Servers - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

104 results for: servers

Callbacks in JavaScript

Callback functions are the same old JavaScript functions. They have no special syntax, as they are simply functions that are passed as an argument to another function. The function that receives the callback as an argument is called a higher-order function. Any function can be used as a callback, since it is…

Category : Javascript   22-05-2023   by Janeth Kent

How artificial intelligence design the world

The image you see above was drawn especially for this article, but did not require any artistic skills or vein from its author. It was created by DALL-E, an artificial intelligence that can be asked to draw anything. To visually illustrate the point, the author of this article's lack of…

Category : Technology   17-05-2023   by Janeth Kent

How to set up your own free web server with XAMPP

Nowadays anyone can create their own website easily and free of charge. Whether through a CMS (such as WordPress) or by hand with HTML, CSS and JavaScript, in a few minutes we can have a more or less functional website up and running. However, in order to test that everything…

Category : Servers   25-10-2021   by Silvia Mazzetta

What is a Full Stack Developer?

The demand for the Full Stack Developer is growing exponentially in recent years. Disruptive technology companies and startups are increasingly requesting this type of multipurpose profile that knows multiple programming languages and can assume all kinds of functions within the company. Throughout this article we will tell you what a full stack…

Category : News and events   06-08-2021   by Janeth Kent

Why E-Commerce Businesses Should be Using Cloud Computing

Cloud computing is the on-demand delivery of computer system resources via the internet. The resources offered in a cloud computing solution include data storage applications, servers, databases, software, and networking tools. Cloud computing seems like it’s been created specifically for businesses like e-commerce stores, as it offers increased flexibility and…

Category : Web marketing   01-06-2021   by Silvia Mazzetta

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How To Use Varnish As A Highly Available Load Balancer On Ubuntu 20.04 With SSL

Load balancing with high availability can be tough to set up. Fortunately, Varnish HTTP Cache server provides a dead simple highly available load balancer that will also work as a caching server. The modern use of SSL/TLS for all traffic has made this a little harder as Vanish has to handle…

Category : Servers   25-04-2021   by Janeth Kent

6 Best Alternative Privacy Focused Browsers in 2021

In today's article we take a look at free private browsers which are relevant in 2021. We will compare their advantages and disadvantages, specs, etc. Let's get into it. What are alternative browsers? Alternative browsers are mostly trying to increase browser security, by various methods, such as browser hardening, sandboxing, encryption forcing, etc. When…

Category : Software   22-04-2021   by

htaccess Rules to Help Protect from SQL Injections and XSS

This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…

Category : Security   01-03-2021   by Janeth Kent

Graphic design and its impact on Web Development

In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not, it can aid in selling a product or idea, it's applied company identity as logos, colors, typography of the company…

Category : Web design   05-04-2021   by

Top Whatsapp alternatives in 2021

From the communication platform WhatsApp leaves more and more users for different reasons. If you're one of them, there are a lot of possibilities on how to replace it with something better. We will show you what are the 5 free alternatives to WhatsApp to have a text or audio-video conversation…

Category : Software   26-01-2021   by

What is DNS Blockchain and how to use it

To be able to navigate the Internet, to enter a website and have it show us all the content we want and search for, certain functions and characteristics are necessary. One of these key points is the DNS. It is what translates domain names into IP addresses, which prevents us…

Category : Security   28-12-2020   by Janeth Kent

A FULFILLED PROMISE - Using the FETCH API to make AJAX calls

In this article we talked about what AJAX calls are and how to use them in a traditional way, by using the XMLHttpRequest (XHR) object. In short, thanks to AJAX calls a web page can be partially updated without having to reload the whole content. This leads to better loading…

Category : Javascript   26-12-2020   by Iveta Karailievova

How to make the website's dark mode persistent with Local Storage, CSS and JS

Recently we wrote about how to do a switchable alternative color mode or theme, a very useful and popular feature to websites. Today’s article is going to be about how to store a user’s settings on your website, specifically, how to save dark mode settings and restore it when a…

Category : Css   22-12-2020   by

Dark Web: the creepy side of the Internet is not as dark as believed

People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use websites that are freely accessible. It is almost impossible not to leave traces on the Internet and therefore reveal a lot…

Category : Security   17-05-2023   by Silvia Mazzetta

How to watch deleted or private Youtube videos

Today we are going to talk about the technique which you permit to be able to recover videos from Youtube that was deleted, made private or simply blocked by Youtube itself. With this trick you most of the time would do just that. How is this possible we will explain…

Category : Social networks   05-04-2021   by

HTTP Cookies: how they work and how to use them

Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…

Category : Programming   27-11-2020   by

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…

Category : Security   28-09-2020   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through standard commercial channels, while others are sold through direct distributors and cash payment. We list some of them here, with the…

Category : Security   15-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server

Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol is fully suitable for production usage. But, what is Matrix? Matrix is an open standard for real-time, interoperable and decentralized communication over…

Category : Networking   25-08-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by Janeth Kent

The concept of Model-View-Controller (MVC) explained

In software engineering, we use design patterns as reusable solutions to a commonly occurring problem, a pattern is like a template for how to solve a problem. Model-View-Controller (MVC)  is a software design pattern that divides the related program or web application into three interconnected elements or components. Each of these…

Category : Programming   22-10-2020   by

Introduction to Network Theory

Modern network theory was introduced at the end of the nineties by the PhD student Reka Albert and then monopolized by her tutor L.A. Barabasi, who made an empire out of it. The idea was not new, network theory is based on graph theory and graph theory had been already introduced…

Category : Networking   03-08-2020   by

Why is Website Performance Important for Online Businesses?

Your web is the site where most individuals will connect with your business. Your digital marketing processes will most probably send customers to your website. It might be to get information concerning your products and services, obtain contact information, or make purchases. Website performance, also known as web optimization, is a…

Category : Web marketing   24-07-2020   by Janeth Kent

Popular DNS Attacks and how to prevent them

DNS services are essential for web browsing. However, it is one of the most vulnerable to attacks. This guide will detail the most dangerous DNS attacks and some actions that will protect the network infrastructure. One of the reasons why DNS services have some susceptibility to attack is the UDP transport…

Category : Security   20-07-2020   by Silvia Mazzetta

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

Is JavaScript good for machine learning?

One of the things you always hear when you are talking to someone related to the M.L. world is that, one must learn Python because the vast majority of the major libraries are in that technology. You're probably right, but I chose JavaScript as the metal of my sword and…

Category : Javascript   16-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by Janeth Kent

Web shells as a security thread for web applications

Over the past two decades, web applications as an alternative to traditional desktop application have been on to rise. As their name suggests, they are installed on web servers and accessed via a web browser. This gives web apps a rather long list of advantages: multi-platform cross-compatibility, no installation required for…

Category : Security   04-05-2020   by Iveta Karailievova

How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit

Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…

Category : Security   02-03-2020   by Silvia Mazzetta

Cross-Origin Resource Sharing (CORS) and examples of XSS and CSRF

Cross-Origin Resource Sharing (CORS) enables web clients to make HTTP requests to servers hosted on different origins. CORS is a unique web technology in that it has both a server-side and a client-side component. The server-side component configures which types of cross-origin requests are allowed, while the client-side component controls…

Category : Javascript   30-01-2020   by Luigi Nori

Best Web Proxies for Safer and Anonymous Surfing

Privacy is increasingly demanded in the context of global society. Contributing to this are the notorious cases of massive infiltration and security breaches that have ended up filtering users' private data. But there is also a widespread suspicion that someone is "watching" everything we do. For that reason, the use…

Category : Security   11-01-2020   by Silvia Mazzetta

Is Old School RuneScape Still Popular?

Since the launch of RuneScape 3 there are two versions of RuneScape running simultaneously: RuneScape 3 and Old School RuneScape. At first glance it seems that having two iterations of the same game might cannibalize player population. But is this first impression correct? That’s what we’re going to look into…

Category : Videogames   08-01-2020   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : Security   07-01-2021   by Silvia Mazzetta

How to setup Free Let’s Encrypt SSL certificates with ISPConfig 3

Let’s Encrypt is an initiative to provide a better way of enabling encryption on websites. It is open, automated and above all: it offers free SSL certificates. Obtaining SSL certificates was always a bit of a hassle and now thanks to Let’s Encrypt and Certbot, finding a certificate authority, doing regular payment,…

Category : Servers   03-12-2019   by Luigi Nori

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…

Category : Networking   24-04-2020   by Luigi Nori

RCS: Everything you need to know about the successor to the SMS

What is RCS? What is it for? Discover everything about this system that Google has been promoting for some time and the future it could have. Messaging in the handset market has changed dramatically over time. For many years SMS was the way most people used to be in contact with…

Category : Mobile   18-06-2019   by Janeth Kent

10 Collaborative Coding Tools for Remote Pair Programming

The days of lonesome coding are long gone since the development of pair programming. It is a technique where two software developers share a keyboard and collaboratively work together. The two developers take turns and continually switch roles in writing code: one being the Driver, whose job is to write…

Category : Development   02-03-2020   by Janeth Kent

Working with JSON in JavaScript

JSON is short for JavaScript Object Notation and an easy - to - access way to store information. In short, it gives us a collection of human - readable data that we can access in a very logical way. In addition to RSS feeds, any sites now share data using JSON,…

Category : Javascript   08-04-2020   by Janeth Kent

The Absolute Beginner's Guide to Sass

The Absolute Beginner's Guide to Sass

You've probably heard about CSS preprocessors before, whether it's Sass, LESS or Stylus, and they're all great tools to maintain your CSS, especially when you work with large codebases. For "lay" (;-)) people: A CSS preprocessor is a program that allows you to generate CSS from the unique syntax of the…

Category : Css   05-02-2019   by Janeth Kent

Most Popular Node.js Frameworks in 2019

Most Popular Node.js Frameworks in 2019

Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…

Category : Javascript   14-02-2019   by Janeth Kent

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…

Category : Networking   27-12-2018   by Janeth Kent

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

A Guide to Moving IT Services During an Office Relocation

A Guide to Moving IT Services During an Office Relocation

Relocating a business from one office to another can be stressful. You can’t afford any loss of productivity and given that there are so many things that can go wrong, it is wise to plan everything down to the last detail. Moving desks and other office furniture is relatively straightforward. A…

Category : News and events   21-08-2018   by Janeth Kent

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

How to Set up a Fully Functional Mail Server on Ubuntu 16.04 with iRedMail

Setting up your own mail server from scratch on Linux is complex and tedious, until you meet iRedMail. This tutorial is going to show you how you can easily and quickly set up a full-fledged mail server on Ubuntu 16.04 with iRedMail under 30 minutes. What is iRedMail? iRedMail is a shell…

Category : Networking   30-03-2023   by Janeth Kent

Useful Terminal Commands Every Web Developer Should Know About

Useful Terminal Commands Every Web Developer Should Know About

The command line interface (CLI), or Terminal is considered by many to be the Holy Grail of computer management. At one time the CLI was the only way to accomplish anything on a computer; then, the CLI gave way to the graphical user interface (GUI) as the popularity of PCs…

Category : Operating systems   22-06-2018   by Janeth Kent

2 Areas of Business You Need to Audit

2 Areas of Business You Need to Audit

Carrying out a business audit should be a regular event, but too many businesses either neglect this or limit their attention to the basic areas. The fact is that your audits need to cover much more than you think, and can be the key to more streamlined business efficiency, Not…

Category : Startups   28-05-2018   by Janeth Kent

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by Janeth Kent

Install Java in Ubuntu 16.04

Install Java in Ubuntu 16.04

Java and the JVM (Java's virtual machine) are widely used and required for many kinds of software. This article will guide you through the process of installing and managing different versions of Java using apt-get. Installing the Default JRE/JDK The easiest option for installing Java is using the version packaged with Ubuntu.…

Category : Networking   23-11-2017   by Janeth Kent

How JSON data types work in mysql

First introduced in MySQL 5.7.8, the JSON data type is a specialized binary column type, similar to a blob , but with added machinery to optimize the storage and retrieval of values from a column typed as json . Javascript Object Notation or more commonly known as JSON, is a  modern…

Category : Databases   30-09-2019   by

How to Install Syncthing on Ubuntu 16.04

How to Install Syncthing on Ubuntu 16.04

This tutorial shows how to install Syncthing on Ubuntu 16.04 Desktop LTS Xenial Xerus. Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, mobile phones or even servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation,…

Category : Networking   17-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

Install Syncthing on Ubuntu 16.04 using Debian Repository

Install Syncthing on Ubuntu 16.04 using Debian Repository

Syncthing is a free continuous file synchronization tool that lets you synchronize your files across desktops, tablets, servers. It’s an open source alternative to the popular BitTorrent Sync (aka btsync) application. The creation, modification or deletion of files on one machine will automatically be replicated to your other devices. Syncthing…

Category : Servers   19-08-2016   by Janeth Kent

SQLMAP installation and usage in Ubuntu and Kali linux

SQLMAP installation and usage in Ubuntu and Kali linux

Let's talk about the penetration testing using one of the KALI linux tool called SQLMAP. What is SQLMAP? sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It is a open source tool to use sql injection…

Category : Security   13-08-2016   by Janeth Kent

Happy 25th birthday WWW !!!

Happy 25th birthday WWW !!!

On this day 25 years ago, August 6, 1991, the world's first website went live to the public from a lab in the Swiss Alps. So Happy 25th Birthday, WWW! It's the Silver Jubilee of the world's first website. The site was created by Sir Tim Berners-Lee, the father of the World…

Category : Technology   06-08-2016   by Janeth Kent

What is a DDOS attack and tools used

A DOS attack is an attempt to make a system or server unavailable for legitimate users and, finally, to take the service down. This is achieved by flooding the server’s request queue with fake requests. After this, server will not be able to handle the requests of legitimate users. The denial…

Category : Security   04-05-2021   by Janeth Kent

Display Linux TCP / UDP Network and Socket Information with the 'ss' command

The ss command is used to show socket statistics. It can display stats for PACKET sockets, TCP sockets, UDP sockets, DCCP sockets, RAW sockets, Unix domain sockets, and more. It allows showing information similar to netstat command. It can display more TCP and state information than other tools. It is…

Category : Networking   23-05-2020   by Janeth Kent

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by Janeth Kent

Optimize MySql On Low Memory Servers

Cloud computing makes it very affordable to get your own private virtual server on the Internet. Digital Ocean offers an entry level droplet for USD$5 per month, and Amazon.com has a micro instance tier on the EC2 platform that is free for the first year. These instances are rather useful…

Category : Databases   25-08-2020   by Luigi Nori

How to Configure Cloudflare Flexible SSL with WordPress website

How to Configure Cloudflare Flexible SSL with WordPress website

This article is part of a serie of articles about Wordpress optimization with Cloudflare and some kinds of servers, if you want to understand well read these articles before: Speed up your site and protect it against DDOS attacks with CloudFlare Million of visitors per day with a super cheap php mysql…

Category : Servers   03-12-2015   by Janeth Kent

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   18-12-2023   by Janeth Kent

Protect Ubuntu Servers With Fail2Ban

Protect Ubuntu Servers With Fail2Ban

​Servers do not exist in isolation, and those virtual private servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect virtual servers from malicious behavior. The program works by scanning through log files and reacting to offending actions…

Category : Security   17-02-2015   by Janeth Kent

Speed up your site and protect it against DDOS attacks with CloudFlare

Speed up your site and protect it against DDOS attacks with CloudFlare

If you have checked your site or blog, then you may noticed the page speed, YSlow, Timeline etc. An important factor to give fast content delivery to your blog’s reader and page speed, CND (Content Delivery Network) is must. The CDN makes your wordpress blog even faster to load, that…

Category : Networking   23-07-2014   by Luigi Nori

Syncronize Files Between Servers With RSYNC

Syncronize Files Between Servers With RSYNC

Synchronize Files With rsync Synchronizing files from one server to another is quite awesome. You can use it for backups, for keeping web servers in sync, and much more. It's fast and it doesn't take up as much bandwidth as normal copying would. And the best thing is, it can be…

Category : Networking   03-02-2014   by Janeth Kent

25 HTML5 speed tips

25 HTML5 speed tips

Creating high-performance web sites or applications is essential for web developers. Jatinder Mann explains that the goal of a developer is to improve web performance by reducing 25 factors: Display time The most important objective is what we refer to as 'Display Time'. This has many names across the industry including 'time to…

Category : Web design   05-12-2013   by Janeth Kent

Top 12 free JavaScript resources for advanced users 

Top 12 free JavaScript resources for advanced users 

If you have a strong knowledge in programming and want to improve your JavaScript skills or you want a good reference book then this list is for you. We've put together a list of 12 of our favorite JavaScript free book to help save you time and energy along the way.…

Category : Javascript   26-06-2023   by Janeth Kent

13 jQuery Plugins and Tutorials for e-commerce website

13 jQuery Plugins and Tutorials for e-commerce website

E-Commerce websites are making shopping easy for customers. The number of ecommerce websites are growing with every day. Shopping Cart is the most important aspect of an E-Commerce website. We all know that jQuery plugins helps us to add difficult things to our websites very easily. Below you’ll find 13 jQuery shopping cart plugin and…

Category : Javascript   02-08-2013   by Janeth Kent

The best code editor for web developers

The best code editor for web developers

Every web developer requires the right tools to do their job, therefore the choice of a source code editor shouldn’t come lightly. This is where we spend most of our development time and where productivity is gained or lost on a grand scale. But which is the best Code Editor? To determine the best source code editor, we…

Category : Software   25-07-2013   by Janeth Kent

The definitive list of analytics and metrics tools

The definitive list of analytics and metrics tools

Lately I had a little problem with Google Analytics. Live results wasn't counting perfectly the number of live users online. Obviously, I am a little disappointed about it, and basically, the amount of time to research a solution or alternative would make the original content stale. Now, i want to…

Category : Software   22-07-2013   by Janeth Kent

The Future of Web Browsing: Liberating Content from the Confines of Space

  Since its inception, the World Wide Web has revolutionized the way we access and interact with information. However, with the rapid advancements in technology and the emergence of new paradigms, the future of web browsing is poised to undergo a radical transformation. In this article, we explore an intriguing possibility…

Category : News and events   28-06-2023   by Janeth Kent

Amplify Your Artistic Journey: Exploring the Best Social Networks for Artists and Designers

In today's digital age, social networks have become essential for artists and designers to showcase their work, connect with a wider audience, and collaborate with like-minded individuals. These platforms offer a plethora of opportunities to gain exposure, receive feedback, and even sell artwork. If you're an artist or designer looking…

Category : Social networks   09-06-2023   by Janeth Kent

Top 15 Free Hacking Tools for Ethical Hackers

Intrusion tests, known as "Penetration Analysis" or "Ethical Hacking", are now a common practice to know the level of security a website has. These tests assess the type and extent of system and network vulnerabilities in terms of confidentiality and integrity. They check the security of the network and empirically verify…

Category : Security   19-06-2020   by Silvia Mazzetta

14 Tools For Checking Your Website's Health

14 Tools For Checking Your Website's Health

Have you ever checked your website's health? We have listed some useful sources that show if your website is operating as it should, and if there's anything that it can be done to improve it's performance from the structural and marketing aspect. Enjoy and feel free to recommend any other sources…

Category : Web design   28-06-2013   by Janeth Kent

NoSQL Concept and MongoDB

NoSQL Concept and MongoDB

NoSQL has emerged as a different and alternative approach compared to relational database management systems (RDBMS). Actually, there are fundamental differences between the scalable NoSQL systems and relational database management systems. Relational database management systems are transaction-based and have ACID rules. NoSQL systems do not fully support the ACID rules and there is no…

Category : Databases   28-06-2013   by Janeth Kent

PHP Recursive Backup of Directories

PHP Recursive Backup of Directories

This script can be used to make backup of entire directories and subdirectories in our servers, you can use the script in conjunction with cronjobs //specify the source dir and target dir $src = $_SERVER.'/test/backup/dir1'; $dst = $_SERVER.'/test/backup/dir2'; function recurse_copy($src,$dst) { $dir = opendir($src); @mkdir($dst); while(false !== ( $file = readdir($dir)) ) { if…

Category : Programming   24-06-2013   by Janeth Kent

Syncronize Files Between Two Ubuntu Servers Using Unison and Incron

Syncronize Files Between Two Ubuntu Servers Using Unison and Incron

File Synchronization Between Two Ubuntu Servers using Unison Unison is a file-synchronization tool for Unix and Windows. It allows two replicas of a collection of files and directories to be stored on different hosts (or different disks on the same host), modified separately, and then brought up to date by propagating…

Category : Networking   21-06-2013   by Janeth Kent

A List of Best Free SQL Injection Scanners and Tools

A List of Best Free SQL Injection Scanners and Tools

We’ve compiled a list of free SQL Injection Scanners we believe will be of a value to both web application developers and professional security auditors. Checking for SQL Injection vulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection Scanners. SQLbftools –…

Category : Databases   03-06-2013   by Janeth Kent

Setting the Hostname (FQDN) in Linux Servers

Setting the Hostname (FQDN) in Linux Servers

Here we will show how to set your system's hostname and fully qualified domain name (FQDN). Your hostname should be something unique. Some people name their servers after planets, philosophers, or animals. Note that the system's hostname has no relationship to websites or email services hosted on it, aside from providing…

Category : Networking   29-05-2013   by Janeth Kent

How to turn on data compression in Chrome 28 Beta

How to turn on data compression in Chrome 28 Beta

One of the features rolled out at Google I/O 2013 was a  new option for Chrome on mobile devices to cut down on the bandwidth used while browsing. Well the feature has been rolled out as part of the latest Chrome Beta update on Android, and it's a quick way to help…

Category : Software   27-05-2013   by Janeth Kent

Big Data and Hadoop: an explanation

Big Data and Hadoop: an explanation

Our world is a potential treasure trove for data scientists and analysts who can comb through massive amounts of data for new insights, research breakthroughs, undetected fraud or other yet-to-be-discovered purposes. But it also presents a problem for traditional relational databases and analytics tools, which were not built to handle…

Category : Databases   24-05-2013   by Janeth Kent

Firefox 21 released for Windows, Mac, Linux and Android

Firefox 21 released for Windows, Mac, Linux and Android

Mozilla on Tuesday officially launched Firefox 21 for Windows, Mac, Linux, and Android. Improvements include the addition of multiple social providers on the desktop as well as open source fonts on Android.   The new desktop version was available yesterday on the organization’s FTP servers last night, but that was just the…

Category : Software   14-05-2013   by Janeth Kent

Server-side HTML vs. JS Widgets vs Single-Page Web App

Server-side HTML vs. JS Widgets vs Single-Page Web App

  At the recent GOTO Chicago conference, I gave a talk on "Frontend Architectures: from the prehistoric to the Post-modern." In just my first 10 months at Coursera, I've experienced the joys and woes of many different frontend architectures, and I wanted to share what I learnt. I detail everything in the slides, but I'll summarize…

Category : Web design   11-05-2013   by Janeth Kent

Grid Computing Vs Cloud Computing

Grid Computing Vs Cloud Computing

The world of information technology is changing rapidly and what may be the popular method of conducting business or gathering information today may be completely phased out in a few months. Grid computing and cloud computing are two powerful – but distinct – computing systems that attempt to accomplish many of the…

Category : Networking   07-12-2013   by Janeth Kent

Is Your User Content Online Legally Yours?

Is Your User Content Online Legally Yours?

Instagram, the phone app that lets you take pictures, apply artsy filters and then share them, is huge. So huge that in 2012 Facebook bought it for $1 billion. Then, late last year, Instagram did something massively stupid: it changed its terms of use, the document of rules for using the…

Category : Web marketing   09-05-2013   by Janeth Kent

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

Super Stealthy Backdoor Spreads To Hit Hundreds Of Thousands Of Web Users

One of the most sophisticated web server backdoors ever seen has spread fast and is now sitting on hundreds of webservers running some of the most popular websites in the world, researchers have warned. One expert told TechWeekEurope the Cdorked backdoor, brought to light in April, is almost as smart as Stuxnet, the malware which disrupted…

Category : Security   09-05-2013   by Janeth Kent

Memcache: Installation and Usage on Ubuntu 12.10

Memcache: Installation and Usage on Ubuntu 12.10

About Memcache Memcache is a system that works to speed up virtual private servers by caching server information. The program allows you to allocate a specific amount of the server ram toward caching recently queried data for a certain amount of time. Once the data is requested again, memcache speeds up…

Category : Databases   03-05-2013   by Janeth Kent

Php: Automatic Site/Directory Backup via FTP with PHP

Php: Automatic Site/Directory Backup via FTP with PHP

In this tutorial we are going to make a PHP script that archives your website into a .tar file, then automatically moves it to an external FTP server for safe keeping. We can then setup a cron for this script which will execute it automatically every day/week/month , however…

Category : Programming   29-04-2013   by Janeth Kent

Quiz: Inside Intel

Quiz: Inside Intel

How well do you know Intel? This quiz will test your knowledge of the brains of the IT industry. There are many microprocessors out there, but Intel has dominated the processing power of PCs – and eventually servers –  since the early years of computing, from the days its wildly successful x86…

Category : Social networks   19-04-2013   by Janeth Kent

Install Webmin on Ubuntu

Webmin is a web-based control panel for any Linux machine that allows you to manage your server through a modern web-based interface. With Webmin, you can change settings for common packages on the fly, including web servers and databases, as well as manage users, groups and software packages. Through this tutorial,…

Category : Networking   18-06-2020   by Janeth Kent

Shodan: The scariest search engine on the Internet

Shodan: The scariest search engine on the Internet

"When people don't see stuff on Google, they think no one can find it. That's not true." That's according to John Matherly, creator of Shodan, the scariest search engine on the Internet. Unlike Google, which crawls the Web looking for websites, Shodan navigates the Internet's back channels. It's a kind of "dark" Google,…

Category : Security   11-04-2013   by Janeth Kent

Install and Setup SSL in Webmin and Apache

Install and Setup SSL in Webmin and Apache

  SSL is a protocol for making secure, authenticated connections across an insecure network like the Internet. It encrypts network traffic, so that an attacker cannot listen in on the network and capture sensitive information such as passwords and credit card numbers. It allows servers to authenticate themselves to clients, so…

Category : Networking   11-04-2013   by Janeth Kent

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

Distributed Storage Across Multiple Servers (Nodes) With GlusterFS 3.2.x On Ubuntu 12.10

  This tutorial shows how to combine four single storage servers (running Ubuntu 11.10) to one large storage server (distributed storage) with GlusterFS. The client system (Ubuntu 11.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling…

Category : Operating systems   11-04-2013   by Janeth Kent

Genghis - Mongo DB Manager in a single file

Genghis - Mongo DB Manager in a single file

  For NoSQL fans, MongoDB is definitely the most popular solution with the simplicity and cross-platform support offered. In order to manage MongoDB databases easily, Genghis, a single-file, self-hosted and web-based solution is pretty handy. It can be installed either as a Ruby gem or as a standalone PHP script. Genghis is capable of managing any number of databases…

Category : Databases   11-04-2013   by Janeth Kent

q=servers Clicky