Tutorial by Examples: o

I am using eclipse here, and you need to add below given dependency to your pom.xml 1.) POM.XML <project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://m...
dplyr uses Non-Standard Evaluation(NSE), which is why we normally can use the variable names without quotes. However, sometimes during the data pipeline, we need to get our variable names from other sources such as a Shiny selection box. In case of functions like select, we can just use select_ to u...
Using Select2 in a Bootstrap Modal/PopUp If you are using Bootstrap Modal then be sure that Model tabindex=-1 is removed. $('#targetId').select2({ width: '100%', dropdownParent: $("#myModal") })
How to find documents created 60 seconds ago seconds = 60 gen_time = datetime.datetime.today() - datetime.timedelta(seconds=seconds) dummy_id = ObjectId.from_datetime(gen_time) db.CollectionName.find({"_id": {"$gte": dummy_id}}) If you're in a different timezone, y...
XSS means cross-site scripting. CodeIgniter comes with XSS filtering security. This filter will prevent any malicious JavaScript code or any other code that attempts to hijack cookie and do malicious activities. To filter data through the XSS filter, use the xss_clean() method as shown below. $data...
SQL injection is an attack made on the database query. In PHP, we use mysql_real_escape_string() function to prevent this along with other techniques but CodeIgniter provides inbuilt functions and libraries to prevent this. We can prevent SQL Injection in CodeIgniter in the following three ways − ...
In production environment, we often do not want to display any error message to the users. It is good if it is enabled in the development environment for debugging purposes. These error messages may contain some information, which we should not show to the site users for security reasons. There are...
CSRF stands for cross-site request forgery. You can prevent this attack by enabling an option in the application/config/config.php file as shown below. $config['csrf_protection'] = TRUE; When you create a form using the form_open() function, it will automatically insert a CSRF token in a hidden ...
// XSS Filtering $data = array( 'name'=> '<script>Abuse Data</script>' ); $data = $this->security->xss_clean($data); // Clean Data // Escaping Queries <?php $username = $this->input->post('username'); $query = 'SELECT * FROM subscribers_tbl ...
Don't rely on any user input. user input everything like <script> tag or any javascript alert(); so we have to prevent this all data will no run in our browser. so we have to use xss prevention method to restrict our secure data to kept in hacker hand and also it's developer's responsibility t...
<?php // Setting parameters $time = time(); $values = [7, $time, $time]; // Prints "At 3:50:31 PM on Apr 19, 2015, there was a disturbance on planet 7." $pattern = "At {1, time} on {1, date}, there was a disturbance on planet {0, number}."; $formatter = new Messa...
import com.ibm.icu.text.MessageFormat import java.util.Locale import scala.collection.JavaConverters._ // Outputs "A common message for all options. Selected: (other)" val formatted = new MessageFormat( "{messageCount, plural, one {{aMessage} (one)} other {{aMessage} (othe...
It's relatively easy to parse the command line by hand if you aren't looking for anything too complex: # Naive error checking abort('Usage: ' + $0 + ' site id ...') unless ARGV.length >= 2 # First item (site) is mandatory site = ARGV.shift ARGV.each do | id | # Do something interestin...
Detailed instructions on getting identityserver4 set up or installed.
Suppose you had an array: pair = ['Jack','Jill'] And a method that takes two arguments: def print_pair (a, b) puts "#{a} and #{b} are a good couple!" end You might think you could just pass the array: print_pair(pair) # wrong number of arguments (1 for 2) (ArgumentError) Si...
The splat operator removes individual elements of an array and makes them into a list. This is most commonly used to create a method that accepts a variable number of arguments: # First parameter is the subject and the following parameters are their spouses def print_spouses(person, *spouses) s...
Harp doesn’t require any configuration to get started. Install Harp in your terminal using the command: npm install -g harp. $ sudo npm install -g harp $ harp init myproject $ harp server myproject
When you have an ajax call, it's extremely difficult to get a log from inside of the callback function. But if you enable the debugging define('WP_DEBUG', true); and then after that add ini_set('log_errors',TRUE); ini_set('error_reporting', E_ALL); ini_set('error_log', dirname(__FILE__) . '/e...
One of the central difficulties of writing an Android application using Dagger is that many Android framework classes are instantiated by the OS itself, like Activity and Fragment, but Dagger works best if it can create all the injected objects. Instead, you have to perform members injection in a li...
By setting Multi-Release: true in the MANIFEST.MF file, the Jar file becomes a multi-release Jar and the Java runtime (as long as it supports the MRJAR format) will pick the appropriate versions of classes depending on the current major version. The structure of such a Jar is the following: jar ro...

Page 960 of 1038