Uncategorized

Uncategorized
My Motivations Video(s)
September 1, 2020
0
Uncategorized
MacOSX: Mojave Saas Install Error Fix
March 30, 2020
0
Building native extensions.  This could take a while… ERROR:  Error installing sass: ERROR: Failed to build gem native extension.     current directory: /Library/Ruby/Gems/2.3.0/gems/ffi-1.12.2/ext/ffi_c /System/Library/Frameworks/Ruby.framework/Versions/2.3/usr/bin/ruby -r ./siteconf20200329-26235-12xn9hq.rb extconf.rb mkmf.rb can’t find header files for ruby at /System/Library/Frameworks/Ruby.framework/Versions/2.3/usr/lib/ruby/include/ruby.h extconf failed, exit code 1 Gem files will remain installed in /Library/Ruby/Gems/2.3.0/gems/ffi-1.12.2 for inspection. Results logged to /Library/Ruby/Gems/2.3.0/extensions/universal-darwin-18/2.3.0/ffi-1.12.2/gem_make.out
Photography Rule of Space Uncategorized Visual Composition
Composition: Rule of Thirds
March 24, 2020
0
Composition = Emphasis = The Key to take Strong Images Description: In photography, the rule of thirds is a type of composition in which an image is divided evenly into thirds, both horizontally and vertically, and the subject of the image is placed at the intersection of those dividing lines, or along one of the […]
Photography Uncategorized
Golden Hours for Photography
March 24, 2020
0
For Sunrise Shooting, use AV (Aperture Priority) mode to capture the perfect sunrise, shoot at aperture setting f/11, set ISO 100For Details follow the below guideline that I have found from youtube: For Sunset Shooting – use a fast Shutter speed, expose for the brightest point in your image, make, use grid, to bring golden […]
Commands Email Linux CentOS Server Uncategorized
DKIM Set for my subdomain
January 26, 2020
0
, , ,
I faced so much trouble while setting DKIM for one of my sub domain, there are so many online tutorials but not a single tutorial that describes everything at one spot. So I was thinking why not I write my own blog on it. What is DomainKeys Identified Mail (DKIM)? DomainKeys Identified Mail (DKIM)? It […]
Uncategorized
Installing COMPOSER IN MACOSX
August 15, 2018
0
RUN THE BELOW COMMAND IN terminal:   php -r “copy(‘https://getcomposer.org/installer’, ‘composer-setup.php’);” php -r “if (hash_file(‘SHA384’, ‘composer-setup.php’) === ‘544e09ee996cdf60ece3804abc52599c22b1f40f4323403c44d44fdfdd586475ca9813a858088ffbc1f233e9b180f061’) { echo ‘Installer verified’; } else { echo ‘Installer corrupt’; unlink(‘composer-setup.php’); } echo PHP_EOL;” php composer-setup.php –install-dir=bin –filename=composer mv composer.phar /usr/local/bin/composer php -r “unlink(‘composer-setup.php’);”
Uncategorized Wordpress Plugin Development
Add Custom Logo in WordPress Plugin for Custom Post Type
August 15, 2018
0
, ,
1 Pick an icon Goto: http://fontawesome.io/icons/   2. You will get the SVG version here: https://github.com/encharm/Font-Awesome-SVG-PNG You will see folder named “black” (if you need black icon), under that folder, click the folder “svg”,  you will see the icons list, you will have to get the raw code of particular svg icon. Example Raw code: <?xml […]
Uncategorized
Govt. Gazette with amendment on deduction of AIT on inbound remittance by AD banks
July 26, 2018
0
I have been informed that despite the tax exemption benefit for BASIS members till 2024, some banks (like my Bank Islami Bank) are deducting AIT from the inbound remittance earned through software and ITES export of a number of BASIS member companies. Initially there was a clear guidelines in this regard for not deducting AIT. However, […]
Uncategorized
How To Find Large Emails in Gmail, Delete them And can have more space in my gmail
June 21, 2018
0
,
Recently my gmail account was getting almost full, so I decided to find out emails with largest attachment so that I can delete them in case I do not need them anymore. In the search box, I have typed “size:10485760” . It listed all the emails that has attachment size of 10MB.  Its format is: […]
Uncategorized
Honeypot !!!!
January 28, 2018
0
In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site, but is actually isolated and monitored, and […]