Sign in

| Learner |

If you are in a situation that you need to sign out a Gmail account among multiple Gmail account, then this article is handy for you.

Google forces to sign out of all accounts

If you forgot to sign out of your Gmail on another device, you could remotely sign out of Gmail using the steps in this article. Let’s see the steps.

  1. Open your Gmail account.
  2. Tap on your profile photo from top right corner. It will list all the logged Gmail account.
  3. Tap on the Gmail account that you want to sign out and select “Manage your Google Account”. (Shown below)


How to develop ASP.NET Core MVC application with and without Entity Framework using VS code? Let’s see

Credit: Google Images

Prerequisites (For both with EF and without EF)

  1. .NET Core SDK

If you have already installed .NET Core SDK then check whether SDK installed .(as shown in figure 1)


Let’s see about How does the JavaScript technology and JavaScript frameworks that mainly preferred to build awesome user experience especially full-stack development.

Credit: Google Images

Applications that we developing are more user friendly, upgraded periodically, secure accessibility of modern web technologies, centralized web apps updates and smooth implementation by software architectures. Because of code once, run everywhere concept.

How it will runs?

In a traditional approach, a company will maintain the iOS team, android team, web team, desktop team for developing web applications. Here, cost of operation, effectiveness, and difference in UI, business logic are also considered. So, we move to cross-platform — the web team will…


Let’s talk about Full-stack development- MERN. This blog covers theoretical concepts alone.

Credit : Google Images

Web Development — designing a website or application built for an awesome user experience. Then what is full-stack development?

Full Stack Development

Simply, working on both the front-end and back-end of the application. More specifically, stack means different technologies being used to build applications. That application concentrate on both front-end(client) and back-end(server) also take care of the database.

We all know HTML, CSS, JavaScript, jQuery, PHP, asp.net, python, java are used in web development to build websites/applications more interactive. But in full-stack development JavaScript(MERN, MEAN) plays a major role.

Best JS…


Let’s discuss Node.js. Why we use node.js for single-page application?

Credit: Google Images.

We know JS language is used to create applications more interactive. Now, it is used with desktop, mobile, and web applications and servers.

Webserver

Web applications which we request from the client are stored in a web server and we termed this as client-server communication. Now, we just look at some kind of requests that we normally know.

If a client requests some kind of calculations to the server then it takes x milliseconds and returns the result as the response. This is called CPU intensive.

If a client requests any…


Lets start about fingerprints and its related stuffs. Moreover, we see about how fingerprints are identified.

Introduction to fingerprints


SQL statements: DDL, DQL, DML, DCL, TCL.

SQL Statements

SQL-Structured Query Language is a standard language for storing, manipulating and retrieving data from databases.

SQL statements are categorized into

  1. DDL (Data Definition Language),
  2. DQL (Data Query Language),
  3. DML (Data Manipulation Language),
  4. DCL (Data Control Language),
  5. TCL (Transaction Control Language),

Sometimes, Select query which we categorized as DQL may be considered in DML.

DDL

Data Definition Language is used to define database schema. Also, to create and modify the structure of database(db).

Database schema means a skeleton / structure which represents logical view of the entire database.

Create

To create database or its…


How exactly cloud computing emerged?

Photo by Volodymyr Hryshchenko on Unsplash

Enterprise Architecture(EA) is a conceptual model that defines the structure and operation of an organization. The conceptual model is an abstraction of things that are made of concepts. These concepts help people (stakeholders) to know, understand, and analyze.

Ex: Consider an organization which was started recently and how it will compete against its competitor and withstand the modern market environment.

The organization should adapt the technology upgrade so the organization transforms itself to thrive in the future. Apart from technology changes they should shine against their competitors who may be a startup or a legacy…


Grab it ! Gain it !

Credit: Unsplash

OWASP TOP 10 SECURITY RISKS — WEB & MOBILE | SERVERLESS GOAT.

According to OWASP, it is a nonprofit foundation that works to improve the security of software.

Simply, OWASP provides standard Top 10 security risk documentation which tells about the most critical web application security risks. Using this document, to ensure that the companies adopt and defend from the security risks. Also, if you are reporting any bugs to a company they will consider this document for vulnerability scope.

Top 10 Web Application Security Risks:

  1. Injection,
  2. Broken Authentication,
  3. Sensitive Data Exposure,
  4. XML External Entities (XXE),
  5. Broken Access Control,
  6. Security Misconfiguration,
  7. Cross-Site Scripting XSS,
  8. Insecure Deserialization,

YESHWANTHINI S

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store