Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

Ubuntu: Changing Permissions At Command Prompt

Changing Permissions At Command Prompt   This is accomplished by using the "chmod" command. The chmod is followed by a 3 digit number used to indicate the permissions required. The first 3 digit indicated the owner's permission,

How to Do 2 Steps Verification with Google Authentication in PHP App

Hi,   I wan to add google two step authentication process (http://findnerd.com/account#url=/list/view/How-to-Use-2fa-Google-Authentication-in-CakePHP-3-and-Above---8-Steps-Guide/33464/?utm_source=hashnode.com).   I have already existing

Internetworking

Internetworking   In internetworking the routers has the information regarding the addresses for the nodes that is in the network.   They are then configured to switch to the varied network or they can do it by using the internetworking

TCP in networking

TCP Transmission Control Protocol is the main protocol that is been used in the networking. It is mainly being used for the data transmission in the communication network.   TCP is reliable protocol. This means if data gets lost in any ca

Christmas Tree Programm

Chirag is a pure Desi boy. And his one and only dream is to meet Santa Claus. He decided to decorate a Christmas tree for Santa on coming Christmas. Chirag made an interesting Christmas tree that grows day by day.      The Christmas

How to use user defined function in PHP ?

Firstly let us know What is the user defined function in php ? This function declaration starts with the word "function" and user defined function name is not case-sensitive. User defined function starts with a letter not a number. Use of user d

How to use str_replace () function in php ?

What is utilization of str_replace () function ? there are 3 main uses of str_replace () function in php. 1-str_replace() function supersedes some characters with some other characters in a string. 2-str_replace() Supersede all occurrences of the

PDI Components

There are four main components of Pentaho Data Integration tool: 1: SPOON 2: PAN 3: KITCHEN 4: CARTE SPOON It is a graphical design interface for buildings ETL jobs and transformation. It provide a way to create complex ETL jobs. This is the

Boxing and Unboxing

Hi Team, Today i will explain Boxing and Unboxing in C#. C# Type system mainly divided into 3 parts:- 1. Value Type 2. Reference Type 3. Pointer Type bool,byte,char,decimal,double,float,int,long,short are the value types struct ,Class and obje

Gateways in Networking

  Gateway just like the name suggests act like a gate that we have in our homes.   Any one who want to come first need to pass with that gate to gain access to inside.   Gateways in networks are used to allow filter data to send f

1 6 1595
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: