Depending on the folders into which items are uploaded in SharePoint, you may want to set default column values so that instead of a global column default value, your default values become folder-specific. This article demonstrates how to do this using C# code on a SharePoint 2016 server. The code can be added to event receivers to keep child items updated when something changes somewhere.
Say you have a SharePoint workflow which runs whenever a list item changes (ItemUpdated). You also have some custom code to do some manipulation on the same list item at the end of which you need to perform an item update using one of the SPListItem update methods: Update(), Systemupdate() and UpdateOverwriteVersion(). You will quickly notice that this update will trigger another instance of the workflow for this item once the current workflow terminates. You have just hit an infinite loop.
Many people play with PHP without necessarily being professional developers. For such people, package managers may make coding seem too complicated. This article shows how to bypass the Composer barrier when installing Composer-dependent PHP packages.
This code will select a random user agent from a predefined list of valid user agent strings. It’s useful for building certain types of web crawlers or cache warming bots. It helps bypass firewalls that reject requests missing a user agent string.
Computer viruses are much different than what they were 20 years ago. New malware steals your identity, and viruses are even written for mobile devices. This article describes the common and especially nasty viruses that are used in identity theft and stealing your data.
OAuth is convenient when you want to allow users to log in to your site, but you don’t have the security know-how to handle the process of transmission and storage. OAuth also makes it convenient for users to log in to your site, and you still get access to social media data. When a social media platform gives you access to an API for web development, you should do data mining responsibly. This article gives developers five dos and don’ts (as per user data) when using OAuth for social media login and access.