Banner Ad

    A    L    W    A    Y    S           D    E    S    I    R    E           T    O           L    E    A    R    N           S    O    M    E    T    H    I    N    G           U    S    E    F    U    L   

Technology and business

technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other

Arthur C. Clarke

Any sufficiently advanced technology is indistinguishable from magic.

Bill Gates is a very rich man today... and do you want to know why? The answer is one word: versions.

Softwares

Defect-free software does not exist.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Monday, June 6, 2016

How to split word by new line character in PLSQL / SQL query with regular expressions




Convert above single lengthy word into several rows as following. 
Above 7 lines in single text box will take as 7 new lines as per below code.


Following is the PL-SQL cursor  to split single word into several words based on new line character

1.)   CHR(10) -- Line feed
2.)   CHR(13) -- Carriage return.

1
2
3
4
CURSOR get_work_desc(str_ VARCHAR2) IS
      SELECT
      regexp_substr(str_,'[^*' || chr(13) || chr(10) || ')]+',1,level,'m') AS work_description from 
dual connect by level <= regexp_count(str_,'[^*' || chr(13) || chr(10) || ')]+',1,'m');

Friday, November 8, 2013

All Head First Series Ebooks Collection for free

All Head First Series Ebooks Collection











Computers

Head First Data Analysis.pdf 23 MB
Head First Networking.pdf 38 MB
Head First WordPress.pdf 27 MB
HeadFirst WebDesign.pdf 40 MB

Languages

Head First Ajax.pdf 50 MB
Head First C#.pdf 71 MB
Head First HTML with CSS and XHTML.chm 1 MB
Head First HTML with CSS and XHTML.pdf 21 MB
Head First Java.pdf 34 MB
Head First Javascript.pdf 51 MB
Head First PHP and MySQL.pdf 32 MB
Head First Python.pdf 17 MB
Head First Rails.pdf 37 MB
Head First SQL.pdf 48 MB
Head First Servlets and JSP.pdf 64 MB

Mathematics

Head First 2D Geometry.pdf 21 MB
Head First Algebra.pdf 25 MB
Head First Physics.pdf 56 MB
Head First Statistics.pdf 37 MB

Others

Head First - PMP.pdf 59 MB
O'Reilly - Programming WPF, 2nd Edition.pdf 10 MB

Programming

Head First Design Patterns.pdf 39 MB
Head First Iphone Development.pdf 17 MB
Head First Object-Oriented Design and Analysis.pdf 52 MB
Head First Software Development.pdf 43 MB

http://torrage.com/torrent/0B4BB253080D3913E9C8251B3A4789BF3EFBD83F.torrent

Sunday, September 1, 2013

Easy and fast way to add PayPal payment gateway to your website

following is paypal Buy now button java script code
You need to add paypal-button.min.js   click here to download and
add as follows between your <head> tag 



or add github URL https://raw.github.com/paypal/JavaScriptButtons/master/dist/paypal-button.min.js


<script 
    data-callback="http://sep06.netne.net/online_portal/controller_b/post_ad/success" 
    data-tax="0" 
    data-shipping="0" 
    data-amount="5.5" 
    data-name="harsha" 
    data-button="buynow" src="https://raw.github.com/paypal/JavaScriptButtons/master/dist/paypal-button.min.js?merchant=harshagayan90@gmail.com"
>
</script>





here you need to customize your code as followsmerchant="Your paypal email"
data-name="What you need to appear in pay slip"
data-amount="How much money you want in $ s"

PHP codigniter ajax call to load dropdown when another dropdown changes

<select id="makes2" name="makes2" style="width:200px;" data-hint="" onchange="load_dropdown_content1($('#field2'), this.value)">
                          <?php 
$sql = mysql_query("SELECT distinct make FROM advertisements");
while ($row = mysql_fetch_array($sql)){
echo "<option value='".$row['make']."'>" . $row['make'] . "</option>";
}
?>

</select>



here my values are hard coded to load values from mysql database

when dropdown onchange() function following javascript function will be called


here my controller compareVehicles --> get_dropdown_values1 function is called asynchronously



<script type="text/javascript">


function load_dropdown_content1(field_dropdown1, selected_value1){
   var result = $.ajax({
        'url' : '<?php echo site_url('compareVehicles/get_dropdown_values1'); ?>/'+selected_value1,
        'async' : false
    }).responseText;
    field_dropdown1.replaceWith(result);





}


inside the controller my function as follows



function get_dropdown_values1($filter11){

        $this->load->model('model_c/cmp_vehi_model');

        $result1 = $this->cmp_vehi_model->get_options1($filter11);

foreach($result1 as  $key1 => $value1){

$final1 = array('{$key1}' => $value1);

}

        $this->load->helper('form');

       
echo "<select name=\"field2\" id=\"field2\" onchange=\"load_dropdown_contentad($('#field5'), this.value);\" onblur=\"load_dropdown_contentad($('#field5'), this.value);\"  onfocus=\"load_dropdown_contentad($('#field5'), this.value);\"  style=\"width:200px\"  >";
    

foreach($result1 as  $key1 => $value1){
echo"<option value='{$value1}'>{$value1}</option>";
}

echo "</select>";


    }





model that is calling from controller as follows


function get_options1($filter11){

$query1 = $this->db->query("SELECT distinct modelnumber FROM advertisements WHERE make LIKE '".$filter11."'");
$result1 = $query1->result_array();

$x1 = array();
foreach($result1 as $i1){

array_push($x1, $i1['modelnumber']);

}


 
        return $x1;

    }



in my controller php code is  echo to load ajax called dropdown
Please go to following link to see how it works
http://sep06.netne.net/online_portal/index.php/controller_c/compareVehicles/cmpVehicles

How to define static javascript variable

<script type="text/javascript">
checkadid.count=0;
checkadid.adid="";



function checkadid(checkbox)
{

checkadid.adid=checkadid.adid.concat(checkbox.value);

    if (checkbox.checked)
    {
        
    }


}

</script>


here my javascript static variable is checkadid.adid
since javascripts are weakly type there is no hard and fast rules you need to define variable as above

and i used this static variable access to following java script function


function load_table(){


 
var aid=checkadid.adid;
 
if(aid.length<=6){
 
alert("Please select at least 2 advertistment")
 
}
else{
     window.location.href="<?php echo site_url('controller_c/compareVehicles/ctable'); ?>?aid="+aid;

}

  }



static java script variable can access from any where within any javascript function

Click here to learn about javascript variables





Monday, March 25, 2013

Vehicle Reservation System

2nd year 1st semester programming assignment(Vehicle reservation system)


you must restore mysql database for run this software Click here to download SQL file

If you are having problem with generating ireports this will help you. (download ireport basic tutorial)



Software developed using Netbeans IDE  1.7JDK
For generating reports i used  (iroport)
database  : mySql



following are some of the screen shots of the software












Sunday, March 24, 2013

Ethical Hacking






Files:
01.Introduction / 01.Course Overview.mov 2 MB

02.Ethical Hacking & Penetration Testing / 01.What is Ethical Hacking.mov 2.1 MB
02.Ethical Hacking & Penetration Testing / 02.Types of Ethical Hacking.mov 2.2 MB
02.Ethical Hacking & Penetration Testing / 03.Responsibilities of the Ethical Hacker .mov 1.3 MB
02.Ethical Hacking & Penetration Testing / 04.Customer Expectations.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 05.Skills of the Hacker.mov 1.8 MB
02.Ethical Hacking & Penetration Testing / 06.Relevant Laws.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 07.Preparation.mov 1.9 MB
02.Ethical Hacking & Penetration Testing / 08.Types of Attacks.mov 828.9 KB

03.Methodology Overview / 01.Your Goals.mov 1.1 MB
03.Methodology Overview / 02.Formal Methodologies.mov 1.8 MB
03.Methodology Overview / 03.Reconnaissance.mov 1.4 MB
03.Methodology Overview / 04.Scanning.mov 1.2 MB
03.Methodology Overview / 05.Service Enumeration.mov 1.5 MB
03.Methodology Overview / 06.Vulnerability Assessment.mov 1.1 MB
03.Methodology Overview / 07.Vulnerability Exploitation.mov 1.3 MB
03.Methodology Overview / 08.Privilege Escalation & Owning the Box.mov 1.1 MB
03.Methodology Overview / 09.Evading Defenses & Erasing Tracks.mov 1.6 MB
03.Methodology Overview / 10.Maintaining & Expanding Access.mov 1.4 MB

04.Reconnaissance (Footprinting) / 01.Passive Reconnaissance.mov 2.2 MB
04.Reconnaissance (Footprinting) / 02.Using WHOIS & Other Tools.mov 1.3 MB
04.Reconnaissance (Footprinting) / 03.Active Reconnaissance.mov 1.7 MB
04.Reconnaissance (Footprinting) / 04.Active Reconnaissance Tools & Methods.mov 1.9 MB
04.Reconnaissance (Footprinting) / 05.Putting It All Together.mov 1.4 MB
04.Reconnaissance (Footprinting) / 06.Reconnaissance Demo.mov 8.8 MB

05.Scanning / 01.Scanning For Hosts.mov 1.1 MB
05.Scanning / 02.TCP Connection Basics.mov 1.9 MB
05.Scanning / 03.TCP Scan Types.mov 3 MB
05.Scanning / 04.UDP & ICMP Scanning.mov 1.5 MB
05.Scanning / 05.Scanning Demonstration using NMAP.mov 5.7 MB

06.Port & Service Enumeration / 01.Identifying Ports & Services.mov 1.4 MB
06.Port & Service Enumeration / 02.OS Fingerprinting.mov 1.2 MB
06.Port & Service Enumeration / 03.Popular Scanners.mov 844.2 KB
06.Port & Service Enumeration / 04.Demonstration.mov 5.9 MB

07.Data Enumeration / 01.Data Enumeration.mov 2.1 MB
07.Data Enumeration / 02.SNMP Enumeration.mov 6.4 MB
07.Data Enumeration / 03.DNS Zone Transfers.mov 3.3 MB
07.Data Enumeration / 04.Windows Null Sessions.mov 3.3 MB
07.Data Enumeration / 05.NetBIOS Enumeration.mov 4.4 MB
07.Data Enumeration / 06.Active Directory Extraction.mov 1.2 MB

08.Vulnerability Assessment / 01.OS Vulnerabilities.mov 2.4 MB
08.Vulnerability Assessment / 02.Vulnerabilities & Exploits.mov 2.7 MB
08.Vulnerability Assessment / 03.Web Server Vulnerabilities.mov 2.9 MB
08.Vulnerability Assessment / 04.Database Vulnerabilities.mov 2.3 MB
08.Vulnerability Assessment / 05.TCP Stack Vulnerabilities.mov 1.7 MB
08.Vulnerability Assessment / 06.Application Vulnerabilities.mov 1.3 MB
08.Vulnerability Assessment / 07.Vulnerability Assesment.mov 5.1 MB

09.Penetration Access Compromise Pt.1 / 01.Penetrating the System Pt.1.mov 2.2 MB
09.Penetration Access Compromise Pt.1 / 02.Penetrating the System Pt.2.mov 1.2 MB
09.Penetration Access Compromise Pt.1 / 03.Bypassing Access Controls.mov 2.7 MB
09.Penetration Access Compromise Pt.1 / 04.Password Cracking Pt.1.mov 1.9 MB
09.Penetration Access Compromise Pt.1 / 05.Password Cracking Pt.2.mov 3.5 MB
09.Penetration Access Compromise Pt.1 / 06.Social Engineering.mov 2.7 MB

10.Penetration Access Compromise Pt.2 / 01.Session Hijacking Pt.1.mov 2.5 MB
10.Penetration Access Compromise Pt.2 / 02.Session Hijacking Pt.2.mov 6.8 MB
10.Penetration Access Compromise Pt.2 / 03.Privilege Escalation.mov 2.1 MB
10.Penetration Access Compromise Pt.2 / 04.Maintaining & Expanding Access.mov  3.1 MB
10.Penetration Access Compromise Pt.2 / 05.System Compromise.mov 1.9 MB

11.Evading Defenses & Erasing Tracks / 01.Where Your Actions Recorded Pt.1.mov 828.7 KB
11.Evading Defenses & Erasing Tracks / 02.Where Your Actions Recorded Pt.2.mov 2.6 MB
11.Evading Defenses & Erasing Tracks / 03.Deleting Log Files & Other Evidence Pt.1.mov 1.4 MB
11.Evading Defenses & Erasing Tracks / 04.Deleting Log Files & Other Evidence Pt.2.mov 2MB
11.Evading Defenses & Erasing Tracks / 05.Rootkits.mov 2.4 MB
11.Evading Defenses & Erasing Tracks / 06.Steganography.mov 4.6 MB
11.Evading Defenses & Erasing Tracks / 07.Evading IDS & Firewalls.mov 1.9 MB

12.Introduction to Hacking Techniques Pt.1 / 01.Encryption.mov 2.3 MB
12.Introduction to Hacking Techniques Pt.1 / 02.Sniffers.mov 1.8 MB
12.Introduction to Hacking Techniques Pt.1 / 03.Wireless hacking.mov 2.9 MB
12.Introduction to Hacking Techniques Pt.1 / 04.SQL Injection.mov 1.9 MB

13.Introduction to Hacking Techniques Pt.2 / 01.Buffer Overflows.mov 2.3 MB
13.Introduction to Hacking Techniques Pt.2 / 02.Rootkits.mov 1.6 MB
13.Introduction to Hacking Techniques Pt.2 / 03.Spoofing.mov 1.9 MB
13.Introduction to Hacking Techniques Pt.2 / 04.Denial of Service Attacks.mov 1.7 MB
13.Introduction to Hacking Techniques Pt.2 / 05.Web Hacking.mov 2.8 MB

14.Popular Tools / 01.nmap Pt.1.mov 3.7 MB
14.Popular Tools / 02.nmap Pt.2.mov 1.4 MB
14.Popular Tools / 03.SuperScan.mov 6.3 MB
14.Popular Tools / 04.Nessus.mov 4.5 MB

15.Penetration Test Demo / 01.Penetration Test Demo Pt.1.mov 855 KB
15.Penetration Test Demo / 02.Penetration Test Demo Pt.2.mov 474.9 KB
15.Penetration Test Demo / 03.Penetration Test Demo Pt.3.mov 509.9 KB

16.Credits / 01.About the Authors.mov 674.2 KB

Related Posts Plugin for WordPress, Blogger...

your comments