Posts

Showing posts from December, 2012

How to get duplicate confirmation latter for service book/

Duplicate Service Book for Teachers

Password protect RAR files using WinRAR..

1)Right click on the file for which u want the password to b put. 2)Click on "Add to Archive". 3)Then go to Advanced tab. 4)Click on set password...choose any passwd. 5)Click ok. 6)A winrar file with ur filename will be created. 7)Next u may delete the original file,as u have now compressed it with a password. 8)Any1 tryin to open the rar file wont be able to,unless he knows the passwd.

How to resolve Error: Call to undefined function curl_init()

1) remove ';' from extension=php_curl.dll in php.ini 2) ensure that  ssleay32.dll and libeay32.dll are in Windows/system32.   3) Copy php_curl.dll into Windows\System32 as well.  This is work form .... You can try this also...  

How to add a php page to Wordpress

First, duplicate post.php or page.php in your theme folder (under /wp-content/themes/themename/ ). Rename the new file as templatename.php (where templatename is what you want to call your new template!). Enter the following at the top of the new file: <? php /* Template Name: templatename */ ?> You can modify this file (using php) to include other files or whatever you need. Then create a new page in your wordpress blog, and in the page editing screen you'll see a 'Template' dropdown in the 'Attributes' widget to the right. Select your new template and publish the page. Your new page will use the php code defined in templatename.php

8 Effective WordPress Plugin for Ecommerce and Online Shopping Needs

PayPal Integrated WordPress Theme I recommend you to use our e-commerce WordPress theme “figero wordpress theme” which enables you to sell your products using PayPal payment gateway. It is very simple to integrate it with WordPress and you need to supply only your PayPal email id. You even do not need to install any extra plugin. Figero theme competes your need of setting up an online shop to sell your products. Lets come to the main point as i am writing this post to let you know about top plugin’s that will create an online shopping platform with WordPress: 1. WP e-Commerce Plugin With over 1.5 millions downloads this plugin has been marked as one of the best plugin for e-commerce needs. WP e-commerce shopping cart plugin is fully featured and multi functional shopping cart application. It is suitable for selling products online.  List of features of this plugin is huge and its pro-version supports almost all of payment gateways. This plugin can be easily integrated with wor

SQL Injection overview

SQL injection is a security vulnerability that occurs in the database layer of an application. The vulnerability is present whenever user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.   In fact, it is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. The Penetrator can find many kinds of SQL injection vulnerabilities in order to quickly and efficiently solve this security risk.

What is Vulnerability Scanning?

The automated process of proactively identifying vulnerabilities of computing systems in a   network   in order to determine if and where a system can be exploited and/or threatened. While public   servers   are important for communication and data transfer over the   Internet, they open the door to potential security breaches by threat agents, such as malicious   hackers. Vulnerability scanning employs   software   that seeks out security flaws based on a   database   of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security. Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise.

generate QR code with Google API

<?php          $size           = $_REQUEST [ 'size' ];      $content        = $_REQUEST [ 'content' ];      $correction     = strtoupper ( $_REQUEST [ 'correction' ]);      $encoding       = $_REQUEST [ 'encoding' ];                $rootUrl = " https://chart.googleapis.com/chart?cht=qr&chs= $size&chl=$content&choe=$encoding&chld=$correction" ;               echo '<img src="' . $rootUrl . '">' ; ?>

How Web Pages Work

Image
 In order to talk about Web pages and how they work, you will want to understand four simple terms (and if some of this sounds like technical mumbo-jumbo the first time you read it, don't worry): Web page - A Web page is a simple text file that contains not only text, but also a set of HTML tags that describe how the text should be formatted when a browser displays it on the screen. The tags are simple instructions that tell the Web browser how the page should look when it is displayed. The tags tell the browser to do things like change the font size or color, or arrange things in columns. The Web browser interprets these tags to decide how to format the text onto the screen. HTML - HTML stands for Hyper Text Markup Language . A "markup language" is a computer language that describes how a page should be formatted. If all you want to do is display a long string of black and white text with no formatting, then you don't need HTML. But if you want

Encryption and Decryption in PHP

Please visit MyGlobalTalks.blogtspot.in for more details

Data Encryption Techniques.

Introduction Often there has been a need to protect information from 'prying eyes'. In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals. Industrial espionage among highly competitive businesses often requires that extensive security measures be put into place. And, those who wish to exercise their personal freedom, outside of the oppressive nature of governments, may also wish to encrypt certain information to avoid suffering the penalties of going against the wishes of those who attempt to control. Still, the methods of data encryption and decryption are relatively straightforward, and easily mastered. I have been doing data encryption since my college days, when I used an encryption algorithm to store game programs and system information files on the university mini-computer, safe from 'prying eyes'. These were files that raised eyebrows amongst those who d

What is SSL and what are Certificates?

The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. This is in short how it works. A browser requests a secure page (usually https://). The web server sends its public key with its certificate. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data. The web server sends back the requested html document and http data encry

DND service status

How to check which mobile have DND service activated or not. Open given URL, change "PHONE NUMBER" instead of 1234567890 and press enter... http://cbsserver.zni.in/dnd/?phone=1234567890&apikey=0f54c00ca7b20cbdc7c64bca71374329 if you get output 0 it mean No DND service on that mobile number . if you get output 1 it mean DND service activated on that mobile number.

How to remove Extra Space between line in Dreamwever

1)Open Your code in Dreamwever 2)Press CTRL + F or open find box from menu bar. 3)in Search box Type [\r\n]{2,} and in replace box type \n 4)Mark regular expresion box at bottum of search box. 5)Click on Replace all. 6)Your extra space will removed....Enjoy.. :)  

How to Block IP using PHP code

<?php $deny = array("111.111.111", "222.222.222", "333.333.333"); if (in_array ($_SERVER['REMOTE_ADDR'], $deny)) {    header("location: http://www.anydomain.com/ ");    exit(); }  ?>