Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- DROP TABLE



  Best Tips for a brilliant responsive design

Portability of mobile devices have made it easier for the users to access internet. Consequently , this has increased a lot of of mobile traffic and has given birth to new terms such a mCommerce. Now the point is that as we know that technology is ephemeral , will we keep on investing time and money every time a new gadget is launched? Indeed yes, because this is what market demands!  But what if I say a that there is a technology which is independent of the size of the devices or a technol...

   responsive, mobile     2015-07-01 01:25:37

  Do You Make These 5 Database Design Mistakes?

Look, everyone makes mistakes. It’s true. But not all of us have the chance to make mistakes that end up costing millions of dollars in hardware and production support costs. Any one of the following five mistakes listed below will add additional costs to your company. It’s guaranteed. The costs could be hardware related (extra disk space, network bandwidth), which tend to add up quickly. The costs are also support related (bad performance, database re-design, report cre...

   Database design,Mistake,Advice,Data type,Compatibility     2012-01-03 11:25:13

  Why my Website Contact form is not converting enough traffic?

Contact forms are a very common part of any website and anybody can overlook them. Generally people try to choose it as their first solution but they do not realize that they are actually hurting the growth of their business. WordPress currently power more than 66 million websites but it would be good if your website is existing because of one of the most popular Content Management Systems of the world. Everyone starting from blogger to the person sitting next door use this tool for making their...

   website contact form tutorial     2014-11-17 05:04:03

  How does JGSS read Windows native TGT credential?

MS LSA is a protected subsystem that authenticates and logs users onto the local system. The user credential is stored at the native credential cache of LSA on Windows. This kind of credential is often used to authenticate the user to the server, one of the authentication methods is Kerberos. JGSS has provided a native interface which can read the native TGT credential and use it to get the TGS of a service. But how does JGSS read the native TGT credential? Here is a sample code for reading nati...

   KERBEROS,JGSS,MS LSA,NATIVE CREDENTIAL,TGT,SESSION KEY TYPE     2015-03-25 03:42:32

  6 Astounding Joomla Templates That Support EasyBlog

No doubt, blogging offers a fabulous platform where one can express his emotions, and share his views with others over the Internet. It can also help you leverage your business, as you can publish suitable blogs to efficiently promote your products and services. Moreover, one can also use blogs to exhibit his online portfolio and thus, benefit his business.  Today, there are several blogging platforms that offer a brilliant blogging experience. However, Joomla makes a superior choice among ...

   joomla, joomla templates, mobile template     2015-07-03 01:25:19

  TIOBE : No news today

TIOBE released the programming index for September 2012. There is no big change for this month compared to last month, the top 3 are still C, Java and Objective-C. In top 20, only Transact-SQL exchanged the position with VB.NET. Java shows trend of drop, will it be worse because of the ignorance of Java's vulnerabilities by Oracle. This index shows that the programing lnaguage market is quite normal, no big events. Except Objective-C, in recent years there are no other new languages which have b...

   TIOBE,Objective-C,Index     2012-09-05 07:36:07

  File upload in PHP

File is a special kind of form data, when being uploaded to the server through HTTP POST request, PHP will create a $_FILES global array, the relevant file information will be stored in this global array. We will illustrate file upload with some code snippets using PHP and look into the internal work mechanism. Lastly will talk about file upload security. File upload In order for users to upload files in client side, we have to provide a form on the user interface. Since the uploaded file is a s...

   File upload,PHP     2012-11-30 22:01:28

  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and whic...

   Code security,SQL injection,HTTP header     2012-04-05 11:42:04

  Latest : Asp.Net 5 Beta 7 Is Now Available

Asp.net developers can now use the latest update asp.net 5 Beta 7 on both NuGet and Visual Studio 2015 to make good asp.net development practices. The update also has the first public preview of .Net Execution Environment for Linux and Mac without any need of Mono. To know how to use asp.net 5 beta 7, read this article further. You need to install the update first to use its features with Visual Studio 2015. You can download and install it from Microsoft’s official site. The update brings ...

   ASP.NET 5 BETA 7     2015-09-18 06:33:54

   Move.Me Writing Your Own WebSocket Server

The WebSocket protocol has applications beyond plain vanilla web development.  I will explain how the protocol works, how to implement your own server and share some insights I had along the way. Before we get down and dirty, I will explain what I’ve been doing with it. At this point I expect many of you are saying “I’m not working on a web game this doesn’t seem relevant to me.” Well, neither am I. I embed a WebSocket server into my game engine and wit...

   Socket,NetWorking,WebSocket,Server development     2012-01-28 07:06:43