This is a technical blog created for self learning. All the contents of this blog are of my own. The content represents the views and opinions of mine only.
This blog is intended to spread technical knowledge. The content of this blog is not intended to cause harm, but if there any concerns about the contents of this blog, please contact us via e-mail. Disagreeing with the content of the blog does not constitute sufficient ground for you to ask to remove or modify any parts of this blog.
Most of the images and other content which have been shown for illustrative purposes have been given due credit to the author. For e.g. most of the Microsoft articles or images are given due credit by mentioning the image source or the URL. Hence if you find any discrepancies in the same kindly send an e-mail to firstname.lastname@example.org
We give utmost priority to our visitors. Your privacy is very important to us. To better protect your privacy we are providing this notice explaining our online information practices so that you can make a better choice while providing your information
The site uses favicon and logos from https://www.freepngs.com. Also most of the images mention the source from which they have been taken. Hence any image which might not have a source specified might be purely coincidental and not on purpose.
Like many other web sites, this site may make use of log files which is a default feature for the hosting provider for this site. These files merely logs visitors to the site – usually a standard procedure for hosting companies and a part of hosting services’s analytics. The information inside the log files includes internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and possibly the number of clicks. This information is used to analyze trends, administer the site, track user’s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.
- Google’s use of advertising cookies enables it and its partners to serve ads to your users based on their visit to your sites and/or other sites on the Internet.
Third Party Privacy Policies
If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browsers’ respective websites.
Data Used: Commenter’s name, email address, and site URL (if provided via the comment form), timestamp, and IP address. Additionally, a jetpack.wordpress.com IFrame receives the following data: WordPress.com blog ID attached to the site, ID of the post on which the comment is being submitted, commenter’s local user ID (if available), commenter’s local username (if available), commenter’s site URL (if available), MD5 hash of the commenter’s email address (if available), and the comment content. Akismet (also owned by Automattic) is enabled on the site, the following information is sent to the service for the sole purpose of spam checking: commenter’s name, email address, site URL, IP address, and user agent. More information at https://akismet.com/privacy/
Activity Tracked: The comment author’s name, email address, and site URL (if provided during the comment submission) are stored in cookies. Learn more about these cookies.
Data Synced: All data and metadata (see above) associated with comments. This includes the status of the comment and, if Akismet is enabled on the site, whether or not it was classified as spam by Akismet