Windows PowerShell has four different execution policies: Restricted – No scripts can be run. Windows PowerShell can be used only…
The usage of smartphones has increased a lot in the past years which become a reason for developers to debate…
Let’s start with a built-in Windows WMI tool: wbemtest.exe. Launch wbemtest.exe (Hold down the Windows key, tap R, release the Windows key, type in…
Datatable plugin natively doesn’t sort the data like 1. Currency with commas e.g. 5,565.00 2. Currency symbols and names etc.…
I myself and there will be many more developers who are waiting for PHP 7.4 to be released. It has…
This script is extracting all the spinal content from a given content.
A very small script that will spin the text and count similarity between two spun text.
1. LDAP connection 2. Search by user id 3. Retrieve all the information from Active Directory Sample code Note Add…
The exercise shows how you can add a base64 encoded image to a PDF footer. I have used Aspose library for…
To counter this we devise a system where all active entities (users, devices, and services) are named, registered and credentialed.…
End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. … The messages are encrypted by…
Encryption Applying some sort of algorithms to scramble sensitive information like passwords. Encrypted information can be decrypted as well. This…
HS256 is a symmetric algorithm, meaning there is one secret key shared between the identity provider and the recipient of…
https://youtu.be/_W0FkdLNgzE
This can be achieved by using recursion in javascript.
Here a few things to think about, when creating an index in SQL: 1. While it (mostly) speeds up a…
As simple as it can be, Threading is about workers & asynchrony is about tasks. Asynchrony is also known as a…
A Thread pool is a collection of threads. These threads can be used to perform tasks without disturbing the primary thread. Once…