T H E E P I C C O D E

PVA COMMUNITY

Featured

Terms of Search Engine Optimization

Modern consumers navigate the world through search. From laptops, smartphones, virtual assistants, tablets, and more, they search the wild and wondrous internet for the products and services they need. By leveraging the fundamentals of search engine optimization (SEO), you can

Illustrated WideResnet

Wide Residual Networks To follow along please refer to this Kaggle Kernel Introduction Prior to the introduction of Wide Residual Networks (WRNs) by Sergey Zagoruyko and Nikos Komodakis, deep residual networks were shown to have a fractional increase in performance but at

Named Entity Recognition using Reformers

In-depth end-to-end tutorial on implementing Named Entity Recognition on a Kaggle Dataset using the Trax Framework

Powerful Ways to Convert Website Traffic Into Leads

More traffic to a website does not always mean more revenue unless the revenue model is purely based on display advertising. Display advertising model brings the lowest revenue per visitor compared to all the other revenue models and there are

Preventing cross-site scripting in PHP

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into websites. XSS attacks occur when an attacker uses a web application to send malicious code generally in the form of a browser side script, to a different

Bypass Emulator Detection

There are multiple possible ways to bypass emulator detection for a particular or all applications. Here we will discuss two of their methods. Method #1 Generally, Ldplayer is used to bypass emulator detection. Ldplayer is a best and unique product

Fundamentals of Penetration Testing

What is Penetration Testing? Finding a vulnerability, using an exploit, attacking a system are different parts of the Penetration testing process. A pen tester’s (a term is given for penetration tester) attention is required at the highest level because any

Smartwatches: Explained

Origin Of Wrist Watches There existed watches since 1500 BC. Europeans, Germans, Philips, Romans had different ways to make the watches and were basically for taking a look at the time. Analog watches arrived in 1770, which had and still

How to Conduct a Social Media Audit

Overview Many organizations approach social media from a platform-first perspective. That is, they jump on a social network first and develop their strategy later. As a result, they often find themselves in a situation where they have multiple accounts on

What is Cyber Security? Why Cyber Security?

Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire. It wafts across the electrified borders. Ronald Reagan Understanding the terms ‘Cyber’ and ‘Security.’ ‘Cyber’ is a technical term derived from ‘cybernetics’ from