Hack -

72 results for: hack

How they can hack you while navigating

When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…

Category : Security   02-12-2019   by Silvia Mazzetta

Layouts with Bootstrap 4: how to create a responsive web

Responsive or adaptable web design is a design methodology in which the appearance of the web page adapts to the resolution of the device with which it is being viewed, so we can have a unique design for computers, tablets or mobiles. To implement a responsive design we can make use…

Category : Web design   23-11-2019   by Silvia Mazzetta

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to a Secure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting…

Category : Networking   30-10-2019   by Luigi Nori

Javascript overcomes Java as the most popular programming language of 2019

The competition between Java and Javascript (in terms of popularity, not in use) has been going on for years. But it seems that Javascript is gradually consolidating as the most popular programming language of recent years. Or at least 2018, as revealed by a survey of 71,000 developers carried out…

Category : Javascript   18-09-2019   by Silvia Mazzetta

Google Search hacks to Use Google More Efficiently

Modern folks have grown up with having all the world's data at their fingertips with super mobile phones glued to our palms. Or it's what we've always believed. Sometimes the incredible amount of information in a Google search result can actually stop us from finding out what we need. We…

Category : Software   24-07-2019   by admin admin

Best Open-Source Javascript Date Picker Plugins and Libraries

For date pickers, selecting menus is a common choice as they are simple to set up. But I suppose our customers deserve better after centuries of using MM / DD / YY menus. For many companies, datepickers are vital. They can also be used for any defined purpose to monitor time. It…

Category : Javascript   26-06-2019   by admin admin

Progressive Web Apps Directory: The Best Collection of Resources

Get started with progressive web apps and learn things in depth, this page will list the best resources we know of to help you understand Progressive Web Apps (PWAs) . Make sure to bookmark this page, as this is a living document that we’ll be adding to from time to time.Progressive…

Category : Javascript   20-06-2019   by admin admin

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   27-05-2019   by admin admin

Nofollow and dofollow links, How and when to use?

Within any website the links are an element that brings dynamism to the experience of navigating through the different sections that make it up allowing us to go from one content to another quickly. However, it is necessary to take into account that Google, as well as other search engines will…

Category : Seo & sem   19-05-2019   by admin admin

How to Get the Most out of Digital Technology in Business

How to Get the Most out of Digital Technology in Business

The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…

Category : News and events   29-03-2019   by admin admin

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by admin admin

Developing a JavaScript video game: Part 3

Developing a JavaScript video game: Part 3

Here we are! We're back with the third part of the article . If you missed it, read the first part or the second one. So, now you may be able to fire (static) rockets by pressing the spacebar. Let's see what the next steps would be. To make the fire rockets move,…

Category : Javascript   06-03-2019   by admin admin

Level Up Your JavaScript Skills: 12 basic notions

Level Up Your JavaScript Skills: 12 basic notions

If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…

Category : Javascript   25-02-2019   by admin admin

Developing a JavaScript video game: Part 2

Developing a JavaScript video game: Part 2

This article is the second part of a Javascript game tutorial. Here you can read the first part Let's create the spaceship Now that the background is finished, we can start setting up our space vehicle! Let's create a Player.js file and add it as a script to index.html. In essence, we want this…

Category : Javascript   06-03-2019   by admin admin

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   13-02-2019   by admin admin

Crazy SEO Tips For 2019

Crazy SEO Tips For 2019

Are you interested in learning more about SEO in 2019? Here are the trends you need to follow to improve your search optimization skills. For those who don’t know about SEO, here's a brief overview. SEO is the acronym for Search Engine Optimization. In simple words, SEO is the way of improving…

Category : Seo   01-02-2019   by admin admin

4  Ways To Quickly Improve Your Online Business

4 Ways To Quickly Improve Your Online Business

It’s great to be an online business in an era where technology is continuously growing and expanding, but it can be difficult to succeed because there’s also a lot of competition in the space. This is why it’s important to always be looking at how you can be improving your…

Category : Web marketing   07-11-2018   by admin admin

JavaScript Manual for Beginners

JavaScript Manual for Beginners

The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I   GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…

Category : Javascript   04-09-2018   by admin admin

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by admin admin

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by admin admin

Useful technical SEO checklist for developers

Nowadays search engine optimization has evolved to such a degree that it very nearly emulates real world marketing; that is, marketing for the people. And there is one great truth on this freak world: people are fickle. But that's the beauty of it. Modern SEO is so dynamic that almost anything could work, but that's…

Category : Seo & sem   28-05-2019   by admin admin

CSS Progressive Loading in Chrome

CSS Progressive Loading in Chrome

Until now, only in IE/Edge could we leverage streaming of CSS to load progressively the CSS of the components as their HTML is streamed. In other browsers, they would normally block rendering till the entire CSS sources were loaded, giving us the white screen of wait before anything could render. With…

Category : Css   09-05-2017   by admin admin

How to Configure the Mod_Security Core Ruleset in Ubuntu

How to Configure the Mod_Security Core Ruleset in Ubuntu

ModSecurity is a Web Application Firewall, a program that can be used to inspect information as it passes through your web server, intercepting malicious requests before they are processed by your web application. This tutorial will show you how to install ModSecurity on Apache, and configure it with some sensible rules provided…

Category : Servers   04-03-2017   by admin admin

Guide to viewport units vw, vh, vmin and vmax

Guide to viewport units vw, vh, vmin and vmax

The viewport is the area where the browser renders the site. This is your screen minus the reserved space of the browser chrome. Sometimes you want to size an element based on that viewport, like a sidebar. This can be done using a unit we’re all familiar with: percentages. .sidebar {…

Category : Css   23-02-2017   by admin admin

Getting started with Node.Js

Getting started with Node.Js

A resource directory gathering sites related to Node.js ordered by the kind of project Tutorials NodeSchool.io interactive lessons The Art of Node (an introduction to Node.js) Hello World Hello World Web Server (paid) Node.js guide Build a blog with Node.js, express and MongoDB Node.js for Beginners Learn Node.js Completely and with Confidence Absolute Beginners Guide To Node.js Node JS Processing Model –…

Category : Javascript   28-12-2016   by admin admin

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by admin admin

SQLMAP installation and usage in Ubuntu and Kali linux

SQLMAP installation and usage in Ubuntu and Kali linux

Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…

Category : Security   13-08-2016   by admin admin

What is a DDOS attack and tools used

What is a DDOS attack and tools used

What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…

Category : Security   19-04-2016   by admin admin

Install HHVM + Nginx on Ubuntu 14.04

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…

Category : Networking   12-05-2017   by admin admin

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by admin admin

Mozilla introduces Firefox 29

Mozilla introduces Firefox 29

Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…

Category : Software   29-04-2014   by admin admin

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by admin admin

Google's 200 Most Important Ranking Factors

Google's 200 Most Important Ranking Factors

  Domain Factors   1. Domain Age: In this video, Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the…

Category : Web marketing   27-04-2014   by admin admin

86 Must Have WordPress Plugins Of 2013

86 Must Have WordPress Plugins Of 2013

Today we are going to share Best 85 WordPress Plugins for 2013 which will help WordPress Webmasters all over the world. 1. ALL AROUND WORDPRESS CONTENT SLIDER CAROUSEL All Around wordpress content slider is a multi-purpose all-in-one slider solution for your website. It supports both images and video. It can be an…

Category : Software   09-12-2013   by admin admin

Best Content Strategy Resources

Best Content Strategy Resources

Content Strategy Books Annett-Baker, Relly. A Practical Guide to Creating Web Content. Bailie, Rahel Anne; Urbina, Noz. Content Strategy: Connecting the Dots Between Business, Brand, and Benefits. Bloomstein, Margot. Content Strategy at Work: Real-world Stories to Strengthen Every Interactive Project. Halvorson, Kristina; Rach, Melissa. Content Strategy for the Web. Handley, Ann; Chapman, C.C. Content Rules. Jones, Colleen. Clout — The Art &…

Category : Web marketing   09-12-2013   by admin admin

Isomorphic JavaScript: a new paradigm

Isomorphic JavaScript: a new paradigm

Spike Brehm, in a article written for http://venturebeat.com, explains that at Airbnb, they have learned a lot over the past few years while building rich web experiences by dividing into the single-page app world in 2011 with their mobile web site, launching  Wish Lists and their newly-redesigned search page. Each of these is a…

Category : Javascript   27-11-2013   by admin admin

Hash Passwords With PHP 5.5

Hash Passwords With PHP 5.5

Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…

Category : Php   28-08-2013   by admin admin

15 Advanced CSS3 Text Effect Tutorials

15 Advanced CSS3 Text Effect Tutorials

If you want to give your website more visually appealing text - CSS Text Effect Tutorials can help you achieve this goal. For many year Photoshop have been the only solution for Text Effects, but CSS3 now can help us to create awesome text effects. In this post we've gathered 15 Advanced CSS3 Text Effect…

Category : Css   13-08-2013   by admin admin

Submit Your Site to The Best CSS Galleries

Submit Your Site to The Best CSS Galleries

Have you spent your time creating a great website design and now you need some traffic, links, and exposure? Getting your site listed on CSS Galleries can do just that for you! Submit your site to the best CSS Galleries and watch the traffic flow in if you get approved. But, how can…

Category : Css   05-08-2013   by admin admin

The Bible of Responsive Web Design

You've decided it's time for a new website, and you know that making it responsive will ensure that all users have a great experience, regardless of what device they are using. Responsive web design, or RWD for short, is here to stay. It's rapidly maturing but not without some serious pitfalls for…

Category : Web design   23-05-2019   by admin admin

How to detect r57 and c99 Shells in your server

How to detect r57 and c99 Shells in your server

When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…

Category : Security   26-07-2013   by admin admin

26 Essential WordPress plugins

26 Essential WordPress plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of 26 Essential WordPress plugins. Enjoy! 1. WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables…

Category : Web design   22-07-2013   by admin admin

The future of web browsing

The future of web browsing

An article posted on Sidebar , underline the mind-blowing power of HTML5. Web developer / Mozilla evangelist David Walsh has grouped nine demos that use just native web technologies to show how much can be done in your web browser without the need for plugins like Flash and Silverlight. These, in my opinion, are the…

Category : News and events   22-07-2013   by admin admin

Becoming a Web Professional: 19 online resources

Becoming a Web Professional: 19 online resources

The web education industry (designers, developers, graphics,seo,sem...) has exploded from a small niche to a powerful, continually expanding force. Countless people all over the planet are interested in learning about web design,web development, seo, sem, gamification, web marketing, and tons of companies are cropping up promising the ultimate solution. The good…

Category : News and events   18-07-2013   by admin admin

Who is immune to cyber-crime?

Who is immune to cyber-crime?

Every company is a target.  No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…

Category : Security   15-07-2013   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Top 15 Free Hacking Tools for Ethical Hackers

According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…

Category : Security   10-07-2013   by admin admin

WordPress tips and tricks: how to custumize your theme

WordPress tips and tricks: how to custumize your theme

When you're in the process of writing a WordPress theme, there are a few behaviors you can change. Some of them are pretty basic, but they can really enhance the theme my making it go that extra mile. How to Customize The Login Page It’s quiet easy to customize the existing Login…

Category : Web design   10-07-2013   by admin admin

Firefox OS: Start To Develop Your First App

Firefox OS: Start To Develop Your First App

Nearly two years ago, Mozilla announced "Boot to Gecko" (a.k.a. B2G), a project whose primary goal was to provide a standalone web-centric operating system in which the preferred (and in fact, only) platform for application development is the HTML5 stack. In essence, this operating system would have filled a gap…

Category : Programming   02-07-2013   by admin admin

318 useful twitter bootstrap resources #3

318 useful twitter bootstrap resources #3

TWITTER BOOTSTRAP FOR FRAMEWORK INTEGRATIONS #2 Means and Methods of Integrating Bootstrap into your Application Framework or CMS PHP CODEIGNITER_FORM_BUILDER CodeIgniter library to build uniform form elements with bootstrap styling WRIGHT The Wright Framework is used to create Joomla Templates. The name is in honor of the famous architect, Frank Lloyd Wright, because the framework…

Category : Web design   24-06-2013   by admin admin

The HTML5 Full-Screen API

The HTML5 Full-Screen API

How to Launch the Fullscreen Mode The fullscreen API's requestFullScreen method is still prefixed in some browsers, so we'll need to do a bit ofsearching to find it: // Find the right method, call on correct elementfunction launchFullScreen(element) { if(element.requestFullScreen) { element.requestFullScreen(); } else if(element.mozRequestFullScreen) { element.mozRequestFullScreen(); } else if(element.webkitRequestFullScreen) { element.webkitRequestFullScreen(); }} // Launch fullscreen How to…

Category : Programming   20-06-2013   by admin admin

75 Free Fonts Websites

75 Free Fonts Websites

Webpage fonts are essential for creating an impact on the user's impression of a site. That is why, designers take extreme caution in choosing the right fonts for a website. So, choosing the right type of font to use on a website is more important then you may think. This post…

Category : Web design   20-06-2013   by admin admin

A List of Best Free SQL Injection Scanners and Tools

A List of Best Free SQL Injection Scanners and Tools

We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…

Category : Databases   03-06-2013   by admin admin

318 useful twitter bootstrap resources #2

318 useful twitter bootstrap resources #2

Input BOOTSTRAP-WYSIHTML5-RAILS A stylish wysiwyg editor for Bootstrap. TIMEPICKER Select a time for a text input using your mouse or arrow keys. COMBOBOX FUEL UX Bootstrap style form element combining textfield and select controls. TIMEZONE FORM HELPERS A drop down of timezones from country code LANGUAGES FORM HELPER A drop down of languages or a…

Category : Web design   05-06-2013   by admin admin

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…

Category : Security   23-05-2013   by admin admin

10 most used PHP features

10 most used PHP features

We have compiled a selection of top 10 PHP native functions, classes and features. We know first-hand how invaluable these features are, so we hope you find them to be useful too. 1. PDO Class We use the PDO (PHP Data Object) exclusively for connecting to our MySQL databases. PDO provides a nice abstraction layer…

Category : Programming   22-05-2013   by admin admin

What is a growth hacker? The actual difference between growth hacking and marketing

What is a growth hacker? The actual difference between growth hacking and marketing

Definition: growth hacker (noun) - one who's passion and focus is pushing a metric through use of a testable and scalable methodology. “Growth hacker” is a new word for most but a long held practice among the best internet marketers and product managers in Silicon Valley. With mass media fading away and…

Category : Web marketing   22-05-2013   by admin admin

Google Hacking Secrets:The Hidden Codes Of Google

Google Hacking Secrets:The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Category : Security   15-02-2019   by admin admin

Matt Cutts Talks SEO for Google: 9 Things You Should Expect This Summer

Matt Cutts Talks SEO for Google: 9 Things You Should Expect This Summer

The latest Google Webmaster video features Distinguished Engineer Matt Cutts talking about what webmasters can expect to see in the next few months in terms of SEO for Google, particularly changes combating black hat web spam from many different angles in a variety of areas. Here are nine search and SEO changes webmasters…

Category : Web marketing   14-05-2013   by admin admin

Incredibly Useful and Interesting Web Sites

Incredibly Useful and Interesting Web Sites

Here is a list of really useful websites. We've organized the sites in the list by the type of task they help you with. It is not a ranking; in each category we recommend sites that specialize in a different area than the others.. Educational/Learning khanacademy.org - video lectures on just about any…

Category : Web design   17-05-2013   by admin admin

The biggest bank robbery in history!

The biggest bank robbery in history!

Reportedly, the group of hackers targeted weaknesses in how banks and payment processors handle prepaid debit cards. Authorities said they arrested these seven U.S. citizens and residents of Yonkers, New York: Jael Mejia Collado, Joan Luis Minier Lara, Evan Jose Peña, Jose Familia Reyes, Elvis Rafael Rodriguez, Emir Yasser Yeje and…

Category : News and events   10-05-2013   by admin admin

5 Simple Landing Page Optimization Tips

5 Simple Landing Page Optimization Tips

Eight seconds. That is all the time you have to capture a person’s attention, according to The Associated Press. Busy schedules and non-stop media barrage are quickly taking up your potential customers’ attention. You have just eight seconds to make a solid impression and get them to your next step.…

Category : Web design   10-05-2013   by admin admin

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by admin admin

Mysql:Guide To The MySql Query Cache

Mysql:Guide To The MySql Query Cache

MySQL“Query Cache” is quite helpful for MySQL Performance optimization tasks but there are number of things you need to know. First let me clarify what MySQL Query Cache is - I’ve seen number of people being confused, thinking MySQL Query Cache is the same as Oracle Query Cache - meaning cache…

Category : Databases   03-05-2013   by admin admin

Mozilla launches Firefox OS Simulator 3.0

Mozilla launches Firefox OS Simulator 3.0

Mozilla on Thursday announced the release of Firefox OS Simulator 3.0, polishing all the features in the preview release as well as making a few more improvements. You can download version 3.0 now for Windows, Mac, and Linux from Mozilla Add-Ons. The simulator installs as an extension in Firefox, so you’ll need Mozilla’s browser to use…

Category : Programming   03-05-2013   by admin admin

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…

Category : Security   29-04-2013   by admin admin

Useful Bookmarklets for your iPad and iPhone

Useful Bookmarklets for your iPad and iPhone

The Safari browser of your iOS device (iPad, iPhone, iPod Touch) doesn’t support extensions (or add-ons) but you can still add extra functionality to the mobile browser with the help of bookmarklets. Bookmarklets, if you are new, are like regular bookmarks but instead of opening new websites, bookmarklets are often used…

Category : Software   26-04-2013   by admin admin

The Best Experimental Chrome Features You Should Check Out

The Best Experimental Chrome Features You Should Check Out

Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…

Category : Software   24-04-2013   by admin admin

Free Tools For JavaScript Developers

Free Tools For JavaScript Developers

We have compiled a list of really useful Free Tools For JavaScript that will help you. Testing JSLint – The JavaScript Verifier JSLint takes a JavaScript source and scans it. If it finds a problem, it returns a message describing the problem and an approximate location within the source. The problem is not…

Category : Javascript   16-04-2013   by admin admin

How To Run Unity Next on Ubuntu 12.10

How To Run Unity Next on Ubuntu 12.10

Unity Next, the next-generation Qt/QML version of Ubuntu’s Unity interface designed to intelligently adapt to multiple form factors, can now be tried, tested, and hacked-on right from the desktop. You’ll need to be running Ubuntu 12.10 and know your way around the command line to get it up and running. It’ll also help if you’re…

Category : Operating systems   11-04-2013   by admin admin

20 Useful and Amazing CSS3 Tutorials

20 Useful and Amazing CSS3 Tutorials

We have listed 20 Amazing CSS3 tutorials, which show you how to develop some top notch CSS3 effects for your websites and personal blogs. Enjoy! 1. Create a Stunning Menu in CSS3 In this tutorial you will learn how to develop a white stunning drop down menu using CSS3. You can download…

Category : Programming   11-04-2013   by admin admin

CSS:Browser CSS hacks for IE6,IE7,IE8,IE9

CSS:Browser CSS hacks for IE6,IE7,IE8,IE9

Did you know that there are specific CSS hacks for IE that allow you to target IE8, IE7 and IE6? We, web developers, are constantly faced with deficiencies of Internet Explorer, and CSS hacks allow to overcome them in most cases. In this post I would like to group the CSS hacks…

Category : Web design   11-04-2013   by admin admin

Setup VNC server for remote desktop management in Ubuntu 12.04

Setup VNC server for remote desktop management in Ubuntu 12.04

   VNC is a protocol that is used to share the desktop with other users/computers over the network/Internet.In order to share a desktop, VNC server must be install and configure on the computer and VNC client must be run on the computer that will access the shared desktop. When we install…

Category : Networking   24-04-2013   by admin admin