36 results for: networking
Why E-Commerce Businesses Should be Using Cloud Computing
Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…
Category : Web marketing 01-06-2021 by Silvia Mazzetta
Network and port scanning with Zenmap
This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…
Category : Security 08-10-2020 by Iveta Karailievova
Browse safely and privately from your mobile phone using a VPN
Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…
Category : Security 25-08-2020 by Janeth Kent
How to configure Tor to browse the deep web safely
Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…
Category : Security 12-08-2020 by Silvia Mazzetta
A collection of interesting networks and technology aiming at re-decentralizing the Internet
The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…
Category : Networking 27-08-2020 by Janeth Kent
How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P
We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…
Category : Security 07-05-2020 by Janeth Kent
Online Marketing Strategies for your Ecommerce
The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…
Category : Web marketing 20-04-2023 by Silvia Mazzetta
The best websites of the Tor Deep Web and Dark Web Network
We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…
Category : Security 03-11-2022 by Janeth Kent
How to find everything you need on the Deep Web and the Dark Web
How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…
Category : Security 10-05-2021 by Silvia Mazzetta
10 Open source tools for security operations (SOC)
As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…
Category : Security 29-11-2019 by Janeth Kent
Why Becoming A Certified Scrum Master Can Launch Your Career
A development team in any organisation or in any industry would require a scrum master who can adapt the changes which occur in the company and would help the team reach its targeted goal. A Scrum master is the facilitator between the team and the top level management of the…
Category : Startups 20-06-2019 by Janeth Kent
A roadmap to becoming a web developer in 2019
There are plenty of tutorials online, which won't cost you a cent. If you are sufficiently self-driven and interested, you have no difficulty training yourself. The point to learn coding I think is to read a lot of code of other developers, then typing code and testing to see what…
Category : Programming 30-05-2019 by Janeth Kent
JavaScript Manual for Beginners
The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…
Category : Javascript 04-09-2018 by Janeth Kent
Best apps to boost your social media
Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…
Category : Social networks 24-11-2017 by Janeth Kent
Fetch API, an amazing replacement of XMLHttpRequest AJAX
When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…
Category : Programming 19-02-2017 by Janeth Kent
The Best Free SSH Tabbed Terminal Clients for Windows
PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…
Category : Networking 18-12-2023 by Janeth Kent
50 Most Useful jQuery Plugins of the year #5
With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…
Category : Web design 16-01-2014 by Janeth Kent
Visualize Your Data: 25 Javascript Visualization Libraries
You have a huge amount of data that you need to present to your website visitors in a clear and concise way. First of all, you have to organise that data so that it's understandable to everyone in some way, right? That's where graphics come in. In web design, graphs…
Category : Javascript 03-05-2021 by Silvia Mazzetta
Amplify Your Artistic Journey: Exploring the Best Social Networks for Artists and Designers
In today's digital age, social networks have become essential for artists and designers to showcase their work, connect with a wider audience, and collaborate with like-minded individuals. These platforms offer a plethora of opportunities to gain exposure, receive feedback, and even sell artwork. If you're an artist or designer looking…
Category : Social networks 09-06-2023 by Janeth Kent
Top 15 Free Hacking Tools for Ethical Hackers
Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…
Category : Security 19-06-2020 by Silvia Mazzetta
Useful list of commands for linux server management
List of checks that you can perform on a linux server to try and figure out why it keeps going down Disk Space: df -h (Make sure you have enough disk space) Memory: free -m (Check you're not out of memory) Processes / Load average top (shift + m) htop (Check for processes that are taking up a lot of…
Category : Networking 09-07-2013 by Janeth Kent
50 tools to reinvigorate your content marketing efforts
2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.” The current focus on social media advertising is pulling marketing attention…
Category : Web marketing 03-07-2013 by Janeth Kent
71 Social Media Monitoring Tools
If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools. In the first group are the most popular Social Media Monitoring…
Category : Social networks 27-06-2013 by Janeth Kent
Mastering JavaScript: Top Resources to Propel Your Learning Journey
Learning JavaScript is a valuable decision if you're interested in coding and pursuing a career in the tech industry. JavaScript holds the top spot as the most popular programming language on GitHub and is widely used by professional developers, as indicated by the Stack Overflow Developer Survey. It's worth noting that…
Category : Javascript 23-06-2023 by Janeth Kent
Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu
Introduction to UFW - Uncomplicated Firewall The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall. By default UFW is disabled. Gufw is a GUI that is available as a frontend. Basic Syntax and…
Category : Networking 27-05-2013 by Janeth Kent
Big Data and Hadoop: an explanation
Our world is a potential treasure trove for data scientists and analysts who can comb through massive amounts of data for new insights, research breakthroughs, undetected fraud or other yet-to-be-discovered purposes. But it also presents a problem for traditional relational databases and analytics tools, which were not built to handle…
Category : Databases 24-05-2013 by Janeth Kent
Attracting women to developer events
GirlDevelopIt SF is now 1,500 members strong, and all but a handful of them are women interested in learning to program, make websites, and generally become more technically literate. Because of my involvement in GDI and likely also because I'm a fairly visible "woman in tech", I often get approached with…
Category : Web marketing 11-05-2013 by Janeth Kent
Grid Computing Vs Cloud Computing
The world of information technology is changing rapidly and what may be the popular method of conducting business or gathering information today may be completely phased out in a few months. Grid computing and cloud computing are two powerful – but distinct – computing systems that attempt to accomplish many of the…
Category : Networking 07-12-2013 by Janeth Kent
Open Compute Project To Develop An Open Switch
In the realm of data centers and networking, the Open Compute Project (OCP) has emerged as a driving force for innovation and collaboration. Founded by Facebook in 2011, the OCP aims to accelerate the development and adoption of open hardware and data center designs. With its mission to make data center…
Category : Networking 29-05-2023 by Janeth Kent
Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users
One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…
Category : Security 09-05-2013 by Janeth Kent
Home networking explained: How to set up a home network
Computer networking allows you to browse the internet, stream music from one location to another and much more. Save yourself the pain of weak wireless signals, slow internet browsing and other problems through these useful tips. CNET editor Dong Ngo explains us the basics of home networking in 6 parts: Part 1:…
Category : Software 26-04-2013 by Janeth Kent
How to Get Started with your Freelance Branding
It is natural to be preparing so many things when you have just started doing something. When we speak of freelancing, there is also lots of preparation to do. Part of that is getting yourself ready to face the many challenges you may face in the freelance world. You also…
Category : Web marketing 02-10-2020 by Janeth Kent
WARNING: New Malware Threat in Twitter's Topics
Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…
Category : News and events 23-04-2013 by Janeth Kent
5 Steps to Build an Authority Website
Building a website that can be considered "authority" takes some time. However there are some factors that if implemented correctly can influence the time it takes your website to become an authority. These 5 main contributing factors are the same basic factors for building any website, but the approach is…
Category : Web marketing 11-04-2013 by Janeth Kent
50 Useful jQuery Plugins
We have compiled a list of 50 awesome plugins: we have split all of the plugins into the following categories: Web Page Layout Plugins, Navigation Plugins, Form Plugins, Slider & Carousel Plugins, Chart & Graph Plugins, Image Effect Plugins, Video Plugins, and finally, everything else in-between. Web Page Layout Plugins equalize.js equalize.js is…
Category : Javascript 11-04-2013 by Janeth Kent
Install and Setup SSL in Webmin and Apache
SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…
Category : Networking 11-04-2013 by Janeth Kent