SQL injection is a form of hack that lets the hacker run SQL code against your database. Hackers can steal or destroy data, but they can also insert malicious code into your database. SQL injection is common on WordPress sites. If you own a website and download plugins on your site, this article will help you understand how SQL injection works and what you can do to be protected from it.
Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication (also known as 2FA or two-step verification) is one way to stop them in their tracks. This article explains two-factor authentication, the security process, and highlights what you need in order to implement it on your site.
Wearable technology can still be considered new technology today. Wearables include new smart watches, smart fitness bands, etc. Programming apps for wearables is different from development for mobile devices or desktops. This article highlights some basic concerns for programmers who want to embrace the new world of developing apps for wearable devices.
In a world where technology is constantly moving forward at an alarming rate, it sometimes seems odd when people are still using things like typewriters, fax machines, dial-up Internet, and landline phones. However, while many of these old technologies are becoming increasingly relegated to small niches, they continue to play an important role behind the scenes of modern society. This article takes a look at ten such technologies.
Saving a password in a browser might seem like a bad idea from a security perspective. But not really. For certain types of malware, saving a password in a browser could actually be a security measure. Very specifically, it can add a layer of security against keyloggers. This article explains what keyloggers are, and how saving your password in your browser could protect you against them.
When your Wi-Fi signal goes down, so do all your cool high-tech devices. This article provides two tips you can use to boost your Wi-Fi signal without spending a dime.
Two new media tags were introduced with HTML5. The video and audio tags. If your website distributes video and audio, you may want to host your own videos using these new HTML5 media tags. By hosting your own videos, you can breakaway from YouTube and Vimeo’s rules and avoid having your channel suspended. This article discusses how to use both of these tags in your web pages.
There are certain scenarios where the drag and drop method of uploading files to SharePoint document libraries is not desired. Here’s a quick way to disable this feature.
This article explains different methods of setting a date value (date variable) using a SharePoint designer workflow. It describes how a date variable can be set to either a static date, a dynamic date, or a calculated date.
Two quick methods of grabbing the internal names of SharePoint fields. The first method includes a URL encoding and decoding tool so you don’t have to worry about doing this manually.