73 results for: encrypt
The Payment Request API: Revolutionizing Online Payments (Part 2)
Part 2: Advanced Features and Best Practices In the first part of this series, we explored the fundamentals of the Payment Request API and how it simplifies the payment experience. Now, let's delve deeper into advanced features and best practices to further optimize the integration of this powerful API. 1. Customizing Payment…
Category : Javascript 04-06-2023 by Silvia Mazzetta
The Impact of automation and Robots on human jobs: exploring controversies and opportunities
Automation and technological advancements have raised concerns in some sectors about the possibility of robots taking away human jobs. While it is true that robots and artificial intelligence can perform certain tasks more efficiently and accurately than humans, the idea that robots will completely replace human workers is a controversial…
Category : News and events 02-06-2023 by Silvia Mazzetta
Is AI sexist? A gender perspective in Robotics and Artificial Intelligence
In her article, Maria Antonia Huertas Sánchez of the UOC - Universitat Oberta de Catalunya, provides an explanation of why we should incorporate a gender vision in robotics and artificial intelligence by combining the concept of epistemology with the definition of artificial intelligence. Epistemology refers to the "theory of the foundations…
Category : News and events 22-05-2023 by Silvia Mazzetta
What is a JWT token and how does it work?
JWT tokens are a standard used to create application access tokens, enabling user authentication in web applications. Specifically, it follows the RFC 7519 standard. What is a JWT token A JWT token is a token that gives the user access to an application by certifying their identity. This token is returned to…
Category : Programming 10-05-2023 by Janeth Kent
How to create PDF with JavaScript and jsPDF
Creating dynamic PDF files directly in the browser is possible thanks to the jsPDF JavaScript library. In the last part of this article we have prepared a practical tutorial where I show you how to implement the library. Below you can see the completed exercise. The client side is gaining ground over…
Category : Javascript 04-12-2022 by Janeth Kent
Open source web design tools alternatives
There are many prototyping tools, user interface design tools or vector graphics applications. But most of them are paid or closed source. So here I will show you several open source options for you to try and use the one you like the most. Penpot Penpot is the first open source design…
Category : Web design 03-06-2022 by Nadal Vicens
How to create a .onion domain for your website
The dark web, a hidden network accessed through the Tor browser, offers enhanced privacy and anonymity for websites. To establish a presence on the dark web, you can create a .onion domain for your website. A .onion domain is an address that can only be accessed through the Tor network.…
Category : Networking 06-06-2023 by Janeth Kent
The ultimate cybersecurity checklist for programmers
In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…
Category : Security 02-06-2023 by Silvia Mazzetta
How to Send Email from an HTML Contact Form
In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…
Category : Programming 10-05-2021 by
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
How To Use Varnish As A Highly Available Load Balancer On Ubuntu 20.04 With SSL
Load balancing with high availability can be tough to set up. Fortunately, Varnish HTTP Cache server provides a dead simple highly available load balancer that will also work as a caching server. The modern use of SSL/TLS for all traffic has made this a little harder as Vanish has to handle…
Category : Servers 25-04-2021 by Janeth Kent
6 Best Alternative Privacy Focused Browsers in 2021
In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…
Category : Software 22-04-2021 by
SEO: How to choose the best Anchor Text
Anchor Text are the words used to insert a link within a piece of content. This text can be anything from "click here" to the name of a brand or even a series of keywords or phrases. When choosing the best anchor text, always put the user experience first. Since the launch…
Category : Seo & sem 15-03-2021 by Janeth Kent
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
Top Whatsapp alternatives in 2021
From the communication platform WhatsApp leaves more and more users for different reasons. If you're one of them, there are a lot of possibilities on how to replace it with something better. We will show you what are the 5 free alternatives to WhatsApp to have a text or audio-video conversation…
Category : Software 26-01-2021 by
Security of Internet providers: can we trust it?
This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the security of Internet operators becomes more important. The question is whether the ISP's security is good enough to be the only…
Category : Security 29-05-2023 by Janeth Kent
Google everywhere: anatomy of a massive giant
The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…
Category : Technology 03-12-2020 by Silvia Mazzetta
How to prevent your neighbor from hacking your Chromecast
Google Chromecast was born as a device to add Smart TV features to those that were not yet Smart TV, and with WiFi connectivity as one of the key features according to this approach. Now it has evolved and is more complete, and serves equally well on Smart TVs, but…
Category : Networking 26-10-2020 by Luigi Nori
HTTP Cookies: how they work and how to use them
Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…
Category : Programming 27-11-2020 by
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
Double VPN: what it is and how it works
Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…
Category : Security 28-09-2020 by Silvia Mazzetta
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 19-09-2020 by Janeth Kent
How to securely access the Dark Web in 15 steps. First part
The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…
Category : Security 04-05-2021 by Silvia Mazzetta
How to Browse the Internet Anonymously: 6 tips
Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…
Category : Security 16-09-2020 by Silvia Mazzetta
What is a Cryptophone and how it works
The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…
Category : Security 11-09-2020 by Silvia Mazzetta
How to install a Linux partition on a Windows 10 PC
In spite of a past we could say almost confronted, the approach between Windows and Linux is accelerating more and more, drawing a story closer to love than to hate. So much so that Windows 10 already offers support for Linux natively. Creating a subsystem is no longer penalized. A…
Category : Operating systems 06-09-2020 by Luigi Nori
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
What is Machine Learning ?
Artificial Intelligence or AI is a trend in technology and has been the main topic of many philosophical debates as to where this field will lead us as humanity. This time I'm going to focus on a subfield of Artificial Intelligence that is Machine Learning, which I am currently very passionate…
Category : Technology 16-06-2020 by Silvia Mazzetta
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
How to Change Your DNS Server (And Why You Should)
It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…
Category : Networking 09-05-2020 by Luigi Nori
How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P
We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…
Category : Security 07-05-2020 by Janeth Kent
The best websites of the Tor Deep Web and Dark Web Network
We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…
Category : Security 03-11-2022 by Janeth Kent
How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit
Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…
Category : Security 02-03-2020 by Silvia Mazzetta
Best Web Proxies for Safer and Anonymous Surfing
Privacy is increasingly demanded in the context of global society. Contributing to this are the notorious cases of massive infiltration and security breaches that have ended up filtering users' private data. But there is also a widespread suspicion that someone is "watching" everything we do. For that reason, the use…
Category : Security 11-01-2020 by Silvia Mazzetta
How to Stay Safe When Shopping Online
It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…
Category : News and events 08-01-2020 by Silvia Mazzetta
Is It Risky to Share Data While Surfing Online?
The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…
Category : Security 30-12-2019 by Janeth Kent
5 popular Dark Web sites
People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…
Category : News and events 09-12-2019 by Silvia Mazzetta
How to setup Free Let’s Encrypt SSL certificates with ISPConfig 3
Let’s Encrypt is an initiative to provide a better way of enabling encryption on websites. It is open, automated and above all: it offers free SSL certificates. Obtaining SSL certificates was always a bit of a hassle and now thanks to Let’s Encrypt and Certbot, finding a certificate authority, doing regular payment,…
Category : Servers 03-12-2019 by Luigi Nori
How they can hack you while navigating
When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…
Category : Security 02-12-2019 by Silvia Mazzetta
Wi-Fi 6
In the second quarter of 2019, Wi-Fi Alliance decided to release the new version of Wi-Fi protocol, innovative already from the name. In fact, if the previous standards had incomprehensible names like IEEE 802.11a, IEEE802.11n and so on, the new protocol is called Wi-Fi 6. This standard introduces some new features.…
Category : Technology 12-09-2019 by Alessio Mungelli
React: 4 types of components to rule them all
If you have already worked with React, you will probably have found terms like "dumb components", "stateless components" or "high order components" which serve to describe different ways of defining and creating components in an application. The aim of this article is to explain the different types of components we can…
Category : Javascript 20-08-2019 by Janeth Kent
The history of software development in two minutes: a century of logic, languages and code
The video shows the hyper-compressed history of software development and programming beginning in 1912 with Bertrand Russell and Alfred North Whitehead and their work on formal logic and type theory. Then came the first electromechanical calculators from IBM and others. Turing laid the foundations for programming in 1930 and by 1940…
Category : Programming 20-08-2019 by Janeth Kent
Now you can download the new Windows terminal: new, modern, fast, efficient, and powerful.
Microsoft has announced its new Windows Terminal, which will bring together PowerShell, CMD and WSL, includes a real Linux kernel that allows you to run more Linux software on Windows and with better performance than WSL 1 in one place to end the diversification that currently has the operating system…
Category : Software 26-06-2019 by Janeth Kent
RCS: Everything you need to know about the successor to the SMS
What is RCS? What is it for? Discover everything about this system that Google has been promoting for some time and the future it could have. Messaging in the handset market has changed dramatically over time. For many years SMS was the way most people used to be in contact with…
Category : Mobile 18-06-2019 by Janeth Kent
10 Collaborative Coding Tools for Remote Pair Programming
The days of lonesome coding are long gone since the development of pair programming. It is a technique where two software developers share a keyboard and collaboratively work together. The two developers take turns and continually switch roles in writing code: one being the Driver, whose job is to write…
Category : Development 02-03-2020 by Janeth Kent
Node.js Course in 90 Minutes
Node.js can be defined as a Google Chrome JavaScript V8 engine based on a dynamic, cross-platform and open-source JavaScript framework or runtime environment. Node.js was initially implemented as a client-side scripting language, developed by Ryan Dahl in 2009. JavaScript code and scripts running on the server side are now used…
Category : Javascript 08-02-2019 by Janeth Kent
Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server
The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…
Category : Networking 27-12-2018 by Janeth Kent
How to install Letsencrypt Certificates with Certbot in Ubuntu
In this article we will explain how to install, manage and configure the SSL Security certificate, Let's Encypt in NGINX server used as proxy. This certificate is free but does not offer any guarantee and has to be renewed every 3 months. We recommend that users with shell access use the…
Category : Servers 09-05-2020 by Janeth Kent
How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail
Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…
Category : Networking 30-03-2023 by Janeth Kent
Tips on How to Prevent Data Loss for Your Business
Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…
Category : Databases 21-06-2018 by Janeth Kent
The Rise and Fall of Business-Related VoIP Platforms
Voice over Internet protocol (VoIP) was at one time ubiquitous within the office environment. It had been employed to make crystal-clear digital phone calls, to send large packets of proprietary information and to hold webinars with attendees from around the world. However, we have recently seen a shift in regards…
Category : Software 24-04-2020 by Janeth Kent
How to Install Syncthing on Ubuntu 16.04
This tutorial shows how to install Syncthing on Ubuntu 16.04 Desktop LTS Xenial Xerus. Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, mobile phones or even servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation,…
Category : Networking 17-02-2017 by Janeth Kent
How to Connect to a Remote Server via SSH from a Linux Shell
Introduction Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and…
Category : Servers 16-02-2017 by Janeth Kent
PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library
Last week, the voting phase closed on an RFC to add libsodium to PHP 7.2. The result was unanimous (37 in favor, 0 against). When version 7.2 releases at the end of the year, PHP will be the first programming language to adopt modern cryptography in its standard library. What is Modern…
Category : Php 14-02-2017 by Janeth Kent
Setup FTP server with VSFTPD in Ubuntu 16.04
Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…
Category : Servers 14-02-2017 by Janeth Kent
Ubuntu servers security: 25 security tools to armor your system
The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc. 1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…
Category : Servers 14-09-2016 by Janeth Kent
Install Syncthing on Ubuntu 16.04 using Debian Repository
Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation, modification or deletion of files on one machine will automatically be replicated to your other devices. Syncthing…
Category : Servers 19-08-2016 by Janeth Kent
Guide: Install Free SSL Certificate On Your Website with Let's Encrypt
Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…
Category : Networking 09-05-2020 by Janeth Kent
How to Configure Cloudflare Flexible SSL with WordPress website
This article is part of a serie of articles about Wordpress optimization with Cloudflare and some kinds of servers, if you want to understand well read these articles before: Speed up your site and protect it against DDOS attacks with CloudFlare Million of visitors per day with a super cheap php mysql…
Category : Servers 03-12-2015 by Janeth Kent
The Best Free SSH Tabbed Terminal Clients for Windows
PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…
Category : Networking 05-05-2021 by Janeth Kent
How to Create a .ONION Website and Domain With Tor Network
Not a lot of people know about .onion websites, not many people actually use it. .ONION websites are used by people who want to stay anonymous. In addition, .onion websites are the first layer of the Deep Web. Which is basically described in the picture bellow As many websites say, the…
Category : Networking 02-11-2014 by Janeth Kent
Mozilla introduces Firefox 29
Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…
Category : Software 29-04-2014 by Janeth Kent
PHP: list of best awesome PHP libraries
It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…
Category : Php 27-04-2014 by Janeth Kent
PHP: Storing arrays in database
When working with databases, sometimes it is necessary to store an array in a MySQL field. Unfortunately, there is no way to directly pass in an array as a parameter. Storing these data structures is a bit more complex, but by no means hard or impossible. To convert any array (or…
Category : Databases 18-11-2013 by Janeth Kent
Hash Passwords With PHP 5.5
Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…
Category : Php 28-08-2013 by Janeth Kent
PHP 5.5: Introduction To The New Functionalities
PHP 5.5.0 has been released, bringing with it a host of new features and fixes. Here we post a review; Generators are now available Generators provide a simple way to iterate through data without having to write a class implementing the Iterator interface. Just like any other function a generator is defined with…
Category : Programming 02-07-2013 by Janeth Kent
Setup SSL Certificate on Apache and Ubuntu 12.04
How to Create a SSL Certificate on Apache for Ubuntu 12.04 About SSL Certificates A SSL certificate is a way to encrypt a site's information and create a more secure connection. Additionally, the certificate can show the virtual private server's identification information to site visitors. Certificate Authorities can issue SSL certificates that…
Category : Networking 02-07-2013 by Janeth Kent
Grid Computing Vs Cloud Computing
The world of information technology is changing rapidly and what may be the popular method of conducting business or gathering information today may be completely phased out in a few months. Grid computing and cloud computing are two powerful – but distinct – computing systems that attempt to accomplish many of the…
Category : Networking 07-12-2013 by Janeth Kent
The HTML Working Group has announced their decision to release a First Public Working Draft of the Encrypted Media Extension (EME) specification
The W3C announced today that it intends to publish the controversial Encrypted Media Extensions (EME) specification despite highly outspoken resistance, paving the way for native web DRM: > On 01/22/2013 01:03 PM, Paul Cotton wrote: >> This is a Call for Consensus (CfC) to publish as a First Public >> Working Draft (FPWD)…
Category : News and events 10-05-2013 by Janeth Kent
Install Webmin on Ubuntu
Webmin is a web-based control panel for any Linux machine that allows you to manage your server through a modern web-based interface. With Webmin, you can change settings for common packages on the fly, including web servers and databases, as well as manage users, groups and software packages. Through this tutorial,…
Category : Networking 18-06-2020 by Janeth Kent
Install and Setup SSL in Webmin and Apache
SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…
Category : Networking 11-04-2013 by Janeth Kent
Setup VNC server for remote desktop management in Ubuntu 12.04
VNC is a protocol that is used to share the desktop with other users/computers over the network/Internet.In order to share a desktop, VNC server must be install and configure on the computer and VNC client must be run on the computer that will access the shared desktop. When we install…
Category : Networking 24-04-2013 by Janeth Kent