
Search In
Hello Reasders
Here, we protect the directory using .htaccess file
Before doing this, we will first need to create a .htaccess file(.htaccess file is the configuration file for the Apache HTTP server) which can be used to affect the directory and s
How can we define a testing policy ?
Testing Policy is the planning activity to test the application software improvement, testing Policy is an important part of any organization or company. Testing policy may be different for many organization. The
Hello Everyone , In this blog we will discuss about how to use MYSQL in node.js.
node-mysql is one of the best modules which can be used for working with MySQL database.
To install the MySQL in node.js driver you have to follow up with the below pro
There are four ways to install a plugin in CakePHP->
• Plugin install through Composer
• Manually plugin install
• Plugin installed As Git Submodule
• By Git Cloning
1- Manually
To install a plugin manually in CakePHP, you just have to make a p
DotNetNuke 7 Setup and Installation is pretty much different as compare to previous versions. Following are the steps to setup DNN latest version (7.0.4):-
Copy DNN Community Edition files to C:/websites/dnndev.me (dir used by template)
set fol
What is SVN?
1) Subversion(SVN)is a SCM(Software Configuration Management)
Implementation.
2) It allows to track changes in files and directories.
3) It allows concurrent development in same files.
4) It is centralized(one server).
Basic SVN Command
Functions of Resource Selection by RMS.
RMS means “Resource Management System”.RMS plays an important role in the resource Selection Process. This is a very important resource selection process by resource management system through matching finger
Parametrization can be implemented in different ways using the following elements:
a)Using CSV Data Set Configuration:
Steps: Thread Group > ADD > Config Elements > CSV data set Config
b.)Using User Parameters:
Steps: Thread Group > Add
The methods and functions of the protocols can be categorized as, required or optional. The difference between these two specifiers is that, the programmer may or may not use the optional methods declared in the protocol, or may use some of them and
SQL injection attack can access the sensitive data from the database. The attacker can Insert, Update, Delete and execute the administration operation.
Detection:
Authentication Forms : When user enter the web form, chances are that the user creden