In short, Use CouchDB if you are 100% sure you won't need any (complex) joins. This post won't go through any theoretical differences or...
Fady S. Ghatas Articles
Linux Best Code (Text) Editor : Atom, Sublime or Visual Studio Code?
Sublime Text I used ST2 in the past. How it works: Getting the job done as simple as possible. ST2 is pretty fast in starting up...
[How To] PouchDB and CouchDB : Database Per User Made Simple
CouchDB is one of the most powerful DBMS nowadays. However, although its documentation is good, there is not enough topics of how-tos and...
Ultimate Sorting Algorithms Comparison
Before the stats, You must already know what is Merge sort, Selection Sort, Insertion Sort, Bubble Sort, Quick Sort, Arrays, how to get...
White Hat Hacking : Apple open redirect vulnerability
What is Open Redirect vulnerability? Open redirect vulnerabilities allow the attacker to use a well known website name to redirect the...
White Hat Hacking – RedHat Cross Site Scripting ( XSS )
White Hat Hacking - Redhat cross site scripting ( XSS ) Using an ordinary Cross site scripting payload, The vulnerability could NOT be...
Everything is vulnerable II : Internet wars
Q1. Why was this post written ? This post is highly recommended for all web surfers regardless of their interests; from online shoppers to...
Everything is vulnerable I : What are Malwares, viruses, exploits, trojans, hacks and cracks ?
Q1. Why was this post written? To define Malwares and demonstrate the differences between Viruses, Trojans and Spams. Also, We will talk a...
Everything is vulnerable : Introduction
“Everything is vulnerable” is a series of posts about computer vulnerabilities, malwares, hacking and security. There is one fact to...