Email - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

157 results for: email

Transitioning from a Home Office to a Virtual Office

The traditional concept of the office has undergone a substantial transformation in recent years. With advancements in technology and changes in work culture, more professionals are embracing remote work options, including the transition from home offices to virtual offices. While working from home has its advantages, such as flexibility and comfort,…

Category : Web marketing   08-03-2024   by Janeth Kent

Examine the 10 key PHP functions I use frequently

PHP never ceases to surprise me with its built-in capabilities. These are a few of the functions I find most fascinating.   1. Levenshtein This function uses the Levenshtein algorithm to calculate the disparity or "distance" between two text strings. Named after its creator, Vladimir Levenshtein, it measures how identical two words or…

Category : Php   17-10-2023   by Silvia Mazzetta

How to Use ChatGPT to automatically create Spotify playlists

We will explain, step by step, how you can create Spotify playlists using ChatGPT. The arrival of ChatGPT, the chatbot based on OpenAI's natural language model, has revolutionized the world of technology. Thanks to this powerful tool, any user can access all the functions of this AI from any of their…

Category : Technology   23-06-2023   by Janeth Kent

The Payment Request API: Revolutionizing Online Payments (Part 2)

In the first part of this series, we explored the fundamentals of the Payment Request API and how it simplifies the payment experience. Now, let's delve deeper into advanced features and best practices to further optimize the integration of this powerful API. We start by making a modification of supportedMethods by…

Category : Javascript   08-06-2023   by Silvia Mazzetta

Marketing Trends in Technology 2023: Spotlight on Inflation

Inflation, the general rise in prices of goods and services, is a significant economic concern that impacts various industries, including technology. As we delve into 2023, marketing professionals in the technology sector are facing unique challenges and opportunities due to the rising inflationary pressures. This article aims to shed light…

Category : Web marketing   01-06-2023   by Janeth Kent

How to generate an SSH key and add it to GitHub

In this short tutorial we are going to see how you can generate a new SSH key and add it to GitHub, so you can access your private repositories and manage them locally or from your server, running the commands git pull, git push and any other that has restrictions. This…

Category : Programming   08-03-2024   by Janeth Kent

Hidden Gmail codes to find a lost e-mail

If you have a lot of emails in Gmail, there are a few codes that will help you find what you need faster and more accurately than if you do it by hand. We'll tell you about them right now.  To say that Gmail is one of the most important email…

Category : Technology   16-05-2023   by Janeth Kent

How to download an email in PDF format in Gmail for Android

You will see how easy it is to save an email you have received or sent yourself from Gmail in PDF format, all with your Android smartphone. Here's how it's done. Gmail is one of the most used email applications in the world, not only for its good design, good organization…

Category : Technology   16-05-2023   by Janeth Kent

What is a JWT token and how does it work?

JWT tokens are a standard used to create application access tokens, enabling user authentication in web applications. Specifically, it follows the RFC 7519 standard. What is a JWT token A JWT token is a token that gives the user access to an application by certifying their identity. This token is returned to…

Category : Programming   08-03-2024   by Janeth Kent

Does Google's artificial intelligence have feelings?

A Google employee claims that one of the company's artificial intelligence systems is conscious, and the news bounces around the world's media. Is he crazy or enlightened? It was last month's news: Blake Lemoine, an engineer working for Google's "AI Responsible" department, claims that one of the artificial intelligence (AI) systems…

Category : Technology   04-08-2022   by Janeth Kent

Secret iPhone codes to unlock hidden features

We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the manufacturer. And unless you spend a lot of time playing around in the Phone app, you probably don't know, until…

Category : Security   22-10-2021   by Silvia Mazzetta

Why E-Commerce Businesses Should be Using Cloud Computing

Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…

Category : Web marketing   01-06-2021   by Silvia Mazzetta

How to Send Email from an HTML Contact Form

In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…

Category : Programming   10-05-2021   by

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How to set up your Android phone: learn how to get your new phone up and running

If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…

Category : Mobile   28-04-2021   by Janeth Kent

Top tools for UX design and research

This article is a compilation of the "ux tools" I have tested in recent years. I've separated the tools by categories, although I recommend you to take a look at all of them, you might find some you didn't know. - Conceptualisation and project management tools - UX testing and research tools - Analytics…

Category : Ui/ux design   23-04-2021   by Silvia Mazzetta

htaccess Rules to Help Protect from SQL Injections and XSS

This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…

Category : Security   01-03-2021   by Janeth Kent

Deepfakes Detection – An Emerging Technological Challenge

It is highly probable that while browsing the Internet, everyone of us has at some point stumbled upon a deepfake video. Deepfakes usually depict well-known people doing really improbable things – like the queen of England dancing on her table or Ron Swanson from Parks and Recreations starring as every…

Category : Technology   27-01-2021   by Iveta Karailievova

Validating HTML forms using BULMA and vanilla JavaScript

Today we are going to write about contact forms and how to validate them using JavaScript. The contact form seems to be one of the top features of every basic home page. It is a great way to encourage your visitors to make contact with you, by adding a form which…

Category : Javascript   31-12-2020   by

Read comics online: best websites and apps to download and read digital comics

Comic book lovers (like us), today we're going to give you a special tribute: a small collection of websites and applications to download and read digital comics, both on your computer and on your mobile devices. You'll be able to access a wide collection of free and paid digital comics, and…

Category : News and events   26-05-2023   by Silvia Mazzetta

How to get paid in Bitcoin: CoinBase, CoinGate

After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…

Category : Technology   23-12-2020   by Silvia Mazzetta

Some Neat Ways to Improve Your Internet Browsing Experience?

Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…

Category : News and events   21-12-2020   by Janeth Kent

How to pay in Bitcoin: Hype and Coinbase

Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…

Category : Technology   10-12-2020   by Silvia Mazzetta

How to Use Bitcoin: mining, wallets, payments

You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…

Category : Technology   10-12-2020   by Silvia Mazzetta

Google everywhere: anatomy of a massive giant

The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…

Category : Technology   03-12-2020   by Silvia Mazzetta

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…

Category : Security   17-11-2020   by Iveta Karailievova

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…

Category : Security   10-11-2020   by Iveta Karailievova

Introduction to REGEX - Regular Expression

Today we are going to write about Regular Expressions known as regex or shortened  regexp, a very useful concept of using search patterns. Surely you were in a situation when you need to replace some word for another or character for some else. This and more you can handle with Regular…

Category : Programming   23-10-2020   by

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser It is also possible to increase the security level of the…

Category : Security   08-03-2024   by Janeth Kent

Suggestions to Improve the Efficiency of a Small Business

If you have a small business, it means that every resource matters. You have less room for error due to a lack of manpower as well as other aspects. So focusing on efficiency is something that ought to be your priority. Of course, inefficient experience is a big hindrance. You may…

Category : Web marketing   25-01-2022   by Janeth Kent

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

Free Netflix: everything you can see without subscribing

To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…

Category : News and events   09-09-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

What is the origin of the word SPAM?

It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…

Category : Web marketing   03-08-2020   by Janeth Kent

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by

7 Killer Strategies to Increase Your Sales Funnel Conversion Rates

Have you been using online sales funnels to grow your business online but it hasn't really worked for you? There's something you are not doing right. Use these strategies to make your sales funnels convert better. We are living in a competitive digital era, and as an entrepreneur, you have to…

Category : Web marketing   23-07-2020   by Janeth Kent

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

Bank phishing by email: best way to prevent it

No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…

Category : Security   16-07-2020   by Silvia Mazzetta

Smishing: risks, examples and how to avoid it

Do you know what smishing is, what risks it involves and how you can avoid it? The cyber-criminals are betting on the technique known as Smishing when it comes to defrauding users through text messages (SMS). The objective of Smishing is the same as that of other types of scams…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   20-04-2023   by Silvia Mazzetta

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   03-11-2022   by Janeth Kent

Building a Home for Your Home Finders

As a real estate agent, one of the most important aspects of your job is outreach. No one will know about your services if you have no way of letting them know. Billboards and commercials are a great way to reach your clients along with online advertising, but if you…

Category : Web marketing   14-04-2020   by Luigi Nori

How to find everything you need on the Deep Web and the Dark Web

How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…

Category : Security   10-05-2021   by Silvia Mazzetta

Best Free Image Optimization Tools for Image Compression

Our monitors are getting better and better and, of course, we want to make them profitable by enjoying images with an increasing resolution when we browse. The problem is that this only increases the weight of the web pages, slowing down their load (and thus degrading the user's experience). Something…

Category : Software   27-03-2020   by Janeth Kent

How to Improve Your Website to Attract Local Customers

If you run a small business, make no mistake: local search is imperative for your success. You might have lofty dreams of attracting the world to your website, but it’s those local visitors who will make the difference. This is because 80% of people will try and find local information with…

Category : Web marketing   18-03-2020   by

Best ways to start a video conference without registration

Nowadays it is very easy to make a video conference without using Whatsapp, Skype or any of those platforms that require user registration, phone, email and so on. Today we will talk about three options that allow video conferencing in a few seconds, being only necessary in most cases to inform…

Category : Multimedia   21-04-2020   by Silvia Mazzetta

Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF

Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…

Category : Javascript   30-01-2020   by Luigi Nori

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

5 popular Dark Web sites

People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…

Category : News and events   09-12-2019   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

How to Pique Customer Interest

If your target audience aren’t interested in your brand, your marketing campaigns, or the service that you provide, why would they feel compelled to bring you their business? If you’re to attract a steady stream of new customers, you’re going to have to find a way to make your business…

Category : Web marketing   06-12-2019   by Silvia Mazzetta

How to Build Your eCommerce's Email List Using Instagram

Instagram is quickly becoming a favorite social media channel among eCommerce business owners because of its high engagement rate. But when it comes to getting the highest return on your investment, that recognition belongs to email marketing. Now, imagine what will happen to your eCommerce business if you can have a way…

Category : Web marketing   06-12-2019   by Luigi Nori

How They Can Hack You While Navigating: Protecting Your Digital Security

As technology continues to advance, navigation systems have become an integral part of our daily lives. From GPS-enabled smartphones to in-car navigation systems, we rely on these tools to guide us to our destinations efficiently. However, with the rise in cyber threats, it's important to understand the potential risks associated…

Category : Security   23-06-2023   by Silvia Mazzetta

How to prevent people from adding spam events and appointments in Google Calendar

Let's explain how to prevent people from adding spam to your Google Calendar by adding events and appointments without your approval. This is a practice that has been used for more than a decade to add appointments and events in which ads appear that may be fraudulent, so that they…

Category : News and events   28-08-2019   by Silvia Mazzetta

What to Expect from Email Marketing Tools in 2019

Along with everything else, marketing has received a huge boost recently, thanks to technology. As email continued to be a top performer even in 2018, it’s one of the integral parts of any online campaign today. So, what should you look for in your email marketing tools in 2019?   Advanced Automation…

Category : Web marketing   18-11-2019   by Janeth Kent

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   06-11-2022   by Janeth Kent

Best 9 Free Rss Readers

Lately we have been on a constant lookout for good RSS readers to find and share rich content for our users. RSS is a great way to keep in the loop of news, because it updates as soon as your favorite news sites update, and you get your news as…

Category : Software   22-05-2023   by Janeth Kent

Features you will get in EaseUS data recovery software

The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…

Category : Software   25-06-2019   by Janeth Kent

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by Janeth Kent

What You Need to Know When Sending a Press Release to Newswire

What You Need to Know When Sending a Press Release to Newswire

A newswire or a press release distribution service helps businesses in improving their online visibility and web presence. If you haven’t used it before, there are many things you need to know prior to using any platform. What is a newswire? Newswire or wire services syndicate your story across different sites and…

Category : News and events   25-02-2019   by Janeth Kent

Top free JavaScript User Authentication Libraries

We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…

Category : Javascript   29-01-2020   by Janeth Kent

Best 5 Frontend Development Topics in 2019

Best 5 Frontend Development Topics in 2019

Ah, a new year. A time of positivity, a time to restart. For new objectives and proposals. And in the world of developers, to look at the scenery and decide what we need to learn to keep up. Because let's face it-web development is always changing, and we're falling behind…

Category : Programming   18-02-2019   by Janeth Kent

Most Popular Node.js Frameworks in 2019

Most Popular Node.js Frameworks in 2019

Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…

Category : Javascript   14-02-2019   by Janeth Kent

The Most Useful 50 Web Sites you wish you knew earlier

There are so many websites around, and it is very complicated to know each and every one of them. Our lisy provides 100 those websites that we find particularly helpful, even though they are not as famous or as prevalent as some of the big names. archive.is — take a snapshot of…

Category : Web marketing   13-06-2020   by Janeth Kent

Six Ways to Make  Your Design Brand Stand Out with a Portfolio

Six Ways to Make Your Design Brand Stand Out with a Portfolio

Design businesses have never been more needed than they are today. With an increasing number of individuals becoming entrepreneurs and starting their own online companies, the need for professional logos, web designs, social media designs and more is on the rise. This is great news for creative professionals, with the job…

Category : Ui/ux design   21-11-2018   by Janeth Kent

UX-UI: How to design better forms

Whether it is a signup flow, a multi-view stepper, or a monotonous data entry interface, forms are one of the most important components of digital product design. This article focuses on the common dos and don’ts of form design. Keep in mind that these are general guideline and there are…

Category : Ui/ux design   02-05-2020   by Silvia Mazzetta

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

A Guide to Moving IT Services During an Office Relocation

A Guide to Moving IT Services During an Office Relocation

Relocating a business from one office to another can be stressful. You can’t afford any loss of productivity and given that there are so many things that can go wrong, it is wise to plan everything down to the last detail. Moving desks and other office furniture is relatively straightforward. A…

Category : News and events   21-08-2018   by Janeth Kent

Four of the Biggest Reasons Your Emails are Sent to Spam

Four of the Biggest Reasons Your Emails are Sent to Spam

Email marketing still plays a huge part in getting the word out to potential and existing customers, but according to a study carried out by Return Path in 2015, only 79% of marketing emails will actually land in the recipient’s inbox. As a result, one in every five emails will…

Category : Web marketing   14-08-2018   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   30-03-2023   by Janeth Kent

How Can Small Businesses Reduce Paper Usage?

How Can Small Businesses Reduce Paper Usage?

Even in this digital age, many businesses are still using far more paper and cardboard than necessary. What’s more, not near enough companies or individuals are recycling their waste properly. Whether it’s business cards, employee contracts, receipts or packaging goods, businesses can’t find a new way to get around these…

Category : Startups   26-07-2018   by Janeth Kent

A Guide to Integrate Social Media into Your E-Commerce Store

A Guide to Integrate Social Media into Your E-Commerce Store

There’s no disputing the influence that the internet and social media have had on business management. The speed at which platforms like Facebook, Instagram, and Twitter have grown has been remarkable, and the integration of the business tools that they provide has been largely positive. For those involved in e-commerce,…

Category : News and events   09-07-2018   by Janeth Kent

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by Janeth Kent

2 Areas of Business You Need to Audit

2 Areas of Business You Need to Audit

Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…

Category : Startups   28-05-2018   by Janeth Kent

Send Push Notification to Users Using Firebase Messaging Service in PHP

Send Push Notification to Users Using Firebase Messaging Service in PHP

Today I will show you how to send unlimited free push notifications to your clients using Firebase Cloud Messaging (FCM) in your PHP web application. Push Notifications are clickable messages that come from a website. They are used to show notifications outside the web page context even if the user is not browsing…

Category : Php   14-05-2018   by Janeth Kent

How Our Relationship with the Internet has Changed in the Last 20 Years

With more than 1 billion websites online, it is fair to say the internet has transformed the daily lives of people across the world. It now impacts almost every aspect of a person’s life. Find out how our relationship with the internet has changed in the last 20 years. Fast Adoption On…

Category : News and events   29-04-2021   by Janeth Kent

Best apps to boost your social media

Best apps to boost your social media

Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…

Category : Social networks   24-11-2017   by Janeth Kent

Top 8 Free Online Social Media Marketing Tools For Startups

If you have just launched a new startup one of the things that should be top of your agenda is creating an effective social media strategy. No sane business owner can afford to ignore social media in this day and age. People go to social media sites to socialize. It's like…

Category : Web marketing   08-11-2022   by Janeth Kent

5 best open source version control systems tools for sysadmins

5 best open source version control systems tools for sysadmins

As a system admin, the chances are you collaborate with multiple people across the company, therefore you will probably know the stress of constantly transferring files and version controlling the changes. Version control tools are a great way to enable collaboration, maintain versions, and track changes across the team. Perhaps the…

Category : Software   13-05-2017   by Janeth Kent

An Introduction to Email Segmentation: Boosting Engagement and Personalization

In today's digital age, email marketing remains a powerful tool for businesses to connect with their audience. However, as inboxes become increasingly crowded, it is crucial to deliver relevant and personalized content to stand out and drive engagement. This is where email segmentation comes into play. Email segmentation is a…

Category : Web marketing   23-06-2023   by Janeth Kent

How to Improve Communication with Suppliers

How to Improve Communication with Suppliers

A supplier is more than just a company you have hired for a service. They can be integral to the development and growth of your business. It is therefore essential to embark with a mutually beneficial relationship, as both companies are as important as each other for achieving their business…

Category : Web marketing   22-03-2017   by Janeth Kent

The Best Lightweight Linux Distributions For Older PC's

The Best Lightweight Linux Distributions For Older PC's

What do you do with your old computers? The one which once had good hardware configuration but now those are considered outdated. Why not revive your old computer with Linux? I am going to list seven beginner friendly lightweight Linux distributions that you can use on your older PC. Best Lightweight…

Category : Operating systems   12-03-2017   by Janeth Kent

Fetch API, an amazing replacement of XMLHttpRequest AJAX

Fetch API, an amazing replacement of XMLHttpRequest AJAX

When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…

Category : Programming   19-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

How to send an e-mail in 1984 - Vintage overdose

How to send an e-mail in 1984 - Vintage overdose

How to send an e mail 1980's style. Electronic message writing down the phone line. First shown on Thames TV's computer programme 'Database' in 1984 07/06/1984 Database is an old British TV show, broadcasted in 1984, which explains how the networks work before the modern Internet, but also the futuristic concept…

Category : Technology   01-10-2016   by Janeth Kent

PHP Libraries For Summer 2016

PHP Libraries For Summer 2016

Here are our picks for the 12 most useful and interesting open-source PHP libraries that you should check out this summer!   Monolog With Monolog you can create advanced logging systems by sending your PHP logs to files, sockets, databases, inboxes or other web services. The library has over 50 handlers for various…

Category : Php   11-08-2016   by Janeth Kent

8 Social Tools to interact with Customers and improve CX

8 Social Tools to interact with Customers and improve CX

Customer experience is measured by the individual’s experience during all points of contact against the individual’s expectations. Over the past century, countless inventions and advancements have inadvertently raised the bar of customer experience. Communication mediums have improved, resulting in elevated expectations of more hands-on, faster, and localized customer service.  Customers now have…

Category : Social networks   22-07-2016   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

8 Social Media Monitoring Tools 

8 Social Media Monitoring Tools 

We think that a combination of quick response, easy use and functionality is what a company need in order to effectively run a social media campaigns. There are many tools that let you manage multiple accounts, respond quickly and stay on top of real-time information.  We evaluate 8 of the best free tools for social media monitoring,…

Category : Social networks   22-10-2015   by Janeth Kent

Protect Ubuntu Servers With Fail2Ban

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

Category : Security   17-02-2015   by Janeth Kent

PHP Filters: the best way to sanitize and validate datas

What are PHP filters? One of the most amazing strengths of PHP is its convenience. Shockingly this same profit has worked against PHP as numerous new coders have forgotten any security to establish safety or fails to offer the adroitness to make a class to validate their variables from end users. One…

Category : Php   02-03-2020   by Janeth Kent

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by Janeth Kent

10 Server and network monitoring tools

10 Server and network monitoring tools

When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding…

Category : Networking   04-02-2014   by Janeth Kent

How to Create Custom Filters in jQuery

How to Create Custom Filters in jQuery

If you are a web designer or a developer you frequently need a shortcut to collect elements for jQuery. In this post, based on the book Instant jQuery Selectors, you’ll learn how to build a custom filter in jQuery. So, we try to built a filter that ia able to print the length of…

Category : Javascript   17-12-2013   by Janeth Kent

q=email Clicky