Posts

How to get duplicate confirmation latter for service book/

Duplicate Service Book for Teachers

Password protect RAR files using WinRAR..

1)Right click on the file for which u want the password to b put. 2)Click on "Add to Archive". 3)Then go to Advanced tab. 4)Click on set password...choose any passwd. 5)Click ok. 6)A winrar file with ur filename will be created. 7)Next u may delete the original file,as u have now compressed it with a password. 8)Any1 tryin to open the rar file wont be able to,unless he knows the passwd.

How to resolve Error: Call to undefined function curl_init()

1) remove ';' from extension=php_curl.dll in php.ini 2) ensure that  ssleay32.dll and libeay32.dll are in Windows/system32.   3) Copy php_curl.dll into Windows\System32 as well.  This is work form .... You can try this also...  

How to add a php page to Wordpress

First, duplicate post.php or page.php in your theme folder (under /wp-content/themes/themename/ ). Rename the new file as templatename.php (where templatename is what you want to call your new template!). Enter the following at the top of the new file: <? php /* Template Name: templatename */ ?> You can modify this file (using php) to include other files or whatever you need. Then create a new page in your wordpress blog, and in the page editing screen you'll see a 'Template' dropdown in the 'Attributes' widget to the right. Select your new template and publish the page. Your new page will use the php code defined in templatename.php

8 Effective WordPress Plugin for Ecommerce and Online Shopping Needs

PayPal Integrated WordPress Theme I recommend you to use our e-commerce WordPress theme “figero wordpress theme” which enables you to sell your products using PayPal payment gateway. It is very simple to integrate it with WordPress and you need to supply only your PayPal email id. You even do not need to install any extra plugin. Figero theme competes your need of setting up an online shop to sell your products. Lets come to the main point as i am writing this post to let you know about top plugin’s that will create an online shopping platform with WordPress: 1. WP e-Commerce Plugin With over 1.5 millions downloads this plugin has been marked as one of the best plugin for e-commerce needs. WP e-commerce shopping cart plugin is fully featured and multi functional shopping cart application. It is suitable for selling products online.  List of features of this plugin is huge and its pro-version supports almost all of payment gateways. This plugin can be easily integrated with wor

SQL Injection overview

SQL injection is a security vulnerability that occurs in the database layer of an application. The vulnerability is present whenever user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.   In fact, it is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. The Penetrator can find many kinds of SQL injection vulnerabilities in order to quickly and efficiently solve this security risk.

What is Vulnerability Scanning?

The automated process of proactively identifying vulnerabilities of computing systems in a   network   in order to determine if and where a system can be exploited and/or threatened. While public   servers   are important for communication and data transfer over the   Internet, they open the door to potential security breaches by threat agents, such as malicious   hackers. Vulnerability scanning employs   software   that seeks out security flaws based on a   database   of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security. Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise.