Skip to content
Adglob Infosystem Pvt Ltd
  • About Us
  • B2B and B2C Database
  • Bulk Email Solution
  • Contact Us
  • Corporate Email Service
  • Database Portfolio
  • Database Process Flow
  • Database Services
  • FAQs
  • Lead Generation
  • Managed Email Campaign Solution
  • Our Clients
  • Privacy Policy
  • Product Blog
  • Request Sample for Free Database
  • Terms & Conditions
  • Web Scrapping
  • Get data the way you want

    Cypress – Checkbox

    • Post author:B D
    • Post published:August 12, 2021
    • Post category:Cypress
    • Post comments:0 Comments

    The commands check and uncheck are used to work with a checkbox. In the Html code, a checkbox has an input tag and its type attribute has the value as…

    Continue ReadingCypress – Checkbox

    Cypress – jQuery

    • Post author:B D
    • Post published:August 12, 2021
    • Post category:Cypress
    • Post comments:1 Comment

    Cypress can act upon jQuery objects and their methods along with its internal commands. While Cypress uses the get method to identify a web element, JQuery uses the $() method…

    Continue ReadingCypress – jQuery

    Internet Security – Chrome

    • Post author:S J
    • Post published:August 12, 2021
    • Post category:internate seccurity
    • Post comments:0 Comments

    In this section, we will see the most used explorer from the security viewpoint. What settings should it have in order to minimize the attack surface that can come from…

    Continue ReadingInternet Security – Chrome

    Cypress – Working with XHR

    • Post author:B D
    • Post published:August 12, 2021
    • Post category:Cypress
    • Post comments:0 Comments

    XHR is XML HTTP Request. It is an Application Programming Interface (API) that is available as an object, whose methods send data between a web browser and server. An object…

    Continue ReadingCypress – Working with XHR

    Concordion – assertTrue Command

    • Post author:K Z
    • Post published:August 12, 2021
    • Post category:Concordion
    • Post comments:0 Comments

    Concordion assertTrue command is used when the fixture needs to know the expected result in order to perform a test. Consider the following requirement − User Name : Zafrul Khan…

    Continue ReadingConcordion – assertTrue Command

    Internet Security – Social Network

    • Post author:S J
    • Post published:August 12, 2021
    • Post category:internate seccurity
    • Post comments:0 Comments

    Social Networking is the use of Internet based on social media systems to get in touch with family, friends, customers, classmates, etc. Social Networking can be done for social purposes,…

    Continue ReadingInternet Security – Social Network

    Internet Security – Phishing

    • Post author:S J
    • Post published:August 12, 2021
    • Post category:Computer Security
    • Post comments:0 Comments

    Many of us have received similar emails as shown in the following screenshot. They appear as if coming from a genuine source, but in fact if we analyze them a…

    Continue ReadingInternet Security – Phishing

    Cypress – Asynchronous Behavior

    • Post author:B D
    • Post published:August 12, 2021
    • Post category:Cypress
    • Post comments:0 Comments

    Cypress is derived from node.js, which is based on JavaScript. Cypress commands are synchronous in nature since they are dependent on the node server. Asynchronous flow means that the test…

    Continue ReadingCypress – Asynchronous Behavior

    Cypress – Text Verification

    • Post author:B D
    • Post published:August 12, 2021
    • Post category:Cypress
    • Post comments:0 Comments

    The method text can be used to obtain the text of a web element. Assertions can also be added to verify the text content. Implementation with text() Given below is…

    Continue ReadingCypress – Text Verification

    Internet Security – Cookies

    • Post author:S J
    • Post published:August 12, 2021
    • Post category:internate seccurity
    • Post comments:0 Comments

    Cookies are files, generally from the visited webpages, which are stored on a user's computer. They hold a small amount of data, specific to a particular client and website, and…

    Continue ReadingInternet Security – Cookies
    • Go to the previous page
    • 1
    • …
    • 694
    • 695
    • 696
    • 697
    • 698
    • 699
    • 700
    • …
    • 739
    • Go to the next page
    Copyright - OceanWP Theme by OceanWP