Networking -

23 results for: networking

Why Becoming A Certified Scrum Master Can Launch Your Career

A development team in any organisation or in any industry would require a scrum master who can adapt the changes which occur in the company and would help the team reach its targeted goal. A Scrum master is the facilitator between the team and the top level management of the…

Category : Startups   20-06-2019   by admin admin

A roadmap to becoming a web developer in 2019

There are plenty of tutorials online, which won't cost you a cent. If you are sufficiently self-driven and interested, you have no difficulty training yourself. The point to learn coding I think is to read a lot of code of other developers, then typing code and testing to see what…

Category : Programming   30-05-2019   by admin admin

JavaScript Manual for Beginners

JavaScript Manual for Beginners

The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I   GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…

Category : Javascript   04-09-2018   by admin admin

Best apps to boost your social media

Best apps to boost your social media

Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…

Category : Social networks   24-11-2017   by admin admin

Fetch API, an amazing replacement of XMLHttpRequest AJAX

Fetch API, an amazing replacement of XMLHttpRequest AJAX

When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…

Category : Programming   19-02-2017   by admin admin

The Best Free SSH Tabbed Terminal Clients for Windows

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   13-02-2019   by admin admin

50 Most Useful jQuery Plugins of the year #5

50 Most Useful jQuery Plugins of the year #5

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Web design   16-01-2014   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Top 15 Free Hacking Tools for Ethical Hackers

According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…

Category : Security   10-07-2013   by admin admin

Useful list of commands for linux server management

Useful list of commands for linux server management

List of checks that you can perform on a linux server to try and figure out why it keeps going down Disk Space: df -h (Make sure you have enough disk space) Memory: free -m (Check you're not out of memory) Processes / Load average top (shift + m) htop (Check for processes that are taking up a lot of…

Category : Networking   09-07-2013   by admin admin

50 tools to reinvigorate your content marketing efforts

50 tools to reinvigorate your content marketing efforts

2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.”  The current focus on social media advertising is pulling marketing attention…

Category : Web marketing   03-07-2013   by admin admin

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by admin admin

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Introduction to UFW - Uncomplicated Firewall The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall. By default UFW is disabled. Gufw is a GUI that is available as a frontend. Basic Syntax and…

Category : Networking   27-05-2013   by admin admin

Big Data and Hadoop: an explanation

Big Data and Hadoop: an explanation

Our world is a potential treasure trove for data scientists and analysts who can comb through massive amounts of data for new insights, research breakthroughs, undetected fraud or other yet-to-be-discovered purposes. But it also presents a problem for traditional relational databases and analytics tools, which were not built to handle…

Category : Databases   24-05-2013   by admin admin

Attracting women to developer events

Attracting women to developer events

GirlDevelopIt SF is now 1,500 members strong, and all but a handful of them are women interested in learning to program, make websites, and generally become more technically literate. Because of my involvement in GDI and likely also because I'm a fairly visible "woman in tech", I often get approached with…

Category : Web marketing   11-05-2013   by admin admin

Grid Computing Vs Cloud Computing

Grid Computing Vs Cloud Computing

The world of information technology is changing rapidly and what may be the popular method of conducting business or gathering information today may be completely phased out in a few months. Grid computing and cloud computing are two powerful – but distinct – computing systems that attempt to accomplish many of the…

Category : Networking   07-12-2013   by admin admin

Open Compute Project To Develop An Open Switch

Open Compute Project To Develop An Open Switch

  The Open Compute Project (OCP), a Facebook-backed  initiative that aims to develop cheaper, more energy efficient data centre designs, has announced it will begin work on a specification and a reference box for an open, OS-agnostic top-of-rack switch. The development process will be outlined at the first-ever OCP Engineering Summit, being held at Massachusetts…

Category : Networking   09-05-2013   by admin admin

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by admin admin

Home networking explained: How to set up a home network

Home networking explained: How to set up a home network

Computer networking allows you to browse the internet, stream music from one location to another and much more. Save yourself the pain of weak wireless signals, slow internet browsing and other problems through these useful tips. CNET editor Dong Ngo explains us the basics of home networking in 6 parts: Part 1:…

Category : Software   26-04-2013   by admin admin

How to Get Started with your Freelance Branding

How to Get Started with your Freelance Branding

It is natural to be preparing so many things when you have just started doing something. When we speak of freelancing, there is also lots of preparation to do. Part of that is getting yourself ready to face the many challenges you may face in the freelance world. You also…

Category : Web marketing   24-04-2013   by admin admin

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by admin admin

5 Steps to Build an Authority Website

5 Steps to Build an Authority Website

Building a website that can be considered "authority" takes some time. However there are some factors that if implemented correctly can influence the time it takes your website to become an authority. These 5 main contributing factors are the same basic factors for building any website, but the approach is…

Category : Web marketing   11-04-2013   by admin admin

50 Useful jQuery Plugins

50 Useful jQuery Plugins

We have compiled a list of 50 awesome plugins: we have split all of the plugins into the following categories: Web Page Layout Plugins, Navigation Plugins, Form Plugins, Slider & Carousel Plugins, Chart & Graph Plugins, Image Effect Plugins, Video Plugins, and finally, everything else in-between. Web Page Layout Plugins equalize.js equalize.js is…

Category : Javascript   11-04-2013   by admin admin

Install and Setup SSL in Webmin and Apache

Install and Setup SSL in Webmin and Apache

  SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…

Category : Networking   11-04-2013   by admin admin