Hidden -

58 results for: hidden

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   22-10-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   19-09-2020   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

How to comply with Google's quality guidelines in 2020

Google provides a set of guidelines on what your website's content should look like in order to appear in search results. There are several categories within the Google guidelines: Webmaster Guidelines. General guidelines. Content-specific guidelines. Quality guidelines. In this article we will focus on the Quality guidelines. Quality guidelines, describe techniques whose use is prohibited and which,…

Category : Seo & sem   09-09-2020   by Silvia Mazzetta

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

The Javascript asign() method to merge and clone objects

In this article, we will be covering Object.assign()method in javascript in detail with examples. A javascript object is a collection of key-value pairs. Keys are also known as properties of object. Keys are unique but values may be duplicate. Example of a javascript object is let car = { brand: 'Hyundai', fuel: 'Petrol', model: 'i20' } Here, car…

Category : Javascript   11-08-2020   by Luigi Nori

How to integrate native images lazy loading in your web projects

Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility   is supported by…

Category : Programming   07-08-2020   by Luigi Nori

Why is Website Performance Important for Online Businesses?

Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…

Category : Web marketing   24-07-2020   by Janeth Kent

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

How to get notified when one of your WhatsApp contact is online

Privacy is one of the most important aspects among most users of the popular Facebook messaging application. So much so, that many settings have been included in WhatsApp itself to offer users the ability to display their profile picture, status, info, or the time they last connected to the application…

Category : News and events   15-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

Linux For Dummies: Permissions

In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…

Category : Operating systems   14-03-2020   by Alessio Mungelli

Facebook: how to remove hidden data and personal information

Facebook is a great social network that allows us to be always updated on all the news of our friends or family or even the most relevant news of the pages we follow. However, the Zuckerberg platform may have some personal information that you do not want to be disclosed…

Category : Social networks   20-04-2020   by Silvia Mazzetta

The best websites of the Tor Deep Web and Dark Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   26-10-2020   by Janeth Kent

Easy Face and hand tracking browser detection with TensorFlow.js AI and MediaPipe

In March the TensorFlow team has released two new packages: facemesh and handpose for tracking key landmarks on faces and hands respectively. This release has been a collaborative effort between the MediaPipe and TensorFlow.js teams within Google Research. The facemesh package finds facial boundaries and landmarks within an image, and handpose…

Category : Programming   09-04-2020   by Luigi Nori

5 ways to improve your user experience

As a brand, UX is incredibly important when it comes to keeping your customers happy and on your site. Afterall, the longer they are on your site, the more likely they are to spend, and the more likely you are to hit your targets and KPI’s. Also, the better the…

Category : Ui/ux design   09-04-2020   by Silvia Mazzetta

How to find everything you need on the Deep Web and the Dark Web

The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines we usually use. It will not appear in Google, Bing or Yahoo but these search engines will only show you results from the superficial part…

Category : Security   29-03-2020   by Silvia Mazzetta

Linux for Dummies: Ubuntu Terminal

I introduced in the previous article, available here, the basic concepts concerning the Linux world. Today we are going to have a look to some basic operations that we can perform using the terminal in an Ubuntu-like operating system. What is the command line? Shell, terminal and command line are words that commonly stand for a…

Category : Operating systems   27-02-2020   by Alessio Mungelli

Java Sorting Algorithm: Selection Sort

Today we are going to analyze a sorting algorithm that is not very efficient but often used in various fields. We are talking abou the Selection Sort. Let's have a look. Intuition The idea behind it is to divide the array to sort into two sub-arrays: the first that contains the sorted data…

Category : Java   22-12-2019   by Alessio Mungelli

How to disable the camera, microphone and all sensors on your phone with a single touch in Android 10

With Android 10, Google has improved the privacy of its operating system with new options, but has also hidden an interesting option that deactivates all the sensors of the device at once. This option prevents applications from accessing all of the device's sensors, including the cameras and microphone. The hidden option…

Category : Mobile   02-12-2019   by Silvia Mazzetta

CRUD Operations Using Vue.js: a basic example

In this tutorial, we show you how to create CRUD application using vue js. here is very basic and simple example of vue.js crud app. using this vuejs crud (create read update delete) you can easily implement with php mysql or also in laravel or codeigniter framework. So it is a…

Category : Javascript   23-05-2020   by Luigi Nori

Deep web: 5 curious facts you didn't know about

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents…

Category : Networking   05-08-2019   by Janeth Kent

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   17-09-2020   by Janeth Kent

Vue.js: a quick start guide for beginners. Part 3

Vue.js: a quick start guide for beginners. Part 3

Welcome here again! Last time we didn't listen to our very first user events and and methods to react to these events. Now we are going to explain directives and conditional rendering. if-else Regardless of the framework, one of the most important tools under any programmer's belt is conditional rendering. Depending on…

Category : Javascript   25-02-2019   by Janeth Kent

JavaScript: Variables & Scope. A Visual Guide.

JavaScript: Variables & Scope. A Visual Guide.

We often speak of discrepancies between var, let and const But more often than not, we still see developers struggling to fully grasp the idea of how everything works. That's because concepts are rarely visualized. Let's catch a glimpse. Not all scopes are identical. Do not memorize scope rules for each type of scope. Try…

Category : Javascript   13-05-2019   by Janeth Kent

Designers and Marie Kondo: a life lesson

Designers and Marie Kondo: a life lesson

A new phenomenon is sweeping the world, and it's fascinating. Who would have imagined that Europe's new obsession would be tidy up? The revolution is led by Marie Kondo. I'm going to admit that I wasn't thrilled when my best friend bought me The Life-Changing Magic of Tidying Up. I followed…

Category : Ui/ux design   13-02-2019   by Janeth Kent

How to build a basic PWA with HTML and Javascript

Looking at the web for a basic PWA online training exercise, everything I found was just too confused or required libraries/system/stage or another. If we need to learn another innovation, we would preferably not get derailed with redundant subtleties ... We have indeed composed a basic introductory exercise to draw from different…

Category : Javascript   10-04-2020   by Janeth Kent

Fullscreen Background Video HTML5 And CSS cross-browser

Full-screen Background Video is a way to present your website playing a video in the background without disturbing its content. It makes your website very modern and different. So, in this tutorial we will show you how to add fullscreen background video using only  HTML5 and CSS and make it…

Category : Web design   10-05-2020   by Silvia Mazzetta

How to make SVG images code responsive

How to make SVG images code responsive

For an image format that features infinite scalability, SVG can be a surprisingly difficult format to make responsive: vector images do not adjust themselves to the size of the viewport by default. Make A Responsive SVG Image As an image, you can make a SVG vector illustration scale with the page content…

Category : Web design   23-11-2017   by Janeth Kent

15 Awesome Plugins for Creating Sticky Elements

15 Awesome Plugins for Creating Sticky Elements

It is now common to use some fixed elements on a site when you scroll up or down. This allows for the element to be readily available regardless of the user’s position. They are called sticky element, an effect that can be achieved just by using CSS, however, using this method, the effect…

Category : Javascript   04-03-2017   by Janeth Kent

Guide to viewport units vw, vh, vmin and vmax

Guide to viewport units vw, vh, vmin and vmax

The viewport is the area where the browser renders the site. This is your screen minus the reserved space of the browser chrome. Sometimes you want to size an element based on that viewport, like a sidebar. This can be done using a unit we’re all familiar with: percentages. .sidebar {…

Category : Css   23-02-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by Janeth Kent

How to Create a .ONION Website and Domain With Tor Network

How to Create a .ONION Website and Domain With Tor Network

Not a lot of people know about .onion websites, not many people actually use it. .ONION websites are used by people who want to stay anonymous. In addition, .onion websites are the first layer of the Deep Web. Which is basically described in the picture bellow As many websites say, the…

Category : Networking   02-11-2014   by Janeth Kent

CSS: Image Hover Effects You Can Copy and Paste

CSS: Image Hover Effects You Can Copy and Paste

In the past, we’ve wrote about some awesome examples of CSS effects that were easy to copy and paste right into your code. Today, we’re going to follow that up with ten new effects specifically built for use with images. Each example comes with an HTML and CSS snippet. 1. Sneak Peek Before we…

Category : Css   09-04-2014   by Janeth Kent

Syncronize Files Between Servers With RSYNC

Syncronize Files Between Servers With RSYNC

Synchronize Files With rsync Synchronizing files from one server to another is quite awesome. You can use it for backups, for keeping web servers in sync, and much more. It's fast and it doesn't take up as much bandwidth as normal copying would. And the best thing is, it can be…

Category : Networking   03-02-2014   by Janeth Kent

25 HTML5 speed tips

25 HTML5 speed tips

Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…

Category : Web design   05-12-2013   by Janeth Kent

Hash Passwords With PHP 5.5

Hash Passwords With PHP 5.5

Every PHP developer would have to build an application that relies on a user login. It means that the user of the website having a Username and Password which is stored in the database so they can login into your website. Therefore it's important that passwords stored in the database should be hashed…

Category : Php   28-08-2013   by Janeth Kent

Top 23 Free Photoshop Plugins

Top 23 Free Photoshop Plugins

Looking a professional Photoshop extension for free? Today we will provide 23 free Photoshop plugins for graphic designers. These plugins suitable for web designers, graphic designers and photograpgers and the silled photographers have been acknowledged to bring these awesome free plugins into play as a base and after that tweak and…

Category : Software   22-08-2013   by Janeth Kent

Tricks for speeding up your Android device

Tricks for speeding up your Android device

When you hit the home button or launch a new app, it takes what seems like an eternity to switch to the new task or back to the desktop... Maybe your Android phone has become so slow that letters appear a second or two after you type them. These simple tips and…

Category : Operating systems   20-08-2013   by Janeth Kent

50 Most Useful jQuery Plugins of the year #1

50 Most Useful jQuery Plugins of the year #1

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Javascript   23-08-2013   by Janeth Kent

29 Awesome jQuery Responsive Navigation Menus

29 Awesome jQuery Responsive Navigation Menus

In this post we will show 29 beautiful and awesomel jQuery responsive navigation menus. All the menus are compatible with all modern browsers and mobile devices and are suitable for web projects, HTML5 & CSS3 website templates, landing pages, business and portfolio websites. So please follow our jQuery tag for more stuff about Jquery…

Category : Javascript   09-08-2013   by Janeth Kent

17 Useful Code Snippets for WordPress Developers

17 Useful Code Snippets for WordPress Developers

When coding WordPress themes, especially if you do it regularly, its really useful to have a selection of code snippets in your toolbox to just 'copy-n-paste' as and when the functionality needs. Not just your most commonly used code, but also some snippets that can, when required, extend WP even…

Category : Php   09-08-2013   by Janeth Kent

How to Retrieve Twitter Timeline and Hashtags in PHP

How to Retrieve Twitter Timeline and Hashtags in PHP

How to Retrieve Twitter Timeline and Hashtags in PHP (Twitter OAuth API 1.1) So, here we offer a guide that explains how to retrieve user timeline and hashtag with Twitter REST API 1.1. Before we start, we need: You need to create an application.https://dev.twitter.com/apps. Now, you need to get your consumer key, consumer secret,…

Category : Programming   12-07-2013   by Janeth Kent

Google Hacking Secrets: The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Category : Security   09-04-2020   by Janeth Kent

Facebook's top 10 social design secrets

Facebook's top 10 social design secrets

Designing, building and growing successful social products requires a solid understanding of social behaviour and a willingness to adopt and embrace a development process that’s different to what most people are familiar with. Here are 10 principles that should get you onto the right path. Social insights Designing great social experiences starts…

Category : Social networks   17-05-2013   by Janeth Kent

8 CSS Properties Designers Can't Live Without

8 CSS Properties Designers Can't Live Without

Imagine a world without CSS, where you have no real control over how anything looks or behaves in a browser. Imagine having to slice images using nested tables for your design. Some of us have been around long enough to remember when tables were a typical, perfectly acceptable way to…

Category : Web design   29-04-2013   by Janeth Kent

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by Janeth Kent

Top Ten Android Tips

Top Ten Android Tips

Welcome to the sometimes wild, often wonderful, but always fascinating world of Android!  Chances are the Android OS is a bit different than what you're used to, even if you are moving over from another smartphone platform.  We want to help you get settled in and familiar with your phone…

Category : Software   22-04-2013   by Janeth Kent

Top Resources For Bootstrap

Bootstrap is an interactive front-end web development framework, designed to facilitate the development of applications and other elements. The latest version of Bootstrap, Bootstrap 4, combines JavaScript, HTML and CSS allowing you to create an active, fast and efficient web page. The design of a responsive web page is one…

Category : Web design   17-05-2020   by Janeth Kent

Creating a Notepad app with indexedDB

Creating a Notepad app with indexedDB

indexedDB, which is new in HTML5, allows developers to persist data within the web browser. As a result your app runs both online and offline with powerful query facilities. indexedDB is different from traditional relational databases in that it is an objectStore instead of a collection of rows and columns. You just…

Category : Databases   14-04-2013   by Janeth Kent

The Best tools that may come in handy in your online life

The Best tools that may come in handy in your online life

In time, I’ve came across many tools which I found very good or at least interesting because they were covering things that the popular tools didn’t.  Some of the tools are for Web Analytics, some are for Social Media Monitoring, some are for website improvements and some are just for…

Category : Software   01-05-2020   by Janeth Kent

50 Useful jQuery Plugins

50 Useful jQuery Plugins

We have compiled a list of 50 awesome plugins: we have split all of the plugins into the following categories: Web Page Layout Plugins, Navigation Plugins, Form Plugins, Slider & Carousel Plugins, Chart & Graph Plugins, Image Effect Plugins, Video Plugins, and finally, everything else in-between. Web Page Layout Plugins equalize.js equalize.js is…

Category : Javascript   11-04-2013   by Janeth Kent

SEOStats Php class to get Seo Statistics

SEOStats Php class to get Seo Statistics

  SEOstats is a powerful open source PHP library to request a bunch of SEO relevant metrics such as detailed backlink analyses, keyword and traffic statistics, website trends, page authority, the Google Pagerank, the Alexa Trafficrank and much more. SEOstats offers over 50 different methods and gathers data from Google, Yahoo, Bing,…

Category : Programming   11-04-2013   by Janeth Kent

How to install and configure vsftpd FTP server in Ubuntu 12.10

How to install and configure vsftpd FTP server in Ubuntu 12.10

  This tutorial focuses on how to setup vsftpd server on your linux based VPS or a dedicated server. The vsftpd stands for “Very Secure FTP Daemon”. It is not just secure as the name suggests but also delivers excellent performance by consuming less memory. The tutorial also teaches you how…

Category : Networking   11-04-2013   by Janeth Kent