MIME Media Types
MIME media types basically stand for Multipurpose Internet Mail Extension media types. These media types were originally created to make emails include information other than only plain text. These media types show us the following things:...
read more
Hosting a Web Application on Microsoft Azure in IAAS
Azure provides a lot of services to host a web application whether it be static or dynamic in a number of ways...
read more
Sensitive Data Exposure Vulnerability
Introduction: Sensitive Data Exposure Vulnerability exists in a web application when it is poorly designed. It allow attacker to apply various security practices and find the sensitive data that is related to particular website. By Sensitive Data Exposure vulnerability, attackers may be able to find sensitive data such as session tokens, authentication credentials, databases etc. By such sensitive data an attacker will be able to exploit the web application and the security of website will be breached....
read more
Decentralized Web – Web3
Prerequisite – Web 1.0, Web 2.0 and Web 3.0...
read more
How To Install Ngrok & Setup the Auth-Token on Linux?
Ngrok is a tool that allows you to create a secure tunnel from a public endpoint to a locally running web service on your machine. In simpler terms, ngrok lets you expose a web server running on your local machine to the internet. So others can access what you are running locally....
read more
Introduction to Host Names
A hostname is essentially a shorthand for a computer or other device attached to a computer network with a unique IP address, which is the physical address of the web server. Computers require names to distinguish one machine from another, just as a name is used to identify a person, a place, or a thing....
read more
What is Plagiarism in Educational Context ?
The simple meaning of plagiarism is cheating, but if you check the real meaning of plagiarism in the dictionary then it will give somewhat like “the practice of taking someone else’s work or ideas and passing them off as one’s own”....
read more
Javascript Program To Find Decimal Equivalent Of Binary Linked List
Given a singly linked list of 0s and 1s find its decimal equivalent....
read more
Count set bits in an integer
Write an efficient program to count the number of 1s in the binary representation of an integer.Examples :...
read more
Difference Between VLAN and VSAN
A Virtual Local Area Network (VLAN) is a logical grouping of devices that are connected in a network. VLAN improves the security, performance, management, and configuration of the network. The configuration of VLAN depends on the parameters such as port, protocol, MAC address, and subnet....
read more
Transaction Processing in Mobile Environment
Computing Technologies are the technologies that are used to manage, process, and communicate data. In this article, we will learn about Transaction Processing in Mobile Computing. A transaction processing system allows application programmers to concentrate on writing code that will allow users to perform transactions simultaneously without bothering about what other users may be doing with their transactions at the same time:...
read more
Technology for 4G Mobile Communications
Mobile communication enables you to talk to people who are far away from you without having to be connected physically. It becomes possible to transfer audio and multimedia files between mobiles and computers without the need for any physical connection. A cell phone or a mobile phone is one form of mobile communication....
read more