You may also like
Hiding sensitive header response for IIS server
Minimal Introduction on Regular Expression
How to find out , who is Invisible (In Gmail)
How do we achieve maximum data rate in HSDPA and HSUPA
FastLoad in TeraData
How to Protect your website from being copied
About The Author
Jassi
He loves to write a blog on Application Security & Cloud Security, is also a co-founder of Alien Coders. He shares and helps engineering students and IT professionals in academics and career consulting.