Security -

77 results for: security

Wi-Fi 6

  In the second quarter of 2019, Wi-Fi Alliance decided to release the new version of Wi-Fi protocol, innovative already from the name. In fact, if the previous standards had incomprehensible names like IEEE 802.11a, IEEE802.11n and so on, the new protocol is called Wi-Fi 6. This standard introduces some new features.…

Category : Technology   12-09-2019   by Alessio Mungelli

Deep web: 5 curious facts you didn't know about

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents…

Category : Networking   05-08-2019   by admin admin

Now you can download the new Windows terminal: new, modern, fast, efficient, and powerful.

Microsoft has announced its new Windows Terminal, which will bring together PowerShell, CMD and WSL, includes a real Linux kernel that allows you to run more Linux software on Windows and with better performance than WSL 1 in one place to end the diversification that currently has the operating system…

Category : Software   26-06-2019   by admin admin

How to Create your own custom Linux system, step by step

Here is some information where you can learn step by step how to customize a Linux distribution to create your own Linux. If we follow the steps, even the less experienced will be able to create their own Linux to their liking. Personalizing a distribution not only serves to have a…

Category : Operating systems   14-06-2019   by admin admin

How to Get the Most out of Digital Technology in Business

How to Get the Most out of Digital Technology in Business

The entire business landscape continues to be transformed by digital technology with every new piece of tech that is rolled out — in order to keep your company at the forefront of its market, quite simply, you need to keep your finger on the pulse of these latest developments and…

Category : News and events   29-03-2019   by admin admin

The Steps to Take if You're  the Victim of a Cyber Hack

The Steps to Take if You're the Victim of a Cyber Hack

According to statistics, the fight on cyber-hacks and crimes has never been more heated. Last year marked a six-year high when it came to cybercrimes in the United States as there were more than 300,000 people in the country that found themselves a victim. Even more alarming was the fact…

Category : News and events   27-03-2019   by admin admin

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

CSS in JavaScript (CSS-in-JS) Vs CSS in CSS

What actually is CSS-in-JS? You've certainly heard or read words like CSS-in-JS, Styled Components, Radium, Aphrodite and you're and you're stuck in limbo there, "why is it? I'm completely happy about CSS - in - CSS!" We are here to explain these new concepts and clarify them. That said -feel free to use…

Category : Javascript   26-02-2019   by admin admin

Top free JavaScript User Authentication Libraries

We are keen on security: authentication is an important issue when creating a dynamic web application Authentication is for identifying users and provide different access rights and content depending on their id. Since new tutorials appear on the web and more people try to understand the cost-benefit equation for implementing their…

Category : Javascript   27-02-2019   by admin admin

The Meaning of Colors in web Design. A little bit of psychology

The Meaning of Colors in web Design. A little bit of psychology

Color psychology is one of the most talked about and interesting parts of psychology. The idea that some colors evoke feelings and emotions. In fact, this color helps buy the most attractive product. You invest a great deal of time and money to create a convincing website design to increase…

Category : Web design   05-08-2019   by admin admin

Working with JSON in JavaScript

Working with JSON in JavaScript

JSON is short for JavaScript Object Notation and an easy - to - access way to store information. In short, it gives us a collection of human - readable data that we can access in a very logical way. In addition to RSS feeds, any sites now share data using…

Category : Javascript   11-02-2019   by admin admin

How to build a basic PWA with HTML and Javascript

How to build a basic PWA with HTML and Javascript

Looking at the web for a basic PWA online training exercise, everything I found was just too confused or required libraries/system/stage or another. If we need to learn another innovation, we would preferably not get derailed with redundant subtleties ... We have indeed composed a basic introductory exercise to draw from different…

Category : Javascript   28-02-2019   by admin admin

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…

Category : Networking   27-12-2018   by admin admin

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   08-08-2018   by admin admin

Tips on How to Prevent Data Loss for Your Business

Tips on How to Prevent Data Loss for Your Business

Data is information stored electronically that makes the world go round, and for businesses, in particular, it could include sensitive information about its finances, customers, and employees. The majority of businesses rely on data stored on computers and hard drives, yet this is at risk of being lost due to…

Category : Databases   21-06-2018   by admin admin

8 Free PHP Books  to Read in Summer 2018

8 Free PHP Books to Read in Summer 2018

In this article, we've listed 8 free PHP books that can help you to learn new approaches to solving problems and keep your skill up to date.   Practical PHP Testing This book is aimed at advanced php developers and is comprised of articles from the author's Practical PHP Testing blog series. It…

Category : Php   20-06-2018   by admin admin

2 Areas of Business You Need to Audit

2 Areas of Business You Need to Audit

Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…

Category : Startups   28-05-2018   by admin admin

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by admin admin

Setting Up SFTP on Ubuntu 16.04

Setting Up SFTP on Ubuntu 16.04

I recently had a request to setup SFTP for a customer so they could manage a set of files in their environment through an FTP GUI. Being an avid user of command line tools like SCP I haven’t needed to set up FTP or SFTP in many years. So I…

Category : Operating systems   12-03-2018   by admin admin

Install Java in Ubuntu 16.04

Install Java in Ubuntu 16.04

Java and the JVM (Java's virtual machine) are widely used and required for many kinds of software. This article will guide you through the process of installing and managing different versions of Java using apt-get. Installing the Default JRE/JDK The easiest option for installing Java is using the version packaged with Ubuntu.…

Category : Networking   23-11-2017   by admin admin

What You Need to Start a Great Healthcare Blog

What You Need to Start a Great Healthcare Blog

Would you like to start your own healthcare blog? Many people think about setting up this type of resource, but very few of these people eventually make a success of it. However, if you're serious about setting up a great healthcare blog, you need the following things: A Recognized Healthcare Qualification People…

Category : Web marketing   21-09-2017   by admin admin

How to Configure the Mod_Security Core Ruleset in Ubuntu

How to Configure the Mod_Security Core Ruleset in Ubuntu

ModSecurity is a Web Application Firewall, a program that can be used to inspect information as it passes through your web server, intercepting malicious requests before they are processed by your web application. This tutorial will show you how to install ModSecurity on Apache, and configure it with some sensible rules provided…

Category : Servers   04-03-2017   by admin admin

How to Connect to a Remote Server via SSH from a Linux Shell

How to Connect to a Remote Server via SSH from a Linux Shell

Introduction Secure Shell (SSH) is a UNIX-based command interface and protocol for securely getting access to a remote computer. SSH is actually a suite of three utilities - slogin, ssh, and scp - that are secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp. SSH commands are encrypted and…

Category : Servers   16-02-2017   by admin admin

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

PHP 7.2 will be the first Programming Language to add Modern Cryptography to its Standard Library

Last week, the voting phase closed on an RFC to add libsodium to PHP 7.2. The result was unanimous (37 in favor, 0 against). When version 7.2 releases at the end of the year, PHP will be the first programming language to adopt modern cryptography in its standard library. What is Modern…

Category : Php   14-02-2017   by admin admin

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by admin admin

Install Apache, MariaDB and PHP7 on Ubuntu 16.04

Install Apache, MariaDB and PHP7 on Ubuntu 16.04

Ubuntu 16.04 LTS Xenial Xerus comes with PHP7 by default so you don’t have to rely on third-party PPA to get PHP7 installed. In this tutorial, we are going to look at how to install Apache, MariaDB and PHP7 (LAMP stack) on Ubuntu 16.04 LTS Xenial Xerus. Update: This tutorial is…

Category : Servers   18-11-2016   by admin admin

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by admin admin

Install Syncthing on Ubuntu 16.04 using Debian Repository

Install Syncthing on Ubuntu 16.04 using Debian Repository

Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation, modification or deletion of files on one machine will automatically be replicated to your other devices. Syncthing…

Category : Servers   19-08-2016   by admin admin

Google Chrome will block Flash content starting next month, make HTML 5 default by December

Google Chrome will block Flash content starting next month, make HTML 5 default by December

There really is no stopping Flash's demise. In a blog post Chrome team has announced that the browser will start blocking the Flash starting this September with Chrome 53. As more and more websites are moving towards HTML5 type of technologies which gives user faster page loading time, improved security and…

Category : News and events   10-08-2016   by admin admin

What is a DDOS attack and tools used

What is a DDOS attack and tools used

What Is a Denial of Service Attack or DOS? A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able…

Category : Security   19-04-2016   by admin admin

Install HHVM + Nginx on Ubuntu 14.04

Install HHVM + Nginx on Ubuntu 14.04

  The LEMHH software stack is a group of software that can be used to serve dynamic web pages and web applications. This is an acronym that describes a Linux operating system, with an Nginx web server. The backend data is stored in MySQL and the dynamic processing is handled by…

Category : Networking   12-05-2017   by admin admin

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP7: Guide and References to all the changes between version 5.x and 7 of PHP

PHP 7 was released on December 3rd, 2015. It comes with a number of new features, changes, and backwards compatibility breakages that are outlined below. Performance Features Combined Comparison Operator Null Coalesce Operator Scalar Type Declarations Return Type Declarations Anonymous Classes Unicode Codepoint Escape Syntax Closure call() Method Filtered unserialize() IntlChar Class Expectations Group use Declarations Generator Return Expressions Generator Delegation Integer Division with intdiv() session_start() Options preg_replace_callback_array() Function CSPRNG Functions Support…

Category : Php   27-12-2015   by admin admin

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial…

Category : Networking   11-12-2015   by admin admin

Open source alternatives to Slack

Open source alternatives to Slack

Here are some full-featured Slack alternatives that are open-source software, which means you can download it and run it on whatever server you want. That implies that you’re in charge of security, for better or worse, instead of, say, Slack. Friends This tool emerged earlier this year, Friends stands out for its…

Category : Development   30-11-2015   by admin admin

The Best Free SSH Tabbed Terminal Clients for Windows

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   13-02-2019   by admin admin

How to setup FTP server on ubuntu 14.04 with VSFTPD

How to setup FTP server on ubuntu 14.04 with VSFTPD

FTP is used to transfer files from one host to another over TCP network. This article explains how to setup FTP server on ubuntu 14.04 . There are 3 popular FTP server packages available PureFTPD, VsFTPD and ProFTPD. Here i’ve used VsFTPD which is lightweight and less Vulnerability. Step 1 » Update…

Category : Networking   13-01-2015   by admin admin

PHP Filters: the best way to sanitize and validate datas

PHP Filters: the best way to sanitize and validate datas

What are PHP filters? One of the most amazing strengths of PHP is its convenience. Shockingly this same profit has worked against PHP as numerous new coders have forgotten any security to establish safety or fails to offer the adroitness to make a class to validate their variables from end users. One…

Category : Php   28-08-2014   by admin admin

Speed up your site and protect it against DDOS attacks with CloudFlare

Speed up your site and protect it against DDOS attacks with CloudFlare

If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…

Category : Networking   23-07-2014   by Luigi Nori

Mozilla introduces Firefox 29

Mozilla introduces Firefox 29

Firefox 29 was released on April 29, 2014. The new version looks significantly more like Chrome than the old Firefox. It features the same three-bar menu on the right and rounded tabs, for example. At the same time, though, it keeps the separate search form — something most other browsers have…

Category : Software   29-04-2014   by admin admin

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by admin admin

Google Apps Drops Support for IE9

Google Apps Drops Support for IE9

The Google Apps blog announced that Google will drop support for Internet Explorer 9, now that Internet Explorer 11 is available. "We support the latest version of Google Chrome (which automatically updates whenever it detects that a new version of the browser is available) as well as the current and…

Category : Software   06-11-2013   by admin admin

50 Most Useful jQuery Plugins of the year #2

50 Most Useful jQuery Plugins of the year #2

With thousands (yes thousands...) of new jQuery plugins that have been released we have worked hard filtering down all of the those plugins to bring you the 50 that we feel are the most innovative and useful. We have split all of the plugins into the following categories: Web Page Layout…

Category : Javascript   05-11-2013   by admin admin

10 Best PHP Scripts for Polling System

10 Best PHP Scripts for Polling System

In this post we will show you a collection of 10 best PHP Poll Scripts. These PHP scripts for polling system can be added in any self-hosted website. Check out these awesome and easy to install scripts. 1. JAXpoll   JAXpoll is a polling widget that you can add into any of your websites.…

Category : Php   23-08-2013   by admin admin

26 Essential WordPress plugins

26 Essential WordPress plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of 26 Essential WordPress plugins. Enjoy! 1. WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables…

Category : Web design   22-07-2013   by admin admin

10 Best Free Ecommerce Solutions On The Market

10 Best Free Ecommerce Solutions On The Market

There are many ecommerce platforms in the market. Some are free platforms and some are paid platforms. The main factors which you have to consider while choosing ecommerce platform is the price, useful functions, user friendly and with strong merchandising tools. Each platform has its own set of pros and cons…

Category : Software   19-07-2013   by admin admin

Who is immune to cyber-crime?

Who is immune to cyber-crime?

Every company is a target.  No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…

Category : Security   15-07-2013   by admin admin

Top 15 Free Hacking Tools for Ethical Hackers

Top 15 Free Hacking Tools for Ethical Hackers

According to Wikipedia an hacking tool is: a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. It can also be proactively use to protect a network or computer from hackers. Hacking tools come in a wide variety of applications and are specifically created to assist…

Category : Security   10-07-2013   by admin admin

Top Alternatives to Google Adsense (ideal for small publishers)

Top Alternatives to Google Adsense (ideal for small publishers)

Google AdSense is the leader in content-sensitive web-based marketing. Webmasters can place Google AdSense JavaScript code on their web pages in order to allow Google's servers to show context sensitive advertisements (Google Adwords). Google's terms and conditions are very strict such that many web publishers cannot use adsense adverts on their…

Category : Web marketing   09-07-2013   by admin admin

Firefox OS: Start To Develop Your First App

Firefox OS: Start To Develop Your First App

Nearly two years ago, Mozilla announced "Boot to Gecko" (a.k.a. B2G), a project whose primary goal was to provide a standalone web-centric operating system in which the preferred (and in fact, only) platform for application development is the HTML5 stack. In essence, this operating system would have filled a gap…

Category : Programming   02-07-2013   by admin admin

Move Google Authenticator to a new mobile device

Move Google Authenticator to a new mobile device

We all know that two-step verification can help prevent malicious attacks against your online accounts. Anyone trying to break into your account would need both your password and the mobile device that authentication codes are sent to in order to gain access. Google has done an awesome job of providing options…

Category : Software   01-07-2013   by admin admin

How to protect Javascript code from copying by Ajax method

How to protect Javascript code from copying by Ajax method

Today, in this mini tutorial we will introduce a simple method to protect javascript code from copying. IMPORTANT: We are not sure this method will protect javascript 100% but it will be better than do nothing ;-D As we said, this method is very simple: basically we have to combine AJAX method…

Category : Programming   24-06-2013   by admin admin

Install and Configure Varnish with Apache multiple Virtual Hosts on Ubuntu 12.10

Install and Configure Varnish with Apache multiple Virtual Hosts on Ubuntu 12.10

About Varnish Varnish is an HTTP accelerator and a useful tool for speeding up a server, especially during a times when there is high traffic to a site. It works by redirecting visitors to static pages whenever possible and only drawing on the virtual private server itself if there is a…

Category : Networking   21-06-2013   by admin admin

Install apache2 mod_security and mod_evasive on Ubuntu 12.04

Install apache2 mod_security and mod_evasive on Ubuntu 12.04

This guide is intended as a relatively easy step by step guide to: Install and configure Apache2 ModSecurity and mod_evasive modules on Ubuntu 12.04 LTS server. Things have become much easier than before installing both these two excellent security modules for Apache2 in Ubuntu 12.04 LTS, as both modules are available in the…

Category : Networking   11-06-2013   by admin admin

WWDC 2013 - Apple presents new iOS 7, OSX, And More

WWDC 2013 - Apple presents new iOS 7, OSX, And More

Today at its WWDC event in San Francisco, Apple made several key product announcements, they previewed an updated Mac Pro line of desktop computers. The device is cylindrical in shape. The new models will support up to a 12 core Xeon processor from Intel, while its DDR RAM will run…

Category : News and events   10-06-2013   by admin admin

A List of Best Free SQL Injection Scanners and Tools

A List of Best Free SQL Injection Scanners and Tools

We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…

Category : Databases   03-06-2013   by admin admin

25 Useful HTML5 Tools For Web Designers & Developers

25 Useful HTML5 Tools For Web Designers & Developers

The latest version of HTML – HTML5, adds many new elements to the applications that are being developed. It's very important important for the web developers and web designers to learn and use the elements of HTML5 to develop web apps and sites. Here we have some fresh and news HTML5 resources which are…

Category : Web design   29-05-2013   by admin admin

Million of visitors per day with a super cheap  php mysql server using nginx and varnish

Million of visitors per day with a super cheap php mysql server using nginx and varnish

These instructions are the rather verbose, but hopefully easy enough to follow, steps to build a new Linux server using Varnish and Nginx to build a php application on a cheap server , all costing under $15 a month, capable of sustaining million hits per day, (we use blitz.io to…

Category : Networking   28-05-2013   by admin admin

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Introduction to UFW - Uncomplicated Firewall The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall. By default UFW is disabled. Gufw is a GUI that is available as a frontend. Basic Syntax and…

Category : Networking   27-05-2013   by admin admin

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Mobile Malware Targets Android Phones: new Kaspersky Lab report

Are you a loyal Android fan as we are? Yes? Therefore, we have to accepted that malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the platform being actively targeted is Google's Android, which researchers now say is resembling Windows…

Category : Security   23-05-2013   by admin admin

How to send money via Gmail

How to send money via Gmail

For years PayPal has dominated the market on sending money to friends, family members, and businesses. During  Google I/O announcements, Google took a first step toward giving PayPal a run for its money by making it possible to send money via Gmail. The feature is set to roll out to all users over…

Category : Software   22-05-2013   by admin admin

Google Hacking Secrets:The Hidden Codes Of Google

Google Hacking Secrets:The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Category : Security   15-02-2019   by admin admin

Jquery:11 best WJSIWYG HTML5 editors for your website

HTML5 WYSIWYG (What You See Is What You Get) or WYSIWYM (What You See Is What You Mean) is essential today! There is now so many of them around it's hard to find the best ones. Today we are going to present you 10 of the very best jQuery and…

Category : Javascript   18-09-2019   by admin admin

Don't become a victim of identity theft

Don't become a victim of identity theft

Identity theft has always been a concern, but with more and more details of our private lives openly accessible on the Internet, it's easier than ever for cybercriminals to steal somebody's identity — which is worth $5,000. Criminals are also getting more sophisticated and tech savvy, but sometimes, we do most…

Category : Security   15-05-2013   by admin admin

Firefox 21 released for Windows, Mac, Linux and Android

Firefox 21 released for Windows, Mac, Linux and Android

Mozilla on Tuesday officially launched Firefox 21 for Windows, Mac, Linux, and Android. Improvements include the addition of multiple social providers on the desktop as well as open source fonts on Android.   The new desktop version was available yesterday on the organization’s FTP servers last night, but that was just the…

Category : Software   14-05-2013   by admin admin

Is Your User Content Online Legally Yours?

Is Your User Content Online Legally Yours?

Instagram, the phone app that lets you take pictures, apply artsy filters and then share them, is huge. So huge that in 2012 Facebook bought it for $1 billion. Then, late last year, Instagram did something massively stupid: it changed its terms of use, the document of rules for using the…

Category : Web marketing   09-05-2013   by admin admin

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by admin admin

How to improve security in Firefox, Chrome, and IE

How to improve security in Firefox, Chrome, and IE

Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…

Category : Security   07-05-2013   by admin admin

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

8 Things That Anonymous, The Hacker 'Terrorist' Group, Has Done For Good

It's easy to think of the hacking group Anonymous as a group of punk troublemakers, raising hell online. Some have even debated whether their extra-legal protests should be labeled terrorist acts. But that would overlook some of the genuinely good deeds the group — whose members identify themselves with the Vendetta mask — has done. Whether it's retaliating…

Category : Security   29-04-2013   by admin admin

The Best Experimental Chrome Features You Should Check Out

The Best Experimental Chrome Features You Should Check Out

Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…

Category : Software   24-04-2013   by admin admin

Top Ten Android Tips

Top Ten Android Tips

Welcome to the sometimes wild, often wonderful, but always fascinating world of Android!  Chances are the Android OS is a bit different than what you're used to, even if you are moving over from another smartphone platform.  We want to help you get settled in and familiar with your phone…

Category : Software   22-04-2013   by admin admin

Free Tools For JavaScript Developers

Free Tools For JavaScript Developers

We have compiled a list of really useful Free Tools For JavaScript that will help you. Testing JSLint – The JavaScript Verifier JSLint takes a JavaScript source and scans it. If it finds a problem, it returns a message describing the problem and an approximate location within the source. The problem is not…

Category : Javascript   16-04-2013   by admin admin

Shodan: The scariest search engine on the Internet

Shodan: The scariest search engine on the Internet

"When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google,…

Category : Security   11-04-2013   by admin admin

Transform A Simple Website in Vibrant Ecommerce Portal

Transform A Simple Website in Vibrant Ecommerce Portal

Designing with respect to internet has never been limited to any barriers or disciplines, which is why attractive design in combination with online marketing has successfully created something known as ‘Ecommerce’. Readying an ecommerce portal is much more than just development or designing alone, it includes enough brain-work too. Look…

Category : Web design   11-04-2013   by admin admin

Tips to Create Secure PHP Applications

PHP is one of the most popular programming languages for the web. Such languages are very helpful for the programmer but the security holes in it can create a problem. They can create problems in the development path.Below are few tips to help you avoid some common PHP security pitfalls…

Category : Php   29-06-2019   by admin admin

50 Useful jQuery Plugins

50 Useful jQuery Plugins

We have compiled a list of 50 awesome plugins: we have split all of the plugins into the following categories: Web Page Layout Plugins, Navigation Plugins, Form Plugins, Slider & Carousel Plugins, Chart & Graph Plugins, Image Effect Plugins, Video Plugins, and finally, everything else in-between. Web Page Layout Plugins equalize.js equalize.js is…

Category : Javascript   11-04-2013   by admin admin

Install and Setup SSL in Webmin and Apache

Install and Setup SSL in Webmin and Apache

  SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…

Category : Networking   11-04-2013   by admin admin

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

  This tutorial shows how to combine four single storage servers (running Ubuntu 11.10) to one large storage server (distributed storage) with GlusterFS. The client system (Ubuntu 11.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling…

Category : Operating systems   11-04-2013   by admin admin

Php: Introduction to Mysqli Extension

Php: Introduction to Mysqli Extension

  Experienced developers eschew the original MySQL extension because of its abandoned status in PHP. Nascent web developers, however, may be completely oblivious to its dormant past and dying future. Introductory tutorials for connecting to MySQL from PHP are certainly abundant, as is evident from a simple “php and mysql tutorial” Google…

Category : Networking   11-04-2013   by admin admin