Referrer spam is a black hat marketing technique that spoofs user agents and tricks webmasters into visiting a malicious web host. Referrer spam shows up in your traffic reports such as Google Analytics, and some webmasters are concerned that the spam affects SEO and search engine rank. This article describes referrer spam and how you can deal with it.
When dealing with event receivers in SharePoint custom code, we use the BeforeProperties and AfterProperties to get a hash table of properties consisting of string/value pairs that correspond to fields in the SPItem object before and after the event occurred respectively.
Enhance your Web browsing experience on your Android smartphone or tablet. Look beyond your device’s default browser or popular options like Google Chrome, Mozilla Firefox, and Opera. This article explores the myriad of features and advanced capabilities of eight high-performing mobile browsers you can download for free from the Google Play store. The Android browsers that are discussed include Dolphin Browser, Javelin Browser, Boat Browser, Clean Master Browser, Super Fast Browser, Sleipnir Mobile, ONE Browser, and Photon Flash Browser.
Database Modeling is an important part of the software development process. What is a Database Model? What are Conceptual, Logical and Physical Database Models, and how do they differ? I provide a detailed but high-level overview in this article.
What if each time you open an email, the sender can see where you are? What if they know when exactly you open your email? While email tracking has been around forever, a new Gmail extension actually makes the technology very easy for anyone to use. Here’s what you can do to stay safe.
You may someday need to hack into, edit and repackage a SharePoint WSP file. This article explains how.