Two Ways To Allow Contributors To Upload Images In WordPress
Do you have guest writers on your WordPress site? If so, they’re most likely set to the contributor role. The problem with the default contributor role however, is that it does not allow the...
View ArticleSEO Friendly Ways To Hide Parts Of Post Content In WordPress
WordPress provides a “private” feature that allows you to hide specific posts and pages from the public. Private posts and pages are only visible to the site administrator(s) and other editors. What if...
View ArticleCSS3 Media Queries For Responsive Design
Media queries were introduced into the web development world by the arrival of CSS3. They now form the foundation for responsive web design. With media queries, you can create separate layouts for...
View Article10 Tips For Staying Safe Online
People fall victim to malicious software attacks everyday. Online scams, identity theft and several other internet crimes make the virtual world very much as dangerous as the real world. By adopting a...
View ArticleReverse Email Search: Find The Person Behind That Email!
We often get email from people we don’t know. Such emails are usually unwanted or unsolicited. But in some cases, you may just need to figure out who the person behind the email address is. This...
View ArticleContent Marketing In The Age Of Responsive Web Design
Mobile devices are changing everything. They have significantly changed the way we communicate. Now they are also changing the way marketers reach us. This article takes a look at responsive web design...
View ArticleSecuring Your Amazon EC2 Instance
Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instance can be...
View ArticleAmazon’s Octocopter And The Prime Air Delivery System
Amazon Prime Air is revolutionizing the online shopping space. It will use an octocopter drone to deliver packages to customers within 30 minutes of an order being placed (just like ordering a pizza!)....
View ArticleStop Inviting Hackers Into Your Home!
Since the Snowden saga, everyone and their brother is now paranoid about government snooping and the privacy of their data and devices. There are discussions around how the big tech companies are...
View ArticlePractical Applications of Drones
While drones may be well known for military applications, there are many other evolving practical applications. Unmanned aerial vehicles are controlled by on-board computers or remote devices and the...
View ArticleHow To Deal With Referrer Spam
Referrer spam is a black hat marketing technique that spoofs user agents and tricks webmasters into visiting a malicious web host. Referrer spam shows up in your traffic reports such as Google...
View ArticleHow To Update Yoast SEO Fields Programmatically
This code sample is for developers who use Yoast SEO plugin on their blog and want to publish a post using PHP code. It's a quick copy and paste method to update Yoast SEO fields. The post How To...
View ArticleWorking With Video And Audio HTML5 Media Tags
Two new media tags were introduced with HTML5. The video and audio tags. If your website distributes video and audio, you may want to host your own videos using these new HTML5 media tags. By hosting...
View ArticleWhy Saving A Password In A Browser Could Increase Security
Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure....
View ArticleAn Introduction To Two-Factor Authentication
Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication...
View ArticleHow SQL Injection Hacks Work
SQL injection is a form of hack that lets the hacker run SQL code against your database. Hackers can steal or destroy data, but they can also insert malicious code into your database. SQL injection is...
View ArticleTechnical Notes of Ehi Kioya
The post Technical Notes of Ehi Kioya appeared first on Ehi Kioya.
View ArticleSecuring Your Amazon EC2 Instance
Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instances can be...
View ArticleHiding Or Spoofing Your Browser Geolocation
Privacy might be the last thing on your mind when it comes to browsing the internet. However, when you visit a location-aware website, the HTML 5 geolocation feature will try to estimate your location...
View ArticleCreating Anonymous YouTube Playlists Using Video IDs
The traditional method of creating YouTube playlists is pretty easy but always requires that you log into your YouTube or Google account to do so. That's why YouTube playlists are usually associated...
View Article
More Pages to Explore .....