Steve Smith demonstrates how to create a boot-able USB Linux drive and installer using Pen Drive Linux's Universal USB Installer. Continue reading...
By Steve Smith | March 30, 2013 5:32 AM EST
Recaptcha is annoying, and so is spam, so what are we to do? Well, I've just installed one of a series of new server side applications that will make it possible for everyone to send TQA Weekly their questions, comments, suggestions,and / or stories, and this will include only one more step from your part.
An e-mail with a validation link will be sent to the e-mail address entered into the form. An email address is required for the form to send, and you will eventually have 24 hours maximum in order to confirm you want to send it, by clicking the link in the e-mail.
When the age function will be enabled, all e-mails stored for more than 24 hours will auto expire and be purged from the buffer.
Future functionality will include an automatic block list, and a auto form block for detected spam like activity.
If you have any suggestions, use our new contact form. The code, along with a dozen and a half other scripts, will soon be available from our producers web-site.
By Steve Smith | March 02, 2013 @ 11:25 PM EST
Passwords, the weakest point of security for any user, web-site, business, etc... Users typically use common passwords on many web-sites, and any web-site that becomes compromised, can compromise other user accounts on other web-sites, since we, also, tend to have the same, or similar usernames.
By Steve Smith | August 20, 2012 @ 4:05 AM EST
When you're trying to protect your digital assets, you may be interested to know that firewalls, encryption, anti-viral and anti-spyware software are not enough. To your average hacker, these are mere annoyances. If you are looking to truly protect your network, you need to target the real issues, the users.
By Steve Smith | August 20, 2012 @ 4:03 AM EST
Today, just about everything connects to a network, whether wired or wireless. Your game console, blu-ray player, computers, laptops, tablets, cellphones, even your TV. How does anyone expect to manage such a network, and maintain a safe networking environment in the home, free from pirates and hackers. What you need to do is future proof your network.