You may also like
Get a new breed of websites and extensions by following some do’s and don’t’s
FastLoad in TeraData
Bit Torrent: an introduction about torrents
How to run .exe on a Webpage
Gmail allows access to multiple account: Multiple Sign-in
Various ways to print the content of hash in Perl
About The Author
Jassi
He loves to write a blog on Application Security & Cloud Security, is also a co-founder of Alien Coders. He shares and helps engineering students and IT professionals in academics and career consulting.