Posts

Showing posts from October, 2020

Git Hub commands #43

Image
  1.      Git config Git cinfig is used to configure   username and   email address. This configuration is used when you code for GitHub. Git config – global user.name “[name]”git Config – global user.email “[emailaddress]”   2.     Git init Git init is used to create new repository. And it is also used to create exiting project as a git project. Git init [repository name]   3.     Git clone Git clone is used to download repository in your machine using URL. Git clone [url]   4.     Git add If you to add specific file, then you can use this command Git add [file] If you want to push more than one file from any directory, then use this command Git add*   5.     Git commit Git command is used to add changes to your local repository. Git commit –m “<message>”   6.     Git push Git push is used to push th...

Get office 365 E3 for free lifetime #42

Image
  Steps: 1.         Firstly visit this website: https://ms.jim9527.workers.dev/   2.       Then click on “get now” (you can use google translator)   3.       Then fill out the form as you can see on this image: https://prnt.sc/u5l1qe   4.       And then click on this button (image): https://prnt.sc/u5l26q   5.       Then it will tell you your Microsoft office password & email so you can just simply loh into your account on office.com/login: https://prnt.sc/u5l2q9   it’ll ask you yo change your password, just simply do it and then you will need to wait 30 mint before using it. It wouldn’t work if you’d use it right after creation.   That’s all I hope you like it. Keep loving and supporting  

Software developers Rules #41

Image
  Don’t gold plate .  Work to the requirements and if you have an idea to do something more / different / better, follow the change management process.  I have seen more problems created by "Oh, it was easy to add, so I just put it in" than any other single cause. Don't hide problems .  If something isn't working, don't hack in workarounds.  Find the root cause.  The more layers of convoluted crap that gets into the code, the more difficult and expensive it becomes to test, maintain and upgrade. Keep it simple .  I used to work with a developer that just loved to prove how smart they were by building these stupidly complex patterns and expressions.  I don't care if you can jam 23 lines of code into a single 70 element long expression.  It's going to create a problem for anyone trying to decipher and maintain it in the future.  The simpler and more straightforward the code and logic, the better it is for the customer and the team who ...

API's to make your website pro #40

Image
Mail Chimp Mailchimp lets us send email to audience, manage subscribers, offer SUPERB tracking, setup auto responders, create beautiful email templates, target subscribes etc.   Bit Ly Bit Ly help to shorten your long URL & track them how many times yours shorten URL has been clicked. Bit.ly shortens 600 million links per month, for use in social networking, SMS, and email.     Google Map Google map’s API’s which is used to create a custom map, a searchable map, check in functions, display live data synching with location, plan routes etc.   Gmail For most web application (including mobile apps), the Gmail API is the best choice for authorized access to a user’s Gmail data. The Gmail API gives you flexible, restful access to the user’s inbox, with a natural interface to threads, messages, labels, grafts, history etc.   Twitter The twitter API lets you reading and writing twitter data. Thus, you can use it to compose tweets, read p...

Fully anonymous #39

Image
Do you Know Most of the governments especially USA government watches out for an ordinary person’s secrets like what he has sent, what he has downloaded or surfed. It is exceptionally vital for a typical individual to surf the web anonymous I am discussing the tools and ways that can be utilized to be anonymous.   Using VPN There are both free and paid VPN. But, some of them are exceptionally futile. They give their user’s logs to the surveillance and other official authorities if they give an order to them.   Using TOR TOR browser is most loved by both great individuals and black hats since the dark web can be surf by utilizing this programmed.   Working of TOR Tor program makes a circuit of IPs. It makes numerous layer of IPs to shroud your genius IP.   Precautions for TOR Don’t resize your TOR browser windows. Leave it as the default size. Don’t use mobile 2 steps verification in tor. Some website provides 2 steps verification for...

Web security Part-2 #38

Image
  SSL Secure socket layer (SSL), an encrypt based internet security protocol, it was founded for the ensuring of the integrity and privacy of the connection of the internet by the Netscape company at 1995, nowadays it names TLS. How it works It like the new TLS based on the concept of the handshake TLS.   Cors Cross origin resources sharing (CORS) is a mechanism that uses HTTP headers to specify which outer origin have access to the local assets and how can access it that is mean we can make a white list for the allowed cross origins that has access to our assets the server must have a way to handle the outer requests and this what we will discuss now. How it Works When the site makes a get request to get resources from the out server, the browser adds a header that contains the origin like the example origin: http://www.developersdj.com the server receives the pre-flight request and searches in its whites list for access control allow origins about the giv...

Web Security Part-1 #37

Image
What is web security? The web security is not safe for every user. Daily we hear about website becoming unavailable because of denial of services attacks, or displaying changed information on their pages. These articles are essential for understanding web security basics. Those articles summarize the most common attacks and explain the countermeasures every web application should implement. Essentially, these articles provide you with the knowledge needed to create better and safe web applications.   Different sorts of web security HTTPS It is the secure version of HTTPS, the full name of this protocol is Hypertext transfer protocol secure, which is the primary used to send data between a web browser and a website. No one else can access the data, because It uses TSL protocol to encrypt communications, I will explain it at the coming topic.   How HTTPS Works It uses encryption communication protocol, named transport layer security (TLS), was known as secure soc...

I Wish i knew when i starts freelancing #36

Image
Your network is Your net worth If you have ever tired freelancing websites. You know that the competition is extremely high. You have to be either well-known in the platform or lower your price (which I Don’t recommended).   2.       50% Technical 50% Marketing Skills I’ve done project in web development, mobile development, design and believe it or not even photography one time! Is it because I’m an expert in all these filed? Of course not! I Just practice don how to present myself so that I have a higher chance of winning the project. 3.                    Don’t ACT desperate One of the worst mistakes I made in my early freelancing. Was acting desperate for winning the project without even realizing it! When negotiating with the client, never act desperate. Know your worth and be confident. 4.       Don’t break the price, increase the value Don’t lo...