If you're using MySQL, there are some easy things you can do to secure your systems and significantly reduce the risk of unauthorized access to...
NTFS permissions offer a great deal of control when it comes to resources on your systems. When it comes to the old NTFS (from Windows NT) and the...
This article lists the 10 steps you should take to set up a VPN server in a Redhat distribution of Linux. I am assuming you are using a Redhat...
You can install a proxy server, and view those logs and try to figure out which sites are contacted after the applet was launched!
Introduction Perl is renowned for being a language where you can express complicated commands in a very small amount of space. We'll start...
Windows stores some important information (e.g., computer name and user name) in the environment variables. The ability to access these variables...
Computer users consistently use very simplistic logic when creating passwords. For example, many of us choose meaningful words, personal dates, or...
When it comes to accessing accounts, the goal of every hacker is to get access to the administrator (or root) account. On Windows systems, this...
Most sys admins know the importance of keeping an action log where various tasks, configuration changes, etc. are kept. Simple logs indicating, "I...
Cool dude!
Sometimes you just need to know what country your site visitors are coming from - for example, if you're trying to implement geo-targeted...
Introduction PHP comes with an extensive catalog of date and time functions, all designed to let you easily retrieve temporal information,...
Yeah! that's a good idea too!
Certain applications need to invoke startup functions that run before the main program starts. For example, polling, billing, and logger functions...
To make sure that there is no CR/LF translation on non-Unix computers, you have to use the following lines to open streams to files with binary...
You have to write a callback function for the event onUpdate, to save the changes to a cookie, and then use Sortable.setSequence...
Creating dynamic XML with PHP When working with XML-based applications, developers often find themselves facing the requirement to generate...
Get The Most Out of AJAX AJAX is a disruptive technology that's changed the way Web apps are developed and used. It allows for interactive...
If you're an IT support professional who's comfortable with working at the command prompt in Windows, you might quickly find yourself lost when...
Microsoft has admitted that its Live OneCare security suite has been accidentally deleting some users' Outlook and Outlook Express e-mails....
Separate names with a comma.