SoftImpetus.com®

IT Tips, Tricks and Techniques
When your tutor has specific necessities for the style of your respective study cardstock, check them well before preparing your final write. The most widespread formatting is presented listed here. Any time you submit your cardstock, make sure you keep a obtain clone. Their list of works mentioned looks at the end of the newspaper, immediately after any endnotes. Get started on their list on the new site. Their list provides the identical working brain as being the key words. The web site numbering inside the working mind continues uninterrupted all through. By way of example, in case the textual content within your buy research papers using the presented web templates. So as to motivate and allow writers to totally cite and make on previous do the job, the guide area of papers may possibly optionally keep on beyond the 8 webpage limit for a couple of supplemental pages of content. Paperwork which do not conform to the newsletter suggestions cannot be recognised for review and will also be sent back to the authors.

BrowserStack – Browser Emulator

(October 2nd, 2015)

http://www.browserstack.com/user/dashboard

After installing add on BrowserStack allows to choose from all popular browsers with their various versions to display the specified websites.

It offers testing on

– All popular browsers like Firefox, Chrome, IE, Opera, Safari etc.
– All possible versions of each browser.
– A host of Operating Systems like Windows XP, Windows 7, Windows 8, Windows 10, iOS, Android, OS X etc.
– plenty of resolutions upto 2048 * 1536

Sql Injection.

(October 1st, 2015)

Checking Vulnerability: To check if the site is vulnerable to SQLi the most common way is to just add an apostrophe( ‘ ) after one of the parameters in the URL.

Example: http://www.site.com/news.php?id=4′

Now if the site is vulnerable it will show error like:

You have an error in your SQL Syntax

Warning: mysql_num_rows()
Warning: mysql_fetch_assoc()
Warning: mysql_result()
Warning: mysql_fetch_array()
Warning: mysql_numrows()
Warning: mysql_preg_match()

Why JQuery?

(August 9th, 2015)

911-essay.com

Selector Magic

(June 22nd, 2015)

Selecting Elements by Attribute

$( “input[name=’first_name’]” );

Selecting Elements by Compound CSS Selector

$( “#contents ul.people li” );

Read the rest of this entry »

JQuery Titbits

(May 20th, 2015)

To show/hide a div:

$("#thisdv").show('explode'); 	// where <div id="TempAddress">

$("#thisdv").hide('explode'); 


To remove an element:

 $("#removeme").remove(); 


To add html as a first element in a container (#content):
	$("#content").prepend('<div id="firstdv" >');


To add html element at the end in a container (#bannerimg)
	$("#content").append('<img src="...">');

How to Prevent sql injection:

(May 20th, 2015)

Use mysql_real_escape_string() function for every posted (input) thing so that any (possible) injected sql will only become a string constant and will not be able to execute.
Read the rest of this entry »

Export & Download to MS Excel Format.

(May 20th, 2015)

This simple php code fetches required records from the database and builds a CSV file with proper http headers so that the file is downloaded to the user’s machine.
Read the rest of this entry »

Multiple Files Upload Example.

(May 18th, 2015)

HTML:

	

<form name="fileupload_form" action="fileupload_proc.php" method="post" ENCTYPE="multipart/form-data">
<table border="0" cellspacing="0" cellpadding="0" width="500" align="center">
	<tr>
		<td align=center><input type="file" size=30 name="uploadfile_1" value=""/></td>
	</tr>
	
	<tr>
		<td align=center><input type="file" size=30 name="uploadfile_2" value=""/></td>
	</tr>

	<tr>
		<td align=center><input type="file" size=30 name="uploadfile_3" value=""/></td>
	</tr>
	
	<tr>
		<td align=center><input type="submit" name=submit value=submit/></td>
	</tr>	
</table>
</form>
	

Read the rest of this entry »