Network - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

258 results for: network

Transitioning from a Home Office to a Virtual Office

The traditional concept of the office has undergone a substantial transformation in recent years. With advancements in technology and changes in work culture, more professionals are embracing remote work options, including the transition from home offices to virtual offices. While working from home has its advantages, such as flexibility and comfort,…

Category : Web marketing   08-03-2024   by Janeth Kent

Alternative tools for graphic design

There are many people today who only use the following for design purposes Canva as it is a really popular software and website and there is no denying that it has a great performance and a lot of content to work with. But depending on your needs, or in the long…

Category : Web design   06-07-2023   by Laura Celis Ballesta

How to make your life easier with ChatGPT?

We have already written several articles about the artificial intelligence that is revolutionising the world, but this time we will talk about how it can help you with everyday tasks and thus save you time and even increase your productivity or discover new things. I personally love to keep my life…

Category : Technology   03-07-2023   by Laura Celis Ballesta

Top tools for social media management

Today we know that having a presence on social media is becoming increasingly important if you want to boost your business and reach a wider audience. But first of all,   What is social media management? They are a set of actions and strategies used to promote your company, build customer loyalty and keep…

Category : Social networks   30-06-2023   by Laura Celis Ballesta

How to record TV programs using VLC

VLC is much more than a simple media player. Behind its simple appearance, there are a lot of features, such as the ability to convert videos to audio format, repair corrupt or damaged MP4 videos, or even stream content from other devices over the local Wi-Fi network. Another useful but little-known…

Category : Software   08-06-2023   by Janeth Kent

Top best AI Image Generators: unlocking creativity with Artificial Intelligence

Artificial intelligence (AI) is revolutionizing not just business and healthcare, but also the creative industries by introducing a new era of AI-generated art. The accessibility of AI technologies and tools has paved the way for a whole new generation of artists. Contrary to the common misconception that AI will replace human…

Category : Technology   05-06-2023   by Janeth Kent

The Payment Request API: Revolutionizing Online Payments (Part 1)

The Payment Request API has emerged as the new standard for online payments, transforming the way transactions are conducted on the internet. In this two-part series, we will delve into the intricacies of this powerful API and explore how it simplifies the payment experience for both users and merchants. Part 1:…

Category : Javascript   12-06-2023   by Silvia Mazzetta

Android Hidden Codes: unveiling custom dialer codes and their functionality

In the world of Android smartphones, there exist numerous hidden codes that can unlock a treasure trove of functionalities and features. These codes, known as custom dialer codes, provide access to various settings, diagnostics, and information that are not readily available through regular menus. In this article, we will explore…

Category : Mobile   02-06-2023   by Janeth Kent

How to download any video from any website

If you have ever seen a video that you really liked and you would have liked to have it on your computer, but you didn't know how, from now on you will know it, since we are going to see which are the tools that allow us to do this…

Category : Technology   16-05-2023   by Janeth Kent

The Impact of Social Media Engagement on SEO Maximising Results with Link Building Agency

Our daily lives now include social media, and businesses have realised its potential for engaging and interacting with the target audiences. Social media not only makes it easier to communicate with clients, but it also has substantial SEO (search engine optimisation) benefits. Businesses can increase their online visibility and rise…

Category : Social networks   16-05-2023   by Janeth Kent

Infinite scrolling with native JavaScript using the Fetch API

I have long wanted to talk about how infinite scroll functionality can be implemented in a list of items that might be on any Web page. Infinite scroll is a technique that allows the user to interact with the mouse by scrolling down to load new dynamic content. In this way, the…

Category : Javascript   15-05-2023   by Janeth Kent

How to recognise cyber-violence

Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…

Category : News and events   08-03-2024   by Janeth Kent

How artificial intelligence design the world

The image you see above was drawn especially for this article, but did not require any artistic skills or vein from its author. It was created by DALL-E, an artificial intelligence that can be asked to draw anything. To visually illustrate the point, the author of this article's lack of…

Category : Technology   17-05-2023   by Janeth Kent

The first videogame tournaments: the origin of eSports

The first video videogame tournaments: the origin of "eSports". Electronic sports or "eSports" are video game competitions that have been increasing in popularity over the years, being a lucrative sector that currently moves hundreds of millions of euros. Its origins date back to the first video game tournaments in history, which were…

Category : Videogames   19-10-2022   by Janeth Kent

8 benefits of having a website for your business

At this moment, the Internet is a phenomenon that is sweeping the world. It has been able to interconnect millions of users all over the planet. People have made the Internet an indispensable part of their lives. If they want to find out where to eat, they look on their…

Category : Web marketing   03-06-2022   by Nadal Vicens

How to create a .onion domain for your website

The dark web, a hidden network accessed through the Tor browser, offers enhanced privacy and anonymity for websites. To establish a presence on the dark web, you can create a .onion domain for your website. A .onion domain is an address that can only be accessed through the Tor network.…

Category : Networking   06-06-2023   by Janeth Kent

How to Start a Web Design Agency in 2022

If the last two years have shown us anything, it’s that a good online presence is paramount to success in the modern world of business. Once they have a robust web-based reputation in place, companies have the capacity to disrupt their sectors in an engaging, intuitive, and ultimately profitable fashion.…

Category : Web marketing   25-01-2022   by Janeth Kent

Node.js and npm: introductory tutorial

In this tutorial we will see how to install and use both Node.js and the npm package manager. In addition, we will also create a small sample application. If you have ever used or thought about using a JavaScript-based development tool, you have probably noticed that you need to install…

Category : Javascript   05-11-2021   by Silvia Mazzetta

Secret iPhone codes to unlock hidden features

We love that our devices have hidden features. It's fun to learn something new about the technology we use every day, to discover those little features that aren't advertised by the manufacturer. And unless you spend a lot of time playing around in the Phone app, you probably don't know, until…

Category : Security   22-10-2021   by Silvia Mazzetta

What is a Full Stack Developer?

The demand for the Full Stack Developer is growing exponentially in recent years. Disruptive technology companies and startups are increasingly requesting this type of multipurpose profile that knows multiple programming languages and can assume all kinds of functions within the company. Throughout this article we will tell you what a full stack…

Category : News and events   06-08-2021   by Janeth Kent

Why E-Commerce Businesses Should be Using Cloud Computing

Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…

Category : Web marketing   01-06-2021   by Silvia Mazzetta

The ultimate cybersecurity checklist for programmers

In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…

Category : Security   02-06-2023   by Silvia Mazzetta

Advanced Android tutorial: discover all your phone's secrets

It is highly probable that you are not taking advantage of even half of the potential that your Android device has to offer. These small pocket computers, which we call smartphones, have increasingly advanced and powerful hardware that, together with the possibilities offered by an operating system as flexible as…

Category : Mobile   06-05-2021   by Janeth Kent

How to Send Email from an HTML Contact Form

In today’s article we will write about how to make a working form that upon hitting that submit button will be functional and send the email (to you as a web creator and to the user or customer as well). If you’re a PHP developer, there's a high probability that you…

Category : Programming   10-05-2021   by

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How to set up your Android phone: learn how to get your new phone up and running

If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…

Category : Mobile   28-04-2021   by Janeth Kent

How To Use Varnish As A Highly Available Load Balancer On Ubuntu 20.04 With SSL

Load balancing with high availability can be tough to set up. Fortunately, Varnish HTTP Cache server provides a dead simple highly available load balancer that will also work as a caching server. The modern use of SSL/TLS for all traffic has made this a little harder as Vanish has to handle…

Category : Servers   25-04-2021   by Janeth Kent

The best free tools to Transcribe audio to text

With this article we bring you a list of the best tools for transcribing audio to text, offering you some that simply do it with dictated audio, but also others capable of loading audio files. The collection is varied, and we have mobile applications, web pages, and computer programs capable…

Category : Software   15-04-2021   by Janeth Kent

6 Best Alternative Privacy Focused Browsers in 2021

In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…

Category : Software   22-04-2021   by

How to hide the you are typing text in a WhatsApp group

With WhatsApp groups there is usually no middle ground: either you like them or you hate them from the first moment you are put -sometimes 'dragged' reflects better- into one. And with the current pandemic situation we live in, groups have exploded in use in the work and family environment. Does…

Category : Social networks   25-03-2021   by Janeth Kent

We Will Soon Be Able To Use Bitcoins With Traditional Visa and Mastercard Cards

Bitcoin is breaking records, surpassing $60,000 and being presented in the media as a revolution in many ways. Industry giants cannot continue to ignore the trend, and now VISA has spoken out. The CEO of VISA commented in Fortune's Leadership Next podcast that they are working to make it possible to…

Category : Technology   22-03-2021   by Janeth Kent

Graphic design and its impact on Web Development

In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not, it can aid in selling a product or idea, it's applied company identity as logos, colors, typography of the company…

Category : Web design   05-04-2021   by

Deepfakes Detection – An Emerging Technological Challenge

It is highly probable that while browsing the Internet, everyone of us has at some point stumbled upon a deepfake video. Deepfakes usually depict well-known people doing really improbable things – like the queen of England dancing on her table or Ron Swanson from Parks and Recreations starring as every…

Category : Technology   27-01-2021   by Iveta Karailievova

Top Whatsapp alternatives in 2021

From the communication platform WhatsApp leaves more and more users for different reasons. If you're one of them, there are a lot of possibilities on how to replace it with something better. We will show you what are the 5 free alternatives to WhatsApp to have a text or audio-video conversation…

Category : Software   26-01-2021   by

Cumulative Layout Shift, what is and How to optimize CLS

Cumulative Layout Shift, one of the new Core Web Vitals metrics,  is the first metric that focuses on user experience beyond performance. Unexpected movement of web page content is a major source of irritation for users on the web. The new cumulative design change metric helps developers understand the impact of…

Category : Seo & sem   14-01-2021   by Luigi Nori

Understanding LCP, CLS, FID. All about Core Web Vitals in Google Search Console

A few months ago we talked about certain Google metrics that were displayed in Search Console. The reason for writing another post on this topic is that Google has changed this again, giving priority to other metrics. Interestingly, we thought in that previous study that the FCP and FID were not…

Category : Seo & sem   14-01-2021   by Laura Celis Ballesta

7 Astonishing New Uses of Machine Learning

Recently a strange video published on YouTube caused a controversy – it was a funny take on Queen Elizabeth’s traditional Christmas message created by Channel 4, a British public-service television broadcaster. They used AI to produce a fake video of the Queen making it look very realistic and if the message itself…

Category : Technology   31-12-2020   by Iveta Karailievova

What is DNS Blockchain and how to use it

To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…

Category : Security   28-12-2020   by Janeth Kent

A FULFILLED PROMISE - Using the FETCH API to make AJAX calls

In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…

Category : Javascript   26-12-2020   by Iveta Karailievova

How to get paid in Bitcoin: CoinBase, CoinGate

After explaining how bitcoins work and how to pay using this cryptocurrency, we will see how to get paid in bitcoin. Below you will find explained in detail how to do it. Many people find the concept of BitCoin virtual currency confusing. We could simply explain that BitCoin is a peer-to-peer financial…

Category : Technology   23-12-2020   by Silvia Mazzetta

Dark Web: the creepy side of the Internet is not as dark as believed

People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use websites that are freely accessible. It is almost impossible not to leave traces on the Internet and therefore reveal a lot…

Category : Security   17-05-2023   by Silvia Mazzetta

Some Neat Ways to Improve Your Internet Browsing Experience?

Not everyone has the best time when they are surfing the net. There are multiple reasons why an internet browser struggles, but that does not mean the situation is out of your hands. Relying on the internet is inevitable these days. We use it for work, entertainment, and socializing with friends…

Category : News and events   21-12-2020   by Janeth Kent

How to pay in Bitcoin: Hype and Coinbase

Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…

Category : Technology   10-12-2020   by Silvia Mazzetta

Install MacOS on PC - the Ultimate Guide (Hackintosh)

There has always been a belief that the Apple MacOS Operating System could only be installed on computers sold directly by Apple. But on the Internet there is a large community dedicated to Hackintosh. And in this guide we are going to show you today all you need to know…

Category : Operating systems   10-12-2020   by

How to Use Bitcoin: mining, wallets, payments

You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…

Category : Technology   10-12-2020   by Silvia Mazzetta

Security of Internet providers: can we trust it?

This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the security of Internet operators becomes more important. The question is whether the ISP's security is good enough to be the only…

Category : Security   29-05-2023   by Janeth Kent

Google everywhere: anatomy of a massive giant

The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…

Category : Technology   03-12-2020   by Silvia Mazzetta

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…

Category : Security   17-11-2020   by Iveta Karailievova

Why You Should Hire Node.js Developer for Your Backend Development

When developers are building a new website, they mainly focus on both frontend and backend development. The frontend code helps create the interfaces through which the app interacts with the users while the back-end code interacts with the server to deliver data or content that is displayed to the website…

Category : Javascript   27-10-2020   by Luigi Nori

GAN Generated Images

Let’s play a game - can you guess what these portraits have in common?  They all depict non-existent people. All these images were created by artificial intelligence. We could say, that AI “dreamed” those people up.  How can a machine make up people’s faces? The genius idea came from Ian Goodfellow, who was…

Category : Technology   28-10-2020   by Iveta Karailievova

How to prevent your neighbor from hacking your Chromecast

Google Chromecast was born as a device to add Smart TV features to those that were not yet Smart TV, and with WiFi connectivity as one of the key features according to this approach. Now it has evolved and is more complete, and serves equally well on Smart TVs, but…

Category : Networking   26-10-2020   by Luigi Nori

MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows

Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long hours spent in front of a console, such as the NES or SNES, and even in arcades playing arcade machines.…

Category : Software   14-10-2020   by Luigi Nori

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…

Category : Security   08-10-2020   by Iveta Karailievova

How to Unlock Secret Games in Chrome, Edge and Firefox

Your web browser is full of secrets. I usually spend a lot of time studying new features that I can unlock through pages like chrome://flags and about:config in the browser, but sometimes it's also fair and necessary to take a break and play the games that popular browsers hide. Yes, your…

Category : Videogames   07-10-2020   by Silvia Mazzetta

SEO in Google News: How to appear in Google News

Google News is a tool, from Google, that spreads current, reliable and truthful content from different websites or portals dedicated exclusively to news. The sites that appear in Google News have a great opportunity to increase traffic to your website and consequently the opportunity to increase your sales through it. If you…

Category : Seo & sem   26-06-2023   by Luigi Nori

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…

Category : Security   28-09-2020   by Silvia Mazzetta

Jennifer in Paradise: story of the first photo ever edited in Photoshop

A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…

Category : News and events   25-09-2020   by Silvia Mazzetta

Data Scraping and Data Crawling, what are they for?

Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…

Category : Web marketing   25-09-2020   by Silvia Mazzetta

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser It is also possible to increase the security level of the…

Category : Security   08-03-2024   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   08-03-2024   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through standard commercial channels, while others are sold through direct distributors and cash payment. We list some of them here, with the…

Category : Security   15-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

How are businesses using artificial intelligence?

The term Artificial Intelligence (AI), "the intelligence of the machines", unifies two words that, a priori, could not be associated, since the term intelligence is attributed to the faculty of the mind to learn, to understand, to reason, to take decisions and to form a determined idea of the reality. How…

Category : News and events   21-06-2023   by Silvia Mazzetta

How to setup an Android TV with androidtv.com/setup or the Google application

Android TVs and players are a good investment if you want to have all the entertainment at your fingertips. However, they require an installation that, although simple, has several ways to run. We show you how to set up your Android TV without complications and in less than five minutes. Android…

Category : Operating systems   26-10-2020   by Janeth Kent

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server

Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol is fully suitable for production usage. But, what is Matrix? Matrix is an open standard for real-time, interoperable and decentralized communication over…

Category : Networking   25-08-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

Small and medium enterprises can now earn money by holding online events on Facebook

Facebook has launched a new feature that allows small and medium enterprises, large companies, content creators, educators, media... to earn money by holding online events on the social network. Corporate Page owners can now create an online event, set its price, promote it, charge it and organize it from Facebook…

Category : Web marketing   19-08-2020   by Luigi Nori

Get ready for the future: What Does The Future Of SEO Look Like?

How will SEO change in 2030? There are various positions and assumptions that we can make about this so that you can think about the strategies to take when the future catches up with us. Anyone who works in SEO knows the great challenge of positioning a site on the web…

Category : Seo   19-08-2020   by Silvia Mazzetta

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

How to integrate native images lazy loading in your web projects

Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility   is supported…

Category : Programming   03-04-2023   by Luigi Nori

What is the origin of the word SPAM?

It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in our emails, social networks, or mobiles already existed long before our existence. Have you ever wondered what the origin of the…

Category : Web marketing   03-08-2020   by Janeth Kent

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by

Why is Website Performance Important for Online Businesses?

Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…

Category : Web marketing   24-07-2020   by Janeth Kent

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by Janeth Kent

Bank phishing by email: best way to prevent it

No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

WSL2 is released to run Linux distributions on Windows

If you are reading about this for the first time, the Windows Subsystem for Linux is a kind of virtual machine that allows you to run the Linux terminal on the Microsoft system (Windows). From this terminal we can use tools as long as the necessary packages are installed. Now with…

Category : Servers   07-07-2020   by Janeth Kent

Facebook, three questions to recognize fake news (and not share it)

Where's it coming from? What's missing? How do you feel? These are the three questions that Facebook recommends to all users to ask themselves before sharing news. The initiative is part of the fight against fake news undertaken by Mark Zuckerberg's popular social network which - during the pandemic -…

Category : Social networks   02-07-2020   by Janeth Kent

Awesome JavaScript Games and Js Software to create Games

Best sites js13kGames 2019 - Highlights from the js13kGames 2019 competition. js13kGames 2018 - 13 Games in ≤ 13kB of JavaScript. js13kGames 2017 - Build a game in 13kB or less with js13kGames. Adventure Triangle: Back To Home - You are lost in the cave. Try to get out and back to home. Sometimes it…

Category : Javascript   30-06-2020   by Janeth Kent

Is JavaScript good for machine learning?

One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…

Category : Javascript   16-06-2020   by Silvia Mazzetta

What is Machine Learning ?

Artificial Intelligence or AI is a trend in technology and has been the main topic of many philosophical debates as to where this field will lead us as humanity. This time I'm going to focus on a subfield of Artificial Intelligence that is Machine Learning, which I am currently very passionate…

Category : Technology   16-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

Why do you vote the way you do in the age of misinformation and fake news?

In this context of the electoral campaign in which we are immersed, the 'political hoaxes' are becoming more relevant and it is expected that attacks to destabilize the parties and candidates in order to influence the electorate will increase. As recent examples, let's remember that disinformation campaigns influenced Trump to win…

Category : News and events   11-06-2020   by Silvia Mazzetta

What is Cyber Intelligence and how is it used?

What is Cyber-intelligence and what is it used for? This is a question that is usually asked by security, cyber-security and intelligence professionals. Cyber-intelligence is a hybrid concept between these three worlds and professional fields, and therefore it is an opportunity and a necessity to know what it is and what…

Category : Security   11-06-2020   by Silvia Mazzetta

How to Take Your Small Ecommerce Business to the Next Level

Running an ecommerce business can be both exciting and financially rewarding. However, as you increase your customer base, it might seem difficult to successfully scale your operations. If your site is growing in popularity, or you want to attract more customers to your online venture, read the below top tips on…

Category : Web marketing   25-01-2022   by Janeth Kent

Onion Search Engine: How to browse the Deep Web without Tor

The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…

Category : Security   25-05-2020   by Janeth Kent

Step by Step Guide to Successful Social Media Marketing

The most popular social media platforms boast of having hundreds of millions of active users every month. The number itself is more than enough to attract brands in trying to establish themselves as niche authorities on as many different social media websites as they can.   If you are still relatively new…

Category : Web marketing   16-05-2023   by Silvia Mazzetta

How to turn your smartphone into a webcam for your pc

With the propagation of Covid-19 we all had to adapt to a new quarantine situation at home, and since the human being needs to communicate constantly, we used the internet channel to make group calls, be it between friends or business meetings. This has led to a rapid expansion of online…

Category : Multimedia   17-05-2020   by Luigi Nori

How to enable Chrome's new feature that blocks ads that consume your CPU, battery, and Internet connection

Google has announced that it will begin experimenting with a technology that they have been developing for months, in order to improve the battery consumption of our computers and the speed of the pages we visit. In a blog post, the company announced that it plans to integrate it into Google…

Category : News and events   17-05-2020   by Silvia Mazzetta

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   20-04-2023   by Silvia Mazzetta

How to Install Node.js and NPM on Ubuntu 18.04

Node.js is a JavaScript platform for general programming that allows users to create network applications quickly. By leveraging JavaScript in both frontend and backend, Node.js makes development more uniform and integrated. Node.js is a JavaScript runtime built on Chrome's V8 JavaScript engine. runtime for easily building fast, scalable network applications. In this…

Category : Development   24-04-2020   by Luigi Nori

Facebook: how to remove hidden data and personal information

Facebook is a great social network that allows us to be always updated on all the news of our friends or family or even the most relevant news of the pages we follow. However, the Zuckerberg platform may have some personal information that you do not want to be disclosed…

Category : Social networks   20-04-2020   by Silvia Mazzetta

q=network Clicky