Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

Phpmyadmin: How to install PhpMyAdmin in Ubuntu 14.04

This blog will help you to understand how to install securely phpMyAdmin to manage your databases on Ubuntu 14.04 How to install phpMyAdmin: Step 1: First you need to update the package index on your server with this command:   Now write t

Sort and align duplicates values on the same rows in Excel or Google Spreadsheet?

Hello friend, I found this interesting question on reddit so after answering their I thought to share this with you here doing sorting and align duplicates in excel are both different lets discuss this one bu one separately.   1. How to s

Remote Validation in Asp.Net MVC

Hi Friends Whenever we register a user in our registration form we need to check for existence of current email/user name or any unique identification property. You certainly don't want two users to be registered with same email Ids. A

Resolve LOAD DATA INFILE Error : "The used command is not allowed with this MySQL version"

This article provides the solution for the issue with LOAD DATA INFILE statement. PHP provides a lots of options to import data from text files. I faced this issue while I was trying to import data from a text file (data.txt) into mysql table using &

V-Model: Advantages And Disadvantages

V-Model stands for the ‘Verification’ and ‘Validation’ Model. Same as the waterfall model, V-Model also applied as a consequent life cycle model. In the V-model, every stage should be accomplished ahead the next stage starts.

How to run nodejs app as a desktop application using electron

Hi All, While working on one of my project we had a requirement where we need to run our web application as a desktop application and to do that we found a solution called Electron which can w=be used as an installer and it run on various plate

Creating Parent Child theme in Wordpress

Hello readers, In this tutorial I will guide you to "Create Parent Child theme in Wordpress". The web that modifying a theme and even slightly prevents you from updating it to more recent version in the future, because in case you try to u

OWASP TOP 10 VULNERABILITIES

  Injection-A1 :  The A1 vulnerabilities is a injection attacks. In which sending data was infected Like  SQL command which can bypass the authentication.   Broken Authentication and Session Management-A2 : The A-2  vulne

Locators in Selenium

Use of Locator mostly depend on your application under test. There are different type of locators in Selenium: ID Name Link Text LinkText PartialLinkText Xpath CSS Selector   ID : This is most common and efficient way of locating

Reusability of Cucumber steps

Many times it has been noticed that some set of steps were required in another cucumber step. One way is to write previous steps again in the required cucumber step but this violates the “Reusability” feature of cucumber. So, the best sol

1 69 115
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: