Are you an experienced Python programmer? Then this article is absolutely for you. On the other hand, if you are a new Python programmer, or new to programming? Then this article is DEFINITELY for you! Colab: Your browser-Based Python Playground Colaboratory, or Colab, is a game-changer for anyone who wants to code with Python. It’s… Read more: Python paradise: Ditch the setup, soar with cloud Colab
A watering hole attack is a type of cyberattack in which the attacker targets a website or online service that is known to be frequented by the victim’s target audience. The attacker then compromises the website or service and injects malicious code into it. When the victim visits the website or uses the service, they are infected with malware.
This is a review of HostMantis, a web hosting company that has been providing reliable and affordable hosting services since 2014. They offer a range of hosting solutions, including shared hosting, reseller hosting, VPS hosting, and dedicated servers.
Free internet fax options allow you to send and receive faxes over the internet without the need for a fax machine or a dedicated phone line. These services are often referred to as “online fax services” or “virtual fax services.”
The user experience is paramount to revisits. Dead links are frustrating for users, and reduces that “first” (or second!)_ impression. This article provides a few dead link checkers to validate a site’s internal and outbound links.
Have you every had that perfect domain name, searched online, found it was available… only to have it taken away in the couple of days it took you to decide to buy? That’s the thievery of front runners. This article is for you!
We are our identity. Whether working from home or working in an office, separating your “Work Identity” and “Personal Identity” remains very important, both for your protection and for the security of your company. Read this article for more information.
WordPress login hardening is a great step towards security. This article explains adding an additional password to the wp-login.php file. Every user will have to enter a secondary password before retrieving wp-login.
Ready to show off a new domain? Want to use a “personalized” domain for a new customer, but don’t wish to buy the domain until the customer actually engages you with a contract? Sometimes having a free domain is of benefit.
Phishing is a real problem, and that problem is only increasing in frequency. Phish attacks come in many different forms. Everyone is affected by phishing. Whether it be that a credit card number is stolen from your family member, or your friend gets their Facebook account hijacked, or you have your company web site blacklisted… Read more: Phish for phun and profit
This post is a part of the WordPress Plugins discussion threads and focuses on Plugins that increase the Security of your WordPress site. Just as with all WordPress Plugin recommendations, only “free” Plugins will be considered. Security First, a definition for this very important section. Security is protecting the Confidentiality, Integrity, and Availability of a… Read more: WordPress Plugins (2.0 Security: Confidentiality, Integrity, Availability)
The term Artificial Intelligence (or AI) was coined in the mid 1950s. AI technology was heavily funded by the Department of Defense for many years. Unfortunately, the practitioners at the time were overly optimistic and failed to overcome some of the difficulties that they faced. By the mid 1970s, funding was largely cut in favor… Read more: Using Artificial Intelligence to create predictive systems
This article explores basic ideas that you should keep in mind as you are starting or continuing your business. It is intended to provoke deeper thoughts for you and your executive team. From business continuity, to free coffee and free WiFi, we’ll look into ideas that are important to businesses… and to customers.
Attacking software is really attacking the software development process. The adversary is looking to take advantage of software defects before those defects are repaired. This paper explores the attack timeline in the SDLC
Content filtering categorize domains based on reputation. Many companies block domains based on those filters. This article will show you how to register your domains so that they are not inadvertently blocked.
Our online identity IS our identity. Someone masquerading as you is potentially a dangerous situation, but it is at least creepy. The problem is, as sure as everyone will pay taxes this year, we will all have our online identity compromised.
What do you tell your colleagues who have had their identity stolen? What do you tell your family who have not *yet* had their identity stolen? What should they do? And what should they have done in order to reduce the vulnerability?
This paper will give you ideas on preventing problems in online identity theft, and also provide guidance on how to fix a problem if it happens.
Managing multiple WordPress sites is no easy task. While managing a single WordPress site in itself can seem difficult at times, managing many WordPress sites concurrently requires keeping track of multiple security updates, different Plug-In updates, Theme updates, backups, usernames and credentials, and Firewall settings. Fortunately, this is a common problem for many WordPress managers.… Read more: Centrally managing WordPress sites
Hackers have a few things in their favor when it comes to getting into your network and stealing data. One of those things is the elusive zero day. When it comes to hacking, a zero day is an “exploitation against a publicly unknown vulnerability”. But hackers don’t need a zero day. They only need a… Read more: Zero day, 0day, ohday, oh my!
So you’ve looked at your local phone bill and it was… oh my, I’m paying that much for a simple landline phone number? This doesn’t seem right! How can I be paying $40 a month for a landline phone (base price around $15/month, plus “options” price like call waiting around $20/month, plus taxes around 22%,… Read more: The end of the (land) line
Business Continuity Planning (BCP) is the pre-planning effort put in to make sure your business continues to operate even during adverse situations. BCP is the work put in before those imperfect days, in order to smoothly transition between “normal” operations and “backup” operations. A backhoe digs through the internet cables, the electricity goes out, a… Read more: Business Continuity Planning
Risk management is an essential skill for any business professional. Whether it be having a second screwdriver available on the job in case one is lost or broken, or it be having Errors and Omissions or liability insurance, we are constantly evaluating risks and the costs associated with managing those risks. In this paper we… Read more: Risk management – developing a framework
Computer Security. Kind of scary, actually. With the likes of Target going down to hackers in late 2013, and a large attack on Home Depot in 2014, what can the rest of us do? If Home Depot can be compromised, how can I protect myself? The bad news — you are a target. Why though? Well,… Read more: Computer security hardening – safeguarding your systems