Recently I was involved in a project, which involved converting all links from http to https, basically making the site SSL enabled. After we did the changes we needed to measure the performance of the pages. You can test this using a combination of techniques described here : a. Using chrome developer tools, you can
You would have probably learnt about using sprites from here http://www.w3schools.com/css/css_image_sprites.asp or somewhere else on the web. Many tutorials who have told you to use background positioning to position the sprite. This is somewhat correct, but you aren’t really thinking long term over here. If in the future, there is a change in the sprite generation
I got this screenshot from JCPenny’s website. These guys should know better ways to position the arrow. Bad work !! The code is below where the absolute positioning is used. The ideal way is to position this with respect to the parent DIV. This would have solved the issue.
Whats an email template ? I am sure, you would have come across many emails from different companies in your inbox. This might be for a receipt, advertising or daily deals. You might have also marked some of them as spam. The html used to write this can be called as an email template. Even though we
a. aligning an object in center of another div : margin-left: auto; margin-right: auto; b. positioning a div anywhere on the screen. top doesn’t work without position being set as absolute. position: absolute; left: 94px; top: 154px; c. rotating a image transform: rotate(-180deg); -ms-transform: rotate(-180deg); /* IE 9 */ -webkit-transform: rotate(-180deg); /* Safari and Chrome
Recently I had to design a form which works on both the desktop, tablet and mobile screens. As you know there are a number of resolutions out there, it becomes quite overwhelming to decide which screen resolution to support and not to. This is where the responsive queries come into picture. At the end of
Sometime you might be annoyed at the history of your web browsing being stored in chrome. I dont think there is a option in chrome not to store any history. You can either delete all hitory in chrome. the best way would be to start chrome in incognito mode always. You can create a shortcut
Continuing the series from Agnitum firewall guide: 3 . Application window control Windows allows applications to exchange window messages between processes. Malicious processes can get control over other network-enabled applications sending them window messages and imitating user input from keyboard and mouse clicks. The example of using this technique is Breakout leaktest (http://www.firewallleaktester.com/leaktest16.htm). Here the
Below are some penetration techniques I recently came across in the agnitum firewall guide. I thought I would share it with all who are doing some sort of tests of their firewall or just FYI. 1. Components injection Windows operating system by design enables installing system interceptors (hooks) through which foreign code can be injected
XPath is one language, if call it so which is increasingly being used everywhere. Is used from development to testing environment. In the testing fields, its been used as a add on for many testing tools. Consider SoapUI which is used for testing and developing web services. Over here XPath can be used to trace
Recently started to learn about grease monkey. For newbies grease monkey in my words, is a way to alter any webpages for your own purposes on the client side. My first installation of user scripts started pretty bad. I couldnt figure out why I was getting the below error. Something like cannot launch editor: [Exception:
I just wrote this small code snippet to read a rss/xml/atom using the feedparser library. Hope you might find it useful. I read from the XML, which is my feed and then write to file which represents a SQL query for easy insertion into a DB> import feedparser d = feedparser.parse(“blog.xml”) print d[‘feed’][‘title’] total_len =
Many of us would be of the opinion that you firewall would protect you from the ugly world. But this might not be the case. Even though your firewall works fine when you have logged in, it might not work when you have logged off. Intruders can access a powered on machine with a login
If you ever wondered how you can fully customize your browser, this is it: Goto your browser tab, enter -> about:config You will be taken to a full screen of settings. but be careful. Also you want to view your cache or delete it use about:cache. about:plugins is another one you can try. about:blank sounds