Hacker -

25 results for: hacker

Javascript overcomes Java as the most popular programming language of 2019

The competition between Java and Javascript (in terms of popularity, not in use) has been going on for years. But it seems that Javascript is gradually consolidating as the most popular programming language of recent years. Or at least 2018, as revealed by a survey of 71,000 developers carried out…

Category : Javascript   18-09-2019   by Silvia Mazzetta

Best Open-Source Javascript Date Picker Plugins and Libraries

For date pickers, selecting menus is a common choice as they are simple to set up. But I suppose our customers deserve better after centuries of using MM / DD / YY menus. For many companies, datepickers are vital. They can also be used for any defined purpose to monitor time. It…

Category : Javascript   26-06-2019   by admin admin

Progressive Web Apps Directory: The Best Collection of Resources

Get started with progressive web apps and learn things in depth, this page will list the best resources we know of to help you understand Progressive Web Apps (PWAs) . Make sure to bookmark this page, as this is a living document that we’ll be adding to from time to time.Progressive…

Category : Javascript   20-06-2019   by admin admin

Developing a JavaScript video game: Part 3

Developing a JavaScript video game: Part 3

Here we are! We're back with the third part of the article . If you missed it, read the first part or the second one. So, now you may be able to fire (static) rockets by pressing the spacebar. Let's see what the next steps would be. To make the fire rockets move,…

Category : Javascript   06-03-2019   by admin admin

Level Up Your JavaScript Skills: 12 basic notions

Level Up Your JavaScript Skills: 12 basic notions

If you are a developer at any level, understanding its basic concepts is crucial. This article highlights 12 basic concepts that are critical to understanding by any JS developer, but do not represent the full range of what a JS developer should know. 1. Value vs. Reference Variable Assignment To coding bug-free JavaScript,…

Category : Javascript   25-02-2019   by admin admin

Developing a JavaScript video game: Part 2

Developing a JavaScript video game: Part 2

This article is the second part of a Javascript game tutorial. Here you can read the first part Let's create the spaceship Now that the background is finished, we can start setting up our space vehicle! Let's create a Player.js file and add it as a script to index.html. In essence, we want this…

Category : Javascript   06-03-2019   by admin admin

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by admin admin

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by admin admin

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by admin admin

What is a DDOS attack and tools used

What is a DDOS attack and tools used

What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…

Category : Security   19-04-2016   by admin admin

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by admin admin

Google's 200 Most Important Ranking Factors

Google's 200 Most Important Ranking Factors

  Domain Factors   1. Domain Age: In this video, Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the…

Category : Web marketing   27-04-2014   by admin admin

Hash Passwords With PHP 5.5

Hash Passwords With PHP 5.5

Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…

Category : Php   28-08-2013   by admin admin

26 Essential WordPress plugins

26 Essential WordPress plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of 26 Essential WordPress plugins. Enjoy! 1. WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables…

Category : Web design   22-07-2013   by admin admin

Becoming a Web Professional: 19 online resources

Becoming a Web Professional: 19 online resources

The web education industry (designers, developers, graphics,seo,sem...) has exploded from a small niche to a powerful, continually expanding force. Countless people all over the planet are interested in learning about web design,web development, seo, sem, gamification, web marketing, and tons of companies are cropping up promising the ultimate solution. The good…

Category : News and events   18-07-2013   by admin admin

Who is immune to cyber-crime?

Who is immune to cyber-crime?

Every company is a target.  No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…

Category : Security   15-07-2013   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Top 15 Free Hacking Tools for Ethical Hackers

According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…

Category : Security   10-07-2013   by admin admin

10 most used PHP features

10 most used PHP features

We have compiled a selection of top 10 PHP native functions, classes and features. We know first-hand how invaluable these features are, so we hope you find them to be useful too. 1. PDO Class We use the PDO (PHP Data Object) exclusively for connecting to our MySQL databases. PDO provides a nice abstraction layer…

Category : Programming   22-05-2013   by admin admin

What is a growth hacker? The actual difference between growth hacking and marketing

What is a growth hacker? The actual difference between growth hacking and marketing

Definition: growth hacker (noun) - one who's passion and focus is pushing a metric through use of a testable and scalable methodology. “Growth hacker” is a new word for most but a long held practice among the best internet marketers and product managers in Silicon Valley. With mass media fading away and…

Category : Web marketing   22-05-2013   by admin admin

The biggest bank robbery in history!

The biggest bank robbery in history!

Reportedly, the group of hackers targeted weaknesses in how banks and payment processors handle prepaid debit cards. Authorities said they arrested these seven U.S. citizens and residents of Yonkers, New York: Jael Mejia Collado, Joan Luis Minier Lara, Evan Jose Peña, Jose Familia Reyes, Elvis Rafael Rodriguez, Emir Yasser Yeje and…

Category : News and events   10-05-2013   by admin admin

5 Simple Landing Page Optimization Tips

5 Simple Landing Page Optimization Tips

Eight seconds. That is all the time you have to capture a person’s attention, according to The Associated Press. Busy schedules and non-stop media barrage are quickly taking up your potential customers’ attention. You have just eight seconds to make a solid impression and get them to your next step.…

Category : Web design   10-05-2013   by admin admin

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…

Category : Security   29-04-2013   by admin admin

Useful Bookmarklets for your iPad and iPhone

Useful Bookmarklets for your iPad and iPhone

The Safari browser of your iOS device (iPad, iPhone, iPod Touch) doesn’t support extensions (or add-ons) but you can still add extra functionality to the mobile browser with the help of bookmarklets. Bookmarklets, if you are new, are like regular bookmarks but instead of opening new websites, bookmarklets are often used…

Category : Software   26-04-2013   by admin admin

The Best Experimental Chrome Features You Should Check Out

The Best Experimental Chrome Features You Should Check Out

Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…

Category : Software   24-04-2013   by admin admin

Setup VNC server for remote desktop management in Ubuntu 12.04

Setup VNC server for remote desktop management in Ubuntu 12.04

   VNC is a protocol that is used to share the desktop with other users/computers over the network/Internet.In order to share a desktop, VNC server must be install and configure on the computer and VNC client must be run on the computer that will access the shared desktop. When we install…

Category : Networking   24-04-2013   by admin admin