Home Categories Other Resources articles

WebKnowhow Categories

Make a Search Engine For Your Website With PHP

by Rory Canyon September 18, 2006
Making a search engine for your website with PHP is really easy and provides substantial functionality required by most of the small to medium websites.

Understanding Bandwidth and Data Transfer

by Bedrich Omacka September 08, 2006
Do you have any website on your own? Then you should have heard about the term Bandwidth and Data transfer.

Search Engines and Website Traffic

by Zhe Xiang Chen August 31, 2006
Analyzing your web traffic statistics can be an invaluable tool for a number of different reasons. But before you can make full use of this tool, you need to understand how to interpret the data.

Email Trick Test

by Sam Henderson August 24, 2006
Three out of five emails are "SPAM" - but you can avoid being a victim of a vicious scam called "Phishing". These criminals go for short term gains by raiding your bank account and "maxing out" your credit cards. They can also take out loans in your name. You probably won't know about it until the loan company's start chasing the over due payments. Don't underestimate these criminals they are intelligent, ruthless and very determined.

Basic Spyware Tips

by Steve Cowan August 14, 2006
Nowadays, it's a sad but true fact that spyware and adware programs are a far greater threat to your internet security than the dreaded computer viruses. Indeed, spyware, adware and other so-called malware (such as key loggers and trojan horses) actually constitute the biggest single online threat to your privacy and the security of your data.

Spam Filter - Bayesian Filter to Fight back Spammers

by Micky Sing August 03, 2006
A Bayesian filter with White/Black List capability, integrating seamlessly with MS Outlook and Outlook Express, to fight back spammers.

10 Tell Tale Signs of Computer Spyware and Adware Infection

by Austin Akalanze July 31, 2006
Though there are no warning signs to indicate that spyware or adware is being installed on your system, there are several tell tale signs to alert you of their presence, once they install.

TCP/IP addressing and subnetting a network

by Team uCertify July 24, 2006
A TCP/IP address, generally referred to as an IP address, consists of a thirty-two bit binary number that uniquely identifies a device on a TCP/IP network. It is logically divided into four groups and is presented in dotted binary notations. Each group contains eight bits (one byte) and every node on the TCP/IP network is assigned a unique TCP/IP number (IP address) for the identification of the node. Each IP address is separated internally into two parts: a network ID and a host ID.

What Is Changing With The CCIE Security Lab Exam?

by Scott Morris July 21, 2006
Beginning in January 2007, people will be feeling less secure about taking the CCIE Security lab exam. Yes, the pun was intended! There are a number of things that change. What does it mean? Well, for starters, it means that I can guarantee there will be a flood of people signing up for every available lab slot between now and the end of December!

15 Exercises for Learning a New Programming Language

by Prashant N Mhatre June 28, 2006
I have working knowledge of a bunch of programming languages but job demands to learn a new language frequently in a short time.

Go to Previous  1, 2, 3, 4, 5, 6, 7  Next

Advertisement

Partners

Other Resources