Rajeshwari posted on Apr 22, 2016 posted on April,22, 2016

  just a test ...read more
Aravindan posted on Mar 23, 2016 posted on March,23, 2016

What is selenium?Selenium is a functional automation tool for web browser. Now a day’s Selenium is becoming a popular testing tool.It is a GUI Automation tool and open source tool.It supports Operating system like Windows, Mac and Linux. Languages like Java, HTML, PHP and C#. Browsers like Internet Explorer, Google Chrome, Mozilla Firefox, Safari and Opera.It is very flexible functional tools because it supports Multi-language.Selenium IDE:Selenium IDE is Integrated Development Environment for selenium.Selenium IDE is a Mozilla Firefox plug-in which helps developers to test their web applications using selenium.It supports the record ...read more
Rajeshwari posted on Jan 21, 2016 posted on January,21, 2016

To deny access to a device that has a specific device setup class Open the Group Policy Management Editor. click Start, -> Start Search box, type mmc gpedit.msc.In navigation pane, open Local Computer Policy. If you want to policy to apply to all users on the computer , open Computer Configuration in the navigation pane.If you want the policy to apply to only the current login user, open User Configuration in the navigation pane. Open the folders: Administrative Templates, System, Removable Storage Access.In the details panel, open either Custom Classes: Deny read access or Custom Classes: Deny write access, depending on which restriction you want to enable.Click Enabled-> Show.In the Show Contents dialog ...read more
Rajeshwari posted on Jan 21, 2016 posted on January,21, 2016

If you prefer to edit the registry by yourself, it’s pretty easy and only involves creating and editing a single key value.1. Go to Start -> Run -> Type regedit and hit Enter or click on the OK button. For Vista and 7 go to Start -> type regedit into the search box, hold Ctrl+Shift and press Enter. Ctrl+Shift opens regedit as Administrator.2. Browse to:HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLook for a key in Control called StorageDevicePolicies. If you have a key with that name go to step 4. If not, follow step 3. 3. You need ...read more
Aravindan posted on Jan 20, 2016 posted on January,20, 2016

                          As company grows  the amount of their files also grow. It becomes difficult to keep track of the documents and their locations.  SharePoint allows you to store and share your files in a central site.Sharing files through mail is a difficult  process and also involves lot of emails to be sent. Sharepoint allows files to be shared in one location which in turn is easy for all the members to access. In today's world people work in different locations, countries ...read more
Aravindan posted on Jan 20, 2016 posted on January,20, 2016

 It’s a wonder we still put up with passwords.We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.Despite their inefficiencies, passwords are still the most common electronic authentication systems, protecting everything from our bank accounts, laptops and email to health information, utility bills and, of course, our ...read more