28 results for: hacker
5 popular Dark Web sites
People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…
Category : News and events 09-12-2019 by Silvia Mazzetta
The best Internet search engines used by hackers
Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…
Category : News and events 08-12-2019 by Silvia Mazzetta
How they can hack you while navigating
When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…
Category : Security 02-12-2019 by Silvia Mazzetta
Javascript overcomes Java as the most popular programming language of 2019
The competition between Java and Javascript (in terms of popularity, not in use) has been going on for years. But it seems that Javascript is gradually consolidating as the most popular programming language of recent years. Or at least 2018, as revealed by a survey of 71,000 developers carried out…
Category : Javascript 18-09-2019 by Silvia Mazzetta
Best Open-Source Javascript Date Picker Plugins and Libraries
For date pickers, selecting menus is a common choice as they are simple to set up. But I suppose our customers deserve better after centuries of using MM / DD / YY menus. For many companies, datepickers are vital. They can also be used for any defined purpose to monitor time. It…
Category : Javascript 26-06-2019 by admin admin
Progressive Web Apps Directory: The Best Collection of Resources
Get started with progressive web apps and learn things in depth, this page will list the best resources we know of to help you understand Progressive Web Apps (PWAs) . Make sure to bookmark this page, as this is a living document that we’ll be adding to from time to time.Progressive…
Category : Javascript 20-06-2019 by admin admin
Developing a JavaScript video game: Part 3
Here we are! We're back with the third part of the article . If you missed it, read the first part or the second one. So, now you may be able to fire (static) rockets by pressing the spacebar. Let's see what the next steps would be. To make the fire rockets move,…
Category : Javascript 06-03-2019 by admin admin
Level Up Your JavaScript Skills: 12 basic notions
If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…
Category : Javascript 25-02-2019 by admin admin
Developing a JavaScript video game: Part 2
This article is the second part of a Javascript game tutorial. Here you can read the first part Let's create the spaceship Now that the background is finished, we can start setting up our space vehicle! Let's create a Player.js file and add it as a script to index.html. In essence, we want this…
Category : Javascript 06-03-2019 by admin admin
Tips on How to Prevent Data Loss for Your Business
Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…
Category : Databases 21-06-2018 by admin admin
How to Become a Full Stack Developer in 2018
A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…
Category : Programming 22-03-2018 by admin admin
Ubuntu servers security: 25 security tools to armor your system
The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc. 1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…
Category : Servers 14-09-2016 by admin admin
What is a DDOS attack and tools used
What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…
Category : Security 19-04-2016 by admin admin
PHP: list of best awesome PHP libraries
It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…
Category : Php 27-04-2014 by admin admin
Google's 200 Most Important Ranking Factors
Domain Factors 1. Domain Age: In this video, Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the…
Category : Web marketing 27-04-2014 by admin admin
Hash Passwords With PHP 5.5
Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…
Category : Php 28-08-2013 by admin admin
26 Essential WordPress plugins
With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of 26 Essential WordPress plugins. Enjoy! 1. WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables…
Category : Web design 22-07-2013 by admin admin
Becoming a Web Professional: 19 online resources
The web education industry (designers, developers, graphics,seo,sem...) has exploded from a small niche to a powerful, continually expanding force. Countless people all over the planet are interested in learning about web design,web development, seo, sem, gamification, web marketing, and tons of companies are cropping up promising the ultimate solution. The good…
Category : News and events 18-07-2013 by admin admin
Who is immune to cyber-crime?
Every company is a target. No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…
Category : Security 15-07-2013 by admin admin
Top 15 Free Hacking Tools for Ethical Hackers
According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…
Category : Security 10-07-2013 by admin admin
10 most used PHP features
We have compiled a selection of top 10 PHP native functions, classes and features. We know first-hand how invaluable these features are, so we hope you find them to be useful too. 1. PDO Class We use the PDO (PHP Data Object) exclusively for connecting to our MySQL databases. PDO provides a nice abstraction layer…
Category : Programming 22-05-2013 by admin admin
What is a growth hacker? The actual difference between growth hacking and marketing
Definition: growth hacker (noun) - one who's passion and focus is pushing a metric through use of a testable and scalable methodology. “Growth hacker” is a new word for most but a long held practice among the best internet marketers and product managers in Silicon Valley. With mass media fading away and…
Category : Web marketing 22-05-2013 by admin admin
The biggest bank robbery in history!
Reportedly, the group of hackers targeted weaknesses in how banks and payment processors handle prepaid debit cards. Authorities said they arrested these seven U.S. citizens and residents of Yonkers, New York: Jael Mejia Collado, Joan Luis Minier Lara, Evan Jose Peña, Jose Familia Reyes, Elvis Rafael Rodriguez, Emir Yasser Yeje and…
Category : News and events 10-05-2013 by admin admin
5 Simple Landing Page Optimization Tips
Eight seconds. That is all the time you have to capture a person’s attention, according to The Associated Press. Busy schedules and non-stop media barrage are quickly taking up your potential customers’ attention. You have just eight seconds to make a solid impression and get them to your next step.…
Category : Web design 10-05-2013 by admin admin
8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good
It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…
Category : Security 29-04-2013 by admin admin
Useful Bookmarklets for your iPad and iPhone
The Safari browser of your iOS device (iPad, iPhone, iPod Touch) doesn’t support extensions (or add-ons) but you can still add extra functionality to the mobile browser with the help of bookmarklets. Bookmarklets, if you are new, are like regular bookmarks but instead of opening new websites, bookmarklets are often used…
Category : Software 26-04-2013 by admin admin
The Best Experimental Chrome Features You Should Check Out
Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…
Category : Software 24-04-2013 by admin admin
Setup VNC server for remote desktop management in Ubuntu 12.04
VNC is a protocol that is used to share the desktop with other users/computers over the network/Internet.In order to share a desktop, VNC server must be install and configure on the computer and VNC client must be run on the computer that will access the shared desktop. When we install…
Category : Networking 24-04-2013 by admin admin