Saturday, 30 June 2018

Gurbani Kirtan Sri Darbar Sahib Sri Harmandir Sahib Amritsar 01-07-2018 Morning

Gurbani Kirtan Sri Darbar Sahib Sri Harmandir Sahib Amritsar 01-07-2018 Morning

Harry
Gurbani Kirtan Sri Darbar Sahib Sri Harmandir Sahib Amritsar 01-07-2018 Morning ਜੌ ਰਾਜੁ ਦੇਹਿ ਤ ਕਵਨ ਬਡਾਈ ॥ ਜੌ ਭੀਖ ਮੰਗਾਵਹਿ ਤ ਕਿਆ ਘਟਿ ਜਾਈ ॥੧॥ If You gave
Hukamnama Sri Darbar Sahib, Amritsar, Date 01 July 2018 Ang 616

Hukamnama Sri Darbar Sahib, Amritsar, Date 01 July 2018 Ang 616

Harry
Hukamnama Sri Darbar Sahib, Amritsar, Date 01 July 2018 Ang 616 ਸੋਰਠਿ ਮਹਲਾ ੫ ॥ ਮਾਇਆ ਮੋਹ ਮਗਨੁ ਅੰਧਿਆਰੈ ਦੇਵਨਹਾਰੁ ਨ ਜਾਨੈ ॥ ਜੀਉ ਪਿੰਡੁ ਸਾਜਿ ਜਿਨਿ ਰਚਿਆ ਬਲੁ

Friday, 29 June 2018

Thanatos Ransomware: Recover Files Without Paying Ransom | Live Demo In Hindi By TechChip

Thanatos Ransomware: Recover Files Without Paying Ransom | Live Demo In Hindi By TechChip

Harry
Thanatos Ransomware: Recover Files Without Paying Ransom | Live Demo In Hindi By TechChip. Back In February A New Ransomware Is Spreading Called Thanatos That Was Encrypting Victim's
Create A Bootable Hiren’s Boot CD on USB Flash Drive (2018) By Britec09

Create A Bootable Hiren’s Boot CD on USB Flash Drive (2018) By Britec09

Harry
Create A Bootable Hiren’s Boot CD on USB Flash Drive (2018) By Britec09. Hiren's Boot CD Has Been Updated To A Windows 10 PE With Loads Of PC

Tuesday, 26 June 2018

Case statement in SQL

Case statement in SQL

Harry
CASE statement in SQL CASE:- CASE statement is used for series of IF statements.CASE statement is evaluated from top to bottom. If a condition is true, then corresponding
NVL, NVL2 and NULLIF Function

NVL, NVL2 and NULLIF Function

Harry
NVL, NVL2 and NULLIF Function NVL(),NVL2() and NULLIF() :- These functions are used to treat the null value. NVL():- This function is used when we want to put

Sunday, 24 June 2018

Cloning database with RMAN

Cloning database with RMAN

Harry
Below are the steps to clone production database(primedb) to UAT database(clonedb)   STEP1:- Check the both servers are able to connect each-other STEP2:- Take full database backup and control

Saturday, 23 June 2018

Collection Methods

Collection Methods

Harry
Collection Methods Collection Methods:-Oracle provides the built-in collection methods that make collections easier to use. Below is the list of collection Methods 1) EXISTS(n) :-Returns TRUE if the
Examples of Collection

Examples of Collection

Harry
Index-By Table:-An index-by table (also called associative array) is a set of key-value pairs. Each key is unique and is used to locate the corresponding value. The key

Friday, 22 June 2018

How To Build a Gaming PC Guide in Marathi By Marathi Tech

How To Build a Gaming PC Guide in Marathi By Marathi Tech

Harry
How To Build a Gaming PC Guide in Marathi By Marathi Tech. सुटे भाग विकत घेऊन घरीच स्वतः कम्प्युटर पीसी कसा तयार करायचा याबद्दल मराठीतला हा पहिलाच व्हिडिओ.

Wednesday, 20 June 2018

How To Make A Classified Advertisement Listing Website With WordPress 2018 - Adifier Theme By Nayyar Shaikh

How To Make A Classified Advertisement Listing Website With WordPress 2018 - Adifier Theme By Nayyar Shaikh

Harry
How To Make A Classified Advertisement Listing Website With WordPress 2018 - Adifier Theme By Nayyar Shaikh. How To Make A Classified Advertisement Listing Website like Olx, Craigslist,

Tuesday, 19 June 2018

Nipe - How To Fully Anonymize Your System With Tor By HackerSploit

Nipe - How To Fully Anonymize Your System With Tor By HackerSploit

Harry
Nipe - How To Fully Anonymize Your System With Tor By HackerSploit. In This Video HackerSploit Showing You How To Fully Anonymize Your System With Tor Using Nipe.

Saturday, 16 June 2018

Tongue ID Recognition | Better than Face Unlock and Fingerprint? By Technical Guruji

Tongue ID Recognition | Better than Face Unlock and Fingerprint? By Technical Guruji

Harry
Tongue ID Recognition | Better Than Face Unlock And Fingerprint? By Technical Guruji. Is Video Technical Guruji Baat Ki Hai Tongue Recognition Systems Ke Baare Mein Jinko Hum

Thursday, 14 June 2018

Tuesday, 12 June 2018

Fone Monitor - Monitoring & Spying Android / IOS Smartphone 2018 By SSTec Tutorials

Fone Monitor - Monitoring & Spying Android / IOS Smartphone 2018 By SSTec Tutorials

Harry
Fone Monitor - Monitoring & Spying Android / IOS Smartphone 2018 By SSTec Tutorials. In This Video Show You A Smartphone Activity Monitoring Service. Fone Monitor Is Designed
Cyber Security Tutorial | Importance of Cyber Security | Cyber Security Training

Cyber Security Tutorial | Importance of Cyber Security | Cyber Security Training

Harry
Cyber Security Tutorial | Importance of Cyber Security | Cyber Security Training. Why Learn Cyber Security?  Computer Viruses, Data Compromised By Hackers, Network Outrages And Other Such Incidents

Monday, 11 June 2018

remove duplicate contacts on yahoo mail

remove duplicate contacts on yahoo mail

Harry
this article is about removing duplicate contacts in yahoo mail account. If you have duplicate contacts and you have to remove them, then you can follow below steps When