Security - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

results for: security

The best tricks and features to master your Android Smart TV

We bring you a collection of the best tricks to squeeze Android TV, the Google operating system designed for televisions. You can find it on smart televisions of some brands, but also on devices that you will connect to the TV. With all of them, you can use different types…

Category : Networking   05-11-2020   by Luigi Nori

Why You Should Hire Node.js Developer for Your Backend Development

When developers are building a new website, they mainly focus on both frontend and backend development. The frontend code helps create the interfaces through which the app interacts with the users while the back-end code interacts with the server to deliver data or content that is displayed to the website…

Category : Javascript   27-10-2020   by Luigi Nori

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…

Category : Security   08-10-2020   by Iveta Karailievova

HTTP Cookies: how they work and how to use them

Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…

Category : Programming   27-11-2020   by

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site. This is an extension that has native versions to download in Chrome, Firefox, Microsoft Edge and Opera, although it can…

Category : News and events   30-09-2020   by Silvia Mazzetta

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…

Category : Security   28-09-2020   by Silvia Mazzetta

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…

Category : Development   13-12-2023   by

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser It is also possible to increase the security level of the…

Category : Security   08-03-2024   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   08-03-2024   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through standard commercial channels, while others are sold through direct distributors and cash payment. We list some of them here, with the…

Category : Security   15-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

How to install a Linux partition on a Windows 10 PC

In spite of a past we could say almost confronted, the approach between Windows and Linux is accelerating more and more, drawing a story closer to love than to hate. So much so that Windows 10 already offers support for Linux natively. Creating a subsystem is no longer penalized. A…

Category : Operating systems   06-09-2020   by Luigi Nori

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

The package managers npm and yarn: main differences

Npm and yarn are package managers that help to manage a project’s dependencies. A dependency is, as it sounds, something that a project depends on, a piece of code that is required to make the project work properly. In the past we had only npm but it had so many issues…

Category : Javascript   19-08-2020   by Luigi Nori

The 6 Essentials for Creating a Visually Appealing Web Design

Creating a website might seem like a simple thing. After all, what do you really need besides a good hosting provider and relevant content, right? Well, the reality is quite different. Things might have worked like that in the past, but they are quite different now.   The internet is advancing, and…

Category : Web design   25-08-2020   by Silvia Mazzetta

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

Bank phishing by email: best way to prevent it

No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…

Category : Security   16-07-2020   by Silvia Mazzetta

Smishing: risks, examples and how to avoid it

Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Awesome JavaScript Games and Js Software to create Games

Best sites js13kGames 2019 - Highlights from the js13kGames 2019 competition. js13kGames 2018 - 13 Games in ≤ 13kB of JavaScript. js13kGames 2017 - Build a game in 13kB or less with js13kGames. Adventure Triangle: Back To Home - You are lost in the cave. Try to get out and back to home. Sometimes it…

Category : Javascript   30-06-2020   by Janeth Kent

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

Why do you vote the way you do in the age of misinformation and fake news?

In this context of the electoral campaign in which we are immersed, the 'political hoaxes' are becoming more relevant and it is expected that attacks to destabilize the parties and candidates in order to influence the electorate will increase. As recent examples, let's remember that disinformation campaigns influenced Trump to win…

Category : News and events   11-06-2020   by Silvia Mazzetta

What is Cyber Intelligence and how is it used?

What is Cyber-intelligence and what is it used for? This is a question that is usually asked by security, cyber-security and intelligence professionals. Cyber-intelligence is a hybrid concept between these three worlds and professional fields, and therefore it is an opportunity and a necessity to know what it is and what…

Category : Security   11-06-2020   by Silvia Mazzetta

Onion Search Engine: How to browse the Deep Web without Tor

The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…

Category : Security   25-05-2020   by Janeth Kent

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   20-04-2023   by Silvia Mazzetta

Protect yourself: know which apps have access to your location, microphone and camera

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...   Smartphones have become the target of choice for hackers and criminals who want to make money or extort money…

Category : News and events   20-04-2020   by Silvia Mazzetta

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   03-11-2022   by Janeth Kent

How to find everything you need on the Deep Web and the Dark Web

How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…

Category : Security   10-05-2021   by Silvia Mazzetta

How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit

Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…

Category : Security   02-03-2020   by Silvia Mazzetta

Linux for Dummies: Introduction

If you have thought about migrating from Windows to a Unix operating system, or Linux specifically there are things you should know. The goal is to give essential information (and not) to take the first steps in the world of the "penguin". What is Linux? With the word Linux we commonly refer…

Category : Operating systems   21-08-2020   by Alessio Mungelli

There are 470,000 WhatsApp groups indexed on Google and Facebook says it's not his fault

Want to find new WhatsApp groups? Google it. Reporter Jordan Wildon has discovered hundreds of thousands of private groups through the search engine thanks to public invitation links. Not all were created with the intention that anyone could join them after a simple search. As a Facebook spokesperson explained to Motherboard, administrators…

Category : News and events   22-02-2020   by Janeth Kent

Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF

Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…

Category : Javascript   30-01-2020   by Luigi Nori

Best Web Proxies for Safer and Anonymous Surfing

Privacy is increasingly demanded in the context of global society. Contributing to this are the notorious cases of massive infiltration and security breaches that have ended up filtering users' private data. But there is also a widespread suspicion that someone is "watching" everything we do. For that reason, the use…

Category : Security   11-01-2020   by Silvia Mazzetta

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

The worst 50 passwords of 2019

Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little seriously. The security company SplashData has published its ninth annual list of the year's worst passwords, assessing over 5 million passwords…

Category : News and events   31-12-2019   by Silvia Mazzetta

Is It Risky to Share Data While Surfing Online?

The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…

Category : Security   30-12-2019   by Janeth Kent

How to Generate Static Sites with JavaScript Static Sites Generators

Static websites and so-called JAMstack have become pretty popular recently. And with 2020 on the horizon, this trend doesn't seem to be stopping. Why? Why is old-school HTML + CSS + JS  trio in its redesigned and renamed form gaining so much attention? In this article, we'll explore what the…

Category : Javascript   13-12-2019   by Luigi Nori

5 popular Dark Web sites

People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…

Category : News and events   09-12-2019   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

How They Can Hack You While Navigating: Protecting Your Digital Security

As technology continues to advance, navigation systems have become an integral part of our daily lives. From GPS-enabled smartphones to in-car navigation systems, we rely on these tools to guide us to our destinations efficiently. However, with the rise in cyber threats, it's important to understand the potential risks associated…

Category : Security   23-06-2023   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…

Category : Networking   24-04-2020   by Luigi Nori

Wi-Fi 6

  In the second quarter of 2019, Wi-Fi Alliance decided to release the new version of Wi-Fi protocol, innovative already from the name. In fact, if the previous standards had incomprehensible names like IEEE 802.11a, IEEE802.11n and so on, the new protocol is called Wi-Fi 6. This standard introduces some new features.…

Category : Technology   12-09-2019   by Alessio Mungelli

Deep web: 5 curious facts you didn't know about

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents…

Category : Networking   05-08-2019   by Janeth Kent

Now you can download the new Windows terminal: new, modern, fast, efficient, and powerful.

Microsoft has announced its new Windows Terminal, which will bring together PowerShell, CMD and WSL, includes a real Linux kernel that allows you to run more Linux software on Windows and with better performance than WSL 1 in one place to end the diversification that currently has the operating system…

Category : Software   26-06-2019   by Janeth Kent

How to Create your own custom Linux system, step by step

Here is some information where you can learn step by step how to customize a Linux distribution to create your own Linux. If we follow the steps, even the less experienced will be able to create their own Linux to their liking. Personalizing a distribution not only serves to have a…

Category : Operating systems   14-06-2019   by Janeth Kent

How to Get the Most out of Digital Technology in Business

How to Get the Most out of Digital Technology in Business

The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…

Category : News and events   29-03-2019   by Janeth Kent

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by Janeth Kent

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

What actually is CSS-in-JS? You've certainly heard or read words like CSS-in-JS, Styled Components, Radium, Aphrodite and you're and you're stuck in limbo there, "why is it? I'm completely happy about CSS - in - CSS!" We are here to explain these new concepts and clarify them. That said -feel free to use…

Category : Javascript   26-02-2019   by Janeth Kent

Top free JavaScript User Authentication Libraries

We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…

Category : Javascript   29-01-2020   by Janeth Kent

The Meaning of Colors in web Design. A little bit of psychology

The Meaning of Colors in web Design. A little bit of psychology

Color psychology is one of the most talked about and interesting parts of psychology. The idea that some colors evoke feelings and emotions. In fact, this color helps buy the most attractive product. You invest a great deal of time and money to create a convincing website design to increase…

Category : Web design   05-08-2019   by Janeth Kent

Working with JSON in JavaScript

JSON is short for JavaScript Object Notation and an easy - to - access way to store information. In short, it gives us a collection of human - readable data that we can access in a very logical way. In addition to RSS feeds, any sites now share data using JSON,…

Category : Javascript   08-04-2020   by Janeth Kent

How to build a basic PWA with HTML and Javascript

Looking at the web for a basic PWA online training exercise, everything I found was just too confused or required libraries/system/stage or another. If we need to learn another innovation, we would preferably not get derailed with redundant subtleties ... We have indeed composed a basic introductory exercise to draw from different…

Category : Javascript   10-04-2020   by Janeth Kent

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…

Category : Networking   27-12-2018   by Janeth Kent

How to install Letsencrypt Certificates with Certbot in Ubuntu

In this article we will explain how to install, manage and configure the SSL Security certificate, Let's Encypt in NGINX server used as proxy. This certificate is free but does not offer any guarantee and has to be renewed every 3 months. We recommend that users with shell access use the…

Category : Servers   09-05-2020   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   30-03-2023   by Janeth Kent

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by Janeth Kent

8 Free PHP Books  to Read in Summer 2018

8 Free PHP Books to Read in Summer 2018

In this article, we've listed 8 free PHP books that can help you to learn new approaches to solving problems and keep your skill up to date.   Practical PHP Testing This book is aimed at advanced php developers and is comprised of articles from the author's Practical PHP Testing blog series. It…

Category : Php   20-06-2018   by Janeth Kent

2 Areas of Business You Need to Audit

2 Areas of Business You Need to Audit

Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…

Category : Startups   28-05-2018   by Janeth Kent

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by Janeth Kent

Setting Up SFTP on Ubuntu 16.04

Setting Up SFTP on Ubuntu 16.04

I recently had a request to setup SFTP for a customer so they could manage a set of files in their environment through an FTP GUI. Being an avid user of command line tools like SCP I haven’t needed to set up FTP or SFTP in many years. So I…

Category : Operating systems   12-03-2018   by Janeth Kent

Install Java in Ubuntu 16.04

Install Java in Ubuntu 16.04

Java and the JVM (Java's virtual machine) are widely used and required for many kinds of software. This article will guide you through the process of installing and managing different versions of Java using apt-get. Installing the Default JRE/JDK The easiest option for installing Java is using the version packaged with Ubuntu.…

Category : Networking   23-11-2017   by Janeth Kent

What You Need to Start a Great Healthcare Blog

What You Need to Start a Great Healthcare Blog

Would you like to start your own healthcare blog? Many people think about setting up this type of resource, but very few of these people eventually make a success of it. However, if you're serious about setting up a great healthcare blog, you need the following things: A Recognized Healthcare Qualification People…

Category : Web marketing   21-09-2017   by Janeth Kent

How to Configure the Mod_Security Core Ruleset in Ubuntu

How to Configure the Mod_Security Core Ruleset in Ubuntu

ModSecurity is a Web Application Firewall, a program that can be used to inspect information as it passes through your web server, intercepting malicious requests before they are processed by your web application. This tutorial will show you how to install ModSecurity on Apache, and configure it with some sensible rules provided…

Category : Servers   04-03-2017   by Janeth Kent

How to Connect to a Remote Server via SSH from a Linux Shell

How to Connect to a Remote Server via SSH from a Linux Shell

Introduction Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and…

Category : Servers   16-02-2017   by Janeth Kent

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

Last week, the voting phase closed on an RFC to add libsodium to PHP 7.2. The result was unanimous (37 in favor, 0 against). When version 7.2 releases at the end of the year, PHP will be the first programming language to adopt modern cryptography in its standard library. What is Modern…

Category : Php   14-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

Install Apache, MariaDB and PHP7 on Ubuntu 16.04

Install Apache, MariaDB and PHP7 on Ubuntu 16.04

Ubuntu 16.04 LTS Xenial Xerus comes with PHP7 by default so you don’t have to rely on third-party PPA to get PHP7 installed. In this tutorial, we are going to look at how to install Apache, MariaDB and PHP7 (LAMP stack) on Ubuntu 16.04 LTS Xenial Xerus. Update: This tutorial is…

Category : Servers   18-11-2016   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

Install Syncthing on Ubuntu 16.04 using Debian Repository

Install Syncthing on Ubuntu 16.04 using Debian Repository

Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation, modification or deletion of files on one machine will automatically be replicated to your other devices. Syncthing…

Category : Servers   19-08-2016   by Janeth Kent

Google Chrome will block Flash content starting next month, make HTML 5 default by December

Google Chrome will block Flash content starting next month, make HTML 5 default by December

There really is no stopping Flash's demise. In a blog post Chrome team has announced that the browser will start blocking the Flash starting this September with Chrome 53. As more and more websites are moving towards HTML5 type of technologies which gives user faster page loading time, improved security and…

Category : News and events   10-08-2016   by Janeth Kent

What is a DDOS attack and tools used

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users. The denial…

Category : Security   04-05-2021   by Janeth Kent

Install HHVM + Nginx on Ubuntu 14.04

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…

Category : Networking   12-05-2017   by Janeth Kent

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

Open source alternatives to Slack

Here are some full-featured Slack alternatives that are open-source software, which means you can download it and run it on whatever server you want. That implies that you’re in charge of security, for better or worse, instead of, say, Slack. Friends This tool emerged earlier this year, Friends stands out for its…

Category : Development   02-12-2019   by Janeth Kent

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   18-12-2023   by Janeth Kent

How to setup FTP server on ubuntu 14.04 with VSFTPD

How to setup FTP server on ubuntu 14.04 with VSFTPD

FTP is used to transfer files from one host to another over TCP network. This article explains how to setup FTP server on ubuntu 14.04 . There are 3 popular FTP server packages available PureFTPD, VsFTPD and ProFTPD. Here i’ve used VsFTPD which is lightweight and less Vulnerability. Step 1 » Update…

Category : Networking   13-01-2015   by Janeth Kent

PHP Filters: the best way to sanitize and validate datas

What are PHP filters? One of the most amazing strengths of PHP is its convenience. Shockingly this same profit has worked against PHP as numerous new coders have forgotten any security to establish safety or fails to offer the adroitness to make a class to validate their variables from end users. One…

Category : Php   02-03-2020   by Janeth Kent

Speed up your site and protect it against DDOS attacks with CloudFlare

Speed up your site and protect it against DDOS attacks with CloudFlare

If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…

Category : Networking   23-07-2014   by Luigi Nori

Mozilla introduces Firefox 29

Mozilla introduces Firefox 29

Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…

Category : Software   29-04-2014   by Janeth Kent

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by Janeth Kent

Google Apps Drops Support for IE9

Google Apps Drops Support for IE9

The Google Apps blog announced that Google will drop support for Internet Explorer 9, now that Internet Explorer 11 is available. "We support the latest version of Google Chrome (which automatically updates whenever it detects that a new version of the browser is available) as well as the current and…

Category : Software   06-11-2013   by Janeth Kent

50 Most Useful jQuery Plugins of the year #2

50 Most Useful jQuery Plugins of the year #2

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Javascript   05-11-2013   by Janeth Kent

10 Best PHP Scripts for Polling System

10 Best PHP Scripts for Polling System

In this post we will show you a collection of 10 best PHP Poll Scripts. These PHP scripts for polling system can be added in any self-hosted website. Check out these awesome and easy to install scripts. 1. JAXpoll   JAXpoll is a polling widget that you can add into any of your websites.…

Category : Php   23-08-2013   by Janeth Kent

Top Tricks for Speeding Up Your Android Device

Top Tricks for Speeding Up Your Android Device

In today's fast-paced digital world, a sluggish Android device can be a source of frustration. Slow app launches, laggy performance, and delays in responsiveness can hinder your productivity and overall user experience. Fortunately, there are several tricks and optimizations you can employ to speed up your Android device and regain…

Category : Operating systems   28-06-2023   by Janeth Kent

11 Open Source JavaScript Libraries for Web Developers

Undoubtedly, JavaScript is one of the most used programming languages nowadays. Thanks to it, we have access to different features offered in the websites we visit regularly and which make our browsing experience much more pleasant, simple and entertaining. The browsers we use have their own JavaScript engines integrated, in order…

Category : Javascript   17-06-2020   by Janeth Kent

A Collection of Essential WordPress Plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…

Category : Web design   21-08-2020   by Janeth Kent

The Future of Web Browsing: Liberating Content from the Confines of Space

  Since its inception, the World Wide Web has revolutionized the way we access and interact with information. However, with the rapid advancements in technology and the emergence of new paradigms, the future of web browsing is poised to undergo a radical transformation. In this article, we explore an intriguing possibility…

Category : News and events   28-06-2023   by Janeth Kent

10 Best Free Ecommerce Solutions On The Market

As the digital landscape continues to evolve, ecommerce has become an essential part of businesses worldwide. Entrepreneurs, small businesses, and even established enterprises are seeking robust and costeffective solutions to set up their online stores. In this article, we will explore the ten best free ecommerce solutions available on the…

Category : Software   21-07-2023   by Janeth Kent

p=30&q=security Clicky