60 results for: scan
Android Hidden Codes: unveiling custom dialer codes and their functionality
In the world of Android smartphones, there exist numerous hidden codes that can unlock a treasure trove of functionalities and features. These codes, known as custom dialer codes, provide access to various settings, diagnostics, and information that are not readily available through regular menus. In this article, we will explore…
Category : Mobile 02-06-2023 by Janeth Kent
How to download any video from any website
If you have ever seen a video that you really liked and you would have liked to have it on your computer, but you didn't know how, from now on you will know it, since we are going to see which are the tools that allow us to do this…
Category : Technology 16-05-2023 by Janeth Kent
How to recognise cyber-violence
Cyber-violence, i.e. the digital dimension of violence that mainly affects women and is closely linked to the violence that occurs in the 'real world', is a growing phenomenon that is often neither recognised nor addressed. While it is true that several institutions have started to deal with it specifically, it is…
Category : News and events 08-03-2024 by Janeth Kent
The AI Revolution: How Are Small Businesses Beginning To Implement AI?
As the technological world moves forward with new advancements, so too does the business world evolve and adapt to integrate those advancements to optimise their operations. Artificial Intelligence has been around for a couple of decades, but only in the last few years has it developed to a point where…
Category : Technology 17-10-2022 by Janeth Kent
China dives into deep learning
China plans to diversify the application areas of deep learning. Moreover, this system, which allows computers to be trained to perform tasks like those performed by humans, such as speech recognition, image identification or the formulation of predictions, will be driven by open-source platforms. Similarly, the forecast is that, in…
Category : News and events 18-07-2022 by Janeth Kent
Network attacks and how to avoid them
Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…
Category : Security 03-05-2021 by Silvia Mazzetta
htaccess Rules to Help Protect from SQL Injections and XSS
This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…
Category : Security 01-03-2021 by Janeth Kent
Cybersecurity and Data Privacy: Why It Is So Important
The internet has made it very easy for people all across the world to stay connected with one another. Access to information, services, and people is possible for pretty much anyone with an internet connection today. But while this has brought many positive changes to how people live and connect,…
Category : Security 26-02-2021 by Janeth Kent
The best free tools for linkbuilding
Linkbuilding is one of the main factors in improving the SEO positioning of a page. Having a profile of inbound links from pages with great authority can mean the difference between appearing at the top of the search engine or not. However, practicing linkbuilding, both in text and images, is one…
Category : Seo & sem 23-12-2020 by Janeth Kent
Cross cultural challenges in web design, an overview
The user experience design of a product essentially lies between the intentions of the product and the characteristics of your user. - David Kadavy - The task of building a culturally appropriate website for a new market can be challenging: in this article we are going to talk about the impact of national…
Category : Web design 21-12-2020 by Maria Antonietta Marino
How to pay in Bitcoin: Hype and Coinbase
Once the wallet is created, let's see how to pay in Bitcoin to buy various products and services. If you have opened a Bitcoin wallet with HYPE, you can send payments using this cryptocurrency very easily. All you need to do is go to the Menu section of the HYPE app, press…
Category : Technology 10-12-2020 by Silvia Mazzetta
How to Use Bitcoin: mining, wallets, payments
You have certainly heard of Bitcoin, the virtual currency that periodically makes people talk about itself because of its innovative and particular nature. In this case, you have probably also wondered how it is possible to get and subsequently spend Bitcoins, and if it is something useful, as well as…
Category : Technology 10-12-2020 by Silvia Mazzetta
Brief History of Biometric Authentication
These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…
Category : Security 30-11-2020 by Janeth Kent
A beginner’s guide to software vulnerabilities
What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising number of cameras, smoke detectors, motion sensors, smart door locks, and let’s not forget that even plant pots. Many households…
Category : Security 17-11-2020 by Iveta Karailievova
How to Deal with Unnatural Inbound Links
A website that has a good rank on search engines, especially Google is a big task. Backlinks or Inbound links are one of the best ways to achieve this ranking. Sometimes in a haste to achieve this goal, websites indulge in underhanded behaviour like unnatural inbound links. These are considered…
Category : Seo & sem 25-10-2020 by Janeth Kent
How to turn an Android device into a retro game console
If you like retro games and you want to set up your own system at home, a good way to do it is using Android. From emulators for Mega Drive, N64, GBA, PS1 or Super Nintendo, to other systems such as MAME, all of them are available in Android app…
Category : Software 14-10-2020 by Silvia Mazzetta
Network and port scanning with Zenmap
This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated and everyone with patience and eagerness to learn something new can relatively quickly gain the knowledge necessary to feel more…
Category : Security 08-10-2020 by Iveta Karailievova
Google Dorks: How to find interesting data and search like hacker
Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…
Category : Security 03-12-2021 by
Jennifer in Paradise: story of the first photo ever edited in Photoshop
A photograph with more than 30 years of history has become an icon in popular culture, or at least it remains in the memory of those who have ever used Adobe Photoshop, the well-known tool for photo retouching. Behind software like Photoshop there are dozens of stories. One of them…
Category : News and events 25-09-2020 by Silvia Mazzetta
Data Scraping and Data Crawling, what are they for?
Right now we are in an era where big data has become very important. At this very moment, data is being collected from millions of individual users and companies. In this tutorial we will briefly explain big data, as well as talk in detail about web crawling and web scraping…
Category : Web marketing 25-09-2020 by Silvia Mazzetta
How to create the perfect hacker-proof password
We have not learned and we still use passwords that are extremely easy to hack and vulnerable to cyber attacks. If you don't want your credentials to end up in the hands of criminals or traded on the dark digital shelves of the Deep Web, we bring you a simple…
Category : Security 11-08-2020 by Silvia Mazzetta
How to integrate native images lazy loading in your web projects
Support for natively lazy-loading images is now supported on the web! Look at this demo of the feature From the version 76 of Chrome, you can use the loading attribute to lazy-load images without the need to write custom lazy-loading code or use a separate JavaScript library. Let's dive into the details. Browser compatibility is supported…
Category : Programming 03-04-2023 by Luigi Nori
Java Sorting Algorithm: Bubble Sort
Programming, the need to order the collections of data or objects that must then be manipulated often arises. Ordering a list can be useful in cases where you have to do very quick searches. We will see later on how to maintain an ordered list is useful to carry out dichotomous…
Category : Java 15-12-2019 by Alessio Mungelli
The best Internet search engines used by hackers
Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…
Category : Security 07-01-2021 by Silvia Mazzetta
10 Open source tools for security operations (SOC)
As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…
Category : Security 29-11-2019 by Janeth Kent
Java Design Pattern: Factory Method Pattern
Going on with the speach about design patterns started previously, we are going to talk about another pattern often used: the Factory Method Pattern. The GoF (Gang of Four Design Patterns) defines it in this way: It defines an interface to create objects, but leaves to the subclasses the decision about the…
Category : Java 05-11-2019 by Alessio Mungelli
How to Secure Remote Access Using VPN
Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…
Category : Networking 24-04-2020 by Luigi Nori
How to prevent people from adding spam events and appointments in Google Calendar
Let's explain how to prevent people from adding spam to your Google Calendar by adding events and appointments without your approval. This is a practice that has been used for more than a decade to add appointments and events in which ads appear that may be fraudulent, so that they…
Category : News and events 28-08-2019 by Silvia Mazzetta
Features you will get in EaseUS data recovery software
The EaseUS Data Recovery Software is data recovery software helps users in the data recovery process. There are paid and free software versions for MacOS and Windows. When the data is removed from the storage devices, references to data are removed from the directory structure. This space can be used…
Category : Software 25-06-2019 by Janeth Kent
How to Get the Most out of Digital Technology in Business
The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…
Category : News and events 29-03-2019 by Janeth Kent
The Most Useful 50 Web Sites you wish you knew earlier
There are so many websites around, and it is very complicated to know each and every one of them. Our lisy provides 100 those websites that we find particularly helpful, even though they are not as famous or as prevalent as some of the big names. archive.is — take a snapshot of…
Category : Web marketing 13-06-2020 by Janeth Kent
UX-UI: How to design better forms
Whether it is a signup flow, a multi-view stepper, or a monotonous data entry interface, forms are one of the most important components of digital product design. This article focuses on the common dos and don’ts of form design. Keep in mind that these are general guideline and there are…
Category : Ui/ux design 02-05-2020 by Silvia Mazzetta
80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems
It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…
Category : Security 23-10-2018 by Janeth Kent
Ubuntu servers security: 25 security tools to armor your system
The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc. 1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…
Category : Servers 14-09-2016 by Janeth Kent
MySql: How to build a performant search engine
In content-heavy websites, it becomes increasingly important to provide capable search possibilities to help your users find exactly what they’re looking for. The most obvious solution is searching your MySQL database directly, but implementing a generic MySQL search is not at all trivial. Here’s how to avoid those pitfalls and…
Category : Databases 10-09-2016 by Janeth Kent
Protect Ubuntu Servers With Fail2Ban
Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…
Category : Security 17-02-2015 by Janeth Kent
Speed up your site and protect it against DDOS attacks with CloudFlare
If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…
Category : Networking 23-07-2014 by Luigi Nori
PHP: list of best awesome PHP libraries
It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…
Category : Php 27-04-2014 by Janeth Kent
Top 23 Free Photoshop Plugins
Looking a professional Photoshop extension for free? Today we will provide 23 free Photoshop plugins for graphic designers. These plugins suitable for web designers, graphic designers and photograpgers and the silled photographers have been acknowledged to bring these awesome free plugins into play as a base and after that tweak and…
Category : Software 22-08-2013 by Janeth Kent
A Collection of Essential WordPress Plugins
With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…
Category : Web design 21-08-2020 by Janeth Kent
Face detection methods and classes in php
Face detection is a computer technology that determines the locations and sizes of human faces in arbitrary (digital) images. It detects facial features and ignores anything else, such as buildings, trees and bodies. There is so much to say about face detection and all its algorithms, but first we want to…
Category : Programming 11-07-2013 by Janeth Kent
Top 15 Free Hacking Tools for Ethical Hackers
Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…
Category : Security 19-06-2020 by Silvia Mazzetta
50 Fresh Tools for Developers and Designers
Web developers and web designers regularly look for new resources, tools and services to make the search of these ever-growing techniques easier. This overview presents some of the most useful round-ups of time-savers, tools and services for Web designers. As every designer or developer knows, anything that can save you just…
Category : Web design 08-07-2013 by Janeth Kent
Move Google Authenticator to a new mobile device
We all know that two-step verification can help prevent malicious attacks against your online accounts. Anyone trying to break into your account would need both your password and the mobile device that authentication codes are sent to in order to gain access. Google has done an awesome job of providing options…
Category : Software 01-07-2013 by Janeth Kent
71 Social Media Monitoring Tools
If you want to monitorize the "social world web" you need social media monitoring tools. Before you reach for your wallet and start to spend money try out some of the free social media monitoring services. We have collected Free social media monitoring tools. In the first group are the most popular Social Media Monitoring…
Category : Social networks 27-06-2013 by Janeth Kent
Which apps have access to your online profiles? Check it with MyPermissions app
With MyPermissions app, you can review and remove permissions of apps accessing Facebook, Twitter, Google and your personal information on other online accounts. With this free app for iPhone or for Android, you can keep track of the apps that have access to your various online profiles, including Facebook, Twitter, Google, Yahoo, Dropbox, Instagram,…
Category : Software 26-06-2013 by Janeth Kent
PHP Recursive Backup of Directories
This script can be used to make backup of entire directories and subdirectories in our servers, you can use the script in conjunction with cronjobs //specify the source dir and target dir $src = $_SERVER.'/test/backup/dir1'; $dst = $_SERVER.'/test/backup/dir2'; function recurse_copy($src,$dst) { $dir = opendir($src); @mkdir($dst); while(false !== ( $file = readdir($dir)) ) { if…
Category : Programming 24-06-2013 by Janeth Kent
Streamline your business with the top Invoicing Software Solutions
Top Invoicing Software for Freelancers Freelancers have to juggle multiple aspects of their business, including finding clients, maintaining a client base, invoicing, and following up on payments. Despite the challenges, it's crucial to stay organized and efficient, especially when it comes to invoicing. In this article, we will explore the best invoicing…
Category : Web marketing 14-06-2023 by Janeth Kent
A List of Best Free SQL Injection Scanners and Tools
We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…
Category : Databases 03-06-2013 by Janeth Kent
Google Wallet: your fast and secure digital wallet
Google Wallet is a convenient payment system offered by the company for Android users, previously known as Android Pay. What is Google Wallet, how does it work, and which banks support it? In 2018, Google revamped and rebranded its mobile and online payment services under the brand of Google Pay or G…
Category : Software 15-06-2023 by Janeth Kent
50 Top Tools for Social Media Monitoring, Analytics, and Management
To start a business that will succeed in today's connected world, we need to build a community around our company, brand, and products. It can be noticed how, the last decade, social media monitoring has become a primary form of business intelligence, used to identify, predict, and respond to consumer behavior. Listening to what our…
Category : Social networks 15-05-2013 by Janeth Kent
5 Simple Landing Page Optimization Tips
A well-optimized landing page is a crucial component of any successful online marketing campaign. It serves as the first point of contact for your potential customers, often determining whether they stay and explore your website or leave immediately. To maximize conversions and improve the overall user experience, it's essential to…
Category : Web design 08-06-2023 by Janeth Kent
How to improve security in Firefox, Chrome, and IE
Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…
Category : Security 07-05-2013 by Janeth Kent
Keyword Research and The Methods
Have you ever asked yourself, what keywords should I rank for and why is choosing keywords important? Well we have all been there and hopefully after reading below you won’t ever question keyword research again. This article on keyword research describes first what keyword research is and then the different methods to researching keywords. What…
Category : Web marketing 07-05-2013 by Janeth Kent
Top Ten Android Tips
Welcome to the sometimes wild, often wonderful, but always fascinating world of Android! Chances are the Android OS is a bit different than what you're used to, even if you are moving over from another smartphone platform. We want to help you get settled in and familiar with your phone…
Category : Software 22-04-2013 by Janeth Kent
Free Tools For JavaScript Developers
JavaScript is one of the most widely used programming languages in the world, powering countless web applications and websites. As a JavaScript developer, having access to the right tools can greatly enhance your productivity and efficiency. In this article, we have compiled a list of free tools that every JavaScript…
Category : Javascript 21-06-2023 by Janeth Kent
10 Killer SEO Landing Page Tips
When we talk landing pages, most online marketers think pay-per-click, where the input of a destination URL into Google's or Bing's paid search offerings allow marketers to drive keyword-targeted traffic to (hopefully) optimized pages. My previous article extolling the death of keywords talked about developing intent-based topics and building content that connects with…
Category : Web marketing 15-04-2013 by Janeth Kent
13 Top Free Android Productivity Apps
If you are an android user and a blogger, then this post is for you. We have listed the top free 13 android apps for productivity. 1. Google Goggles Search the real world by taking a picture. Search by taking a picture. Goggles uses image recognition technology to recognize objects and return relevant…
Category : Software 15-04-2013 by Janeth Kent
Boost Your Productivity with These Essential CSS Generator Tools for 2023
In the ever-evolving landscape of web development, CSS remains an indispensable language for creating stunning and engaging user interfaces. Crafting visually appealing projects with CSS often entails writing extensive lines of code, demanding meticulous attention to detail. While writing impeccable CSS is essential, the process can be time-consuming, hindering productivity…
Category : Web design 28-06-2023 by Janeth Kent
10 Tools for Evaluating Web Design Accessibility
Web design accessibility plays a vital role in ensuring that websites are inclusive and usable for all users, regardless of their abilities or disabilities. Evaluating the accessibility of web design is crucial to identify and address potential barriers that may hinder users' access to information and services. Thankfully, there are…
Category : Web design 29-05-2023 by Janeth Kent