16 Sep

Two ways how to get longitude and latitude of any address on PHP

To get longitude and latitude we will use google maps.

More
15 Sep

Here we collect library of good examples of CSS code

More
15 Sep

Fibonacci Sequences

May be the most popular coding question. It's very easy to write and the same time it may be a reason to say you "No".

More
15 Sep

Using HTTPS protocol for your PHP web-site

If your provider has installed the certificate, then it's easy to do it.

More
14 Sep

JQuery secrets

jQuery is a lightweight, "write less, do more", JavaScript library. The purpose of jQuery creation is to make it much easier to use JavaScript on your website.

More
14 Sep

Maven Dependency Scope

Dependency scope is used to limit the transitivity of a dependency, and also to affect the classpath used for various build tasks.

More
13 Sep

Korn vs Bash vs Shell

Overview different types of shells

More
13 Sep

Command injection

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application.

Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell.

More
12 Sep

SQL injections 

SQL injection is one of more popular vulnerabilities arise in applications.SQL injection is the most bad situation for data owners when data was lost, and the most easy to prevent situation at the same time. The primary means of preventing SQL injection are sanitization and validation, which are implemented as parameterized queries and stored procedures.

More
07 Sep

Binary Tree: Coding Problems

Binary Tree is a data struc­ture consisted of nodes con­tain­ing data and two ref­er­ences to other nodes, one on the left and one on the right.

More