October 29, 2014

WORDTRACKER


image source: www.finkernet.com
Many of us today create our own site for making money, giving information, offering other service and some other features. It is a problem for us how to increase the view of our website everyday. One of the best way is the help of search engines by using search engines optimization your site will get a best chance to be found first on the list depending on the keyword use. But many site already has this features, Andy Mindel and Mike Mindel has a great idea how to increase your seach engine optimization by creating WORDTRACKER. WordTracker is a online analyzer that analyst keyword or key phase that are relevant to them and their client to boost or optimize the use of search engine. It can also determine the number of competing sites that use the same keywords or key phrases that have the greatest traffic potential in selected search engine.

October 22, 2014

Technology to Fight Hackers (Part 2)

Filed under: Information,Web 2.0 — editor @ 8:42 pm

By: MJ

To help developers track down and find potential security holes, there are a host of tools available called Web application vulnerability scanners. Their aim is to automate and speed up a process that, when performed manually, is a long and painstaking one. By crawling through a Web site and injecting various attack scenarios, scanners compare an application’s responses against a database of security vulnerability signatures.

Despite their usefulness, Web application vulnerability scanners have not become a must-have for every development team, largely because of cost. Yet there are several good open source scanners available for free. In this tip, we’ll examine a few other reasons for the holdup in Web application vulnerability scanner adoption.

October 15, 2014

Technology on the Move to Help Solve Crime (Part 1)

Filed under: Information,News — editor @ 7:04 pm

By: MJ

The technology today has been used as a gadget to help out in different areas. One of these areas is crime. There had been notorious propagandas regarding child pornography in the net. Now, technology is used to fight technology itself.

Child pornography is a site where underaged kids are asked to pose maliciously. It is no different with child abuse. It deprives the children of a morally dignified life style. This is, of course, illegal and the authorities have made way to fight it.

October 8, 2014

Making the case for Web application vulnerability scanners

Filed under: News — Grace @ 6:25 pm

Organizations of all sizes use Web applications to deliver services and expand business processes. However, hackers are always searching for weaknesses within these online applications, as they can represent a gateway into valuable back-end databases. With the advent of Web 2.0 features, including blogs, wikis, RSS and other advanced Internet technologies, Web applications are powerful, complex and constantly changing, increasing the likelihood of new vulnerabilities within an application.

To help developers track down and find potential security holes, there are a host of tools available called Web application vulnerability scanners. Their aim is to automate and speed up a process that, when performed manually, is a long and painstaking one. By crawling through a Web site and injecting various attack scenarios, scanners compare an application’s responses against a database of security vulnerability signatures.

Despite their usefulness, Web application vulnerability scanners have not become a must-have for every development team, largely because of cost. Yet there are several good open source scanners available for free. In this tip, we’ll examine a few other reasons for the holdup in Web application vulnerability scanner adoption.

Continue reading here: searchsecurity.techtarget.com

October 1, 2014

What are the best ways to check the basic security of an e-commerce Web site?

Filed under: Q&A — Grace @ 6:04 pm

Firstly, you should check the security of the servers hosting the e-commerce site. A Web server needs to be hardened and securely maintained. For guidance, I recommend that you download the appropriate Security Configuration Guide from the U.S. National Security Agency Web site. The guides are free and cover most Web servers. You can also use the NIST (National Institute of Standards and Technology) Security Configuration Checklists Repository to find instructions and procedures on how to complete a secure configuration. The free Benchmark and Scoring Tools from the Center for Internet Security (CIS) also provides a quick and easy way to evaluate an e-commerce Web infrastructure and compare its level of security against minimum due-care security benchmarks.

(more…)

September 24, 2014

What is all the hype about Apple’s iPhone?

Filed under: iPhone — Grace @ 4:39 pm

iphone460.jpg
What’s with the craziness over an insanely priced mobile phone? Well, Its cool and is fast evolving into a single gadget, but for $600 and having to sign up for blacklisted telecoms provider, no thanks.

Aside from the fact that it is exorbitantly priced and a looming monopoly is in the works, the touch pad phone buttons is not that awesome. People need to dial without looking and only normal phones can do that. Touch screens eventually wear out, and once they do, it becomes more of a disadvantage. I am sure you have all experienced using the touch screens at the market when you pay by debit card, but the hassles they give the owner when they start to wear out render the iPhone somewhat inoperable. The question is, do you want that on your cellphone? For a $600 price tag to replace the thing, count me out.

September 17, 2014

Jjot: Note taking goodness

Filed under: Information — editor @ 4:34 pm

If Santa Clause was making a list online of all the good children (and adults) out there, then he maybe using jjot. It’s a note-taking application that allows you to save the info online and sharable to anyone else you want:

Jjot is a lightning fast sticky note web application filled with smart features like archiving, search, and sharing. Jjot is very easy to use and understand (which is nice when you’re tackling any new web application), but what really stands out about Jjot is its speed. Everything you do on Jjot is satisfyingly snappy, which is so refreshing in an age of bloated web apps. Granted, Jjot’s speed might not be enough to make it stand out in the already overcrowded online note-taking and todo applications, but it’s on my good list.

Source

September 10, 2014

Is Server based aggregation better than client based?

Filed under: Q&A — Grace @ 2:55 pm

as-web-apps.png
Server based aggregation is the way to go these days as it minimizes bandwidth on the server as well as on the client side. However, client side aggregation also has its benefits.

First, users don’t have to wait while loading the data as it is already on the client server. The waiting time may not matter for text downloads, but can be significant for bigger and heavier downloads like videos. One answer to the bandwidth problem is to update sites with a ping through websites like weblogs.com using web applications like blogrolling to the client. The client only needs to visit the updated sites and download the information before the user requests it.

However, this solution may not work well if the client is charged per downloaded data, therefore, server based aggregation may be better option in this instance.

September 3, 2014

Security for e-commerce Web

Filed under: Information,Quick Guides,Web 2.0 — editor @ 2:08 pm

Security for e-commerce Web
By: MJ

It is very important to check whether the site you are entering is not a scam where you lose your assets. You have to make sure that you have made the necessary and practical security systems in your computer. If you are still at a loos on how to do so, then please refer to the following suggestions:

• Check the security of the server hosting the site
• download the appropriate Security Configuration Guide from the U.S. National Security Agency Web site
• use the NIST (National Institute of Standards and Technology) Security Configuration Checklists Repository for instructions and procedures
• Benchmark and Scoring Tools from the Center for Internet Security (CIS) to evaluate an e-commerce Web infrastructure and compare its level of security against minimum due-care security benchmarks

August 27, 2014

Mobile Web Apps – All the rage

Filed under: Information,News,Web 2.0 — Avatar @ 1:57 pm

mobilewebapps.jpgWeb apps have been a normal occurence on the internet for a long time and they have now entered the arena of mobile communications. With more and more mobile phones going 3G, the higher transmission speeds have turned them into more than just wireless telephones but mobile computers that is one step closer to a pocket PC. They use specially designed OS’s and browsers that allows them to access the internet on the go, anywhere there is a bar on your signal indicator. Companies like Instant Access Technologies with their Zabidoo that allows one to browse the web without the need for a URL, wow, now that’s movile internet access. Browsing the internet used to be cumbersome and difficult especially on your mobile where the keypads are as compact as they can get. It supports 1,000 mobile websites and just the thought of browsing with such ease would be enough to claim praise from your aching thumb.