db filter is very important in odoo,Odoo is a multi-tenant system: a single Odoo system may run and serve a number of database instances. It is also highly customizable, with customizations (starting ...
The Process to Solve the Failed Invoices in Phase II When ZATCA sends back a failed invoice, it will provide the reason for the failure. Accordingly, you must correct the errors and re-generate the e-...
ngrok ngrok is a cross-platform application that enables developers to expose a local development server to the Internet with minimal effort. website: https://ngrok.com/download Install ngrok via Snap...
pyenv Pyenv is a simple tool to manage multiple versions of Python . This tool helps in the following ways according to the official pyenv GitHub README documentation: It sets the global Python versio...
Onboarding is mandatory for all taxpayers who are subject to electronic invoicing in Saudi Arabia. As a result of the onboarding process, taxpayers obtain Cryptographic Stamp Identifiers (CSIDs). CSID...
JavaScript libraries provide ready-made functions and tools that developers can use to speed up web application development. Vanilla JavaScript, on the other hand, refers to the use of pure JavaScript...
Introduction to Data Science Tools and Techniques Data science is an interdisciplinary academic field that uses statistics, scientific computing, scientific methods, processes, algorithms and systems ...
Client use cases Odoo enterprise app is very strong while for community you have to use some of thirdparty apps to make things works, let check below https://apps.odoo.com/apps/modules/15.0/stock_barc...
Before starting make sure you have good understanding of vanilla js/ plain javascript, jquery etc The Javascript framework is designed to work with three main use cases: the web client : this is the p...
What is Application Security? Application security is defined as the use of application security solutions, tools, and processes to secure applications across their life cycle. The speed of modern dev...
Firewall A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its primary purpose is to establish...
Bastion server/Jump Server The main purpose of a bastion server: acting as a gateway to access other servers within a network.It's your first line of defense against potential cyber threats. Imagine y...
Installation Documentation https://docs.bigbluebutton.org/2.2/install.html Method Used https://github.com/bigbluebutton/bbb-install Connecting to server 1. command: ssh root@192.181.1.1 password: elf7...
One2many, Many2many fields odoo Case 1 Many2many relationship with same co-model on the same entity in Odoo. as we know the basic principal of many2many field is its create another table/model in data...
Server migration for odoo on older server stop odoo server and take the backup of your posgres if its filestore size is big else you can take backup with filestore as well. follow the blogs for instal...
security objectives of confidentiality, integrity, and availability. Confidentiality According to ISACA is preserving authorized restrictions on access and disclosure Including means for protecting pr...
Vulnerability assessment A vulnerability assessment is the testing process used to identify and assign severity levels to as many security defects as possible in a given timeframe. This process may in...
Nmap is a network scanning tool—an open source Linux command-line tool—used for network exploration, host discovery, and security auditing . Installation in linux/ubunut sudo apt update sudo apt insta...
Open web/Surface web is the “visible” surface layer. If we continue to visualize the entire web like an iceberg, the open web would be the top portion that’s above the water. From a statistical standp...
Assets, Threats, and Vulnerabilities security risk planning consist of three main elements 1. assets 2. threats 3. vulnerabilities security team help companies related to the risk, Security teams are ...
In this blog post, we delve into the intricacies of recovering Odoo databases using the command line interface, often referred to as the terminal. While recovering a database from the front end is a c...
Github Most popular version controlling tool List existing branches. git branch Switch to a different branch git checkout branch_name Merge changes from one branch into the current branch git merge br...
rsync stands for "remote synchronization." It is a powerful and versatile command-line utility used for synchronizing files and directories between two locations, either on the same system or between ...
Linux/ubunut Cheat sheet To create a new user in a Linux-based operating system, you can use the adduser or useradd command. Here are the basic commands to create a new user: Using adduser (more user-...
This blog will represent the installation aspects of Odoo 16 in an Ubuntu server 20.04 LTS and will help to understand its process. before starting make sure your server is enough secure follow this b...
This blog will represent the installation aspects of Odoo 16 in an Ubuntu server 20.04 LTS and will help to understand its process. before starting make sure your server is enough secure follow this b...
Keeping important files like authentication details or server etc , its very sensitive information, so be careful with it. Its good to have your encrypted file on cloud, whenever any disaster happens ...
The Zakat, Tax and Customs Authority (ZATCA) has recently informed taxpayers about establishing a new "Fatoora simulation portal" (FSP) which will be available by 27 December 2022. The FSP will be a t...
The prime goal of cyber security is to decrease the risk of cyber assaults and to defend against unauthorized use of networks, systems and technology. When we talk about cyber security , its big field...
EGS Onboarding — ZATCA Phase-2 E-Invoicing Audience : This blog is intended to explain the ZATCA’s Phase-2 E-Invoicing process to a Taxpayer/EGS user in Saudi Arabia. So, I will address the “Taxpayer”...