authincator
Articles Lists

What is authentication application?

Security is the main thing to keep our application robust and manage identically. Nowadays many application security is broken by national and international hackers. The Application used to authenticate a user known as authentication application. Mainly Authentication app implements two-step verification services using the Time-based One-time Password Algorithm. Today’s authenticator app is used in Web hosting […]

feature post
Coding Tips PHP WordPress

How to Create Breaking Post with feature image on WordPress Site Code Example:

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. <?php $recent_posts = wp_get_recent_posts(array( ‘numberposts’ => 2, // Number of recent posts thumbnails to display ‘post_status’ => ‘publish’ // Show only the published posts )); foreach($recent_posts as $post) : ?> <center> <a href=”<?php echo get_permalink($post[‘ID’]) […]

Close-up of male hands using laptop in home.
Lists

What is management information system?

Management + Information + System System: A set of interrelated parts that must work together to achieve a common goal Input Process Output Feedback/ control/ evaluation Information is meaningful data related to something Management: Is an art & science of getting things done by and through people Effectiveness (to achieve a goal) Efficiency – Utilization […]

estrategy
Digital Marketing Lists

What do you understand by e-strategy?

The strategy is defined as a high-level plan to achieve one or more goals under certain and uncertain conditions. Strategy in online business is also referred to as e-strategy and it covers all aspects of marketing, public relations, advertising, media, strategic communication as well as online communication. The e-strategy for e-commerce emphasizes how the web […]

unix file
Lists

The Root Directory in Unix (Linux)

The root directory in UNIX ( Linux ) operating system all directories and subdirectories designated by a forward slash. Descriptions / The root directory, the top-level directory in the FHS. All other directories are subdirectories of root, which is always mounted on some partition. All directories that are not mounted on a separate partition are […]

Untitled
Lists

Redirect HTTP to HTTPS Using .htaccess

.htaccess file is used to the configure of file directory, URL redirection, access control. .htaccess file hidden in the control panel of the UNIX operating server. Redirect HTTP to HTTPS Using .htaccess Example code <IfModule mod_rewrite.c> <IfModule mod_negotiation.c> Options -MultiViews </IfModule> RewriteEngine On # Redirect to www domain if not already RewriteCond %{HTTPS_HOST} ^yourdomain [NC] RewriteRule […]

response
Lists

HTTP Status Code

Hypertext Transfer Protocol status codes are issued by  Server response to their clients.Some of the Hypertext Transfer Protocol lists is mention below: Information Response Redirection messages Client error responses Server error responses Descriptions CODE MESSAGE   200 ok 204 No Content 2. Redirection messages 301 Moved Permanently 302 Found / Moved Temporarily 304 Not Modified 307 Temporary […]

seo
Digital Marketing

What is Search Engine Optimization (SEO) and How It Work?‎

Generally, Search Engine Optimization is the technique of Marketing which can support to derive real customer on their products or services. Search Engine Optimization defines the process of optimizing Webpages, information services, products, portfolios using the internet. SEO can be categories into two categories which are Local SEO: Search Engine Optimization which is allocated on […]