Hostinicon
GET HOSTING FROM $3.95/MO PLUS A FREE YEAR ON TUTS+ (RRP $180). HURRY OFFER LIMITED. Check it out
Advertisement

Security

  • Web Applications
    Preparing Digital Assets for Your Eventual DeathPreview part%20two
    251 shares
    Hosting your website after your death is nearly impossible, but it makes sense to prepare critical digital credentials for friends and family members in case of emergency or death. Learn what to do now so your loved ones are prepared.Read More…
  • Windows
    CloudBerry Explorer: Fast, Effective File Manager for Amazon S3 and the CloudCloudberry
    114 shares
    CloudBerry Explorer allows end-users to access their Amazon cloud storage for data transfer and management in a fast, efficient manner. It's File Manager for Amazon S3.Read More…
  • Security
    CloudBerry Box: Securely Synchronize Data From Windows in the Amazon, Azure and HP CloudsCloudberry
    89 shares
    Still using a questionably secure proprietary cloud service to sync and share your data and files across devices? CloudBerry Box provides a much better solution.Read More…
  • PHP
    Programming With Yii2: User Access ControlsPreview
    101 shares
    The Yii Framework makes it easy to implement authentication controls over the features in your web application. Learn how to restrict access by user for specific controller actions.Read More…
  • CloudBerry
    How to Back Up to Google Nearline With CloudBerry BackupCloudberry
    82 shares
    This is the first of a three-part sponsored series on CloudBerry's cloud backup, storage and synchronization services. In this first episode, we'll dive into CloudBerry's secure backup services.Read More…
  • Amazon Web Services
    Protecting Your Keys From GitHubPreview
    215 shares
    Attackers are scraping Github for your cloud service credentials. Here are some ways to avoid making this common mistake.Read More…
  • WordPress
    When You're Hacked in WordPress: Staying Safe Later OnHacked wordpress logo
    355 shares
    In the first part of this series, we went through what to do when your website gets hacked. In this second part, we're going to learn about staying safe.Read More…
  • WordPress
    When You’re Hacked in WordPress: Dealing With a Hacked WordPress SiteHacked wordpress logo
    429 shares
    One of the worst things that can happen to your website just happened: It's been hacked. What to do now?Read More…
  • JavaScript
    Introducing JScrambler: Protect Your CodePreview
    556 shares
    As the importance of JavaScript grows, so does the need to protect your intellectual property. Use JScrambler to protect your code from competitors and hackers.Read More…
  • Security
    Using Google Two-Factor Authentication With WordPressPreview
    451 shares
    Secure your WordPress site with two-factor authentication, using this simple plugin for Google's Authenticator app. This tutorial will walk you through setting up the Google Authenticator WordPress plugin for your own sites.Read More…
  • WordPress
    A Guide on Using the iThemes Security PluginIthemes security preview
    231 shares
    Every popular service or product constantly gets threatened by evil minds. No matter which measure you take, you can't achieve 100% security on the internet. But with the right tools and some common sense, we can try 99.99%, can't we?Read More…
  • PHP
    How to Build Rate Limiting into Your Web App LoginPreview
    284 shares
    Apple's failure to rate limit iCloud logins likely contributed to celebrity photo hacking. Here's how to protect your own apps.Read More…
Advertisement
Advertisement