You may also like
A guide to use images in blog posts
Different methods to split the vim screen
Remote Access (secure) through a Dropbox Account
How to Access MySQL Remotely
Possible ways to hack mail account
Google Glasses
About The Author
Jassi
He loves to write a blog on Application Security & Cloud Security, is also a co-founder of Alien Coders. He shares and helps engineering students and IT professionals in academics and career consulting.