Search In
Why Should I Blog
Before focusing on the main theme, I would like to share some views on why I am writing this blog
the whole day i was thinking that what should I write?
And the last question that hit my mind and which might be hitting many of yo
An electronic book is commonly known as eBook or Digital Book. Printed books are always been familiar to all the people from a very long time, as everyone from his/her childhood to older ages are involved in reading books whether it is related to the
MVC Architecture
MVC architecture is a software constructing or designing pattern which is widely used these days to build software applications or web based applications. MVC breaks an application into three main parts namely Model ,View and Cont
In WordPress, there is a Reading setting option in WordPress dashboard which is inside setting option. We can use this Reading setting for controlling Reading experience in WordPress. Reading setting is utilized to set the substance which is re
Hello readers, today I guide you "To Connect Multiple Database in WordPress".
In WordPress, wpdb is the class which handles all the database related tasks. In arrears WordPress installation we have $wpdb object of that class using whi
If you have requirement to allow only number in the textbox you can use either of following method. This will allow only numbers i.e. 1,2,3,4,5,6,7,8,9 and 0 all other chars entered will not be accepted.
There are two approach to do it. First Appro
We need to write search queries every now and then in our projects. This is one of the most common tasks a PHP developer has to do. Most of the developers still use wildcard queries for this purpose which is very slow in searching records. However My
Internet Protocol being a layer-3 protocol (OSI) takes data Segments from layer-4 (Transport) and divides it into packets. IP packet encapsulates data unit received from above layer and add to its own header information.
Th
There are different types security risks for web application:
Some of them are:
1. SQL Injection
2. Broken authentication and Session management.
3. Cross site scripting
4. Insecure Direct Object References
5. Security Misconfiguration
6. Sensitive
Resources have to be made available for people to learn to adapt to them. In the past, people traveled by foot to major cities to get their hands on better seeds and fertilizers. The ones who took the pains, fared way better than the ones who dint, e