A reasonably secure operating system

Qubes OS is a security-focused operating system, the core idea behind how Qubes provides security is an approach called security by compartmentalization. This approach focuses on limiting the damage an attacker can do by separating your activities and their related files into securely isolated compartments called qubes you can think of them as virtual machines […Read More]

Converting MySQL tables to utf8 encoding format

You specify an encoded character set when you create a database. Choosing a character set determines what languages can be represented in the database. Before beginning any conversion, please back up your database. Convert MySQL tables to utf8 encoding format: ALTER TABLE tbl_name CONVERT TO CHARACTER SET utf8 COLLATE utf8_general_ci; If you already have MySQL […Read More]

How To Clear Your Computer’s DNS Cache

The Domain Name System (DNS) translates Internet domains into IP addresses. DNS is the component of the Internet which converts human-readable domain names (such as example.com) into computer-readable IP addresses (such as DNS cache stores the locations (IP addresses) of pages you have recently viewed. This is useful as it helps to speeds up […Read More]

Tools to Help you Optimize your Images

In this article we’ll discuss the best way of optimizing your images for the web. Poorly optimized images can slow page load time, hindering user experience. Page load time is also factored into Googles search algorithm, so heavy images can also negatively effect your search engine rankings, making it more difficult for your site to […Read More]

Test web fonts on any live website

This is a free service that allows you to experiment with different types of Google Fonts in real-time. Simply enter the URL of the site you want to preview, click “Go!” and you are set. You can change the font easily and as many times as you like. Once you are happy with the result, click […Read More]

Open Source Web Application Firewalls

A web application firewall (WAF) is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks such as cross-site scripting (XSS) and SQL injection. WAFs may come in the form of an appliance, server plugin, or filter, and may be customized to an […Read More]

Disable Insecure Login Field Warning in Firefox

The new version of Mozilla Firefox web browser – version 52.0 has brought some new security enhancements. With the new release comes an insecure warning on any page that offers a login form over an HTTP connection instead of HTTPS. This is part of the industry-wide campaign to move away from HTTP, which is insecure, […Read More]

Free Virtualization Software & Hypervisors

A hypervisor is a program that would enable you to host several different virtual machines on a single physical machine. These virtual machines “think” and “act” like physical machines and can be altered to more efficiently distribute the available resources. Several virtual machines can live on a single physical machines, sharing resources as needed. The […Read More]

Ways to Secure Your Smartphone

The smartphone industry has been steadily developing and growing since 90s, both in market size, as well as in models and suppliers. Modern advances to mobiles mean that there’s often far more at stake than losing contacts and text messages if a mobile is lost or stolen, and even if you don’t use a phone […Read More]

Secret world of the underwater internet

An extensive network of underwater cables, called submarine communications cables, links up the continents and transmits Internet data across the globe. You can browse an interactive map of these cables at the Submarine Cable Map. The map depicts routes of 263 in-service and 22 planned undersea cables. Each country is colored according to how many […Read More]