Email -

129 results for: email

Introduction to REGEX - Regular Expression

Today we are going to write about Regular Expressions known as regex or shortened  regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…

Category : Programming   23-10-2020   by Tibor Kopca

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   22-10-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser   It is also possible to increase the security level of the…

Category : Security   19-09-2020   by Janeth Kent

Suggestions to Improve the Efficiency of a Small Business

If you have a small business, it means that every resource matters. You have less room for error due to a lack of manpower as well as other aspects. So focusing on efficiency is something that ought to be your priority. Of course, inefficient experience is a big hindrance. You may…

Category : Web marketing   19-09-2020   by Janeth Kent

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

Free Netflix: everything you can see without subscribing

To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…

Category : News and events   09-09-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

What is the origin of the word SPAM?

It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…

Category : Web marketing   03-08-2020   by Janeth Kent

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by Paolo Masucci

7 Killer Strategies to Increase Your Sales Funnel Conversion Rates

Have you been using online sales funnels to grow your business online but it hasn't really worked for you? There's something you are not doing right. Use these strategies to make your sales funnels convert better. We are living in a competitive digital era, and as an entrepreneur, you have to…

Category : Web marketing   23-07-2020   by Janeth Kent

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

Bank phishing by email: best way to prevent it

No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…

Category : Security   16-07-2020   by Silvia Mazzetta

Smishing: risks, examples and how to avoid it

Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   02-05-2020   by Silvia Mazzetta

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   26-10-2020   by Janeth Kent

Building a Home for Your Home Finders

As a real estate agent, one of the most important aspects of your job is outreach. No one will know about your services if you have no way of letting them know. Billboards and commercials are a great way to reach your clients along with online advertising, but if you…

Category : Web marketing   14-04-2020   by Luigi Nori

Best Free Image Optimization Tools for Image Compression

Our monitors are getting better and better and, of course, we want to make them profitable by enjoying images with an increasing resolution when we browse. The problem is that this only increases the weight of the web pages, slowing down their load (and thus degrading the user's experience). Something…

Category : Software   27-03-2020   by Janeth Kent

How to Improve Your Website to Attract Local Customers

If you run a small business, make no mistake: local search is imperative for your success. You might have lofty dreams of attracting the world to your website, but it’s those local visitors who will make the difference. This is because 80% of people will try and find local information with…

Category : Web marketing   18-03-2020   by Maguire Haigh

Best ways to start a video conference without registration

Nowadays it is very easy to make a video conference without using Whatsapp, Skype or any of those platforms that require user registration, phone, email and so on. Today we will talk about three options that allow video conferencing in a few seconds, being only necessary in most cases to inform…

Category : Multimedia   21-04-2020   by Silvia Mazzetta

Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF

Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…

Category : Javascript   30-01-2020   by Luigi Nori

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

5 popular Dark Web sites

People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…

Category : News and events   09-12-2019   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : News and events   08-12-2019   by Silvia Mazzetta

How to Pique Customer Interest

If your target audience aren’t interested in your brand, your marketing campaigns, or the service that you provide, why would they feel compelled to bring you their business? If you’re to attract a steady stream of new customers, you’re going to have to find a way to make your business…

Category : Web marketing   06-12-2019   by Silvia Mazzetta

How to Build Your eCommerce's Email List Using Instagram

Instagram is quickly becoming a favorite social media channel among eCommerce business owners because of its high engagement rate. But when it comes to getting the highest return on your investment, that recognition belongs to email marketing. Now, imagine what will happen to your eCommerce business if you can have a way…

Category : Web marketing   06-12-2019   by Luigi Nori

How they can hack you while navigating

When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…

Category : Security   02-12-2019   by Silvia Mazzetta

How to prevent people from adding spam events and appointments in Google Calendar

Let's explain how to prevent people from adding spam to your Google Calendar by adding events and appointments without your approval. This is a practice that has been used for more than a decade to add appointments and events in which ads appear that may be fraudulent, so that they…

Category : News and events   28-08-2019   by Silvia Mazzetta

What to Expect from Email Marketing Tools in 2019

Along with everything else, marketing has received a huge boost recently, thanks to technology. As email continued to be a top performer even in 2018, it’s one of the integral parts of any online campaign today. So, what should you look for in your email marketing tools in 2019?   Advanced Automation…

Category : Web marketing   18-11-2019   by Janeth Kent

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   17-09-2020   by Janeth Kent

Best 9 Free Rss Readers

Lately we have been on a constant lookout for good RSS readers to find and share rich content for our users. RSS is a great way to keep in the loop of news, because it updates as soon as your favorite news sites update, and you get your news as…

Category : Software   16-04-2020   by Janeth Kent

Features you will get in EaseUS data recovery software

The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…

Category : Software   25-06-2019   by Janeth Kent

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by Janeth Kent

What You Need to Know When Sending a Press Release to Newswire

What You Need to Know When Sending a Press Release to Newswire

A newswire or a press release distribution service helps businesses in improving their online visibility and web presence. If you haven’t used it before, there are many things you need to know prior to using any platform. What is a newswire? Newswire or wire services syndicate your story across different sites and…

Category : News and events   25-02-2019   by Janeth Kent

Top free JavaScript User Authentication Libraries

We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…

Category : Javascript   29-01-2020   by Janeth Kent

Best 5 Frontend Development Topics in 2019

Best 5 Frontend Development Topics in 2019

Ah, a new year. A time of positivity, a time to restart. For new objectives and proposals. And in the world of developers, to look at the scenery and decide what we need to learn to keep up. Because let's face it-web development is always changing, and we're falling behind…

Category : Programming   18-02-2019   by Janeth Kent

Most Popular Node.js Frameworks in 2019

Most Popular Node.js Frameworks in 2019

Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…

Category : Javascript   14-02-2019   by Janeth Kent

The Most Useful 50 Web Sites you wish you knew earlier

There are so many websites around, and it is very complicated to know each and every one of them. Our lisy provides 100 those websites that we find particularly helpful, even though they are not as famous or as prevalent as some of the big names. archive.is — take a snapshot of…

Category : Web marketing   13-06-2020   by Janeth Kent

Six Ways to Make  Your Design Brand Stand Out with a Portfolio

Six Ways to Make Your Design Brand Stand Out with a Portfolio

Design businesses have never been more needed than they are today. With an increasing number of individuals becoming entrepreneurs and starting their own online companies, the need for professional logos, web designs, social media designs and more is on the rise. This is great news for creative professionals, with the job…

Category : Ui/ux design   21-11-2018   by Janeth Kent

UX-UI: How to design better forms

Whether it is a signup flow, a multi-view stepper, or a monotonous data entry interface, forms are one of the most important components of digital product design. This article focuses on the common dos and don’ts of form design. Keep in mind that these are general guideline and there are…

Category : Ui/ux design   02-05-2020   by Silvia Mazzetta

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

A Guide to Moving IT Services During an Office Relocation

A Guide to Moving IT Services During an Office Relocation

Relocating a business from one office to another can be stressful. You can’t afford any loss of productivity and given that there are so many things that can go wrong, it is wise to plan everything down to the last detail. Moving desks and other office furniture is relatively straightforward. A…

Category : News and events   21-08-2018   by Janeth Kent

Four of the Biggest Reasons Your Emails are Sent to Spam

Four of the Biggest Reasons Your Emails are Sent to Spam

Email marketing still plays a huge part in getting the word out to potential and existing customers, but according to a study carried out by Return Path in 2015, only 79% of marketing emails will actually land in the recipient’s inbox. As a result, one in every five emails will…

Category : Web marketing   14-08-2018   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   08-08-2018   by Janeth Kent

How Can Small Businesses Reduce Paper Usage?

How Can Small Businesses Reduce Paper Usage?

Even in this digital age, many businesses are still using far more paper and cardboard than necessary. What’s more, not near enough companies or individuals are recycling their waste properly. Whether it’s business cards, employee contracts, receipts or packaging goods, businesses can’t find a new way to get around these…

Category : Startups   26-07-2018   by Janeth Kent

A Guide to Integrate Social Media into Your E-Commerce Store

A Guide to Integrate Social Media into Your E-Commerce Store

There’s no disputing the influence that the internet and social media have had on business management. The speed at which platforms like Facebook, Instagram, and Twitter have grown has been remarkable, and the integration of the business tools that they provide has been largely positive. For those involved in e-commerce,…

Category : News and events   09-07-2018   by Janeth Kent

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by Janeth Kent

2 Areas of Business You Need to Audit

2 Areas of Business You Need to Audit

Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…

Category : Startups   28-05-2018   by Janeth Kent

Send Push Notification to Users Using Firebase Messaging Service in PHP

Send Push Notification to Users Using Firebase Messaging Service in PHP

Today I will show you how to send unlimited free push notifications to your clients using Firebase Cloud Messaging (FCM) in your PHP web application. Push Notifications are clickable messages that come from a website. They are used to show notifications outside the web page context even if the user is not browsing…

Category : Php   14-05-2018   by Janeth Kent

How Our Relationship with the Internet has Changed in the Last 20 Years

How Our Relationship with the Internet has Changed in the Last 20 Years

With more than 1 billion websites online, it is fair to say the internet has transformed the daily lives of people across the world. It now impacts almost every aspect of a person’s life. Find out how our relationship with the internet has changed in the last 20 years. Fast Adoption On…

Category : News and events   16-01-2018   by Janeth Kent

Best apps to boost your social media

Best apps to boost your social media

Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…

Category : Social networks   24-11-2017   by Janeth Kent

Top 8 Free Online Social Media Marketing Tools For Startups

Top 8 Free Online Social Media Marketing Tools For Startups

If you have just launched a new startup one of the things that should be top of your agenda is creating an effective social media strategy. No sane business owner can afford to ignore social media in this day and age.     People go to social media sites to socialize. It's like…

Category : Web marketing   14-08-2017   by Janeth Kent

5 best open source version control systems tools for sysadmins

5 best open source version control systems tools for sysadmins

As a system admin, the chances are you collaborate with multiple people across the company, therefore you will probably know the stress of constantly transferring files and version controlling the changes. Version control tools are a great way to enable collaboration, maintain versions, and track changes across the team. Perhaps the…

Category : Software   13-05-2017   by Janeth Kent

An Introduction to Email Segmentation

An Introduction to Email Segmentation

Email marketing is one of the most effective marketing methods to acquire new customers. Did you know that 72% of people prefer to receive promotional content through email rather than social media channels (17%)? For anyone who is looking to develop a highly successful email campaign, listening to what potential…

Category : Web marketing   10-05-2017   by Janeth Kent

How to Improve Communication with Suppliers

How to Improve Communication with Suppliers

A supplier is more than just a company you have hired for a service. They can be integral to the development and growth of your business. It is therefore essential to embark with a mutually beneficial relationship, as both companies are as important as each other for achieving their business…

Category : Web marketing   22-03-2017   by Janeth Kent

The Best Lightweight Linux Distributions For Older PC's

The Best Lightweight Linux Distributions For Older PC's

What do you do with your old computers? The one which once had good hardware configuration but now those are considered outdated. Why not revive your old computer with Linux? I am going to list seven beginner friendly lightweight Linux distributions that you can use on your older PC. Best Lightweight…

Category : Operating systems   12-03-2017   by Janeth Kent

Fetch API, an amazing replacement of XMLHttpRequest AJAX

Fetch API, an amazing replacement of XMLHttpRequest AJAX

When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…

Category : Programming   19-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

How to send an e-mail in 1984 - Vintage overdose

How to send an e-mail in 1984 - Vintage overdose

How to send an e mail 1980's style. Electronic message writing down the phone line. First shown on Thames TV's computer programme 'Database' in 1984 07/06/1984 Database is an old British TV show, broadcasted in 1984, which explains how the networks work before the modern Internet, but also the futuristic concept…

Category : Technology   01-10-2016   by Janeth Kent

PHP Libraries For Summer 2016

PHP Libraries For Summer 2016

Here are our picks for the 12 most useful and interesting open-source PHP libraries that you should check out this summer!   Monolog With Monolog you can create advanced logging systems by sending your PHP logs to files, sockets, databases, inboxes or other web services. The library has over 50 handlers for various…

Category : Php   11-08-2016   by Janeth Kent

8 Social Tools to interact with Customers and improve CX

8 Social Tools to interact with Customers and improve CX

Customer experience is measured by the individual’s experience during all points of contact against the individual’s expectations. Over the past century, countless inventions and advancements have inadvertently raised the bar of customer experience. Communication mediums have improved, resulting in elevated expectations of more hands-on, faster, and localized customer service.  Customers now have…

Category : Social networks   22-07-2016   by Janeth Kent

Ideas shaping web design today

Ideas shaping web design today

Web design in order to succeed needs two things: innovation and imitation. Unfortunately, the last one often wins. Web designers love to learn, study and use the latest trends, and then look desperately for the next big thing. Think about sliders. They were trendy" couple years ago. Today, they feel dated. What to do?…

Category : Web design   22-02-2016   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

8 Social Media Monitoring Tools 

8 Social Media Monitoring Tools 

We think that a combination of quick response, easy use and functionality is what a company need in order to effectively run a social media campaigns. There are many tools that let you manage multiple accounts, respond quickly and stay on top of real-time information.  We evaluate 8 of the best free tools for social media monitoring,…

Category : Social networks   22-10-2015   by Janeth Kent

Protect Ubuntu Servers With Fail2Ban

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

Category : Security   17-02-2015   by Janeth Kent

PHP Filters: the best way to sanitize and validate datas

What are PHP filters? One of the most amazing strengths of PHP is its convenience. Shockingly this same profit has worked against PHP as numerous new coders have forgotten any security to establish safety or fails to offer the adroitness to make a class to validate their variables from end users. One…

Category : Php   02-03-2020   by Janeth Kent

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by Janeth Kent

10 Server and network monitoring tools

10 Server and network monitoring tools

When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding…

Category : Networking   04-02-2014   by Janeth Kent

How to Create Custom Filters in jQuery

How to Create Custom Filters in jQuery

If you are a web designer or a developer you frequently need a shortcut to collect elements for jQuery. In this post, based on the book Instant jQuery Selectors, you’ll learn how to build a custom filter in jQuery. So, we try to built a filter that ia able to print the length of…

Category : Javascript   17-12-2013   by Janeth Kent

Useful  list of common HTML meta tags

Useful list of common HTML meta tags

Basic HTML Meta Tags OpenGraph Meta Tags HTML Link Tags

Category : Web design   11-12-2013   by Janeth Kent

86 Must Have WordPress Plugins Of 2013

86 Must Have WordPress Plugins Of 2013

Today we are going to share Best 85 WordPress Plugins for 2013 which will help WordPress Webmasters all over the world. 1. ALL AROUND WORDPRESS CONTENT SLIDER CAROUSEL All Around wordpress content slider is a multi-purpose all-in-one slider solution for your website. It supports both images and video. It can be an…

Category : Software   09-12-2013   by Janeth Kent

25 HTML5 speed tips

25 HTML5 speed tips

Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…

Category : Web design   05-12-2013   by Janeth Kent

WebDev:32 New Tools and Services for Web Developers

WebDev:32 New Tools and Services for Web Developers

Web developers should always be aware of the current news. In order to help them in their work brilliant web developers from all over the world always try to invent new tools and find bright decisions. We want to bring to your attention a selection of some useful tools such…

Category : Programming   28-11-2013   by Janeth Kent

50 Most Useful jQuery Plugins of the year #2

50 Most Useful jQuery Plugins of the year #2

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Javascript   05-11-2013   by Janeth Kent

10 Best PHP Scripts for Polling System

10 Best PHP Scripts for Polling System

In this post we will show you a collection of 10 best PHP Poll Scripts. These PHP scripts for polling system can be added in any self-hosted website. Check out these awesome and easy to install scripts. 1. JAXpoll   JAXpoll is a polling widget that you can add into any of your websites.…

Category : Php   23-08-2013   by Janeth Kent

How Companies can Drive Engagement with Blogs: 50 tips

How Companies can Drive Engagement with Blogs: 50 tips

Companies can benefit by maintaining a blog: it helps drive engagement, can promote products and visibility in the market. A survey conducted by Hubspot, a marketing software company, indicates that more companies are adopting a blog and find it to be “critical” and “useful” to their business. Their survey has reported positive…

Category : Web marketing   21-08-2013   by Janeth Kent

13 jQuery Plugins and Tutorials for e-commerce website

13 jQuery Plugins and Tutorials for e-commerce website

E-Commerce websites are making shopping easy for customers. The number of ecommerce websites are growing with every day. Shopping Cart is the most important aspect of an E-Commerce website. We all know that jQuery plugins helps us to add difficult things to our websites very easily. Below you’ll find 13 jQuery shopping cart plugin and…

Category : Javascript   02-08-2013   by Janeth Kent

The Best Project Management Tools For Planning

The Best Project Management Tools For Planning

Project management tools are one of the essentials when it comes to having a project run successfully. Whether you are a freelancer, or simply an owner of a small business, it comes in handy to know what is required and needed in order to manage a client’s project successfully. Programmers and engineers…

Category : Software   02-08-2013   by Janeth Kent

318 useful twitter bootstrap resources #5

318 useful twitter bootstrap resources #5

Tools and Services for Twitter Bootstrap Additional items to make Bootstrap Development Easier and Faster Devtools BOOTSTRAPTOR Free templates and wireframes for Bootstrap BOOTPLY A Bootstrap playground - sandbox for Twitter Bootstrap. Use Bootply to design, prototype, extend, or test the Bootstrap framework. MODERNMAIL Build email templates with Bootstrap BOOTSTRAP-IE7 IE7 shim for adding support in…

Category : Web design   30-07-2013   by Janeth Kent

The Bible of Responsive Web Design

You've decided it's time for a new website, and you know that making it responsive will ensure that all users have a great experience, regardless of what device they are using. Responsive web design, or RWD for short, is here to stay. It's rapidly maturing but not without some serious pitfalls for…

Category : Web design   23-05-2019   by Janeth Kent

How to detect r57 and c99 Shells in your server

How to detect r57 and c99 Shells in your server

When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…

Category : Security   26-07-2013   by Janeth Kent

A Collection of Essential WordPress Plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…

Category : Web design   21-08-2020   by Janeth Kent

10 Cheatsheets & Infographics For Social Media Marketers

10 Cheatsheets & Infographics For Social Media Marketers

How many time do you spend on your social media accounts? Do you use it a lot to market your wares, services, sites, tools or yourself? Online presence is the key to small business strategy. It is no longer enough to just have a company blog, every business must have a strong social…

Category : Web marketing   26-05-2020   by Janeth Kent

50 WordPress tutorials for designers and developers

50 WordPress tutorials for designers and developers

Wall Street Journal, Ford, Sony, Katy Perry, GigaOM, CNN. Well-known brands. What do they all have in common? Although you probably won’t find this tagline on their sites anymore, under the hood they are “Powered by WordPress”. As we all know, WordPress is the world's most popular publishing platforms that powers…

Category : Web design   17-07-2013   by Janeth Kent

How to use AdSense with Responsive Design

After some time publishing interesting information on your website, it is normal that you want to make a profit. One of the most widely used systems is Adsense, a Google service that allows you to display advertising on your website to generate income. An income that will depend on the number…

Category : Web design   23-05-2020   by Janeth Kent

A Guide To Structured Data Markup Implementation Methods

A Guide To Structured Data Markup Implementation Methods

First of all, what is Structured Data? The term structured data refers to data that is easily identifiable because it is organized in a structure. The most common form of structured data, or structured data records (SDR), is a database where specific information is stored based on a methodology of columns…

Category : Programming   08-07-2013   by Janeth Kent

50 tools to reinvigorate your content marketing efforts

50 tools to reinvigorate your content marketing efforts

2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.”  The current focus on social media advertising is pulling marketing attention…

Category : Web marketing   03-07-2013   by Janeth Kent

Setup SSL Certificate on Apache and Ubuntu 12.04

Setup SSL Certificate on Apache and Ubuntu 12.04

How to Create a SSL Certificate on Apache for Ubuntu 12.04   About SSL Certificates A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that…

Category : Networking   02-07-2013   by Janeth Kent

Are social networks still the best way to promote your business?

Are social networks still the best way to promote your business?

We still need a bevy of Community Managers to promote our products online? And the investments made to advertise our company on social networks are really justified?   According Custora investments for promoting us on social networks are totally unwarranted and would be more convenient to invest our money with a more classical…

Category : Web marketing   01-07-2013   by Janeth Kent

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by Janeth Kent

15 Essential Apps for Developers and Productivity

15 Essential Apps for Developers and Productivity

Today we have listed 15 extremely useful web apps for web developers; these great tools will help you become more efficient and also more happier because a working project keeps a developer happy :-D 1. Koding   Koding (previously known as "Kodingen") is an Online Development Environment owned by Koding, Inc. which allows software developers to…

Category : Software   21-06-2013   by Janeth Kent

Tutorials, Videos, Free Books, and More Resources for Learning jQuery

Tutorials, Videos, Free Books, and More Resources for Learning jQuery

Maybe you’re a jQuery pro. Maybe you’re John Resig... But, in the other hand, maybe you read words like “jQuery”, and think: “jQuery What?” . If you belong to this category of person, now is the time to learn jQuery. According to jQuery.com, jQuery is a fast, concise, JavaScript library that simplifies…

Category : Javascript   19-06-2013   by Janeth Kent

How to create a responsive HTML5 form

How to create a responsive HTML5 form

Everybody knows about web forms, isn't it? Make a , a few  elements, maybe an, finish it off with an  button, and you’re done. You don’t know the half of it. HTML5 introduced a selection of new input types and attributes that make the creation and validation of forms far easier than previous methods. Let's explain how to…

Category : Web design   12-06-2013   by Janeth Kent

Install apache2 mod_security and mod_evasive on Ubuntu 12.04

Install apache2 mod_security and mod_evasive on Ubuntu 12.04

This guide is intended as a relatively easy step by step guide to: Install and configure Apache2 ModSecurity and mod_evasive modules on Ubuntu 12.04 LTS server. Things have become much easier than before installing both these two excellent security modules for Apache2 in Ubuntu 12.04 LTS, as both modules are available in the…

Category : Networking   11-06-2013   by Janeth Kent

Android tips: How to change archive and delete actions in the new Gmail

Android tips: How to change archive and delete actions in the new Gmail

With the latest update to Gmail interface, Google has change things a bit -- but it didn't give users much indication of how things changed. One of the big change was the differentiation between archiving and deleting emails, and what options are chosen to be available. If you haven't tweaked any settings previously,…

Category : Operating systems   11-06-2013   by Janeth Kent

How To Use the new Gmail tabs

How To Use the new Gmail tabs

Yestarday Google made a big announcement regarding Gmail's look and feel. Gmail will be taking a new tabbed approach to helping users organize e-mails. A new tab workflow will be slowly introduced to the Web, iOS, and Android versions of Gmail. It's a quick process once your account has access, and it's easy to change back…

Category : Software   30-05-2013   by Janeth Kent