How to add an Icon to a Java application
This are the instructions to add an icon the a Java Swing application. Icon is loaded from an image. In order to load this image we make use of File and Buffered Image classes. Icon can be shown in different…
This are the instructions to add an icon the a Java Swing application. Icon is loaded from an image. In order to load this image we make use of File and Buffered Image classes. Icon can be shown in different…
Find the Unicode character linked to the character you want to print. Press Ctrl + Shift + u, then type the hexadecimal code of the Unicode character you want to print. External references heemayl, “How to print special characters“,…
Certified Ethical Hacker (CEH) program is a set of certifications provided by EC-Council and related to cybersecurity. CEH is a certificate that appears in most of the professional certification paths suggested by EC-Council, so it can be considered a core…
CSX-F, acronym for Cybersecurity Fundamentals, was a certificate issued by professional association ISACA until 2022 that demonstrated knowledge on cybersecurity. It was the entry-level exam for ISACA’s Cybersecurity Nexus (CSX) certificate series. It was a completely theoretical exam, consisting entirely…
Let’s say you have a computer that have Windows 10 as its default operating system (OS). Then you manage to install a Linux distribution (e.g., Ubuntu) alongside Windows 10. But then you change your mind and you want to restore…
The purpose of this post is to explain some ways to register the GPS coordinates while doing a route Mobile apps GPX GPX Viewer Pro y is the premium version of free app GPX Viewer. GPX Viewer Pro allows to…
The purpose of this post is to describe the steps to design, define and create a GPS route as a file and import it to mobile applications and/or webs. Steps 1. Find the route The first step is to analyze…
Mac OS X default printing system does not allow to print multiple ranges of pages of a PDF document, it allows either to print all pages, a single page or a single range. You can open the document with Chrome,…
CISM is a certification issued by ISACA. The purpose of this post is to explain the procedure for a candidate to get CISM certification, and related requirements. It is important to know two things about CISM Certification: CISM Certification is…
CISA (Certified in Information System Auditor) is a certification issued by professional association ISACA. The purpose of this post is to explain the procedure for a candidate to get CISA certification, and related requirements. It is important to know two…