• Yii
    How to Program With Yii2: Specialized Validations Preview
    In part two of our miniseries on Yii2 validations, we explore highly useful validations for common web development requirements such as URL, email, file and CAPTCHA verification.Read More…
  • Web Applications
    Preparing Digital Assets for Your Eventual DeathPreview part%20two
    Hosting your website after your death is nearly impossible, but it makes sense to prepare critical digital credentials for friends and family members in case of emergency or death. Learn what to do now so your loved ones are prepared.Read More…
  • Windows
    CloudBerry Explorer: Fast, Effective File Manager for Amazon S3 and the CloudCloudberry
    CloudBerry Explorer allows end-users to access their Amazon cloud storage for data transfer and management in a fast, efficient manner. It's File Manager for Amazon S3.Read More…
  • Security
    CloudBerry Box: Securely Synchronize Data From Windows in the Amazon, Azure and HP CloudsCloudberry
    Still using a questionably secure proprietary cloud service to sync and share your data and files across devices? CloudBerry Box provides a much better solution.Read More…
  • PHP
    How to Program With Yii2: User Access ControlsPreview
    The Yii Framework makes it easy to implement authentication controls over the features in your web application. Learn how to restrict access by user for specific controller actions.Read More…
  • CloudBerry
    How to Back Up to Google Nearline With CloudBerry BackupCloudberry
    This is the first of a three-part sponsored series on CloudBerry's cloud backup, storage and synchronization services. In this first episode, we'll dive into CloudBerry's secure backup services.Read More…
  • Amazon Web Services
    Protecting Your Keys From GitHubPreview
    Attackers are scraping Github for your cloud service credentials. Here are some ways to avoid making this common mistake.Read More…
  • WordPress
    When You're Hacked in WordPress: Staying Safe Later OnHacked wordpress logo
    In the first part of this series, we went through what to do when your website gets hacked. In this second part, we're going to learn about staying safe.Read More…
  • WordPress
    When You’re Hacked in WordPress: Dealing With a Hacked WordPress SiteHacked wordpress logo
    One of the worst things that can happen to your website just happened: It's been hacked. What to do now?Read More…
  • JavaScript
    Introducing JScrambler: Protect Your CodePreview
    As the importance of JavaScript grows, so does the need to protect your intellectual property. Use JScrambler to protect your code from competitors and hackers.Read More…
  • Security
    Using Google Two-Factor Authentication With WordPressPreview
    Secure your WordPress site with two-factor authentication, using this simple plugin for Google's Authenticator app. This tutorial will walk you through setting up the Google Authenticator WordPress plugin for your own sites.Read More…
  • WordPress
    A Guide on Using the iThemes Security PluginIthemes security preview
    Every popular service or product constantly gets threatened by evil minds. No matter which measure you take, you can't achieve 100% security on the internet. But with the right tools and some common sense, we can try 99.99%, can't we?Read More…
Suggested Envato Tuts+ Course

Next lesson playing in 5 seconds

Explore Amazon Web Services$9