Pro Corner

Technology


How the web has turned into a virtual battlefield

How the web has turned into a virtual battlefield
Posted in Featured & Security & Technology on March 29, 2013 , by

A graphical representation of a DDoS-style attack on a target website. The internet is one of the modern world’s most utilized technologies today, with over 2 billion users accessing web content and services via computers and mobile devices every day. It now only makes sense that more and more nefarious individuals and organizations are utilizing […]

Read More

United States Constitution vs. Your Hard Drive

United States Constitution vs. Your Hard Drive
Posted in Featured & Security & Technology on July 14, 2011 , by

Data encryption is not like a wall safe or a key lock that is “physical per say” where we can require or subpoena a key. If we subpoena an individual they can plead the 5 amendment which protects a person’s right for self-incrimination.

Read More

Do they really "Like" me?

Do they really "Like" me?
Posted in Featured & Internet Marketing & Social & Technology & Web Design on May 24, 2011 , by

Have you ever asked yourself what all this craziness over the Facebook “Like” button is about? It seems this one word button is almost everywhere and anywhere. Well it would seem this way for a good reason.

Read More

The Advantages of Using Analytics

The Advantages of Using Analytics
Posted in Featured & Internet Marketing & Technology on March 11, 2011 , by

Whether you are running a personal or business website, knowing as much as you can about your visitors is the most important factor in determining your success. The second one is actually delivering what they need. Web Analytics helps to provide you with the information you need to achieve these goals.

Read More

5 quick ways to use social media to help promote business

5 quick ways to use social media to help promote business
Posted in Featured & Internet Marketing & Social & Technology on March 9, 2011 , by

Social Media is everywhere online and it seems like everyone and their grandmother has some form of presence online through one of the many social media sites available. Social Media has made it possible for anyone anywhere to find out about almost anything online. But how can it be applied to business ?

Read More

IPV6 Day here we come!

IPV6 Day here we come!
Posted in Technology on March 4, 2011 , by

According to Akamai and the Internet Society, the internet aka public networks will run out of Internet Protocol version 4 addresses by November of this year. So what does that mean, right? Well every public device, including cellphones, that are attached to the public internet in one way shape or form have a public IP […]

Read More

How to be more efficient at email

How to be more efficient at email
Posted in Productivity & Technology on , by

Email can be quite the nightmare to manage for some of us. In-boxes can quickly get out of hand in a matter of days, taking away the convenience email is supposed to provide.  Aside from managing your mail, the use of email can also be more efficient.  Today we are going to talk about taking […]

Read More

Exploited: The buffer overflow

Exploited: The buffer overflow
Posted in Security & Technology on February 7, 2011 , by

Many people ask, how do Hackers do what they do? How do they gain access to systems? Well basically they probe and prod until they find a vulnerability. The most common vulnerability is a buffer overflow of poorly written software. Remember most real hackers do not want to crash a system, they want control of […]

Read More

Categories

Here are some the categories & topics to help you get around.