1 - Web Design and Web Development News, Javascript, Angular, React, Vue, Php

94 results for: operating

Open source web design tools alternatives

There are many prototyping tools, user interface design tools or vector graphics applications. But most of them are paid or closed source. So here I will show you several open source options for you to try and use the one you like the most.   Penpot    Penpot is the first open source design…

Category : Web design   03-06-2022   by Nadal Vicens

How to Start a Web Design Agency in 2022

If the last two years have shown us anything, it’s that a good online presence is paramount to success in the modern world of business. Once they have a robust web-based reputation in place, companies have the capacity to disrupt their sectors in an engaging, intuitive, and ultimately profitable fashion.…

Category : Web marketing   25-01-2022   by Janeth Kent

Node.js and npm: introductory tutorial

In this tutorial we will see how to install and use both Node.js and the npm package manager. In addition, we will also create a small sample application. If you have ever used or thought about using a JavaScript-based development tool, you have probably noticed that you need to install…

Category : Javascript   05-11-2021   by Silvia Mazzetta

How to set up your own free web server with XAMPP

Nowadays anyone can create their own website easily and free of charge. Whether through a CMS (such as WordPress) or by hand with HTML, CSS and JavaScript, in a few minutes we can have a more or less functional website up and running. However, in order to test that everything…

Category : Servers   25-10-2021   by Silvia Mazzetta

Why E-Commerce Businesses Should be Using Cloud Computing

Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…

Category : Web marketing   01-06-2021   by Silvia Mazzetta

Advanced Android tutorial: discover all your phone's secrets

It is highly probable that you are not taking advantage of even half of the potential that your Android device has to offer. These small pocket computers, which we call smartphones, have increasingly advanced and powerful hardware that, together with the possibilities offered by an operating system as flexible as…

Category : Mobile   06-05-2021   by Janeth Kent

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How to set up your Android phone: learn how to get your new phone up and running

If you've just bought a great new Android phone, you'll want to start using it as soon as possible. You'll see that it's not hard to get the initial set-up and configuration to get it ready to use, and we'll guide you every step of the way. From connecting your Google account,…

Category : Mobile   28-04-2021   by Janeth Kent

5 Terrific iOS-Friendly Canva Alternatives to Upgrade Your Marketing Visuals

Sometimes you want to use your iPhone to create compelling, engaging marketing visuals, and as awesome as Canva is, many of us are interested in seeing what other options are out there.   As all marketers know, consistent branding is a must for any company (or even individual) who wants to stand…

Category : Web marketing   05-05-2021   by Janeth Kent

Parental controls on Android: how to make mobiles and tablets child-friendly

Despite all the good things about them, mobile devices can expose your children to content that they're better off not seeing. The good news is that your Android phone or tablet comes with built-in tools that can help you ensure your kids can only access age-appropriate content and, as we'll…

Category : Security   26-04-2021   by Janeth Kent

The best free tools to Transcribe audio to text

With this article we bring you a list of the best tools for transcribing audio to text, offering you some that simply do it with dictated audio, but also others capable of loading audio files. The collection is varied, and we have mobile applications, web pages, and computer programs capable…

Category : Software   15-04-2021   by Janeth Kent

6 Best Alternative Privacy Focused Browsers in 2021

In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…

Category : Software   22-04-2021   by Tibor Kopca

Top 7 Potential Tools for Automation Testing

Today's digital economy has significantly changed how organizations deliver products and services. Many organizations are gravitating towards smart methodologies and automated tools to spark customer interest in their products and increase revenue to ensure quality and speedy deliveries. These testing tools help organizations to determine the expected and actual product delivery…

Category : Web marketing   12-02-2021   by Janeth Kent

Top Whatsapp alternatives in 2021

From the communication platform WhatsApp leaves more and more users for different reasons. If you're one of them, there are a lot of possibilities on how to replace it with something better. We will show you what are the 5 free alternatives to WhatsApp to have a text or audio-video conversation…

Category : Software   26-01-2021   by Tibor Kopca

Django vs. Laravel: Market Share Comparison

There are two leading frameworks in the web development segment: Django and Laravel. In this article, we prepared a Django and Laravel comparison focusing on their market share so that you can figure out which framework is better for your project. Selecting the appropriate framework is crucial for coping with…

Category : Programming   23-12-2020   by Janeth Kent

Install MacOS on PC - the Ultimate Guide (Hackintosh)

There has always been a belief that the Apple MacOS Operating System could only be installed on computers sold directly by Apple. But on the Internet there is a large community dedicated to Hackintosh. And in this guide we are going to show you today all you need to know…

Category : Operating systems   10-12-2020   by

Google everywhere: anatomy of a massive giant

The alarm clock is going off. A hand floats over the bedside table groping for the source of the sound: probably a cell phone and maybe one of the more than 2.5 billion Android devices in the world. Alphabet's operating system (Google's matrix) concentrates 74.6% of the market and together with…

Category : Technology   03-12-2020   by Silvia Mazzetta

The best tricks and features to master your Android Smart TV

We bring you a collection of the best tricks to squeeze Android TV, the Google operating system designed for televisions. You can find it on smart televisions of some brands, but also on devices that you will connect to the TV. With all of them, you can use different types…

Category : Networking   05-11-2020   by Luigi Nori

What's the Difference between Google TV and Android TV?

At the end of September, Google launched the renewal of its classic dongle. The new Google Chromecast didn't arrive alone, but added two very important innovations compared to the devices of previous generations that have been turning normal televisions into smart TVs since 2013. The first of these novelties is the…

Category : Software   27-10-2020   by Silvia Mazzetta

MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows

Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long hours spent in front of a console, such as the NES or SNES, and even in arcades playing arcade machines.…

Category : Software   14-10-2020   by Luigi Nori

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by Tibor Kopca

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…

Category : Development   22-10-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser   It is also possible to increase the security level of the…

Category : Security   19-09-2020   by Janeth Kent

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   04-05-2021   by Silvia Mazzetta

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through standard commercial channels, while others are sold through direct distributors and cash payment. We list some of them here, with the…

Category : Security   15-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

Free Netflix: everything you can see without subscribing

To view the contents of an audiovisual streaming platform such as Netflix, it is necessary to pay a monthly connection fee. However, the company has enabled a series of contents that can be viewed "for free", without having to pay for them. To view Netflix's free contents it is not necessary…

Category : News and events   09-09-2020   by Luigi Nori

How to install a Linux partition on a Windows 10 PC

In spite of a past we could say almost confronted, the approach between Windows and Linux is accelerating more and more, drawing a story closer to love than to hate. So much so that Windows 10 already offers support for Linux natively. Creating a subsystem is no longer penalized. A…

Category : Operating systems   06-09-2020   by Luigi Nori

How to setup an Android TV with androidtv.com/setup or the Google application

Android TVs and players are a good investment if you want to have all the entertainment at your fingertips. However, they require an installation that, although simple, has several ways to run. We show you how to set up your Android TV without complications and in less than five minutes. Android…

Category : Operating systems   26-10-2020   by Janeth Kent

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

Bank phishing by email: best way to prevent it

No one is safe from Pishing attacks, especially bank Phising. Large and small companies in all industries are being attacked repeatedly. Phishing is so popular with cybercriminals because it provides them with access to the most vulnerable part of any network: the end users. Bank Phishing is increasingly being used…

Category : Security   16-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Parenting, pandemic and UX: Learning from design of experiences

After the quarantine, many of us have had to adapt our work and personal routines to the new remote paradigm. As a mother, I decided to share some things I've learned. We've been in total quarantine for weeks. Weeks in which we close the office and live and work in the 4…

Category : Ui/ux design   17-06-2020   by Silvia Mazzetta

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

Linux For Dummies: Permissions

In the previous articles I made a short introduction to the Unix world and in the following article I have dealt with the basic commands for the file system management. Today we are going to talk about permissions. We are going to take Ubuntu as an example, but in the other distros the working mechanism…

Category : Operating systems   14-03-2020   by Alessio Mungelli

Protect yourself: know which apps have access to your location, microphone and camera

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...   Smartphones have become the target of choice for hackers and criminals who want to make money or extort money…

Category : News and events   20-04-2020   by Silvia Mazzetta

The exciting story of JavaScript (in brief)

Javascript is a client-side programming language that has changed the Internet as we know it today. The term "client side" means that it runs on our web browser without the need for a web hosting. Along with html and css it is one of the 3 pillars of web design. It is…

Category : Javascript   13-04-2020   by Silvia Mazzetta

How to check if the GPS works

Have you tried to share your location with some friends but couldn't because the GPS on your smartphone looks dead? Don't jump to conclusions - your phone may not be having hardware problems. In fact, GPS malfunctions are often caused by temporary problems due to poor signal reception or poor…

Category : News and events   10-04-2020   by Silvia Mazzetta

How to find everything you need on the Deep Web and the Dark Web

How to find everything you need on the Deep Web and the Dark Web Best links, sites, markets what you can find on the Deep Web The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines…

Category : Security   10-05-2021   by Silvia Mazzetta

Linux for Dummies: Ubuntu Terminal

I introduced in the previous article, available here, the basic concepts concerning the Linux world. Today we are going to have a look to some basic operations that we can perform using the terminal in an Ubuntu-like operating system. What is the command line? Shell, terminal and command line are words that commonly stand for a…

Category : Operating systems   27-02-2020   by Alessio Mungelli

Linux for Dummies: Introduction

If you have thought about migrating from Windows to a Unix operating system, or Linux specifically there are things you should know. The goal is to give essential information (and not) to take the first steps in the world of the "penguin". What is Linux? With the word Linux we commonly refer…

Category : Operating systems   21-08-2020   by Alessio Mungelli

How the Java Swing is Worthy in Designing the Photo Editing App

When social media is reigning over the world, no wonder photography is one of the crucial factors in today’s field of personal or professional recognition. Tons of applications. Still, the demand is far from ending. Online queries are swarming with searches for better graphics toolkit. The better the framework, the…

Category : Java   27-01-2020   by Janeth Kent

How to disable the camera, microphone and all sensors on your phone with a single touch in Android 10

With Android 10, Google has improved the privacy of its operating system with new options, but has also hidden an interesting option that deactivates all the sensors of the device at once. This option prevents applications from accessing all of the device's sensors, including the cameras and microphone. The hidden option…

Category : Mobile   02-12-2019   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

Now you can download the new Windows terminal: new, modern, fast, efficient, and powerful.

Microsoft has announced its new Windows Terminal, which will bring together PowerShell, CMD and WSL, includes a real Linux kernel that allows you to run more Linux software on Windows and with better performance than WSL 1 in one place to end the diversification that currently has the operating system…

Category : Software   26-06-2019   by Janeth Kent

RCS: Everything you need to know about the successor to the SMS

What is RCS? What is it for? Discover everything about this system that Google has been promoting for some time and the future it could have. Messaging in the handset market has changed dramatically over time. For many years SMS was the way most people used to be in contact with…

Category : Mobile   18-06-2019   by Janeth Kent

How to use to Chrome Lighthouse

How would you like to perform a fast SEO audit with a Chrome browser-based instrument? With the Lighthouse extension, you can do that. If you're not acquainted with Lighthouse, it's an open-source tool used by experts to verify their website's health. It analyzes everything from best practices to performance to accessibility. As…

Category : Seo & sem   14-06-2019   by Janeth Kent

How to Create your own custom Linux system, step by step

Here is some information where you can learn step by step how to customize a Linux distribution to create your own Linux. If we follow the steps, even the less experienced will be able to create their own Linux to their liking. Personalizing a distribution not only serves to have a…

Category : Operating systems   14-06-2019   by Janeth Kent

Features you will get in EaseUS data recovery software

The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…

Category : Software   25-06-2019   by Janeth Kent

Most Popular Node.js Frameworks in 2019

Most Popular Node.js Frameworks in 2019

Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…

Category : Javascript   14-02-2019   by Janeth Kent

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

How to install Letsencrypt Certificates with Certbot in Ubuntu

In this article we will explain how to install, manage and configure the SSL Security certificate, Let's Encypt in NGINX server used as proxy. This certificate is free but does not offer any guarantee and has to be renewed every 3 months. We recommend that users with shell access use the…

Category : Servers   09-05-2020   by Janeth Kent

The best Free and Open-Source Video editing, VFX and compositing software

The programs listed below are the foundation of this blog. It’s Free & Open-Source Video Editing Software that does all the stuff the expensive commercial programs do. We’ll keep the links here updated, so you always know where to get them. Also, with this basic list, we are focusing on well-developed programs that work on…

Category : Multimedia   01-03-2021   by Janeth Kent

Install macOS High Sierra in VirtualBox on Windows 10

Whether you want to occasionally test a website in Safari, or try out a little bit of software in the Mac environment, having access to the latest version of macOS in a virtual machine is useful. Unfortunately, you’re not really supposed to do this—so getting macOS running in VirtualBox is,…

Category : Operating systems   12-04-2021   by Janeth Kent

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by Janeth Kent

How to Choose a Laptop for Web Design and Development

Efficiency is important at work, no matter the type of job you do. The better the tools that you use, the more productive you are. So if you’re a web designer, you want a laptop that will be able to handle all your software with ease. However, how do you…

Category : Technology   16-12-2019   by Janeth Kent

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

Last week, the voting phase closed on an RFC to add libsodium to PHP 7.2. The result was unanimous (37 in favor, 0 against). When version 7.2 releases at the end of the year, PHP will be the first programming language to adopt modern cryptography in its standard library. What is Modern…

Category : Php   14-02-2017   by Janeth Kent

How to install and setup Varnish in Ubuntu 16.04

How to install and setup Varnish in Ubuntu 16.04

One of the problems with running a site with many users is that the constant requests for dynamic content can really bog down a web server. In order to solve this problem, many big companies turn to a tool called Varnish. It’s an HTTP accelerator that caches both static and…

Category : Networking   02-01-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

SQLMAP installation and usage in Ubuntu and Kali linux

SQLMAP installation and usage in Ubuntu and Kali linux

Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…

Category : Security   13-08-2016   by Janeth Kent

8 Social Tools to interact with Customers and improve CX

8 Social Tools to interact with Customers and improve CX

Customer experience is measured by the individual’s experience during all points of contact against the individual’s expectations. Over the past century, countless inventions and advancements have inadvertently raised the bar of customer experience. Communication mediums have improved, resulting in elevated expectations of more hands-on, faster, and localized customer service.  Customers now have…

Category : Social networks   22-07-2016   by Janeth Kent

What is a DDOS attack and tools used

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users. The denial…

Category : Security   04-05-2021   by Janeth Kent

PHP:How To Upgrade to PHP 7 on Ubuntu 14.04

PHP:How To Upgrade to PHP 7 on Ubuntu 14.04

Introduction PHP 7, which was released on December 3, 2015, promises substantial speed improvements over previous versions of the language, along with new features like scalar type hinting.This guide explains how to quickly upgrade an Apache or Nginx web server running PHP 5.x (any release) to PHP 7. Warning: As with…

Category : Operating systems   13-03-2016   by Janeth Kent

Install HHVM + Nginx on Ubuntu 14.04

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…

Category : Networking   12-05-2017   by Janeth Kent

Optimize MySql On Low Memory Servers

Cloud computing makes it very affordable to get your own private virtual server on the Internet. Digital Ocean offers an entry level droplet for USD$5 per month, and Amazon.com has a micro instance tier on the EC2 platform that is free for the first year. These instances are rather useful…

Category : Databases   25-08-2020   by Luigi Nori

How to Create Custom Filters in jQuery

How to Create Custom Filters in jQuery

If you are a web designer or a developer you frequently need a shortcut to collect elements for jQuery. In this post, based on the book Instant jQuery Selectors, you’ll learn how to build a custom filter in jQuery. So, we try to built a filter that ia able to print the length of…

Category : Javascript   17-12-2013   by Janeth Kent

25 HTML5 speed tips

25 HTML5 speed tips

Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…

Category : Web design   05-12-2013   by Janeth Kent

Tutorial: Introduction to PHP:PDO

Tutorial: Introduction to PHP:PDO

Many PHP programmers learned how to access databases by using either the MySQL or MySQLi extensions. As of PHP 5.1, there’s a better way. PHP Data Objects (PDO) provide methods for prepared statements and working with objects that will make you far more productive!   PDO Introduction “PDO – PHP Data Objects…

Category : Databases   15-10-2013   by Janeth Kent

13 jQuery Plugins and Tutorials for e-commerce website

13 jQuery Plugins and Tutorials for e-commerce website

E-Commerce websites are making shopping easy for customers. The number of ecommerce websites are growing with every day. Shopping Cart is the most important aspect of an E-Commerce website. We all know that jQuery plugins helps us to add difficult things to our websites very easily. Below you’ll find 13 jQuery shopping cart plugin and…

Category : Javascript   02-08-2013   by Janeth Kent

The best code editor for web developers

The best code editor for web developers

Every web developer requires the right tools to do their job, therefore the choice of a source code editor shouldn’t come lightly. This is where we spend most of our development time and where productivity is gained or lost on a grand scale. But which is the best Code Editor? To determine the best source code editor, we…

Category : Software   25-07-2013   by Janeth Kent

The future of web browsing

The future of web browsing

An article posted on Sidebar , underline the mind-blowing power of HTML5. Web developer / Mozilla evangelist David Walsh has grouped nine demos that use just native web technologies to show how much can be done in your web browser without the need for plugins like Flash and Silverlight. These, in my opinion, are the…

Category : News and events   22-07-2013   by Janeth Kent

Setup and Manage Mysql/MysqlAdmin root password

Setup and Manage Mysql/MysqlAdmin root password

Managing mysql main root password is one of the most common questions/problems that new linux users have, and one of the essential tasks. By defaultroot user is MySQL admin account. The Linux / UNIXlogin root account for your operating system and MySQL root aredifferent. They are separate and nothing to…

Category : Databases   18-07-2013   by Janeth Kent

How To Rock Your Next Bootstrap Project

How To Rock Your Next Bootstrap Project

Bootstrap, released in August of 2011, it is still the most popular GitHub development project with over 52k stars and over 16k forks. Twitter’s Bootstrap helps you build beautiful web apps quickly. It provides a variety of CSS and JavaScript for making layouts, navigation, forms and a lot more and it even…

Category : Web design   15-07-2013   by Janeth Kent

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

Show Your Clients the Value of Facebook in 7 Easy Steps

Show Your Clients the Value of Facebook in 7 Easy Steps

Here's a common scenario: You have a client who you know would benefit from a Facebook Page but the client isn't convinced. First of all you have to demonstrate how you would plan to limit their risks, then you have to underline that an active social media presence can help inspire brand…

Category : Social networks   03-07-2013   by Janeth Kent

50 tools to reinvigorate your content marketing efforts

50 tools to reinvigorate your content marketing efforts

2012 has been the year of growth for content marketing. Brands have begun to embrace the discipline as a vital part of their overall strategy. What was once a conversation on “why content marketing” has turned into a conversation on “how to.”  The current focus on social media advertising is pulling marketing attention…

Category : Web marketing   03-07-2013   by Janeth Kent

Firefox OS: Start To Develop Your First App

Firefox OS: Start To Develop Your First App

Nearly two years ago, Mozilla announced "Boot to Gecko" (a.k.a. B2G), a project whose primary goal was to provide a standalone web-centric operating system in which the preferred (and in fact, only) platform for application development is the HTML5 stack. In essence, this operating system would have filled a gap…

Category : Programming   02-07-2013   by Janeth Kent

14 Tools For Checking Your Website's Health

14 Tools For Checking Your Website's Health

Have you ever checked your website's health? We have listed some useful sources that show if your website is operating as it should, and if there's anything that it can be done to improve it's performance from the structural and marketing aspect. Enjoy and feel free to recommend any other sources…

Category : Web design   28-06-2013   by Janeth Kent

Windows 8.1: 5 Cool New Features

Windows 8.1: 5 Cool New Features

Windows 8.1, the first update just arrived in beta. It's easy to download and easier than the new version of OS X... Check out these features and decide for yourself. 1. The Return of the Start Button The Start menu, these days, is a totally different-looking touch-friendly array of shiny live-updating squares, but you access…

Category : Operating systems   28-06-2013   by Janeth Kent

Big Data and Hadoop: an explanation

Big Data and Hadoop: an explanation

Our world is a potential treasure trove for data scientists and analysts who can comb through massive amounts of data for new insights, research breakthroughs, undetected fraud or other yet-to-be-discovered purposes. But it also presents a problem for traditional relational databases and analytics tools, which were not built to handle…

Category : Databases   24-05-2013   by Janeth Kent

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…

Category : Security   23-05-2013   by Janeth Kent

Google I/O Expectations: The Developers Guide

Google I/O Expectations: The Developers Guide

If you like Google, mobile development and cloud platforms, this is going to be a good week for you. Google will have lots of goodies this week for developers - and consumers - at its I/O developer conference in San Francisco. We might see some new hardware, a couple updates to Google’s major…

Category : News and events   15-05-2013   by Janeth Kent

Mysql:Guide To The MySql Query Cache

MySQL “Query Cache” is quite helpful for MySQL Performance optimization tasks but there are number of things you need to know. First let me clarify what MySQL Query Cache is - I’ve seen number of people being confused, thinking MySQL Query Cache is the same as Oracle Query Cache - meaning…

Category : Databases   25-03-2020   by Janeth Kent

Turbulenz, open source html5 game engine

Turbulenz, open source html5 game engine

Some of the best things in the world are open source — that is to say that the basic code or instructions for it are available for everyone to use for free. Google’s Android operating system, for example, is open to anyone who wants to use it. That provides companies…

Category : Videogames   03-05-2013   by Janeth Kent

Mozilla launches Firefox OS Simulator 3.0

Mozilla launches Firefox OS Simulator 3.0

Mozilla on Thursday announced the release of Firefox OS Simulator 3.0, polishing all the features in the preview release as well as making a few more improvements. You can download version 3.0 now for Windows, Mac, and Linux from Mozilla Add-Ons. The simulator installs as an extension in Firefox, so you’ll need Mozilla’s browser to use…

Category : Programming   03-05-2013   by Janeth Kent

Php: Automatic Site/Directory Backup via FTP with PHP

Php: Automatic Site/Directory Backup via FTP with PHP

In this tutorial we are going to make a PHP script that archives your website into a .tar file, then automatically moves it to an external FTP server for safe keeping. We can then setup a cron for this script which will execute it automatically every day/week/month , however…

Category : Programming   29-04-2013   by Janeth Kent

Ubuntu Releases 13.04

Ubuntu Releases 13.04

The release demonstrates consistently faster boot speeds than earlier versions — down to about 40 seconds on Intel and AMD-based Acer Veriton desktop machines — shrinks memory usage by as much as 50MB, reduces image size and cuts power consumption, according to Canonical, the company behind Ubuntu. "We've been driving Ubuntu to be a coverged OS across different…

Category : Operating systems   25-04-2013   by Janeth Kent

The Best Experimental Chrome Features You Should Check Out

The Best Experimental Chrome Features You Should Check Out

Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…

Category : Software   24-04-2013   by Janeth Kent

WARNING: New Malware Threat in Twitter's Topics

WARNING: New Malware Threat in Twitter's Topics

Twitter is one of the most popular social networks for spreading ideas. It has revolutionized the way millions of people consume news. With 288 million active users, Twitter is the world's fourth-largest social network. So it’s no surprise that Twitter is also being used for spreading malware. Trusteer researcher Tanya Shafir…

Category : News and events   23-04-2013   by Janeth Kent

6 Things to Consider when Choosing a Framework

6 Things to Consider when Choosing a Framework

You’ve decided that it makes sense to use a framework when writing your next new application, and chances are that if you’re already familiar with a specific framework, then you’ll probably be leaning towards using that one when you start. But are you sure it’s really the most appropriate for…

Category : Programming   22-04-2013   by Janeth Kent

100+ Best Google Chrome Extensions

100+ Best Google Chrome Extensions

There are a lot of extensions specific to Google and its services, which isn't surprising considering Chrome is Google's browser. They work across operating systems. Best of all, every extension mentioned here is entirely free, so there's no harm in giving them a try. If you don't like one, just…

Category : Software   16-04-2013   by Janeth Kent

Shodan: The scariest search engine on the Internet

Shodan: The scariest search engine on the Internet

"When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google,…

Category : Security   11-04-2013   by Janeth Kent

The Best tools that may come in handy in your online life

The Best tools that may come in handy in your online life

In time, I’ve came across many tools which I found very good or at least interesting because they were covering things that the popular tools didn’t.  Some of the tools are for Web Analytics, some are for Social Media Monitoring, some are for website improvements and some are just for…

Category : Software   01-05-2020   by Janeth Kent

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration
q=operating