Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

SQL Injection attack

Sql Injection Application security is always a challange for the application developer. As some of anonymous users who try to break your application for his fun. Sometimes loopholes in your application can be more dangerous for you and your applicat

How to Read Command-line arguments in Node.js

When a program starts the parameters or arguments send to the program using command prompt called Command-line argument or command-line parameter. A program can have many command-line arguments. We can alter the operation of program with command-line

SQL Server : Error handling using TRY-CATCH

Before SQL Server 2005, the only practical way to trap errors in SQL was using the old-fashioned @@error system variable. Although this is still supported, in this blog we will learn how to use TRY-CATCH for handling errors.TRY-CATCH block is simila

Mysql Injections

Hello Readers! this is a small blog on Mysql injection, hope you like it.   Mysql Injection: MySQL injection is a code injection technique, used to attack data-driven applications, in which harmful SQL statements are inserted into an entry fi

Route Config in Asp.Net MVC

"Basics of Route Config in Asp.Net MVC"     Routing is one of the primary concern of MVC. In MVC we have to map URL to a particular Action method on a particular Controller, the Action Method is then executed and returns an inst

How to make validations in Asp.Net MVC

"How to make validations in Model Class using Asp.Net MVC "     In this article we will learn about validating Model using Data Annotations . Data Annotations provides us Metadata that describes some set of rules, with the help

Understanding Operating Systems and Computer Hardware

If you like computers and want to know more about them then you can start by learning about operating systems and how computer hardware works. There are many different types of operating system and many types of hardware that are very important for t

Coin exchange problem solution Implementation in Java

Hi, In this blog I tried to provide an efficient solution for a famous coin exchange problem using dynamic problem in bottom up approach whose time complexity is O(mn). Problem Definition In coin exchange problem you can think of a coin v

Arrays and Hash In Ruby

Ruby's arrays and hashes collections having indexes. They can also be said as indexed collections. Arrays and hashes store collections of objects which can be accessed using a key. Both arrays and hashes grow as needed to hold new ele

How to do Link Building for your Website in SEO

What is Link building ? Link Building is a method of making links from the other live website via various technique. It is not easy task , It is most difficult but important strategies to rank your website in various Search engine SERP(Search Engine

1 10 15
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: