Windows or Linux hosting – which is best for you?Windows or Linux hosting – which is best for you?

Linux (and its close relation Unix) and Windows 2003 (and its close cousin Windows NT) are types of software (known as operating systems) that web servers use to do the kind of things that web s…

Read more »
07 Sep 2014

POP, IMAP, and SMTP server settings for GmailPOP, IMAP, and SMTP server settings for Gmail

Make sure to enable POP/IMAP access in your Gmail settings first. POP Standard configuration instructions: Incoming Mail (POP3) Server – requires SSL: pop.gmail.com Use SSL: Yes Port: 995 Outgoing Mai…

Read more »
09 Jun 2014

Hotmail: IMAP, POP3, and SMTP settingsHotmail: IMAP, POP3, and SMTP settings

Hotmail supports access via IMAP, POP3 and SMTP protocols. Below you can find the configuration settings for those protocols. All Hotmail servers (POP3 and SMTP) use implicit SSL (use ConnectSSL metho…

Read more »
09 Jun 2014

Controlling DNS prefetchingControlling DNS prefetching

As of version 3.5, Firefox supports DNS prefetching. This is a feature by which Firefox proactively performs domain name resolution on both links that the user may choose to follow as well as URLs fo…

Read more »
08 Jun 2014

Heartbleed bug: What you need to know

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS e…

Read more »
14 Apr 2014

How to detect operating system using user agentHow to detect operating system using user agent

In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …

Read more »
11 Dec 2013

How your Browser Speeds up Cross Domain Loading using DNS PrefetchingHow your Browser Speeds up Cross Domain Loading using DNS Prefetching

How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…

Read more »
26 Nov 2013

Wireless Threats: Is Your Broadband Secure Enough?Wireless Threats: Is Your Broadband Secure Enough?

Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…

Read more »
17 Nov 2013

SQL Injection-how about your site ?SQL Injection-how about your site ?

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…

Read more »
23 Jun 2013

New Standard Pushes for a More Secure WebNew Standard Pushes for a More Secure Web

There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…

Read more »
20 Jun 2013

Defcon Wi-Fi Hack Called No Threat to Enterprise WLANsDefcon Wi-Fi Hack Called No Threat to Enterprise WLANs

Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…

Read more »
15 Jun 2013

DNSChanger Malware: What's Next?DNSChanger Malware: What's Next?

The Federal Bureau of Investigation estimates around 64,000 computers in the U.S. infected with the DNSChanger Trojan may have Internet connectivity problems Monday. This particularly nasty piece of …

Read more »
14 Jun 2013

Is your website safe enough ?Is your website safe enough ?

When i wake up this morning and see statistic of my site and my blog i get many bad bot and spam that want try to access to my domain. it is nothing strange for me. as I tried to fight bad bots, suspi…

Read more »
04 May 2013

What is IPv6?What is IPv6?

IPv6 or Internet Protocol Version 6 is is the latest revision of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on netwo…

Read more »
21 Apr 2013

Blocked ip,host name and user agentBlocked ip,host name and user agent

Host currently block to access http://www.ezadnet.my. If we have remove or add ip/host/user agent from list we never mention here anymore. verizon.net sucuri.net builtwith.com suttlessurvey.com psyc…

Read more »
08 Feb 2013

DoS/DDoS attackDoS/DDoS attack

In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Altho…

Read more »
06 Feb 2013

Open DNS serverOpen DNS server

1. Cesedian Root     =78.47.115.195,78.47.115.198    2. Google     =8.8.8.8,8.8.4.4    3. Open     =208.67.222.222,208.67.220.220    4. Open 2     =216.87.84.209,216.87.84.211    5. Advantage    …

Read more »
19 Jan 2013

DNS jumperDNS jumper

Change your dns from your original ISP into public DNS ip address like google DNS or fastest DNS ip address. After download you can open DnsJumper.ini and you can add more open dns ip on this post. D…

Read more »
16 Jan 2013

Recent Comments

 
Top