You may also like
Minimal things every Blogger should know about web spam
Simple steps to verify email id existence
How to hide a file behind a jpeg file
No more fake accounts on Google+ : issues verfication badge
Apache HTTP server v2.2.19 released
Various ways to print the content of hash in Perl
About The Author
Jassi
He loves to write a blog on Application Security & Cloud Security, is also a co-founder of Alien Coders. He shares and helps engineering students and IT professionals in academics and career consulting.