Find a Book  
Book Filter By: Samaresh Majumdar
sitahoron-rohosso
Sitahoron Rohosso By Samaresh Majumdar
Download
 
Article and Tutorial

Do you love your spouse? How does your spouse know you love them? Maybe you tell them every day. Maybe every time you go separate ways your last words are “I love you.” And you probably do love them and vice versa. What if the words you say, don’t necessarily spell love for your spouse?

An article I recently read on Your Tango discusses two behaviors which lead to a healthy and loving relationship. One of which is knowing your spouse’s love language.

The Five Love Languages is a book by Dr. Gary Chapman, which discusses five different ways people express and receive love. The words I love you should be expressed in some way. But when they are expressed they may not be received as love. You do it because you love your spouse, but your spouse may never interpret it that way.

No matter what your love language is, or what your spouse’s love language is, the important thing is to take action. Show your love in action. I’ve shared 25 love actions below, broken down into the five love languages.

...
more
Flu-fighting foods It takes more than an apple a day to keep the doctor away. It turns out that eating some pretty surprising nutrients will help keep your immune system on guard. You can ensure your body and immunity run smoothly by rounding out your plate with plenty of colorful servings of fruits and veggies, plus 8 to 10 glasses of water a day, at the very least. The following ingredients can add extra flu-fighting punch to your winter meal plan.

Need more advice for staying healthy through the season?...
more


Vulnerabilities & Concepts

Vulnerability Types

Cross Site Scripting (XSS)

This vulnerability allows data to be injected into webpages. This data is then interpreted as code and executed by the viewer‘s web browser, which can effectively be seen as remote controlling a victim‘s browser.

Cross Site Request Forgery (CSRF)

CSRF refers to a type of exploits where the victim‘s browser is being tricked into triggering an authenticated action inside a vul...

more