Quantcast
Channel: The Crazy Programmer
Browsing all 761 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to Protect Your Small Business from a Hacker Attack

Data breaches and compromised websites frequently used to spread malware can be risky for your business; including small businesses. In fact, small or medium-sized businesses are likely to suffer more...

View Article


Difference Between MySQL and ORACLE

Here you will get to know about difference between mysql and oracle database. Both MySQL and Oracle are popular relational database management software developed by Oracle Corporation. MySQL: Its name...

View Article


Image may be NSFW.
Clik here to view.

5 Best Django Books for Beginners

Here you will find list of best django books for beginners to learn. If you’re eager to learn Django as it is so popular nowadays for its simplicity, then you can follow our articles that made Django...

View Article

Image may be NSFW.
Clik here to view.

Data Encryption Standard (DES) Algorithm

Data Encryption Standard is a symmetric-key algorithm for the encrypting the data. It comes under block cipher algorithm which follows Feistel structure. Here is the block diagram of Data Encryption...

View Article

Image may be NSFW.
Clik here to view.

Why Alert Fatigue Remains a Database Performance Threat

Unlike a decade ago, databases have become more complex than before, but so have the means to spot performance issues evolved. For their businesses to remain at par with the ever-changing IT...

View Article


Difference between Class and Structure

Here you will learn about difference between class and structure. A class and a structure, both are user defined data types and understanding the difference between both of them might be confusing at...

View Article

Image may be NSFW.
Clik here to view.

Django PostgreSQL Installation and Setup

We’ll know that SQLite is very powerful, embedded relational database management system and it offers a really amazing set of tools to manage approximately all sorts of data. But when it comes...

View Article

Did you know that the bug search tools in Java code have bugs too?

The PVS-Studio development doesn’t stand still – the team is always monitoring new trends in programming and working hard on further analyzer development. The biggest feature that appeared in the...

View Article


Image may be NSFW.
Clik here to view.

Thrashing in Operating System (OS)

When a program need space larger than RAM or it need space when RAM is full, Operating System will try to allocate space from secondary memory and behaves like it has that much amount of memory by...

View Article


Image may be NSFW.
Clik here to view.

Difference between Von Neumann and Harvard Architecture

Architecture of a micro computer or a micro controller refers to the arrangement of the CPU with respect of the RAM and ROM. Hence, the Von-Neuman and Harvard architecture are the two ways through...

View Article

Image may be NSFW.
Clik here to view.

How to Install Joomla 3 on Web Hosting – A Complete Guide

Joomla is among the most popular free Content Management Systems (CMS) in the world. It helps in creating and managing dynamic websites with its intuitive management interface. In short, it is a...

View Article

Image may be NSFW.
Clik here to view.

Django – Getting Data from PostgreSQL and Showing it to Template

In this Django tutorial, we’ll see how we can get the data stored in the database and display it to the template. Prerequisites Have a look on the previous article, in which we’ve seen how to create an...

View Article

Image may be NSFW.
Clik here to view.

Android Deep Linking Example

In this tutorial you will learn about android deep linking with an example. In deep linking first we have to understand what does an URI means. Let us consider an example of URI,...

View Article


Image may be NSFW.
Clik here to view.

Running Unikernels from Existing Linux Applications with OPS

Unikernels are an emerging deployment pattern that engineers are choosing over Linux and Docker because of their performance, security and size. Researchers from NEC are reporting boot times in 5ms...

View Article

Image may be NSFW.
Clik here to view.

Django Blog Tutorial – Make A Simple Blog

In this tutorial, we’ll discuss about how to make a simple Blog in Django 2. Our blog will have TITLE, PICTURE, DESCRIPTION (Body), DATE.  There will be two pages, one for showing all the blogs at one...

View Article


Image may be NSFW.
Clik here to view.

Types of Operating System

An operating system is the basic mechanism behind the working of the computer systems and mobile devices and so, understanding the operating system becomes very important from a user’s perspective. The...

View Article

Image may be NSFW.
Clik here to view.

Top 7 Alternative Solutions for iCloud Unlock 2019

iCloud Unlock tool is a very efficient and effective tool to bypass the iCloud activation lock of the iPhone. It is a software which can be installed on any phone and can be used to remove the iCloud...

View Article


Image may be NSFW.
Clik here to view.

Programming Languages for Students

You do not have to enroll for a Computer Science degree to start doing some programming or coding. As a student, you can learn some programming languages that can help you achieve your dreams while...

View Article

Image may be NSFW.
Clik here to view.

Helpful Tips to Make Your New App More Secure

Up to 92 percent of all apps available today have security weaknesses or flaws that can be easily exploited by nefarious cyber-criminals. If you are creating an app or planning to launch one in the...

View Article

Image may be NSFW.
Clik here to view.

OpenVPN vs PPTP vs L2TP – VPN Protocols Comparison

You realize that you need a VPN. The decision that you have to make is if you want to set up a VPN or if you want to use a VPN provider. If you go the provider route, the provider may ask you to choose...

View Article
Browsing all 761 articles
Browse latest View live