Cleaning & Securing Your Website This page provides information about identifying, removing, and preventing maleware on your... Posted on: 12/20/10 at 23:21:01 EST
Cleaning & Securing Your Website This page provides information about identifying, removing, and preventing maleware on your... Posted on: 12/20/10 at 23:19:58 EST
How to make a .htaccess file I am sure that most of you have heard of htaccess, if just vaguely, and that you may think you have... Posted on: 12/20/10 at 13:11:04 EST
Using htaccess files to secure website You can find a lot of .htaccess security tips via Google. The tutorials from AskApache.com and... Posted on: 12/20/10 at 12:59:22 EST
Protect your mobile from Bluetooth Hacking Mobile phones now come with Bluetooth functionality as a standard feature in most devices. This... Posted on: 12/20/10 at 12:49:53 EST
Protecting Your Blog From Hackers As you guys know that I run a web design company, and I have many local / online clients. When I... Posted on: 12/20/10 at 12:42:22 EST
7 Best Free Antivirus for Win7 There are several off-the-shelf security products in market for which you need to pay an annual fee... Posted on: 12/24/09 at 22:48:23 EST
Command Prompt Commands for Win7 you know Windows 7 command prompt offers access to more than 180 command line functions? If your... Posted on: 12/24/09 at 22:40:11 EST
What Are Cookies? A cookie is a small bit of text that accompanies requests and pages as they go between the Web... Posted on: 09/08/09 at 00:41:05 EST
UNIX File Permissions UNIX file permissions control who can do what to a file or directory. This is the only way to... Posted on: 09/08/09 at 00:27:37 EST
Allowing Users To Safely Access the Internet To really take advantage of the Internet, users must be able to retrieve information from it. Many... Posted on: 09/08/09 at 00:23:47 EST
Sharing Your Private Server There may be times when your private server needs to be accessed from other companies. You may do... Posted on: 09/08/09 at 00:18:55 EST
The Basics of Encryption Passwords and access lists will provide limited protection but all of your information is still... Posted on: 09/08/09 at 00:11:45 EST
Running Internal and External servers Most companies will want to run two Web servers, one for public viewing and one for private use.... Posted on: 09/08/09 at 00:08:51 EST
Configuring TCP/IP, Setup Network Configuring TCP/IP is not any harder then configuring any other network protocol, such as Novell... Posted on: 09/08/09 at 00:04:56 EST
What is TCP/IP? TCP/IP is actually two layered networking protocols: TCP and IP. IP stands for Internet Protocol... Posted on: 09/08/09 at 00:00:33 EST