Networking -

31 results for: networking

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by admin admin

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by admin admin

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by admin admin

Online Marketing Strategies for your Ecommerce

The impetus and desire we have to launch our online store can be counterproductive if we have not defined a pre-launch strategy. If we are determined to launch our ecommerce without having stopped to think if we are doing it right, there is a good chance that we will fail. That…

Category : Web marketing   02-05-2020   by Silvia Mazzetta

The best websites of the Tor Deep Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   31-07-2020   by admin admin

How to find everything you need on the Deep Web and the Dark Web

The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines we usually use. It will not appear in Google, Bing or Yahoo but these search engines will only show you results from the superficial part…

Category : Security   29-03-2020   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by admin admin

Why Becoming A Certified Scrum Master Can Launch Your Career

A development team in any organisation or in any industry would require a scrum master who can adapt the changes which occur in the company and would help the team reach its targeted goal. A Scrum master is the facilitator between the team and the top level management of the…

Category : Startups   20-06-2019   by admin admin

A roadmap to becoming a web developer in 2019

There are plenty of tutorials online, which won't cost you a cent. If you are sufficiently self-driven and interested, you have no difficulty training yourself. The point to learn coding I think is to read a lot of code of other developers, then typing code and testing to see what…

Category : Programming   30-05-2019   by admin admin

JavaScript Manual for Beginners

JavaScript Manual for Beginners

The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I   GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…

Category : Javascript   04-09-2018   by admin admin

Best apps to boost your social media

Best apps to boost your social media

Most individuals, marketers and business people struggle to get the best out of social media but do not know how to go about it. There are various applications that can help anyone get their social media up and running. With the help of such apps or tools, management of social…

Category : Social networks   24-11-2017   by admin admin

Fetch API, an amazing replacement of XMLHttpRequest AJAX

Fetch API, an amazing replacement of XMLHttpRequest AJAX

When AJAX came to the modern web, it changed the definition of how web works. We all are using ajax for a long time but not with Fetch API. To load a new content in a web page, we do not need a full page reload. Using AJAX, we can…

Category : Programming   19-02-2017   by admin admin

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   01-04-2020   by admin admin

50 Most Useful jQuery Plugins of the year #5

50 Most Useful jQuery Plugins of the year #5

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Web design   16-01-2014   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

Useful list of commands for linux server management

Useful list of commands for linux server management

List of checks that you can perform on a linux server to try and figure out why it keeps going down Disk Space: df -h (Make sure you have enough disk space) Memory: free -m (Check you're not out of memory) Processes / Load average top (shift + m) htop (Check for processes that are taking up a lot of…

Category : Networking   09-07-2013   by admin admin

50 tools to reinvigorate your content marketing efforts

50 tools to reinvigorate your content marketing efforts

2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.”  The current focus on social media advertising is pulling marketing attention…

Category : Web marketing   03-07-2013   by admin admin

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by admin admin

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Introduction to UFW - Uncomplicated Firewall The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall. By default UFW is disabled. Gufw is a GUI that is available as a frontend. Basic Syntax and…

Category : Networking   27-05-2013   by admin admin

Big Data and Hadoop: an explanation

Big Data and Hadoop: an explanation

Our world is a potential treasure trove for data scientists and analysts who can comb through massive amounts of data for new insights, research breakthroughs, undetected fraud or other yet-to-be-discovered purposes. But it also presents a problem for traditional relational databases and analytics tools, which were not built to handle…

Category : Databases   24-05-2013   by admin admin

Attracting women to developer events

Attracting women to developer events

GirlDevelopIt SF is now 1,500 members strong, and all but a handful of them are women interested in learning to program, make websites, and generally become more technically literate. Because of my involvement in GDI and likely also because I'm a fairly visible "woman in tech", I often get approached with…

Category : Web marketing   11-05-2013   by admin admin

Grid Computing Vs Cloud Computing

Grid Computing Vs Cloud Computing

The world of information technology is changing rapidly and what may be the popular method of conducting business or gathering information today may be completely phased out in a few months. Grid computing and cloud computing are two powerful – but distinct – computing systems that attempt to accomplish many of the…

Category : Networking   07-12-2013   by admin admin

Open Compute Project To Develop An Open Switch

Open Compute Project To Develop An Open Switch

  The Open Compute Project (OCP), a Facebook-backed  initiative that aims to develop cheaper, more energy efficient data centre designs, has announced it will begin work on a specification and a reference box for an open, OS-agnostic top-of-rack switch. The development process will be outlined at the first-ever OCP Engineering Summit, being held at Massachusetts…

Category : Networking   09-05-2013   by admin admin

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by admin admin

Home networking explained: How to set up a home network

Home networking explained: How to set up a home network

Computer networking allows you to browse the internet, stream music from one location to another and much more. Save yourself the pain of weak wireless signals, slow internet browsing and other problems through these useful tips. CNET editor Dong Ngo explains us the basics of home networking in 6 parts: Part 1:…

Category : Software   26-04-2013   by admin admin

How to Get Started with your Freelance Branding

How to Get Started with your Freelance Branding

It is natural to be preparing so many things when you have just started doing something. When we speak of freelancing, there is also lots of preparation to do. Part of that is getting yourself ready to face the many challenges you may face in the freelance world. You also…

Category : Web marketing   24-04-2013   by admin admin

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by admin admin

5 Steps to Build an Authority Website

5 Steps to Build an Authority Website

Building a website that can be considered "authority" takes some time. However there are some factors that if implemented correctly can influence the time it takes your website to become an authority. These 5 main contributing factors are the same basic factors for building any website, but the approach is…

Category : Web marketing   11-04-2013   by admin admin

50 Useful jQuery Plugins

50 Useful jQuery Plugins

We have compiled a list of 50 awesome plugins: we have split all of the plugins into the following categories: Web Page Layout Plugins, Navigation Plugins, Form Plugins, Slider & Carousel Plugins, Chart & Graph Plugins, Image Effect Plugins, Video Plugins, and finally, everything else in-between. Web Page Layout Plugins equalize.js equalize.js is…

Category : Javascript   11-04-2013   by admin admin

Install and Setup SSL in Webmin and Apache

Install and Setup SSL in Webmin and Apache

  SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…

Category : Networking   11-04-2013   by admin admin