Skip to main content

Posts

Showing posts with the label Windows

ASkey Sinhala Input Tool for Windwos

ASkey Sinhala Input Tool ASkey Sinhala Input Tool This tool will help Srilankan Sinhaleese people to type in sinhala language. Most of laptops and other PCs does not come with a keyboard which supports sinhala. So anyone can install this software and thype in 'Singlish'. The software will automaticaly convert it into native sinhala unicode. No need to install at all, this software is portable. You can download the DEMO app here:  https://goo.gl/J36wL3 =====================Technology============================  Program is based on C# language and conversions are done by javascript in realtime. Software has a 30 day trial period as this is partial commercial. After expiration, this software will no longer work. Software works offline. ====================== Requirments ========================  This software will work on most of windows operating systems. (Windows 7, 8.1 are tested) .NET framework 4.0 ====================== Installation =======

Singlish to Sinhala Converter for PC

Singlish to Sinhala Realtime Converter ===== Less Requirements Size:  430 KB O/S : Windows xp, Windows vista, Windows 7 , 8, 8.1, 10 Ram: 256Mb Mode: Offline | Real-time application ===== No need to install. It's portable! 1. Download the software from Here! . 2. place the software anywhere you want. 3. Click on it and play! It's portable. You can copy it into your pen drive any run on any computer. ===== Learn to type in Singlish you can learn to type in singlish by referring the transliteration scheme.  Learning tutorial for singlish Click here to Download

Top 5 Vulnerabilities for future Hackers!

Access control, sometimes called authorization, is how a web application grants access to content and functions to some users and not others. These checks are performed after authentication, and govern what ‘authorized’ users are allowed to do. Access control sounds like a simple problem but is insidiously difficult to implement correctly. A web application’s access control model is closely tied to the content and functions that the site provides. In addition, the users may fall into a number of groups or roles with different abilities or privileges. Developers frequently underestimate the difficulty of implementing a reliable access control mechanism. Many of these schemes were not deliberately designed, but have simply evolved along with the web site. In these cases, access control rules are inserted in various locations all over the code. As the site nears deployment, the ad hoc collection of rules becomes so unwieldy that it is almost impossible to understand. Many of these