Posts

Showing posts from December, 2020

The Best Web Developers #60

Image
  Know your #JavaScript Variable Data types Conditional Looping Classes Prototypes Prototypal Inheritance Closure Hoisting Lexical Scope Good and bad practices Design pattern   Know your #HTML #CSS DOM Elements CSS selectors Box Model Display and position properties Cantering your elements Flexbox Media queries Web Storage CSS validation Magnification and Obfuscation   Know your framework #React JSX Virtual Dom Function vs Class components Events handling Component life cycle React hooks React performance optimization React suspense Graph   Know the #web HTTP Web services Rest API Web workers Server side rendering Authentication Authorization OAuth JWT CORS Secure coding principal Web Attacks CSRF XSS   Know your tools Text editor: #VS Code, Vim, and are my favourites Extensions: Gitlens Prettier Linters Bracket pair colorizer   Git:...

Artificial Intelligence in Your App #57

Image
  Tensor flow LITE Tensor flow LITE is a Google’s Ai framework for mobile devices. You can use it for on devices machine learning. Pros & Cons of Tensor flow LITE: + No network connection required + Data stays on the devices, ensures privacy + Little power consumption, since no connection needed ~ Mobile processing power is limit   Fire Base ML Kit Google’s cloud solution to implement AI in your app. Pros & Cons Fire base ML Kit: + Super simple to implement + The cloud provides good processing power + No need to be an AI expert ~ Services start to cost after 1000 users   Python Backend Python is the languages for ML. you cloud as well implement a python backend and let your app interact with it via an API. Pros & Cons of Python Backend: + You have the full control + Low cost after implementation + You are free in choosing an ML framework (Tensor flow, pytorch, Etc.) ~ Pros $ Cons of Python Backend ~ Takes a lot of ...

Coding Habits #56

Image
  Habit – 1 Not Using Google I can’t believe how many people use stack overflow or any social media groups as first place to ask their question. If you don’t use google as your first place to look for help, forget about getting a good programmer.   Habit – 2 CTRL + C, CTRL + V The general rule should always be: don’t copy code, you haven’t written on your own. Neither from stack overflow or from GitHub. I always write off new code. That way I remember and understand it much better.   Habit – 3 Having Your Phone Next to You We all know how tempting it is to take a look at your phone when your LED blinks. If you disrupt your coding focus like that, you will never get into the flow state you really need to be in as a programmer.   Habit – 4 Trying to Write Perfect Code Striving for perfection will give you everything but perfection. Don’t spend 80% of your time trying to make 20% of it perfect.   Habit – 5 Not Planning Ahead If y...

Login using Session Cookies Source Code #55

Image
·          Create Database in phpmyadmin . CREATE   DATABASE   loginsesssion ; ·          Create table in loginsesssion . INSERT   INTO   `singup`   ( `username` ,   `password` )   VALUES   ( '' ,   '' ) Config.php   <?php $servername = "localhost"; $username = "root"; $password = ""; $db = "loginsesssion"; // Create connection $conn = mysqli_connect($servername, $username, $password, $db); // Check connection if(!$conn) {   die("Connection failed: " . mysqli_connect_error()); } echo "Connected successfully.."; ?>   login.php   <!DOCTYPE html> <html lang="en"> <head>   <title>Login | Registration</title>   <meta charset="utf-8">   <meta name="viewport" content="width=device-width, initial-scale=1">   <link rel="stylesheet" hre...

Best Data Loss Prevention Software Tools part-2 #54

Image
CLEARSWIFT ADAPTIVE DLP Tamarind DLP will help you to be compliant with GDPR, HIPAA, ISO 27001, and PCI DSS.  The tool starts off by searching your entire system for sensitive data.  The search follows typical data formats, such as Social Security or credit card numbers. It then prioritizes those that contain personally identifiable information, personal financial data, and personal health information.  Scans to spot new instances of these data categories continue during the software's service life.  Key Features: System audit GDPR, HIPAA, ISO 27001, and PCI DSS compliant Ongoing risk assessment     Prevent Secure Data Loss This is a good option if you are having trouble building your DLP security strategy. When you install the software, it will present you with a list of 70 policies that you can activate. Reading everyone's explanations will probably give you some suggestions for data control that you didn't think of. Data loss prevention is...

Best Data Loss Prevention Software Tools part-1 #53

Image
  SOLARWINDS DATA LOSS PREVENTION WITH ARM Solar Winds is a leading manufacturer of IT infrastructure monitoring tools and its DLP security solution is part of its Access Rights Manager. An important starting point in your data loss prevention strategy is to set a company policy on data access. Control. Solar Winds Access Rights Manager supports this task by giving you a clear report on current access permissions. Then you have the opportunity to set better controls, which can be implemented through the Access Rights Manager. Key Features: Access Rights Manager sports suspicious activity, automated responses to compliance with data security standards   COSOSYS ENDPOINT PROTECTOR CoSoSys provides an endpoint protector as an it inside solution, as a cloud-based service and as a standalone software package. The Sight version will protect computers running Windows, OS X and Linux. A central endpoint protector server tool Communicates across the network with client software...