Monitoring - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

43 results for: monitoring

The Importance of Maintaining a Crisis-Ready Social Media Strategy: A Closer Look

Social media has revolutionized the way businesses connect with their audiences, allowing for instant communication and unprecedented reach. However, with great power comes great responsibility. As social media platforms continue to evolve, businesses must recognize the importance of being prepared for potential crises that may arise. In today's interconnected world,…

Category : Social networks   01-06-2023   by Janeth Kent

How to fix excessive MySQL CPU usage

What happens if we realise that a series of databases that we thought were optimised through the use of indexes, have begun to consume CPU usage time of a server to unsuspected limits? Even users have stopped being able to access the server when it had a certain number of visits…

Category : Development   21-12-2022   by Janeth Kent

How to recognise cyber-violence

Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…

Category : News and events   08-03-2024   by Janeth Kent

How to create a .onion domain for your website

The dark web, a hidden network accessed through the Tor browser, offers enhanced privacy and anonymity for websites. To establish a presence on the dark web, you can create a .onion domain for your website. A .onion domain is an address that can only be accessed through the Tor network.…

Category : Networking   06-06-2023   by Janeth Kent

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

Cumulative Layout Shift, what is and How to optimize CLS

Cumulative Layout Shift, one of the new Core Web Vitals metrics,  is the first metric that focuses on user experience beyond performance. Unexpected movement of web page content is a major source of irritation for users on the web. The new cumulative design change metric helps developers understand the impact of…

Category : Seo & sem   14-01-2021   by Luigi Nori

Dark Web: the creepy side of the Internet is not as dark as believed

People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use websites that are freely accessible. It is almost impossible not to leave traces on the Internet and therefore reveal a lot…

Category : Security   17-05-2023   by Silvia Mazzetta

Google everywhere: anatomy of a massive giant

The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…

Category : Technology   03-12-2020   by Silvia Mazzetta

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Is JavaScript good for machine learning?

One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…

Category : Javascript   16-06-2020   by Silvia Mazzetta

SEO Mistakes that Need to Be Avoided

In today's digital age, search engine optimization (SEO) plays a critical role in determining the success of any online business. However, implementing SEO strategies can be complex, and mistakes are common. To ensure your website achieves optimal performance and ranks well on search engine result pages (SERPs), it is essential…

Category : Seo & sem   15-06-2023   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

Coronavirus: Citizen Science projects to help research from home

The term "citizen science" is used to define the involvement and active and conscious participation of people of different ages, education and social backgrounds in scientific research activities: students, simple enthusiasts, retired people and amateur scientists, not included in academic structures. In other words, everyone is invited to contribute. No specific…

Category : News and events   02-04-2020   by Silvia Mazzetta

5 Fool-Proof Ideas For Location-Based Apps

Like it or not, geolocation is a part of our everyday lives. In fact, you’ll find the technology pre-installed on 90% of the apps currently living on your smartphone. Location-based apps are here to stay, which makes them a lucrative option for mobile app developers looking to take advantage of…

Category : Software   01-04-2020   by Luigi Nori

How to Stay Safe When Shopping Online

It can seem that not a day goes by when we don’t hear of some new hacking case or people who have had their sensitive date compromised via the internet. It’s true that cybercriminals are always coming up with new strategies to attempt to steal either money or information, but…

Category : News and events   08-01-2020   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   06-11-2022   by Janeth Kent

How  to Make the Most of Technology in Your Business

How to Make the Most of Technology in Your Business

If you’ve decided not to make use of the available technology in your business, you’ll soon find yourself falling behind the competition. More and more businesses are using technology to serve their customers better and extend their abilities. As well as understanding the importance of technology in business it’s also…

Category : Technology   16-04-2019   by Janeth Kent

Top Social Media Marketing Tools in 2019

Top Social Media Marketing Tools in 2019

Social media marketing is a baffling area.  The social media has revolutionized and completely changed the way we send and receive information. It is more interactive, can be done in real time and uses a wide number of media like text, audio, video, pictures, graphics and more.  Tools such as…

Category : Social networks   08-10-2019   by Janeth Kent

Best Javascript front-end hacking cheatsheets

Best Javascript front-end hacking cheatsheets

JavaScript has a extremely high potential to build cutting-edge web applications. But it's really hard to memorize it by heart. The JavaScript cheat sheets therefore act perfectly as a reminder and a comprehensive reference for developers. All popular and special purpose cheat sheets have been discussed above. You now have…

Category : Javascript   06-05-2020   by Janeth Kent

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

Useful Terminal Commands Every Web Developer Should Know About

Useful Terminal Commands Every Web Developer Should Know About

The command line interface (CLI), or Terminal is considered by many to be the Holy Grail of computer management. At one time the CLI was the only way to accomplish anything on a computer; then, the CLI gave way to the graphical user interface (GUI) as the popularity of PCs…

Category : Operating systems   22-06-2018   by Janeth Kent

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by Janeth Kent

ArangoDB, install and configure the popular Database in ubuntu 16.04

ArangoDB, install and configure the popular Database in ubuntu 16.04

Introduction to ArangoDb, open source, NoSQL, multi-model database BigData seems to be getting stronger every day and more and more NoSQL databases are coming out to the market, all trying to position themselves in the lead to be the reference. This week I tried ArangoDB! Another NoSQL database? Today I'm going to…

Category : Databases   14-11-2017   by Janeth Kent

Top 8 Free Online Social Media Marketing Tools For Startups

If you have just launched a new startup one of the things that should be top of your agenda is creating an effective social media strategy. No sane business owner can afford to ignore social media in this day and age. People go to social media sites to socialize. It's like…

Category : Web marketing   08-11-2022   by Janeth Kent

Install Shotcut Video Editor in Ubuntu 16.04, 16.10

Install Shotcut Video Editor in Ubuntu 16.04, 16.10

The Shotcut video editor software has reached the 16.11 release, here’s quick tip for how to install it in Ubuntu 16.04, Ubuntu 16.10. Shotcut is a free, open source, and cross-platform video editor for Windows, Mac and Linux. Major features include support for a wide range of formats, no import required…

Category : Multimedia   25-02-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

8 Social Tools to interact with Customers and improve CX

8 Social Tools to interact with Customers and improve CX

Customer experience is measured by the individual’s experience during all points of contact against the individual’s expectations. Over the past century, countless inventions and advancements have inadvertently raised the bar of customer experience. Communication mediums have improved, resulting in elevated expectations of more hands-on, faster, and localized customer service.  Customers now have…

Category : Social networks   22-07-2016   by Janeth Kent

Display Linux TCP / UDP Network and Socket Information with the 'ss' command

The ss command is used to show socket statistics. It can display stats for PACKET sockets, TCP sockets, UDP sockets, DCCP sockets, RAW sockets, Unix domain sockets, and more. It allows showing information similar to netstat command. It can display more TCP and state information than other tools. It is…

Category : Networking   23-05-2020   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

8 Social Media Monitoring Tools 

8 Social Media Monitoring Tools 

We think that a combination of quick response, easy use and functionality is what a company need in order to effectively run a social media campaigns. There are many tools that let you manage multiple accounts, respond quickly and stay on top of real-time information.  We evaluate 8 of the best free tools for social media monitoring,…

Category : Social networks   22-10-2015   by Janeth Kent

10 Server and network monitoring tools

10 Server and network monitoring tools

When you have a website or a network, it’s helpful to be aware of any issues as soon as they occur. There are open source and freeware server/network monitoring tools that will supervise your infrastructure for any issues that may arise. These tools are meant to aid you in avoiding…

Category : Networking   04-02-2014   by Janeth Kent

Build a realtime jQuery plugin

Build a realtime jQuery plugin

Realtime web technologies make it really easy to add live content to previously static web pages. Live content can bring a page alive, retain users and remove the need for them to refresh the page periodically. Realtime updates are generally achieved by connecting to a source of data, subscribing to the…

Category : Javascript   27-08-2013   by Janeth Kent

A Collection of Essential WordPress Plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…

Category : Web design   21-08-2020   by Janeth Kent

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by Janeth Kent

20 Open Source Scripts Applications for Web Developers

20 Open Source Scripts Applications for Web Developers

Open source applications and tools can be handy for web designers and developers on a budget. Nowadays most of the tools and applications are increasingly either employing open source or are built entirely on it. And all of this adds up to an increasing premium on web development skills and…

Category : Programming   11-08-2016   by Janeth Kent

50 Top Tools for Social Media Monitoring, Analytics, and Management

50 Top Tools for Social Media Monitoring, Analytics, and Management

To start a business that will succeed in today's connected world, we need to build a community around our company, brand, and products. It can be noticed how, the last decade, social media monitoring has become a primary form of business intelligence, used to identify, predict, and respond to consumer behavior. Listening to what our…

Category : Social networks   15-05-2013   by Janeth Kent

Open Source Cloud Is Failing To Gain Traction: Survey

Open Source Cloud Is Failing To Gain Traction: Survey

  Open source cloud infrastructures are not capturing the imagination of cloud implementers, if research from Opsview is to be believed. When asked to identify their existing cloud service providers, 56 percent of respondents chose Amazon Web Services (AWS), while only 19 percent selected Rackspace. Over half (52%) of the 420 respondents indicated that their preferred…

Category : Web marketing   09-05-2013   by Janeth Kent

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by Janeth Kent

10 Killer SEO Landing Page Tips

10 Killer SEO Landing Page Tips

When we talk landing pages, most online marketers think pay-per-click, where the input of a destination URL into Google's or Bing's paid search offerings allow marketers to drive keyword-targeted traffic to (hopefully) optimized pages. My previous article extolling the death of keywords talked about developing intent-based topics and building content that connects with…

Category : Web marketing   15-04-2013   by Janeth Kent

The Best tools that may come in handy in your online life

The Best tools that may come in handy in your online life

In time, I’ve came across many tools which I found very good or at least interesting because they were covering things that the popular tools didn’t.  Some of the tools are for Web Analytics, some are for Social Media Monitoring, some are for website improvements and some are just for…

Category : Software   01-05-2020   by Janeth Kent

5 tools for better PHP

5 tools for better PHP

When we work on our applications, whatever our language of choice, sometimes we can focus too much on the code itself. A really good development lifecycle is about so much more than the code, it brings in a selection of supporting tools to ensure quality and reliability of the application,…

Category : Programming   11-04-2013   by Janeth Kent

q=monitoring Clicky