According to W3C <img> is a inline element. But it doesn’t follow all designing rules of inline elements. You cannot set height and width of inline elements but you can set height and width of <img>. <img> element’s design depends on aspect ratio, parent block container, dimensions, height and width. <img> is inline or block […]
Same origin policy is a set of restrictions that are applied to webpages from communicating with each other. These restrictions prevent a lot of hacks.There are many ways to bypass this restrictions also. In this post we will look at Same origin policy for different components of web browsing. We will also see the different […]
Most of the web developers use phonegap to develop apps for mobile. Phonegap is the most powerful platform available for web developers to develop mobile apps. Its features can be extended using plugins which makes it even much powerful. But one thing phonegap lacks is that the look and feel of native app. In this […]
Do you know that one website is hacked every 5 seconds and also 63% of website owners don’t know that they are hacked. You might be the next or you are already a victim. Protecting user and business critical information is the first job of a developer. This post will help you to survive the […]
Suppose you want to customize the configuration of your web server and you don’t have access to the global configuration file. In that case you are stuck with developing your great web app. Well there is a solution to that i.e., using .htaccess file. In this post we will talk about pros, cons, features, usage […]
Suppose you are planning to create applications like Facebook timeline, Gmail chat, live score viewer or instant chat and you are wondering how to send notification from server to the browser for updates instead browser requesting data from server after every constant interval then this post will help you learn the technologies that are used […]
You might have seen people’s faces appearing on Google search results. Specifically when the content of those links belong to a particular author. Have you have ever wondered how they do that? There are basically two ways of doing this. In this post we will look at both the ways. Our objective is to get […]
Most Commented