Get Started : 1-888-994-7447
ISHIR Blog
24

Jul , 14

How to use SHIMS in APP-V 5.0 (Standard Alone)– An Overview

In Application Compatibility Toolkit/Remediation projects, sometimes it becomes necessary to apply shims to fix compatibility issues.   APP-V 5.0:   In App-V 5.0, you can’t add SHIMS along with the packages and that is why they must be supplied separately.   The process for using shims in App-V packages:   The process for creating a [...]

23

Jul , 14

Full Write Permissions to Virtual File System

Most of the Applications which were sequenced using AppV 5.0 SP2 failed due to prohibitory write permissions to Virtual File System (VFS). Later on, with the release of Hotfix 4 for AppV 5.0 SP2 it was noticed that one can have full write permissions to VFS.   Virtual File System: While sequencing an Application using [...]

23

Jul , 14

My five Favorite SEO Tools that I can`t survive without!

Wayback Machine Life saver, one of my favorite tools that took me back into the past to the domain or website which I always wanted to visit. The Wayback Machine is the Internet’s up to date most complete historical archive, and it lets you find out the historical appearance of website on any domain. It [...]

22

Jul , 14

PhoneGap Using Xcode

I had some free time from Mobile Application Development and was feeling alone too. Suddenly, a thought cropped up in my mind to learn something new pertaining to Mobile Development.   I started searching and found that Hybrid applications are in vogue. In a hybrid application, single code can run on multiple platforms. So, I [...]

22

Jul , 14

Web Application Vulnerability – CSRF

A Cross Site Request Forgery (CSRF) attack is one of the widely used web application vulnerability. Basically, an attacker will use CSRF to trick a victim into accessing a website or clicking a URL link that contains malicious or unauthorized requests. In other words, we can say that the victim unintentionally runs a script in [...]