1 - Web Design and Web Development News, Javascript, Angular, React, Vue, Php

52 results for: scan

China dives into deep learning

China plans to diversify the application areas of deep learning. Moreover, this system, which allows computers to be trained to perform tasks like those performed by humans, such as speech recognition, image identification or the formulation of predictions, will be driven by open-source platforms. Similarly, the forecast is that, in…

Category : News and events   18-07-2022   by Janeth Kent

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

htaccess Rules to Help Protect from SQL Injections and XSS

This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…

Category : Security   01-03-2021   by Janeth Kent

Cybersecurity and Data Privacy: Why It Is So Important

The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…

Category : Security   26-02-2021   by Janeth Kent

The best free tools for linkbuilding

Linkbuilding is one of the main factors in improving the SEO positioning of a page. Having a profile of inbound links from pages with great authority can mean the difference between appearing at the top of the search engine or not. However, practicing linkbuilding, both in text and images, is one…

Category : Seo & sem   23-12-2020   by Janeth Kent

Cross cultural challenges in web design, an overview

The user experience design of a product essentially lies between the intentions of the product and the characteristics of your user. - David Kadavy - The task of building a culturally appropriate website for a new market can be challenging: in this article we are going to talk about the impact of national…

Category : Web design   21-12-2020   by Maria Antonietta Marino

How to pay in Bitcoin: Hype and Coinbase

Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…

Category : Technology   10-12-2020   by Silvia Mazzetta

How to Use Bitcoin: mining, wallets, payments

You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…

Category : Technology   10-12-2020   by Silvia Mazzetta

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…

Category : Security   30-11-2020   by Janeth Kent

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…

Category : Security   17-11-2020   by Iveta Karailievova

How to Deal with Unnatural Inbound Links

A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…

Category : Seo & sem   25-10-2020   by Janeth Kent

How to turn an Android device into a retro game console

If you like retro games and you want to set up your own system at home, a good way to do it is using Android. From emulators for Mega Drive, N64, GBA, PS1 or Super Nintendo, to other systems such as MAME, all of them are available in Android app…

Category : Software   14-10-2020   by Silvia Mazzetta

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…

Category : Security   08-10-2020   by Iveta Karailievova

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by Tibor Kopca

Jennifer in Paradise: story of the first photo ever edited in Photoshop

A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…

Category : News and events   25-09-2020   by Silvia Mazzetta

Data Scraping and Data Crawling, what are they for?

Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…

Category : Web marketing   25-09-2020   by Silvia Mazzetta

How to create the perfect hacker-proof password

We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…

Category : Security   11-08-2020   by Silvia Mazzetta

How to integrate native images lazy loading in your web projects

Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility   is supported by…

Category : Programming   07-08-2020   by Luigi Nori

Java Sorting Algorithm: Bubble Sort

Programming, the need to order the collections of data or objects that must then be manipulated often arises. Ordering a list can be useful in cases where you have to do very quick searches. We will see later on how to maintain an ordered list is useful to carry out dichotomous…

Category : Java   15-12-2019   by Alessio Mungelli

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

Java Design Pattern: Factory Method Pattern

Going on with the speach about design patterns started previously, we are going to talk about another pattern often used: the Factory Method Pattern. The GoF (Gang of Four Design Patterns) defines it in this way: It defines an interface to create objects, but leaves to the subclasses the decision about the…

Category : Java   05-11-2019   by Alessio Mungelli

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…

Category : Networking   24-04-2020   by Luigi Nori

How to prevent people from adding spam events and appointments in Google Calendar

Let's explain how to prevent people from adding spam to your Google Calendar by adding events and appointments without your approval. This is a practice that has been used for more than a decade to add appointments and events in which ads appear that may be fraudulent, so that they…

Category : News and events   28-08-2019   by Silvia Mazzetta

Features you will get in EaseUS data recovery software

The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…

Category : Software   25-06-2019   by Janeth Kent

How to Get the Most out of Digital Technology in Business

How to Get the Most out of Digital Technology in Business

The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…

Category : News and events   29-03-2019   by Janeth Kent

The Most Useful 50 Web Sites you wish you knew earlier

There are so many websites around, and it is very complicated to know each and every one of them. Our lisy provides 100 those websites that we find particularly helpful, even though they are not as famous or as prevalent as some of the big names. archive.is — take a snapshot of…

Category : Web marketing   13-06-2020   by Janeth Kent

UX-UI: How to design better forms

Whether it is a signup flow, a multi-view stepper, or a monotonous data entry interface, forms are one of the most important components of digital product design. This article focuses on the common dos and don’ts of form design. Keep in mind that these are general guideline and there are…

Category : Ui/ux design   02-05-2020   by Silvia Mazzetta

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

MySql: How to build a performant search engine

MySql: How to build a performant search engine

In content-heavy websites, it becomes increasingly important to provide capable search possibilities to help your users find exactly what they’re looking for. The most obvious solution is searching your MySQL database directly, but implementing a generic MySQL search is not at all trivial. Here’s how to avoid those pitfalls and…

Category : Databases   10-09-2016   by Janeth Kent

Protect Ubuntu Servers With Fail2Ban

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

Category : Security   17-02-2015   by Janeth Kent

Speed up your site and protect it against DDOS attacks with CloudFlare

Speed up your site and protect it against DDOS attacks with CloudFlare

If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…

Category : Networking   23-07-2014   by Luigi Nori

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by Janeth Kent

Top 23 Free Photoshop Plugins

Top 23 Free Photoshop Plugins

Looking a professional Photoshop extension for free? Today we will provide 23 free Photoshop plugins for graphic designers. These plugins suitable for web designers, graphic designers and photograpgers and the silled photographers have been acknowledged to bring these awesome free plugins into play as a base and after that tweak and…

Category : Software   22-08-2013   by Janeth Kent

A Collection of Essential WordPress Plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…

Category : Web design   21-08-2020   by Janeth Kent

The future of web browsing

The future of web browsing

An article posted on Sidebar , underline the mind-blowing power of HTML5. Web developer / Mozilla evangelist David Walsh has grouped nine demos that use just native web technologies to show how much can be done in your web browser without the need for plugins like Flash and Silverlight. These, in my opinion, are the…

Category : News and events   22-07-2013   by Janeth Kent

Face detection methods and classes in php

Face detection methods and classes in php

Face detection is a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images. It detects facial features and ignores anything else, such as buildings, trees and bodies. There is so much to say about face detection and all its algorithms, but first we want to…

Category : Programming   11-07-2013   by Janeth Kent

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

50 Fresh Tools for Developers and Designers

50 Fresh Tools for Developers and Designers

Web developers and web designers regularly look for new resources, tools and services to make the search of these ever-growing techniques easier. This overview presents some of the most useful round-ups of time-savers, tools and services for Web designers. As every designer or developer knows, anything that can save you just…

Category : Web design   08-07-2013   by Janeth Kent

Move Google Authenticator to a new mobile device

Move Google Authenticator to a new mobile device

We all know that two-step verification can help prevent malicious attacks against your online accounts. Anyone trying to break into your account would need both your password and the mobile device that authentication codes are sent to in order to gain access. Google has done an awesome job of providing options…

Category : Software   01-07-2013   by Janeth Kent

71 Social Media Monitoring Tools

71 Social Media Monitoring Tools

If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools.  In the first group are the most popular Social Media Monitoring…

Category : Social networks   27-06-2013   by Janeth Kent

Which apps have access to your online profiles? Check it with MyPermissions app

Which apps have access to your online profiles? Check it with MyPermissions app

With MyPermissions app, you can review and remove permissions of apps accessing Facebook, Twitter, Google and your personal information on other online accounts. With this free app for iPhone or for Android, you can keep track of the apps that have access to your various online profiles, including Facebook, Twitter, Google, Yahoo, Dropbox, Instagram,…

Category : Software   26-06-2013   by Janeth Kent

PHP Recursive Backup of Directories

PHP Recursive Backup of Directories

This script can be used to make backup of entire directories and subdirectories in our servers, you can use the script in conjunction with cronjobs //specify the source dir and target dir $src = $_SERVER.'/test/backup/dir1'; $dst = $_SERVER.'/test/backup/dir2'; function recurse_copy($src,$dst) { $dir = opendir($src); @mkdir($dst); while(false !== ( $file = readdir($dir)) ) { if…

Category : Programming   24-06-2013   by Janeth Kent

A List of Best Free SQL Injection Scanners and Tools

A List of Best Free SQL Injection Scanners and Tools

We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…

Category : Databases   03-06-2013   by Janeth Kent

50 Top Tools for Social Media Monitoring, Analytics, and Management

50 Top Tools for Social Media Monitoring, Analytics, and Management

To start a business that will succeed in today's connected world, we need to build a community around our company, brand, and products. It can be noticed how, the last decade, social media monitoring has become a primary form of business intelligence, used to identify, predict, and respond to consumer behavior. Listening to what our…

Category : Social networks   15-05-2013   by Janeth Kent

How to improve security in Firefox, Chrome, and IE

How to improve security in Firefox, Chrome, and IE

Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…

Category : Security   07-05-2013   by Janeth Kent

Keyword Research and The Methods

Keyword Research and The Methods

Have you ever asked yourself, what keywords should I rank for and why is choosing keywords important? Well we have all been there and hopefully after reading below you won’t ever question keyword research again. This article on keyword research describes first what keyword research is and then the different methods to researching keywords. What…

Category : Web marketing   07-05-2013   by Janeth Kent

Top Ten Android Tips

Top Ten Android Tips

Welcome to the sometimes wild, often wonderful, but always fascinating world of Android!  Chances are the Android OS is a bit different than what you're used to, even if you are moving over from another smartphone platform.  We want to help you get settled in and familiar with your phone…

Category : Software   22-04-2013   by Janeth Kent

Free Tools For JavaScript Developers

Free Tools For JavaScript Developers

We have compiled a list of really useful Free Tools For JavaScript that will help you. Testing JSLint – The JavaScript Verifier JSLint takes a JavaScript source and scans it. If it finds a problem, it returns a message describing the problem and an approximate location within the source. The problem is not…

Category : Javascript   16-04-2013   by Janeth Kent

10 Killer SEO Landing Page Tips

10 Killer SEO Landing Page Tips

When we talk landing pages, most online marketers think pay-per-click, where the input of a destination URL into Google's or Bing's paid search offerings allow marketers to drive keyword-targeted traffic to (hopefully) optimized pages. My previous article extolling the death of keywords talked about developing intent-based topics and building content that connects with…

Category : Web marketing   15-04-2013   by Janeth Kent

13 Top Free Android Productivity Apps

13 Top Free Android Productivity Apps

If you are an android user and a blogger, then this post is for you. We have listed the top free 13 android apps for productivity. 1. Google Goggles Search the real world by taking a picture. Search by taking a picture. Goggles uses image recognition technology to recognize objects and return relevant…

Category : Software   15-04-2013   by Janeth Kent

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration
q=scan