Sunday, December 25, 2011

.Net Tutorial: Keyboard Shortcut keys

.Net Tutorial: Keyboard Shortcut keys: General keyboard shortcuts CTRL+C (Copy) CTRL+X (Cut) CTRL+V (Paste) CTRL+Z (Undo) DELETE (Delete) SHIFT+DELETE (Delete the select...
Read More

Wednesday, December 21, 2011

Photoshop work at office


Read More

Sunday, December 4, 2011

Logo created by me

This is logo created by me in Photoshop for my company's next project ! 

Read More

Thursday, November 24, 2011

Dont Put any ordinary Password to your any internet account


If you see your password below, STOP!
Do not finish reading this post and immediately go change your password -- before you forget. You will probably make changes in several places since passwords tend to be reused for multiple accounts.
Here are two lists, the first compiled by SplashData:
1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passwOrd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
Last year, Imperva looked at 32 million passwords stolen from RockYou, a hacked website, and released its own Top 10 "worst" list:
1. 123456
2. 12345
3. 123456789
4. Password
5. iloveyou
6. princess
7. rockyou
8. 1234567
9. 12345678
10. abc123
If you've gotten this far and don't see any of your passwords, that's good news. But, note that complex passwords combining letters and numbers, such as passw0rd (with the "o" replaced by a zero) are starting to get onto the 2011 list. abc123 is a mixed password that showed up on both lists.
Last year, Imperva provided a list of password best practices, created by NASA to help its users protect their rocket science, they include:
It should contain at least eight characters
It should contain a mix of four different types of characters - upper case letters, lower case letters, numbers, and special characters such as !@#$%^&*,;" If there is only one letter or special character, it should not be either the first or last character in the password.
It should not be a name, a slang word, or any word in the dictionary. It should not include any part of your name or your e-mail address.
Following that advice, of course, means you'll create a password that will be impossible, unless you try a trick credited to security guru Bruce Schneir: Turn a sentence into a password.
For example, "Now I lay me down to sleep" might become nilmDOWN2s, a 10-character password that won't be found in any dictionary.
Can't remember that password? Schneir says it's OK to write it down and put it in your wallet, or better yet keep a hint in your wallet. Just don't also include a list of the sites and services that password works with. Try to use a different password on every service, but if you can't do that, at least develop a set of passwords that you use at different sites.
Someday, we will use authentication schemes, perhaps biometrics, that don't require so much jumping through hoops to protect our data. But, in the meantime, passwords are all most of us have, so they ought to be strong enough to do the job.
Read More

Wednesday, November 23, 2011

Have a brand new look of experts exchange



Small Experts Exchange VIP Badge
Hello Guys !
have look here is brand new experts exchange !
Read More

Tuesday, November 8, 2011

Interview question of asp.net


1.
Difference between thread and process?
 
Thread - is used to execute more than one program at a time.
process - executes single program
 
2.
Explain Namespace.
 
Namespaces are logical groupings of names used within a program. There may be multiple namespaces in a single application code, grouped based on the identifiers’ use. The name of any given identifier must appear only once in its namespace.
3.
List the types of Authentication supported by ASP.NET.
 
Windows (default)
Forms
Passport
None (Security disabled)
4.
What is CLR?
 
Common Language Runtime (CLR) is a run-time environment that manages the execution of .NET code and provides services like memory management, debugging, security, etc. The CLR is also known as Virtual Execution System (VES).
5.
What is CLI?
 
The CLI is a set of specifications for a runtime environment, including a common type system, base class library, and a machine-independent intermediate code known as the Common Intermediate Language (CIL).
6.
List the various stages of Page-Load lifecycle.
 
o Init()
o Load()
o PreRender()
o Unload()
7.
Explain Assembly and Manifest.
 
An assembly is a collection of one or more files and one of them (DLL or EXE) contains a special metadata called Assembly Manifest. The manifest is stored as binary data and contains details like versioning requirements for the assembly, the author, security permissions, and list of files forming the assembly. An assembly is created whenever a DLL is built. The manifest can be viewed programmatically by making use of classes from the System.Reflection namespace. The tool Intermediate Language Disassembler (ILDASM) can be used for this purpose. It can be launched from the command prompt or via Start> Run.
8.
What is Shadow Copy?
 
In order to replace a COM component on a live web server, it was necessary to stop the entire website, copy the new files and then restart the website. This is not feasible for the web servers that need to be always running. .NET components are different. They can be overwritten at any time using a mechanism called Shadow Copy. It prevents the Portable Executable (PE) files like DLLs and EXEs from being locked. Whenever new versions of the PEs are released, they are automatically detected by the CLR and the changed components will be automatically loaded. They will be used to process all new requests not currently executing, while the older version still runs the currently executing requests. By bleeding out the older version, the update is completed.
9.
What is DLL Hell?
 
DLL hell is the problem that occurs when an installation of a newer application might break or hinder other applications as newer DLLs are copied into the system and the older applications do not support or are not compatible with them. .NET overcomes this problem by supporting multiple versions of an assembly at any given time. This is also called side-by-side component versioning.
10.
Explain Web Services.
 
Web services are programmable business logic components that provide access to functionality through the Internet. Standard protocols like HTTP can be used to access them. Web services are based on the Simple Object Access Protocol (SOAP), which is an application of XML. Web services are given the .asmx extension.
11.
Explain Windows Forms.
 
Windows Forms is employed for developing Windows GUI applications. It is a class library that gives developers access to Windows Common Controls with rich functionality. It is a common GUI library for all the languages supported by the .NET Framework.
12.
What is Postback?
 
When an action occurs (like button click), the page containing all the controls within the <FORM... > tag performs an HTTP POST, while having itself as the target URL. This is called Postback.
13.
Explain the differences between server-side and client-side code?
 
Server side scripting means that all the script will be executed by the server and interpreted as needed. Client side scripting means that the script will be executed immediately in the browser such as form field validation, clock, email validation, etc. Client side scripting is usually done in VBScript or JavaScript. Since the code is included in the HTML page, anyone can see the code by viewing the page source. It also poses as a possible security hazard for the client computer.
14.
Enumerate the types of Directives.
 
@ Page directive
@ Import directive
@ Implements directive
@ Register directive
@ Assembly directive
@ OutputCache directive
@ Reference directive 

15.
What is Code-Behind?
 
Code-Behind is a concept where the contents of a page are in one file and the server-side code is in another. This allows different people to work on the same page at the same time and also allows either part of the page to be easily redesigned, with no changes required in the other. An Inherits attribute is added to the @ Page directive to specify the location of the Code-Behind file to the ASP.NET page.
16.
Describe the difference between inline and code behind.
 
Inline code is written along side the HTML in a page. There is no separate distinction between design code and logic code. Code-behind is code written in a separate file and referenced by the .aspx page.
17.
List the ASP.NET validation controls?
 
RequiredFieldValidator
RangeValidator
CompareValidator
RegularExpressionValidator
CustomValidator
ValidationSummary
18.
What is Data Binding?
 
Data binding is a way used to connect values from a collection of data (e.g. DataSet) to the controls on a web form. The values from the dataset are automatically displayed in the controls without having to write separate code to display them.
19.
Describe Paging in ASP.NET.
 
The DataGrid control in ASP.NET enables easy paging of the data. The AllowPaging property of the DataGrid can be set to True to perform paging. ASP.NET automatically performs paging and provides the hyperlinks to the other pages in different styles, based on the property that has been set for PagerStyle.Mode.
20.
Should user input data validation occur server-side or client-side? Why?
All user input data validation should occur on the server and minimally on the client-side, though it is a good way to reduce server load and network traffic because we can ensure that only data of the appropriate type is submitted from the form. It is totally insecure. The user can view the code used for validation and create a workaround for it. Secondly, the URL of the page that handles the data is freely visible in the original form page. This will allow unscrupulous users to send data from their own forms to your application. Client-side validation can sometimes be performed where deemed appropriate and feasible to provide a richer, more responsive experience for the user.
21.
What is the difference between Server.Transfer and Response.Redirect?
* Response. Redirect: This tells the browser that the requested page can be found at a new location. The browser then initiates another request to the new page loading its contents in the browser. This results in two requests by the browser.
* Server. Transfer: It transfers execution from the first page to the second page on the server. As far as the browser client is concerned, it made one request and the initial page is the one responding with content. The benefit of this approach is one less round trip to the server from the client browser. Also, any posted form variables and query string parameters are available to the second page as well.
22.
What is an interface and what is an abstract class?
In an interface, all methods must be abstract (must not be defined). In an abstract class, some methods can be defined. In an interface, no accessibility modifiers are allowed, whereas it is allowed in abstract classes.
23.
Session state vs. View state:
In some cases, using view state is not feasible. The alternative for view state is session state. Session state is employed under the following situations:
o Large amounts of data - View state tends to increase the size of both the HTML page sent to the browser and the size of form posted back. Hence session state is used.
o Secure data - Though the view state data is encoded and may be encrypted, it is better and secure if no sensitive data is sent to the client. Thus, session state is a more secure option.
o Problems in serializing of objects into view state - View state is efficient for a small set of data. Other types like DataSet are slower and can generate a very large view state.
24.
Can two different programming languages be mixed in a single ASPX file?
ASP.NET’s built-in parsers are used to remove code from ASPX files and create temporary files. Each parser understands only one language. Therefore mixing of languages in a single ASPX file is not possible.
25.
Is it possible to see the code that ASP.NET generates from an ASPX file?
By enabling debugging using a <%@ Page Debug="true" %> directive in the ASPX file or a <compilation debug="true"> statement in Web.config, the generated code can be viewed. The code is stored in a CS or VB file (usually in the \%SystemRoot%\Microsoft.NET\Framework\v1.0.nnnn\Temporary ASP.NET Files).
26.
Can a custom .NET data type be used in a Web form?
This can be achieved by placing the DLL containing the custom data type in the application root's bin directory and ASP.NET will automatically load the DLL when the type is referenced.
27.
List the event handlers that can be included in Global.asax?
o Application start and end event handlers
o Session start and end event handlers
o Per-request event handlers
o Non-deterministic event handlers
28.
Can the view state be protected from tampering?
This can be achieved by including an @ Page directive with an EnableViewStateMac="true" attribute in each ASPX file that has to be protected. Another way is to include the <pages enableViewStateMac="true" /> statement in the Web.config file.
29.
Can the view state be encrypted?
The view state can be encrypted by setting EnableViewStateMac to true and either modifying the <machineKey> element in Machine.config to <machineKey validation="3DES” /> or by adding the above statement to Web.config.
30.
When during the page processing cycle is ViewState available?
The view state is available after the Init() and before the Render() methods are called during Page load.

Read More

Disable Right Click of Mouse on Your web Page Using Java Script







<html>
<head>
<script language="JavaScript">
function disable()
{
if (event.button == 2)
{
alert("Sorry no rightclick on this page.\nNow you can not view my source\nand you can not steal my images")
}
}
</script>
</head>
<body onmousedown="disable()">
<p>Right-click on this page to trigger the event.</p>
<p>The event property is not recognized in Netscape.</p>
<p>Note that this is no guarantee that nobody can view the page source, or steal the images.</p>
</body>
</html>

Read More

Thursday, September 22, 2011

Web Layout in photoshop

Its my another web layout made in Photoshop. in this layout i got 3d look.its was amazing exprience
Reference
http://www.1stwebdesigner.com/



Read More

Tuesday, September 13, 2011

Simple Web Template in Photoshop


This is another web template design in Photoshop by Me. Please have a look and i am awaiting for your cool comment. 

Read More

Friday, September 9, 2011

What is doctype of your webpage


Doctype is a special declaration at the very top of your webpage source, right above the <HTML> tag, that informs validators the rules in which to validate your page using, and for modern browsers (IE6+, Firefox, NS6+, Opera, IE5 Mac), whether to display your page in Quirks or Standards mode.
Below lists the major doctypes you can deploy on your webpage. All of them enters modern browsers into "Standards" mode when used.

** HTML 5 doctype

HTML 5 advocates the use of the very simple doctype:
<!DOCTYPE HTML>
In fact, it refers to doctypes as a "mostly useless, but required, header" whose purpose is just to ensure browsers render web pages in the correct, standards compliant mode. The above doctype will do that, including in IE8. Ideally this should be your first choice for a doctype unless you need your webpages to validate in pre HTML 5 versions of the W3C validator (which may still be the case at the time of writing). For future proofing your web pages, however, this is the doctype to go with.

** HTML 4.01 Transitional, Strict, Frameset

HTML 4.01 transitional doctype supports all attributes of HTML 4.01, presentational attributes, deprecated elements, and link targets. It is meant to be used for webpages that are transitioning to HTML 4.01 strict:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
HTML 4.01 Strict is a trimmed down version of HTML 4.01 with emphasis on structure over presentation. Deprecated elements and attributes (including most presentational attributes), frames, and link targets are not allowed. CSS should be used to style all elements:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
HTML 4.01 frameset is identical to Transitional above, except for the use of <frameset> over <body>:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN"
"http://www.w3.org/TR/html4/frameset.dtd">

** XHTML 1.0 Transitional, Strict, Frameset

Use XHTML 1.0 Transitional when your webpage conforms to basic XHTML rules, but still uses some HTML presentational tags for the sake of viewers that don't support CSS:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
 Use XHTML 1.0 Strict when your webpage conforms to XHTML rules and uses CSS for full separation between content and presentation:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
XHTML 1.0 frameset is identical to Transitional above, except in the use of the <frameset> tag over <body>:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd">

** XHTML 1.1 DTD

XHTML 1.1 declaration. Visit the WC3 site for an overview and what's changed from 1.0:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" 
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
Read More

Thursday, September 1, 2011

ashok bhanwal: Add Your Recent Tweets to Blogger

Read More

Add Your Recent Tweets to Blogger

Add Your Recent Tweets to Blogger


If you’ve got a Blogspot.com blog, you can add your Twitter feed to the sidebar very, very easily. The feed will list your last 5 tweets, as well as the time it was posted and link to follow if the reader chooses. I’ve seen several variations of this code and its presentation, but the one I use on my own blog, and the one I use when installing blogs for other people, is the simplest version possible. Why? Because I don’t want the script slowing the loading down and I don’t want the widget itself to look wonky in different browsers or screen resolutions. If you’d like to add your recent tweets to your blogger sidebar, this is how you do it:



First, you'll need to edit the code:


You will need to make TWO very easy changes. The code you see below is the code for my own personal twitter feed, and you will need to edit it to display yours. I have left my twitter name (ashokbhanwal) in place so that you can see exactly where yours will go. Simply copy your twitter user name and paste it directly overtop of mine (ashokbhanwal) – in both places. Once that is done, your code is ready to show your own twitter feed. Make sure you that you do not paste over top of, or remove anything which is not bolded. If you do, it won’t work. And if you make a mistake, simply come back here and copy the code again and start over. Easy peasy.



Here's the code:

<div style="margin-right:0px"><div id="twitter_div">
<h2 style="display:none;" class="sidebar-title">Twitter Updates</h2>
<ul id="twitter_update_list"></ul>
<a id="twitter-link" style="display:block;text-align:right;" href="http://twitter.com/ashokbhanwal"></a>
</div>
<script src="http://twitter.com/javascripts/blogger.js" type="text/javascript"></script>
<script src="http://twitter.com/statuses/user_timeline/ashokbhanwal.json?callback=twitterCallback2&amp;count=5" type="text/javascript"></script></div>

Now you’re ready to install

  • Log into your Dashboard.
  • Click on 'Layout'
  • Go to the sidebar in question and click 'add a gadget'
  • Click on the 3rd option down, which is titled 'HTML/JavaScript'
  • Copy and paste your new code into the box.
  • Click 'save'
  • Position the widget wherever you’d like – most people put it somewhere near the top. If you’d like to see how mine looks you can take a look at my blog.
Read More

Thursday, June 23, 2011

desktop wallpaper

hey guys,

                  here i created desktop wallpaper in Photoshop. Have a look i am waiting for your cool comment


Read More

Saturday, June 18, 2011

Resume Tips

Right after a job interview, you could either be supremely confident or faintly worried. Either way, we feel pretty relieved when it is all over. Perceptions about interviews usually depend on the interviewer's likeability and first impressions. It is, therefore, important to remember some statutory courtesies in order to have a positive interaction and favourable result.
After an interview shoot a thank you email or letter
Many interviewees think that once the face-to-face interview is over, the interview process is complete. However, this is not the case. The job interview is just the beginning. Once the personal interview is done, the company mulls, evaluates and decides the best candidate who would best suit the job profile and company.
Therefore, it is a good idea to remain in touch with the interviewer and the company in general. One of the best ways to do so is to drop them a ?Thank You? note. If you have been in touch with company or interviewer via e-mail, then one should email such a note within 24 hours after the interview. Interviewers have short memories. So, this is your final chance to stand apart from all of the others who want the same position.
Follow up after the interview when there is no response
How long should you wait before you call the company or interviewer? Usually, if there is no response within sometime, you will start worrying about whether it is appropriate to call back and check hiring status.
When to call
Post-interview it is best to give a gap of two to three days before you make the first follow up call. One of the most important things to keep in mind during the call is that one should be succinct and brief. Another important aspect is to chalk out a time when to call. The best time to call the interviewer is after lunch or an hour before closing time. This will ensure that you have a comfortable time frame to speak to the interviewer.
Whom to call
Interviewees are sometimes confused about who to follow up with after the interview?the human resource team or the interviewer directly. This situation is more confusing if there was more than one interviewer. In such circumstances, it is best to first check with the human resource team on the hiring status.
What to say
Begin the conversation by thanking the person for the opportunity to interview with the company. Recap some of the conversational highlights and clarify any information you need to check on. Use the last paragraph as the chance to state, ?The job is a good fit for me because of XYZ, and my past experience in XYZ.?
Continue your job search
While waiting to hear from the company after the job interview, you should not ignore other interview calls because you are waiting to hear back from the current interview. Even if you are convinced that you have got the job, there can be many slips between the cup and the lip. It is also a good idea to critique your previous performance and use the experience to polish your interviewing skills.
Read More

Friday, June 17, 2011

watch my video on youtube

click on this link:

http://www.youtube.com/watch?v=eKYaX7KGqnw/
Read More

Tuesday, May 31, 2011

facebook

Beware of Facebook email scams

Posted by http://ashokbhanwal.blogspot.com/
A friend recently forwarded us the email below because they thought it was a scam. They were right. This email is a great example of three easy ways to detect a scam.

  • Spelling and bad grammar. Cybercriminals are not known for their impeccable grammar and spelling. A professional company like Facebook usually has a staff of copy editors that wouldn't have allowed a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.
  • Beware of links in email. We noticed that the web address we saw as we hovered our mouse over the link in this email was different from the one that was typed in the email. The web address that showed up as we hovered would have led us to an .exe file. These kinds of file are known to spread malicious software. For more information, see How to recognize phishing emails and links.
  • Threats. Have you ever received a threat that your Hotmail account would be closed if you didn't respond to an email? The email above is an example of the same trick. Our search through the Facebook help files didn't turn up anything about the "Copyright Law form" mentioned in this email. For more information, see Get help with phishing scams, lottery fraud, and other types of scams.

Read More

Sunday, May 15, 2011

Shortcut for gmail in your mobile device

What shortcuts are available in Gmail?

Gmail Shortcuts
i – Inbox
/ - Search Mail
c – Compose Email
k – Newer conversation
j – Older conversation
+I – Mark as read
+u – Mark as unread
#,d,delete – Delete
s – Toggle Star
y – Remove from current view
e – Archive
m – Mute Conversation
! – Report Spam
z – Undo
+j – Next account
+k – Previous account

While viewing a list of conversations
o – Open
t – First Conversation
b – Last Conversation

While viewing a conversation
n – Next message
p – Previous message
o – collapse/expand message
r – reply
a,? – replay to all
f, . – Forward
t – First Message
b – Last message
u, backspace – back

Read More

Google+

Copyright 2013 copyright ashok bhanwal. Powered by Blogger.

About Me

My Photo
hello!  i am ashok bhanwal.professionally i am web designer and Developer.I am Quite Familiar with html, css, asp.net,php, c#, mssql,jquery,ajax.I am fun loving guy.I am always surfing internet for searching new stuff in technology.

Contact Form

Name

Email *

Message *

Google+ Followers

Total Pageviews

Top Stories

Amazing Gift for you

Blogger news

Blogroll