117 results for: hack
The best and most amazing Alexa Hacks you should know about
The best and most amazing Alexa Hacks you should know about Alexa, Amazon's talking Artificial Intelligence contained in the Echo, can entertain you and your family if you know the right words. Alexa is a versatile assistant, but Alexa's fun tricks can be the best form of entertainment at home. From playing…
Category : Operating systems 30-06-2023 by Janeth Kent
Android Hidden Codes: unveiling custom dialer codes and their functionality
In the world of Android smartphones, there exist numerous hidden codes that can unlock a treasure trove of functionalities and features. These codes, known as custom dialer codes, provide access to various settings, diagnostics, and information that are not readily available through regular menus. In this article, we will explore…
Category : Mobile 02-06-2023 by Janeth Kent
How to fix excessive MySQL CPU usage
What happens if we realise that a series of databases that we thought were optimised through the use of indexes, have begun to consume CPU usage time of a server to unsuspected limits? Even users have stopped being able to access the server when it had a certain number of visits…
Category : Development 21-12-2022 by Janeth Kent
How to recognise cyber-violence
Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…
Category : News and events 04-12-2022 by Janeth Kent
The ultimate cybersecurity checklist for programmers
In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…
Category : Security 02-06-2023 by Silvia Mazzetta
How to Send Email from an HTML Contact Form
In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…
Category : Programming 10-05-2021 by
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
htaccess Rules to Help Protect from SQL Injections and XSS
This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…
Category : Security 01-03-2021 by Janeth Kent
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
Interesting and Helpful Google Search Features You’ll Want to Start Using
Google – THE search engine for many internet users. It has been with us since its launch back in 1998 and thanks to its simplicity of use and genius algorithms, it grew so popular, that most of us cannot imagine our day-to-day life without it. Many petty arguments between friends…
Category : Software 31-01-2021 by Iveta Karailievova
Validating HTML forms using BULMA and vanilla JavaScript
Today we are going to write about contact forms and how to validate them using JavaScript. The contact form seems to be one of the top features of every basic home page. It is a great way to encourage your visitors to make contact with you, by adding a form which…
Category : Javascript 31-12-2020 by
Some Neat Ways to Improve Your Internet Browsing Experience?
Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…
Category : News and events 21-12-2020 by Janeth Kent
Install MacOS on PC - the Ultimate Guide (Hackintosh)
There has always been a belief that the Apple MacOS Operating System could only be installed on computers sold directly by Apple. But on the Internet there is a large community dedicated to Hackintosh. And in this guide we are going to show you today all you need to know…
Category : Operating systems 10-12-2020 by
Making AJAX requests to a REST API using vanilla JavaScript and XHR
Imagine you just build your first static web page and you would like to add some functionality to make it more attractive and generally more usable. Perhaps you would like to entertain your web page visitor with randomly generated cat facts, jokes, or, (preferably not randomly generated) weather forecasts or…
Category : Javascript 25-11-2020 by Iveta Karailievova
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
The BleedingTooth vulnerability and other Bluetooth security risks
Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of the lately discovered vulnerabilities in Linux systems. It had hit the tech news recently, when Andy Nguyen, a Google security…
Category : Security 10-11-2020 by Iveta Karailievova
How to watch deleted or private Youtube videos
Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube itself. With this trick you most of the time would do just that. How is this possible we will explain…
Category : Social networks 05-04-2021 by
How to prevent your neighbor from hacking your Chromecast
Google Chromecast was born as a device to add Smart TV features to those that were not yet Smart TV, and with WiFi connectivity as one of the key features according to this approach. Now it has evolved and is more complete, and serves equally well on Smart TVs, but…
Category : Networking 26-10-2020 by Luigi Nori
MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows
Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long hours spent in front of a console, such as the NES or SNES, and even in arcades playing arcade machines.…
Category : Software 14-10-2020 by Luigi Nori
Network and port scanning with Zenmap
This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…
Category : Security 08-10-2020 by Iveta Karailievova
HTTP Cookies: how they work and how to use them
Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…
Category : Programming 27-11-2020 by
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
How to securely access the Dark Web in 15 steps. Second part
Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6. 6. Changes the security level in the Tor browser It is also possible to increase the security level of the…
Category : Security 19-09-2020 by Janeth Kent
How to securely access the Dark Web in 15 steps. First part
The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…
Category : Security 15-06-2023 by Silvia Mazzetta
How to Browse the Internet Anonymously: 6 tips
Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…
Category : Security 16-09-2020 by Silvia Mazzetta
What is a Cryptophone and how it works
The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…
Category : Security 11-09-2020 by Silvia Mazzetta
What cybersecurity professionals have learned from the lockdown experience
The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…
Category : Security 26-08-2020 by Silvia Mazzetta
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…
Category : Security 11-08-2020 by Silvia Mazzetta
Popular DNS Attacks and how to prevent them
DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…
Category : Security 20-07-2020 by Silvia Mazzetta
How to recover an Instagram hacked account
You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…
Category : Social networks 16-07-2020 by Janeth Kent
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
Awesome JavaScript Games and Js Software to create Games
Best sites js13kGames 2019 - Highlights from the js13kGames 2019 competition. js13kGames 2018 - 13 Games in ≤ 13kB of JavaScript. js13kGames 2017 - Build a game in 13kB or less with js13kGames. Adventure Triangle: Back To Home - You are lost in the cave. Try to get out and back to home. Sometimes it…
Category : Javascript 30-06-2020 by Janeth Kent
Dark Web: how to access, risks and contents
You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…
Category : Security 13-06-2020 by Silvia Mazzetta
What is Cyber Intelligence and how is it used?
What is Cyber-intelligence and what is it used for? This is a question that is usually asked by security, cyber-security and intelligence professionals. Cyber-intelligence is a hybrid concept between these three worlds and professional fields, and therefore it is an opportunity and a necessity to know what it is and what…
Category : Security 11-06-2020 by Silvia Mazzetta
How to Change Your DNS Server (And Why You Should)
It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…
Category : Networking 09-05-2020 by Luigi Nori
Web shells as a security thread for web applications
Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…
Category : Security 04-05-2020 by Iveta Karailievova
Protect yourself: know which apps have access to your location, microphone and camera
When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much... Smartphones have become the target of choice for hackers and criminals who want to make money or extort money…
Category : News and events 20-04-2020 by Silvia Mazzetta
The best websites of the Tor Deep Web and Dark Web Network
We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…
Category : Security 03-11-2022 by Janeth Kent
How to find everything you need on the Deep Web and the Dark Web
How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…
Category : Security 10-05-2021 by Silvia Mazzetta
How to Stay Safe When Shopping Online
It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…
Category : News and events 08-01-2020 by Silvia Mazzetta
The worst 50 passwords of 2019
Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little seriously. The security company SplashData has published its ninth annual list of the year's worst passwords, assessing over 5 million passwords…
Category : News and events 31-12-2019 by Silvia Mazzetta
Is It Risky to Share Data While Surfing Online?
The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…
Category : Security 30-12-2019 by Janeth Kent
What Are The Best Methods to Make Money Online
More and more individuals are moving from a regular job they have to work on the internet. This trend continues to grow at quite a rapid speed, and since we depend on the internet a lot these days, it is natural that there is so much money to be made…
Category : Web marketing 12-06-2020 by Silvia Mazzetta
5 popular Dark Web sites
People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…
Category : News and events 09-12-2019 by Silvia Mazzetta
The best Internet search engines used by hackers
Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…
Category : Security 07-01-2021 by Silvia Mazzetta
How They Can Hack You While Navigating: Protecting Your Digital Security
As technology continues to advance, navigation systems have become an integral part of our daily lives. From GPS-enabled smartphones to in-car navigation systems, we rely on these tools to guide us to our destinations efficiently. However, with the rise in cyber threats, it's important to understand the potential risks associated…
Category : Security 23-06-2023 by Silvia Mazzetta
Layouts with Bootstrap 4: how to create a responsive web
Responsive or adaptable web design is a design methodology in which the appearance of the web page adapts to the resolution of the device with which it is being viewed, so we can have a unique design for computers, tablets or mobiles. To implement a responsive design we can make use…
Category : Web design 23-11-2019 by Silvia Mazzetta
How to Secure Remote Access Using VPN
Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…
Category : Networking 24-04-2020 by Luigi Nori
Javascript overcomes Java as the most popular programming language of 2019
The competition between Java and Javascript (in terms of popularity, not in use) has been going on for years. But it seems that Javascript is gradually consolidating as the most popular programming language of recent years. Or at least 2018, as revealed by a survey of 71,000 developers carried out…
Category : Javascript 18-09-2019 by Silvia Mazzetta
Google Search hacks to Use Google More Efficiently
Modern folks have grown up with having all the world's data at their fingertips with super mobile phones glued to our palms. Or it's what we've always believed. Sometimes the incredible amount of information in a Google search result can actually stop us from finding out what we need. We…
Category : Software 24-07-2019 by Janeth Kent
Best Open-Source Javascript Date Picker Plugins and Libraries
For date pickers, selecting menus is a common choice as they are simple to set up. But I suppose our customers deserve better after centuries of using MM / DD / YY menus. For many companies, datepickers are vital. They can also be used for any defined purpose to monitor time. It…
Category : Javascript 23-07-2021 by Janeth Kent
Progressive Web Apps Directory: The Best Collection of Resources
Get started with progressive web apps and learn things in depth, this page will list the best resources we know of to help you understand Progressive Web Apps (PWAs) . Make sure to bookmark this page, as this is a living document that we’ll be adding to from time to time.Progressive…
Category : Javascript 20-06-2019 by Janeth Kent
Unlock Hidden SmartPhone Features with these Secret Codes
Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…
Category : Security 06-11-2022 by Janeth Kent
Nofollow and dofollow links, How and when to use?
Within any website the links are an element that brings dynamism to the experience of navigating through the different sections that make it up allowing us to go from one content to another quickly. However, it is necessary to take into account that Google, as well as other search engines will…
Category : Seo & sem 19-05-2019 by Janeth Kent
How to Get the Most out of Digital Technology in Business
The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…
Category : News and events 29-03-2019 by Janeth Kent
The Steps to Take if You're the Victim of a Cyber Hack
According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…
Category : News and events 27-03-2019 by Janeth Kent
Developing a JavaScript video game: Part 3
Here we are! We're back with the third part of the article . If you missed it, read the first part or the second one. So, now you may be able to fire (static) rockets by pressing the spacebar. Let's see what the next steps would be. To make the fire rockets move,…
Category : Javascript 06-03-2019 by Janeth Kent
Level Up Your JavaScript Skills: 12 basic notions
If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…
Category : Javascript 23-05-2020 by Janeth Kent
Developing a JavaScript video game: Part 2
This article is the second part of a Javascript game tutorial. Here you can read the first part Let's create the spaceship Now that the background is finished, we can start setting up our space vehicle! Let's create a Player.js file and add it as a script to index.html. In essence, we want this…
Category : Javascript 06-03-2019 by Janeth Kent
Best Javascript front-end hacking cheatsheets
JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…
Category : Javascript 06-05-2020 by Janeth Kent
Crazy SEO Tips For 2019
Are you interested in learning more about SEO in 2019? Here are the trends you need to follow to improve your search optimization skills. For those who don’t know about SEO, here's a brief overview. SEO is the acronym for Search Engine Optimization. In simple words, SEO is the way of improving…
Category : Seo 01-02-2019 by Janeth Kent
4 Ways To Quickly Improve Your Online Business
It’s great to be an online business in an era where technology is continuously growing and expanding, but it can be difficult to succeed because there’s also a lot of competition in the space. This is why it’s important to always be looking at how you can be improving your…
Category : Web marketing 07-11-2018 by Janeth Kent
JavaScript Manual for Beginners
The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…
Category : Javascript 04-09-2018 by Janeth Kent
Tips on How to Prevent Data Loss for Your Business
Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…
Category : Databases 21-06-2018 by Janeth Kent
How to Become a Full Stack Developer in 2018
A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…
Category : Programming 22-03-2018 by Janeth Kent
Useful technical SEO checklist for developers
Let's start from the beginning. What is SEO? When we talk about SEO we are talking about Search Engine Optimisation: we are talking about the organic positioning of a web page in search results. And when we say organic positioning we mean unpaid positioning. SEO is a discipline, strategy or set…
Category : Seo & sem 15-05-2023 by Janeth Kent
CSS Progressive Loading in Chrome
Until now, only in IE/Edge could we leverage streaming of CSS to load progressively the CSS of the components as their HTML is streamed. In other browsers, they would normally block rendering till the entire CSS sources were loaded, giving us the white screen of wait before anything could render. With…
Category : Css 09-05-2017 by Janeth Kent
How to Configure the Mod_Security Core Ruleset in Ubuntu
ModSecurity is a Web Application Firewall, a program that can be used to inspect information as it passes through your web server, intercepting malicious requests before they are processed by your web application. This tutorial will show you how to install ModSecurity on Apache, and configure it with some sensible rules provided…
Category : Servers 04-03-2017 by Janeth Kent
Guide to viewport units vw, vh, vmin and vmax
The viewport is the area where the browser renders the site. This is your screen minus the reserved space of the browser chrome. Sometimes you want to size an element based on that viewport, like a sidebar. This can be done using a unit we’re all familiar with: percentages. .sidebar {…
Category : Css 23-02-2017 by Janeth Kent
Getting started with Node.Js
Node.js is a JavaScript runtime environment (hence its .js termination in reference to the JavaScript language). This real-time runtime environment includes everything you need to run a program written in JavaScript. It also brings many benefits and solves many problems, so it would be more than interesting to take our…
Category : Javascript 06-05-2020 by Janeth Kent
Ubuntu servers security: 25 security tools to armor your system
The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc. 1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…
Category : Servers 14-09-2016 by Janeth Kent
SQLMAP installation and usage in Ubuntu and Kali linux
Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…
Category : Security 13-08-2016 by Janeth Kent
What is a DDOS attack and tools used
A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users. The denial…
Category : Security 04-05-2021 by Janeth Kent
Install HHVM + Nginx on Ubuntu 14.04
The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…
Category : Networking 12-05-2017 by Janeth Kent
PHP7: Guide and References to all the changes between version 5.x and 7 of PHP
PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…
Category : Php 27-12-2015 by Janeth Kent
Mozilla introduces Firefox 29
Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…
Category : Software 29-04-2014 by Janeth Kent
PHP: list of best awesome PHP libraries
It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…
Category : Php 27-04-2014 by Janeth Kent
Google's 200 Most Important Ranking Factors
Domain Factors 1. Domain Age: Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the boost that it…
Category : Web marketing 30-03-2023 by Janeth Kent
86 Must Have WordPress Plugins Of 2013
Today we are going to share Best 85 WordPress Plugins for 2013 which will help WordPress Webmasters all over the world. 1. ALL AROUND WORDPRESS CONTENT SLIDER CAROUSEL All Around wordpress content slider is a multi-purpose all-in-one slider solution for your website. It supports both images and video. It can be an…
Category : Software 09-12-2013 by Janeth Kent
Best Content Strategy Resources
Content Strategy Books Annett-Baker, Relly. A Practical Guide to Creating Web Content. Bailie, Rahel Anne; Urbina, Noz. Content Strategy: Connecting the Dots Between Business, Brand, and Benefits. Bloomstein, Margot. Content Strategy at Work: Real-world Stories to Strengthen Every Interactive Project. Halvorson, Kristina; Rach, Melissa. Content Strategy for the Web. Handley, Ann; Chapman, C.C. Content Rules. Jones, Colleen. Clout — The Art &…
Category : Web marketing 09-12-2013 by Janeth Kent
Isomorphic JavaScript: a new paradigm
Spike Brehm, in a article written for http://venturebeat.com, explains that at Airbnb, they have learned a lot over the past few years while building rich web experiences by dividing into the single-page app world in 2011 with their mobile web site, launching Wish Lists and their newly-redesigned search page. Each of these is a…
Category : Javascript 27-11-2013 by Janeth Kent
Hash Passwords With PHP 5.5
Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…
Category : Php 28-08-2013 by Janeth Kent
15 Advanced CSS3 Text Effect Tutorials
If you want to give your website more visually appealing text - CSS Text Effect Tutorials can help you achieve this goal. For many year Photoshop have been the only solution for Text Effects, but CSS3 now can help us to create awesome text effects. In this post we've gathered 15 Advanced CSS3 Text Effect…
Category : Css 13-08-2013 by Janeth Kent
Submit Your Site to The Best CSS Galleries
Have you spent your time creating a great website design and now you need some traffic, links, and exposure? Getting your site listed on CSS Galleries can do just that for you! Submit your site to the best CSS Galleries and watch the traffic flow in if you get approved. But, how can…
Category : Css 05-08-2013 by Janeth Kent
The Bible of Responsive Web Design
You've decided it's time for a new website, and you know that making it responsive will ensure that all users have a great experience, regardless of what device they are using. Responsive web design, or RWD for short, is here to stay. It's rapidly maturing but not without some serious pitfalls for…
Category : Web design 23-05-2019 by Janeth Kent
How to detect r57 and c99 Shells in your server
When malicious intruders compromise a web server, there's an excellent chance a famous Russian PHP script, r57shell, will follow. The r57 and C99 shell PHP script gives the intruder a number of capabilities, including, but not limited to: downloading files, uploading files, creating backdoors, setting up a spam relay, forging…
Category : Security 26-07-2013 by Janeth Kent
11 Open Source JavaScript Libraries for Web Developers
Undoubtedly, JavaScript is one of the most used programming languages nowadays. Thanks to it, we have access to different features offered in the websites we visit regularly and which make our browsing experience much more pleasant, simple and entertaining. The browsers we use have their own JavaScript engines integrated, in order…
Category : Javascript 17-06-2020 by Janeth Kent
A Collection of Essential WordPress Plugins
With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…
Category : Web design 21-08-2020 by Janeth Kent
Becoming a Web Professional: 19 online resources
The web education industry (designers, developers, graphics,seo,sem...) has exploded from a small niche to a powerful, continually expanding force. Countless people all over the planet are interested in learning about web design,web development, seo, sem, gamification, web marketing, and tons of companies are cropping up promising the ultimate solution. The good…
Category : News and events 18-07-2013 by Janeth Kent
Who is immune to cyber-crime?
Every company is a target. No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…
Category : Security 15-07-2013 by Janeth Kent
Top 15 Free Hacking Tools for Ethical Hackers
Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…
Category : Security 19-06-2020 by Silvia Mazzetta
WordPress tips and tricks: how to custumize your theme
When you're in the process of writing a WordPress theme, there are a few behaviors you can change. Some of them are pretty basic, but they can really enhance the theme my making it go that extra mile. How to Customize The Login Page It’s quiet easy to customize the existing Login…
Category : Web design 10-07-2013 by Janeth Kent
Firefox OS: Start To Develop Your First App
Nearly two years ago, Mozilla announced "Boot to Gecko" (a.k.a. B2G), a project whose primary goal was to provide a standalone web-centric operating system in which the preferred (and in fact, only) platform for application development is the HTML5 stack. In essence, this operating system would have filled a gap…
Category : Programming 02-07-2013 by Janeth Kent
Mastering JavaScript: Top Resources to Propel Your Learning Journey
Learning JavaScript is a valuable decision if you're interested in coding and pursuing a career in the tech industry. JavaScript holds the top spot as the most popular programming language on GitHub and is widely used by professional developers, as indicated by the Stack Overflow Developer Survey. It's worth noting that…
Category : Javascript 23-06-2023 by Janeth Kent
318 useful twitter bootstrap resources #3
TWITTER BOOTSTRAP FOR FRAMEWORK INTEGRATIONS #2 Means and Methods of Integrating Bootstrap into your Application Framework or CMS PHP CODEIGNITER_FORM_BUILDER CodeIgniter library to build uniform form elements with bootstrap styling WRIGHT The Wright Framework is used to create Joomla Templates. The name is in honor of the famous architect, Frank Lloyd Wright, because the framework…
Category : Web design 24-06-2013 by Janeth Kent
The HTML5 Full-Screen API
The Fullscreen API allows a DOM element (and its descendants) to be represented in full screen. What it allows is to visualize the page by removing any element of the browser (menus, tabs,...). With this we can put from the document itself to full screen, video elements, images,... Fullscreen API methods The…
Category : Programming 03-05-2020 by Silvia Mazzetta
75 Free Fonts Websites
Webpage fonts are essential for creating an impact on the user's impression of a site. That is why, designers take extreme caution in choosing the right fonts for a website. So, choosing the right type of font to use on a website is more important then you may think. This post…
Category : Web design 20-06-2013 by Janeth Kent
A List of Best Free SQL Injection Scanners and Tools
We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…
Category : Databases 03-06-2013 by Janeth Kent
318 useful twitter bootstrap resources #2
Input BOOTSTRAP-WYSIHTML5-RAILS A stylish wysiwyg editor for Bootstrap. TIMEPICKER Select a time for a text input using your mouse or arrow keys. COMBOBOX FUEL UX Bootstrap style form element combining textfield and select controls. TIMEZONE FORM HELPERS A drop down of timezones from country code LANGUAGES FORM HELPER A drop down of languages or a…
Category : Web design 05-06-2013 by Janeth Kent
Mobile Malware Targets Android Phones: new Kaspersky Lab report
Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…
Category : Security 23-05-2013 by Janeth Kent