More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.
Things That Drive Us Nuts
Have you noticed the use of the reCaptcha feature at EE and other web sites? It wants you to read and retype something that looks like this.Insanity! It's not EE's fault - that's just the way reCaptcha works. But it is …
It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions.
Consider email address RFCs:
Look at HTML5 form input element (with type=email) regex pattern:
The viewer will learn the basics of jQuery including how to code hide show and toggles.
Reference your jQuery libraries:
Include your new external js/jQuery file:
Write your first lines of code to setup your site for jQuery…