Quantcast
Channel: Ehi Kioya
Browsing all 32 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Two Ways To Allow Contributors To Upload Images In WordPress

Do you have guest writers on your WordPress site? If so, they’re most likely set to the contributor role. The problem with the default contributor role however, is that it does not allow the...

View Article



SEO Friendly Ways To Hide Parts Of Post Content In WordPress

WordPress provides a “private” feature that allows you to hide specific posts and pages from the public. Private posts and pages are only visible to the site administrator(s) and other editors. What if...

View Article

Image may be NSFW.
Clik here to view.

CSS3 Media Queries For Responsive Design

Media queries were introduced into the web development world by the arrival of CSS3. They now form the foundation for responsive web design. With media queries, you can create separate layouts for...

View Article

10 Tips For Staying Safe Online

People fall victim to malicious software attacks everyday. Online scams, identity theft and several other internet crimes make the virtual world very much as dangerous as the real world. By adopting a...

View Article

Image may be NSFW.
Clik here to view.

Reverse Email Search: Find The Person Behind That Email!

We often get email from people we don’t know. Such emails are usually unwanted or unsolicited. But in some cases, you may just need to figure out who the person behind the email address is. This...

View Article


Content Marketing In The Age Of Responsive Web Design

Mobile devices are changing everything. They have significantly changed the way we communicate. Now they are also changing the way marketers reach us. This article takes a look at responsive web design...

View Article

Image may be NSFW.
Clik here to view.

Securing Your Amazon EC2 Instance

Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instance can be...

View Article

Image may be NSFW.
Clik here to view.

Amazon’s Octocopter And The Prime Air Delivery System

Amazon Prime Air is revolutionizing the online shopping space. It will use an octocopter drone to deliver packages to customers within 30 minutes of an order being placed (just like ordering a pizza!)....

View Article


Image may be NSFW.
Clik here to view.

Stop Inviting Hackers Into Your Home!

Since the Snowden saga, everyone and their brother is now paranoid about government snooping and the privacy of their data and devices. There are discussions around how the big tech companies are...

View Article


Image may be NSFW.
Clik here to view.

Practical Applications of Drones

While drones may be well known for military applications, there are many other evolving practical applications. Unmanned aerial vehicles are controlled by on-board computers or remote devices and the...

View Article

How To Deal With Referrer Spam

Referrer spam is a black hat marketing technique that spoofs user agents and tricks webmasters into visiting a malicious web host. Referrer spam shows up in your traffic reports such as Google...

View Article

How To Update Yoast SEO Fields Programmatically

This code sample is for developers who use Yoast SEO plugin on their blog and want to publish a post using PHP code. It's a quick copy and paste method to update Yoast SEO fields. The post How To...

View Article

Working With Video And Audio HTML5 Media Tags

Two new media tags were introduced with HTML5. The video and audio tags. If your website distributes video and audio, you may want to host your own videos using these new HTML5 media tags. By hosting...

View Article


Why Saving A Password In A Browser Could Increase Security

Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure....

View Article

An Introduction To Two-Factor Authentication

Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication...

View Article


How SQL Injection Hacks Work

SQL injection is a form of hack that lets the hacker run SQL code against your database. Hackers can steal or destroy data, but they can also insert malicious code into your database. SQL injection is...

View Article

Technical Notes of Ehi Kioya

The post Technical Notes of Ehi Kioya appeared first on Ehi Kioya.

View Article


Securing Your Amazon EC2 Instance

Many individuals and organizations implement virtual machines and dedicated servers using Amazon Elastic Cloud Compute (EC2). Like any other host on the Internet, your Amazon EC2 instances can be...

View Article

Hiding Or Spoofing Your Browser Geolocation

Privacy might be the last thing on your mind when it comes to browsing the internet. However, when you visit a location-aware website, the HTML 5 geolocation feature will try to estimate your location...

View Article

Creating Anonymous YouTube Playlists Using Video IDs

The traditional method of creating YouTube playlists is pretty easy but always requires that you log into your YouTube or Google account to do so. That's why YouTube playlists are usually associated...

View Article
Browsing all 32 articles
Browse latest View live




Latest Images