156 results for: email
Examine the 10 key PHP functions I use frequently
PHP never ceases to surprise me with its built-in capabilities. These are a few of the functions I find most fascinating. 1. Levenshtein This function uses the Levenshtein algorithm to calculate the disparity or "distance" between two text strings. Named after its creator, Vladimir Levenshtein, it measures how identical two words or…
Category : Php 17-10-2023 by Silvia Mazzetta
How to Use ChatGPT to automatically create Spotify playlists
We will explain, step by step, how you can create Spotify playlists using ChatGPT. The arrival of ChatGPT, the chatbot based on OpenAI's natural language model, has revolutionized the world of technology. Thanks to this powerful tool, any user can access all the functions of this AI from any of their…
Category : Technology 23-06-2023 by Janeth Kent
The Payment Request API: Revolutionizing Online Payments (Part 2)
In the first part of this series, we explored the fundamentals of the Payment Request API and how it simplifies the payment experience. Now, let's delve deeper into advanced features and best practices to further optimize the integration of this powerful API. We start by making a modification of supportedMethods by…
Category : Javascript 08-06-2023 by Silvia Mazzetta
Marketing Trends in Technology 2023: Spotlight on Inflation
Inflation, the general rise in prices of goods and services, is a significant economic concern that impacts various industries, including technology. As we delve into 2023, marketing professionals in the technology sector are facing unique challenges and opportunities due to the rising inflationary pressures. This article aims to shed light…
Category : Web marketing 01-06-2023 by Janeth Kent
How to generate an SSH key and add it to GitHub
In this short tutorial we are going to see how you can generate a new SSH key and add it to GitHub, so you can access your private repositories and manage them locally or from your server, running the commands git pull, git push and any other that has restrictions. This…
Category : Programming 22-05-2023 by Janeth Kent
Hidden Gmail codes to find a lost e-mail
If you have a lot of emails in Gmail, there are a few codes that will help you find what you need faster and more accurately than if you do it by hand. We'll tell you about them right now. To say that Gmail is one of the most important email…
Category : Technology 16-05-2023 by Janeth Kent
How to download an email in PDF format in Gmail for Android
You will see how easy it is to save an email you have received or sent yourself from Gmail in PDF format, all with your Android smartphone. Here's how it's done. Gmail is one of the most used email applications in the world, not only for its good design, good organization…
Category : Technology 16-05-2023 by Janeth Kent
What is a JWT token and how does it work?
JWT tokens are a standard used to create application access tokens, enabling user authentication in web applications. Specifically, it follows the RFC 7519 standard. What is a JWT token A JWT token is a token that gives the user access to an application by certifying their identity. This token is returned to…
Category : Programming 10-05-2023 by Janeth Kent
Does Google's artificial intelligence have feelings?
A Google employee claims that one of the company's artificial intelligence systems is conscious, and the news bounces around the world's media. Is he crazy or enlightened? It was last month's news: Blake Lemoine, an engineer working for Google's "AI Responsible" department, claims that one of the artificial intelligence (AI) systems…
Category : Technology 04-08-2022 by Janeth Kent
Secret iPhone codes to unlock hidden features
We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the manufacturer. And unless you spend a lot of time playing around in the Phone app, you probably don't know, until…
Category : Security 22-10-2021 by Silvia Mazzetta
Why E-Commerce Businesses Should be Using Cloud Computing
Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…
Category : Web marketing 01-06-2021 by Silvia Mazzetta
How to Send Email from an HTML Contact Form
In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…
Category : Programming 10-05-2021 by
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
How to set up your Android phone: learn how to get your new phone up and running
If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…
Category : Mobile 28-04-2021 by Janeth Kent
Top tools for UX design and research
This article is a compilation of the "ux tools" I have tested in recent years. I've separated the tools by categories, although I recommend you to take a look at all of them, you might find some you didn't know. - Conceptualisation and project management tools - UX testing and research tools - Analytics…
Category : Ui/ux design 23-04-2021 by Silvia Mazzetta
htaccess Rules to Help Protect from SQL Injections and XSS
This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…
Category : Security 01-03-2021 by Janeth Kent
Deepfakes Detection – An Emerging Technological Challenge
It is highly probable that while browsing the Internet, everyone of us has at some point stumbled upon a deepfake video. Deepfakes usually depict well-known people doing really improbable things – like the queen of England dancing on her table or Ron Swanson from Parks and Recreations starring as every…
Category : Technology 27-01-2021 by Iveta Karailievova
Validating HTML forms using BULMA and vanilla JavaScript
Today we are going to write about contact forms and how to validate them using JavaScript. The contact form seems to be one of the top features of every basic home page. It is a great way to encourage your visitors to make contact with you, by adding a form which…
Category : Javascript 31-12-2020 by
Read comics online: best websites and apps to download and read digital comics
Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your computer and on your mobile devices. You'll be able to access a wide collection of free and paid digital comics, and…
Category : News and events 26-05-2023 by Silvia Mazzetta
How to get paid in Bitcoin: CoinBase, CoinGate
After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…
Category : Technology 23-12-2020 by Silvia Mazzetta
Some Neat Ways to Improve Your Internet Browsing Experience?
Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…
Category : News and events 21-12-2020 by Janeth Kent
How to pay in Bitcoin: Hype and Coinbase
Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…
Category : Technology 10-12-2020 by Silvia Mazzetta
How to Use Bitcoin: mining, wallets, payments
You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…
Category : Technology 10-12-2020 by Silvia Mazzetta
Google everywhere: anatomy of a massive giant
The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…
Category : Technology 03-12-2020 by Silvia Mazzetta
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
The BleedingTooth vulnerability and other Bluetooth security risks
Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…
Category : Security 10-11-2020 by Iveta Karailievova
Introduction to REGEX - Regular Expression
Today we are going to write about Regular Expressions known as regex or shortened regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…
Category : Programming 23-10-2020 by
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 19-09-2020 by Janeth Kent
Suggestions to Improve the Efficiency of a Small Business
If you have a small business, it means that every resource matters. You have less room for error due to a lack of manpower as well as other aspects. So focusing on efficiency is something that ought to be your priority. Of course, inefficient experience is a big hindrance. You may…
Category : Web marketing 25-01-2022 by Janeth Kent
What is a Cryptophone and how it works
The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…
Category : Security 11-09-2020 by Silvia Mazzetta
Free Netflix: everything you can see without subscribing
To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…
Category : News and events 09-09-2020 by Luigi Nori
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…
Category : Security 11-08-2020 by Silvia Mazzetta
What is the origin of the word SPAM?
It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…
Category : Web marketing 03-08-2020 by Janeth Kent
Introduction to Network Theory
Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…
Category : Networking 03-08-2020 by
7 Killer Strategies to Increase Your Sales Funnel Conversion Rates
Have you been using online sales funnels to grow your business online but it hasn't really worked for you? There's something you are not doing right. Use these strategies to make your sales funnels convert better. We are living in a competitive digital era, and as an entrepreneur, you have to…
Category : Web marketing 23-07-2020 by Janeth Kent
How to recover an Instagram hacked account
You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…
Category : Social networks 16-07-2020 by Janeth Kent
Bank phishing by email: best way to prevent it
No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…
Category : Security 16-07-2020 by Silvia Mazzetta
Smishing: risks, examples and how to avoid it
Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…
Category : Security 16-07-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P
We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…
Category : Security 07-05-2020 by Janeth Kent
What is Google My Business and how does it help my local business?
Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine. Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…
Category : Web marketing 02-05-2020 by Luigi Nori
Online Marketing Strategies for your Ecommerce
The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…
Category : Web marketing 20-04-2023 by Silvia Mazzetta
The best websites of the Tor Deep Web and Dark Web Network
We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…
Category : Security 03-11-2022 by Janeth Kent
Building a Home for Your Home Finders
As a real estate agent, one of the most important aspects of your job is outreach. No one will know about your services if you have no way of letting them know. Billboards and commercials are a great way to reach your clients along with online advertising, but if you…
Category : Web marketing 14-04-2020 by Luigi Nori
How to find everything you need on the Deep Web and the Dark Web
How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…
Category : Security 10-05-2021 by Silvia Mazzetta
Best Free Image Optimization Tools for Image Compression
Our monitors are getting better and better and, of course, we want to make them profitable by enjoying images with an increasing resolution when we browse. The problem is that this only increases the weight of the web pages, slowing down their load (and thus degrading the user's experience). Something…
Category : Software 27-03-2020 by Janeth Kent
How to Improve Your Website to Attract Local Customers
If you run a small business, make no mistake: local search is imperative for your success. You might have lofty dreams of attracting the world to your website, but it’s those local visitors who will make the difference. This is because 80% of people will try and find local information with…
Category : Web marketing 18-03-2020 by
Best ways to start a video conference without registration
Nowadays it is very easy to make a video conference without using Whatsapp, Skype or any of those platforms that require user registration, phone, email and so on. Today we will talk about three options that allow video conferencing in a few seconds, being only necessary in most cases to inform…
Category : Multimedia 21-04-2020 by Silvia Mazzetta
Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF
Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…
Category : Javascript 30-01-2020 by Luigi Nori
How to Stay Safe When Shopping Online
It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…
Category : News and events 08-01-2020 by Silvia Mazzetta
5 popular Dark Web sites
People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…
Category : News and events 09-12-2019 by Silvia Mazzetta
The best Internet search engines used by hackers
Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…
Category : Security 07-01-2021 by Silvia Mazzetta
How to Pique Customer Interest
If your target audience aren’t interested in your brand, your marketing campaigns, or the service that you provide, why would they feel compelled to bring you their business? If you’re to attract a steady stream of new customers, you’re going to have to find a way to make your business…
Category : Web marketing 06-12-2019 by Silvia Mazzetta
How to Build Your eCommerce's Email List Using Instagram
Instagram is quickly becoming a favorite social media channel among eCommerce business owners because of its high engagement rate. But when it comes to getting the highest return on your investment, that recognition belongs to email marketing. Now, imagine what will happen to your eCommerce business if you can have a way…
Category : Web marketing 06-12-2019 by Luigi Nori
How They Can Hack You While Navigating: Protecting Your Digital Security
As technology continues to advance, navigation systems have become an integral part of our daily lives. From GPS-enabled smartphones to in-car navigation systems, we rely on these tools to guide us to our destinations efficiently. However, with the rise in cyber threats, it's important to understand the potential risks associated…
Category : Security 23-06-2023 by Silvia Mazzetta
How to prevent people from adding spam events and appointments in Google Calendar
Let's explain how to prevent people from adding spam to your Google Calendar by adding events and appointments without your approval. This is a practice that has been used for more than a decade to add appointments and events in which ads appear that may be fraudulent, so that they…
Category : News and events 28-08-2019 by Silvia Mazzetta
What to Expect from Email Marketing Tools in 2019
Along with everything else, marketing has received a huge boost recently, thanks to technology. As email continued to be a top performer even in 2018, it’s one of the integral parts of any online campaign today. So, what should you look for in your email marketing tools in 2019? Advanced Automation…
Category : Web marketing 18-11-2019 by Janeth Kent
Unlock Hidden SmartPhone Features with these Secret Codes
Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…
Category : Security 06-11-2022 by Janeth Kent
Best 9 Free Rss Readers
Lately we have been on a constant lookout for good RSS readers to find and share rich content for our users. RSS is a great way to keep in the loop of news, because it updates as soon as your favorite news sites update, and you get your news as…
Category : Software 22-05-2023 by Janeth Kent
Features you will get in EaseUS data recovery software
The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…
Category : Software 25-06-2019 by Janeth Kent
The Steps to Take if You're the Victim of a Cyber Hack
According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…
Category : News and events 27-03-2019 by Janeth Kent
What You Need to Know When Sending a Press Release to Newswire
A newswire or a press release distribution service helps businesses in improving their online visibility and web presence. If you haven’t used it before, there are many things you need to know prior to using any platform. What is a newswire? Newswire or wire services syndicate your story across different sites and…
Category : News and events 25-02-2019 by Janeth Kent
Top free JavaScript User Authentication Libraries
We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…
Category : Javascript 29-01-2020 by Janeth Kent
Best 5 Frontend Development Topics in 2019
Ah, a new year. A time of positivity, a time to restart. For new objectives and proposals. And in the world of developers, to look at the scenery and decide what we need to learn to keep up. Because let's face it-web development is always changing, and we're falling behind…
Category : Programming 18-02-2019 by Janeth Kent
Most Popular Node.js Frameworks in 2019
Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…
Category : Javascript 14-02-2019 by Janeth Kent
The Most Useful 50 Web Sites you wish you knew earlier
There are so many websites around, and it is very complicated to know each and every one of them. Our lisy provides 100 those websites that we find particularly helpful, even though they are not as famous or as prevalent as some of the big names. archive.is — take a snapshot of…
Category : Web marketing 13-06-2020 by Janeth Kent
Six Ways to Make Your Design Brand Stand Out with a Portfolio
Design businesses have never been more needed than they are today. With an increasing number of individuals becoming entrepreneurs and starting their own online companies, the need for professional logos, web designs, social media designs and more is on the rise. This is great news for creative professionals, with the job…
Category : Ui/ux design 21-11-2018 by Janeth Kent
UX-UI: How to design better forms
Whether it is a signup flow, a multi-view stepper, or a monotonous data entry interface, forms are one of the most important components of digital product design. This article focuses on the common dos and don’ts of form design. Keep in mind that these are general guideline and there are…
Category : Ui/ux design 02-05-2020 by Silvia Mazzetta
80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems
It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…
Category : Security 23-10-2018 by Janeth Kent
A Guide to Moving IT Services During an Office Relocation
Relocating a business from one office to another can be stressful. You can’t afford any loss of productivity and given that there are so many things that can go wrong, it is wise to plan everything down to the last detail. Moving desks and other office furniture is relatively straightforward. A…
Category : News and events 21-08-2018 by Janeth Kent
Four of the Biggest Reasons Your Emails are Sent to Spam
Email marketing still plays a huge part in getting the word out to potential and existing customers, but according to a study carried out by Return Path in 2015, only 79% of marketing emails will actually land in the recipient’s inbox. As a result, one in every five emails will…
Category : Web marketing 14-08-2018 by Janeth Kent
How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail
Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…
Category : Networking 30-03-2023 by Janeth Kent
How Can Small Businesses Reduce Paper Usage?
Even in this digital age, many businesses are still using far more paper and cardboard than necessary. What’s more, not near enough companies or individuals are recycling their waste properly. Whether it’s business cards, employee contracts, receipts or packaging goods, businesses can’t find a new way to get around these…
Category : Startups 26-07-2018 by Janeth Kent
A Guide to Integrate Social Media into Your E-Commerce Store
There’s no disputing the influence that the internet and social media have had on business management. The speed at which platforms like Facebook, Instagram, and Twitter have grown has been remarkable, and the integration of the business tools that they provide has been largely positive. For those involved in e-commerce,…
Category : News and events 09-07-2018 by Janeth Kent
Tips on How to Prevent Data Loss for Your Business
Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…
Category : Databases 21-06-2018 by Janeth Kent
2 Areas of Business You Need to Audit
Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…
Category : Startups 28-05-2018 by Janeth Kent
Send Push Notification to Users Using Firebase Messaging Service in PHP
Today I will show you how to send unlimited free push notifications to your clients using Firebase Cloud Messaging (FCM) in your PHP web application. Push Notifications are clickable messages that come from a website. They are used to show notifications outside the web page context even if the user is not browsing…
Category : Php 14-05-2018 by Janeth Kent
How Our Relationship with the Internet has Changed in the Last 20 Years
With more than 1 billion websites online, it is fair to say the internet has transformed the daily lives of people across the world. It now impacts almost every aspect of a person’s life. Find out how our relationship with the internet has changed in the last 20 years. Fast Adoption On…
Category : News and events 29-04-2021 by Janeth Kent
Best apps to boost your social media
Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…
Category : Social networks 24-11-2017 by Janeth Kent
Top 8 Free Online Social Media Marketing Tools For Startups
If you have just launched a new startup one of the things that should be top of your agenda is creating an effective social media strategy. No sane business owner can afford to ignore social media in this day and age. People go to social media sites to socialize. It's like…
Category : Web marketing 08-11-2022 by Janeth Kent
5 best open source version control systems tools for sysadmins
As a system admin, the chances are you collaborate with multiple people across the company, therefore you will probably know the stress of constantly transferring files and version controlling the changes. Version control tools are a great way to enable collaboration, maintain versions, and track changes across the team. Perhaps the…
Category : Software 13-05-2017 by Janeth Kent
An Introduction to Email Segmentation: Boosting Engagement and Personalization
In today's digital age, email marketing remains a powerful tool for businesses to connect with their audience. However, as inboxes become increasingly crowded, it is crucial to deliver relevant and personalized content to stand out and drive engagement. This is where email segmentation comes into play. Email segmentation is a…
Category : Web marketing 23-06-2023 by Janeth Kent
How to Improve Communication with Suppliers
A supplier is more than just a company you have hired for a service. They can be integral to the development and growth of your business. It is therefore essential to embark with a mutually beneficial relationship, as both companies are as important as each other for achieving their business…
Category : Web marketing 22-03-2017 by Janeth Kent
The Best Lightweight Linux Distributions For Older PC's
What do you do with your old computers? The one which once had good hardware configuration but now those are considered outdated. Why not revive your old computer with Linux? I am going to list seven beginner friendly lightweight Linux distributions that you can use on your older PC. Best Lightweight…
Category : Operating systems 12-03-2017 by Janeth Kent
Fetch API, an amazing replacement of XMLHttpRequest AJAX
When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…
Category : Programming 19-02-2017 by Janeth Kent
Setup FTP server with VSFTPD in Ubuntu 16.04
Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…
Category : Servers 14-02-2017 by Janeth Kent
How to send an e-mail in 1984 - Vintage overdose
How to send an e mail 1980's style. Electronic message writing down the phone line. First shown on Thames TV's computer programme 'Database' in 1984 07/06/1984 Database is an old British TV show, broadcasted in 1984, which explains how the networks work before the modern Internet, but also the futuristic concept…
Category : Technology 01-10-2016 by Janeth Kent
PHP Libraries For Summer 2016
Here are our picks for the 12 most useful and interesting open-source PHP libraries that you should check out this summer! Monolog With Monolog you can create advanced logging systems by sending your PHP logs to files, sockets, databases, inboxes or other web services. The library has over 50 handlers for various…
Category : Php 11-08-2016 by Janeth Kent
8 Social Tools to interact with Customers and improve CX
Customer experience is measured by the individual’s experience during all points of contact against the individual’s expectations. Over the past century, countless inventions and advancements have inadvertently raised the bar of customer experience. Communication mediums have improved, resulting in elevated expectations of more hands-on, faster, and localized customer service. Customers now have…
Category : Social networks 22-07-2016 by Janeth Kent
Guide: Install Free SSL Certificate On Your Website with Let's Encrypt
Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…
Category : Networking 09-05-2020 by Janeth Kent
8 Social Media Monitoring Tools
We think that a combination of quick response, easy use and functionality is what a company need in order to effectively run a social media campaigns. There are many tools that let you manage multiple accounts, respond quickly and stay on top of real-time information. We evaluate 8 of the best free tools for social media monitoring,…
Category : Social networks 22-10-2015 by Janeth Kent
Protect Ubuntu Servers With Fail2Ban
Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…
Category : Security 17-02-2015 by Janeth Kent
PHP Filters: the best way to sanitize and validate datas
What are PHP filters? One of the most amazing strengths of PHP is its convenience. Shockingly this same profit has worked against PHP as numerous new coders have forgotten any security to establish safety or fails to offer the adroitness to make a class to validate their variables from end users. One…
Category : Php 02-03-2020 by Janeth Kent
PHP: list of best awesome PHP libraries
It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…
Category : Php 27-04-2014 by Janeth Kent
10 Server and network monitoring tools
When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding…
Category : Networking 04-02-2014 by Janeth Kent
How to Create Custom Filters in jQuery
If you are a web designer or a developer you frequently need a shortcut to collect elements for jQuery. In this post, based on the book Instant jQuery Selectors, you’ll learn how to build a custom filter in jQuery. So, we try to built a filter that ia able to print the length of…
Category : Javascript 17-12-2013 by Janeth Kent
Useful list of common HTML meta tags
Basic HTML Meta Tags OpenGraph Meta Tags HTML Link Tags
Category : Web design 11-12-2013 by Janeth Kent