Browsing Category
Cyber-security
How to Spot the Bots on Social Media
After promising to bring people together and help them connect with old friends and former lovers, many social media companies have ended up doing the!-->…
5 Tips for Creating a More Secure Login Page for Your Website
Most websites have some way for a user to create an account and log in. With the numerous attacks available to hackers, it's important for website owners to!-->…
Creating Custom Logs in Your Applications – What Events Should You Be Tracking
It's not uncommon for developers to code their logging modules into applications. They do this to compensate for limitations in standard logging functionality!-->…
How to determine when a user is using a proxy
There are many reasons for a person to make use of a proxy connection, while cyber-security foul play is one well-known reason for using proxies; it is not!-->…
NewEgg Hacked by the Magecart Attack Using Skimmers to Steal Credit Card Information
There are many reasons to want to share one's credit card information online, such as online purchases, subscriptions, and various payments. However, things!-->…