Category : FACT

27 posts

Coding Villa Banner
You’ve launched your website and done all you can to ensure its success, but you may have overlooked a critical component: website security. Cyberattacks cause costly clean-up, damage your reputation, and discourage visitors from coming back. Fortunately, you can prevent it all with effective website security. We’ll discuss the basics of website security and what solutions will help ensure your …
Cross-site Scripting (XSS) Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in a web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious …
What is a payment gateway and how does it work? A payment gateway is an application that makes the entire process of online payment more streamlined and secure. It acts as a secure link between your website or application and the bank.  The role of payment gateway begins when a customer wishes to purchase on …
APIs have become omnipresent in the world of software and mobile app development. Right from private solutions to public-facing services apps and partner integrations, it is present everywhere. They are helping developers in creating apps that caters to diverse set of customer needs. They are transforming the architectural patterns with much sophisticated approach of mobile …
What are Barcodes? A barcode is a method of representing data in a visual format of machine-readable information about the item to which it is attached. A barcode represent data by varying in widths and spacing of parallel lines. Nowadays, the barcode is referred to as a linear or 1-dimensional code, that can be scanned …
What is Parameter Store?
Introduction Amazon Web Services (AWS) has an extremely wide variety of services which cover almost all our infrastructure requirements. Among the given services, there is AWS Systems Manager which is a collection of services to manage AWS instances, hybrid environment, resources, and virtual machines by providing a common UI interface for all of them. Services …
The OpenVPN protocol is responsible for handling client-server communications. Basically, it helps establish a secure “tunnel” between the VPN client and the VPN server. When OpenVPN handles encryption and authentication, it uses the OpenSSL library quite extensively. Also, OpenVPN can use either UDP (User Datagram Protocol) or TCP (Transmission Control Protocol) to transmit data. If …
OpenVPN is both a VPN protocol and software that uses VPN techniques to secure point-to-point and site-to-site connections. Currently, it’s one of the most popular VPN protocols among VPN users. Programmed by James Yonan and released in 2001, OpenVPN is one of the only open-source VPN protocols that also has its own open-source application (SoftEther …
what-is-bitcoin
Bitcoin is a digital currency created in January 2009 following the housing market crash. It follows the ideas set out in a whitepaper by the mysterious and pseudonymous Satoshi Nakamoto.1 The identity of the person or persons who created the technology is still a mystery. Bitcoin offers the promise of lower transaction fees than traditional …
Here are some most common bad programming practices that every programmer should avoid to become a better programmer. 1. Giving up too soon Most of the programmers give up when they are very close to solution. So never lose hope and keep trying, you will definitely find a solution. 2. Acting defensively when someone critiques …
PAGE TOP
error

Enjoy this blog? Please spread the word :)

RSS
Follow by Email