Rice Grown by India #User Submitted

Many people donot know that there are atleast 80 varities of rice grown in India. Rice is really a very ancient grain. It is said to have originated in india. Rice grains estimated to date 1000-800 B.C. have been found in the excavations at Hastinapur in Uttar pradesh and at Lothal in Gujrat.

Although the botanical name of rice plant is Oryza sativa, the ancient Indian name for the grain was “Dhanya”
meaning ‘sustainer of the human race’.
In india rice is used in all religious ceremoies, including weedings also. In fact Tamil works even mention the types of rice that are used to as offering to the gods.
From, india rice gradually spread to presia( Iran),West Asia, Africa, Europe and America. India first introduced the rice crop to east crop. The Moors (Black Muslims from Africa) brought it to spain (Western Europe). The spaniards took rice to Italy. Later, on the Turks introduced rice over much of south- eastern Europe. Today the major rice producing countries in the world are India, China, Japan, Myanmar and Thailand. After India the oldest rice producing country is China. Chinese writings 5,000. years old refer to rice as the most important plant of the country.

Did you know that Java in Indonesia means ‘Island of rice’. Even today no no Japanese girl is considered eligible for marriage until she can cook a perfect bowl of rice.

How rice came to America. In the late 17th century a ship from Madagascar in Indian Ocean caught in storm. It was, given shelter in Charleston, South Carolina. The ships’s captain n gratitude offered seed rice to his colonial hosts. Rice in the USA is not only grown in South Carolina but even in places like Arkansas, Texas, and California.

One should know the nutrition content in rice. Scientists tell us that the amount of fat- soluble vitamins A and D is very small but vitamin E content in whole rice is fairly large. From: http://sitestree.com/?p=747
Categories:User Submitted
Tags:
Post Data:2014-02-18 07:55:41

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Remove Vagrant from your system #Vagrant

Used the following commands on my Mac : Works

 

rm -rf /Applications/Vagrant

rm -f /usr/local/bin/vagrant
sudo pkgutil --forget com.vagrant.vagrant

Also, executed the following - sure on my same Mac
rm -rf /opt/vagrant
rm -f /usr/bin/vagrant

Also, did a search for vagrant.d and vagrant in the system and removed as appropriate

~/.vagrant.d

Sure before doing any of the above used vagrant destroy

---


Some find and remove command examples:

find . -name "FILE-TO-FIND" -exec rm -rf {} ;

OR

find . -type f -name "FILE-TO-FIND" -exec rm -f {} ;

 

$ find . -type f -name “*.bak” -exec rm -f {} ;

 

# find / -name core -exec rm -f {} ;

$ find . -type f -name “*.bak” -exec rm -i {} ;

 

 

References:

https://www.cyberciti.biz/faq/linux-unix-how-to-find-and-remove-files/

https://www.vagrantup.com/docs/installation/uninstallation.html


From: http://sitestree.com/?p=4664
Categories:Vagrant
Tags:
Post Data:2016-12-04 12:41:08

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Presentation Slides on Virtualization #Virtualization

http://salearningschool.com/training_slides/virtualization/Virtualization_office_2007.pdf From: http://sitestree.com/?p=336
Categories:Virtualization
Tags:
Post Data:2013-08-20 23:34:07

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

part 2 how to build a simple website from scratch #Web Development

https://www.youtube.com/watch?feature=player_embedded&v=Sbd7OCecH64 From: http://sitestree.com/?p=2610
Categories:Web Development
Tags:
Post Data:2015-10-17 18:15:36

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

how to build a simple website from scratch #Web Development

https://www.youtube.com/watch?feature=player_embedded&v=zQ6M1Qh6I8A From: http://sitestree.com/?p=2608
Categories:Web Development
Tags:
Post Data:2015-10-17 12:12:53

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Step 1 step by step eCommerce application development #Web Development

https://www.youtube.com/watch?feature=player_embedded&v=gu-4RIwpJe4 From: http://sitestree.com/?p=2420
Categories:Web Development
Tags:eCommerce, application, development
Post Data:2015-10-09 08:39:37

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

DotNetNuke ErrorPages.aspx #Web Development

<%@ Page Language=”C#” AutoEventWireup=”false” Inherits=”DotNetNuke.Services.Exceptions.ErrorPage” CodeFile=”ErrorPage.aspx.cs” %>
<!DOCTYPE html PUBLIC “-//W3C//DTD XHTML 1.0 Transitional//EN” “http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd”>
<html xmlns=”http://www.w3.org/1999/xhtml” lang=”en-US”>
<head>
<meta name=”revisit-after” content=”1 days” />
<meta name=”robots” content=”noindex,nofollow” />
<title runat=”server” id=”Title”>Error</title>
<link id=”DefaultStylesheet” runat=”server” rel=”stylesheet” type=”text/css” href=”~/Portals/_default/default.css” />
<link id=”InstallStylesheet” runat=”server” rel=”stylesheet” type=”text/css” href=”~/Install/install.css” />
</head>
<body>
<form id=”Form” runat=”server”>
<table cellspacing=”5″ cellpadding=”5″ border=”0″>
<tr>
<td><asp:Image ID=”headerImage” runat=”server” BorderStyle=”None” AlternateText=”DotNetNuke” /></td>
</tr>
<tr style=”height:100%;”>
<td valign=”top” style=”width:650px;”>
<h2>DotNetNuke Error</h2>
<hr />
<p><asp:PlaceHolder ID=”ErrorPlaceHolder” runat=”server” /></p>
</td>
</tr>
<tr>
<td align=”right”><asp:Hyperlink ID=”hypReturn” runat=”Server” NavigateUrl=”~/Default.aspx” cssClass=”dnnPrimaryAction” text=”Return to Site”/></td>
</tr>
<tr><td height=”10px”></td></tr>
</table>
</form>
</body>
</html> From: http://sitestree.com/?p=948
Categories:Web Development
Tags:
Post Data:2016-07-02 17:20:45

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Computer technology and biotechnology #Web Development

Article: Our future computer technology or Technology is so bright. Most of the student are recent introduced this matter. They also come to research and work by technology. Computer technology which we used biotechnology. Such as past time time we detected diabetics by chemical and this process is so long and expansible. But by the combination of Biotechnology and information technology now we currently check diabetics easily, quick and its is so low price. SO glue check which is gift of nanotechnology is check diabetics so correctly. Another many of surgical instrument used which are possible by the computer technology. Our future generation will gift us more facility of computer technology and biotechnology. Molecular medicine and molecular biology research are so develop by the combination of information technology. Mobil, cellular phone android phone which give us joined power the two site world which we reached our message in a second. Another intern-ate which interlink our world and we take it as a global world or global village. Skype, Google talk, Facebook which give us more entertainment and low cost contact method. So in near future we can connect with our friend and family by low cost. Our technology improve dramatically and our future technology will give us more power and more entertainment. From: http://sitestree.com/?p=872
Categories:Web Development
Tags:
Post Data:2014-02-28 07:27:42

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

Efficient Two Dimensional-IP routing: An incremental deployment design: #Web Development

Efficient Two Dimensional-IP routing: An incremental deployment design:

High dimensional routing has attracted more attentions to satisfy the increasing demands for more flexible services in the Internet. These routing schemes make routing decisions not only based on the destination address, but also on the source address, flow label, etc. With these schemes, networks can provide more than best-effort services.There are several research issues towards high dimensional routing. Clearly routers face additional CPU and memory burden in looking up and maintaining the additional information. While some overheads are unavoidable, we need to minimize such burden incurred. A more important problem is the deployment. It is widely known that making changes to the network layer is notoriously difficult. The proposed scheme should have least impact on the current Internet protocols and infrastructure. A node-by-node incremental deployment scheme is highly preferred. Obviously, without full deployment, the resulting paths for traffic diversion may deviate from the pre-defined ones. The incremental deployment scheme should minimize such deviation.In this paper, we illustrate the problem by using a real example from China Education and Research Network 2 (CERNET2). Then we formulate it as finding a deployment sequence where the traffic flows should follow the pre-defined paths given (1) the number of nodes to be deployed and (2) the extra burden each router can spare. We transform our problem to boolean clauses and develop efficient solutions following the Maximum Satisfiability (MAX-SAT) problem. We present several related algorithms for different practical scenarios.We evaluate our algorithms using comprehensive simulations with BRITE generated topologies and real world topologies. We conduct a case study on CERNET2 configurations. Compared to an ad hoc deployment and an arbitrary TwoD-IP forwarding, our algorithms compute a deployment sequence that achieves close to optimal performance after deploying a few nodes. The CPU and memory requirement are small for packet forwarding.

-Rahim Ullah From: http://sitestree.com/?p=864
Categories:Web Development
Tags:
Post Data:2014-02-23 04:09:02

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada

File System Access and PHP Security #Web Development

File System Access and PHP Security

Allowing your users to upload files opens some security holes. Users can upload malicious files and make your site affected by Malware. How risky is this depends on how you implemented the feature, and the privileges that you have provided. One option can be check if the associated feature is really important or it is a feature just for the sake of a feature.

One option to prevent or minimize attack is: always specifically mention where the uploaded contents will go. Specify the upload folder specifically. When users upload files, check the name of the files as well. Are they trying to access a different location using relative parameters such as ../? Check the type of files they are trying to upload? is it an exe file? what about the size of the file? is the user trying to upload repeatedly?
is he a real human being? check the feature with Captcha.

Do not use relative paths in your code; also do not specify a file upload location using relative paths. Do not assume that only the folder under which the website resides is the only place to keep uploaded files. You can define another location from your code that is usually inaccessible from the users. Your root website folder is public and is not the best place to keep uploaded files.

Also, when you are opening a file do not use relative paths; try to know the exact location and filename; and work with the specific location and file name.

PHP by default allows remote file access which is a really bad idea. Unless you have a good reason to allow remote file access, turn it off. you can turn it off from php.ini file. To do that just disable allow_url_fopen

However, if you really need to allow using remote files, do not directly open/execute it. But do it in two steps, first retrieve the data and then process the data in the 2nd step. You can use FTP functionality to retrieve/upload first and then you can process it. From: http://sitestree.com/?p=193
Categories:Web Development
Tags:PHP Security, File Security, Malware
Post Data:2013-01-11 00:29:29

Shop Online: https://www.ShopForSoul.com/
(Big Data, Cloud, Security, Machine Learning): Courses: http://Training.SitesTree.com
In Bengali: http://Bangla.SaLearningSchool.com
http://SitesTree.com
8112223 Canada Inc./JustEtc: http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning)
Shop Online: https://www.ShopForSoul.com/
Medium: https://medium.com/@SayedAhmedCanada