• Main Menu
  • Programming

    • Java vs. JavaScript

      Java vs. JavaScript

      Java and JavaScript are two different programming languages meant for different purposes and functionality. Java is an application programming language designed to write stand-alone Java programs and web applications running on the Internet. JavaScript is a client-side scripting language specifically designed to work with various web technologies, but on the client’s end. To understand the

    • SQL Injection Attack / Vulnerability

      SQL Injection Attack / Vulnerability

      A SQL injection vulnerability can occur when a poorly-written program uses user-provided data in a database query without first validating the input. This is most-often found within web pages with dynamic content. There are some excellent tutorials and descriptive articles on this subject, as well as many vulnerability postings for different applications from full-disclosure websites.

    • Inserting in a Doubly Linked List

      Inserting in a Doubly Linked List

      Inserting an Element To insert an element in the list, the first task is to allocate memory for a new node, assign the element to be inserted to the info field of the node, and then the new node is placed at the appropriate position by adjusting appropriate pointers. Insertion in the list can take

    • javascript:void(0)

      javascript:void(0)

      The javascript:void(0) error is fairly unique, in that it  is one of the few computer-based errors that can be encountered by users of any operating system. The error is thrown on web browsers with the end-user surfs to websites that are not fully compatible with the version of Internet browser being used or have a

    • How to Find Security Vulnerabilities in Source Code

      How to Find Security Vulnerabilities in Source Code

      The original, and still the best, method for finding security vulnerabilities in source code is to read and understand the source code. Source code security vulnerabilities will vary between languages and platforms. Items to look for in C code include: Potential vulnerability Function calls to examine for vulnerabilities Buffer overflows gets(), scanf(), sprintf(), strcat(), strcpy()

    • Uninstall Java

      Uninstall Java

      Computer users sometimes need to uninstall Java, for various reasons. In case of upgrading Java, you needn’t remove the previous version of Java. Instead, you can simply run the executable of the newer Java version and the upgrade will automatically happen. However if you wish to uninstall Java, below are the methods for different platforms.

    • SDLC Methodology

      SDLC Methodology

      SDLC (Systems Development Life Cycle) is the process of creating or modifying existing systems and the models and methodologies that are used in the process. In the fields of software engineering and information systems, SDLC denotes a framework of methodologies aimed at the creation of an information/software system, i.e. the software development process. SDLC covers

    • Constructors in Derived Classes

      A constructor plays a vital role in initializing an object. An important note, while using constructors during inheritance, is that, as long as a base class constructor does not take any arguments, the derived class need not have a constructor function. However, if a base class contains a constructor with one or more arguments, then

    • Binary Tree – Searching a Node

      Binary Tree – Searching a Node

      An element in a binary search tree can be searched very quickly. A search operation on binary tree is similar to applying binary search technique to a sorted linear array. The element to be searched will be first compared with root node. If it matches with the root node then the search terminates. Otherwise search

    programming
    330 queries in 0.321 seconds.