Archived Articles from the Category Miscellaneous
- Connecting to an HTTP Web Service from VBA Excel via Proxy
- Is there a way to pass a escape seq via command line in Java?
- Computation of 2's Complement and 1's Complement of a number
- Viewing/Editing PPT, TIFF, PDF, etc, directly in the browser
- SAX v/s DOM. Diff between SAX and DOM. When to use what?
- Evolution of Java-XML combo. SAX, DOM, JAXP, & JDOM
- Recovering Shift+Deleted emails/folders in MS Outlook
- Differences betwen Outlook Express & Microsoft Outlook?
- Resolving 'LoadLibrary failed - a DLL initialization routine failed'
- The 25 Most Dangerous Programming Errors listed by CWE/SANS
- XML Schema (XSD): definition, anatomy, advantages & applications.
- How do www, www1, www2, etc. differ? Role of DNS & CNAME?
- How does Password Encryption work in a real world scenario?
- Spring IoC: Inversion of Control. DI: Dependency Injection.
- AspectJ, Aspect Oriented Programming (AOP), Spring AOP
- Creating XML Doc from XSD. Creating XSL and applying on XML
- Image Processing using Java APIs. Dimensions, Regions, etc.
- MVC Pattern & its importance. Push & Pull Mech
- Creating Windows NT services for Java applications
- Web Vulnerability Detection: SQL Injection, XSS, GHDB
- What is XML and how is it different from HTML?
- ORM: Object Relational Mapping. JDO, Hibernate, SDO, etc.
- XML Databases: NXD, XAPI, Apache XIndice, Ozone DB, Sedna
- Evolution of Agile Methodology. Engineering vs Agile.
- SQL Injection - what's it and how can it be handled?
- How to generate unique primary key automatically in MySQL?
- Enterprise Service Bus (ESB) - What and Why?
No comments:
Post a Comment