Ultimate Sorting Algorithms Comparison

Ultimate Sorting Algorithms Comparison

Before the stats, You must already know what is Merge sort, Selection Sort, Insertion Sort, Bubble Sort, Quick Sort, Arrays, how to get current time.   What is Stable Sorting ? A sorting algorithm is said to be stable if and only if two records R and S with the...
White Hat Hacking : Apple open redirect vulnerability

White Hat Hacking : Apple open redirect vulnerability

What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the visitor to another website. As mentioned in Everything is vulnerable ( Q4 in internet wars ). You should pay attention to URLs you...
Top 10 April fools’ day pranks 2015

Top 10 April fools’ day pranks 2015

Motorola : Selfie Stick  Ok, handcrafted selfie sticks aren’t a thing. But a Moto X with real wood or genuine leather is. Customize yours with natural materials or endless colorful hues — even take the perfect selfie using your voice. Build yours on Moto Maker today....
Everything is vulnerable II : Internet wars

Everything is vulnerable II : Internet wars

Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to social networks users. Millions of defrauding are attempted every day and actually many succeed! As a matter of fact, if you have...