This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.
/

OpenSSL CCS Injection Vulnerability (CVE-2014-0224) detector

Hello Everyone, As many of you aware OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the [...]

By | February 4th, 2016|SSL|0 Comments

Change an email signature – Microsoft Outlook

Introduction: In this tutorial we will guide you how to setup / configure signature in Microsoft Outlook 2007. Process: Step 1: Open Outlook application. Step 2: Go to Tools menu -> Options. Step 3: In Options, Go to -> Mail Format tab. Step 4: Under Signatures section -> Click on Signatures… Step 5: In E-mail [...]

By | January 4th, 2016|Operating Systems, Windows|0 Comments

How to encrypt Datasource password in JBoss?

The data source password is encrypted using the SecureIdentityLoginModule main method by passing in the clear text password. The SecureIdentityLoginModule is provided by jbosssx.jar. This procedure is for JBoss Enterprise Application Platform versions 5.1 and later Change directory to the jboss-as directory Linux command [crayon-572954ea8bbcd924386382/] Windows command: [crayon-572954ea8bbd7713870874/]   The command will return an encrypted [...]

By | December 23rd, 2015|JBoss|0 Comments

SOA realtime interview questions

1) Tell me about Your self? 2) We have 10 SOA managed server in cluster can we configure those 10 SOA managed servers in two SOA domains for same environment? 3) How many types of deployments in weblogic?Can u explain? 4) What is dehydration store in weblogic? 5) How to install OHS?How to configure OHS [...]

By | December 20th, 2015|SOA Suite 11g, WebLogic Server|0 Comments

What are the differences between JBOSS vs Tomcat?

  JBOSS TOMCAT JBOSS is an Application Server Tomcat is a servlet container, i.e. provides a framework for deploying and running servlets (including JSP) in a webserver JBOSS is for heavy-duty J2EE apps Tomcat is for J2SE stuff JBoss supports EJB and JMS related stuff Tomcat is a pure servlet engine, with no EJB Uses more [...]

By | November 23rd, 2015|JBoss, Other Middlewares, Tomcat|0 Comments

How to view application logs in windows 7?

Introduction: In this tutorial we will guide you how to view application, security, setup and system logs on Windows7. Windows logs are categorized in to multiple logs, Following are Windows Event logs: Application Log – Contains applications or program logs. Security Log - Contains valid and invalid login attempts. Setup Log – Contains [...]

By | November 19th, 2015|Operating Systems, Windows|0 Comments

How to verify if user account exists in Linux/Unix?

Introduction In this article our objective is to verify if user account exists in Redhat enterprise Linux machine running with the Operating system version 6.5. Process Step 1: Login to server with Username and password. Step 2: Run following command to find the user details. Syntax: $ cat /etc/passwd | grep [...]

By | November 12th, 2015|Operating Systems, UNIX - LINUX|0 Comments

Installing Stash on Linux

Introduction In this article, we will learn how to install Stash server on Redhat Linux server. Process Download stash software from atlassian site and run the following command. [crayon-572954ea8bf0d538969155/] Starting Installer ... This will install Stash 3.8.0 on your computer. OK [o, Enter], Cancel [c] Please choose one of the following: Install a [...]

By | November 10th, 2015|Stash, Tools|0 Comments

Managing Services in Solaris

% svcs -l network/login:rlogin Shows the Status of the rlogin Service % svcs –a Show status of all services % inetadm Show status of services controlled by inetd % svcs –D milestone/multi-user Displays services instances dependent on the multiuser milestone % svcs –d milestone/multi-user:default Display the Service Instances That the Multiuser Milestone Is Dependent On [...]

By | November 8th, 2015|Operating Systems, Solaris|0 Comments

Types of Performance Testing

Baseline Testing – Less users than we expect in production. This is like when manual testers perform a user scenario and use a stopwatch to time it. It could also be an automated load test where we are using less than the expected number of users to generate load. This will be normally done to [...]

By | March 2nd, 2015|Software Testing|0 Comments