How to detect operating system using user agentHow to detect operating system using user agent

In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …

Read more »
11 Dec 2013

How to create facebook open graph/seo on blogspotHow to create facebook open graph/seo on blogspot

This is and example to use facebook open graph and you can edit more on facebook developer.Open graph offers many commonly used actions and objects, which you can start using right away, or you can cr…

Read more »
08 Dec 2013

How your Browser Speeds up Cross Domain Loading using DNS PrefetchingHow your Browser Speeds up Cross Domain Loading using DNS Prefetching

How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…

Read more »
26 Nov 2013

Wireless Threats: Is Your Broadband Secure Enough?Wireless Threats: Is Your Broadband Secure Enough?

Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…

Read more »
17 Nov 2013

Simple step to use php.ini using htaccessSimple step to use php.ini using htaccess

If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …

Read more »
16 Nov 2013

SQL Injection-how about your site ?SQL Injection-how about your site ?

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…

Read more »
23 Jun 2013

New Standard Pushes for a More Secure WebNew Standard Pushes for a More Secure Web

There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…

Read more »
20 Jun 2013

Defcon Wi-Fi Hack Called No Threat to Enterprise WLANsDefcon Wi-Fi Hack Called No Threat to Enterprise WLANs

Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…

Read more »
15 Jun 2013

DNSChanger Malware: What's Next?DNSChanger Malware: What's Next?

The Federal Bureau of Investigation estimates around 64,000 computers in the U.S. infected with the DNSChanger Trojan may have Internet connectivity problems Monday. This particularly nasty piece of …

Read more »
14 Jun 2013

Recent Comments

 
Top