نوشته شده توسط : dotnek

In this case, you must consider all the conditions and standards of the countries so that you can design an application that is compatible with the standards and cultures of all countries. The only solution is to design the application in such a way that it changes the mode according to the place and place that is used and conforms to the conditions and standards there. In this tutorial, we will explain how to design an application and localize its resources.

Application Localization and String Resources

The application you are designing may be used in many countries in addition to your own country, in which case your languages ​​may be different and the original language you may have considered for your application may be used in other countries. Do not use. For this reason, it is better to consider the language of other countries and present them in your application so that people from other countries can use it as well. Even in choosing colors and designs, you have to consider the culture of all countries to match their culture. In order to design an application whose resources and appearance are compatible with other countries and places, we must design it in such a way that according to the place where it is used, without changing the sources of the code, Adjust the appropriate settings for that location. In this way, it identifies the place where it is used and according to the desired place, loads and uses the appropriate resources and settings of that place.For example, consider a program that is used in three different places, in which case the language used to display the texts is different.

The contents of the Main.axml file can be configured as follows:

<? xml version = "1.0" encoding = "utf-8"? >
<LinearLayout xmlns: android = "http://schemas.android.com/apk/res/android"
android: orientation = "vertical"
android: layout_width = "fill_parent"
android: layout_height = "fill_parent"
>
<Button
android: id = "@ + id / myButton"
android: layout_width = "fill_parent"
android: layout_height = "wrap content"
android: text = "@ string / hello"
/>
</ LinearLayout>

Android Assets

Assets are a method that can be used to add different types of resources such as images, text, videos, music and XML. Assets added to your application are like files that exist inside your system and can be read using AssetManager.In this part of the tutorial, we want to create an Assets text file and add it to our project, and then read it using AssetManager and display it in a TextView.

How to add an Assets to a project?

Assets are placed in a folder called Assets in the project. Create a text file inside this folder and select its name read_asset.txt. Then write a text inside the text file you created, such as: I am an asset. Visual Studio must set Build Action for this file to AndroidAsset, if set to BuildAction it ensures that the file is packaged in the APK at compile time. 

 

Read more on:https://www.dotnek.com/Blog/Apps/localize-resources-language-appearance-and-sc

link:https://dotnek.mystrikingly.com/

Related link:Search engine Optimization (SEO services)



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 57
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

when installing different types of applications so that the user can approve or reject them if necessary. These permissions are permissions for accessing different types of resources in the system and devices. In order for the application to work well, it must obtain approvals from the user to access the resources of the system and the device. Android 6 or higher or Marshmallows are different (runtime permissions android 6). To learn about the different types of access permissions in different versions of the Android operating system , it is recommended that you follow this tutorial article.

What is Runtime Permission?

Runtime Permission are actually permissions to access various resources on the device and system that applications need to ask the user during installation and the user to determine their access to system and device resources. Permissions for access to various resources of the system and device, such as: access to, contacts, etc. In other words, it can be said that applications need some resources in order to be able to work properly and perform all the desired operations. Have access to the device and operating system. This is why when installing applications, a list is displayed to the user that includes access to the device resources and the user must approve or reject it if necessary.In versions of Android less than 6 or Android before Marshmallow, when installing applications, a list of device and system resources was displayed to users and the user was asked to approve or reject them to complete the installation or non-installation process. To take. The list that was displayed to the user for approval or rejection contained all the resources in one place and the user had to approve or reject them at the same time, which would be a problem:1- The first case is that the user had two options to choose from. Either had to approve all the resources displayed in the list for the user to install the application or reject them all. In this case, the application would not be installed. Consider, for example, that of all the resources displayed to the user, the user does not want to approve one of those resources and does not want the application to access that resource, in which case he had no choice or all of them should Approved and the application installation process was done or you had to reject all of them and ignore the application installation.2- The second problem that users faced in this case is that users do not read the list carefully because the list displayed is long and all the resources displayed in the list are long and may confirm it. And then get into trouble. For example, suppose a list of resources is displayed to the user to obtain a license, and the user approves it in a hurry without paying attention to it, and the application is installed, then it may be due to inaccuracy and paying attention to the resources and the list displayed by the user will face problems and the information and data of some of their sources will face problems.To solve such problems, when building and presenting a new version of the Android Marshmallow operating system , they set an option for it, Runtime Permission, which does not display long lists when installing applications to obtain permissions, so that the user can easily and accurately Review sources and approve or reject them if necessary. 

Read more on:https://www.dotnek.com/Blog/Apps/in-what-cases-and-for-what-can-runtime-permis

link:https://dotnek.mystrikingly.com/

Related link:check this out



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 58
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

As users tend to speed up their day-to-day tasks and make the most of their time, more and more people are turning to the Internet every day in order to solve problems, in fact, users can meet almost all of their needs through the internet, which requires entering their important information, such as their credit card number, phone number, address and so on, in this space.Privacy has existed since a long time ago, but these days, due to the high speed of technology, the protection of privacy has become increasingly difficult, because hackers and profiteers are waiting all the time to gain the opportunity of stealing people's information due to the fact that most of the users do all their work online, so it is necessary for users to take the necessary points in order to learn about how they can protect themselves and their information from invasion of privacy, which we are going to discuss in the following.

What is privacy?

In fact, privacy is a human right, and if it is properly respected and protected, people in society can do their tasks with no worries, the privacy gives users the right to share any of their favorite information with others whenever they wish.Everyone has personal information that they do not want to be exposed to others, so privacy is an important and sensitive issue which different people can protect it and prevent any profiteer from accessing their information without their permission.Given the points we have mentioned so far, internet privacy is an important issue today, which in fact means the protection of data that is transmitted over the internet.For example, imagine that you are shopping online , and you enter your bank card information as well as your password in the bank portal, what do you think will happen if this information is given to other people?Definitely, your privacy will be compromised, so you should not let anyone else access your private information, in order to protect your privacy, it is necessary to pay attention to some steps and points, some of which will be mentioned below.

Privacy tips:

- Do not answer all setting up password security questions in all honesty:

Usually, in order to create an account on different sites, you will be asked questions that you do not need to answer all of them correctly, because different people can access the answers you have given and use them to achieve their goals easily.These questions are usually asked in order to prevent someone else from having access to your account, so you need to save the answers which you have entered for yourselves.

- Use strong passwords for your devices:

As we mentioned earlier, today there is a lot of private information of people on mobile devices, tablets, etc., so if hackers can have access to the device by guessing its password, they can easily access all your information, as a result, they will invade your privacy.Therefore, you need to use passwords for your device that are complex and difficult for anyone to guess, for example, people may use their date of birth or something else which is easy to guess, which is a wrong choice due to the fact that such passwords can be easily guessed.There are many points while choosing a password, among which it can be mentioned that they must include at least 8 characters, and the characters need to be a combination of lowercase, uppercase letters and numbers, etc., which can create powerful passwords and no one is going to be able to guess them easily. 

Read more on:https://www.dotnek.com/Blog/Security/how-can-you-protect-yourself-from-privacy-inv

link:https://dotnek.mystrikingly.com/

Related link:DotNek Website Analysis



:: بازدید از این مطلب : 88
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Programming has a wide world in which lots of programming languages exist and each of which has their own fans, but there is a language that is more popular among programmers which is called “JavaScript programming language” it has more fans compared to the others and the number of them is increasing day by day, JavaScript has various features and provides the user with more facilities and the use of them allows the user to interact more with the content and causes the content to change from static to dynamic, which can be considered as the main reasons for this popularity, so that, user will gain positive user experience while using the website or program which is created with the help of this language, as a result, it is somehow the key to success due to the fact that when you can gain the users’ satisfaction, they will introduce your website or program to their friends, so that the number of your website’s visitors will increase day by day, which can help you improve ranking of your website on Google search engine results page .In this language, programmers may make mistakes while programming , which may occur both by old programmers and new ones, in this article we will mention a number of common mistakes that may occur by them.

The common mistakes that programmers may make when programming in the JavaScript web programming language:

- The "+" Symbol can have many uses, for example it may be used for Addition and Concatenation.While coding, it is possible to ignore whether a number is written as a string or not, which eventually leads to similarities, as a result, you cannot see the desired result.In fact, programmers may sometimes forget that the data which they have entered may be evaluated as a string, not a number, which can cause the data to join each other, as a result, no collective operations will be carried out.This mistake is very common, so that it is necessary to be careful in entering different data, so when needed, numbers are entered in strings, and otherwise they are entered numerically, now consider the following example for a better understanding. If you write out the code: var x = 10 + "7"; it goes up to "107,"As you can see, the numbers 7 and 10 are only joined together, and because 7 is written as a string, the two are not added together.- Confusing the assignment (=) and equality (==, ===) operators, each of these items need to be used in their proper place and have a different meaning, if you as a programmer, do not know where to use each of them, in the end you cannot do the right programming.When you want to compare two data, you need to use (==, ===) operators, the difference between the two is that three equals can make more accurate comparisons while two equals can perform a loose comparison in which only values are compared and the datatype is no longer checked and compared, now consider the following example in this regard for a better understanding. 

Read more on:https://www.dotnek.com/Blog/Web/the-common-mistakes-programmers-may-make-when

link:https://dotnek.mystrikingly.com/

Related link:check this out



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 73
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Xamarin can be installed on Windows and Mac operating systems, but the method and steps of installation on each operating system are different. This tutorial includes a step-by-step tutorial on installing Xamarin on different Windows and Mac operating systems.

Install Xamarin on Windows

1- Download Visual Studio 2019 from Visual Studio site and source.2- Perform the installation steps by double-clicking.3- Then select Mobile development with .NET for installation on the opened page and start the installation process again.4- Select Install and click to begin the installation process.5- It takes a while to complete the installation process. After completing the installation process, select and launch to run it.6- After installing Visual Studio, it is time to add Xamarin to Visual Studio.7- After you install Xamarin, you can restart it, in which case Xamarin will be added to Visual Studio.8- To make sure whether Xamarin has been added to Visual Studio or not, you can click on the Help menu and see if Xamarin is installed or not.9- Another way to make sure whether Xamarin has been added to Visual Studio or not, you can go to Help> About Microsoft Visual Studio and see Xamarin in the list of added programs.

Add Xamarin.Ios to Visual Studio

After installing Xamarin, we need to add Xamarin.Ios to Visual Studio as well.

Here are some things we need to do to build applications using Xamarin.Ios:

A system with Windows operating system on which visual studio 2019 is installed.A Mac operating system that also has access to Apple’s build tool and Xamarin.Ios and also connects to the Internet.Visual Studio 2019 accesses the system via the web and can use Apple’s build tool to compile.

Set up Xamarin.Ios in Visual Studio

1- To make Xamarin.Ios settings, you must install Visual Studio 2019 on your Windows system.2- Reinstall Xcode and Visual Studio on your Mac. 

Read more on:https://www.dotnek.com/Blog/Apps/how-to-install-xamarin-on-visual-studio-and-s

link:https://dotnek.mystrikingly.com/

Related link:DotNek Website Analysis



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 69
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Imagine that you are in a group of friends and the topic of hacking is being discussed, you will eventually see how attractive these topics are among them, and they may prefer to spend many hours talking about it, you know that hackers are people who are very talented in the field of computers and spend many hours throughout the day and night working with their system and are constantly learning new points about hacking methods, also due to the high income of hacking and related issues, the number of people who are attracted to this topic is increasing day by day, which adds to the worries of users who deal with computers and the Internet at the same time, and these people are trying to do their best to be able to increase the security of their system and information by taking various steps. Hackers may gain access to the information of different people by guessing passwords, using malicious codes, using malware, etc., one of the most common methods among hackers, is phishing which we will discuss in more detail below.

What is phishing?

In fact, phishing is a dangerous attack carried out by hackers, in which the hacker sends an email, phone or message from a reputable organization or a trusted person, with the aim of endangering user information, through this way, hackers can gain access to the information of different people and use it, for example, they may steal bank card number, passwords, etc., in order to achieve their desires.

How does phishing happen?

As we have mentioned earlier, hackers are becoming more and more specialized in their field of work, and by increasing their awareness and knowledge in this field, they are using smarter methods to attack systems, which may shock users, and finally gain access to important information in their system, phishing attacks occur when different users respond to an email from a hacker and fall into the trap of hackers, so they endanger all their information and system, these emails often have attractive subjects, which causes users to respond to them quickly and may contain an urgent request, for example you may be asked to update your password as soon as possible, a request for entering codes that are sent to you by one of the social networks, clicking on an infected link, etc., that all these requests are in order for hackers to infiltrate your account and information.These messages are designed in such a way that the users think they were sent from a reputable source, and if they are not aware of this danger immediately, they may provide a lot of information to profiteers or hackers, or they may give hackers the opportunity of installing one of their target malware on the user's system. 

Read more on:https://www.dotnek.com/Blog/Security/is-phishing-illegal

link:https://dotnek.mystrikingly.com/

Related link:dotnek tech blog



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 70
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Security is a very important issue and all users are trying to be able to take all needed steps in order to increase the security of their information and system as much as possible, which requires reading a lot of articles about security and if you want to increase your mastery in this regard, you can also read security-related articles on our site, once the necessary measures have been taken to increase the security of information, it is necessary to pay attention to the fact that if your system is attacked by techniques like phishing, you can quickly detect this issue and take the necessary measures to regain your security and deal with this attack.Hacker attacks can pose many risks to your system information and security, which is why you need to increase system security at first, and then do your best to raise your awareness in this field.

What is phishing?

In fact, phishing is a dangerous attack which takes place by hackers, in which the hacker sends an e-mail, make a phone call or send message from a reputable organization or a trusted person in order to endanger all user information, through this way, hackers will be able to access the information of users, then they will abuse that information, and the point which should be taken into consideration is that, users cannot realize that they have been attacked if they are not fully aware of the necessary points of this field, so hackers have the chance to continue attacking for a long time and users do not tend to take the needed steps in order to regain their security, as a result, it is important for users to be able to detect this attack quickly, because they can take the necessary steps in order to fix the problem.First you need to get acquainted with the signs of these attacks, some of which we are going to mention in the following.

Signs of phishing attacks:

- As you know, these attacks are usually carried out through a suspicious and attractive e-mail that the hacker uses the method of social engineering to force the user to click on the e-mail and any link which it contains, so one of the first signs of such attacks is that you receive suspicious messages.- In an email, you are asked to send your important information about yourself, for example, imagine that you have received an email from the bank and the email asks you to send them your account information as soon as possible, this message is definitely a trap because no bank will send you such a message due to the fact that they have all your account information.- Examine the e-mails carefully, especially the ones which cause you to feel intense fear and anxiety, and do not let them distract you from the possibility of threats, and you should focus on thinking properly. 

Read more on:https://www.dotnek.com/Blog/Security/what-are-the-ways-to-deal-with-phishing

link:https://dotnek.mystrikingly.com/

Related link:Programming

 



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 80
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Hacking have a huge world and all topics related to hacking, hackers, security , etc., are very attractive to users, which is why a large number of articles are written about it daily, security is a topic that users are trying to master in it, in order to block the way for profiteers to access their information, and they are trying to learn all the points related to this section completely, hackers may use different methods to infiltrate the system as well as information, for example, they may use social engineering techniques, guessing the username and password, using malware, etc., one of the ways that hackers may tend to use is cross site scripting.In this method, codes play an important role, and this type of attack may cause destructive damage to users' information and systems.

What is cross site scripting?

Through this way, hackers enter malicious code on a site, and when users enter the sites that contain malicious code, they create a lot of damage in the user system, because these codes are executed whenever the site is loaded, simply put, in this method, hackers steal the information of people who visit a site, and sometimes even the user does not notice the theft, so the hackers easily get what they want.The method of this attack is that after users visit a site or when they click on a link, a code which was put by hackers in these page will be activated, and this code can eventually steal important information from the user's system, and obtain their desires through this kind of malicious code, it should be noted that first, hackers must find a vulnerability in a web application which gives them the possibility of injecting the malicious script into its server, so they reach their goal, and every time the site page is loaded, these malicious scripts start working and infect various systems.Also, this attack is very common in JavaScript , which, can cause many problems in users' systems if it is infected, including hackers accessing the system and sending messages that may also contain malicious code, they can also access to user system features, such as microphone, camera, etc., access to user cookies and other disorders, pointed out that all these disorders can be very destructive and dangerous for the user, so all the necessary points should be known about this type of hack in order to protect your information against such attacks with full awareness, some people may confuse cross site scripting with SQL injection, which we will briefly explain the differences between these two.

The difference between cross site scripting and SQL injection:

These two methods are both popular among hackers, and they prefer to use cross site scripting and SQL Injection in order to achieve their goals, but the important point is that these two have differences that can be expressed is the language of malicious codes, and the way that they work. 

 

Read more on:https://www.dotnek.com/Blog/Security/what-is-the-example-of-cross-site-scripting

link:https://dotnek.mystrikingly.com/

Related link: check this out



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 77
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Programming has a wide world and programmers prefer to use different languages in order to implement their goals and there are different features in each of them, one of these languages which have lots of fans among programmers is HTML, in fact, it is the standard markup language for web pages which allows you to create your own site as a programmer , there are various features in this language that can be used in order to design sites which can attract lots of users , because as you know, these days, many sites exist in internet world, so that, users have a lot of choices, and they will ultimately prefer a website that provide them with some specific facilities which can attract them to the website and encourage them to choose it over other choices.As we have mentioned above, due to the large number of sites that exist, the owners of different sites must be able to creatively attract different users to their site, one of the solutions that may be used in order to attract different users to a website is to use the various features that exist in HTML, which we are going to discuss some of them in the following.

What is HTML?

HTML stands for Hyper Text Markup Language and gives the browser information about how to display content, so that it can accurately represent the goals of the site owner, simply put, it consists of a series of elements that ultimately describe the structure of a web page , HTML elements can label pieces of content such as "this is a heading", "this is a paragraph", "this is a link", etc.

HTML Attribute:

One of the features of this language is special words that are being used in order to control the behavior of different elements which in fact modify the type of HTML element , these are called HTML Attributes that we are going to mention a number of attributes in this field in the following.

- Accept attribute:

The accept attribute belongs to <input> and specifies the types of files that the server accepts.

- Accept-charset attribute:

The accept-charset attribute belongs to <form> that allows the character, which is going to be used to send the form, to be encrypted.

- Accesskey attribute:

The accesskey attribute belongs to Global Attributes and, as the name implies, it is used to activate a specific element. 

Read more on:https://www.dotnek.com/Blog/Web/learning-attributes-meta-tags-formatting-and

link:https://dotnek.mystrikingly.com/

Related link:check this out



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 88
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()
نوشته شده توسط : dotnek

Today, different users do almost all their daily tasks through the internet and enter their important information in it, as a result, the security of this information should be taken into consideration due to its great importance, because there are lots of factors which cause users to be worried about losing their information, one of the steps that all users can take is installing the right antivirus software in order to help prevent viruses from infecting the system and eventually causing users to lose information.There are many antivirus software programs that can be used, each of which have different features, and it is necessary for users to choose one of them according to the purpose of installing, which will be explained more in the following.

What is antivirus?

Antivirus is a program that help to secure various systems by scanning, detecting and removing viruses, malware , computer worms, and so on, there are several free and paid antivirus software programs, all of which ultimately have the same goal, which is being able to protect systems as well as the information in them, against the possibility of being infected by different types of viruses, and destroy them immediately.In the past, users were reluctant to use antivirus due to the fact that the use of antivirus caused their systems to slow down, but these days, antivirus is very advanced, and they do not slow down computer systems, and they also provide lots of abilities for users, these modern antivirus software programs protect systems against malware , etc., and have no effect on speed.

Why should users update their antivirus software regularly?

Due to the fact that profiteers tend to try new methods every day in order to infiltrate different systems as well as stealing their information, it is necessary for antivirus to become more powerful day by day in order to be able to scan and identify various threats more quickly, therefore, if you pay attention to this important point, you will be able to take advantage of new facilities that new versions of antivirus software programs are offering, due to the fact that this new version definitely has more features and power compared to the previous one.Another reason why the users who are using antivirus should try to update it regularly, is that if there is any problem in the previous version of it, it will be definitely solved in the latest version, as a result you can own a better program, just by updating your antivirus regularly, in addition, there is a section in antivirus which is called the database where malware codes are stored, etc., and each time a database is updated, new malware code is added, which is done by every update, as we have mentioned so far, one of the factors that turns an antivirus into the best one, is its regular updates.There are many antivirus software programs and the reason is that the number of viruses are increasing day by day, so we are going to mention different types of them in more detail below. 

Read more on:https://www.dotnek.com/Blog/Security/what-is-antivirus-and-its-types

link:https://dotnek.mystrikingly.com/

Related link: DOTNEK BLOG



:: برچسب‌ها: dotnek , seo , site ,
:: بازدید از این مطلب : 86
|
امتیاز مطلب : 0
|
تعداد امتیازدهندگان : 0
|
مجموع امتیاز : 0
تاریخ انتشار : دو شنبه 18 مرداد 1400 | نظرات ()