Development, Social Media »

[25 Nov 2013 | No Comment | 1,432 views]

How are game developers adjusting to accommodate our constant need for connectivity?

Best_Practices, Development, Programming »

[5 Apr 2013 | One Comment | 3,522 views]

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and which vulnerability scanners to use in order to avoid leaving vulnerabilities undiscovered in parts of the application?

Development, Ubuntu »

[20 Feb 2013 | No Comment | 5,713 views]

The Error and other log Files for Apache in Ubuntu is stored at the directory /var/log/apache2
To find the exact locaiton of these files you can adopt following steps.
The file for Apache Access and Error Logs are defined in the Apache Config at
To find the declaration you can grep the config file.

# grep ErrorLog /etc/apache2/apache2.conf

It will give you an Output like following

# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
ErrorLog ${APACHE_LOG_DIR}/error.log

APACHE_LOG_DIR is a Environment Variable for Apache defined in /etc/apache2/envvars
If …

Development, LAMP, Open Source, Productivity, Ubuntu »

[28 Jul 2012 | One Comment | 5,705 views]

Function to Extract a Compressed File.
The Function auto detects the Compression method and runs the appropriate Command to Extract the File.

function extract()
if [ -f $1 ] ; then
case $1 in
*.tar.bz2) tar xjf $1 ;;
*.tar.gz) tar xzf $1 …

Development, LAMP, Open Source, Programming, Technology »

[27 Jun 2011 | 8 Comments | 21,208 views]

This Blog Post describes How you can force ssh to use Password instead of Public Key. Bypassing the default behaviour of using Public Keys for Authentication.

Facebook, Social Media »

[17 Feb 2011 | 3 Comments | 7,643 views]

Use Facebook as a Page..

All Comments and everything you do will be on behalf of that page..

You can do so from Accounts(From Top Right) => Use Facebook as Page and Select the Page for which you want to use Facebook.

Development »

[11 Jan 2011 | 6 Comments | 13,598 views]

You may sometime want your Brwoser to scroll to a part of the HTML Document.
Typically when you load some content uisng AJAX, you would want to srcroll to the element which was updated.
You can do this with the following javascript code.

document.scrollTo(0, document.getElementById(‘id-of-element’).offsetTop);

Enjoy Coding.

Development »

[27 Sep 2010 | No Comment | 7,352 views]

CWG Stadiums, Delhi, India

So what do you say now?? Do you still think India can't organize commonwealth games??Criticizing the flaws is too easy, but appreciating the efforts is comparatively difficult. If u  cannot do anything u are no one to criticize as well..    

Disclaimer: I received this email …

Development »

[9 Aug 2010 | 2 Comments | 6,348 views]


New Indian Coin

Posted via email from Bijay Rungta aka rungss’s posterous, Spreading Knowledge..

Development »

[12 Jul 2010 | 2 Comments | 6,457 views]

Design your page to be compatible with Skype
By default, the Skype Toolbar will parse each web page and attempt to find phone numbers within the html code. You can prevent this behavior by "telling" the Skype Toolbar that your site is compatible with Skype. This will stop it from searching for numbers and make it search only for special Skype tags.
Simply add the following meta tag to your page headers,
Now the Skype Toolbar will only reformat numbers that have special Skype tags. If you have …

Related Posts with Thumbnails