect your data to date, now you know the necessary steps that should be taken in order to protect them, as a result you should take action immediately because if you don’t, your information would be stolen and abused.

DotNek بازدید : 128 چهارشنبه 19 خرداد 1400 نظرات (0)

Privacy and security are a widespread topic for people around the world and in order to reach each one, many points need to be considered, there are many reports of security and privacy breaches on a daily basis, and many users fall into the trap of those who violate security and privacy, in this article, we are going to discuss whether it is possible to achieve security without privacy or not.

Is it possible to have security without privacy?

Is it possible to have security without privacy?

We will first answer this question and then define security and privacy separately, the answer is yes, you can have security without privacy, but the important point is that you can’t have privacy without security.

What is security?

When we heard of the word security , the first thing that comes to our mind is the protection of important items and information against theft through different ways like passwords, physical locks, and so on, simply put, security is a technical method which is used to protect data, due to the increasing number of science and technology, more security is required in order to protect the data in computers and systems.

One of the most important types of security is cyber security , which has different layers and components, each of which we are going to discuss in the following briefly, in order for cyber security to be fully established, it is necessary to pay attention to its 7 layers and the points which should be taken into consideration referring to them.

All users who are somehow connected to the internet and computer systems also risk their data every time they connect to the internet, so it is necessary to establish full security, so that profiteers cannot gain access to this information, if the security and its tips are not established properly, users may incur heavy costs, so it is better to think seriously about security from the beginning and follow the tips carefully.

One of the most common threats in cyberspace is phishing attacks , in which hackers use spam emails and social engineering methods in order to access the data of various people.

7 layers of security:

- Information security policies:

- Protect and backup data:

This layer regularly backs up data to ensure that the user has a complete copy of their data in a safe place.

- Monitor and test your systems:

This layer is one of the most important security layers available, and to implement the tips of this layer better, you can use the tools to scan the entire system correctly and accurately.

Apart from the security of these layers, there are also threats against them which we are going to mention in the following.

Security threats include:

- Application layer threats

- Presentation layer threats

- Session layer threats

- Transport layer threats

- Network layer threats

Generally, in order to increase security , the following should be considered:

Tips to increase security:

-Use strong passwords

-Do not publish your private and important information online

-Do not connect to public Wi-Fi in public places as much as possible.

-Update programs on your system regularly

-Install strong antivirus

-Do not open attractive and deceptive emails in any way

-Do not click on any kind of link

                             

What is privacy?

Privacy includes laws and regulations that cause companies to protect your data and it is so important, also it should be noted that privacy has existed since ancient times, and people are obliged to protect each other's privacy.

Privacy can be properly maintained only if the necessary points of security is being considered completely, because as we mentioned before, privacy cannot be achieved without security, in fact, privacy gives people the right to share their desired information with others whenever they like, and people are not allowed to invade someone’s privacy without their permission.

Today, due to the existence of the rules and regulations, individuals can greatly protect their privacy and prevent various users from controlling or manipulating their information easily, and change them depending on their goals.

Fortunately, these days the issue of privacy is taken more seriously than ever, and if people want to invade the other’s privacy, they will be fined and prosecuted.

                          

How can you protect your privacy?

There are many institutions that can greatly help you in protecting your privacy , and besides, you can also increase your level of awareness in this area, to provide a lot of privacy for yourself.

You also need to be careful in some fields, for instance, never write down your passwords and usernames anywhere, think about whether this information is part of your privacy or not before sharing that, as a result, you shouldn’t share it if you come to the conclusion that this information is very important to you, be careful while making online payments in order not to let others invade your privacy.

Matomo is one of the software programs that can help users in establishing privacy, and in addition to protecting your privacy as a website owner, it can also protect the privacy of website visitors and mobile app users, by using this software, you can become aware of where your data is stored and what happens to it, which can greatly help protect privacy.

The point that should be mentioned about this software is that it is easy to work with and users at different levels of science and knowledge in the field of security and computer are able to use it.

How can you protect your privacy?

Last word:

In general, security is of a great importance, as you can understand from the article, you can achieve security without privacy, but you cannot achieve and maintain privacy without security, which is why all our efforts in this article have been on this issue in order to state the necessary points for establishing security and privacy, so that you can take all the needed steps in this field if you want to keep your information and system safe from hacking attacks by observing all the mentioned principles.

We hope that the content of this article will be useful for in the field of security and privacy , so you can prevent profiteers from accessing your personal information by following the mentioned points and abusing your information in order to achieve their personal desires, as a result, there are lots of points that should be considered in the way of protecting your information, which we tried to discuss some useful ones in order to make you aware of the steps that should be taken in this field.

DotNek بازدید : 136 چهارشنبه 19 خرداد 1400 نظرات (0)

With the increasing development of science and technology in today's world, the ways of communication and data transfer have changed and technology is evolving day by day, as a result of which security and privacy are becoming more and more important, each of the terms, security and privacy has a huge world as well as many details, in this article we are going to discuss security and privacy in ICT .

What is privacy and security in ICT?

What is information and communication technology (ICT)?

Information and communication technology , or “ICT” in simple terms, includes all products that store, process, transmit, convert, reproduce or receive electronic information, as it is clear from this explanation, it includes an extent category, which can be mobile devices, tablets, computers, software programs , websites with different contents, CDs, DVDs, content delivery network, computer hardware, email, educational software, etc.

In fact, all of these tools are a large part of everyone's lives these days, and people may convey important information through these tools, which is why the issue of security and privacy is of a great importance in all the mentioned tools, and there are so many ways through which you can increase security and privacy in them.

The importance of information and communication technology:

All organizations and individuals try to be able to use the technologies that are evolving every day, and the point of using all technologies is that you must increase the level of your awareness regarding security and privacy in them, through these ways, you can increase the security of the information contained in them to the highest possible level.

In fact, using these technologies can increase the speed and quality of work and at the same time reduce costs to a minimum, as well as increasing productivity in various fields, as we mentioned before, information and communication technology is so important and the reason for this importance is that many communication and educational methods have changed in today’s world due to the existence of these technologies, for example, you can connect to the world of education and see different trainings in different fields with just one click.

It is also possible to communicate easily with different people around the world, and as you know, these days the most important conferences may be held through information and communication technologies, each of which increases the importance of information and communication technology.

What is privacy in information and communication technology?

Privacy in general is one of the first rights that every individual deserves, which due to the existence of different technologies, it has become one of the most challenging human rights issues and these days everyone is trying to prevent people from invading their privacy, in general, privacy has several definitions that can be expressed in simple terms as follows:

privacy is the right that each user, institution, etc. has in determining a limitation of access for people who try to gain access to their personal information and also determining the time when this information should be shared with them.

Before the existence of technology, there has been privacy and people have tried to respect the privacy of others, but today, due to the development in technology and given that, in today's communication spaces, users can hide themselves behind invalid usernames, and as a result of which respect for the privacy of individuals has been severely diminished and individuals are trying to gain access to others information without their permission, and they also abuse it in order to achieve their desires.

What is security in information and communication technology?

Security is an issue that is of a great importance these days and there are many laws that are trying to provide security for different people, like privacy, which has received more attention because of the advancement of technology, security is becoming more and more important as well, and people are increasingly trying to maintain their security. Information and communication security , in simple terms, is a set of measures that should be taken in order to protect information and systems in the best possible way, in this regard, there are many points that should be observed, so that users can maintain their information in a safe space and communicate with other users.

What developments have occurred by information technology and communications?

You certainly know that there have been extensive developments in all fields of social, economic, etc., due to the existence of information and communication technology, and with the increasing development of this technology , society is becoming an information society, and as we have mentioned earlier, maintaining security and privacy in such a society is more complex than before.

One of the most important achievements of information and communication technology for human beings is the rapid access to various information and also the opportunity of doing all the tasks at the highest possible speed, and the abilities that these technologies provide have no geographical limitation, so it is not considered as an obstacle for users.

Through information and communication technology, people can express their needs to other users, and users can also help such people in various fields, which ultimately causes the community to get a high level in the field of culture, health, education, economy, etc., as we have mentioned earlier, with the help of this technology, people can have interaction with users around the world, so they can be informed of what is happening worldwide.

Given the great impact that information and communication technology has on the world, there are many theories about the development of e-government, e-cities, e-learning, and e-commerce, etc., all of which require a lot of time that should be spent by individuals and institutions in order to increase the security and privacy .

The practical benefits of these theories have made the use of information and communication technology a global and significant issue in various societies, one of which is the issue of e-government.

In order to increase security and privacy in information and communication technology, it is necessary to pay attention to many points and observe them, some of which we are going to mention in the following section.

                                                     

Important points:

- It is not possible to have security without privacy because the two are interdependent, so you need to consider both together.

- Minimize the private information that you share on social networks, because profiteers may try to use them in order to achieve their desires, which can have negative effects on security and privacy .

- While using different technologies, you should pay attention to the points that are related to each of them to increase security, for example, if you are using a mobile device, tablet, computer, etc., you have to be careful in every step you take for instance you shouldn’t click on different kinds of links which you are not sure about their safety, so you should try to pay more attention to security and privacy.

- While using all devices that transmit information in some way, you need to consider safety tips such as using strong antivirus software and never forget to update them.

- Download and use educational videos through legal ways in order to respect the rights of the producers.

- Keep images and videos that contain your personal information in a safe place and never leave them somewhere that is accessible to many people in order to protect them in the best possible way, so that they are not available to profiteers.

- Get help from experts in the fields of privacy and security of information and communication technology, so that you can take the necessary steps with complete mastery, and if you couldn’t follow the necessary tips by yourselves, these experts would help you and maximize security and privacy .

What is information and communication technology (ICT)?

Last word:

Information and communication technology has become very widespread these days and the importance of these issues is increasing day by day, which is why it is very important to pay attention to security and privacy issues, there are many articles on security and privacy in ICT all of which are trying to help different users achieve high security by following all the necessary points in the best possible way due to the fact that this issue turns into a huge concern for internet users, so you as a user, shouldn’t neglect the necessity of this topic.

DotNek بازدید : 124 چهارشنبه 19 خرداد 1400 نظرات (0)

As you know, there are many programming languages that can be used in order to implement various features in a web or application, among all the languages, one of the most popular is JavaScript, many programmers use it because it can eventually be used to make the user interact with the content better which is one of the most important factors in attracting users to your websites , there are several features in this language that you can learn by mastering each of them in the best possible way, which we are going to examine variables and data types in JS.

Learning different types of variables and data types in JavaScript web programming language

What is JavaScript?

The abbreviation for this language is JS, which allows you to use it to create dynamic content on the web, which has a very high interaction with the user, also with the help of this language, even very complex features can be easily implemented on the web, and the point that should be mentioned here is that any program written in JavaScript is known as a “script”.

JS can be run on both browsers and servers, there are JavaScript engines in various browsers, which are actually embedded by JS scripts and can be used to convert the script into a language that can be recognized by various devices.

JavaScript Variables:

In order to be able to store different amounts of data, you need to get help from it, which in order to master this, we suggest you pay attention to the following example.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p> In this example, x, y, and z are variables. </p>



<p id = "demo"> </p>



<script>

var x = 7;

var y = 8;

var z = x + y;

document.getElementById ("demo"). innerHTML =

"The value of z is:" + z;

</script>



</body>

</html>

Let and const:

The case which we have mentioned at the beginning was the only way that have been used in order to store data values until 2015, but now other ways are being used instead, including let and const.

- Const:

When you want to define a variable that cannot be changed again, you must use this.

- Let:

When the variable has a limited range, it is time to use this.

Much Like Algebra:

In this case, in order to try to store data values, you must use variables such as price1, for example.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p id = "demo"> </p>



<script>

var price1 = 4;

var price2 = 9;

var total = price1 + price2;

document.getElementById ("demo"). innerHTML =

"The total is:" + total;

</script>



</body>

</html>

Learning different types of variables and data types in JavaScript web programming language

When you plan to take action in this area, you need to follow the rules, some of which we are going to explain below.

- Identifiers are very important and in fact they can be in a form of short names or descriptive names.

- While using names for identifiers, you have to pay attention to the uppercase and lowercase letters that are used in them, because even with a large and small change in one of the letters, it is considered as a different variable.

- In relation to the names which are being used, it is important that they start with a letter.

- It is possible to use Dollar Sign $ for import, now note the example below in this regard.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript $ </h2>



<p> The dollar sign is treated as a letter in JavaScript names. </p>



<p id = "demo"> </p>



<script>

var $ = 2;

var $ myMoney = 5;

document.getElementById ("demo"). innerHTML = $ + $ myMoney;

</script>



</body>

</html>

Underscore (_) may also be used to enter various data, which is mentioned in the example below.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript $ </h2>



<p> The underscore is treated as a letter in JavaScript names. </p>



<p id = "demo"> </p>



<script>

var _x = 2;

var _100 = 5;

document.getElementById ("demo"). innerHTML = _x + _100;

</script>



</body>

</html>

JavaScript Data Types:

In JavaScript , data can be in lots of different forms, they can be in letters or numbers that differ from each other, for example, when you are writing codes, quotes must be used, but you do not need to use quotes while entering numbers, if you do not pay attention to this point, the commands may not be executed correctly, for example, if you quote a number, it may behave as a text string.

It is important to note that in programming , text values are called text strings, in addition to the above, the data in JavaScript can have different types, which in this article we are going to examine the numbers and text data, which are called text strings, here note the example below.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p> Strings are written with quotes. </p>

<p> Numbers are written without quotes. </p>



<p id = "demo"> </p>



<script>

var pi = 55;

var person = "John Doe";

var answer = 'Yes I am!';



document.getElementById ("demo"). innerHTML =

pi + "<br>" + person + "<br>" + answer;

</script>



</body>

</html>

Learning different types of variables and data types in JavaScript web programming language

Declaring:

It is the creation of a variable in JavaScript that requires you to use the var keyword in order to declare a variable in this language, when you want to add a value to a variable, you have to do the following, in order to understand this better, pay attention to the example below.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p> Create a variable, assign a value to it, and display it: </p>



<p id = "demo"> </p>



<script>

var carName = "Volvo";

document.getElementById ("demo"). innerHTML = carName;

</script>



</body>

</html>

In addition to being able to use these features and declaring a variable, it is possible to separate the various variables you enter by using commas, now consider the following example.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p> You can declare many variables in one statement. </p>



<p id = "demo"> </p>



<script>

var person = "John Doe", carName = "Volvo", price = 200;

document.getElementById ("demo"). innerHTML = carName;

</script>



</body>

</html>

In most cases, no value is defined for the variables when they are imported, as this data may be calculated later by the users, or it may be entered at another time by the program owner, now consider the following example.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Variables </h2>



<p> A variable declared without a value will have the value undefined. </p>



<p id = "demo"> </p>



<script>

var carName;

document.getElementById ("demo"). innerHTML = carName;

</script>



</body>

</html>

In JavaScript, one variable can be used to store different types of data, here consider the following example in this regard.

<! DOCTYPE html>

<html>

<body>



<h2> JavaScript Data Types </h2>



<p> JavaScript has dynamic types. This means that the same variable can be used to hold different data types: </p>



<p id = "demo"> </p>



<script>

var x; // Now x is undefined

x = 5; // Now x is a Number

x = "John"; // Now x is a String



document.getElementById ("demo"). innerHTML = x;

</script>



</body>

</html>

It may be as follows:

- JavaScript Strings

- JavaScript Numbers

- JavaScript Booleans

- JavaScript Arrays

- JavaScript Objects

Learning different types of variables and data types in JavaScript web programming language

Last word:

As you can see in this article, there are different ways to store different amounts of data, and the available data may be in different forms, which we explained and gave examples in this regard, but the most important point is that you have to follow all the instructions while entering commands in order to execute properly, as a result, if you pay attention to the mentioned point as well as the examples which have been described, you can have more awareness in the field of data types and various variables as well as the way that they are being used, in this article we have explained JS programming language which is so popular among various programmers and is being used by them, we hope you can get help from this article in order to write codes in the best possible way without being wrong.

DotNek بازدید : 122 چهارشنبه 19 خرداد 1400 نظرات (0)

The variety of websites is increasing day by day and different users have the right to choose one of them, one of the factors that affect the choice of users is the layout of a site due to the fact that when the site layout is attractive , it causes the users to choose it among others, there are various elements which are effective in creating a page, and in addition to the existence, their arrangement is of a great importance, and you must choose where each element should be placed very carefully, in the following, we are going to pay more attention to this issue.

Learning how to position in CSS

What is CSS?

CSS stands for Cascading style sheets which is used for the appearance of the site, in simple terms, it describes how HTML elements should be displayed on different sites.

How to position in CSS?

Determining the correct position for different elements is so essential, and it is an issue that may not be taken seriously, so that when they want to fix the existing bugs, they may try to change the position of the elements without proper awareness of its consequences, which may eventually be right or wrong, and they may be able to find the right position by repeating this process, but it would be so boring, you should also pay attention to the fact that for each element, depending on the purpose of placing them in the content, different position may be suitable, in the following, we are going to examine the different methods that exist in order to determine the position of elements.

Position properties:

Position may have different properties, such as static, relative, absolute, fixed, and inherit, each of which is used for different purposes, so that you need to specify your purpose first and then determine the position.

It allows you to place elements in a specific location on the page, or to set one element in front of another, or vice versa, you can determine the position of different elements according to the method you use with the help of top, bottom, left and right properties.

In the following section, we are going to explain the different positioning methods.

- Static:

If you do not set the position, the elements will be static by default, in fact, through this way, all the elements will be in accordance with the normal flow of the page layout, it should be also noted that the elements that you determine their position in this way cannot be affected by the top, bottom, left, right properties, now consider the following examples.

# box_1 {

Position: static;

Width: 400px;

Height: 400px;

Background: # ee3e64;

}



# box_2 {

Position: static;

Width: 400px;

Height: 400px;

Background: # 44accf;

}



# box_3 {

Position: static;

Width: 400px;

Height: 400px;

Background: # b7d84b;

}

This method is used to position elements with simple designs, and as mentioned earlier, it is not possible to affect and move them with the help of top, bottom, left, right properties, so if you use this method, you will lose the chance to move them, this method is also used in the following example.

<! DOCTYPE html>

<html xmlns = "http://www.w3.org/1999/xhtml">

<head>

<title> </title>

<style>

p.pos_fixed {

position: fixed;

top: 40px;

right: 8px;

}



</style>

</head>

<body>

<p class = "pos_fixed"> An element with position: fixed </p>

</body>

</html>

Learning how to position in CSS

- Relative:

The difference between this method and the previous one in determining the position is that it is possible to move the elements with the help of top, bottom, left, right properties, but it generally puts the elements in normal places, here are some examples in the following:

# box_1 {

Position: relative;

Width: 200px;

Height: 200px;

Background: # ee3e64;

}



# box_2 {

Position: relative;

Width: 200px;

Height: 200px;

Background: # 44accf;

}



# box_3 {

Position: relative;

Width: 200px;

Height: 200px;

Background: # b7d84b;

}

Here is another example of how to position elements using this method:

<! DOCTYPE html>

<html xmlns = "http://www.w3.org/1999/xhtml">

<head>

<title> </title>

<style>

h2.pos_top {

position: relative;

top: 50px;

}



</style>

</head>

<body>

<h2 class = "pos_top"> This element has position: relative; </h2>

</body>

</html>

- Absolute:

In this method, in order to determine the position of different elements, they are positioned according to the parent element, and in the case that they cannot find it, then the elements will change position according to the HTML code is displayed on top and in front of another element.

- Right:

This property determines the edge of right margin for the positioned box.

- Top:

It adjusts the edge of the top margin for the positioned box.

Learning how to position in CSS

Last word:

In this article, we have explained the different methods of positioning the elements for you and tried to help you understand them better by giving various examples in this regard, so that you can use it to determine a suitable framework for your content, in general, there were 5 methods to determine the position of the elements, each of which should be used according to the purpose of using the element, so that try to choose the best one according to the mentioned points.

DotNek بازدید : 128 چهارشنبه 19 خرداد 1400 نظرات (0)

By learning CSS, you can avoid the repetitive use of HTML code, which can save your time a lot and also keeps your work organized, which is of a great importance, and with the introduction of different programming languages ​​and also the importance of being updated regularly, site designers can spend more energy to design different sites with more features and ultimately be able to provide better results as well as facilities to their users, so in this article we will mention some tips on how to build links, lists and tables using CSS, but first we are going to define CSS.

Learn how to create links, lists, tables in CSS

What is CSS?

It stands for Cascading Style Sheets is a language which was created to shape and make a website as well as web pages and its internal components, and it is one of the main tools for web designers, along with HTML, JavaScript, etc., which is being used a lot.

How to create links in CSS?

Links are very important in the content of a site, and it is necessary to increase your knowledge about linking and related topics,

existing links can be designed in different ways depending on their states, which in the following we will discuss more about this, in general the four links states are:

- a: link:

One of the types of links that we need to mention is this type which includes all links that are normal and unvisited.

- a: visited:

This is another type of link that, as the name implies, includes links that different users have visited.

- a: hover:

In this type, the users hit the link with their mouse, but they do not click on it.

- a: active:

It refers to the exact time when the user clicks on the link.

It should be noted that if you wanted to use multiple link modes in CSS at the same time, a: visited must be followed by a: link or a: active must be followed by a : link, a: visited and a: hover.

For example:

/ * unvisited link * /
a: link {
color: red;
}

/ * visited link * /
a: visited {
color: green;
}

/ * mouse over link * /
a: hover {
color: hotpink;
}

/ * selected link * /
a: active {
color: blue;
}

Text Decoration:

Links can more beautiful by removing the lines below them which gives a beautiful and appropriate look to the content, if you want the explanation of the 4 states that a link can have which we have explained each of them earlier, you need to do the following.

a: link {
text-decoration: none;
}

a: visited {
text-decoration: none;
}

a: hover {
text-decoration: underline;
}

a: active {
text-decoration: underline;
}

Background Color:

Another thing that can be changed in relation to the links and caused a link to be displayed in a way that we want, is its background color, which in order to change this, as in the previous case, you can write simple code, and you can do this in a way that the users can realize that the link currently exists in which of these 4 positions.

a: link {
background-color: yellow;
}

a: visited {
background-color: red;
}

a: hover {
background-color: green;
}

a: active {
background-color: blue;
}

There are some examples of coding for links which have been mentioned above, each of which is for a separate feature for the link, but imagine that you want to determine multiple features such as color, background color, no line below the link, and so on, in order to do this, you must do the following.

a: link, a: visited {
background-color: # 0000ff;
color: Blue;
padding: 13px 26px;
text-align: center;
text-decoration: none;
display: inline-block;
}

a: hover, a: active {
background-color: yellow;
}


Learn how to create links, lists, tables in CSS

Another example:

a: link, a: visited {
background-color: green;
color: blue;
border: 2px solid green;
padding: 8px 16px;
text-align: center;
text-decoration: none;
display: inline-block;
}

a: hover, a: active {
background-color: red;
color: white;
}



How to create lists in CSS?

Lists can be very helpful to a user who has come to your site, and you want to see, a complete list of all your products, or a list of product prices and thousands of other lists, each of which may be used for an application, there are generally two main types of listings in CSS, which are as follows.

- Unordered Lists:

This link is called

      in coding and all items in the list are indicated by bullets, for example consider the list below which is an Unordered List.

o Chocolate cake

o Strawberry cake

o Vanilla Cake

▪ Chocolate cake

And Strawberry cake

And Vanilla Cake

- Ordered Lists:

This link is also indicated by

        and the items in the list are indicated by letters or numbers, an example of this list is given in the following.

1. Chocolate cake

2. Strawberry cake

3. Vanilla Cake

I. Chocolate cake

II. Strawberry cake

III. Vanilla Cake

List-style-type:

One of the features that can be changed in these lists according to your decision is that you can choose what to use next to the items in your list, for example in Unordered Lists, someone may select items that the members of the list should be shown with a square and so on, which we have given you an example in this regard below.


ul.a {
list-style-type: circle;
}

ul.b {
list-style-type: square;
}

ol.c {
list-style-type: upper-novel;
}

ol.d {
list-style-type: lower-alpha;
}

List-style-image:

Another feature that these lists can have is that they use different images to show the items in the list, in which case the following command can be used to achieve this goal.

ul {
list-style-image: url ('smiley.gif');
}
ol {
list-style-image: url ('sqpurple.gif');
}


List-style-position:

This will help you determine where you want each of the markers on your list to be, the position of them may be as follows.

- outside:

In this case, the markers in the list are in a position outside the existing list frame.

-  inside:

In this case, the markers that are placed next to each of the list items are inside the list frame.

ul.a {
list-style-position: inside;
}

ul.b {
list-style-position: outside;
}

List-style-type: none:

By default, there are a number of features for this type of list that you may not want, you need to modify them with the help of the following code.

ul {
list-style-type: none;
margin: 0;
padding: 0;
}

List-style Shorthand property:

If you want to specify all the attributes that a list can have which you can specify them in relation to a list, you need to do the following.

ol {
list-style: circle outside url ("sqpurple.gif");
}

Create color lists:

As you know, the ultimate goal of all this work is to attract more users, so you can make the existing lists colorful, so that you can attract more users to your content, it should be noted that if you do not want the whole list to be colored uniformly, you can use the

    1. tag, in which case each item in the list will be colored separately.

      for example:

      for example:
      ul li {
      background: # ffe5e5;
      margin: 5px;
      }

      How to create tables in CSS?

      It is possible for you to use it to create an attractive look for the tables in your content, which we will explain in more detail below, it should be noted that there are two elements in tables, and .

      Table Borders:

      One of the features that can make the tables beautiful is their borders, for instance, you can choose a blue border for your table:

      table, th, td {
      border: 1px solid blue;
      }

      Full-Width Table:

      Another feature that you can use in order to get the user's attention is to draw tables that take up the entire width of the page instead of creating small tables.

      table {
      width: 100%;
      }



      Learn how to create links, lists, tables in CSS

      Last word:

      In general, with the help of CSS, you can create a beautiful and attractive appearance for your content, in this article, we have taught you how to create links, lists and tables with the help of CSS, which you can use the mentioned tips according to your needs in order to create an attractive website which can get a high ranking in search engine results page due to the fact that it has the ability to attract users.

DotNek بازدید : 57 چهارشنبه 19 خرداد 1400 نظرات (0)

There are several sites that users can use on a regular basis in order to get the answers to their questions, each of which has different appearances, which is what makes them attractive to different users, such as the virtual world where the user chooses a store, out of hundreds shops, due to the attractiveness of the shop design , as a site owner, in order to create an attractive design for your site , you need to increase your level of knowledge about CSS and learn the ways of choosing an attractive background for different pages, or you can use a readable and appropriate font in order to increase your site traffic , but before that we need to give you a brief and general explanation about CSS itself.

Learning Style Sheets, background, text and font in CSS

What is CSS?

CSS stands for Cascading Style Sheets which by being added to HTML through different methods, causes websites to be displayed in the best possible way, there are 3 ways to do this:

- External CSS:

By using this method, you can change the appearance of a site in the shortest time, it should be noted that, it is enough to change one of the files, which we will give you an example of it, in the following.

<! DOCTYPE html>

<html>

<head>

<link rel = "stylesheet" href = "mystyle.css">

</head>

<body>



<h1> This is a heading </h1>

<p> This is a paragraph. </p>



</body>

</html>

- Internal CSS:

This method should be used when a page has its own unique style, so that you cannot make a big change to it, in this case you can easily apply the desired changes through this method.

<! DOCTYPE html>

<html>

<head>

<style>

body {

background-color: linen;

}



h1 {

color: maroon;

margin-left: 40px;

}

</style>

</head>

<body>



<h1> This is a heading </h1>

<p> This is a paragraph. </p>



</body>

</html>

- Inline CSS:

In this method, it is also necessary to add the style attribute to the relevant element.

<! DOCTYPE html>

<html>

<body>



<h1 style = "color: blue; text-align: center;"> This is a heading </h1>

<p style = "color: red;"> This is a paragraph. </p>



</body>

</html>

CSS background:

Background in CSS has various features which are as follows: background-color, background-size, background-position, background-clip, background-image, background-size, background-repeat, background-origin, background-attachment, all of which will be explained briefly in the following.

- Background-color:

As its name implies, you can adjust the background colors with the help of this item, and it is necessary to be careful while choosing the right color, so you shouldn’t choose the color that makes the users not be able to use the website properly after a while, due to the fact their eyes will get tired of it.

body {background-color: white;}

- Background-size:

In order to adjust this item, you must specify the width and height, it is also possible to use the word “auto” in order to determine the size automatically, in addition, it is possible to use one of the items such as width and allow the length to be automatically determined.

background: url (hill.jpg);

background-repeat: no-repeat;

background-size: auto;

}

- Background-position:

As its name shows, it is used to set the background position, and you must use it to determine where the background should start, so you can use some words such as, left top, left center, left bottom, center top, etc., or use percentages, pixels and so on, in order determine the position of the background, there is an example of setting the background position for you.

body {

background-image: url ('HTML.gif');

background-repeat: no-repeat;

background-attachment: fixed;

background-position: bottom right;

}

Learning Style Sheets, background, text and font in CSS

- Background-image:

In order to set different photos in one element, you have to use this item.

body {

background-image: url ("img_ant.gif"), url ("book.gif");

background-color: #cccccc;

}

- Background-origin:

The background position area can be specified through this item.

{

border: 5px dashed white;

padding: 15px;

background: url (paper.gif);

background-repeat: no-repeat;

background-origin: content-box;

}

Text:

The text in a content is of a great importance for the user who visits your website, in CSS, the text is placed inside the content box of the element, this box should contain the desired text, also if you want to cut one of the lines, you need to use the
element, texts have the following characteristics:

- Font styles:

This feature is used to apply different properties to the font, for example, you may want to make the text lighter, smaller, etc., which you have to use some properties in order to achieve your goal.

- Text layout styles:

This feature is used to determine the distance between lines, words, etc., and sets all these items in the content box.

CSS font:

Font is also so important in designing a site , for instance, you can use a different font for a text which is more important, so that the users can notice its importance as soon as they see it, in order to aster this section, you must know font-style, font-variant, font-weight, font-family, font-size, etc., which we will explain a number of them in the following.

- font-style:

This item has different types that include, normal, italic, oblique, initial and inherit.

p.a {

font-style: normal;

}



p.b {

font-style: italic;

}



p.c {

font-style: oblique;

}

- font-variant:

This feature determines that the text should be written in uppercase or lowercase as well as their size.

p.small {

font-variant: small-caps;

}

- font-weight:

The size of different characters in the text is determined with the help of this item, this case has various properties that can be shown in the text with the help of the following values.

                 

Normal:

It is used to specify normal characters in the text.

Bold:

 It is used to indicate bold characters.

Lighter:

It defines lighter characters

100-900:

The numbers 100 to 900 are used to determine whether the characters are faint or bold, when a small number is used, it will be fainter, and the closer the number is to 900, the bolder it will be.

p.normal {

font-weight: normal;

}



p.thick {

font-weight: bold;

}



p.thicker {

font-weight: 800;

}

Another example:

p.normal {

font-weight: normal;

}



p.thick {

font-weight: bold;

}



p.thicker {

font-weight: 700;

}

- Font-size:

This item is used to determine the font size, which can be adjusted in different ways, for this setting, the following values must be used.

Medium:

This value is presented in font-size by default, and as its name implies, it has a medium size in that font.

xx-small

x-small

Small

Large

x-large

xx-large

Smaller

Larger

Length:

In this case, you have to adjust the font size in centimeters.

%:

In this case, the font size is determined as a percentage.

div.a {

font-size: 20px;

}



div.b {

font-size: x-large;

}



div.c {

font-size: 120%;

}

Another example:

div.a {

font-size: 40px;

}



div.b {

font-size: x-large;

}



div.c {

font-size: 150%;

}



Learning Style Sheets, background, text and font in CSS

Last word:

In general, website design should be one of the most important goals that every person has before creating a site , in order to create a site, you must have a lot of knowledge in this regard in order to be able to act correctly, the most important thing that can be used in site design is Cascading Style Sheets, in which different items can be used in order to design each item in a site, in this article, we have mentioned fonts, text, backgrounds, etc., which you can use to design a suitable and attractive site, and to design appearance of each character, letters, images, etc., you should use the available items.

Here we have tried to give examples of the ways of coding, and the ways of implementing the code, so that you can design a suitable site that attracts different users to the site which increases the traffic to the website , and the website ranking will increase as well, so that the site owners can see the result of their efforts and accuracy in creating the site and achieve success through this way, due to the fact that if you can attract more users, you will achieve your goal as soon as possible, because when your website is attractive enough, the users may decide to introduce your website to their friends, as a result, the number of your website users will increase day by day.

DotNek بازدید : 58 چهارشنبه 19 خرداد 1400 نظرات (0)

Play designing has a very important role in technology and entertainment today. In this article, we want to talk to you about the tools and game courses and tell you how you can increase your knowledge in game development by using the various courses that exist in this field. Note that in general there are many steps and actions in the field of designing a game . At the elementary level, you should try to master the skills of programming, getting acquainted with Photoshop software, having a lot of motivation and energy, and passing the game programming course, game design course, and game art course so that you can finally, design and produce a game. Note that there are different courses and stages for game making that you can use according to your taste from any of these courses that are available in various levels and sites to be able to develop your skills in making and producing games. These skills are held in many different types and different courses for those who are interested, and you can find the institute or site you want by researching in this field and spend your courses in them.

What are the best courses and tools for game development?

Steps to game development

After you have chosen your course and enrolled in the institute of your choice to take gaming courses, it is better to know some tips about the game programming process so that you can increase your knowledge in this field. In the following, we intend to fully name the stages of designing a game for you to more familiar with this stage.

First, raise your information

In the first step in designing game , you should be familiar with some of the terms that exist in this field so that you can have a better understanding of the purpose of game development.  You need to have answers to these questions such as why we play, how many games there are, what the style of computer games is, what hardware is needed to run the game, and who the game maker is, when you can answer these questions, you can grow higher in the field of game coding and its goals. Note that games today are not just entertainment, and the gaming industry has the potential to become one of the largest and most lucrative industries in the world, so you should try to get all the information you need about gaming so you can have a comprehensive and complete view of the world of games and designing the game so that you can be more successful in this field and can produce appropriate games.

The second step is to introduce the resources

Before you start making games , try to get comprehensive and complete information about playing methods.  Try to participate in different workshops for gaming so that you can see the training required for gaming. One of the different and appropriate resources to get help in gaming is the Internet.  You can learn anything you want on the internet. When playing games, if you have a problem, try to search all your questions on the Internet so that you cannot only add to your knowledge but also solve your problems. Note that not everything that is said on the Internet is true, so try to use the highest quality sites and make sure that the information you receive is correct so that, God forbid, there are no special problems for you in this area and you can build your own game without any problems.  There are also various articles in this field that you can play according to these items.

The third step is to introduce the steps and tools of game designing

After you have mastered the basics of gaming, the third step you should have a complete view of the game you are designing . For example, you need to specify your goal of producing the game , the required and available budget and time, form your team and document, choose the game engine, and test the market. So, after you get the comprehensive information about the designing game, in the third step you have to figure out all these issues for yourself to understand what you are going to do. You need to define your purpose for making the game, for example, some games are made for material, educational, experimental, etc. purposes so you must always have comprehensive information about the game you are making. Once you have defined your goal, you need to know how much budget and time you have to produce, and then you need to determine your team and get help from people who specialize in these areas, and by choosing the right game engine , build yourself a game with the highest quality.

Steps to game development

Conclusion

In this article, we have tried to talk to you about the courses and stages of making a game, we have tried to tell you tips so that you can get information about the development of games by paying attention to these points. Note that you have to take a certain amount of time to learn gaming courses, and it is better to get information about the time of the company before taking these courses. For example, you need at least two weeks to learn the basics of the game as well as the conceptual parts of the game. You should take at least a month to learn how to use the game engine and programming engine, and fifteen days to master graphic related tools such as Photoshop, etc., and after these courses, you will need one month to be able to  Create a basic mini-game so that in this mini-game you can realize your strengths and weaknesses. Note that making a mini-game helps you to produce the game according to your abilities and creativity and get to know your strengths and weaknesses. It will also help you to strengthen your strengths and try to overcome your weaknesses.

DotNek بازدید : 62 چهارشنبه 19 خرداد 1400 نظرات (0)

It should be noted that the search process can be different in different sections. In this case, the search results can be displayed to the user from the server, application , system, device, etc. Therefore, the user can easily perform the search operation according to his needs and then receive the related results. In this part of the tutorial, we want to talk about searchview android and search operations.

How to work with searchview on Android systems and perform search operations

What he learns in this section is as follows:

- What is searchview android ?

- How to build and run a searchview android project in Android Studio - How to add a searchview to the toolbar

- searchview in actionbar android example

What is Searchview?

searchview android is another widget that exists in Android and the user can use it to search for one or more phrases and view the results there. searchview android is actually a bar that is used to perform the search process, in which the user searches for the words or phrases he wants there and sees the results.

1- I create a project in Android Studio and name it SearchView as desired.

2- The type of activity used in this training is Empty Activity.

3- It should be noted that the language required for this project is Java.

4- In the activity layout, we add a ListView and SearchView.

5- The codes that should be in the activity_main.xml section are as follows:

<? xml version = "1.0" encoding = "utf-8"?>
<RelativeLayout
xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
tools: context = ". MainActivity">

<ListView
android: id = "@ + id / list_view"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
android: divider = "# BCBCBC"
android: dividerHeight = "1dp"
android: layout_below = "@ id / search_view" />

<SearchView
android: id = "@ + id / search_view"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: queryHint = "Search ..."
android: iconifiedByDefault = "false"
android: layout_alignParentTop = "true" />

</RelativeLayout>

In the code above, the queryHint feature is used to add help, and the iconifiedByDefault feature is used to display search options. A false value is set for the second attribute, which ultimately causes the widget not to be an icon but also to have a search box. Note that if we set the value of the second attribute to true, it will cause the search box not to be displayed and only a magnifying glass icon to be displayed.

6- Define two widgets in an activity and create a list that includes the names of several cities.

7- The codes that should be in the MainActivity.java section are as follows:

package ir. android_studio. SearchView;

import androidx.appcompat.app. AppCompatActivity;
import android.os. Bundle;
import Android.Widget. ArrayAdapter;
import Android.Widget. ListView;
import android. widget. SearchView;
import java. util. ArrayList;

public class MainActivity extends AppCompatActivity {

SearchView;
ListView;
ArrayList list;
ArrayAdapter adapter;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

searchView = findViewById (R.id. search_view);
listView = findViewById (R.id. list_view);

list = new ArrayList <> ();
list.add ("Istanbul");
list.add ("Los Angles");
list.add ("Frankfurt");
list.add ("Paris");
list.add ("Vienna");
list.add ("Belgium");
list.add ("New York");

adapter = new ArrayAdapter <String> (this, android.R. layout. simple_list_item_1, list);
listView.setAdapter (adapter);

}
}

How to work with searchview on Android systems and perform search operations

By inserting the above code, we have created a list that contains the values ​​of the city names, which is set on ListView using setAdapter ().

In the next steps we need to create a Listener for SearchView. By creating a listener, we enable the user to check the input and provide the appropriate and related result.

8- To do this, use the setOnQueryTextListener method.

9- I define the method inside the onCreate () activity. Like the following:

searchView. SetOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {
return false;
}

@Override
public boolean onQueryTextChange (String s) {
return false;
}
});

It should be noted that this method itself has two methods, onQueryTextSubmit () and onQueryTextChange (), which are automatically added by Android Studio .

Both methods are boolean, in other words, the values ​​that can be placed in these methods are false or true.

10- We complete the methods as follows:

searchView. SetOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {

if (list. Contains (s)) {
adapter. get Filter (). filter (s);
} else {
Toast.makeText (MainActivity.this, "Item not found", Toast.LENGTH_LONG). show ();
}

return false;
}

@Override
public boolean onQueryTextChange (String s) {

adapter. get Filter (). filter (s);

return false;
}
});

By entering the above code, the characters entered by the user are stored in a String named s.

In the code above, we have defined a condition for onQueryTextSubmit to check whether the value entered by the user stored in s is in the list.

In other words, the strings stored in s are set by the adapter in listView.

adapter. get Filter (). filter (s);

How to work with searchview on Android systems and perform search operations

get Filter () also filters the options in the list and removes the rest of the items in the list. However, if the characters entered by the user do not match the items in the list, a toast will be displayed indicating that the item was not found.

But it should be noted that in onQueryTextChange we have defined a condition that checks the user input characters and adds to the list if it is not in the list. This means that if the item that the user is looking for is not in the list, it should be added to the list:

11- The complete code that should be included in MainActivity.java is as follows:

package ir. android_studio. SearchView;

import androidx.appcompat.app. AppCompatActivity;
import android.os. Bundle;
import Android.Widget. ArrayAdapter;
import Android.Widget. ListView;
import android. widget. SearchView;
import android. widget. Toast;

import java. util. ArrayList;

public class MainActivity extends AppCompatActivity {

SearchView;
ListView;
ArrayList list;
ArrayAdapter adapter;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

searchView = findViewById (R.id. search_view);
listView = findViewById (R.id. list_view);
list = new ArrayList <> ();
list.add ("Istanbul");
list.add ("Los Angles");
list.add ("Frankfurt");
list.add ("Paris");
list.add ("Vienna");
list.add ("Belgium");
list.add ("New York");
adapter = new ArrayAdapter <String> (this, android.R. layout. simple_list_item_1, list);
listView.setAdapter (adapter);

searchView. SetOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {

if (list. Contains (s)) {
adapter. get Filter (). filter (s);
} else {
Toast.makeText (MainActivity.this, "Item not found", Toast.LENGTH_LONG). show ();
}

return false;
}

@Override
public boolean onQueryTextChange (String s) {

adapter. get Filter (). filter (s);

return false;
}
});

}
}

12- We will implement the project.

13- Enter the letter "I" to test. We see that it displays the corresponding value.

Add SearchView to the toolbar

In this part of the tutorial, we want to enter SearchView into the toolbar and display it there.

1- To do this, we must first create a menu directory.

2- Then add the xml file to it. It should be noted that the name of this file has been chosen arbitrarily in this tutorial, toolbar_searchview.

3- In the menu, we define an item like the following.

4- The code that should be in the toolbar_searchview.xml file is as follows:

<? xml version = "1.0" encoding = "utf-8"?>
<menu xmlns: app = "http://schemas.android.com/apk/res-auto"
xmlns: android = "http://schemas.android.com/apk/res/android">

<item
android: id = "@ + id / toolbar_search"
android: icon = "@ drawable / ic_search"
android: title = "Search"
app: showAsAction = "ifRoom | with Text"
app: actionViewClass = "android. widget. SearchView" />

</menu>

In the codes listed above, we add a magnifying glass icon to the drawable folder of the project by default from the icons of Android Studio Assets Studio.

5- In the next step, after the onCreate () method and in the Activity class, I add the onCreateOptionsMenu () method. Like the following:

@Override
public boolean onCreateOptionsMenu (Menu menu)
return super. onCreateOptionsMenu (menu);
}

6- Then we complete the method as follows:

@Override
public boolean onCreateOptionsMenu (Menu menu) {

Menu Inflater = getMenuInflater ();
inflater. inflate (R. menu. Toolbar_searchview, menu);
final SearchView toolbar_searchview =
(SearchView) menu. findItem (R.id. toolbar_search). g Search");
toolbarSearchView.setIconifiedByDefault (true);

searchView. SetOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {

if (list. Contains (s)) {
adapter. get Filter (). filter (s);
} else {
Toast.makeText (MainActivity.this, "Item not found", Toast.LENGTH_LONG). show ();
}

return false;
}

@Override
public boolean onQueryTextChange (String s) {
adapter. get Filter (). filter (s);
return false;
}
});

return super. onCreateOptionsMenu (menu);
}

After inflating the menu, we created a SearchView with the desired toolbar_searchview name, which is linked to the menu item.

Then we use the setQueryHint and setIconifiedByDefault methods, the first method adds a Hint and the second method because it is true, only the magnifying glass icon is displayed and the search box is not displayed.

7- Then, we run the project.

8- We will see that an icon has been added to the toolbar, which by clicking on it, the search box will be added, and you can easily use it to perform search operations.

9- Note that if we set setIconifiedByDefault to false, the search box will be displayed by default.

10- In this part of the simple mode tutorial, we reviewed and created a searchview android example.

11- The complete and final code that should be in the MainActivity.java section are as follows:

package ir. android_studio. SearchView;

import androidx.appcompat.app. AppCompatActivity;
import android.os. Bundle;
import android. view. Menu;
import android. view. Menu Inflater;
import Android.Widget. ArrayAdapter;
import Android.Widget. ListView;
import android. widget. SearchView;
import android. widget. Toast;

import java. util. ArrayList;

public class MainActivity extends AppCompatActivity {

SearchView;
ListView;
ArrayList list;
ArrayAdapter adapter;

@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);

searchView = findViewById (R.id. search_view);
listView = findViewById (R.id. list_view);

list = new ArrayList <> ();
list.add ("Istanbul");
list.add ("Los Angles");
list.add ("Frankfurt
");
list.add ("Paris");
list.add ("Vienna");
list.add ("Belgium");
list.add ("New York");
adapter = new ArrayAdapter <String> (this, android.R. layout. simple_list_item_1, list);
listView.setAdapter (adapter);

searchView.setOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {

if (list. contains (s)) {
adapter. getFilter (). filter (s);
} else {
Toast.makeText (MainActivity.this, "Item not found", Toast.LENGTH_LONG). show ();
}

return false;
}

@Override
public boolean onQueryTextChange (String s) {

adapter. getFilter (). filter (s);

return false;
}
});
}

@Override
public boolean onCreateOptionsMenu (Menu menu) {

MenuInflater mInflater = getMenuInflater ();
mInflater.inflate (R. menu. toolbar_searchview, menu);
final SearchView toolbarSearchView = (SearchView) menu. findItem (R.id. toolbar_search). getActionView ();
toolbarSearchView.setQueryHint ("Search");
toolbarSearchView.setIconifiedByDefault (true);

toolbarSearchView.setOnQueryTextListener (new SearchView.OnQueryTextListener () {
@Override
public boolean onQueryTextSubmit (String s) {

if (list. Contains (s)) {
adapter. get Filter (). filter (s);
} else {
Toast.makeText (MainActivity.this, "Item not found", Toast.LENGTH_LONG). show ();
}

return false;
}

@Override
public boolean onQueryTextChange (String s) {
adapter. get Filter (). filter (s);
return false;
}
});

return super. onCreateOptionsMenu (menu);
}
}

How to work with searchview on Android systems and perform search operations

In this tutorial, you learned how to check and create a searchview android example, and you were able to make settings related to it.

DotNek بازدید : 59 چهارشنبه 19 خرداد 1400 نظرات (0)

These days, users spend a lot of time on the Internet throughout the day and night in order to do all their daily tasks through it, with the release of the latest version of HTML , users gained a better experience of using the Internet, and the reason for this positive user experience was the ability to add high quality videos, audio and images through this way, in order to be able to add them to a website , you need to enter code, which we are going to mention briefly below.

In general, these days, most owners of large and small sites use HTML5 , therefore they are able to attract different users to their websites, and eventually users recommend these sites to their friends, thus it causes an increase in the traffic and ranking of the website , which causes the site to appear in the first page of search engine results page which can have a huge impact on the success of a website.

Learn how to add audio and video in HTML5

How to embed audio files?

With the help of HTML5 you can do this task easily, but it should be noted that it is necessary to specify the source, and you also need to embed the control feature in it, so that the user who is using that audio can play or pause it, audio formats may be Ogg, mp3, wav, and so on, which are not specified in the HTML5 draft, but these three audio formats are supported in HTML.

The

There are various browsers such as Chrome, Firefox, Safari, Opera, etc., all of which support all three audio formats mentioned above, except for Safari, which does not support OGG format, but it supports two other audio formats.

These audio files have features such as autoplay, autobuffer, controls, loop, muted, preload, src, which we will briefly explain about each of them in the following.

Autoplay:

As you know, this feature detects that the sound should be played as soon as it is ready.

<audio scc = “sound.mp3” autoplay = ”autoplay”>

browser does not support the audio element

</audio>

Controls:

This feature also allows the user to view control buttons such as play, pause, etc., and use them if needed.

Loop:

Through this way, whenever the audio ends, it starts playing again from the beginning and the file can be heard by users repeatedly, the use of this adjective is as follows:

<audio src = “sound.mp3” loop = ”loop”>

browser does not support the audio element

</audio>

Learn how to add audio and video in HTML5

Muted:

 it indicates that it should be silent and no sound should be heard.

Preload:

When you refer to a site that has audio files, it is the site owner who determines whether the audio file is included in the content, should be downloaded at the same time as loading the page or not, in the following part we are going to show you the way it works.

<audio src = “sound.mp3” preload = “auto”>

browser does not support the audio element

</audio>

Autobuffer:

If the file does not be played automatically, the autobuffer will be started automatically by installing this feature.

Src:

The most important feature of a Src tag is that it specifies the address of the audio file, so that the browser can use it.

<audio src = “sound.mp3”>

browser does not support the audio element

</audio>

In general, adding an audio file may be done as follows:

<! DOCTYPE HTML>

<html>
<body>

<audio controls autoplay>
<source src = "/html5/audio.ogg" type = "audio / ogg" />
<source src = "/html5/audio.wav" type = "audio / wav" />
Your browser does not support the <audio> element.
</audio>

</body>
</html>

How to embed a video?

By adding videos to various contents, especially educational content, users can gain a positive user experience and ultimately make the best use of the web , and it should be noted that video has more features than audios, due to the fact that Video is visual unlike audio, which is the reason why it has more features such as poster, length and width in addition to audio file ones.

Users may try to visit the site through various devices and then view the video, so HTML5 can be considered as a great help to site owners, so that users with any device can get a positive user experience from using the site, we will briefly explain each of the features in the following.

Length and width:

The size of the videos is very important, and you can use CSS to control this size, a feature that all of them must maintain properly is the ratio between length and width which is called the aspect ratio, and this is very important.

Poster:

This feature shows an image before the video is played, which its attractiveness is of a great importance, due to the fact that different users may be attracted to the video and click on it after seeing the attractive poster, so it is necessary to choose a good image as the poster for your work.

Video files also come in a variety of formats, including mpeg4 and Ogg, the most important feature of image files like audio files, is the source, which is necessary to be properly specified in the tag, and browsers try to use the first format they identify, by seeing the source.

Adding an image file may be done as follows:

<! DOCTYPE HTML>

<html>
<body>

<video width = "400" height = "300" controls autoplay>
<source src = "/html5/foo.ogg" type = "video / ogg" />
<source src = "/html5/foo.mp4" type = "video / mp4" />
Your browser does not support the <video> element.
</video>

</body>
</html>



 - HTML5 player libraries:

These players are implemented with JavaScript, in fact, they make more compatibility between different browsers, so that they can provide the user with video which contains more features and better quality, for example, one of the features that can be supported which may not be supported in some browsers is a subtitle that can cause the user to have a very positive user experience by watching the video, in addition to the points which have been mentioned above, JavaScript can provide many features that browsers may or may not support, all of which can significantly improve the quality of video.

Important note:

As mentioned before, all browsers may not support all audio and video formats, so you should use the following trick to give this opportunity to the users who visit your site with any browser and play the video or audio file, to be able to achieve their goal and meet their needs as well, for example, in the case of audio files that as you know they have two formats, you can use the following trick.

<"audio controls =" controls

</ "source src =" song.ogg "type =" audio / ogg>

</ "source src =" song.mp3 "type =" audio / mpeg>

Your browser does not support the audio element

<audio />

In this example, we have provided the source tag twice in both available formats, so that the browser shows the file which is able to play, and when neither MPEG nor OGG can be supported by the browser, a text will be displayed to the user including the sentence that your browser does not support the audio element.

Learn how to add audio and video in HTML5

Last word:

In general, HTML5 made a huge change in the world of the Internet, it allows users to get a better user experience from various websites, especially the ones that have educational contents, all of which can be used with the help of adding this version of audio and video files to the content, in this article, we tried to explain to you the ways of embedding audio and video files, and we also explained the different features that each one has, so that you can use the given information in order to create different contents for your website and attract more users to it .

DotNek بازدید : 59 چهارشنبه 19 خرداد 1400 نظرات (0)

Bitmaps used to specify the resolution of different types of images can be stored under the -mdpi, -hdpi, -xhdpi, -xxhdpi folders, whose parent folder is also res / drawable . Each Drawable is stored as a separate file inside the res / drawable folders. In this tutorial we will talk about what Drawables are and what they are used for and how they can be used in Android .

What are drawable in applications and how can they be designed?

Use drawables

To be able to access and use Drawables, we can act as a @drawable / filename. In this case, instead of filename, we must write the name of the file we want to access. It should be noted that the file name must be entered without an extension, if the file we want to access has an extension, the extension must be removed. For example, suppose we want to access the res / drawable / test.png file, in which case we have to do this @ drawable / test and delete the last extension, which is png.

like the:


<Textview xmlns: android = "http://schemas.android.com/apk/res/android"
Android: id = "@ + id / textView1"
Android: layout_width = "wrap_content"
Android: layout_height = "wrap_content"
Android: background = "@ drawable / hello"
Android: text = "@ string / hello_world" />

It is also worth mentioning that by using codes and through coding, Drawable can be assigned and connected to Views. Because all views accept the resource ID in front of each input parameter.

Below is the code that can show how to draw Drawables as a background to ImageView:

ImageView = (ImageView) findViewById (R.id. image);

ImageView.setImageResource (R. drawable. hello);

This code specifies how to connect the Drawable as a background or ImageView.

How to load Bitmap

Android offers the Bitmap class to be able to work with bitmaps. So it can be said that the Bitmap class was created to be able to use bitmaps. In this part of the tutorial we want to teach you how to convert Bitmap objects to Drawable or vice versa.

Note that you can even load bitmap files and then convert them to Drawable objects .

Below is a code that shows how to create a Bitmap object in the assets folder and assign it to ImageView. The code below can then create the Bitmap object inside the assets folder and assign it to ImageView.


// Get the AssetManager
AssetManager manager = getAssets ();
// read a Bitmap from Assets
InputStream open = null;
try {
open = manager. open ("logo.png");
Bitmap = BitmapFactory.decodeStream (open);
// Assign the bitmap to an ImageView in this layout
ImageView view = (ImageView) findViewById (R.id. imageView1);
view. setImageBitmap (bitmap);
} catch (IOException e) {
e. printStackTrace ();
} finally {
if (open! = null) {
try {
open. close ();
} catch (IOException e) {
e. printStackTrace ();
}
}
}

Another way is to access Drawables through the res / drawable folder. In fact, in this method of accessing Drawables, they can be used as Bitmaps within the source code.

The code below can clearly show this process:

Bitmap b = BitmapFactory.decodeResource (getResources (), R. drawable.ic_action_search);
You can create a scale bitmap based on new definitions such as height or weight.
Bitmap originalBitmap = <initial setup>;
Bitmap resizedBitmap =
Bitmap.createScaledBitmap (originalBitmap, newWidth, newHeight, false);

To be able to convert the Bitmap object to Drawable, you can use the following code:


# Convert Bitmap to Drawable
Drawable d = new BitmapDrawable (getResources (), bitmap);

The code below can be used when you want to convert Bitmap objects to Drawable . So when you want to do this and convert Bitmap objects to Drawable, you can use the code listed above.

What is Shape Drawable?

Shape Drawables are actually XML files that allow programmers and developers to use geometric objects, colors, gradients, and other elements to draw a shape and place it in Views. The advantage of using drawable is that it can be automatically adjusted to the defined size.

Below is a code that is an example of a drawable:


<? xml version = "1.0" encoding = "UTF-8"?>
<shape xmlns: android = "http://schemas.android.com/apk/res/android"
android: shape = "rectangle">
<stroke android: width = "2dp"
android: color = "# FFFFFFFF" />
<gradient android: endcolor = "# DDBBBBBB"android: startcolor = "# DD777777"
android: angle = "90" />
<corners android: bottomrightradius = "7dp"
android: bottomleftradius = "7dp"
android: topleftradius = "7dp"
android: toprightradius = "7dp" />
</shape>

It should be noted that you have this possibility and you can assign the desired drawable to the background property of your page or layout. In other words, drawables can be placed on pages as background property.

<? xml version = "1.0" encoding = "utf-8"?>
<linearlayout xmlns: android = "http://schemas.android.com/apk/res/android"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
android: background = "@ drawable / myshape"
android: orientation = "vertical">
<edittext android: id = "@ + id / editText1"
android: layout_width = "match_parent"
android: layout_height = "wrap_content">
</edittext>
<radiogroup android: id = "@ + id / radioGroup1"
android: layout_width = "match_parent"
android: layout_height = "wrap_content">
<radiobutton android: id = "@ + id / radio0"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: checked = "true"
android: text = "@ string / celsius">
</radiobutton>
<radiobutton android: id = "@ + id / radio1"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: text = "@ string / fahrenheit">
</radiobutton>
</radiogroup>
<button android: id = "@ + id / button1"
android: layout_width = "wrap_content"
android: layout_height = "wrap_content"
android: text = "@ string / calc"
android: onclick = "myClickHandler"> </button>
</linearlayout>

What is State Drawable?

State Drawable can actually help the programmer by describing the situation. In this way, it can explain the desired situation to the programmer and inform him of these situations. Note that each position has a separate drawable inside the View.

Below is the code that can define the unique drawable button according to the situation:

<? xml version = "1.0" encoding = "utf-8"?>
<selector xmlns: android = "http://schemas.android.com/apk/res/android">
<item android: drawable = "@ drawable / button_pressed"
android: state_pressed = "true" />
<item android: drawable = "@ drawable / button_checked"
android: state_checked = "true" />
<item android: drawable = "@ drawable / button_default" />
</selector>
Transition Drawable
Using Transition Drawable, you can enable, define and adjust Transition effects and use them to enhance and beautify your appearance.
<? xml version = "1.0" encoding = "utf-8"?>
<transition xmlns: android = "http://schemas.android.com/apk/res/android">
<item android: drawable = "@ drawable / first_image" />
<item android: drawable = "@ drawable / second_image" />
</transition>
final ImageView image = (ImageView) findViewById (R.id. image);
final ToggleButton button = (ToggleButton) findViewById (R.id. button);
button. setOnClickListener (new OnClickListener () {
@Override
public void onClick (final View v) {
TransitionDrawable drawable = (TransitionDrawable) image. getDrawable ();
if (button. is Checked ()) {
drawable. startTransition (500);
} else {
drawable. reverseTransition (500);
}
}
});

By entering this code, you can easily activate the Transition effect and use it.

 Vector drawables

Android provides the ability to define and adjust Vector drawables for programmers, and programmers can use this feature. The advantage of using Vector drawables is that it calculates the drawable scale according to the device density and makes them adjust automatically.
<Vector xmlns: android = "http://schemas.android.com/apk/res/android"
Android: height = "64dp"
Android: width = "64dp"
Android: viewport height = "600"
Android: viewport width = "600">
<Group
android: name = "rotationGroup"
Android: pivotx = "300.0"
Android: pivoty = "300.0"
Android: rotation = "45.0">
<Path
android: name = "v"
Android: fillcolor = "# 000000"
Android: pathdata = "M300,70 l 0, -70 70,70 0,0 -70,70z" />
</group>
</vector>

The code is inserted to show Vector drawables, which can calculate the scale of drawables based on the density of the device.

It should also be noted that higher versions of Android, such as version 5.0, also have the AnimatedVectorDrawable feature, which allows you to combine vector drawable with animations.

Animation Drawables

As explained above, we can also design Animation Drawables and import Animations into Vector drawables. In this case using the setBa methodckgroundResource () We can call the designed Animation Drawables and put them in the View and assign them.

<! - Animation frames are phase * .png files inside the
Res / drawable / folder ->
<Animation-list android: id = "@ + id / selected" android: oneshot = "false">
<Item android: drawable = "@ drawable / phase1" android: duration = "400" />
<Item android: drawable = "@ drawable / phase2" android: duration = "400" />
<Item android: drawable = "@ drawable / phase3" android: duration = "400" />
</animation-list>
ImageView img = (ImageView) findViewById (R.id. your id);
Img.setBackgroundResource (R. drawable. your_animation_file);
// Get the AnimationDrawable object.
AnimationDrawable frameAnimation = (AnimationDrawable) img. getBackground ();
// Start the animation (looped playback by default).
FrameAnimation.start ();

The code listed above designs an Animation Drawables, calls it using the setBackgroundResource () method, and finally assigns it to the Views.

Patch Drawable

Patch Drawables are actually bitmaps that can be used to measure images, or otherwise can be considered to have some stretchable areas, in which case it can be easily resized, small Kurd or magnified. If the size and scale of the image is not equal to the size and scale of the Drawable, you can change the size of the image to the Drawable size using the stretchable areas from the top and left.

The question may be asked why it can only be resized, enlarged or reduced from the top left? The answer is that the other parts, the bottom and the right can also be used to write and insert text. This is the case where you want to write text inside the Drawable and display it in the view.

A set of programming tools that can use the ADT process in Android are located in the android-sdk / tools installation folder.

How to create a custom Drawable?

In addition to Drawables, custom Drawables can also be used. Drawables that are proprietary can be used with Canvas and can also be customized to suit your needs.

1- Create a project based on the Empty Activity template.

2- Project names have been selected in this tutorial com. vogella. android. drawables. custom.

3- Then create the Drawable custom class.

package com. vogella. android. drawables. custom;
import android. graphics. Bitmap;
import android. graphics. BitmapShader;
import android. graphics. Canvas;
import android. graphics. ColorFilter;
import android. graphics. Paint;
import android. graphics. PixelFormat;
import android. graphics. RectF;
import android. graphics. Shader;
import android. graphics. drawable. Drawable;
public class MyRoundCornerDrawable extends Drawable {
private Paint;
public MyRoundCornerDrawable (Bitmap bitmap) {
BitmapShader shader;
shader = new BitmapShader (bitmap, Shader.TileMode. CLAMP,
Shader.TileMode. CLAMP);
paint = new Paint ();
paint. setAntiAlias (true);
paint. setShader (shader);
}
@Override
public void draw (Canvas canvas) {
int height = getBounds (). height ();
int width = getBounds (). width ();
RectF rect = new RectF (0.0f, 0.0f, width, height);
canvas. drawRoundRect (rect, 30, 30, paint);
}
@Override
public void setAlpha (int alpha) {
paint. setAlpha (alpha);
}
@Override
public void setColorFilter (ColorFilter cf) {
paint. setColorFilter (cf);
}
@Override
public int getOpacity () {
return PixelFormat.TRANSLUCENT;
}
}

4- Now in order to be able to use the class you created above, you need to configure your layout file as below

Now if you want to use the class you created above, you have to make the layout settings as below. In this case, you need to make sure that the settings you made in the layout section are as follows or not.

Use drawables

<relativelayout xmlns: android = "http://schemas.android.com/apk/res/android"
Xmlns: tools = "http://schemas.android.com/tools"
Android: layout_width = "match_parent"
Android: layout_height = "match_parent"
Tools: context = ". MainActivity">
<Imageview
android: id = "@ + id / image"
Android: layout_width = "fill_parent"
Android: layout_height = "fill_parent"
Android: layout_centerhorizontal = "true"
Android: layout_centervertical = "true"
Android: contentdescription = "TODO" />
</relativelayout>

Set the MainActivity class.

In order to be able to use the code listed below, you must create a file called dog.png inside the drawable folder and put the code listed below inside the file.

package com. vogella. android. drawables. custom;
import java.io. InputStream;
import android.app. Activity;
import android. graphics. Bitmap;
import android. graphics. BitmapFactory;
import android.os. Bundle;
import android. view. Menu;
import android. widget. ImageView;
public class MainActivity extends Activity {
@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);
ImageView button = (ImageView) findViewById (R.id. image);
InputStream resource = getResources (). OpenRawResource (R.drawable.dog);
Bitmap = BitmapFactory.decodeStream (resource);
button. setBackground (new MyRoundCornerDrawable (bitmap));
}
}

In this part of the tutorial you will learn what drawables are and what they can be used for. Did you know that drawables for images and their scales can be very effective and can be used to adjust them?

DotNek بازدید : 54 چهارشنبه 19 خرداد 1400 نظرات (0)

If you are also curious to know more about these games, follow us to the end of the article. We will talk more about this topic in the following.

Introducing Top 8 Action games on mobile app stores.

Top 8 Action games

Among computer games, action games have a special place. this games usually have a lot of fans because of the excitement they convey to the players. We can hardly have a ranking for the most popular action type of games; However, we want to talk to you about some of the most famous games and we have a description for you about them. Today, many games are made in the action style. In general, all of these games are the same, but in terms of space and stages, these games can be different from each other. This kind of games have a very wide range of games, and many of them, such as PUBG and Call of Duty, as well as Fortnite, are among the most popular games, and most of the action-designed games are also played online. Some of them do not require the internet and you can play them offline.

1. Fortnite

One of the most popular games in action category is Fortnite. The style of this game is action style and Battle Royale and is suitable for adults. This game after being very successful on various platforms such as PlayStation 4 and Xbox , its designers decided to release a mobile version of the game as well. It is interesting to know that the mobile version of this game also had a very good performance and was able to attract the attention of many players. This is a very attractive game that takes every player to its fantasy world. This game can be played in multiplayer.

2. Call of Duty

The style of this game is first-person and Battle Royale and it is a very suitable game for adults. Many people are fans of this game and are interested in playing this game. This game was able to become the most downloaded action game is this game, which is also known as one of the best action types of games. The game was able to attract a lot of players when it was released and still has a lot of fans. The story of this game tells the story of World War II that you have to control the main character of this story and with the help of various squads you have to fight the Nazis. This game is a full-fledged action game in which, in addition to killing the Nazis, you must be aware of people's health.

7. Marvel Future Fight

This game has action and role-playing style that, as its name suggests, runs in the world of Marvel movies and comics. This game is one of the most famous games in the category of action type of games. In this game, you compete competitively with artificial intelligence, and the gameplay is such that you must win each stage by selecting several heroes and using the unique powers that each of them has. This game has attracted the attention of many Marvel fans and introduced them to the world of Marvel. Note that this game has a similar storyline to Marvel movies, and this has made this game even more exciting.

Top 8 Action games

8. World of Tanks Blitz

Another action game is this game, which we can recognize as one of the best online games. This game can also compete with many popular online console games, which shows that this game is exciting and amazing. The name of this game dates back to World War II, and during the game, players have to compete with each other by controlling different types of tanks. This game is very popular and is known as one of the most popular mobile games . The game also has great graphics that make it one of the most popular games.

DotNek بازدید : 58 سه شنبه 18 خرداد 1400 نظرات (0)

The addition of new features and capabilities increases the use of the operating system and improves their performance . For example, in version 3.0, the Android operating system supports dynamic views and has the ability to display them. As the version of operating systems increases, other new features are added to them. Dynamics allows users to easily identify object properties over specific time periods and modify them as needed. In this tutorial we will talk about different types of dynamic display capabilities in the Android operating system .

The API allows the programmer to set a start value and an end value for the object properties at specified intervals, and can also apply timing changes to the attribute. It should be noted that this API can be used for different types of objects and is not intended only for views.

The parent class, also known as the superclass, is also the Animation API of the Animator class. The ObjectAnimator class is used to define and modify the properties of objects.

It is also possible for the programmer to add an AnimatorListener class to the Animator senior class. Listener can also be called in the animation and animation stages.

ViewPropertyAnimator

It should be noted that using the ViewPropertyAnimator class, which first appeared in version 3.1 of the Android operating system, can access the animations that exist at the view level.

The ViewPropertyAnimator object in a view can be returned by the animate () function. This object can enable animations to be performed simultaneously. It also has an API that enables the programmer to set the animation time.

The task of the ViewPropertyAnimator class is to provide an API for dynamic views.

The code below shows its use.

// Using hardware layer
myView.animate (). translationX (400). withLayer ();
ViewPropertyAnimator can be enabled to use a hardware layout to optimize performance and improve performance.
// Using hardware layer
myView.animate (). translationX (400). withLayer ();
Runnable should be set directly so that it can run both at the beginning and end of the dynamic view.
// StartAction
MyView.animate (). TranslationX (100). withStartAction (new Runnable () {
Public void run () {
Viewer.setTranslationX (100-myView.getWidth ());
// do something
}
});
// EndAction
MyView.animate (). Alpha (0). withStartAction (new Runnable () {
Public void run () {
// Remove the view from the layout called parent
Parent.removeView (myView);
}
});

setInterpolator () allows you to create a TimeInterpolator object. The standard procedure in this section is linear. In this AccelerateDecelerateInterpolator, the speed is initially low and increases slightly in the middle and then decreases again at the end.

Enable the LayoutTransition class on layout changes.

Like the following:

package com.example. android. layoutanimation;
import android. animation. LayoutTransition;
import android.app. Activity;
import android.os. Bundle;
import android. view. Menu;
import android. view. View;
import android. view. ViewGroup;
import android. widget. Button;
public class MainActivity extends Activity {
private ViewGroup;
@Override
public void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. activity_main);
LayoutTransition l = new LayoutTransition ();
l.enableTransitionType (LayoutTransition.CHANGING);
viewGroup = (ViewGroup) findViewById (R.id.container);
viewGroup.setLayoutTransition (l);
}
public void onClick (View view) {
viewGroup.addView (new Button (this));
}
@Override
public boolean onCreateOptionsMenu (Menu menu) {
getMenuInflater (). inflate (R. menu. activity_main, menu);
return true;
}
}
Use animation during the transition between activities
Animations can be applied in views or during the transition between activities.
The ActivityOptions class allows you to define and implement custom or default animations.

public void onClick (View view) {
Intent = new Intent (this, SecondActivity.class);
ActivityOptions options = ActivityOptions.makeScaleUpAnimation (view, 0,
0, view.getWidth (), view.getHeight ());
startActivity (intent, options.toBundle ());
}

view animation

In this section we will tell you how to use the Properties Animation API .

1- Create a new project called com. vogella. android. animation. views.

2- It is better to create a project with an activity called AnimationExampleActivity.

3- The layout file name should be main.xml.

4- Change the said file like the codes inserted below.

<? xml version = "1.0" encoding = "utf-8"?>

<relativelayout xmlns: android = "http://schemas.android.com/apk/res/android"

android: id = "@ + id / layout"

android: layout_width = "match_parent"

android: layout_height = "match_parent"

android: orientation = "vertical">

<linearlayout android: id = "@ + id / test"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content">

<button android: id = "@ + id / Button01"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: onclick = "startAnimation"

android: text = "Rotate" />

<button android: id = "@ + id / Button04"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: onclick = "startAnimation"

android: text = "Group"> </button>

<button android: id = "@ + id / Button03"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: onclick = "startAnimation"

android: text = "Fade" />

<button android: id = "@ + id / Button02"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: onclick = "startAnimation"

android: text = "Animate" />

</linearlayout>

<imageview android: id = "@ + id / imageView1"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: layout_centerhorizontal = "true"

android: layout_centervertical = "true"

android: src = "@ drawable / icon" />

<textview android: id = "@ + id / textView1"

android: layout_width = "wrap_content"

android: layout_height = "wrap_content"

android: layout_above = "@ + id / imageView1"

android: layout_alignright = "@ + id / imageView1"

android: layout_marginbottom = "30dp"

android: text = "Large Text"

android: textappearance = "? android: attr / textAppearanceLarge" />

</relativelayout>

5- Create a menu resource.

<? xml version = "1.0" encoding = "utf-8"?>

<menu xmlns: android = "http://schemas.android.com/apk/res/android">

<item android: id = "@ + id / item1"

android: showasaction = "ifRoom"

android: title = "Game">

</item>

</menu>

6- Change the Activity like the codes inserted below.

package com. vogella. android. animation. views;
import android. animation. AnimatorSet;
import android. animation. ObjectAnimator;
import android.app. Activity;
import android. content. Intent;
import android. graphics. Paint;
import android.sos. Bundle;
import android. view. Menu;
import android. view. MenuItem;
import android. view. View;
import android. widget. ImageView;
import android. widget. TextView;
public class AnimationExampleActivity extends Activity {
/ ** Called when the activity is first created. * /
@Override
public void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. main);
}
public void startAnimation (View view) {
float dest = 0;
ImageView aniView = (ImageView) findViewById (R.id. imageView1);
switch (view. getId ()) {
case R.id.Button01:
dest = 360;
if (aniView.getRotation () == 360) {
System.out.println (aniView.getAlpha ());
dest = 0;
}
ObjectAnimator animation1 = ObjectAnimator.ofFloat (aniView,
"rotation", dest);
animation1.setDuration (2000);
animation1.start ();
// Show how to load an animation from XML
// Animation animation1 = AnimationUtils.loadAnimation (this,
// R. anim. my animation);
// animation1.setAnimationListener (this);
// animatedView1.startAnimation (animation1);
break;
case R.id. Button02:
// shows how to define an animation via code
// also use an Interpolator (BounceInterpolator)
Paint = new Paint ();
TextView aniTextView = (TextView) findViewById (R.id. textView1);
float measureTextCenter = paint. measureText (aniTextView.getText ()
. toString ());
dest = 0 - measureTextCenter;
if (aniTextView.getX () <0) {
dest = 0;
}
ObjectAnimator animation2 = ObjectAnimator.ofFloat (aniTextView,
"x", dest);
animation2.setDuration (2000R.id. Button03:
// demonstrate fading and adding an AnimationListener
dest = 1;
if (aniView.getAlpha ()> 0))
dest = 0;
}
ObjectAnimator animation3 = ObjectAnimator.ofFloat (aniView,
"alpha", dest);
animation3.setDuration (2000);
animation3.start ();
break;
case R.id. Button04:
ObjectAnimator fadeOut = ObjectAnimator.ofFloat (aniView, "alpha",
0f);
fadeOut.setDuration (2000);
ObjectAnimator mover = ObjectAnimator.ofFloat (aniView,
"translationX", -500f, 0f);
mover. setDuration (2000);
ObjectAnimator fadeIn = ObjectAnimator.ofFloat (aniView, "alpha",
0f, 1f);
fadeIn.setDuration (2000);
AnimatorSet = new AnimatorSet ();
animatorSet.play (mover). with (fadeIn). after (fadeOut);
animatorSet.start ();
break;
default:
break;
}
}
@Override
public boolean onCreateOptionsMenu (Menu menu) {
getMenuInflater (). inflate (R. menu. mymenu, menu);
return super. onCreateOptionsMenu (menu);
}
@Override
public boolean onOptionsItemSelected (MenuItem item) {
Intent = new Intent (this, HitActivity.class);
startActivity (intent);
return true;
}
}

7- Create a new activity called HitActivity.

package com. vogella. android. animation. views;
import java. util. Random;
import android. animation. Animator;
import android. animation. AnimatorListenerAdapter;
import android. animation. AnimatorSet;
import android. animation. ObjectAnimator;
import android.app. Activity;
import android.os. Bundle;
import android. view. View;
import android. widget. Button;
public class HitActivity extends Activity {
private ObjectAnimator animation1;
private ObjectAnimator animation2;
private Button;
private Random randon;
private int width;
private int height;
private AnimatorSet set;
@Override
protected void onCreate (Bundle savedInstanceState) {
super. onCreate (savedInstanceState);
setContentView (R. layout. target);
width = getWindowManager (). getDefaultDisplay (). getWidth ();
height = getWindowManager (). getDefaultDisplay (). getHeight ();
randon = new Random ();
set = createAnimation ();
set. start ();
set. addListener (new AnimatorListenerAdapter () {
@Override
public void onAnimationEnd (Animator animation) {
int nextX = randon. nextInt (width);
int nextY = randon.nextInt (height);
animation1 = ObjectAnimator.ofFloat (button, "x", button. getX (),
nextX);
animation1.setDuration (1400);
animation2 = ObjectAnimator.ofFloat (button, "y", button. getY (),
nextY);
animation2.setDuration (1400);
set. playTogether (animation1, animation2);
set. start ();
}
});
}
public void onClick (View view) {
String = button. getText (). ToString ();
int hitTarget = Integer.valueOf (string) + 1;
button. setText (String.valueOf (hitTarget));
}
private AnimatorSet createAnimation () {
int nextX = randon.nextInt (width);
int nextY = randon. nextInt (height);
button = (Button) findViewById (R.id. button1);
animation1 = ObjectAnimator.ofFloat (button, "x", nextX);
animation1.setDuration (1400);
animation2 = ObjectAnimator.ofFloat (button, "y", nextY);
animation2.setDuration (1400);
AnimatorSet set = new AnimatorSet ();
set. playTogether (animation1, animation2);
return set;
}
}

Animation should begin after you have carefully completed the steps listed above. To do this, you can access the navigation activity through the ActionBar.

Animation capability in Android and how to create them
DotNek بازدید : 69 سه شنبه 18 خرداد 1400 نظرات (0)

The Internet has provided many possibilities for different users all around the world and nowadays, users do almost all their tasks through the Internet, in addition to providing convenience for users, the Internet can be so dangerous, so if you do not pay attention to providing proper security while using it, all the information which you have entered in it, may be made available to profiteers in a short while, due to the fact that there are lots of profiteers who are waiting to find a security hole in order to achieve their malicious goal, these profiteers are called hackers, and the point that should be mentioned is that due to hacker good income, the number of them is increasing day by day, so it is necessary to know the relevant tips to provide a better Internet security in order to stand up against the hacking attacks.

What are the types of Internet security threat?

What is Internet security?

It is a set of actions and techniques that are done in order to increase the security of your important information while using the Internet to do all tasks, such as online transactions, activities, etc., everything that is done is aimed at protecting your system against various threats that can endanger users’ information, this security specifically focuses on online access vulnerabilities and Internet usage.

Why is it important?

Nowadays, due to the fact that the number of people who use the Internet to do all their important tasks is increasing day by day, and they also spend most of their time on it, the importance of Internet security has increased significantly, so, first, it is necessary for all users to raise their awareness in this field and try to know all security tips due to the constant use of the Internet and also the need of entering important and personal information in order to do daily tasks, transferring important documents, online payments, etc., and this information may be provided to profiteers if you do not observe the necessary tips and do not know them properly, and as you know if they have access to it, they may take various actions, for example, one of the things that hackers may do with the information which was obtained, is requiring money in order not to publish it, so the users have to pay money to prevent the data from being published which may cost them a lot, or lots of other ways that they use in order to abuse your information, simply put, in addition to the many benefits that the Internet can have for all users, it can also be an insecure channel for exchanging information, which is why it is becoming increasingly important to pay more attention to its security tips and related issues.

What are the types of Internet security threat?

This security is an important issue which is threatened by various factors, that we are going to mention in the following section.

- Hackers:

The security can be attacked by various threats , one of the most important of which is hackers, they are people who make every effort to circumvent online security measures, and eventually, after doing their malicious acts and obtaining users’ personal information, they may abuse that information in various ways, hackers have different types, among which we can mention white hat, red hat, green hat, blue hat, etc., each of which uses his/her talent in various ways due to the fact that they have different goals.

For instance, they may do their best to show the existing security holes in order to help an organization in the security field or manipulate security instead, through each of these ways they can stand out among other hackers, as a result, they are one of the most important threats to security.

- Phishing:

Phishing is often being done in a form of an email and uses social engineering techniques to do so, valuable personal information can be obtained through phishing, from which attackers can eventually make a lot of money, this stolen information which is obtained through phishing may include data related to account numbers, documents, etc., all of which are of considerable value, knowing more about this threat is of a great importance these days, due to the fact that it affects various users who deal with the Internet, so users are becoming more and more concerned and try to know the tips that help them protect their important information while working with the Internet against such threats.

These emails are designed in such a way that cause users to think that they have been sent by an organization or a reputable person, so they may consider these emails as ones which have important subjects that need to be opened quickly, therefore, users prefer to implement all the commands they contain as soon as possible, as a result, they will easily provide all their important information to the people who sent such emails.

- Worms:

Worms can disrupt the security of the Internet by using a lot of bandwidth, and the important thing about them is that they do not need to connect to another program in order to spread themselves, unlike viruses.

 - Viruses:

Viruses are another important threat that affect the security of systems , they are transmitted like biological viruses between different programs and infect all of them, there are many reports every day that indicate the number of people whose important information have been lost or stolen due to viruses, there are many ways to protect the Internet against viruses, and among which we can mention the use of good and powerful antivirus software programs , and as you know, there are different types of them in the market, which may be paid or be free.

What are the types of Internet security threat?

- Malware:

Malware can cause a lot of problems in your systems, most of which occurs by downloading the programs you need from unreliable sources which makes your entire system available to profiteers in less than a few seconds.

- Botnet:

As soon as various systems are attacked by malware, they may be used in order to send malicious messages or denial of service (DoS) attacks, this threat can also be very dangerous for users, so you need to increase the security of your system against these attacks .

How to protect Internet security against cyber threats?

There are many ways to use them and observing all of them can increase the security against various threats , among which the following can be mentioned.

- Install a powerful antivirus:

There are many antivirus programs that can scan your entire system quickly to find and report viruses, some available ones are: Avira Free Antivirus, Avast, Panda, Kaspersky Basic Security, Bitdefender, AVG AntiVirus Free, etc., before choosing any of them, you need to know the features of each, then you can choose one of them according to the purpose of your antivirus installation.

- Do not enter unreliable sites:

There are many sites that as soon as you enter them, all system security may be affected due to malicious code they contain, so it is necessary to pay attention to sites that are certified in order to maintain the security of all your important information while using the Internet, as a result, do not enter sites which do not have SSL certificate.

- Block ads:

When you use the Internet in order to do your tasks, you will encounter a lot of ads on a regular basis, some of which may have been placed with the aim of infecting your system, which is the reason why you shouldn’t click on them, therefore you have to use the available software to block them, so that profiteers cannot endanger the system and steal the important information.

- Do not open phishing emails:

One of the threats that affect the security of information while using the Internet is phishing emails, which is being done by using interesting topics and also having URLs that are very similar to reputable companies and organizations URLs which causes users to click on them, therefore, they lose all their data, which is why the user must be aware of the ways to deal with them and delete such emails as soon as possible.

What are the types of Internet security threat?

Last word:

Internet security is an important issue and there are different types of threats that affect this security, in this article, we mentioned some of the most important threats, so that you can be aware of them in order to increase security and prevent profiteers from accessing personal information and documents in your system when using the Internet.

DotNek بازدید : 52 سه شنبه 18 خرداد 1400 نظرات (0)

As you know, these days users spend many hours throughout the day on the Internet and do most of their daily tasks through it, as a result, they enter very important information in their computers, which is the reason why it is necessary to protect your system against security threats which endanger the personal data, users may think that their computer is secure enough, so they do not need to worry about various threats, but this is not a true idea because all users should be concerned about their systems' security.

If you do not pay enough attention to this issue after a while you may encounter a huge problem which is a decrease in your system performance or its speed, so you cannot do all your tasks easily, therefore, the best way is to pay attention to your system security , there are many threats that may endanger your computer, among which we can mention malware, and we will discuss in more detail below.

Why is malware protection important?

What is Malware?

In fact, malware is a piece of code that can infect different computers which is written by programmers and enters the system of various users in different ways, and the users won’t find out their entry, simply put, any code that is placed on the systems of different users and disrupts the system function is a type of malware that is created by hackers, and they use them to achieve their goals.

The damage they do to your system includes, having access to your email account and try to send emails to various users that also contain malicious code in order to infect their systems, in addition to sending spam emails through this method, hackers can also perform other actions such as stealing users' personal information such as bank account number, password, etc., the important thing to know about them is that malware is always looking for existing vulnerabilities in your system and enter it through them.

Why is malware protection important?

Malware is a huge problem, and it is very important to protect the systems against it, to date, there have been many reports of various systems being infected by this type of attack, and many organizations have been affected by this attack, as you know, it can be done in different ways, but the common point in all of these methods is that they end up damaging the system in a way that causes a lot of problems for the user, so all users should pay attention to malware from the begging and be aware of the importance of protecting the system against their entry.

What are the ways for malware to enter users' systems?

These programs may enter the system in a variety of ways, including logging in via a USB drive, so as soon as any information enters your system, you should get help from an anti-malware in order to eliminate all suspicious items, so that they do not damage your system.

Another way is entering your system through malicious sites, which means that the user encounters malicious code after entering such sites that seem to be valid which may be placed in various ads and eventually, if you do not pay attention to the possible threats and click on any ad, you will easily give all your information to hackers.

Malicious emails which were mentioned earlier can cause a lot of damage to your system, so it is necessary to increase your information about this type of email and do not trust them in any way, and when you encounter them you should try to delete them as soon as possible, there are several signs that can help you determine if an email is malicious, including the following.

- Including an attractive topic for users

- These emails have URLs similar to a reputable company and there are only small changes in their letters

- Expressing topics that can provoke the user's emotions and cause the user to click on the email without thinking which can be different, for example, they may email you with the content that you have won a lot of money etc., so that, you will be so happy and enthusiastic to see this email, and you cannot think properly, as a result, you will do all the commands which are mentioned in the email and provide your important information to hackers , so they can remotely access your system.

Take the following steps to minimize the risk of malware:

As you know, malware is very destructive and can cause irreparable damage to your system as well as your information, as a result, you should do all the necessary things in order to increase system security against them , so that they cannot harm your system, which is one of the most important points that we are going to mention some tips in order to help you protect your system against them .

Why is malware protection important?

- One of the most basic ways to increase the security of systems against malware is to get help from a good anti-malware software, as you know, there are many of them in the market that may be paid or free, and it is necessary for every user to raise their awareness about their features, then you should try to choose one of the most suitable software available, according to your goal.

- Keep all the programs in your system up to date, due to the fact that each of the programs that you download may include bugs that the developers try to fix them in the updated version.

- There are various software programs that can help you in this direction, for example, they may have the ability to prevent your system from connecting to malicious websites or lots of other features, which is the reason why it is necessary to get help from them, and you should never forget to update them regularly.

- Never use the same password for all your accounts, because in this case when hackers can enter your system through various ways such as malware, they can also have access to one of your accounts’ password, so if you use the same one for all of your accounts, they can have access to all of them as soon as possible, as a result, they can damage your system easily.

- Observe the essential points while choosing the password properly, among which we can point to the importance of having at least 8 characters which is necessary to include uppercase letters, lowercase letters, numbers, elements, etc., and the more you choose your password according to the principles, the harder it will be for hackers to access your accounts.

- When you visit a site, you will encounter a lot of ads that malicious code may have been placed in them by hackers, so as soon as you click on them, you will lose the security of your system , as a result, it is necessary to use the available programs and block these types of ads in order to minimize the possibility of infecting your system and prevent profiteers from accessing the information in your system and abusing them in order to achieve their desires.

- Use firewalls that create a buffer zone between your IT network and other networks, simply put, a firewall prevents data from being transferred to your system without planning, hackers try their best to decrease the security of your network by using malware and spread various viruses between different computers, but firewalls can prevent this from happening and provide a lot of security for your system as well as your information .

Why is malware protection important?

Last word:

Security is an important issue and all the topics which it contains are of a great importance as well, one of the topics that is very important in security is the protection of computers and devices against malware , which in this article we have explained the reason of its importance as well as the necessary tips that must be taken into consideration in order to increase the security of your information against this threat, so that you can follow all the tips to achieve high security and make it harder for hackers to gain access to your personal information and abuse them in order to get what they want.

DotNek بازدید : 52 سه شنبه 18 خرداد 1400 نظرات (0)

Mobile phones have become an integral part of everyone's life today, and users meet most of their needs through mobile phones in a short time, given this, it can be concluded that important information, such as credit card number, photos of documents, personal and important information, etc., are also exist in it, now imagine that this information is somehow out of your reach and only hackers can have access to it, what do you think might happen? Will be your life and all your money in danger?

The answer is yes, and these possibilities can take place, so you need to increase the security of the information on your mobile phone and become more familiar with the issues that may endanger the security of this bag? You definitely do your best to provide the necessary facilities to increase its security and protect your information from being stolen by thieves, in this case, mobile is the same as the bag and today almost all users keep their information in this device, therefore the security of it is of a great importance.

Hackers may use various methods to gain access to information on people's mobile phones and use this information to harm different people, on the other hand, there are many ways that can be used to increase and prevent mobile security , in order to prevent hackers from achieving their goals, users have many questions about the ways that hackers can hack a mobile phone, also another important question that users have, which we intend to address in this article more, is whether someone can hack a mobile phone through a message or not.

Can someone hack your phone by texting you?

The answer to this question depends on your behavior after receiving the message, and no one can hack your phone just by sending you text if you do nothing, given that, hackers are increasing their knowledge day by day and using new methods of hacking every day, technology is now able to do things that we thought were impossible.

When hackers send a message in order to hack your mobile phone, if you do something wrong, they will eventually reach their goal, but if you, as a user, increase your information in this field in order to protect your information , you can respond to such attacks and keep your information secure, you need to know that the messages that hackers send to you have links to other websites which can endanger your information security, and if you click on them and refer to the mentioned links, your mobile phone will eventually be infected and hackers can gain access to your information easily.

These messages are usually very attractive and encourage the user to click on it, or they are messages make users worried about a specific topic, and they may eventually click on the links due to the feeling of stress and anxiety without thinking, and after a while, users realize that they have lost all of their important information, many messages may be sent to you daily, some of which are designed only to steal your information, in which case you should concentrate and do not open them, and if you open the message, do not click on the links in the title and do not refer to the addresses which are suggested in the message, as we mentioned, in the message, it is possible to mention the address of a phishing site, and eventually your device will be hacked by hackers through the message.

All hackers try to achieve their goal by arousing the users' senses and may use the feeling of fear, anxiety, sadness, happiness, etc., to put pressure on the user in order to do whatever they want as soon as possible and help hackers achieve their goal easily, as a result, a set of tasks must be performed so that the hackers can reach their goal, in addition, hackers may use other factors to hack information on people's mobile phones, some of which we will mention below.

Other ways to hack mobile:

- Use a spy mobile app:

There are various spyware programs that end up making the user's information inaccessible to them, these programs are very common among hackers, for example, they may use the InoSpy spyware program, iSpyoo which is an android spy software, SMS Tracker, HelloSpy, etc., pointed out that all of these can eventually lead the hacker to a lot of information, the thing about these types of apps is that most of them only work if someone has physical access to your device, in fact, these programs are mostly used by parents so that parents can control their children through these programs and check all messages, calls, etc.

- Malware:

Hackers use malware to perform all kinds of hacking attacks and can easily reach their target through them, which happens more often when users download their programs and software from unreliable sources, and causes a lot of damage to mobile security.

- Hack password to enter the phone:

One of the ways that hackers can use to access information on the mobile device of different users is password hacking, and if this password does not have the necessary safety, hackers can open it and access the information as soon as possible.

- By gaining access to different parts of the mobile phone:

After installing each application, a message will be sent to you which includes the massage that this app Would Like to access your data, etc., you should pay more attention to these kinds of massages, and try to limit the access of different applications to your data as much as possible, so that they cannot access your information and use it to achieve their desires easily.

- ...

In general, as we mentioned, hackers are changing their methods of hacking day by day, we have mentioned a number of methods that they use in order to hack systems, now we are going to mention some steps that you should take as in order to protect your mobile phone data against hacking attacks.

What should we do to increase the security of information on our mobile phones?

- Back up your data:

This is an important step that should be taken in order to increase the security of information on all devices, and if your data is stolen, it can help you protect your information, so you should pay attention to the fact that the backup data must be carefully monitored.

- Use reputable sources to download the software you need:

We have already mentioned that hackers may use malware to hack your mobile phone information, in which case you should make every effort to use reputable sources to download the programs you need and do not use the download links of programs that exist on various sites, as these programs may have been created for the purpose of hacking your device.

- Do not forget to update the software on your device:

Software produced by different companies may have bugs that will be fixed in the next update, which is why you need to update all existing programs regularly to eliminate any possible security holes.

hack phone by texting

Last word:

In general, hackers cannot achieve their goal only through SMS, and users need to cooperate with them, so users should prevent this by raising their level of knowledge and awareness, and do not open any message, and if you do, try not to click on any link or URL, because they may link you to a dangerous website like a phishing website and endanger your important information, so you have to pay attention to avoid clicking on any link even if it has an attractive topic like winning a prize through clicking on a link.

DotNek بازدید : 58 سه شنبه 18 خرداد 1400 نظرات (0)

While creating a website , it is important to know what you can do to help users get a better user experience while using it, web designers use different languages in order to design the web , each of which has its own capabilities, among which we can mention HTML, and the most complete type is HTML5, which we are going to discuss in the following.

Web designers should master at this language due to the fact that it is so important for web design, and the use of this technology has led to the development of the web these days.

What is HTML5, and why is it important?

What is HTML?

HTML stands for Hyper Text Markup Language which is actually a language that is often used in the design of web pages, and in fact in this language all the code is converted to HTML and displayed by the browser.

 What is HTML5?

  HTML5 is the latest version of HTML that can provide many capabilities, including the ability to run images, audio and video files which can be effective in attracting different users to the site, as a result, it can increase the traffic to the website , this version is able to create very high graphics for websites.

The advantage of this version compared to HTML4 is that by using this version, you can ensure that the content that you intend to provide is presented correctly on different devices, and with the help of this version, this possibility is provided without the need for additional plugins, you can provide videos and other features to the customer and reach your main goal as a web owner, which causes gaining more customers who will introduce your website to their friends as a result, the number of customers will increase day by day, so you can achieve more success with the help of HTML5.

Why is it important?

You may not use HTML5 yet, but you should know that this version is so important for many reasons, some of which will be mentioned below in order to conclude that you need to use it and improve the ranking of your site .

- Users can gain a better user experience by increasing ease of access, using this version allows different users to easily access all the content of the site and ultimately gain a better experience, when it is possible for different users to visit different parts of the website easily, the probability of introducing the site to others will increase, as a result of which, the visitors will also increase and the website will get a better ranking .

- One of the features that makes this version recommended to all site owners, is that this version can support different images and audio, in order to do this, you need to enter the code, which is going to be mentioned in the following:

<video poster = "myvideo.jpg" controls>

<source src = "myvideo.m4v" type = "video / mp4" />

<source src = "myvideo.ogg" type = "video / ogg" />

<embed src = "/ to / my / video / player"> </embed>

</video>

HTML5 code allows you to enter very good descriptive code.

<header>

<h1> Header Text </h1>

<nav>

<ul>

<li> <a href="#"> Link </a> </li>

<li> <a href="#"> Link </a> </li>

<li> <a href="#"> Link </a> </li>

</ul>

</nav>

</header>

What is HTML5, and why is it important?

In fact, you can use this language to enter clean codes and create clean titles.

- This version has a lot of great APIs that allow you to create much more interaction with users and create a very functional and attractive web for the user.

- Mobile browsers have fully accepted HTML5, and due to the fact that its popularity is increasing among different users, day by day, the use of this version is increasing at the same time, because this version is one of the best languages through which sites and mobile applications can be developed, in general, you can easily trust the latest HTML version in order to develop applications on mobile devices and enjoy using the developed versions.

- This version can be very useful for virtual tutorials and can provide many features for users, the most important of which is to provide various videos as well as animations, etc., and each of these items can provide better training to users, another point about this version is that it can make it possible for virtual course users to use training files even when they are offline, and to achieve this goal it is necessary to use data storage applications in offline mode, and they also support these applications.

- This version has local storage capability, which can have a huge impact on the level of security as well as its performance, this version can actually allow you to view and save web applications without third-party plugins, which is very important for different users, and you can also be aware of the features that this version which can provide a better user experience while using the web.

- Games have a lot of fans and the number of fans of different games is increasing day by day, so considering this issue, any issue related to games is very important it should be said that, by using the HTML5’s 

What are the general benefits of HTML5?

In general, with the introduction of this version to users, a huge improvement was made on the Internet, and it became possible for website owners to be able to play audio and video files directly in a web browser without plugins which is one of its important advantages.

Another advantage that this version provides is that it increases the battery life and users can use the battery of their laptop or mobile phone for a long time, it should be noted that, the most important effect of this version is to improve the user experience, which is one of the important factors in SEO ( search engine optimization ) and can lead a site to a high ranking in the search engine results page which can increase the number of visitors who are attracted to a website.

It should be noted that there is no need to state all these reasons in order to encourage you to use it, in other word, if you have not tried it yet, and you are afraid of its complexity, you should know that if you specialize in HTML, you know HTML5 as well, so there is no need to be afraid and worried, and you just have to start by writing clean code to provide a positive user experience for your website users, so that you can finally achieve success.

The relationship between HTML5 and learning:

As you know, with the introduction of this version, a huge change in online learning took place, and due to the facilities that this version can provide, such as providing videos, audio files, etc., more and more users realized that instead of spending a long time to reach different classes, they can learn all the topics with pressing one button and share them with their friends, so that online learning is much easier due to the fact that they can save time and energy, so that it has lots of advantages.

This issue is especially more valuable these days due to dealing with COVID-19 virus, and as you know, these days, users are using the advantages of the Internet in order to improve their knowledge more than before, for instance, students should study online and people also prefer online courses to face-to-face classes.

What is HTML5, and why is it important?

Last word:

In general, HTML5 has created a huge change in the world of the Internet, among which we can point out that due to the increasing use of mobile phones by different users, this version allows the user to use a web page in different devices and get a positive experience while using it, apart from this, there are other benefits for users and web owners by providing this version, some of which have been mentioned in this article, so that if you are not already using HTML5 , you should try it as soon as possible and enjoy the many benefits it can provide.

DotNek بازدید : 65 سه شنبه 18 خرداد 1400 نظرات (0)

Security is an important topic that can be studied for hours and days, on the other hand, there are many ways to compromise this security, and there are people who called hackers, with great talent in the field of computers, they try to infiltrate the information of different people and use it in order to achieve their desires, hackers may use different methods to gain access to important information, in most cases, the users do not realize that their information has been stolen and the hacker will continue to abuse their information as much as possible, for example, hackers may use malicious code to hack different people, they inject it into a site, or they may add this code to the web form input box in order to change the data which has different types, such as XSS and SQL injection , which we are going to discuss in more detail below.

What is cross site scripting?

This kind of attack has different types, which we will mention briefly in the following.

Types of cross site scripting:

- Stored XSS (Persistent XSS):

This type of attack is very malicious, in which the hacker enters the malicious code in the user's input section, such as the blog comments section or they may even place that code in a post, and eventually the user's system is infected as soon as user logs in, as we have mentioned earlier, these attacks are carried out so imperceptibly that the users may not be fully aware that their information has been stolen.

- DOM-based XSS:

These types of attacks can also attack systems that have high security and have used a firewall, through this attack, the hackers can gain the information they need quickly, in fact, this is one of the most advanced SQL Injection , in which a hacker inserts malicious code through a web page entry into SQL statements, ultimately, this injection allows the hacker to disrupt the user's system and generally allow the attacker to view data that they would not normally be able to retrieve, in other words, hackers can access information that is not accessible to the user, and by changing these programs, the hacker can eventually change the content of the program, hackers can do this type of hacking in a variety of ways that in all cases can be very successful in accessing user information.

Types of SQL Injection:

This attack also has different types, which we will are going to mention in the following section.

- In-band SQLi (Classic SQLi):

One of the most common methods that hackers use for SQL Injection is In-band SQLi, in which an attacker can use the same communication channel in order to both launch an attack and collect results, the two most common types of injection are Error-based SQLi and Union-based SQLi, the first of which relies on error messages sent by the database server to access its target, there are ways to deal with such attacks that can be followed to increase system security against them.

The second type of attack uses UNION SQL to combine multiple commands and is eventually returned as part of the HTTP response, causing various users to be hacked.

- Inferential SQLi (Blind SQLi):

Blind SQL Injection attacks by detecting powerful parameter injections and executing commands by remote detection.

Through this attack, the hacker cannot see the result of an attack, which is why it is called like that, two types of this injection are Boolean-based (content-based) Blind SQLi and Time-based Blind SQLi, which in the first attack, hackers force the program to return a different result, through the second attack, the hacker forces the database to wait for a while before responding, and the hacker examines how long it took for the response to be sent in order to determine whether the response was correct or not, and then HTTP response is delayed with the same amount of time, or it may return immediately, which ultimately leads the hackers to reach their goal.

- Out-of-band SQLi:

This method is not common and this attack is used by hackers when they cannot use the same channel to start the attack and gain the desired results.

Ways to deal with SQL Injection attacks:

- The validity of any data stored in the SQL engine should be checked, and you should not trust any input.

- Use monitoring, because they can quickly report back to you if you are attacked.

-Do not forget the filtering tools because through them, you can greatly increase the security of your information against such attacks.

- Use High-end authentication systems, which you can use to check all attempts which occurs in order to gain unauthorized access to your system.

Difference Between cross site scripting and SQL Injection:

These two methods are both popular among hackers, and they tend to use cross site scripting and SQL Injection to achieve their goals, which we have briefly described so far, but the important point is that these two have differences, among which we can mention the language of writing malicious code, and the way that these codes work, as we have mentioned earlier, cross site scripting is more common in JavaScript and is used in this language, while SQL Injection includes Structured Query Language, in addition, in cross site scripting, malicious code is injected into the site, and if users enter the site where malicious code has been injected to, by the hackers, they will be hacked and their information will be provided to the hacker, in contrast, SQL injection adds SQL code to the input section in order to access important information or modify data stored in a database, so this is another difference between the two attacks, in fact, it is the most important difference between injecting XSS and SQL.

What is SQL Injection?

Last word:

In general, there are many attacks used by hackers, through which they can gain access to information about different users, we tried to mention two of the most important types of injections, including XSS and SQL injections in this article, we have also mentioned the point that these two are different in language as well as how they perform, so by reading this article, you can raise your awareness of such attacks and take action properly in order to protect your information from being stolen by hackers these ways, it should be noted that you should never forget that hackers won’t stop trying to raise their level of knowledge and awareness, and they are constantly finding new ways to access the information of different people, which is why it is important for you, as a user, to add to your knowledge regularly in the field of security and block the way for hackers and as you know, being aware of possible threats can help you a lot in this field, so you have to do your best to not fall behind hackers in the field of knowledge, through this way you can find out any suspicious items that is happening on your system, as a result, you can take the necessary steps in order to solve the problem as soon as possible.

DotNek بازدید : 50 سه شنبه 18 خرداد 1400 نظرات (0)

Computer games have a huge world, which is one of the entertainments that has attracted a lot of fans, many computer games are made and released every day, in fact, the fans of these games are looking for a way to cheat in that game while entertaining, in order to get a high score all at once, so they prefer the way of hacking games , in addition to increasing the score in the game, you can do many other things by hacking games, among which, we can mention the possibility of installing a paid game for free on your Android smartphone phones.

Some games have a much higher excitement than the others, the difference between these programs is that people can play online with other users which is an ability that increases the number of people who is attracted to them and also the excitement of it, game hacking programs are very popular among the users of these games, and there are many tools that can help users in hacking 

3- Game Killer:

This game hacking program is available for free and provides players with many features and gives them access to modify aspects of their favorite video games , if you are interested in using an application to hack games, especially an offline one, you should install this application quickly and use it in order to achieve your desired goals in the game, this program works by injecting code from the background which allows you to set them in the desired title and use them, whenever you want to use a program to hack the game, you can access Game Killer and select the game from the list of running services.

4- LeoPlay Card:

Through this  

If you have not used this program in order to hack games to date, get started and download it now to enjoy the existing Android games more.

7- Lucky Patcher:

Another program available to hack games is Lucky Patcher, this program provides many features for its user, among which, we can mention the removal of ads, change the game memory if necessary, license approval, you can also access game resources endlessly with this program, simply put, if your device is rooted, and you want to download an app that helps you hack games, the Lucky Patcher app should be one of your first choices.

8- File Manager:

Through this hacking program, you can change all the saved files of the game, reduce the difficulty level of the game, access many resources of valuable elements in the game, and other features that are provided to you through this program.

9- Freedom:

One of the best Android game hacking apps is Freedom, through which players can play paid games for free, but the important thing about this useful app is that it can be only used for offline games.

10- HackerBot:

You may be looking for a program through which you can hack games on the internet, and you may inadvertently download malware and other fake files which causes a lot of damage to your system, HackerBot allows users to search for modified apps and games easily, and it is one of the best ways to cheat and access the top features of the game and unlock items for free, but in most cases you may inadvertently download malware and other fake files, in general, it allows you to find and download the games you want to hack on any operating system quickly by using game hacking tools.

11- GameCih:

Through this hacking program, it is possible for the user to hack all online and offline games and enjoy playing them, the point to note about this program is that in order to run this program and work with it, it needs root access, so the device needs to be rooted.

12- Bluestacks:

This program is also worth thinking about because it provides a great gaming experience, so you can enjoy playing by downloading and using it.

Game Hacker Apps for Android:

Last word:

In general, you know for sure that cheating is not a good thing, but you may want to cheat while playing just in order to enjoy more, so you need programs that can provide you with the facilities you need as soon as possible, in this article, we have introduced you to some hacking programs which can be used for cheating on Android games, but you should also pay attention to the point that it is better to play games without cheating in order to realize the fact that even games have their own hard conditions just like our lives, but everyone has different personalities, this article was written for someone who wants to achieve everything at once who prefers the entertainment aspect of games, or the ones who do not have the possibility to pay for the game’s rewards, so they prefer to get those rewards for free, which hacking games programs are created for these reasons, but in general you should take the fact that these programs are not suitable for children into consideration, because they may think that cheating is the best way of achieving their goals which can ruin their future due to the fact that everything sticks in children’s mind, as a result it is better not to teach children to use them.

DotNek بازدید : 59 سه شنبه 18 خرداد 1400 نظرات (0)

Users are very interested in hacking topics these days, and a high number of searches are done daily in search engines related to this field, there are some popular questions which are constantly bring asked such as, different types of hackers, personality traits of each of the different types of hackers, the most famous hacker, the punishment for red hat hackers, etc., in relation to each of these and other topics, there are many articles that will appear in search results, and users will read these topics with great interest, before we get into the blue hat hackers in more detail, it is necessary to discuss the hacks briefly and mention the different types of hackers, so that you can become more familiar with them.

Who are blue hat hackers?

What is a hack?

In fact, hacking is a set of activities that ultimately cause security holes in a system to be found and the information in that system to eventually be made available to hackers, in other words, the history of hacking, dates back to 1960, and the number of hacks that occur is increasing day by day, and the concern of users who are connected to computer systems or the Internet is increasing generally, and all efforts are being made in order to follow the necessary points in connection with increasing the security of the site in a principled way and block the way for hackers to enter users’ system and keep their information safe.

In general, it should be noted that the efforts of hackers are often in contrast with the existing rules and regulations, because they try to infiltrate the systems of various individuals and organizations to carry out malicious activities and damage the system as well as information of site owners, of course, it should be noted that a number of hackers also test the sites in order to increase the security of various individuals and organizations systems, it has a process in which hackers report if there is a security hole in those sites, so the owners of organizations should take action and fill those security holes to preserve their information, many hackers, known as red hat hackers, have decided to change their field of activity into being white hat hackers after being caught and imprisoned by the police and try to use their knowledge to help different people, Blue hat hackers also do their best to find security holes, which we are going to discuss in more detail below.

Who are blue hat hackers?

In fact, before a company or system is established, blue hat hackers examine all possible security holes and software errors, so that they can ultimately help increase system security and block the way for malicious hackers to infiltrate the system, these types of hackers, in most cases, are invited by companies in order to do the necessary research and find and report vulnerabilities, but they are not hired in companies, on the other hand, when you search for their characteristics, you may encounter the one that points to the fact that they are a kind of hackers who are very interested in learning hacks in order to take revenge on other people, these hackers are very similar to Script Kiddies and use hacking to attract the attention of other users.

What is blue hat Microsoft hacker conference?

One of the most important events in the field of cyber security is the blue hat Microsoft hacker conference, in which all Microsoft engineers meet with its hackers and review all the points related to the security part of the system, so that they can significantly increase the security of their systems, Window Snyder started this event, which we are going to learn more about her in the following.

Who is Window Snyder?

From the beginning, Window Snyder was very interested in encrypting and analyzing information, and finally, she carried out his activities in the field of cyber security , and pursued this goal in an advanced way, and all her efforts were to eliminate security holes in systems through which hackers are able to infiltrate the system, eventually, she worked as a senior security strategist at Microsoft in the security and communications engineering group and did many things, one of the most important of which was to create the blue hat Microsoft hacker conference, which we have mentioned in this article briefly, so while working at Microsoft, she joined companies and other systems and worked hard to increase the security of all the companies she entered.

In general, she was very interested in the security of a system, and in this way, she regularly presented different strategies in order to achieve her goal, which was to raise the trust of companies and systems.

What are the characteristics of blue hat hackers?

Blue hat hackers have personality traits that make them more specialized in their profession, for instance, they have a lot of curiosity, but it should be noted that this personality trait is common among many hackers, this trait that causes them to have a lot of questions in their minds about a system and company, and in order to answer questions, they prefer to do some acts that may be against the rules.

In the following, we will discuss more features related to blue hat hackers.

- Computer addict:

Of course, if you have had a brief study of hackers to date, you know that these people spend many hours a day working with their computers, and you can never get them away from their computers for a long period of time, simply put, they are addicted to their computer and do their best to be able to understand more and more of the details in it.

- Revenge:

Some of these hackers, who have a great desire to take revenge on others, these hackers do their best to be able to show their abilities to other people whom they do not have a good relationship, by harming them, there are many reports about this type of hack that people have been attacked because of not observing the security of their system and also having enmity with such hackers.

- Tendency to break the law:

In addition to blue hat hackers, there are other hackers who are trying their best to break all the rules in a company or system and act against the existing rules, it should be noted that the type of blue hat hackers who are invited in order to find the security holes of companies, do not have this characteristic and are only trying to help the company to produce software with a security hole.

- Creativity:

Creativity is one of the personality traits that you can see among all types of hackers, this moral trait causes hackers to become more and more specialized in their profession and to be able to pursue their goals more quickly.

- high intelligence:

Computers have a lot of complexity and there are many people who want to be able to expand their business in the field of computers and reach many specialties, especially in the field of hacking, but in your opinion, can everyone do this profession? Does everyone have the ability to become a professional hacker ?

The answer to this question is definitely no, because only people who have high intelligence can work professionally in this sector and become more successful and famous day by day with their effort and perseverance among all internet users.

- Risk-taking:

Blue hat hackers have a personality which is called risk-taking, while working with a computer system they try all the ways through which they can achieve the desired result, and they are not afraid of taking any risk in order to reach their purpose.

- Introverted:

Most of the hackers have an introverted personality and do not like to be in crowded groups and prefer to have little contact with people in the real world and if they are in a group of people, they cannot communicate well with others properly, such people have few friends and are more inclined to spend their time in quiet places.

What are the characteristics of blue hat hackers?

Last word:

The world of hacking is very huge, and if you read a lot of articles about it, there is still more information left, which you should try to gain, so you need to spend a lot of time on it, which is why we tried our best to help you in this field, we tried to introduce you to blue hat hackers and give you tips on defining them as well as their personality traits.

DotNek بازدید : 53 سه شنبه 18 خرداد 1400 نظرات (0)

Hacking is an extensive subject and there are many ways in which hackers try to access the information of various users as well as their system, they are trying to use methods that help them achieve their goal as soon as possible, and another feature that these methods need to have is that users cannot find out that they have been hacked quickly, before addressing the main topic of this article, it is necessary to have an overview of hacking and cross-site scripting .

Which language is the main target of cross-site scripting?

What is a hack?

Hacking is a topic in which profiteers, try to use the benefits of their computer talent in order to gain access to various systems as well as their information, and the people who do it are called hackers, there are many types of hackers, some of whom use their talents to help organizations improve their information security , on the other hand, there are some other types of hackers who use their talents against the law, therefore, there are different types of hackers including: white hat, black hat , red hat, blue hat, gray hat, etc., hackers, which you can read the descriptions of each of them in the relevant articles on our site.

What is a cross-site scripting?

It is a type of hacking method which has attracted many attentions and is popular among hackers, in this method, hackers create malicious codes and put them on reputable sites and others, so that users who visit that site will be eventually hacked, this kind of attack has different types, among which we can mention Stored XSS, JavaScript , infected JavaScript can cause a lot of damage to the system of different users, therefore it is an important subject which we will briefly explain about it.

What is JavaScript?

JavaScript is actually one of the programming languages ​​that different users can use in order to access many features, in fact this language controls the way that webpages work.

When is JavaScript used?

In general, this language is used in many cases, JavaScript provides many features, including the ability to add interactivity to web pages, through which users can communicate with web pages better.

- JavaScript allows a user to zoom in, on a web page, play and view animations or audio and video files, see more information by clicking a button, and so on, all of which are provided to users through JavaScript.

- JavaScript is also used to create web applications on the mobile device, that application owners can use various frameworks which exist in JavaScript in order to create their mobile web applications.

- In addition to creating mobile web applications as well as websites, users can also create web servers through JavaScript, which also provides many features.

- This programming language can also be used to create a game, and eventually many users will be attracted to the game you have created.

Other programming languages:

In general, programming has attracted a lot of fans today, and there are many people who have been able to make a lot of money through mastering programming, so we are going to give a brief explanation of some of the programming languages.

- Python Programming Language:

One of the best programming languages ​​that many users prefer to use and has many capabilities is Python Programming Language, as we have mentioned, programming is very lucrative for people who work in this field, which is the reason why different people try to be able to work in this field, our suggestion to you is that you should take this language serious die to the fact that with the help of it, you can take important steps in programming, in general, this language provides many features in the field of data science and machine learning.

- Java programming language:

When you plan to work on a large scale, and you want to program a large organization, the language that we suggest to you, is Java, this language is also used in the development of Android applications , and since many users use Android, it is necessary to have mastery of Java as a programmer, it’s easy to learn, but it's actually a little harder than Python, and you need to work harder to master it.

After learning this language, you can surely find a good job and earn a good income through it, it should be also noted that for a long time this language was known as the first programming language.

- C++ programming language:

This programming language is a little harder than the previous ones which ​​we have mentioned, so you need to spend more time and energy to learn it, this language has two important features which have attracted many users to it, including its high speed and stability, if you master this language, you will also guarantee your future work, so you should get started as soon as possible and learn this type of programming language.

- Go programming language:

This programming language is made by Google and learning it, is relatively simple, but the important thing about this language is that if you want to learn programming in order to find a job, this language It is not a good option because it has not yet been widely used by various organizations, and the ones which use this language are often working on a specific type of project, so having expertise in this type of language for people who want to find a job and earn money through it, is not a great option.

- Swift programming language:

This language is widely used to develop iOS applications , and due to the fact that many users use iOS-based devices, this language can also provide many jobs for programmers.

- C# programming language:

This programming language is a bit complicated and is not recommended for beginners, and it is a general-purpose programming language.

- PHP programming language:

This language is easy to learn and at the same time, it has many fans who learn and use this language in programming.

- MATLAB programming language:

This language is used in different industries and jobs in order to analyze different data, and it can also be easily learned.

So far, we have at a number of programming languages, but it should be noted that despite all of them, many users are still turning to JavaScript, which is why hackers are becoming more and more interested in 

What is a cross-site scripting?

Last word:

In general, there are many hacking methods that are used by different hackers, in this article, we mentioned the cross-site scripting and also stated which language is the main target of this attack, so that you can be more aware and protect your system and information from being hacked by this method.

DotNek بازدید : 44 سه شنبه 18 خرداد 1400 نظرات (0)

There are some interesting topics these days that have attracted a lot of users, one of which is hacking, hackers are always trying to use new methods in order to gain access to other users' information, one of the dangerous ways in which hackers may steal users' information is,  SQL injection attacks .

How can SQL injection be prevented?

What is SQL injection?

This attack is one of the most well-known software and security vulnerabilities , SQL, which stands for Structured Query Language, is the most commonly used language for interacting with databases, as you know, important information is stored in databases, which may include bank card information, username, passwords, etc., all of which are of a great importance, this data is secured when it is transferred to a database or vice versa by using arguments, but the important point is that hackers can gain access to important information from places where your application communicates with an SQL reasoning database, in fact, through this attack, hackers can retrieve data that is not visible to the user and use this information to achieve their goals.

This type of attack is one of the most common ones among hackers, and they use this attack in order to cause a lot of harm to the users' system, through this method they can also have access to other people's information, and they modify or delete it, there have been many reports to date about damage to various systems through this method and sometimes hackers use it in order to hack web servers , in this method, hackers insert a malicious code into the SQL statement through the web page entry.

How can SQL injection be prevented?

To avoid the danger of  application is connected to a database.

- In the next step, you must repair all vulnerable points and then remove all of them, one of the most important things you can do to prevent this type of attack and other attacks is to do all the safety tips that help you increase the security of your system , so that the level of security of your system increases and different hackers cannot steal your information easily.

Other tips to prevent SQL injection attacks:

- Increase the security of all forms which exist in the system, because as you know, hackers implement their goals by entering malicious code in the forms which are transmitted to the system and the database, so it is necessary to secure all of them.

- one of the key points to increase security in these types of attacks and prevent them from happening is that all content and applications in the system should be updated regularly, this point should be taken into consideration because it can generally increase system security, and it is effective against all attacks carried out by hackers, for example in this attack it is possible that by updating, 

- Site speed is very important when SQL attacks take place, and if the site speed is low, it is not possible to defend well against this attack.

- We have already mentioned that in order to find vulnerabilities, you can get help from tools that act like white hat hackers and report all vulnerabilities to you, now we must tell you that you can get help from SQL Injection , which is necessary for all users to know how to prevent this type of attack to make them aware of this type of attack as well as the ways which they can use in order to prevent them from happening, so in this article we have tried to tell you the important steps you need to take to prevent this attack, so if you pay attention to the points which we have mentioned above, they can help you a lot in the field of increasing the security of your system against SQL Injection attacks, due to the fact that this type of attack is so popular among hackers, so it is necessary to know it better and take the necessary steps in order to not let hackers infiltrate your system through this type of attack.

DotNek بازدید : 58 سه شنبه 18 خرداد 1400 نظرات (0)

It should be noted that all the details related to styling are explained in previous tutorial articles.

The difference between style and theme is that in the theme, the value we consider for a feature is considered for the whole page and activities, but in styling in separate tags, we give values ​​for the attributes that apply only to that part.

Application styling, impact and performance of the inheritance feature in styling

How to style the application?

1- Create a file called Style and MinSDK 16.

2- Open Build.gradle (app).

3- Inside the dependencies, we put the codes inserted below.

dependencies {
compile fileTree (dir: 'libs', include: ['* .jar'])
androidTestCompile ('com. android. support.test. espresso: espresso-core: 2.2.2', {
exclude group: 'com. android. support', module: 'support-annotations'
})
compile 'com. android. support: appcompat-v7:26. +'
}

4- The appcompat library is added to the project by default.

5- If the library is not entered by default, you must enter it manually by entering the codes listed below.

compile 'com. android. support: appcompat-v7:x.x'

6- Go to File> Project Structure.

7- In the app section, select the Modules option.

8- Click the Add option, which is indicated by an (+) sign and select Library dependency.

9- In this window, the list of libraries that exist in the SDK and have been added to the project is displayed.

10- Search for Appcompat in the search bar.

11- In order to be able to use the appcompat library, you must have Android Support Library installed.

12- Go to Active.

13- Add three Buttons to activity_main.xml.

14- Attribute All three are the same.

<? xml version = "1.0" encoding = "utf-8"?>
<LinearLayout xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: tools = "http://schemas.android.com/tools"
android: layout_width = "match_parent"
android: layout_height = "match_parent"
android: orientation = "vertical"
tools: context = "com.dotnek. style. MainActivity">


<Button
android: id = "@ + id / button_one"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: text = "Button One"
android: text Size = "18sp"
android: TextColor = "# ffffff"
android: background = "# 9365ca"
android: layout_margin = "5dp" />

<Button
android: id = "@ + id / button_two"
android: layout_width = "match_parent"
android: layout_height = "wrap content"
android: text = "Button Two"
android: text Size = "18sp"
android: TextColor = "# ffffff"
android: background = "# 9365ca"
android: layout_margin = "5dp" />

<Button
android: id = "@ + id / button_three"
android: layout_width = "match_parent"
android: layout_height = "wrap content"
android: text = "Button Three"
android: text Size = "18sp"
android: TextColor = "# ffffff"
android: background = "# 9365ca"
android: layout_margin = "5dp" />

</LinearLayout>

15- Insert the codes listed above for all three buttons.

16- Note that except for the attributes and attributes of id and text, they are all the same.

17- There is a file in the res / values ​​path called styles.xml. This file is used to store style definitions.

18- It should be noted that all styles are defined inside the tags.

19- We must choose a unique name for each of the styles inside the tags.

20- The properties of the styles are also placed inside the and tags.

21- The code inserted below is an example and shows that we have created a new style for the buttons in which the properties of the buttons are common.


<style name = "MyButton">

</style>

 22- We created a style called MyButton to which we apply the properties in the code below.

 23- Put the code below in the styles.xml file.


<resources>

<style name = "MyButton">
<item name = "android: layout_width"> match_parent </item>
<item name = "android: layout_height"> wrap_content </item>
<item name = "android: text Size"> 18sp </item>
<item name = "android: TextColor"> # ffffff </item>
<item name = "android: background"> # 9365ca </item>
<item name = "android: layout_margin"> 5dp </item>
</style>

<! - Base application theme. ->
<style name = "AppTheme" parent = "Theme.AppCompat.Light.DarkActionBar">
<! - Customize your theme here. ->
<item name = "colorPrimary"> @ color / colorPrimary </item>
<item name = "colorPrimaryDark"> @ color / colorPrimaryDark </item>
<item name = "colorAccent"> @ color / colorAccent </item>
</style>

</resources>

24- Go back to the activity and delete the common properties of the first button.

< Button
android: id = "@ + id / button_one"
android: text = "Button One" />

25- Add the MyButton style to this button.

Button
style = "@ style / MyButton"
android: id = "@ + id / button_one"
android: text = "Button One" />26. The property that we have defined in the style is applied to this button.
<Button
style = "@ style / MyButton"
android: id = "@ + id / button_one"
android: text = "Button One" />

<Button
android: id = "@ + id / button_two"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: text = "Button Two"
android: text Size = "18sp"
android: TextColor = "# ffffff"
android: background = "# 9365ca"
android: layout_margin = "5dp" />

<Button
android: id = "@ + id / button_three"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: text = "Button Three"
android: text Size = "18sp"
android: TextColor = "# ffffff"
android: background = "# 9365ca"
android: layout_margin = "5dp" />

26- Attach the other two buttons to the corresponding style and apply the properties to it.

<Button
style = "@ style / MyButton"
android: id = "@ + id / button_one"
android: text = "Button One" />

<Button
style = "@ style / MyButton"
android: id = "@ + id / button_two"
android: text = "Button Two" />

<Button
style = "@ style / MyButton"
android: id = "@ + id / button_three"
android: text = "Button Three" />

27- In addition to the above methods, you can create two Text Views that apply the style to items that have common properties.

<TextView
android: id = "@ + id / txt_1"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: gravity = "center"
android: text = "Sample Text 1"
android: TextColor = "# c20d37"
android: text Size = "23sp"
android: layout_marginTop = "10dp" />

<TextView
android: id = "@ + id / txt_2"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: gravity = "center"
android: text = "Sample Text 2"
android: TextColor = "# c20d37"
android: text Size = "23sp"
android: layout_marginTop = "10dp" />

28- In the Preview section, right-click on TextView.

29- Then select Refactor> Extract Style.

30- In the window that opens, select a name for the style.

31- In the Attributes section, select the properties we want to apply to them.

32- The title of the Launch properties is ‘Use Style Where Possible’, which can connect all the items that exist in the activity and also have common properties, and there is no need to change them manually.

33- Select the Do Refactor option.

34- A new style was added and applied to both Text Views.

35- The code that should be written in the styles.xml section is as follows:

<style name = "My Text">
<item name = "android: layout_width"> match_parent </item>
<item name = "android: layout_height"> wrap_content </item>
<item name = "android: gravity"> center </item>
<item name = "android: TextColor"> # c20d37 </item>
<item name = "android: text Size"> 23sp </item>
<item name = "android: layout_marginTop"> 10dp </item>
</style>

 36- The code that should be written in the main_activity.xml section is as follows:

<TextView
android: id = "@ + id / txt_1"
android: text = "Sample Text 1"
style = "@ style / My Text" />

<TextView
android: id = "@ + id / txt_2"
android: text = "Sample Text 2"
style = "@ style / My Text" />

In this section we want to use the inheritance feature, so consider that we have several buttons that all their properties and characteristics are the same, but we want them to be different in background color. In this case, we need to create a new style and add the required properties to them, but we can use the inheritance feature and make the necessary changes easily.

<style name = "MyButton">
<item name = "android: layout_width"> match_parent </item>
<item name = "android: layout_height"> wrap_content </item>
<item name = "android: text Size"> 18sp </item>
<item name = "android: TextColor"> # ffffff </item>
<item name = "android: background"> # 9365ca </item>
<item name = "android: layout_margin"> 5dp </item>
</style>

<style name = "MyButton. Green">
<item name = "android: background"> # 51c125 </item>
</style>

In the code above, the name of the style we created is MyButton. Green. The value and property of MyButton. We added it before Green, which makes it have all the parent properties of MyButton.

Then I add the background color with the desired amount.

In this code, we specified that all widgets defined as MyButton. Green have MyButton properties, but with the difference that the value of the background property has been replaced.

We check that it works properly:

<Button
style = "@ style / MyButton"
android: id = "@ + id / button_one"
android: text = "Button One" />

<Button
style = "@ style / MyButton.Green"
android: id = "@ + id / button_two"
android: text = "Button Two" />

<Button
style = "@ style / MyButton"
android: id = "@ + id / button_three"
android: text = "Button Three" />

The result will be a difference in the background color of the second button with the other buttons.

Consider the name MyButton.SmallButton. BorderButton.Green:

According to the name listed above

SmallButton:

is a style in which the layout_width value is 100dp and prevents full width occupation.

BorderButton:

A style to which border-related properties are added so that the color of the bar and the line around the buttons are the same as the background.

Inheritance of a button style that is small in size, has a different background color from other buttons, and is green in color as follows:

<style name = "GreenButton" parent = "MyButton.SmallButton. BorderButton">

</style>
The styles to be inherited are placed inside the parent:
Instead of the code inserted in this field
<Button
style = "@ style / MyButton.SmallButton. BorderButton.Green"
android: id = "@ + id / button_one"
android: text = "Button One" />

You can enter the code below:

<Button
style = "@ style / GreenButton"
android: id = "@ + id / button_one"
android: text = "Button One" />

Application styling,impact and performance of the inheritance feature in styling

Application theme

Themes generally apply to the entire project, activity, or application .

The general settings of the application are done and set inside the AndroidManifest.xml file:

<? xml version = "1.0" encoding = "utf-8"?>
<manifest xmlns: android = "http://schemas.android.com/apk/res/android"
package = "com.dotnek. style">

<application
android: allowBackup = "true"
android: icon = "@ mipmap / ic_launcher"
android: label = "@ string / app_name"
android: roundIcon = "@ mipmap / ic_launcher_round"
android: supportsRtl = "true"
android: theme = "@ style / AppTheme">
<activity android: name = ". MainActivity">
<intent-filter>
<action android: name = "android. intent. action. MAIN" />

<category android: name = "android. intent. category. LAUNCHER" />
</intent-filter>
</activity>
</application>

</manifest>

Inside the application tag there is a theme property.

Go to styles.xml:



There is a style called AppTheme that also inherits from Theme.AppCompat. Light.DarkActionBar. Using Theme.AppCompat we have access to all the themes in the appcompat-v7 library.

In this part of the tutorial, we were able to define three buttons and change its properties. By changing its properties, we saw the result and were able to apply the desired changes by inheriting and having the same properties without the need to define and create new styles and tags.

DotNek بازدید : 68 سه شنبه 18 خرداد 1400 نظرات (0)

Applications also need an editor to be able to edit them and get the way users want. Editors that are created in applications can make edits to audio, image, text, etc. at the request of users. In this tutorial we will create an editor that is used to edit texts.

How to create an Editor in Xamarin?

In this tutorial you will learn that:

- How to create an Editor in Xamarin.Forms using an XAML file?
- How to respond to text changes that occur in the Editor?
- How to define the Editor behavior?

Note:

In order to be able to do this tutorial, you must have already done the article and project How to create a StackLayout in Xamarin .

Learn how to create an Editor in Xamarin.Forms using Visual Studio

The requirements for doing this tutorial for creating an Editor in Xamarin.Forms are as follows:

- Install the latest version of Visual Studio 2019 on the system
- Install the latest version of Mobile development with.NET on the system

Learn how to create a StackLayout in Xamarin.Forms using Visual Studio

1- Open Visual Studio.
2- After opening Visual Studio, you need to create a new black Xamarin.Forms app.
3- Choose a name for which you create. The name chosen in this article is Editor Tutorial.

Note:

It is best to be careful in choosing names for projects and classes created.

Note:

The name chosen for the project must be the same as the name chosen for the solution, so choose the solution name EditorTutorial as well.

- After naming, you must make sure that the system and application support the .NET Standard mechanism for shared code.

This mechanism is used to share code written in Xamarin.Forms with the C # programming language. If your system and app do not support this mechanism, it cannot have multiple outputs on multiple platforms at once. So that you can have multiple outputs on several different platforms at the same time.

- Click on MainPage.xaml in the Solution Explorer section of the EditorTutorial project and replace the code below with all the code in that section.

<! -? xml version = "1.0" encoding = "utf-8"? ->

<contentpage xmlns = "http://xamarin.com/schemas/2014/forms" xmlns: x = "http://schemas.microsoft.com/winfx/2009/xaml" x: class = "EditorTutorial.MainPage">

<stacklayout margin = "20,35,20,20">

<editor placeholder = "Enter multi-line text here" heightrequest = "200">

</editor> </stacklayout>

</contentpage>

By entering this code, you specify a UI for the page, which includes an Editor and a StackLayout.

To indicate the length of the Editor, HeightRequest is used in device-independent units.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes.

Learn how to respond to text changes made in the Editor using Visual Studio

- To respond to the text changes made in the Editor, you must change the definition of the Editor in the MainPage.xaml file.
- To do this, you must enter the code to create an event handler for TextChanged and Completed.

 Replace the code below with all the code in the MainPage.xaml file.

<editor placeholder = "Enter multi-line text here" heightrequest = "200" textchanged = "OnEditorTextChanged" completed = "OnEditorCompleted">



</editor>

- Open MainPage.xaml in the EditorTutorial project from the Solution Explorer section.

- Then double click on MainPage.xaml.cs.

- Add the following event handlers for OnEditorTextChanged and OnEditorCompleted.

void OnEditorTextChanged (object sender, TextChangedEventArgs e)

{

string oldText = e. OldTextValue;

string newText = e. NewTextValue;

}



void OnEditorCompleted (object sender, EventArgs e)

{

string text = ((Editor) sender). Text;

}

The OnEditorTextChanged method is executed when the code inside the Editor changes. The Editor object is the sender argument and is used to start the TextChanged event.

The TextChangedEvenArgs argument provides the old and new values ​​that are generated after the change.

If editing is complete, the OnEditorCompleted method will run.

When the code inside the Editor changes, the OnEditorTextChanged method runs. The sender argument is the Editor object, which is responsible for initiating the TextChanged event and can be accessed through the Editor object. The TextChangedEvenArgs argument provides the old and new values ​​of the text, before and after the change.

Note:

Any text that enters the Editor will be in the Text attribute.

- Press the Start button or Ctrl + F5 key combination to see the result of the steps you did.
- Then enter text in the Editor. You will see that the TextChanged event starts.
- Unfocused the Editor. You will see that the Completed event starts.

Learn how to change the Editor behavior using Visual Studio

- To change the Editor behavior, you must change the Editor definition in the MainPage.xaml file.
- Replace the code below with all the code in the MainPage.xaml file.

<editor placeholder = "Enter multi-line text here" autosize = "TextChanges" maxlength = "200" isspellcheckenabled = "false" istextpredictionenabled = "false">



</editor>

By entering this code, you specify the Editor attributes. The value in the AutoSize attribute is TextChanges

is. The TextChanges value is set to AutoSize to increase the length of the Editor by entering text and decrease the length by deleting text.

The MaxLength attribute is used to specify a longitudinal constraint.

- Press the Start button or Ctrl + F5 key combination to see the result of the steps you did.
- Enter text in the editor. You will notice that adding text increases the length of the editor and decreases as deleting text.

In this tutorial you will learn that:

- How to create an Editor in Xamarin.Forms using an XAML file?
- How to respond to text changes that occur in the Editor?
- How to define the Editor behavior?

Note:

In order to be able to do this tutorial, you must have already done the article and project How to create a StackLayout in Xamarin.

Learn how to create an Editor in Xamarin.Forms using Visual Studio for Mac

The requirements for doing this tutorial for creating an Editor in Xamarin.Forms are as follows:

- Install the latest version of Visual Studio for Mac on the system
- Install the latest version of support platform for Android and iOS on the system
- Install the latest version of Xcode

- Open Visual Studio.
- After opening Visual Studio, you must create a new black Xamarin.Forms app.
- Choose a name for which you create. The name chosen in this article is EditorTutorial.

Note:

It is best to be careful in choosing names for projects and classes created.

Note:

The name chosen for the project must be the same as the name chosen for the solution, so choose the solution name EditorTutorial as well.

- After naming, you must make sure that the system and application support the .NET Standard mechanism for shared code.

This mechanism is used to share code written in Xamarin.Forms with the C # programming language. If your system and app do not support this mechanism, it cannot have multiple outputs on multiple platforms at once. So that you can have multiple outputs on several different platforms at the same time.

- Click on MainPage.xaml in the Solution pad section of the EditorTutorial project and replace the code listed below with all the code in that section.

<! -? xml version = "1.0" encoding = "utf-8"? ->

<contentpage xmlns = "http://xamarin.com/schemas/2014/forms" xmlns: x = "http://schemas.microsoft.com/winfx/2009/xaml" x: class = "EditorTutorial.MainPage">

<stacklayout margin = "20,35,20,20">

<editor placeholder = "Enter multi-line text here" heightrequest = "200">

</editor> </stacklayout>

</contentpage>

By entering this code, you specify a UI for the page, which includes an Editor and a StackLayout.

To indicate the length of the Editor, HeightRequest is used in device-independent units.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes.

Learn how to respond to text changes made in the Editor using Visual Studio for Mac

- To respond to text changes made in the Editor, you must change the Editor definition in the MainPage.xaml file.
- To do this, you must enter the code to create an event handler for TextChanged and Completed.

 Replace the code below with all the code in the MainPage.xaml file.

<editor placeholder = "Enter multi-line text here" heightrequest = "200" textchanged = "OnEditorTextChanged" completed = "OnEditorCompleted">



</editor>

- Open MainPage.xaml in the EditorTutorial project from the Solution Explorer section.
- Then double click on MainPage.xaml.cs.
- Add the following event handlers for OnEditorTextChanged and OnEditorCompleted.

void OnEditorTextChanged (object sender, TextChangedEventArgs e)

{

string oldText = e. OldTextValue;

string newText = e. NewTextValue;

}



void OnEditorCompleted (object sender, EventArgs e)

{

string text = ((Editor) sender). Text;

}

The OnEditorTextChanged method is executed when the code inside the Editor changes. The Editor object is the sender argument and is used to start the TextChanged event.

The TextChangedEvenArgs argument provides the old and new values ​​that are generated after the change.

If editing is complete, the OnEditorCompleted method will run.

When the code inside the Editor changes, the OnEditorTextChanged method runs. The sender argument is the Editor object, which is responsible for initiating the TextChanged event and can be accessed through the Editor object. The TextChangedEvenArgs argument provides the old and new values ​​of the text, before and after the change.

Note:

Any text that enters the Editor will be in the Text attribute.

- Press the Start button or Ctrl + F5 key combination to see the result of the steps you did.
- Then enter text in the Editor. You will see that the TextChanged event starts.Unfocused the Editor.
- You will see that the Completed event starts.

How to create an Editor in Xamarin.Forms?

Learn how to change the Editor behavior using Visual Studio for Mac

- To change the Editor behavior, you must change the Editor definition in the MainPage.xaml file.
- Replace the code below with all the code in the MainPage.xaml file.

<editor placeholder = "Enter multi-line text here" autosize = "TextChanges" maxlength = "200" isspellcheckenabled = "false" istextpredictionenabled = "false">



</editor>

By entering this code, you specify the Editor attributes. The value in the AutoSize attribute is TextChanges

is. The TextChanges value is set to AutoSize to increase the length of the Editor by entering text and decrease the length by deleting text.

The MaxLength attribute is used to specify a longitudinal constraint.

- Press the Start button or Ctrl + F5 key combination to see the result of the steps you did.
- Enter text in the editor. You will notice that adding text increases the length of the editor and decreases as deleting text.

DotNek بازدید : 56 سه شنبه 18 خرداد 1400 نظرات (0)

The world of computer games has become one of the largest worlds in today's world. Many people around the world spend many hours every day playing these games, and many companies and manufacturers have tried to make it easier for gamers by producing different kind of tools and equipment. Today, technologies are being produced for the game that even thinking about them may cause headaches. The tools that are produced for gaming , in addition to their stunning beauty, are also very useful and can convey a lot of excitement to a gamer. The better and more appropriate the tools used by a gamer, the more fun and excitement a gamer will get from playing. One of the tools used in this field is gamepads. Many players prefer to use different types of mice and keyboards to play instead of using gamepads, but some people also prefer to use different gamepads in addition to having mice and keyboards. Gamepads are used for fixed gaming consoles such as PlayStation and Xbox but are also sold separately.

How to use a gamepad?

What is a gamepad and how can I use a gamepad?  

In addition to knowing that some games can play with both the gamepad and the mouse and keyboard, it is better to know that the gamepads also have many different types. In the first stage of their production, these gamepads had wires, but gradually the manufacturers tried to remove the wire from these devices so that they could multiply the enjoyment of playing for the players. In this way, players can play and enjoy it without disturbing any wires. Gamepads are control panels that allow players to interact with the game environment. The higher the quality of a gamepad, the faster the players' reactions will be transferred to the game, which will make the game better. Also, the gamepads that are produced with the quality have different shocks that convey what happens in the game to the player, the transfer of these emotions causes the great excitement of the game for a player. To use these controllers there are special rules and you need to know the instructions for using them so that you can use them more easily. We are going to talk to you about the specific types of gamepads and how to use a gamepad.

Gamepads for game consoles

These gamepads, as their name suggests, are for game consoles and are

designed for them only. In the past, these controllers were produced in limited numbers and their use was also limited for control, but today, in addition to becoming more beautiful and of better quality, these gamepads have also made other improvements. These gamepads are being designed and produced wirelessly today, and this has improved gaming conditions. Also, different devices can support more than two gamepads, which can increase the spirit of team games and multiply the pleasure of playing. Many of these gamepads have very strong batteries that can hold a charge for many hours. Various consoles such as Xbox and <a href="https://en.wikipedia.org/wiki/PlayStation" target="_blank" rel="nofollow" title="PlayStation was the brainchild of Ken Kutaragi, a Sony executive who managed one of the company" s="" hardware="" engineering="" divisions="" and="" was="" later="" dubbed="" "the="" father="" of="" the="" playstation".'="">PlayStation design and produce these controllers. There are also more accessories for these categories and game consoles that you can play according to your taste. Note that these gamepads, which are for consoles, have very good quality and it is very exciting to play with them.

Gamepads for Windows

Another type of controller is the Windows gamepads.  Most games designed and produced for Windows can play with the mouse and keyboard, and this is quite a matter of taste that a gamer wants to use the gamepad to play or the mouse and keyboard. Note that also, some games play better with gamepads and others with mice and keyboards.  However, if you, as a gamer, want to buy a gamepad, you should pay attention to the many points that exist in this field. In the first step, you can use two types of wires or wireless. In the wired category, as their name suggests, the gamepad connects with wire to the case of your device, but wireless devices have settings that you must activate before using them. In the settings, you can read the manual that comes with the game controller so that you can easily make these settings on your system.

What is a gamepad and how can I use a gamepad?

Mobile gamepad

Another exciting and interesting kind of gamepad is the phone gamepad. It may be a little surprising to hear this phrase in the first moments, but for mobile games today, different controllers are designed and produced. Because mobile games have a lot of fans today, the manufacturers of game controllers decided to design and produce gamepads for mobile phones to increase the excitement of playing mobile games. Not everyone can afford to buy game systems, so buying a mobile game console can convey a decent amount of excitement to the player, and you can get and use these gamepads at a low cost. These controllers have a lot of power and will multiply the excitement of the game. ‌These gamepads also have different types and can be placed around the frame of your phone or can be placed as a stand under your phone to play and make playing easier for you. You can connect this gamepad directly to your phone so you can use them. Some controllers connect to your phone via Bluetooth, while others connect by wire. However, each type of gamepad that you prepare and use has a special way to connect that you must pay attention to when buying.

DotNek بازدید : 58 سه شنبه 18 خرداد 1400 نظرات (0)

These days, you as a user or the owner of a website, are always dealing with the problem of preventing viruses from entering your computer system, computer viruses are very similar to biological viruses, and if they find systems with low security, they will multiply rapidly and infect the whole system, as we mentioned, systems which have low security are the main target of viruses, so you have to increase the security of your computer systems as much as possible in order to protect them from possible threats, you also need to know viruses better, so that you can stand up to them more, in this article we are going to introduce you three different types of viruses in order to make you aware of such threats.

                                                                

What are the 3 types of viruses?

What is a computer virus?

In fact, computer virus is a type of programming that if it can bypass the host's security system, it would eventually infect the whole system by inserting its own code and fast replication, profiteers can access various information from the host system by importing the virus into the host’s system, and they also make many changes to the systems of different users in order to achieve their desires.

There are three types of computer viruses:

                                

1- Macro viruses:

A macro virus can attack various applications and eventually cause a sequence of actions to start automatically when the infected program is opened, the virus is written in macro language and can infect different types of systems due to having different operating systems, as we mentioned, this type of virus causes malicious programs to run once the infected documents are opened, in fact they do this process by entering malicious code into macros that are associated with documents, spreadsheets, and other data files, these types of viruses can eventually send infected emails from the infected system, so that lots of different users’ systems will be infected once they open those emails, and viruses continue to multiply just like biological viruses and infect the whole system, as a result, they are able to infect more and more users’ systems day by day.

Also, when this macro is executed in the system, usually all the documents that are in the user's computer are infected and can cause disorder in the existing documents, the first macro virus was spread in 1995 through Microsoft Word and has finally been able to continue to spread and infect various systems to date, there are different types of macro viruses including, the concept virus and Melissa virus, which we are going to describe in the following.

The concept virus:

The first macro virus to be introduced was the concept virus, which targeted Microsoft Word.

Melissa virus:

This virus spread in March 1999 through infected emails and was able to infect many systems in a very short while, so these abilities caused a lot of worries and turned this virus into a huge danger for every user, this type of virus was distributed as an email attachment, and as we mentioned, it was able to spread quickly among different users’ systems, these emails were distributed to the users in such a way that the users thought they had requested the submitted file and opened it quickly, by doing so, their systems would be infected, this type of virus has caused a lot of economic losses, especially to Microsoft.

2- Boot record infectors:

These types of viruses can give hackers absolute control over a system by infecting different users' systems, Boot record infectors, attack programs stored on boot floppies or hard disks, by infecting them and causing the infected code to run automatically every time a user boots the computer, these viruses have different types depending on their purpose.

3- File infectors:

File infector virus may be transmitted over networks, disks, or the Internet, and eventually every time a user runs a dangerous program, these viruses are being activated, the thing to note about these types of viruses is that they can remain in inactive memory until there is a signal to infect other program files, which causes the virus to become a malicious virus.

While this virus is infecting a file, it can also spread to other programs and even other networks that use infected files and programs, computer viruses can eventually cause a lot of damage to different users’ systems as well as their information, documents, etc., which is why it is so necessary to know the ways to deal with them and prevent them from entering your systems by mastering them.

Ways to deal with viruses:

- Use secure browsers:

There are various measures that can be taken to combat the entry of various viruses, one of the most important of which is the use of a secure browser, today there are many secure browsers, such as Google Chrome, Mozilla Firefox, Safari, etc., all of which can provide a lot of security for the users , the reason why there is so much emphasis on the use of secure browsers today, is that users do almost all their tasks through the Internet, so they may enter a lot of personal information, such as their bank card information, as a result, if you use an insecure browser in order to achieve your goals, you won’t be successful.

- Block all pop-up windows:

Pop-up ads are very annoying for different users, and they can also be more annoying by entering different viruses to the systems, these ads which actually run without the user's request, cause the user to get nervous, so they won’t get a positive user experience by using a website , as a result, users have a great desire to block them which is possible through the settings in the browser and various software programs that can be easily downloaded by the users in order to get rid of pop-up ads and possible threats.

- Use powerful antivirus:

Despite the increase in security of various operating systems , such as Windows 10, it is still necessary to use antivirus software program which provides good facilities, there are many antivirus software programs on the market, some of which are paid, but some are free, and different users have to choose one of which according to their purpose, the important point that should be considered is that you should never think if you use two several antivirus software programs, you will achieve more security and can protect your system more against different viruses, because not only won’t it increase the security of your system, but also slows down the speed of it, so you need to do a thorough research about the features of different types of antivirus software programs, and try to choose the best one, another point that should be taken into consideration is that you need to update it regularly in order to maintain the security of your system.

- Scan devices and accessories connected to the computer:

Different viruses may be connected to various systems via disks, flash drives, etc., so it is necessary to scan an external agent as soon as it connects to the system, and if there is a virus, it is going to be reported as soon as possible, so that you can take necessary security measures to deal with its virus, one of the reasons why antivirus software programs are so important is that they can scan all viruses quickly and keep the system safe.

- Fishing emails:

One way to transmit different viruses is through phishing emails, which are created by different hackers and sent to various users, it should be noted that phishing emails have features that can be quickly detected by mastering them, one of the features of these emails is the attractiveness of the title, having topics to arouse the user's feelings, etc., all of these factors make the users click on them quickly, and their systems will be infected, as a result, if you see these types of emails, you should only delete them, so that they cannot infect your computer systems.

There are three types of computer viruses

Last word:

In general, viruses have a wide world and to deal with them, it is necessary to increase our awareness in this field, which is why in this article we have mentioned different types of viruses to make you aware of any possible threats , so you can increase the security of your systems by knowing the most common security threat, and surf the Internet safely, but never forget that having a strong antivirus is a must to stand up to different viruses.

DotNek بازدید : 52 سه شنبه 18 خرداد 1400 نظرات (0)

The first thing that comes to different people’s minds, is to be able to take some steps in order to increase the security of their information and system against the intrusion of viruses, malware, etc., some of which is to use a strong and appropriate antivirus that these can be effective in securing systems to a large extent.

These days, users do all their daily chores online, for example, making their purchases online by entering their credit card number, now imagine that such important information of users is being made available to people as a result of entering viruses and causes a lot of damage to users, now what do you think will happen? Certainly irreparable damage will be done to the user, which is why the necessary measures must be taken before these happenings, Chrome users can actually resist all of these with the help of some programs, which we'll cover in this article.

What is the best antivirus for Google Chrome?

What is Google Chrome?

On September 2, 2008, Google Chrome was released by Google, and Chrome is licensed as a proprietary free software, and now the rendering engine of this browser is Blink, today, Google Chrome has a huge share of the browser worldwide market and many users tend to use it.

While using Google Chrome, malicious viruses may enter your system and eventually your information may be compromised, so you can get help from Google Chrome extensions, which you can download in web chrome stores, and finally you can add them to your browser which can help you increase your security while using Google Chrome, in this article, we are going to mention the best extensions in Chrome that help you ensure the safety and security of users' information while they are online.

The best extensions in Chrome for online security:                                                 

- AdBlock Plus:

 malware .

- Disconnect:

Another plugin that can help you prevent various websites from tracking you, is Disconnect, as we have mentioned earlier, some websites can track you while you are visiting a site other than theirs, which can do a lot of damage to your system security .

This plugin has the ability to show us the name of any particular web tracker, and ultimately you can decide whether you want the site to track you or not, this plugin also has a paid source that can provide more features for users.

- HTTPS Everywhere:

You definitely know that sites with HTTP in their address instead of HTTPS , are not secure and they have not received SSL certification, most people are constantly trying to use sites which have enabled HTTPS, in order to meet their needs.

Although site owners are aware of this, there are still sites that are not certified and do not have high security, HTTPS Everywhere, switches HTTP to HTTPS automatically in order to make your website secure and protect your information as good as possible.

In general, if you do not take security seriously, a lot of damage will be done to your system, and a variety of malicious attacks will be done on your site as well, among which we can mention injection attacks, which can be identified by using the plugins which we have mentioned in this article, and finally users can investigate what happened after the time when their system is infected, and they can finally do their best to regain the lost security.

In addition to the plugins we mentioned, there are other ones that aim to help users to increase the security of their system as much as possible in order to be able to protect their data in the best possible way, in this article we tried our best to name some of the best ones available and their advantages in order to make the choice easier for you.

What is Google Chrome?

Last word:

As you know, Google Chrome has a lot of users these days who refer to it to meet their basic needs and doing researches, which is why the number of its users is increasing day by day as well as the worries about system security , because in the meantime, there are people who are trying to harm users and steal their information, so it is necessary to take some steps in order to increase your security while using Google Chrome , and get acquainted with the tools that can help you in this field and know how to use them, to get the best possible results, that's why in this article we have listed the best extensions that are available in order to increase your security in Google Chrome, so that you can use them to protect your information from being stolen by hackers due to the fact that they will abuse them to achieve their desired goals, another point that should be taken into consideration is that if you do not care about your system security and do not get help from the available tools like extensions, you will let hackers infiltrate your system which can endanger your whole system.

DotNek بازدید : 61 سه شنبه 18 خرداد 1400 نظرات (0)

Users are more affected by graphical user interfaces because it is both more attractive and saves them from having to go through difficult processes. In other words, graphical user interfaces turn the task of writing complex code into the push of a few buttons. Therefore, buttons play an important and effective role in applications and are used to do things easily. In this part of the tutorial, we will tell you how to create a button in designing and building applications .

How to build a Button in Xamarin?

What is a Button?

Button Reject GUI design field is any type of widget that is provided to users to perform events in a simple way. Buttons are also called command buttons because they perform user commands for certain events.

For example, pressing the Save button in some of the notifications that appear will save the files in a specified path. Or OK can be used to confirm the contents or close some windows.

Buttons are usually or often in the form of rectangles that are smaller in width than length and are used to perform user commands in a simple way. According to the text that is written on the button, users can identify the operation that each button performs and select and click the appropriate button to do their work based on their needs. Therefore, there may be several buttons in a window and each of them is used to do different things, users can understand the meaning according to the text written on each button and press the appropriate button.

The text that is written on each button is called Caption. When inserting a caption, be careful to write it related to the type of activity that the button performs.

Buttons can have different modes, and the user can do the following methods to perform the desired operation through the buttons:

- They can click on the available buttons.
- On touch screens, touch the buttons.
- If the buttons are in focus mode, press the Enter or Space bar arrow keys.
- Use shortcuts. This is the case when shortcuts are defined for buttons.

In this tutorial you will learn:

- How to create a Button in Xamarin.Forms using the XAML file?
- How to respond to the pressing of buttons?
- How to change the appearance of Button and create a graphical user interface for it?

Learn how to create a Button in Xamarin.Forms using Visual Studio

The requirements for doing this training are as follows:

- Install the latest version of Visual Studio 2019 on the system
- Install the latest version of Mobile development with .NET on the system

1- Open Visual Studio.
2- After opening Visual Studio, you must create a new black Xamarin.Forms app.
3- Choose a name for which you create. The name chosen in this article is Button Tutorial.

Note:

It is best to be careful in choosing names for projects and classes created.

Note:

The name selected for the project must be the same as the name chosen for the solution, so select the solution name ButtonTutorial as well.

-  After naming, you must make sure that the system and application support the .NET Standard mechanism for shared code.

This mechanism is used to share code written in Xamarin.Forms with the C # programming language. If your system and app do not support this mechanism, it cannot have multiple outputs on multiple platforms at once. So that you can have multiple outputs on several different platforms at the same time.

- Click on MainPage.xaml in the Solution Explorer section of the ButtonTutorial project and replace the code below with all the code in that section.

<! -? xml version = "1.0" encoding = "utf-8"? ->

<contentpage xmlns = "http://xamarin.com/schemas/2014/forms" xmlns: x = "http://schemas.microsoft.com/winfx/2009/xaml" x: class = "ButtonTutorial.MainPage">

<stacklayout margin = "20,35,20,20">

<button text = "Click me">





</button></stacklayout> </contentpage>

By entering this code, you specify a UI for the application, which includes a Button in StackLayout. Button.Text to display the key text that will be displayed on the button.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes.

If you look closely, you will see that the Button occupies all the space on the screen.

Learn to respond to Button in Xamarin.Forms using Visual Studio

1- To respond to Button, you must change the Button definition in the MainPage.xaml file.
2- To do this, you must enter the code to create a handler for the Clicked event.

Replace the code below with all the code in the MainPage.xaml file.

    <button text = "Click me" clicked = "OnButtonClicked">
</button>

By entering this code, you can set the Clicked event to event handler. The name of the event handler is OnButtonClicked.

3- Click on MainPage.xaml in the Solution Explorer section of the ButtonTutorial project.

4- Then double click on MainPage.xaml.cs to open it.

5- Add the OnButtonClicked event handler to the class by entering the following code.

void OnButtonClicked (object sender, EventArgs e)

{

(sender as Button). Text = "Click me again!";

}

The OnButtonClicked method is executed when the Button is pressed. The sender argument starts the Clicked event.

In addition to the Clicked event, there are other events such as Pressed and Released.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes. In this case, you will notice the text change inside the button.

Learn how to change the appearance of Button in Xamarin.Forms using Visual Studio

1- In order to change the appearance of Button and create an attractive graphical user interface for it, you have to change the definition of Button in the MainPage.xaml file.
2- To do this, open MainPage.xaml and replace the code listed below with the code there.

    <button text = "Click me" clicked = "OnButtonClicked" textcolor = "Blue" backgroundcolor = "Aqua" bordercolor = "Red" borderwidth = "5" cornerradius = "5" widthrequest = "150" heightrequest = "75">
</button>

By entering this code, you change the appearance of Button. The TextColor attribute is an attribute used to change or specify the color of a button. With the values ​​you put in this attribute, you specify the color of the button.

The shape of the button is rectangular by default, which is less than its width, but the values ​​in the CornerRadius attribute can soften the corners and turn it into other shapes, such as circles. Of course, to change the shape of the button, you can specify and change the values ​​of WidthRequest and HeightRequest by decreasing or increasing the values.

The BackgroundColor attribute is used to change the background color of the button text. The values ​​in the BorderColor attribute can specify the color of the perimeter around the button.

The BorderWidth attribute specifies the width of the button border, the higher the value of this attribute, the thicker the border, and the smaller the value of this attribute, the narrower the border.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes. In this case, you will notice that the appearance of the button has changed and has been adjusted according to the changes you have made.

Learn how to create a Button in Xamarin.Forms using Visual Studio for Mac

The requirements for doing this training are as follows:

- Install the latest version of Visual Studio for Mac on the system
- Install the latest version of support platform for Android and iOS on the system
- Install the latest version of Xcode

1- Open Visual Studio.
2- After opening Visual Studio, you need to create a new black Xamarin.Forms app 3- Select the name for which you are creating. The name chosen in this article is ButtonTutorial.

Note:

It is best to be careful in choosing names for projects and classes created.

Note:

The name selected for the project must be the same as the name chosen for the solution, so select the solution name ButtonTutorial as well.

- After naming, you must make sure that the system and application support the .NET Standard mechanism for shared code.

This mechanism is used to share code written in Xamarin.Forms with the C # programming language. If your system and app do not support this mechanism, it cannot have multiple outputs on multiple platforms at once. So that you can have multiple outputs on several different platforms at the same time.

- Click on MainPage.xaml in the Solution Pad section of the ButtonTutorial project and replace the code below with all the code in that section.

<! -? xml version = "1.0" encoding = "utf-8"? ->

<contentpage xmlns = "http://xamarin.com/schemas/2014/forms" xmlns: x = "http://schemas.microsoft.com/winfx/2009/xaml" x: class = "ButtonTutorial.MainPage">

<stacklayout margin = "20,35,20,20">

<button text = "Click me">





</button></stacklayout> </contentpage>

By entering this code, you specify a UI for the application, which includes a Button in StackLayout. Button.Text to display the key text that will be displayed on the button.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes.

If you look closely, you will see that the Button occupies all the space on the screen.

Learn how to respond to Button in Xamarin.Forms using Visual Studio for Mac

1- To respond to Button, you must change the Button definition in the MainPage.xaml file.
2- To do this, you must enter the code to create a handler for the Clicked event.

Replace the code below with all the code in the MainPage.xaml file.

<button text = "Click me" clicked = "OnButtonClicked">

</button>

By entering this code, you can set the Clicked event to event handler. The name of the event handler is OnButtonClicked.

1- Click on MainPage.xaml in the Solution Pad section of the ButtonTutorial project.
2- Then double click on MainPage.xaml.cs to open it.
3- Add the OnButtonClicked event handler to the class by entering the following code.

void OnButtonClicked (object sender, EventArgs e)

{

(sender as Button). Text = "Click me again!";

}

The OnButtonClicked method is executed when the Button is pressed. The sender argument starts Clicked event on Clicked event, there are other events like Pressed and Released.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes. In this case, you will notice the text change inside the button.

What is a Button?

Learn how to change the appearance of Button in Xamarin.Forms using Visual Studio for Mac

1- To change the appearance of the Button and create an attractive graphical user interface for it, you must change the Button definition in the MainPage.xaml file.
2- To do this, open MainPage.xaml and replace the code below with the code below.

    <button text = "Click me" clicked = "OnButtonClicked" textcolor = "Blue" backgroundcolor = "Aqua" bordercolor = "Red" borderwidth = "5" cornerradius = "5" widthrequest = "150" heightrequest = "75">
</button>

By entering this code, you change the appearance of Button. The TextColor attribute is an attribute used to change or specify the color of a button. With the values ​​you put in this attribute, you specify the color of the button.

The shape of the decanter is rectangular by default, which is less than its length, but the values ​​in the CornerRadius attribute can soften the corners and turn it into other shapes, such as a circle. Of course, to change the shape of the button, you can specify and change the values ​​of WidthRequest and HeightRequest by decreasing or increasing the values.

The BackgroundColor attribute is used to change the background color of the button text. The values ​​in the BorderColor attribute can specify the color of the perimeter around the button.

The BorderWidth attribute specifies the width of the button border, the higher the value of this attribute, the thicker the border, and the smaller the value of this attribute, the narrower the border.

- Press the Start button or Ctrl + F5 key combination to see the result of the applied changes. In this case, you will notice that the appearance of the button has changed and has been adjusted according to the changes you have made.

DotNek بازدید : 52 سه شنبه 18 خرداد 1400 نظرات (0)

Security is an issue that is of a great importance and in order to establish security, it is necessary to observe many points, one of which is to prevent various viruses from entering our system, different users have been using antivirus for a long time, but the point about using it in the past was that they drastically slowed down computers, which caused users to have a bad user experience of using antivirus, nowadays, installing antivirus has become a basic principle for those who want to increase their information security , so that all users are trying to be able to choose the right antivirus and use it regularly.

What is the best free antivirus?

Some users think that in order to be able to install good antivirus and use it to increase the security of their system , they have to pay a heavy price, but this is not always the case, due to the fact that there are many free antivirus software programs available these days to different users and can be used easily, after being told that there are free ones, you may think that they are less capable than paid ones and cannot protect your system and information against viruses , but it is not completely true, on the other hand, it should be noted that paid software may detect viruses a bit more quickly and accurately.

However, if you are just started and do not own enough budget in order to pay for antivirus software , we have to tell you that there is no need to be worried because free antivirus software can meet your needs to a great extent, paid antivirus has a lot of volume and offers many features that users may never use, so they only take up space, as a result, if you just want to use antivirus to scan for viruses, free options can be very convenient for you.

What is antivirus?

Simply put, antivirus is a software that prevents viruses and malicious agents from entering the computer and can greatly help users to increase the security of their system .

What is the best free antivirus?

A good antivirus software should have some features, the most basic one is to be able to scan for viruses and destroy them, and lots of other features.

Now we are going to mention some of the free antivirus software programs available.

1- Avira Free Antivirus:

One of the best antivirus software programs available for free which is Panda Free Antivirus also has many features that can be a good choice for you, in 2018, it was recognized as the best free antivirus which still has many consumers, this antivirus is generally divided into 3 different packages, which include basic, advanced and complete protection, through basic protection, you can protect your system against various threats , advanced protection allows you to download and share many files on different devices, and finally, through complete protection package, it is possible for you to shop online in complete security, it should be noted that by installing this antivirus, you can greatly protect yourself against malicious links.

4- Kaspersky Internet Security:

Kaspersky has the ability to greatly protect your system from all kinds of threats, and this antivirus can block the entry of various hackers and does not let them to infiltrate your information, this antivirus can also be a good option for you while shopping online and gives you the assurance that if you encounter a suspicious case, they will give you the necessary reports, so that you can take action in order to protect your information from hacking attacks .

5- Bitdefender Antivirus:

This antivirus provides you with every feature you need in order to increase the security of your system , easy and fast installation are the most important features that make this antivirus one of the best ones available, which makes it possible for all users, even novice ones, to use this antivirus easily, simply put, by installing this antivirus, you can use the features that a paid one provides for you, while, you do not need to pay anything for using it, and you take advantages of it as much as possible, this antivirus is one of the most powerful ones in scanning threats which is able to do this process with extremely high speed and maximize the security of your system.

 It should be noted that in this antivirus, everything is done automatically, and you cannot do scanning or other tasks by yourself, one of the biggest threats to various users is phishing, in which hackers get into your system via malicious email and compromise your important and sensitive information, this antivirus can withstand such threats and has control over phishing attacks, if you are an inexperienced user who has just started working with a computer, this antivirus with its easy-to-use feature can help you a lot if you want to provide security for your system and prevent your personal information from being accessible to hackers.

6- AVG AntiVirus Free:

This antivirus is a great one which can report all kinds of threats to you and there is almost no threat which is not being reported by this antivirus, it is also extremely easy to work with this type of antivirus and all people, even beginners can use easily in order to increase their information safety , it should be noted that if you want to do a deep virus scan, this antivirus needs a great deal of time which can be frustrating for some users, but despite the great amount of time it needs, we suggest that you do this every once in a while in order to make sure that your system is safe.

                                                                                                

What is antivirus?

Last word:

In this article, we have tried to introduce you to the best free antivirus software programs available, so that you can make the most of the facilities which are provided to you without the necessity of having a great budget, of course, in addition to the mentioned antivirus software programs, there are other ones that can help different users in order to be able to increase the security of their system and resist attacks such as phishing and maintain the security of your data, etc., as a result, if you have not installed an antivirus yet, you should try your best to find a suitable one as soon as possible in order to increase the security of your system through it, and you should also try to keep in mind that updating the installed antivirus is a necessity, so you should try to update it regularly in order to let it do its tasks well due to the fact if the previous version had some problems, it will be definitely solved in the latest version, so if you want to own a perfect antivirus, you have to pay attention to the process of updating as much as possible.

DotNek بازدید : 51 سه شنبه 18 خرداد 1400 نظرات (0)

Top 11 Adventure games

adventure game is this game, which has an action and shooting style in the category of Android games, but it is also adventurous. This game has a science-fiction genre and is very rich and spectacular in terms of graphics and environment. In this game, while you are browsing, you have to solve various puzzles to get points.

4. To the moon

This game has a very interesting and exciting story and the storyline in this story is very important and vital. The game was first released for Android and 

7. Out there

Another game is this game that will have a great experience for players. In this game, you have to play the role of an astronaut who has come to his senses on an alien planet and intends to try to survive. In this game, you have to try to travel to different planets and establish friendly relations with the creatures that live on these planets, and convince them to help you. In this game, you have to repair your spaceship and try to get closer to your planet Earth. This game is a very 

Top 11 Adventure games

11. Frostrune

Another exciting game that falls into the category of adventure games is Frostrune. This game has a mythical and historical theme and is very exciting and different. If you are interested in the gods of Rome and Greece, this game can be a suitable option for you. This game is completely mysterious and is based on strange and challenging puzzles that you must solve to complete the steps of this game.

DotNek بازدید : 66 سه شنبه 18 خرداد 1400 نظرات (0)

In order for the operating system to support these fonts and show exactly what is in the application , it is necessary to apply special settings to support the fonts in the application. In this tutorial, we will teach you how to apply settings to the operating system to support application fonts. If you want to know about them, follow this tutorial.

Different types of font resources in Xamarin and how to use them

The ways to use fonts in operating systems and applications are as follows:

1- One way to use fonts and display them is to package all fonts as the source of Android 2- and put them in the application and operating system. In this case, it is clear that all fonts are always present in the Android operating system, and when needed, you can refer to its source. Packing fonts and placing them on the Android source allows us to access the fonts at all times.

3- The second way to use fonts is to download fonts. In this case, the Android operating system also supports the download of fonts, so that if necessary, we download the relevant font and save it inside the Android operating system. Fonts are downloaded by the font provider and the font provider checks to see if the corresponding font is present within the operating system. If there is no relevant font, the font provider will download it and save it inside the Android operating system.

It should be noted that all fonts that are similar or similar and have the same style are classified in one group. Fonts that have the same style and are similar to each other are grouped into groups such as font families. Users must consider unique specifications in order to use these similar fonts. In this way, they can choose their unique names or specify their characteristics. Android Support Library v26 uses API level 26 to support and use fonts. If we consider APIs whose level is less than 26, then we have to specify android: namespace and app: namespace for them. If we do not specify android: namespace and app : namespace for them and consider only android: namespace, they may not be displayed on lower than 26 operating systems. So in order for all fonts to be displayed with an API level less than 26, both android: namespace and app: namespace must be specified, otherwise if not specified, both fonts will not be displayed. APIs with a level below 26 do not support fonts and must be set to android: namespace and app: namespace in order to be displayed.

The code snippets below are used to display the font family in API level 14 and above.

<? xml version = "1.0" encoding = "utf-8"? >
<font-family
xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: app = "http://schemas.android.com/apk/res-auto">
<font android: font = "@ font / sourcesanspro_regular"
android: fontStyle = "normal"
android: fontWeight = "400"
app: font = "@ font / sourcesanspro_regular"
app: fontStyle = "normal"
app: fontWeight = "400" />
</ font-family>

To display different types of fonts in TextView, you need to make the appropriate settings. For example, the following code snippet describes how to display different types of fonts in TextView.

< TextView
android: text = "The quick brown fox jumped over the lazy dog."
android: fontFamily = "@ font / caveat_bold"
app: fontFamily = "@ font / caveat_bold"
android: textAppearance = "? android: attr / textAppearanceLarge"
android: layout_width = "match_parent"
android: layout_height = "wrap_content" />

Source of Font Package in Android

If the fonts are in the form of Packages, it means that the fonts are guaranteed to be inside the operating system and can always be used. Font files in TTF or TOF format like other programs are added to Xamarin. Android and stored in the operating system. The font files are located in the Resources folder of the Xamarin.Android project.

Note:

Fonts must have Built Action from AndroidResource.

Fonts in a family and group

Fonts that have the same style and are similar to each other are placed in a group called Font Families. The font family is saved with the font elements in the XML file. The XML file is also stored in the Resources / font path.

Each font family must have its own XML file to be saved with its fonts and elements. If you want to create a font family, you must add all the fonts to the Resources / font folder. Then create an XML file inside the created font folder.

The XML file creates a font family below and stores them in the Resources / font folder named sourcesanspro.xml.

<? xml version = "1.0" encoding = "utf-8"? >
<font-family xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: app = "http://schemas.android.com/apk/res-auto">
<font android: font = "@ font / sourcesanspro_regular"
android: fontStyle = "normal"
android: fontWeight = "400"
app: font = "@ font / sourcesanspro_"
app: fontStyle = "normal"
app: fontWeight = "400" />
<font android: font = "@ font / sourcesanspro_bold"
android: fontStyle = "normal"
android: fontWeight = "800"
app: font = "@ font / sourcesanspro_bold"
app: fontStyle = "normal"
app: fontWeight = "800" />
<font android: font = "@ font / sourcesanspro_italic"
android: fontStyle = "italic"
android: fontWeight = "400"
app: font = "@ font / sourcesanspro_italic"
app: fontStyle = "italic"
app: fontWeight = "400" />
</ font-family>

Three different values ​​can be given for the fontStyle attribute:

- normal

- Italic

- bold

The fontWeight feature is used to specify the font thickness and can take different values:

- Thin - 100

- Extra Light - 200

- Light - 300

- Normal - 400

- Medium - 500

- Semi Bold - 600

- Bold - 700

- Extra Bold - 800

- Black - 900

The code snippet below defines a family of fonts with Italic text style features and a thickness of 400:

<TextView
android: text = "Sans Source Pro semi-bold italic, 600 weight, italic"
android: layout_width = "match_parent"
android: layout_height = "wrap_content"
android: fontFamily = "@ font / sourcesanspro"
android: textAppearance = "? android: attr / textAppearanceLarge"
android: gravity = "center_horizontal"
android: fontWeight = "600"
android: textStyle = "italic"
/>

Provide custom font settings with programming

The code below shows how programming can be used to display fonts inside TextView:

Android.Graphics. Typeface = this. Resources.GetFont (Resource.Font. caveat_regular);
textView1.Typeface = typeface;
textView1.Text = "Changed the font";

If you use the GetFont method, it automatically selects the first font in the font family inside the folder, but if you want to choose a font with special features, you can use the Typeface.Create method. This method provides you with the fonts you want.

Selects the code below the font whose Typeface is bold for display in TextView.

var typeface = Typeface.Create ("<FONT FAMILY NAME>", Android.Graphics. TypefaceStyle.Bold);
textView1.Typeface = typeface;

Download fonts

Instead of using packaged fonts and storing them inside the operating system, you can download the fonts and temporarily save the audio inside the operating system or application . In this case, you also reduce the size of the APK. If you use packaged fonts, the size of the APK will increase, but if you download the fonts from various sources and temporarily store them in applications and operating systems, their size will decrease.

Fonts are downloaded from various sources by the font provider. Android operating system with version 8.0 has a font provider for downloading fonts from various sources that download fonts from this version from Google Font Repository.

How the font provider works is that after requesting a program or application for a font with special features and specifications, the font provider checks whether there are fonts with the same features and specifications in the system. If there is no font with the same features and specifications, the font provider tries to download the font from different sources and submit it to the program and application. After downloading the font from a source, in addition to the program and application request Other programs and applications can also use the downloaded font, although it should be noted that applications do not request the font directly from the font provider, but applications and applications will use the FontsContract API.

How to support Android operating system with version 8.0 of downloading fonts from various sources:

1- Announcing downloadable fonts for the Android operating system as a source: In this case, the program announces the downloadable fonts as XML resource files. Android saves these fonts on the system after downloading and integrating them.

Programming:

A FontRequest is considered for each font and FontRequest is sent to the FontsContract class. FontsContract actually takes FontRequest and then receives the desired font from the font provider.

2- resources files must be added to the Xamarin.Android project and application before the fonts are downloaded. First, the fonts are placed inside the XML file in the Resources / font folder.

The code below shows how to download the fonts in full:

<? xml version = "1.0" encoding = "utf-8"? >
<font-family xmlns: android = "http://schemas.android.com/apk/res/android"
xmlns: app = "http://schemas.android.com/apk/res-auto"
android: fontProviderAuthority = "com.google.android.gms. fonts"
android: fontProviderPackage = "com.google.android.gms"
android: fontProviderQuery = "VT323"
android: fontProviderCerts = "@ array / com_google_android_gms_fonts_certs"
app: fontProviderAuthority = "com.google.android.gms. fonts"
app: fontProviderPackage = "com.google.android.gms"
app: fontProviderQuery = "VT323"
app: fontProviderCerts = "@ array / com_google_android_gms_fonts_certs"
>
</ font-family>

The information that Android needs to receive and download fonts is as follows:

fontProviderAuthority:

Allows the Font Provider to check and use the request.

fontQuery:

is actually a string that helps the font provider to find the desired font.

fontProviderCerts:

is a resource presentation.

Font Certificates

If the font provider is not already installed on the device, the Android operating system will need some font provider security certificates. These certificates are stored inside the resource array file in the Resources / values ​​directory and path.

For example, the code below is an XML file that stores Google font provider certificates.

<? xml version = "1.0" encoding = "utf-8"? >
<resources>
<array name = "com_google_android_gms_fonts_certs">
<item> @ array / com_google_android_gms_fonts_certs_dev </ item>
<item> @ array / com_google_android_gms_fonts_certs_prod </ item>
</ array>
<string-array name = "com_google_android_gms_fonts_certs_dev">
<item>

</ item>
</ string-array>
<string-array name = "com_google_android_gms_fonts_certs_prod">
<item>
</ item>
</ string-array>
</ resources>
Despite these source files, fonts can be downloaded and used.
Declare downloadable fonts as the source of the fonts
If we list the downloadable fonts inside the AndroidManifest.XML file, Android will start downloading them asynchronously.
<? xml version = "1.0" encoding = "utf-8"? >
<resources>
<array name = "downloadable_fonts" translatable = "false">
<item> @ font / vt323 </ item>
</ array>
</ resources>

After these codes, the following code must be added to them:

<meta-data android: name = "downloadable_fonts" android: resource= "@ array / downloadable_fonts" />

Download fonts using the Font API for use in applications installed on the Android operating system

If you use the FontContractCompat.RequestFont method to download fonts, this method will first check if the requested font is present within the system itself. If the desired font is not inside the system, the font provider will start searching for that font from various sources and finally download it and use it inside the application and system. FontRequest is the same request that is sent to the font provider and requests the download of the font with the desired specifications.

If the desired font does not exist inside the system and the font provider cannot download it, then the default font of the Android operating system will be used.

Different types of font resources in Xamarin

FontRequest has four sections:

Font Provider Authority: This part of FontRequest allows the Font Provider to use the request and the Font Provider downloads the desired font and places it in the system according to the request.

Package:

Font Provider is used to authenticate and actually allows it to use the request.

fontQuery:

This section is a string that contains details and information about fonts.

fontProviderCerts:

This section is also a resource presentation.

The following code describes FontRequest simulation:

FontRequest request = new FontRequest ("com.google.android.gms. fonts", "com.google.android.gms", <FontToDownload>, Resource.Array.com_google_android_gms_fonts_certs);

The code below also indirectly downloads the font from the Google Fonts Open Source collection.

public class FontDownloadHelper: FontsContractCompat.FontRequestCallback
{
// A very simple font query; replace as necessary
public static readonly String FontToDownload = "Courgette";

Android.OS. Handler = null;

public event EventHandler <FontDownloadEventArg> FontDownloaded = delegate
{
// just an empty delegate to avoid null reference exceptions.
};


public void DownloadFonts (Context context)
{
FontRequest request = new FontRequest ("com.google.android.gms. fonts", "com.google.android.gms", FontToDownload, Resource.Array.com_google_android_gms_fonts_certs);
FontsContractCompat.RequestFont (context, request, this, GetHandlerThreadHandler ());
}

public override void OnTypefaceRequestFailed (int reason)
{
base. OnTypefaceRequestFailed (reason);
FontDownloaded (this, new FontDownloadEventArg (null));
}

public override void OnTypefaceRetrieved (Android.Graphics. Typeface typeface)
{
base. OnTypefaceRetrieved (typeface);
FontDownloaded (this, new FontDownloadEventArg (typeface));
}

Handler GetHandlerThreadHandler ()
{
if (Handler == null)
{
HandlerThread = new HandlerThread ("fonts");
handlerThread.Start ();
Handler = new Handler (handlerThread.Looper);
}
return Handler;
}
}


/// <summary>
/// EventArg when a font has been downloaded.
/// </ summary>
public class FontDownloadEventArg: EventArgs
{
public FontDownloadEventArg (Android.Graphics. Typeface typeface)
{
Typeface = typeface;
}
public Android.Graphics. Typeface {get; private set;}
public bool RequestFailed
{
get
{
return Typeface! = null;
}
}
}
The code below also creates a FontDownloadHelper that will guide and assist you in the font download process.
var fontHelper = new FontDownloadHelper ();

fontHelper.FontDownloaded + = (object sender, FontDownloadEventArg e) =>
{
// React to the request
};
fontHelper.DownloadFonts (this); // this is an Android Context instance.

In this tutorial, you will get acquainted with the APIs used in version 8.0 of Android. How to place fonts inside the APK and use and display them in the layout in this tutorial, was taught. You can apply special settings using the codes included in this tutorial and you can use different fonts by using two methods of programming and downloading fonts.

DotNek بازدید : 49 سه شنبه 18 خرداد 1400 نظرات (0)

Top 15 sports games on Google play and Apple app store?

1. Golf King - World Tour 

One of the Top 15 sports games is this game. One of the attractions of this game compared to similar cases, which has made it one of the best sports games of 2020, is the multiplicity of golf courses. They are elegant, beautiful, and designed with a lot of details and make you enjoy watching the scenery around the characters in the game. Of course, regardless of the type of land, the goal is the same; You must throw the ball into the target hole. You can change the shape and image of the character to your liking and wear the clothes you want.

2. Champion of The Fields 

This game's graphic is unparalleled, and its detailed and accurate gameplay allows you to implement your strategies on the ground without mistakes. You will also see some familiar names in the game, but do not expect FIFA quality. In Champion of The Fields, the skill of the players is so important. Yes, good players will be your savior in moments and a strong team will increase your chances of winning, but if you are not smart enough and do not have enough skills, it will be nothing but a failure of your income, so practice.

3. Table Football, Soccer 3D 

If you are interested in table Football, then be happy that from now on, another of the best Android football games will always be in your pocket. Table football is a three-dimensional football. The game's graphics are high and you can enjoy scoring goals in this game anywhere and in any situation.

4. Grand Mountain Adventure 

Grand Mountain Adventure has great gameplay and character control is very comfortable and attractive. Challenge lovers enter professional competitions and force themselves to collect more points by crossing flags. Other users will remove the restrictions and enjoy mountain skiing.

5. Score! Hero 

This game leaves out the boring parts of football and focuses on the moments that matter most: the goal position. There are more than 700 different challenges in the game and you will be in different situations and you will have to do many impossible things. What makes this game attractive is that the goals are the result of your accuracy and skills, and when you score a goal, you will feel deep satisfaction.

6. F1 Mobile Racing 

iOS and Android that shows Spanish football. This game is arcade-style and very fun. Two players (or one player against AI) face each other in one-on-one matches. This game is a bit like ping pong but in a more attractive model!

8. Hockey All-Stars

Compared to rugby and basketball, Hockey All-Stars does not have a professional and major hockey league in the United States, and for this reason, the official game has not been developed for it.  Considering all Android and IOS mobile games for hockey, Hockey All-Stars is the best option.

9. Soccer Stars 

Soccer Stars is an online football game that has attracted a lot of fans and almost everyone interested in mobile games has tried this game once; For this reason, it is considered one of the best football games for Android and iOS. You can play this online game with your friends or family and enjoy it. Soccer Star is one of the most popular online multiplayer games, has an attractive and acceptable graphical environment, and has very simple rules and methods of play.

10. Madden NFL Mobile Football 

The rugby league, or so-called American football, ended before the recent pandemic started, but that does not mean that the fans of this sport do not miss their favorite team! On the PlayStation and Xbox consoles, the Madden NFL is one of the best options for a home rugby experience. Fortunately, the mobile version has been developed for both Android and iOS platforms and is one of the best sports games of 2020.

11. eFootball PES 2021 

eFootball PES 2021 is one of the biggest competitors of FIFA among the best football games for Android and IOS. Some also believe that this game is better than FIFA. The e Football PES 2021 game has great graphics, a unique control mechanism, team building system, an online multiplayer section, a Local multiplayer section, and other features.

12. NBA Live Mobile Basketball 

The number of NBA Professional Basketball League fans is no less than the NFL (Rugby).  NBA Live Mobile Basketball is a product of Electronic Arts Studio and is one of the best options for basketball experience on Android or iPhone phones.

13. Extreme Football 

If you are tired of famous stadiums and superstar footballers, the game of Extreme Football will take you to neighborhood matches and dirt fields. In Extreme Football, you lead only one player and compete in two-on-two or three-on-three matches.

14. Soccer Star 2020 Top Leagues 

You can play a young player and work with him to succeed. The proper performance and satisfaction of the coach will be your main priority.  Start your football career with a small local team and progress to higher leagues.

Top sports games on Google play and Apple app store?

15. Ultimate Soccer - Football 

There are not many games that can be equated with Ultimate Soccer.  This game has very attractive and impressive 3D graphics with very smooth gameplay.

About our Game development services

DotNek بازدید : 49 سه شنبه 18 خرداد 1400 نظرات (0)

What is the best gaming phone of 2020 and what are its technical specifications?

Gaming mobiles are one of the most popular gaming tools today that have attracted a lot of people's attention. These phones have compatible features that make them very suitable for gaming . Many different brands around the world produce these mobile phones and have been able to attract a lot of people. These phones, like any other structure, have different qualities. In this article, we want to name some examples of the best gaming mobile phones that were produced in the year 2020. If you are also curious to know these phones and want to get interesting information about hardware and how they work, follow us to the end of this article. We try to provide you with more information about this mobile phone so that you can buy these mobile phones with a more open mind and enjoy playing with them as much as you can.

Razer Phone 2

The first best gaming phone of 2020 is this one. In appearance, the Razer Phone 2 is quite similar to its predecessor (which in turn was very similar to the Nextbit Robin smartphone). Measuring 8.5 x 78.99 x 158.5 mm, it is slightly wider and thicker than the previous model, but the difference is so small that it is practically impossible to distinguish between the two. The relatively large bezels, powerful speakers at the top and bottom of the display, and the power button on the edge of the phone (with a fingerprint sensor built into it) are all reminiscent of the previous Razer products. The selected color can be displayed on the logo in three different modes: Respiratory mode (which raises and lowers the brightness), Static mode (which keeps the amount of light constant at a certain degree of brightness), and Spectrum cycle mode (Which displays all colors alternately on the logo). Of course, you may not like this lighting due to battery consumption. In this case, the Chroma app allows you to turn off the lighting completely or select only the low-power mode. In this case, the logo will only be lit when the screen is on. It should be noted that this idea of ​​Razer is unique and has never been seen before in the world of smartphones.  Not to mention that despite some display advantages over other competitors, the Razer Phone 2 still uses LCD panels (with Sharp IGZO technology) instead of LED displays. You may decide to use an LCD for a higher refresh rate, but on the other hand, LCD panels often make the phone a little thicker and usually cannot display the colors with the quality seen in LED displays. Razer used the Snapdragon 845 8-core chip (with a maximum clock speed of 2.8 GHz and Adreno 630 GPU) to prove that the Razer Phone 2 is no less than the famous flagships.

One Plus 8 and One Plus 8 Pro

The One Plus 8 and 8 One Plus 8 Pro both have the same features like a Snapdragon 865 processor, Adreno 650 GPU, 128GB and 256GB of internal storage, 8GB and 12GB of RAM. Both phones have almost the same hardware and are not so different and only have differences in their screen, camera, and battery. The OnePlus 8 has a 6.55-inch display and the OnePlus 8 Pro has a 6.78-inch display.  Both screens are AMOLED , with the difference that the OnePlus 8 has a refresh rate of 90 Hz and the OnePlus 8 Pro has120 Hz. OnePlus' latest flagships have powerful batteries with very high charging speeds. The company for the OnePlus 8 uses a battery with a capacity of 4300 MAH with a charging speed of 30 watts, which can increase its charge from 0 to 50% in 22 minutes. But the OnePlus 8 Pro has a 4510 MAH battery and can be charged with a 30-watt fast charge, which is suitable for a gaming phone.

what are its technical specifications?

XIAOMI BLACK SHARK 3

At the heart of the Black Shark are three Snapdragon 865 chips that support 5G technology. Thanks to the liquid cooling system of the fourth generation of this processor, gamers will be able to spend hours playing their favorite gaming experience without considering the warm-up of the phone. It is interesting to know that the manufacturer of these two smartphones has confirmed that it takes only 12 minutes to charge the battery to 50% and 38 minutes to fully charge it. In this series, we also see these cases, for example, we can mention 4 points sensitive to the amount of pressure on the screen. In the Pro model, we also see two additional buttons that are designed on the left edges of the phone.  These buttons are physically unlike the capacitive buttons on the Asus ROG. But as a disadvantage, we can mention the 90 Hz screen of this phone, of course, it should be noted that the 90 Hz screen is not such a weakness, but for professional gamers , this issue is very important. Other notable features of the Xiaomi Black Shark 3 include a dual rear camera with 64-, 13- and 5-megapixel lenses, a 20-megapixel selfie camera, a 3.5mm headphone jack, and a USB-C charging port for UFS 3.0 memory. Xiaomi Black Shark 3 is one of the greatest gaming phones in the world and due to its powerful specifications, it is easily included in the list of the best gaming phones of 2020.

Click here

DotNek بازدید : 44 سه شنبه 18 خرداد 1400 نظرات (0)

Hackers are people who have a lot of intelligence in various fields, especially the computer world, and you have definitely heard the names of some of the biggest hackers in the world in the news, so it’s not hard to guess that how dangerous hackers can be, in general, hackers are in different categories, and each has its own characteristics, among them, black hat hackers are people who infiltrate your system with malicious intent and may manipulate or delete information in your system, or they may steal your information and ask you to pay a lot of money in order to return your information, large government agencies are always concerned about black hat hackers attacking their systems and stealing their information, which is why everyone, even beginners, need to know more about these people, if you try to know their characteristics, you can deal with them properly in the case of danger, and increase the security of your personal and important information.

Who are black hat hackers?

Who are black hat hackers?

Black hat hackers are people who use their talents and knowledge to achieve their own immoral goals, they enter the system through security holes and do destructive things to it, these people are exactly the opposite of white hat hackers, they may use viruses to infiltrate people's systems, then enter the virus into the system and achieve all their goals by importing the virus, if the security of your system is not high enough and your system has security holes, they will get help from all these cases and enter your system, so that they can access your important information, such as credit card number, important documents, etc., and ultimately harm your system, by having this important information.

In contrast to black hat hackers, as mentioned earlier, there are white hat hackers whose whole effort is to help various organizations and systems to make the efforts of black hat hackers ineffective and fail to achieve their goal, black hat hackers may hack different people just in order to get excitement in their life, or they may be looking for specific information in different people's systems, and other goals that all ultimately lead to a danger for the security of a system and the information contained in it.

Hacking is a money-making business:

The number of hackers is increasing day by day, and one of main the reasons that can be mentioned is that, it is considered as one of the ways that people can earn a lot of money through it, and they know the fact that, if they want to earn more money, they have to increase their knowledge in this field, each hacker uses different methods to achieve their desires, for example, some of them try to create malicious software that users will encounter an infected system after using this software , and may even lose all the information in their system quickly, or they may create malicious links that people lose their information with just one click, and other various methods that black hat hackers use with great skill in order to achieve their goals.

It should be noted that a number of hackers try to contact people whom they intend to infiltrate their system and persuade giving remote access to their system, and finally implement all their desired acts and achieve their goals quickly, after a few days, the user may find out the things that happened to his/her system and try to restore the security of the system.

Black hat hackers are very difficult to find:

Black hat hackers, as we mentioned before, are very smart people who leave no trace of themselves, so if your system is hacked by such hackers, it is almost impossible to find them, for example, in one of the hacker attacks, after many attempts in order to find them, only 4 of the hackers was found in Britain and the main ones which were located in India could not be found, despite all the difficulties in finding black hat hackers, it has been seen that some of them have been found by the authorities and punished for their illegal actions.

 In general, you should keep in mind that it is very difficult to find people who have hacked your site and system , and it is better to do all the necessary security things properly to protect your site from being hacked by such people, because if your system security is perfect enough, you are safe, and they cannot easily penetrate your site as well as accessing your information, in order to do this, you can use the tips that are being used to increase the security of the site , and eliminate all security holes in your system.

What are the characteristics of black hat hackers?

- curiosity:

All hackers, including black hat hackers, are very curious, and they are constantly asking different questions to themselves and others around in order to gain information, and they always try to get their questions answered as quickly as possible, after getting the answer to their question, another one will arise in their minds, so they always have some questions in their minds in order to get whatever they want.

- They move in the opposite direction of other people:

Black hat hackers have a strong tendency to try things that other people might not have, and it may not make sense for ordinary people to do such things, black hat hackers try all the available ways and proceed unlike other people in order to achieve important results and make more possibilities available to them, for example, if they provide a tool, they never go to the manual because they prefer to learn how to work with it by themselves, so they try different ways in order to learn something.

- They are addicted to their computer:

Black hat hackers spend many hours a day working with their computers, and they are learning tips through which can be used to penetrate people's systems in order to get what they want, you can never keep black hat hackers away from their computer for a long time.

- They do their tasks in order:

Contrary to popular belief, black hat hackers are regular people who do all their work according to plan and on a regular basis, as we mentioned, they are constantly learning and put the points they learn separately in files, so that they can refer to them and use them if needed.

- They are introverted:

Black hat hackers are often introverted people who do not like to make friends with others, they don’t like crowded gatherings and prefer to be alone in most cases to be able to spend time with their computer.

- Highly focused:

Black hat hackers are very focused on the task that they are doing on their computer when it comes to achieving their goals.

- Want to be seen with their success:

Black hat hackers do their best to overtake other hackers and compromise the security of systems which not every hacker can access and steal their information in order to be seen with their success.

Some world’s famous black hat hackers:

- Adrian Lamo:

Adrian Lamo became known after hacking into the systems of the New York Times, Google, and Microsoft and Yahoo, this hacker used public places to hack.

- Jeanson Ancheta:

This person is one of the most famous black hat hackers in the world who has committed great hacks, among which we can mention the spread of a virus called rxbot, which was able to control up to 500,000 computers, which has caused this hacker well known among users and Other hackers .

- Kevin Poulsen:

He is one of the most famous black hat hackers who write for one of the most popular magazines today, in fact, he hacked the telephone lines of the Los Angeles radio program and won the prize of this program, which was a Porsche car.

What are the characteristics of black hat hackers?

Last word:

In general, hackers have a huge world, black hat hackers have their own unique personality, in this article, we have mentioned some of their personality traits, so that you can become more familiar with them and try your best to protect your system information from such people.

DotNek بازدید : 59 سه شنبه 18 خرداد 1400 نظرات (0)

In general, hackers are like ordinary people, and the only difference between them and other people are their computer intelligence, they may use this intelligence to implement legal actions, or they may prefer to use it to do some illegal actions like stealing information from other systems, which choosing each one depends on their personality, due to the increasing number of hackers who have destructive goals in mind and the ones who cause serious damage to various systems, the existence of white hat hackers has become necessary, these people use their science and knowledge to deal with other types of hackers.

In fact, in order to stop black hat hackers and the other types of it, you need to get help from people who are familiar with their techniques, personality, and methods of work, certainly, no one has more control over all of these issues than a white hat hacker, in the rest of this article, we are going to explain white hat hackers more.

What does a white hat hacker do?

What is a white hat hacker?

white hat hackers , in this section we will go into more detail about their responsibilities, white hat hackers put themselves in the place of black hat hackers and look at the entire security system from their point of view, and finally come to the conclusion on how they can infiltrate the system and report all their actions to the organization in order to fix them if there is a security hole.

As you know, hackers use social engineering methods to crack down on security systems, finally, white hat hackers gather all the important information through social engineering, so that they can access information that is effective in enhancing system security, another thing that white hat hackers do is sniffing, through which they can find all the gaps in the network.

Why do all systems need white hat hackers today?

Today, there are many reports of cybercrime, which is due to the fact that, nowadays, users keep almost all their information on mobile devices or laptops, etc., and also most transactions are being done through mobile phones, all of these factors cause people who have a lot of intelligence and want to make a lot of money at the same time, to try hacking others’ systems.

In fact, more users are trusting the Internet, and this trust causes hackers to access more resources to hack, when the number of Internet users increases, the number of cybercrime reports increases as well, which indicates that there is the necessity of white hat hackers existence among users and organizations, a white hat hacker in more detail.

How to become a white hat hacker?

To get started, you need to have a bachelor's or master's degree in a related field such as computer programming, computer science, information security or information technology, or have had some training in this field before, so that you can study improve your science by studying, in addition to the degree, work experience is also very valuable for employers, and only if you have work experience in a reputable organization for several years, it is likely that you will be selected as a white hat hacker for a great company, thus by increasing your computer knowledge, there is an opportunity for you to work in a reputable company.

Once you have completed these two steps, it is time to take the white hat hacker training course and get certified, so that you can finally present your certificate to your employer, so they will trust and give you responsibility, you should keep in mind that you need to update your knowledge on a regular basis, so that you do not lag behind your competitors in this field, to update your knowledge, you can also use the training videos available on the Internet, and you can also get help from training workshops about security and computers, another thing that white hat hackers need to specialize in, is the skill in Linux, which is very important for hackers, and they must have complete expertise in order to be able to do their job properly and ensure system security . You may be interested to get acquainted with some of the most famous white hat hackers and know a little about them, so we are going to mention some of them below.

Some top white hat hackers in the world:

- Stephan Wozniak:

Steve Waznik is an American computer engineer, inventor, and scientist who was initially fired for hacking into the university system in which he studied, and is now known around the world as one of the white hat hackers.

- Linus Torvalds:

Linus Torvalds is one of the most famous white hat hackers in the world, which was initially known for the beginning and development of the Linux kernel as well as the Gate software, and eventually became more famous by continuing activities in this field.

- Tsutomu Shimomura:

Tsutomu Shimomura is currently the CEO and technology director of Neofocal Systems and has a wealth of computer knowledge, all of which has made him one of the most famous white hat hackers in the world.

- Joanna Rutkowska:

Joanna Rutkowska is one of the most successful women in the computer world who has been able to do a lot of research in the field of security systems.

What is a white hat hacker?

Last word:

In general, the world of hacking is a huge world, and it is very attractive for everyone, even people who have no knowledge about computers, to follow all the news of hacking, so if you are interested in hacking, and you are also talented in this regard, you should try your best to become a white hat hacker as soon as possible.

DotNek بازدید : 11 سه شنبه 18 خرداد 1400 نظرات (0)

Casinos have been one of the most popular and entertaining industries for the last hundred years. The casino has a very happy and exciting environment where many people can earn millions.  Many people from all over the world are interested in gathering in casinos and winning with a spirit of risk-taking and a little bit of luck, and earning millions. This issue and the popularity and pervasiveness of casino games have led game developers to consider transferring their casino environment to mobile applications so that more people around the world can access these services. We are going to introduce some of this kind of games to you. If you are also curious to know these games and get a lot of information about them, follow us to the end of the article. In general, Google Play will not allow you to gamble and bet, and the games in this application are for entertainment only, and you cannot gamble inside the game. Here are some of the most popular games

Top 7 Casino games for Android and IOS.

1. Twenty-five in one casino

This game is a very popular game in which you can play various types of games in casino such as video poker, roulette, and other popular games that are among the casino type of games. You can bet on sports games in this program. This is a great option for you and allows you to play with people you are interested in. In this game, different advertisements are displayed that can be a little annoying, but other than these cases, this game is very popular and suitable.

2. Big Fish Games

Another popular casino game is this game developed by Google .  This game has different types of games and is very diverse. The strategy in this game is completely offensive and this game requires you to buy tokens frequently.  These tokens will help you to play a more exciting game. This game has disadvantages and has different drawbacks, but in general, it will transfer a proportionate experience to you. Also, this game has tried a bit to reduce the casino mood in the game space, but anyway, this game is exciting.

3. Casino Frenzy

One of the casino type games is Casino Frenzy , which is a bit more common than other games. This game is a combination of slots as well as video poker, which brings a lot of excitement. This game, like many other games, has different types of different slots and video poker games. This game has many benefits and also has hourly rewards for you. This game is designed and produced to a large extent according to the rules of games of casino and will immerse you more in the casino space. This program can sometimes have various bugs, but if you are interested in these kinds of games, this game can be useful for you.

4. GNS Grand Casino

This game is a versatile game that includes almost all casino games.  In this game, you can experience a lot of excitement. This game contains very big victories and it is very easy to play in it.  In this game, daily prizes are provided for you and a lot of excitement will be transferred to you while playing. This game is designed for Android and you can download this game for free and enjoy playing in it.

5. Huuuge Games

Another casino game is this game. The creator of this game has tried to use a lot of creativity in its development . This game is more focused on slots. You can download other similar games along with this game and enjoy playing in it. This game will satisfy your fighting spirit and needs. This games on average and will help you to continue playing more easily and without any problems.

6. Zynga casino games

Another game that falls into the category of casino kind of games is this game that can be played on mobile phones. This game is available for free to everyone and will help you to enjoy playing without any problems.  This game is similar to poker and works the same way. In this game, you spin your luck machine to win or lose. This game will be very entertaining for you and can keep you entertained for a long time.

7. Lucky Win Casino

Another casino game is the game of chance. This game will give you a good experience and playing and downloading it is completely free. You have to refresh all your steps in this game every day to prevent them from disappearing. Also, in this game, you can send various gifts to the friends you want. This game is one of the great successes in the field of design and production of this kind of games and has been able to attract a lot of people.

Top 7 Casino games

Conclusion

In this article, we have tried to talk to you about different types of games which have taken from casino. These games are the same games that are physically played in the casino, which have been released to you this time by the creativity of the designers in the form of mobile applications . In a very small number of these games, you will be able to gamble because gambling causes huge financial losses and prevents money from circulating in society, which is why mobile app laws do not allow distributors to produce apps that there is gambling on these applications. We also suggest that you avoid gambling and gambling-related games as much as you can; Because gambling can waste many years of your try.

تعداد صفحات : 10

اطلاعات کاربری
  • فراموشی رمز عبور؟
  • آرشیو
    آمار سایت
  • کل مطالب : 383
  • کل نظرات : 0
  • افراد آنلاین : 3
  • تعداد اعضا : 0
  • آی پی امروز : 41
  • آی پی دیروز : 20
  • بازدید امروز : 49
  • باردید دیروز : 28
  • گوگل امروز : 0
  • گوگل دیروز : 0
  • بازدید هفته : 179
  • بازدید ماه : 619
  • بازدید سال : 7,904
  • بازدید کلی : 57,337